Using IP Intelligence in the ongoing battle for cyber security

Image of padlock against circuit board/cybersecurity background
(Image credit: Future)

Rapid surges in digital activity made 2020 a record-breaking year on multiple fronts. Internet use reached unprecedented levels — climbing to four hours per day amid the early Covid-19 outbreak — while global online shopping grew at the fastest rate since 2008. At the same time, cybercriminals were busier than ever, with UK threats up by 20 percent against 2019. 

On average, each business faced 690,000 attempted cyber-attacks last year: equivalent to one every 46 seconds. Given the significant damage breaches can inflict on company finances, data security, and reputation, this sudden spike is concerning, but it’s especially troubling when rising digital dependence is added to the picture. With embracing online tools and offerings becoming increasingly important to organizational success, criminal interest is only going to keep soaring; as will the impact of illegal infiltration, ransomware, and network takeovers. In fact, the worldwide cost of cybercrime is predicted to hit $10.5 trillion annually by 2025.

What makes bad actors so hard to tackle?

For cybercriminals, applying camouflaging techniques that mask their location has become the standard means of ensuring anonymity, with proxies often a popular choice. Using tools such as anonymizers, virtual private networks (VPNs) and Tor services, online offenders make themselves harder to trace by hiding behind the IP address of a proxy server. 

It therefore might seem as though the most obvious step for companies striving to bolster their digital security is blocking traffic coming from proxies. This approach, however, is too blunt for the modern web. Thanks to greater availability of affordable IP re-direct options, proxies and particularly VPNs were gaining wider traction pre-pandemic, used by 25 percent of the online population globally as far back as 2018. Following the transition to digital-first living, adoption has accelerated apace.

Studies show the VPN market is due to expand by just under 30 percent in 2021 as users turn to proxies for a range of purposes beyond crime. At the top of the list is protecting online privacy, but these tools are also playing a key role in other areas, including remote working. For organizations of all shapes and sizes, enabling secure connection from home remains important in the ever-changing current climate and VPNs frequently offer vital support. See, for instance, Microsoft’s corporate VPN, which provides access for up to 55,000 employees in varying regions and locations daily.

What does that mean for proxy blocks? 

The bottom line is that proxies don’t automatically indicate illegal or harmful intentions. By classing any VPN user as a definite risk, organizations are likely to end up with high numbers of false positives; where legitimate users are mistakenly labeled threats and barred from networks. As well as locking out large swathes of their out-of-office workforce, doing so could mean firms cut off customers from accessing online services.

Instead, businesses must improve their ability to analyze users on a case-by-case basis and determine whether a specific case of proxy use should send alarm bells ringing or not. Equally, it will also be crucial to shore up defenses against bad actors by spotting and stopping suspicious traffic before criminals have the chance to launch attacks, in addition to guarding against delays that impede operational efficiency and drive customer frustration. 

Although this sounds like a challenging task, one relatively straightforward answer lies with homing in on how — and specifically where — users connect. By diving deeper into location data, organizations can unlock valuable insights that help unmask the real criminals.

The location holds the key to successful navigation 

Put simply, tackling the many nuances of cybercrime calls for nuanced evaluation. Rather than immediately assuming proxies mean danger, companies need the capacity to assess users, pinpoint signs of dubious activity, and conduct a robust assessment, at speed. A core part of that is establishing how proxies are being used, and this is where location comes in. 

IP intelligence can provide a detailed yet non-personally identifiable view of users that goes right down to postcode level. By analyzing IP entry and exit nodes — where users appear to be connecting from and logging off — and tapping reliable, high-quality location data, companies can obtain an array of useful information for detecting criminals at work, whether they’re aiming to carry out payment fraud, penetration attacks, DDOS attacks or an account takeover.

For example, traffic stemming from unexpected regions can be an instant red flag, such as UK-based teams connecting from other countries. Meanwhile, in-depth analysis of velocity patterns can also highlight infeasible and unrealistic jumps in location, including users swapping between geographically distant areas in a single session. By running continuous measurement of incoming IP intelligence, companies can generate an ongoing flow of insight that paves the way for real-time action and helps them guide smarter decisions. 

In practical terms, that could include a mixed defensive strategy built around specific risk levels and event-based rules. Detection of some proxies known to be used by criminals might trigger immediate blocks to prevent serious threats, with less obviously harmful traffic marked for verification, such as an SMS message or email. As well as avoiding unnecessary friction, implementing these multifaceted mechanisms will demonstrate a commitment to maximizing online safety and delivering consistently positive experiences for genuine users.

By recognizing the intricacies of proxy use and harnessing the insights afforded by granular IP intelligence, companies can achieve an all-inclusive perspective of individual connections that will enable robust but not over-zealous defenses.

Andy Ashley, International Marketing Director, Digital Element

Andy Ashley, International Marketing Director, Digital Element.

Read more
A digital representation of a lock
Exploits on the rise: How defenders can combat sophisticated threat actors
An image of network security icons for a network encircling a digital blue earth.
Why effective cybersecurity is a team effort
Security
Protect your network with an AI-secure browser and SASE framework
VPN encryption explained in infographic
Secure Web Gateway vs VPN vs Proxy vs CASB: What's the difference?
Abstract image of cyber security in action.
It’s time to catch up with cyber attackers
Best email services: image of email with one unread message alert
Over 400 million unwanted and malicious emails were received by businesses in 2024
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in Features
Saily eSIM by Nord Security
"Much more than just an eSIM service" - I spoke to the CEO of Saily about the future of travel and its impact on secure eSIM technology
A collage image showing images from the TV shows The White Lotus on Max, Black Mirror on Netflix and The Handmaid's Tale on Hulu.
I'm pausing my Prime Video, Apple TV+ and Paramount+ subscriptions in April 2025 – here are the 3 streaming services I'm keeping instead
Gemini on a smartphone.
Gemini is pulling ahead of ChatGPT – combining Deep Research with Audio Overviews is one of the best uses of AI I’ve seen so far
The Rookie
The Rookie is Hulu's #1 show – here are 3 police procedural dramas with over 80% on Rotten Tomatoes to watch next
Grok Image Edits
I tried Grok’s new AI image editing features – they’re fun but won’t replace Photoshop any time soon
Intel Core Ultra PCs
“No matter who you are, what you do, what form factor you choose” - how Intel is bringing AI advantage and unrivaled security to every industry and ecosystem