How to Block TOR Users
  • January 4, 2024

How to Block TOR Users

The TOR network ("The Onion Router"), is a anonymization network that enables anonymous web access. While often used for legitimate privacy reasons, it is also used by many malicious actors that exploit TOR's anonymity for harmful activities. Read more »

VPN Detection for Online Casinos and iGaming Platforms
  • January 3, 2024

VPN Detection for Online Casinos and iGaming Platforms

VPN detection mechanisms is crucial for iGaming and online casinos to prevent violations of geolocation regulations. So, how can iGaming platforms and Online Casinos technically identify VPN IP addresses? Read more »

Combat Affiliate Fraud with Proxy and VPN Detection
  • January 2, 2024

Combat Affiliate Fraud with Proxy and VPN Detection

The rise of affiliate fraud poses a significant challenge to companies aiming to maintain the efficiency of their marketing efforts. One powerful tool that can be employed to counteract this threat is the Focsec Threat Detection API. Focsec detects VPNs. Read more »

Identifying VPN and Proxy IPs to Combat Click Fraud
  • September 26, 2023

Identifying VPN and Proxy IPs to Combat Click Fraud

Click fraud is often commited using Virtual Private Networks (VPNs), proxy servers and bot farms. By identifying and blocking IP addresses associated with VPNs or proxies, advertisers can significantly reduce their vulnerability to click fraud. Read more »

Protecting Online Multiplayer Games with VPN and Proxy Detection
  • May 31, 2023

Protecting Online Multiplayer Games with VPN and Proxy Detection

Maintaining the integrity of gaming platforms, ensuring fair gameplay and keeping out abusive players is complex challange. Read more »

Multiple Accounts Abuse: Strategies to Protect Your Business and Profits
  • March 31, 2023

Multiple Accounts Abuse: Strategies to Protect Your Business and Profits

Free trial periods are a marketing tool to attract potential customers. While these trial periods are effective in drawing in new users and showcasing a company's products or services, they also come with the risk of abuse. Read more »

Detecting VPNs and Proxies: An Essential Step in KYC and AML Processes
  • March 30, 2023

Detecting VPNs and Proxies: An Essential Step in KYC and AML Processes

The significance of detecting VPNs and proxies, and how it contributes to the overall effectiveness of KYC and AML measures. Read more »

Detecting VPNs through Latency Measurements: An In-Depth Analysis
  • March 10, 2023

Detecting VPNs through Latency Measurements: An In-Depth Analysis

One method of VPN detection is by measuring latency. In this blog post, we'll delve into the intricacies of latency and explore how it can be used to detect VPNs. Read more »

How To Prevent Geo Pricing Abuse
  • January 2, 2023

How To Prevent Geo Pricing Abuse

Geo pricing can be abused by customers looking to take advantage of different prices. Learn how to prevent abuse and determine a users real location. Read more »

How To Detect Proxy Users
  • December 23, 2022

How To Detect Proxy Users

There are a few different ways that you can go about detecting proxy usage, and in this blog post, we'll explore some of the most common methods. Read more »

How To Detect TOR Traffic
  • December 21, 2022

How To Detect TOR Traffic

How can you detect TOR users and traffic coming from the TOR network? We will look at two methods of detecting TOR users and explain their advantages and disadvantages. Read more »