Skip to main content
Glama

IP Fraud & Proxy Detection

security.ipqs.ip_check
Read-onlyIdempotent

Check IP addresses for proxy, VPN, Tor, bot, and crawler fraud. Returns fraud score, geolocation, and risk indicators for e-commerce fraud prevention.

Instructions

Check any IP address for fraud signals — proxy, VPN, Tor, bot, crawler detection with fraud score (0-100). Returns geolocation (country, city, ISP, ASN), abuse velocity, connection type, and 9+ risk indicators. Essential for e-commerce fraud prevention (IPQualityScore)

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
ipYesIPv4 or IPv6 address to check (e.g. "8.8.8.8", "2001:4860:4860::8888")
strictnessNoDetection strictness 0-3 (0=least strict, 3=most aggressive). Higher catches more fraud but may flag legitimate users
allow_public_access_pointsNoAllow public WiFi/library IPs to pass without penalty (default false)

Output Schema

TableJSON Schema
NameRequiredDescriptionDefault
resultNoTool response payload. Shape varies per tool — consult the tool description and inputSchema. May be an object, array, string, or number depending on the upstream provider response.
errorNoPresent only when the call failed. Includes error code, message, request_id, and any provider-specific extras.
Behavior4/5

Does the description disclose side effects, auth requirements, rate limits, or destructive behavior?

Annotations already indicate read-only, non-destructive, idempotent behavior. The description adds context by specifying the fraud score range (0-100) and listing returned data types (geolocation, abuse velocity, connection type, 9+ risk indicators), going beyond annotations without contradiction.

Agents need to know what a tool does to the world before calling it. Descriptions should go beyond structured annotations to explain consequences.

Conciseness5/5

Is the description appropriately sized, front-loaded, and free of redundancy?

Two sentences: first describes the action and main outputs concisely, second provides a usage context. No wasted words, front-loaded with key information.

Shorter descriptions cost fewer tokens and are easier for agents to parse. Every sentence should earn its place.

Completeness5/5

Given the tool's complexity, does the description cover enough for an agent to succeed on first attempt?

Given the presence of an output schema and rich annotations, the description provides sufficient context: core purpose, fraud score range, types of indicators, and practical use case. It comprehensively sets agent expectations without needing more detail.

Complex tools with many parameters or behaviors need more documentation. Simple tools need less. This dimension scales expectations accordingly.

Parameters3/5

Does the description clarify parameter syntax, constraints, interactions, or defaults beyond what the schema provides?

Schema coverage is 100% with clear parameter descriptions. The description does not add extra meaning for parameters beyond what is already in the schema. It focuses on outputs rather than parameter usage guidance.

Input schemas describe structure but not intent. Descriptions should explain non-obvious parameter relationships and valid value ranges.

Purpose5/5

Does the description clearly state what the tool does and how it differs from similar tools?

The description clearly states it checks an IP address for fraud signals, listing specific detections (proxy, VPN, Tor, bot, crawler) and outputs (fraud score, geolocation, abuse velocity). It distinguishes itself from sibling tools like geo.ip.geolocation and other security.ipqs tools by focusing on fraud detection.

Agents choose between tools based on descriptions. A clear purpose with a specific verb and resource helps agents select the right tool.

Usage Guidelines4/5

Does the description explain when to use this tool, when not to, or what alternatives exist?

The description implies use for e-commerce fraud prevention and general IP risk assessment, but does not explicitly state when to use vs alternatives or when not to use. No direct comparison to sibling tools provided.

Agents often have multiple tools that could apply. Explicit usage guidance like "use X instead of Y when Z" prevents misuse.

Install Server

Other Tools

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/whiteknightonhorse/APIbase'

If you have feedback or need assistance with the MCP directory API, please join our Discord server