Skip to main content
When the Proxy & VPN Detection option is activated, you can view related details for each submission. This preemptively blocks submissions through specific IP ranges or private networks where forgery/alteration frequently occurs.
How to ActivateActivate the ‘Proxy & VPN Detection’ option in the Project Management > Policy and Authentication > Authentication Enhancement and Forgery Prevention menu.
Pre-verification list screen

Viewable Information

ItemDescription
Submission TimeTime of submission attempt
Email AddressSubmitter’s email
Request IDUnique request identifier
Detection TypeProxy, VPN, TOR, etc.
Request IPIP of submission attempt
Risk ScoreIP-based risk score
Service AttemptWhether service access was attempted
CountryIP-based country information
Connection TypeConnection method
Final StatusBlock/Allow result
The VPN & Proxy page is read-only and cannot be modified, unlike the detail page of the submission list.

Benefits of Proxy & VPN Detection

Enhanced Security

Preemptively block dangerous IP ranges

Integrity Protection

Detect forgery/alteration attempts early to protect service

Abuse Prevention

Prevent commercial abuse

Access Restriction

Implement region-based access restriction policies

Response Methods by Detection Type

Detection TypeRisk LevelRecommended Response
ProxyMediumApply additional verification procedures
VPNMediumApply additional verification procedures
Commercial VPNHighImmediate block or enhanced verification
Hosting ProviderHighAutomatic rejection processing

Pre-verification Detail View

Click the Status button of each pre-verification item to view detailed information related to Proxy & VPN detection.
This function can significantly improve service security and reliability by preemptively blocking malicious IPs.
Pre-verification detail view screen

Pre-verification Information

FieldDescription
Request IDUnique request value generated during identity verification attempt
StatusPass/fail based on IP and related information
Risk ScoreScore quantifying IP and related information
Connection TypeResidential/Mobile/Data Center
Request DateDate of submission attempt
CountryIP-based country information
Subnet AttemptSubnet submission attempt frequency (first occurrence/rare/very frequent)
Device and OSSubmission upload environment information

IP Anonymization Status

IP anonymization status screen
ItemDescription
ProxyWhether the IP is suspected to be a proxy
TORWhether the IP uses TOR network
VPNWhether the IP is suspected to be a VPN
Risk Level Order: Risk level is higher in the order of TOR > VPN > Proxy. Establish appropriate response policies for each.

IP Abuse History

IP abuse history screen
ItemDescription
Recent AbuseWhether there is recent abuse history from the IP
Abuse RateFrequency of abuse related to the IP
Bot ActivityWhether there is recent bot activity from the IP
Frequent AbuseWhether there is frequent abuse history for the IP

Additional Information

Additional information screen
ItemDescription
HostHost information
Internet Service ProviderISP information
Autonomous System Number (ASN)Unique autonomous system number
RegionIP-based region information
City/County/DistrictIP-based detailed region information
Time ZoneIP-based time zone information

Risk Score Interpretation Guide

Score RangeRisk LevelRecommended Action
0-30LowNormal processing
31-60MediumAdditional monitoring
61-80HighEnhanced verification procedures
81-100Very HighImmediate block recommended
Monitoring Tips
  • Regularly analyze IP abuse patterns to detect new threats early
  • Minimize inconvenience for legitimate users by establishing whitelist policies
  • Monitor access patterns by country
  • Review false positive cases
  • Establish exception policies for legitimate VPN users

Device Verification

View device verification results.

Authentication Enhancement and Forgery Prevention

Learn how to configure Proxy & VPN detection settings.

User Submissions

Manage submission list and view detailed information.

Statistics

View overall service usage status.