We’ve added documentation to our developer’s site giving a tutorial on how to import the CSV versions of our GeoIP2 and GeoLite2 databases into PostgreSQL and MySQL. In addition to the basic information about how to bring MaxMind’s data into these popular database frameworks, we have also included pointers from our dev team on how to index and organize them for faster searching.
You can import GeoIP2 and GeoLite2 data into your database in order to more easily manipulate and transform the data, or join and link the data with other datasets.Check out the tutorials for PostgreSQL and MySQL on our developer’s site.
With nearly two decades in the business of IP geolocation, we spend a lot of time thinking about accuracy, but, as with all things big data, a simple question usually has a complex answer. As we approach our twentieth anniversary, we’ll be offering some insights into the industry. This month we’ll cover the basics, answering questions about how accurate IP geolocation is and why. In this post, we’ll talk about some common assumptions about how IP geolocation works and contextualize those assumptions in light of the structure of the internet and the distribution of the IP space across geographical regions. In light of these considerations, we’ll develop a deeper understanding of the constraints and opportunities for IP geolocation.
When Vignesh Krishan founded Research Defender in 2018 he knew that managing fraud was critical in the global market research industry. The company set out to deliver high-quality consumer insights for companies in diverse industries all over the world. They understood even before they got started that ensuring the quality and integrity of the research was going to be essential to their success and the success of their customers.
Leveraging the strengths and understanding the limits of IP geolocation, the Rescue Lab plays a critical role in rescuing children from online sexual exploitation crimes.
Warning: The following article discusses child sexual abuse and may be disturbing to some readers.
The scale of the problem is staggering. Every month, more than 800,000 people share images and videos of children being sexually abused. The sharing of these images is a re-victimization of the abused, haunting them well into their adulthood. And the investigation of sharing by law enforcement has time and time again led to the rescue of a different child being actively abused. The sheer volume of child sexual abuse materials being shared online poses what was, for many years, an impossible logistical challenge.
The issue isn’t a lack of people who care. The problem is one of sorting. If there’s a pool of 800,000 potential cases, all of which occur in the geographically nebulous space of “the internet,” how do you distribute these cases among the thousands of people—law enforcement officers—who have devoted their lives to fighting child sexual abuse? Without a method to effectively sort investigations into geographical jurisdictions, the cases are unmanageable. Figuring which of these offenders may be in your area would be like looking for a needle in a haystack.
by Thomas Neirnyck
This article was originally published on The Elastic Blog on Jan 20, 2021.
This tutorial shows how you can leverage GeoIP data using tools developed by Elastic. Elastic builds software to make data usable in real time and at scale for search, logging, security, and analytics use cases. Elastic’s tools make it easier for operations teams to keep applications running, or give security professionals a one-stop-shop for spotting and neutralizing digital threats. Learn more at elastic.co.
Want to create a map of where your users are? With the GeoIP processor, you can easily attach the location of your users to your user metrics.
In order to better ensure that out-of-date IP data is not being used, MaxMind will no longer allow customers to continue to download old GeoIP and GeoLite databases once their subscription expires. This will help us to ensure compliance with digital privacy laws, protecting our business and yours.
This change will come into effect on February 8, 2021. No action is required on the part of customers.
In the past, we have allowed customers to continue to download databases past their subscription date as a courtesy, removing access only when the latest version of the databases they have paid for are 30 days old. Moving forward, customers will not be able to download paid databases once their subscription has expired. By removing access to these databases, we are working to ensure that only the latest versions of our databases, which regularly incorporate critical updates, corrections, and changes based on digital privacy rights, are being used in production.