IP Address Flagging

An order will be flagged for manual review if the IP address details fail one of the following security checks

Written By Sebastian Mellen

Last updated 10 months ago

Why Are Some VPN Users Flagged During Security Checks?

Not all VPNs are treated the same. Our system considers factors like the reputation of the VPN IP, its history of abuse, and how it’s being used. Legitimate users on secure, stable VPNs (like those used for work) typically aren’t flagged. However, VPNs associated with suspicious behavior or known fraudulent activity may trigger a flag to protect against potential risk. It’s not just the use of a VPN—it’s the context in which it’s used that matters.

IP Address Security Checks

Check

Results

Description

Valid IP

Pass/Fail

A standard, trustworthy IP address with no known history of suspicious activity. It typically belongs to a residential or business user and doesn't show signs of being masked or manipulated. Generally considered low risk and unlikely to trigger a flag.

Mobile Network

Yes/No

Mobile IPs are often shared among multiple users and change frequently, which can make it challenging to verify consistent user behavior. These characteristics may result in a flag if the system detects rapid IP shifts or location mismatches.

Robot IP Address

Pass/Fail

These IPs are typically associated with non-human traffic, such as bots or scripts. Security checks may flag them to prevent automated access, scraping, or other forms of suspicious activity.

Data Center IP Address

Yes/No

Datacenter IPs, often associated with cloud or hosting providers, are frequently utilized in automation. While not inherently malicious, access from these IPs may be flagged if it deviates from expected human behavior or appears to originate from a non-consumer environment.

Tor IP

Pass/Fail

IP addresses originating from the Tor network are flagged due to their ability to mask a user’s location and identity. Tor use limits traceability and is commonly associated with attempts to evade detection, prompting higher scrutiny or access denial.

Proxy or VPN IP

Pass/Fail

Proxy and VPN services can hide a user’s actual location and are sometimes used to bypass security checks or location-based restrictions. Known proxy/VPN IPs may be flagged to ensure the integrity of identity verification and fraud prevention processes.