IP Deputation API

IP deputation API

Use this API to enable your website or app to identify the physical location of a user’s IP address. This can be useful for a variety of purposes, including content personalisation, geolocation-based marketing, and network security.

Access Control Policy

The Access Control policy allows you to filter (allow/deny) calls by specific IP addresses or ranges. This allows you to protect your APIs from potential abuse and misuse. You can set this policy at any point in the API proxy flow, but it is most effective to add it early in the request/protocol endpoints (Request / ProxyEndpoint / PreFlow), or as part of authentication or quota checking.

Match Rules

When you configure the MatchRule> element in your ip-filter policy, you can choose to allow or deny access based on the mask value of the IP address or address range. You can also specify the order in which the rules are tested, and set the action to either ALLOW or DENY if the first rule is resolved.


The ValidateBasedOn element allows you to evaluate IP addresses only if you know for sure that the IP address IP deputation API in the True-Client-IP header is a trusted one. This can be helpful when you need to make a decision about which IP addresses to accept or reject based on the source address, but want to be extra careful about evaluating the entire X-Forwarded-For header.

Specify the IP address or addresses to be matched against in the SourceAddress> element of the MatchRule> element. If you only want to allow a single IP address to call your API proxy, leave this element empty.

For more information, see About the SourceAddress> element and IP masking with CIDR notation.

IP Geolocation API

An IP geolocation API is a powerful tool that can help you understand where your visitors are coming from and how to best serve them. It is useful for online businesses looking to personalise their websites and ensure they are serving up relevant content, as well as for law enforcement agencies and parents keeping tabs on their children’s activity online. It can also be used to track IoT devices and network intruders, helping you stay secure.

Posted on