Context API

IP Enrichment on Demand

By Experts; for everyone

Our Context API doesn't offer arbitrary scores, stale reputations, or judgement on maliciousness. Instead, we tell you everything we can about an IP Address online. Let our data empower you to make decisions based on facts.

Warp VPN Exit


> curl api.spur.us/v1/context/8.20.122.140

{
  "ip": "8.20.122.140",
  "anonymous": true,
  "vpnOperators": {
    "exists": true,
    "operators": [ { "name": "WARP_VPN" } ]
  },
  "deviceBehaviors": {
    "behaviors": [ { "name": "TOR_PROXY_USER" } ],
    "exists": true
  },
  "devices": { "estimate": 50 },
  "proxiedTraffic": { "exists": false },
  "geoPrecision": {
    "city": "Riyadh",
    "country": "SA",
    "exists": true,
    "hash": "th3hvvny",
    "point": {
      "latitude": 24.7698,
      "longitude": 46.6684,
      "radius": 500
    },
    "state": "Riyadh Region"
  }
}

Introducing: the Data

Our unrivalled insight into proxy networks and network infrastructure provides you the context you need to assess the risk of an ongoing connection. The Context API always provides the latest confirmed details for an IP.

VPN Exit IPs

Does an IP belong to a commercial VPN provider? We map the infrastructure for over 350 different commercial providers and tell you exactly who an IP belongs to.

Callback Proxies

See if an IP address proxies traffic for residential proxy networks, malware networks, botnets, or other commercial end-point based zombies.

Precision Geo

Identifying geo-fraud is a critical component to fraud and security operations. We focus on providing accurate usage location, not data-center location.

User Count Estimate

There is a big difference between a 50 person gateway and dedicated IP. We've saved clients hundreds of hours in wasted analysis by understanding the size of the haystack they were about to search.

Device Behaviors

Understand the types of network activity an IP has been involved with: VPN usage, Tor usage, peer-to-peer networks and more.

Similar IPs

We link server and client IP addresses together based on their external properties and network behavior.

WiFi SSIDs

See affiliated wireless network names for public spaces and commercial gateways. Easily triage shared networks and corporate affiliation.

Our Advantage

VPN and Proxy Names

Our cutting edge data and techniques outperform our competition in results and accuracy.

Simple Plans

Easy to understand subscriptions let you pay for your use case. From individual to commercial.

Global Data

Accurate results are available globally from ethically sourced data.

Feed Access

Download VPN and Proxy lists with Team and Enterprise subscriptions.

High Performance

Lightning fast performance and reliability suitable for any integration or automation.

Residential Proxies

Granular details on residential, malware, and other callback proxy networks.

Token Auth

Token based authentication makes integration into any REST client simple and fast.

Commercial Usage

Commercial data licensing available for product integrations and re-distribution.

Customer Use Cases

Real-world applications with real-world customers. See how others are leveraging Spur to improve security and prevent fraud.

Financial Institutions

Protecting financial assets means keeping pace with techniques used by the most sophisticated threat actors. Call-back proxy networks are being used at scale to perform user masquerades, apply for fraudulent loans, brute force pins, and replay credentials. Our insight into commercial, residential, malware and other call-back proxy networks helps our financial customers protect their customers, and themselves.

E-Commerce Platforms

E-commerce platforms are bombarded with automated activity that can severely impact user-experience and destroy customer conversions. Our data illuminates the networks facilitating denial-of-inventory attacks, fraudulent purchases, scalping, fake content and price scraping so that our customers can take action to protect their ecosystem.

Managed Security and SOCs

Ever wish you could see when someone is utilizing anonymous infrastructure to access corporate resources? Wish no longer. Our MSS and SOC clients rely on our VPN and Proxy data to routinely audit authentication attempts on their networks. With the rise of remote access, this context has become critical. What you don't know might horrify you!

Security Appliance Vendors

Developing generalized defenses requires ground truth. We work with cloud and physical security appliance vendors to help improve their rule-sets and engineer capabilities that prevent malicious activity.

Incident Response and Professional Services

We've saved our clients countless analyst hours (and embarrassment) by providing insight into IP related IOCs during an investigation. Before jumping to conclusions, it is important to understand how an IP is being used online. Is it shared? Is it a commercial service? What anonymization networks may be tying my case together? What tradecraft are we combatting?

Get Started Now

Subscription Tiers

Choose a subscription tier that fits your use case. Higher tiers include some feed access, improved accuracy, and uptime guarantees. All subscriptions include all fields through the Context API.

individual


$35 / month
  • - 1,500 API queries per month
  • - IP based search only
  • - Reduced geo accuracy
  • - Licensed for internal use
  • - No SLA, basic support

team


$350 / month
  • - 15,000 API queries per month
  • - Download access to the Anonymous US Feed (All US VPNs)
  • - Improved IP and Geo accuracy
  • - Licensed for internal use
  • - SLA, basic support

enterprise


$3,500 / month
  • - 150,000 queries per month
  • - Download Access to the Anonymous IP Feed (Global)
  • - Highest accuracy IP and Geo based search
  • - Licensed for commercial use
  • - SLA with premium support

Need More Raw Data?

Platform Integrations

We proudly integrate with the following platforms and services. Don't see an integration for your tools? Let us know. We are constantly looking for new places to bring our data and engage with the community.

Looking for something else?

We work with clients to provide custom threat intelligence, product integrations, and raw data. Get in touch with our sales team to find out if we can help.