Tag Archives: IP Geolocation

MaxMind’s Paladin Report is now available

Deciding on the right fraud prevention and IP intelligence provider can be a daunting task. With worldwide internet usage projected to grow every year, your choice matters now more than ever. So, make an informed, educated one with MaxMind’s Paladin Report.

Continue reading

Where in the World?


Santa had a problem, and the problem was kids. Not that he didn’t love the children – far from it, their happiness was why he did what he did after all – but now there were more than ever of them. World population had grown to the point where there were 2.2 billion children that potentially wanted a gift, and that was a lot of mince pies to get through in one night!

To ensure that he’d have time to make all the deliveries, he’d taken the unprecedented step of installing agents in homes around the world – elves that sat on shelves – who were able to report on any problem, from waking children to adverse weather conditions, that might slow him down. Traditionally, a Shelf Elf would report by flying home each night leading up to Christmas, but on the big night itself the elf would have to report back in real time. Luckily for Santa, so many houses had internet connections that the Elf could use to report issues via a simple web form the Wise Old Elf had set up on the North Pole extranet. Continue reading

Reverse Geocoding for the Masses – Apache Nutch

The Apache Nutch community has been hard at work developing an open source web crawler. Nutch is a mature, production ready web crawler powering data acquisition, search and discovery for a broad spectrum of organizations over a broader spectrum of use cases. The Nutch 1.x branch enables fine grained configuration and relies on Apache Hadoop™ data structures, which are great for batch processing.

This post documents how reverse geolocation features were added to Nutch via MaxMind’s GeoIP2-java API, making good use of server IP addresses acquired within a Nutch crawl. Readers will take away:

  • insight into why geocoding is appealing in today’s markets,
  • practical code examples from the Nutch 1.x branch, showing how to use the GeoIP2-java API in order to geocode based on server IPs.

Continue reading

MaxMind Announces Corporate Giving Program

MaxMind is pleased to announce our corporate giving program – we plan to give away over 50% of our profits to charity.

Since its inception, MaxMind has focused on creating value for our customers, especially where the ratio of value to effort is high. It is exciting how technology enables us to write code once and deploy it to thousands of customers to solve problems. For marketing, we focus on strategies that have high impact per dollar invested, including detailed, transparent information about our products on our website and our freemium model for geolocation databases.

Similarly, with charitable giving, we look for opportunities to apply research to find how our funding can have high impact per dollar invested. Sometimes the most cost-effective program can be surprising. For example, according to MIT’s Abdul Latif Jameel Poverty Action Lab, deworming may be one of the most effective ways to increase student participation in school.

The for-profit space seems more and more crowded with great companies pursuing great ideas. There appears to be no shortage of angel and venture capital for technology startups, and competition is intense. On the other hand, the non-profit space appears a lot less crowded, as there are fewer funders pursuing innovative solutions.

We would like to thank our customers for making this possible!

To learn more about MaxMind’s charitable giving, visit our Corporate Giving page.

 

Proxy Detection – Why Fraudsters Give Proxies a Bad Name

When it comes to fraud detection, finding proxies is a big topic. But why? Fraud detection begins with thinking intelligently about the IP address associated with a transaction. Where is that IP address, and how does that location relate to other transaction data? Whereas most IP addresses inspire confidence, those associated with a proxy generate suspicion.

Let’s take a closer look at proxy detection. Continue reading