IP Address Flagging
An order will be flagged for manual review if the IP address details fail one of the following security checks.
Why Are Some VPN Users Flagged During Security Checks?
Not all VPNs are treated the same. Our system considers factors like the reputation of the VPN IP, its history of abuse, and how it’s being used. Legitimate users on secure, stable VPNs (like those used for work) typically aren’t flagged. However, VPNs associated with suspicious behavior or known fraudulent activity may trigger a flag to protect against potential risk. It’s not just the use of a VPN—it’s the context in which it’s used that matters.
IP Address Security Checks
Valid IP: Pass/Fail
A standard, trustworthy IP address with no known history of suspicious activity. It typically belongs to a residential or business user and doesn't show signs of being masked or manipulated. Generally considered low risk and unlikely to trigger a flag.
Mobile Network: Yes/No
Mobile IPs are often shared among multiple users and change frequently, making it challenging to verify consistent user behavior. These characteristics may result in a flag if the system detects rapid IP shifts or location mismatches.
Robot IP Address: Pass/Fail
These IPs are typically associated with non-human traffic, such as bots or scripts. Security checks may flag them to prevent automated access, scraping, or other forms of suspicious activity.
Datacenter IP Address: Yes/No
Datacenter IPs, often associated with cloud or hosting providers, are frequently utilized in automation. While not inherently malicious, access from these IPs may be flagged if it deviates from expected human behavior or appears to originate from a non-consumer environment.
Tor IP: Pass/Fail
IP addresses originating from the Tor network are flagged due to their ability to mask a user’s location and identity. Tor uses limits traceability and is commonly associated with attempts to evade detection, prompting higher scrutiny or access denial.
Proxy or VPN IP: Pass/Fail
Proxy and VPN services can hide a user’s actual location and are sometimes used to bypass security checks or location-based restrictions. Known proxy/VPN IPs may be flagged to ensure the integrity of identity verification and fraud prevention processes.
Updated 3 days ago