{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.fraudlogix.com\/ip-risk-api\/#Article","mainEntityOfPage":"https:\/\/www.fraudlogix.com\/ip-risk-api\/","headline":"IP Risk API","name":"IP Risk API","description":"[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;30px||0px|&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.0&#8243; custom_margin=&#8221;||||false|false&#8221; hover_enabled=&#8221;0&#8243; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_code _builder_version=&#8221;4.27.0&#8243; width=&#8221;100%&#8221; max_width=&#8221;1080px&#8221; hover_enabled=&#8221;0&#8243; custom_css_main_element=&#8221;body, html {|| margin: 0;|| padding: 0;|| height: 100%;|| overflow: hidden;|| }|| iframe {|| position: absolute;|| top: 0;|| left: 0;|| width: 100%;|| height: 100%;|| border: none;|| }&#8221; global_colors_info=&#8221;{}&#8221; sticky_enabled=&#8221;0&#8243;]","datePublished":"2024-06-04","dateModified":"2025-05-21","author":{"@type":"Person","@id":"https:\/\/www.fraudlogix.com\/blog\/author\/user\/#Person","name":"user","url":"https:\/\/www.fraudlogix.com\/blog\/author\/user\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/8245dd29ff15688019d08901d0fdcd0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8245dd29ff15688019d08901d0fdcd0d?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"url":"https:\/\/www.fraudlogix.com\/ip-risk-api\/"}