What Your IP Address Reveals

Everything an IP address can tell about a connection -- and the layers of enrichment behind it.

What is IP enrichment?

Every device connected to the internet has an IP address. On its own, an IP address is just a number. But by cross-referencing it against multiple data sources, you can extract a surprising amount of information: geographic location, internet service provider, whether it belongs to a cloud provider, whether it is a known VPN exit node, and whether it appears on threat intelligence lists.

This process is called IP enrichment: taking a raw IP address and annotating it with contextual metadata from geolocation databases, WHOIS registries, ASN data, and curated threat feeds.

What an IP address reveals

Geolocation

GeoIP databases map IP address ranges to approximate physical locations. The accuracy varies: country-level is reliable (95%+ accuracy), city-level is less so (50-80% depending on the region), and anything more granular than city is unreliable. IP geolocation works by correlating address allocations from Regional Internet Registries (ARIN, RIPE, APNIC, etc.) with ground-truth data from ISPs and measurement networks.

Geolocation data includes: country, region/state, city, approximate coordinates, time zone, and postal code. It also indicates whether the IP is in the European Union, which is relevant for GDPR compliance decisions.

Network and ISP

Every public IP belongs to an Autonomous System (AS), identified by an ASN (Autonomous System Number). The AS is operated by an organization -- typically an ISP, hosting provider, enterprise, or content delivery network. Looking up the ASN gives you the operator's name, the network prefix the IP belongs to, and the type of network (transit, access, content, etc.).

This reveals whether an IP belongs to a residential broadband provider, a mobile carrier, a datacenter, or a cloud platform. The distinction matters for fraud detection, access control, and traffic analysis.

Cloud provider detection

Major cloud providers (AWS, Google Cloud, Azure, Cloudflare, and others) publish their IP ranges as machine-readable files. By matching an IP against these published CIDR lists, you can determine not just that an IP is a cloud address, but which provider and sometimes which region or service it belongs to. This is useful for identifying automated traffic, API consumers, and infrastructure-hosted bots.

VPN and proxy detection

VPN detection combines multiple signals. Community-maintained lists of known VPN provider IP ranges provide direct matches. ASN heuristic analysis identifies ISP names associated with VPN services. Tor exit node lists are published by the Tor Project. Together, these signals identify traffic that is being routed through privacy infrastructure, which is important context for authentication systems and abuse prevention.

Threat intelligence

IP addresses appear on threat intelligence feeds for specific reasons:

Reverse DNS

A PTR record lookup reveals the reverse DNS hostname associated with an IP. This often encodes the ISP's naming convention (e.g., cpe-198-51-100-42.socal.res.example.com) and can indicate whether the IP is residential, business, or infrastructure. Not all IPs have PTR records, and they are set by the IP block owner rather than verified, so they are suggestive rather than authoritative.

Why it matters

IP enrichment is used across security, operations, and product development:

Limitations

IP enrichment is probabilistic, not deterministic. GeoIP databases have accuracy margins. VPN detection has false positives (shared hosting on a VPN provider's ASN) and false negatives (private VPN servers). Threat lists have latency -- an IP may be delisted days after the threat is mitigated, or may not appear until days after it starts attacking. CGNAT (Carrier-Grade NAT) means thousands of users may share a single public IP, making per-IP decisions unreliable for mobile and some residential ISPs.

Enrichment data should inform decisions, not make them unilaterally. Use it as one signal among many.

How to check

The fastest way to see what your IP reveals is to query an enrichment API. A single lookup returns geolocation, ASN, network classification, cloud provider identification, VPN/Tor/proxy status, and threat intelligence matches -- all derived from the layered data sources described above.

See what your IP reveals

Returns geolocation, ASN, network type, cloud provider, VPN/proxy status, and threat intelligence.