IP2Proxy IP-ProxyType-Country-Region-City-ISP Database
PX4 contains IP addresses which are being used as VPN servers, open proxies, web proxies, Tor exits, search engine robots, data center ranges (PX2-PX11), residential proxies (PX10-PX11), consumer privacy networks (PX11), enterprise private networks (PX11) and VPN provider name (PX11).
View Sample Data
The IP address range covered by this demo is limited to a small range in the commercial database.
Download IPv4 / Download IPv6Request Free Sample
Request free sample database and source codes for PHP, ASP.NET, ASP, C#, VB.NET, Microsoft SQL, and MySQL.
Current Version | October 08, 2024 |
---|---|
Next Update | October 09, 2024 (00:00 GMT+0) |
Database Format |
Binary (BIN)
ASCII Text File (CSV) |
IPv4 Database Size | CSV: 444.38 MB (4,472,532 Rows) |
IPv6 Database Size | CSV: 529.99 MB (4,726,734 Rows) |
IPv4 + IPv6 Binary Size |
BIN: 267.91 MB |
- One year subscription (365 days)
- Database in text CSV (Comma Separated) format
- Supports all server platforms and programming languages
- Fresh daily update of proxy database. New proxy database will be ready for download at 00:00 UTC daily.
- Automate download process by download script. Subscribe to IP2Proxy Web Service or IP2Proxy Batch Service for a hosted service.
Name | Type | Description |
---|---|---|
ip_from | INT(10) / Decimal(39,0) | First IP address in netblock. |
ip_to | INT(10) / Decimal(39,0) | Last IP address in netblock. |
proxy_type | VARCHAR(3) | Type of proxy. |
country_code | CHAR(2) | Two-character country code based on ISO 3166. |
country_name | VARCHAR(64) | Country name based on ISO 3166. |
region_name | VARCHAR(128) | Region or state name. |
city_name | VARCHAR(128) | City name. |
isp | VARCHAR(256) | Internet Service Provider or company's name. |
Proxy Type | Description | Anonymity |
---|---|---|
VPN | Virtual Private Networks: A Virtual Private Network (VPN) is a service that provides users with a publicly accessible server to conceal their IP addresss. | High |
TOR | Tor Exit Nodes: The Tor Project is an open network used by those seeking anonymity via a free, worldwide, volunteer overlay network that consists of more thousands relays. | High |
DCH | Hosting Provider, Data Center or Content Delivery Network: As hosting providers and data centers can contribute to anonymity, the IP2Proxy database flags IP addresses associated with them. | Low |
PUB | Public Proxies: These services make connection requests on a user's behalf. Proxy server software can be configured by the administrator to listen on a specified port. They differ from VPNs in that proxies usually have limited functions compared to VPNs. | High |
WEB | Web Proxies: These are web services that make HTTP requests on behalf of a user. They differ from VPNs or Public Proxies as they operate as simple web proxies rather than at the IP address and other ports level. | High |
SES | Search Engine Robots: These are services that perform crawling or scraping on a website, such as the search engine spider or bot engine. | Low |
Proxy Type | Total IPV4 Address | Total IPV6 Address |
---|---|---|
TOR | 1,706 | 2,127 |
WEB | 3,512 | 4,383 |
PUB | 1,163,988 | 1,169,116 |
SES | 2,117,655 | 85,643,554,786,329,752,408,554,202,988,544 |
VPN | 16,882,418 | 760,804,730,886,728,238,578,594,696,134,656 |
DCH | 707,414,236 | 8,239,517,592,461,122,808,724,379,146,387,456 |
PX1 | PX2-PX9 | PX10 | PX11 | |
---|---|---|---|---|
Virtual Private Network (VPN) | ||||
Tor Exit Nodes (TOR) | ||||
Public Proxies (PUB) | ||||
Web Proxies (WEB) | ||||
Data Center Ranges (DCH) | - | |||
Search Engine Bots (SES) | - | |||
Residential Proxies (RES) | - | - | ||
Enterprise Private Network (EPN) | - | - | - | |
Consumer Private Network (CPN) | - | - | - |
License Agreement: General Terms and Conditions for the database licensing.
Server License: Comparison of Standard License, Site License and Redistribution License.
IP2Location™ and IP2Proxy™ are registered trademarks of HEXASOFT. All other trademarks are the properties of their respective owners.
IP2Proxy VPN detection has been tested and verified by 3rd party security vendor for its accuracy. Please contact us if you are interested in the evaluation report.