ICANN

WHOIS lookup: going deeper into the details

When a cybersecurity expert performs threat intel work, he or she needs to contrast information from different sources to obtain the most detailed picture possible of the scenario he or she is investigating. One of these fundamental tools is the WHOIS service offered by the Regional Internet Registries (RIRs)…

Read more

Apility.io logo

New Domain Blacklist March 2018: SQUIDBLACKLIST

We incorporate a new domain blacklist: SQUIDBLACKLIST. Squidblacklist.org is a service for network administrators the highest quality domain blacklists available for effective, targeted inline filtering leveraging various content control applications and platforms, including Squid Proxy.

Read more

Apility.io logo

New IP Blacklist March 2018: BRUTEFORCEBLOCKER, SSLBL, UCEPROTECT, ZEUS

We have been incorporating more malicious IP addresses lists into our databases. Here goes the details of the new IP Blacklist of March 2018: BRUTEFORCEBLOCKER, SSLBL, UCEPROTECT and ZEUS.

Read more

Cloudflare worker apility

A Cloudflare Workers example: How to flag a client as malicious

In this madness that is the evolution of Cloud Computing services without a doubt the newest and coolest thing are Serverless computing services. In this new paradigm mode of consumption of computing resources, we no longer have servers, underlying operating system, file system, or even system administrators. Welcome to the No-Ops world! Cloudflare offers us a new serverless computing service called Cloudflare Workers that fulfills all these characteristics and many more.

Read more

Apility.io Search Engine History

Introducing Resource History: Trace your IP addresses, domains and email

Every day Apility.io’s scraping services analyze almost a hundred black and blocking lists distributed throughout the network. Between IP addresses, email and domains resource the number of active resources in our database fluctuate between 3 and 4 million items. Although this number of items is easily manageable with today’s technology, when we talk about the number of transactions carried out in the system, the numbers skyrocket.

Read more

Udger Apility.io blacklists

New IP Blacklists February 2018: UDGER

UDGER.com is a leader in the detection browsers, mobiles, tablets, Smart TV .., also provides info about IP addresses (proxies, VPN, Tor exit nodes ..).  Since 2005 the Udger team provides services to detect of user agent strings. This project was called user-agent-string.info and was until 2014 freely available. During 2014 they extended the reach of their components and created Udger.com. The company updates their database several times a day to detect more strings.

Read more

Apility.io Bulk GeoIP Lookup

Bulk GeoIP Lookup: Processing a large amount of IP per request

When a developer wants to know the location of an IP individually, the Apility.io Geolocation API is able to return the information in hundredths of a second. This behavior is perfect if you want to integrate the service within applications that make requests along with other logic such as web applications or apps. However, for applications that perform massive data processing, it is not feasible to make a request to the server every time a developer wants to know the geolocation of an IP address. In this case, the Bulk GeoIP Lookup service in the geolocation API comes to rescue!

Read more

Welcome onboard Apility.io!

How to identify bad customers before they sign up

All those of us who develop SaaS services know how important it is to attract the maximum number of users to our platforms so that they can test them, get to know them, become familiar with them and thus be able to start the conversion process from user to customer with some gained ground. Even letting some bad customers sign up.

Read more

Moocher.io bye bye

Moocher.io bye bye!

Starting tomorrow, January 31st, the API endpoints that were running the services of Moocher.io will be permanently disabled and all the users who are still using the endpoint in api.moocher.io will have to change it to api.apility.net. The capabilities of these services will not be reduced, on the contrary in Apility.io all services have been significantly improved and increased.

Read more

NGINX Openresty Lua Apility.io

Deploy a Web Application Firewall (NGINX WAF) with NGINX

A web application firewall (WAF) is an application firewall for HTTP applications. It applies a set of rules to an HTTP conversation. Generally, these rules cover common attacks vectors. While proxies generally protect clients, WAFs protect servers. Hence, a WAF protects a specific web application or set of web applications. Engineers consider a WAF a reverse proxy. WAFs may come in different forms, and the effort to perform this customization can be significant and as the application changes.

Read more

Apility.io NiX SPAM Blacklist

New IP Blacklist January 2018: NiX Spam

NiX SPAM IP blocklist is an up-to-date collection of spam emitting IP addresses. iX is a very well-known German monthly computer magazine, published by since 1988. The magazine focuses primarily on professional IT. Within this area, it deals with a broad range of issues, ranging from various programming topics, server hardware reviews and virtualization, computer security to articles about emerging technologies and current IT-related legal or political issues.

Read more

Apility.io Blacklist API Email Dashboard

Email Verification and Validation with Apility.io Scoring Service

The services offered by our API are like a digital Swiss Army Knife. They can always help you find a way to solve a problem or implement a solution in your applications. For example, the Email Scoring service can be used to perform bulk Email Verification and Validation. Email verification determines whether or not an email address is fully valid and deliverable. The process involves a deep analysis of each email, and this is what the Email Scoring service does.

Read more

Google Spreadsheet AS lookup

Google Spreadsheet Add-On to analyze IP, Domains and Emails

The most frequent way our users use our service to analyze IP, Domains and Emails are through our API. They implement the calls directly into the code of their applications or develop scripts that consume our services and then cross the results with their data.

Read more

Apility.io Ethereum phishing and scam blacklists

Ethereum Phising and Scam domains: New Blacklists

Cryptocurrencies are a new digital asset designed to work as an exchange method that uses cryptography to secure transactions. Bitcoin, Ether, Litecoin are some of them and they are becoming more and more popular. It is no longer a world for hackers and professional investors. Ethereum is

Read more

Block Tor Traffic

How to block TOR traffic in your application

To block TOR traffic or any anonymity service out there is not an easy decision. Any product manager of online services faces this dilemma sooner or later: let users onboard in my service as simple as possible so they can test my product or harden the conditions for registration and therefore drive away potential customers.

Read more

Apility.io Blacklist API IP dashboard

What can Apility.io do for you?

In Apiity.io we think that the world of software development is changing. Because it is moving increasingly over models where the server and the operating system don’t have a major role. This movement towards the concept of pure development and focus on core competencies increasingly shifts more responsibility to the developers.

Read more