blog.maxmind.com/2015/01/proxy-detection-why-fraudsters-give-proxies-a-bad-name

Preview meta tags from the blog.maxmind.com website.

Linked Hostnames

9

Search Engine Appearance

Google

https://blog.maxmind.com/2015/01/proxy-detection-why-fraudsters-give-proxies-a-bad-name

Proxy Detection - Why Fraudsters Give Proxies a Bad Name

When it comes to fraud detection, finding proxies is a big topic. But why? Fraud detection begins with thinking intelligently about the IP address associated with a transaction. Where is that IP address, and how does that location relate to other transaction data? Whereas most IP addresses inspire confidence, those associated with a proxy generate suspicion. Let’s take a closer look at proxy detection. As its name suggests, a proxy acts as an intermediary, passing requests from one computer to other servers. But although there are legitimate uses of proxies, fraudsters find it useful to take advantage of one of its characteristics; accessing the Internet through a proxy makes it more difficult to locate a user by means of an IP address. This enables some to use anonymizing proxies to access content from which they would otherwise be blocked. Others use open proxies to hide their whereabouts and thereby circumvent fraud detection rules associated with location.



Bing

Proxy Detection - Why Fraudsters Give Proxies a Bad Name

https://blog.maxmind.com/2015/01/proxy-detection-why-fraudsters-give-proxies-a-bad-name

When it comes to fraud detection, finding proxies is a big topic. But why? Fraud detection begins with thinking intelligently about the IP address associated with a transaction. Where is that IP address, and how does that location relate to other transaction data? Whereas most IP addresses inspire confidence, those associated with a proxy generate suspicion. Let’s take a closer look at proxy detection. As its name suggests, a proxy acts as an intermediary, passing requests from one computer to other servers. But although there are legitimate uses of proxies, fraudsters find it useful to take advantage of one of its characteristics; accessing the Internet through a proxy makes it more difficult to locate a user by means of an IP address. This enables some to use anonymizing proxies to access content from which they would otherwise be blocked. Others use open proxies to hide their whereabouts and thereby circumvent fraud detection rules associated with location.



DuckDuckGo

https://blog.maxmind.com/2015/01/proxy-detection-why-fraudsters-give-proxies-a-bad-name

Proxy Detection - Why Fraudsters Give Proxies a Bad Name

When it comes to fraud detection, finding proxies is a big topic. But why? Fraud detection begins with thinking intelligently about the IP address associated with a transaction. Where is that IP address, and how does that location relate to other transaction data? Whereas most IP addresses inspire confidence, those associated with a proxy generate suspicion. Let’s take a closer look at proxy detection. As its name suggests, a proxy acts as an intermediary, passing requests from one computer to other servers. But although there are legitimate uses of proxies, fraudsters find it useful to take advantage of one of its characteristics; accessing the Internet through a proxy makes it more difficult to locate a user by means of an IP address. This enables some to use anonymizing proxies to access content from which they would otherwise be blocked. Others use open proxies to hide their whereabouts and thereby circumvent fraud detection rules associated with location.

  • General Meta Tags

    6
    • title
      Proxy Detection - Why Fraudsters Give Proxies a Bad Name
    • charset
      utf-8
    • viewport
      width=device-width,initial-scale=1
    • article:section
      2015
    • article:published_time
      2015-01-23T00:00:00+00:00
  • Open Graph Meta Tags

    6
    • og:url
      https://blog.maxmind.com/2015/01/proxy-detection-why-fraudsters-give-proxies-a-bad-name/
    • og:site_name
      MaxMind
    • og:title
      Proxy Detection - Why Fraudsters Give Proxies a Bad Name
    • og:description
      When it comes to fraud detection, finding proxies is a big topic. But why? Fraud detection begins with thinking intelligently about the IP address associated with a transaction. Where is that IP address, and how does that location relate to other transaction data? Whereas most IP addresses inspire confidence, those associated with a proxy generate suspicion. Let’s take a closer look at proxy detection. As its name suggests, a proxy acts as an intermediary, passing requests from one computer to other servers. But although there are legitimate uses of proxies, fraudsters find it useful to take advantage of one of its characteristics; accessing the Internet through a proxy makes it more difficult to locate a user by means of an IP address. This enables some to use anonymizing proxies to access content from which they would otherwise be blocked. Others use open proxies to hide their whereabouts and thereby circumvent fraud detection rules associated with location.
    • US country flagog:locale
      en_us
  • Link Tags

    4
    • alternate
      https://blog.maxmind.com/feed.xml
    • preconnect
      https://fonts.gstatic.com
    • stylesheet
      /scss/index.css
    • stylesheet
      https://fonts.googleapis.com/css2?family=Montserrat:wght@500;600;700&family=Source+Code+Pro:wght@700&display=swap

Links

39