Check My IP Address

IP Address -
IP Type -
Country/Region -
Native IP -
State/Province -
City -
Latitude/Longitude -
Time Zone -
ASN Number -
ASN Organization -
ASN Description -
ASN Score -
ISP Provider -
ISP Type -
Domain -
Network Type -
Proxy Type -
Is Proxy -
Is VPN -
Is Tor -
Is Data Center -
Is Abuser -
Company Name -
Company Score -
Abuse Email -
Abuse Phone -

Tool Introduction

This tool helps you quickly look up detailed information about any IP address, including geolocation, ISP, proxy/VPN status, ASN info, abuse contacts, and more. Supports real-time proxy type and security attribute detection, making it a great assistant for network security, IP management, risk control, and other scenarios.

How to Use

  • Enter the IP address you want to check in the input box above (e.g. 123.45.67.89) and click "Check".
  • The system will automatically identify the IP's organization, type, location, proxy attributes, etc., and display the details in the table below.
  • If you need bulk/automated queries, please refer to the "API Usage Guide" on the right.

All Fields Detailed Explanation

IP Address:
The target IP address being checked. Supports IPv4 (e.g. 123.45.67.89) and IPv6 (e.g. 2001:0db8::1). Each IP is a unique number for an internet device, widely used for traceability, attack defense, log auditing, access restriction, and more.
IP Type:
Specifies whether the IP is public (Internet accessible), private (LAN, e.g. 192.168.x.x, 10.x.x.x), or reserved/documentation/loopback types. Public IPs can directly access the global internet, while private/reserved IPs are limited to local or test environments.
Country/Region:
The registered country or region of the IP (e.g. China, USA), used for geo-analysis, regional access restrictions, content compliance, and operations statistics. Data is sourced from global authoritative allocation organizations.
Native IP:
Determines if this IP is a "native" address directly allocated by ISPs, carriers, or cloud platforms. Native IPs have clear attribution and easy traceability; non-native are often allocated via tunnels/NAT and may have ambiguous attribution or risk.
State/Province:
Province/state/administrative region under the country. For example, "Guangdong Province", "California". Helps with more granular location, user profiling, content push, etc.
City:
The specific city (e.g. "Beijing", "Shanghai", "New York"). Combined with the region field, can help determine the physical location of the user. Applicable for risk control, operations statistics, user profiling, etc.
Latitude/Longitude:
The geo-coordinates (Lat/Lon) inferred for this IP, often used for visualization, map display, or location analysis. Accuracy varies by IP type and source; some proxies/VPNs may have lower accuracy.
Time Zone:
Standard time zone of the IP location, e.g. "Asia/Shanghai", "America/New_York". Often used for log calibration, localized display, or time-sensitive business logic.
ASN Number:
Autonomous System Number, the unique number assigned to every independent network on the global Internet. Can determine which ISP or organization an IP belongs to (e.g. "Telecom", "Google"), and is crucial for routing management and reputation risk control.
ASN Organization:
The registered organization name represented by this ASN, e.g. "China Telecom", "Amazon Technologies Inc.", etc. ASN organization can directly identify the ISP or company behind the IP.
ASN Description:
Detailed description/introduction of the ASN, usually includes network coverage, usage, registration location, etc. Helps security analysis and attribution.
ASN Score:
The reputation/risk score of the ASN. Higher scores mean safer/more reliable; low scores may indicate risk or abuse history. Widely used in risk control, blacklist filtering, reputation management.
ISP Provider:
The direct internet service provider or cloud platform for this IP. For example, "China Unicom", "China Mobile", "Alibaba Cloud", etc. Used for network attribution, operation, and risk control.
ISP Type:
Type of provider, such as Backbone, Broadband, Mobile, Enterprise, Cloud, IDC (data center), etc. Different types represent different risk and business values.
Domain:
The domain name (PTR record) corresponding to this IP (if any). Some IPs may have no domain or be dynamically assigned. Domain info is often used for security auditing, identity verification, DNS analysis.
Network Type:
Classification of network access, such as Broadband, Mobile, Satellite, IoT, etc. Different network types have major significance for risk control, security, and access stability.
Proxy Type:
The proxy type detected by the system, including SOCKS, HTTP, HTTPS, high anonymity, transparent, VPN, Tor exit, etc. Proxy type directly affects trust and security risk.
Is Proxy:
Detects whether this IP belongs to public proxy pools, anonymous proxies, exit nodes, etc. Common in bots, crawlers, gray traffic, cross-border bypassing, and other risky operations.
Is VPN:
Whether recognized as a VPN node. VPN traffic is often used for privacy but may also be abused. Important for business security and geo-management.
Is Tor:
Whether it is a Tor anonymous network exit. Due to high anonymity, Tor is often used to bypass censorship, hide identity, etc. Many risk control systems list Tor as high risk.
Is Data Center:
Whether this IP is allocated by IDC or cloud server, such as Alibaba Cloud, Tencent Cloud, AWS, Google Cloud, etc. Data center IPs are often used for batch, automated, or crawling services, higher risk level.
Is Abuser:
Whether the system detects that this IP/ASN has history of spam, attacks, malicious scans, blacklist, etc. Provides risk reference for business security.
Company Name:
The company, enterprise, or organization name associated with this IP or ASN. Can help identify and screen partners, consolidate data, etc.
Company Score:
Company or organization's reputation rating, based on historical behavior, market feedback, security blacklists, etc. Higher scores indicate better reputation; low scores warn of potential risk.
Abuse Email/Phone:
Official abuse complaint channel for the IP's carrier/IDC. If this IP is found to be attacking, spamming, or violating regulations, you can report to the management via abuse email or phone; relevant authorities may block or blacklist as needed. An important tool for security emergency response.

转账截图生成 |地址生成器