Detecting VPNs, Proxies & Tor: The Hidden Threat in Anonymized Traffic
Jean-Vincent QUILICHINI
When a connection arrives at your application cloaked behind a VPN, a proxy server, or the Tor network, you face an immediate problem: you cannot see who is actually on the other side. For most fraud scenarios, that ambiguity is precisely the point.
Anonymization networks serve legitimate purposes. Journalists protecting sources, activists in repressive regimes, whistleblowers, and privacy-conscious individuals all have valid reasons to mask their true IP address. But these same networks are the infrastructure of choice for credential stuffers, fraudsters, scraper operators, and attackers probing for vulnerabilities.
Understanding how to detect anonymization layers — and how to act on that signal intelligently — is a core capability for any security team managing risk at authentication and transaction boundaries.
The Anonymization Ecosystem
The tools attackers use to mask their identities form a layered ecosystem, each with distinct characteristics and detection challenges.
VPN Services
Commercial VPN services route traffic through geographically distributed endpoints, masking the user's true IP with one from the provider's pool. From an application's perspective, the connection appears to originate from a VPN datacenter rather than the user's ISP.
VPN traffic is relatively straightforward to detect because providers maintain stable, finite IP ranges. Intelligence databases track ASN allocations, IP ownership records, and behavioral patterns associated with known providers. Most commercial VPN services operate from datacenter ASNs that are easily differentiated from residential ISP ranges.
The challenge is that VPN usage is increasingly mainstream for privacy-conscious individuals. Blocking VPN traffic wholesale risks alienating legitimate users who maintain VPN connections for personal security reasons.
Residential Proxies
Residential proxy networks represent a more sophisticated threat. Rather than routing through datacenter infrastructure, these networks use IP addresses assigned by residential ISPs — the same blocks used by ordinary home internet subscribers. Traffic exits from what appears to be a home connection in any city worldwide.
These networks are built by aggregating bandwidth from millions of devices running proxy software, often bundled with free apps or browser extensions that users install without fully understanding what they are enabling. From a detection perspective, residential proxies blend into normal consumer traffic, making them significantly harder to identify.
Datacenter Proxies
Datacenter proxies route through cloud provider infrastructure and dedicated hosting facilities. They are fast, cheap, and highly scalable, making them the dominant tool for high-volume automated attacks like credential stuffing and web scraping.
Detection is relatively reliable: datacenter IP ranges are well-documented. Major providers like AWS, Azure, GCP, DigitalOcean, and Vultr maintain published IP range lists. Third-party intelligence feeds aggregate and expand these lists to include smaller hosting providers and bulletproof hosters.
Tor Exit Nodes
The Tor network routes traffic through multiple volunteer-operated relays before exiting through one of thousands of exit nodes worldwide. The Tor Project publishes a complete and frequently updated list of exit node IP addresses, making detection reliable but imperfect — since the list changes continuously and new nodes are added frequently.
Tor traffic warrants the highest scrutiny in most application contexts. Legitimate account management rarely occurs over Tor, while carding, credential stuffing, and dark web marketplace fraud almost universally do.
Why Attackers Rely on Anonymization
The operational reason for proxy and VPN usage in attacks is simple: IP-based defenses are ubiquitous, and circumventing them requires disguising the true source of traffic.
Rate limiting, account lockout, and geographic blocking all operate on IP address as a key signal. By routing attacks through proxy infrastructure, attackers make each request appear to originate from a different, clean IP address. A credential stuffing bot rotating through a pool of 100,000 residential proxies presents a fundamentally different detection challenge than the same attack from a single source.
Beyond attack evasion, proxy infrastructure allows attackers to simulate geographic presence. Testing stolen credit card credentials against regional services, creating fraudulent accounts that appear to originate from the service's home country, and bypassing geo-based access controls all benefit from precise proxy selection.
How Detection Works
Reliable anonymization detection combines multiple data sources and signals.
IP-to-ASN Analysis
Every IP address belongs to an Autonomous System Number (ASN) — an identifier assigned to organizations that manage routing for a group of IP addresses. ASN data reveals who technically controls a given address block: a residential ISP, a datacenter, a mobile carrier, a VPN provider, or a corporate network.
ASN classification is the foundational layer of proxy detection. Connections from ASNs associated with known VPN providers, datacenter operators, or proxy services immediately trigger elevated risk scoring, regardless of any other signals.
Historical Abuse Patterns
Beyond classification, intelligence feeds track historical behavior: which IP addresses have been observed participating in attacks, submitting spam, conducting fraudulent transactions, or appearing in credential stuffing campaigns. An IP address from a legitimate datacenter ASN that has been repeatedly flagged for abuse carries significantly different risk than a clean residential connection.
Port Scanning and Open Proxy Detection
Open proxy servers expose characteristic ports (3128, 8080, 1080) and respond in predictable ways to probe requests. Active scanning services maintain databases of IPs found to be running proxy software, allowing real-time classification without relying solely on ASN data.
Tor Exit Node Lists
The Tor Project and several third-party services maintain up-to-date lists of active exit node IPs. Cross-referencing incoming connection IPs against these lists provides reliable Tor detection. The primary limitation is list currency — exit nodes change frequently — requiring frequent updates to maintain accuracy.
Behavioral Signals
Beyond IP classification, behavioral analysis provides additional detection capacity. Residential proxy networks produce unusual patterns: connections that cycle rapidly through IPs within the same ASN, sessions that maintain no persistent state (no cookies returned on subsequent requests), and user agents that mismatch the reported device type.
Practical Risk Scoring
Effective anonymization detection does not produce a binary allow/block decision. Instead, it contributes a risk signal that combines with other context to drive appropriate responses.
A connection from a residential proxy IP with no prior abuse history, no anomalous behavioral patterns, and normal session behavior might score as moderate risk — sufficient to require a CAPTCHA challenge but not to block outright. The same IP attempting a login on an account that has never authenticated from proxy infrastructure, immediately following a geographic anomaly, should receive immediate step-up authentication or be blocked.
The key contextual factors that amplify proxy-based risk signals include:
- Transaction value: Payment processing warrants higher scrutiny than read-only content access
- Account age: New accounts authenticating immediately from proxy infrastructure exhibit higher fraud base rates
- Action type: Account creation, password reset, and payment method changes are higher-risk actions regardless of proxy usage
- Velocity: Multiple actions in rapid succession from proxy-origin IPs suggest automation
Implementing Proxy Detection in Your Stack
For teams integrating proxy detection into their authentication or fraud prevention layer, the practical implementation follows a consistent pattern:
At the network edge, evaluate the source IP against real-time threat intelligence feeds before any application code executes. This is where known datacenter and Tor ranges can be handled with minimal latency impact.
At the application layer, augment the network signal with behavioral and session data. A connection from a VPN range that presents persistent session markers (returning cookies, known device fingerprint) warrants different treatment than a fresh proxy connection with no history.
At the decision point, score risk holistically. The ismalicious.com IP intelligence API returns proxy classification, abuse history, and risk score in a single low-latency call, allowing applications to make inline decisions without maintaining local intelligence infrastructure.
Navigating the Privacy Trade-off
Any discussion of proxy detection must acknowledge the legitimate use cases for anonymized browsing. Blocking all proxy, VPN, and Tor traffic eliminates privacy-conscious users, activists, and individuals in regions with network restrictions.
The appropriate response depends on application context. For high-risk financial transactions, blocking Tor traffic is a reasonable and widely accepted baseline. For general web applications, treating proxy traffic as elevated risk requiring additional verification — rather than an automatic block — preserves access while raising the bar for fraud.
Communicating clearly when access is blocked ("We detected an anonymizing proxy. Please connect directly or contact support.") helps distinguish security controls from arbitrary discrimination and reduces friction for legitimate edge cases.
Conclusion
Anonymized traffic is not inherently malicious, but it is significantly over-represented in fraud, account takeover, scraping, and abuse scenarios relative to its share of legitimate traffic. For most transaction-bearing applications, treating proxy and VPN connections with elevated scrutiny is a proportionate and evidence-based security posture.
The combination of IP classification, historical abuse data, and behavioral signals provides a reliable foundation for risk scoring. Applied as part of a layered defense — feeding into step-up authentication, challenge responses, or enhanced monitoring rather than blunt blocks — proxy detection meaningfully reduces attack surface while preserving access for legitimate edge cases.
Protect Your Infrastructure
Check any IP or domain against our threat intelligence database with 500M+ records.
Try the IP / Domain Checker