When working with IP-fraud detection, it’s hard to ignore the role of Scamalytics (and its various misspellings like scamalitycs, scamanalytics, scamlytics, scammalytics) in delivering IP-level insights. The goal here: how to effectively use Scamalytics IP (or “Scamalytics IP Lookup”) in your fraud-prevention stack, step by step, with all relevant details you need.
1. What the Scamalytics IP Check Provides
1.1 Core metrics: Score, Risk, Proxy flags
When you input an IP address into Scamalytics, you receive:
- A fraud score (0–100) representing the risk level for that IP.
- A risk label (for example “low”, “medium”, “high”) associated with that score.
- Additional details: country, operator/ISP, whether the IP is flagged as a proxy, VPN or TOR exit node.
1.2 Data sources & scope
- Scamalytics states it uses its “fraud-detection network” with visibility into many millions of web connections.
- Important caveat: its view is limited to “web connections made by internet users to websites and applications, not other connections such as server-to-server”.
- Free tier and paid API/bulk tiers available.
1.3 Why this matters for an IP
Understanding an IP’s reputation matters because:
- Many fraud attacks originate from anonymised IPs, VPNs, proxy networks, data centres.
- A high-risk IP might signal possible account takeover, bot registration, fake sign-up, or payment fraud.
- Using the scoring lets you automate decisioning (blocking, challenge, manual review) at the IP layer.
2. Step-by-Step: Using Scamalytics IP Lookup in Practice
Scamalytics IP, here you’ll find a practical workflow: from lookup to decision-making, including how to integrate it into your product stack.
2.1 Step 1: Initial one-off lookup
- Navigate to Scamalytics’ IP address fraud check page, enter the IP you want to inspect.
- Review the score and risk label. Example: an IP might have score = 86/100 and show metadata indicating “proxy / anonymiser / hosting provider” flagged.
- Check the supporting details: country mismatch (if user claims one country but IP shows another), ISP/ASN type (residential vs data-centre), proxy/tor flags.
2.2 Step 2: Define thresholds and actions
In your system, decide thresholds for the score and associated actions. Example table:
| Fraud Score Range | Risk Label | Recommended Action |
| 0–20 | Very Low | Allow with minimal friction |
| 21–50 | Low | Allow (monitor) |
| 51–75 | Medium | Challenge (CAPTCHA, manual review) |
| 76–100 | High | Block or require manual review |
Note: You’ll adjust these thresholds based on business model, risk appetite. For example, a financial services product might use 50+ as block-threshold.
2.3 Step 3: Integrate via API / Bulk
- Scamalytics offers an API / Bulk IP Lookup plan.
Typical implementation: at signup/login/transaction stage, you send IP address to API, get JSON response like:
{
“ip”: “8.8.8.8”,
“score”: “0”,
“risk”: “low”
}
“` :contentReference[oaicite:10]{index=10}
- For bulk lists (e.g., nightly scans of IP logs) you can ingest many IPs and cross-reference via Scamalytics in bulk mode. Use when you want to clean historical data or identify risky traffic patterns.
2.4 Step 4: Combine with other signals
The lookup alone isn’t sufficient. You should use it as one input among many:
- Device fingerprinting (browser, OS, device ID)
- Behavioural signals (velocity of actions, unusual patterns)
- Payment/transaction history
- Email/IP associations
- Geolocation checks (mismatch country vs billing)
This aligns with common guidance: IP fraud scoring is powerful but not standalone.
2.5 Step 5: Monitor and adjust
- Track the performance of your thresholds: e.g., how many false positives/negatives.
- Analyse high-risk ISPs or subnets flagged by Scamalytics (they publish lists of high-risk ISPs for specific industries).
- Re-evaluate thresholds if you see blocking too many valid users or letting through risky traffic.
- Ensure you handle appeals/refunds gracefully (especially if a legitimate user gets blocked because of a shared IP).
3. Understanding the Score: What Drives the “Scamalytics IP” Score
3.1 Key signal categories
From public documentation and adjacent resources we can identify the main signal types that drive an IP-fraud score:
- Proxy / VPN / TOR detection – Is the IP known to be a proxy or exit node? This adds risk.
- ISP / ASN type – Data-centre IPs, hosting providers, or ISPs with many flagged connections tend to get higher risk. Residential ISPs with clean history score lower.
- Geolocation mismatches or unusual region – If the IP geolocation is in a country with high fraud incidence vs user claims or billing info.
- Historical abuse / blacklist hits – If that IP (or subnet) appears in known fraud or abuse lists.
- Behavioural / velocity context – While internal to provider, IPs used rapidly or repeatedly for suspicious actions get flagged.
3.2 Score interpretation & limitations
- A higher score (closer to 100) = higher risk. Lower = lower risk.
- But: an IP with score 80 doesn’t automatically mean “fraudster”—just higher risk. Context matters.
- Shared/dynamic IPs present challenges: e.g., many users share the same NAT IP from mobile networks; thus blocking purely on score may cause false positives. As one expert put it:
“The biggest issue is the ‘shared IP problem’. … If one person does something bad and that IP gets a high-risk score, should you block everyone else who uses it?”
- Scamalytics themselves warn their view is limited to the web sessions they observe (not server-to-server).
Thus: treat the score as one signal, not an absolute verdict.
3.3 Example: high-risk list sample
As published on their site, here’s part of the high-risk IP list:
189.4.111.241 → Score 100 → ISP: Claro NXT Telecomunicacoes Ltda
189.102.34.224 → Score 100 → ISP: Claro NXT Telecomunicacoes Ltda
…
Table summarising typical inputs:
| Signal Type | Example | Impact on Score |
| Proxy / VPN flagged | Yes | +20-40 points |
| Hosting-ISP data centre | Yes | +10-30 points |
| IP in high-fraud region | Yes | +5-15 points |
| Clean residential ISP | Yes | −10-20 points (lower risk) |
Note: exact weighting proprietary to Scamalytics.
4. Implementation Tips & Best Practices
4.1 Tips for onboarding
- Start with monitoring mode: log the scores for incoming IPs, don’t block immediately. See score distribution.
- Create dashboards to visualise scores vs conversions, false-blocks, etc.
- Select initial threshold conservatively (e.g., block only score > 90) and gradually refine.
4.2 False positives / shared IP caution
- Avoid hard blocks on all high-score IPs without context. Example: many mobile carriers use NAT/shared IPs; one user’s fraud might elevate risk for many.
- Use challenge flows (CAPTCHA, 2FA) rather than outright blocking.
- Include appeal process or review for users who get flagged incorrectly.
4.3 Bulk look-ups / historical audit
- Use bulk mode to scan historical user creation logs, login logs, transaction logs to identify high-risk IPs you allowed earlier and may still be active.
- Prioritise high-score IPs for review or tighter monitoring.
4.4 Integration architecture considerations
- Make the IP lookup call synchronous in your onboarding or transaction workflow—score must be retrieved in real-time if you act on it.
- Cache lookups per IP for some time (e.g., 24 h) to reduce repeated API calls and cost.
- Store the score, risk label and metadata in your internal system for audit and debugging.
- Add logic to treat same IP used by multiple accounts (multi-accounting risk) or by device fingerprinting.
4.5 Ongoing tuning
- Review blocked users who appeal and compute false positive rates.
- For segments (e.g., premium users), you might tolerate higher risk or use additional checks.
- For high-sensitivity flows (finance, gambling, high-value transactions) use stricter thresholds.
- Combine the score with other signals (behaviour, payment, device) in a weighted decision engine.
5. Frequently Asked Questions (Problem-Solving)
Q1: My user claims legitimate usage but their IP shows high risk (score > 80). What should I do?
Solution: Don’t block automatically. Instead:
- Trigger challenge step (e.g., send verification email/SMS, ask for photo ID).
- Check if user behaviour matches normal patterns for your service (device, billing address, order history).
- Investigate whether IP is shared (residential NAT) or mobile network. If necessary, escalate to manual review.
- Log the case: if many users from same IP legitimate then consider lowering threshold or whitelist that IP.
Q2: I’m getting high scores on mobile carrier IPs and my conversion rate drops. How to adjust?
Solution:
- Recognise mobile carriers often use shared NAT addresses; treat them differently: allow challenge rather than block.
- Consider lowering threshold for mobile segments, or create a specific whitelist if behaviour is trusted.
- Use additional verification instead of blocking: e.g., device fingerprint, payment history, SMS check.
Q3: We blocked an IP with score = 95 and user complains they’re legit—what could be wrong?
Solution:
- Investigate if the IP is part of a NAT/shared network or data centre block. For example, if your user is in an office network or coworking with many users, the IP may inherit risk.
- Check log history: did the IP have many accounts created, many failed logins?
- Use analytics: how many legitimate users from that IP? If high, consider whitelisting or reducing its weight.
- Offer an appeal process: manual verification, then override block if user passes checks.
Q4: How often should I re-evaluate an IP’s score?
Solution:
- For each new session/sign-up/transaction, you can fetch fresh score if budget allows. If cost is an issue, cache the score for 24 h or until you detect a change (e.g., same IP used by 5 new accounts).
- For historical data/monitoring, run weekly or monthly bulk scans of your logs to catch newly-flagged IPs.
- If your threshold changes (you become more or less strict), re-evaluate past decisions and track impact.
Q5: Can I fully rely on Scamalytics IP Lookup alone for fraud prevention?
Solution:
- No—while it’s a strong tool, it is only one signal. Combine with behavioural data, device fingerprinting, payment history, email/IP match, velocity rules, etc.
- Use the score as an input to your decision-engine, not as the sole blocker.
- Regular