samedi 7 septembre 2019

Detect VPN Online php proxy api

Detect a VPN with a dedicated API? It is possible. With IPWarner, find out who is hiding a proxy or dedicated server under a VPN very easily. The API allows you to retrieve details on an IP, with an IP Lookup system. Millions of IP addresses are stored in the API database. This allows you to detect fraud or block bots, malicious players without any effort. Examples of API integration in PHP and Java are available now. It is possible to test the API online from the panel.

The prices are affordable and the vpn detection api is powerful and efficient, the best on the market.

samedi 31 août 2019

VPN API articles

There are some VPN articles;area=forumprofile;u=274655

mercredi 28 août 2019

Detect VPN api Proxy and IP lookup IP

Detect VPN API

A webmaster or a app developer can detect vpn api proxy easily with IPWarner, which offers a ton of features for it.

Can we know if you are using a VPN?
The answer is yes.
It is relatively simple and not very complicated.

When you connect to a VPN server, you usually use a dedicated server.
This server is located in a data center.
Indeed, VPN service providers purchase servers from around the world to provide connections to various geographical locations.
The aim is to be as close as possible to customers. The closer the connection is, the faster the response times will be and the better the proposed VPN connection will be.

However, there is an IP address database, searchable by the whois service.
The latter offers a lot of information on the origin of the IP address and in particular to which internet provider, datacenter (data centre) it belongs.
Thus, it is relatively simple to know if the IP address belongs to an ISP and is therefore a residential or datacenter IP.
In the latter case, there is therefore a good chance that it is an IP of a VPN or Proxy service.
As a result, some Internet services prohibit VPN connections, such as netflix.

VPN and WebRTC: IP address leaks
Problems in using VPN
Since VPNs use host servers without residential IP, some Internet services may block them.
VPN connections pose two problems:

You don't know if you're dealing with a human or a bot, although there are other methods to find out, which can be bypassed depending on the sophistication of the bot. A residential connection has a high chance of belonging to an Internet user and very little to a bot, except in the case of an infected PC => botnet. The use of a VPN can lead to captcha validations.
The VPN connection breaks the geolocation: A Frenchman who uses a VPN server in Sweden, may have Swedish ads, but the advertiser wants to reach Swedes and not a Frenchman.
There is even a botnet using servers trying to pretend to be Internet users: Methbot frauds are worth $3 million a day.

Can we get the real IP behind a VPN?
In theory the answer is supposed to be no, especially when you surf, your WEB browser is supposed to exit through the VPN and the WEB server only see the IP address of the VPN.
In short, it is this principle that is used to hide the real IP address, that of your Internet connection.
On Google Chrome, the address chrome://webrtc-internals/ allows you to view WebRTC connections or block with a antivpn plugin spigot

VPN and WebRTC: IP address leaks
Depending on how the WEB browser processes certain codes or how certain services work.
This is the case, for example, of WebRTC and STUN:

WebRTC: a new system, still in development, that allows two WEB browsers to be connected in real time, via a server.
STUN: a protocol that allows a UDP client passing through NAT (which any router/box does) to reveal its true IP address
uBlock also protects against WebRTC leaks and does the job well.
VPN and WebRTC: IP address leaks
WebRTC is under development but already available on Mozilla Firefox and Google Chrome.
The recovery of the real IP behind a VPN connection is presented as a flaw... but not necessarily integrated as... because it can perhaps fix some... for the controversial side, read this news: WebRTC, VPN and IP address: when a one-year-old "flaw" comes up again

WebRTC extensions and leak protections
The current protections consist in disabling WebRTC either directly in the WEB browser or by using additional extensions.

Mozilla Firefox
Mozilla Firefox allows you to disable WebRTC but this can cause problems for some websites.
We may then try to filter it with extensions and allow certain sites.
Here is the procedure for Mozilla Firefox.

Open a tab at about:config and ignore the warning
In the search, enter media.navigator.enabled
Double-click on the result media.navigator.enabled and set it to False.
VPN and WebRTC: IP address leaks
uBlock protects against IP disclosure from VPNs, through protection against IP leakage via WebRTC.
This is done from the uBlock settings.
For more information, go to the page: uBlock: filtering / blocking ads and content

VPN and WebRTC: IP address leaks
WebRTC Network Limiter
On Google Chrome: Install the WebRTC Network Limiter extension
Configure the WebRTC Network limit extension as in the screenshot below
VPN and WebRTC: IP address leaks
A new ipleak test should give this:

VPN and WebRTC: IP address leaks
Test the recovery of a VPN's IP address
The following site allows you to test WebRTC leaks and it does the job well:
Below, Mozilla Firefox is connected to the VPN and the site manages to retrieve the real IP address.
This site is one of the most effective for testing IP address leaks by WebRTC.

VPN and WebRTC: IP address leaks
IP8 is another website that allows you to test WebRTC leaks.
We have tested it and it does the job well.

VPN and WebRTC: IP address leaks
The following page allows you to test your web browser and WebRTC leaks:
However, it does not seem to do the job because it is not able to get the real IP address.
At the top is the IP address retrieved by WebRTC and below that sent "classically" in PHP by your web browser.

VPN and WebRTC: IP address leaks
IP address leaks on VPNs in video
This video article with the demonstration that you can retrieve an IP address through a VPN via WebRTC: