The IP address proxy detection database includes information on open proxies, Tor exit nodes, VPNs, hosting providers & data centers, residential proxies, botnets and other undesirable shared connections with a high probability of engaging in malicious activities. The database is updated every 24 hours with the latest available IP data.
There are a number of different ways to identify proxy connections, the most obvious being looking at port usage (particularly ports that are commonly opened on proxies such as port 22). However, this is not foolproof and can be circumvented by sophisticated attackers. A more accurate way is to look at other datasets associated with the IP, such as risk scoring, identity verification or behavior analysis to judge whether or not a connection is likely to be a proxy.
Staying One Step Ahead: How IP Address Proxy Detection Databases Enhance Online Security”
Another way to identify a proxy is by examining the HTTP headers. This can reveal a lot of useful information, such as the use of a specific browser version or OS which may indicate that the user is using a proxy or other device to access content.
Akamai uses a combination of these and other methods to detect proxy connections. By combining proxy detection with other techniques, we can ensure that our users are protected against fraudsters and other cybercriminals. This helps our customers reduce their risk and improve compliance.