×
Real-Time Visitor Intelligence API

Know who's on your site. Detect bots instantly. Stop threats before they convert.

No backend changes. No databases. No infrastructure. Just one script tag.

Add This. Get Everything.
<script src="https://geo.infiflex.com/infiflex-geo.js"
data-token="YOUR_TOKEN"></script>

Within milliseconds, you receive complete visitor intelligence

Live Output · InfiGeo.getData()

This Is What We See
About Every Visitor

// Real intelligence payload · resolved in < 80ms

Country
,
IP
UTC +05:30
Timezone
Asia/Kolkata
Browser
infigeo · response payload LIVE
{
"ip": "",
"geo": {
"country": "",
"region": "",
"city": "",
"timezone": "",
"latlong": ,
},
"device": {
"type": ""
},
"browser": {
"name": "",
"version": ""
},
"threat": {
"allocationStatus": ,
"registry": ,
"registryCountry": ,
"isDatacenter": ,
"isKnownAttacker": ,
"isTor": ,
"threatLevel":
"threatScore":
},
}
threat score
/ 100

Legitimate residential visitor
No suspicious indicators detected

security signals
Tor Exit Node
Not a Tor relay or exit point
Datacenter / Cloud
Residential ISP — Bharti Airtel
Attacker Blocklist
Not present in threat databases
VPN / Proxy
Minor proxy signal detected
Registry Verified
ASN 45609 — APNIC delegated

This is a live demo. The data above reflects what InfiGeo resolves for any real visitor in under 80ms — no backend, no database, no setup required. Add one <script> tag and call InfiGeo.getData().

Try It On Your Site — Free Read the API Docs

Know Exactly Who's Visiting

Comprehensive visitor intelligence in real-time

Real Geolocation

Country, region, city and coordinates resolved at Google's edge

Accurate IP Resolution

Capture the real public IP, even behind CDNs and proxies

Browser & OS Detection

Chrome, Safari, Edge, Firefox, Windows, macOS, iOS, Android

Device Classification

Desktop, Mobile, Tablet, TV detection with precision

Language Preferences

Detect user's preferred languages for personalization

Datacenter Detection

AWS, Azure, GCP cloud IP ranges and hosting detection

Tor & Attacker Signals

Official Tor exit nodes and known attacker blocklists

Unified Threat Score

Single threat score (0–100) combining all security signals

Unlock Full Visitor Intelligence Explore the Full Data Schema

Built-In Threat Intelligence

Every request is checked against multiple security databases

Official Tor Exit Nodes

Real-time detection of Tor network exit points

Known Attacker Blocklists

Continuously updated malicious IP databases

Cloud IP Ranges

AWS, Azure & GCP hosting detection

Regional Registry Data

Internet Registry delegation verification

LOW (0-30)

Normal Visitor

Legitimate user with no suspicious indicators

MEDIUM (31-70)

Suspicious Indicators

Some red flags detected, requires attention

HIGH (71-100)

Strong Malicious Signals

Multiple threat indicators, likely malicious

Automatic Threat Blocking
<script data-block-threats></script>

No firewall configuration required. No extra setup.

Why InfiGeo Wins

The most powerful visitor intelligence with the simplest setup

Script Tag

1 Script Tag Setup

Integrate in seconds with a single line of code. No complex configuration required.

Zero maintenance

Zero Maintenance

Automatic updates, no manual configuration needed. Set it and forget it.

Multi Source Intelligence

Multi-Source Intelligence

Combined threat data from multiple authoritative sources.

No Server Load

No Server Load

Edge-resolved at Google's infrastructure. Zero backend impact.

Edge Resolved Accuracy

Edge-Resolved Accuracy

Maximum speed and precision. Results in milliseconds.

Enterprise Security

Enterprise Security

RS256 JWT authentication with strict CORS enforcement.

Get Started — It's Free Compare Plans

Use Cases

Powerful applications across industries

Fraud Prevention
Bot Detection
Geo-Restriction
Personalized UX
Analytics Enrichment
Risk-Based Checkout
Build Your Use Case Today Talk to an Expert

Enterprise-Grade Security

Built with security-first architecture

RS256 JWT Authentication

Industry-standard cryptographic security

Origin-Bound Tokens

Tokens restricted to authorized domains only

Per-Tenant Rate Limits

Customizable rate limiting per account

Distributed Throttling

Global edge-based request management

Strict CORS Enforcement

Cross-origin security by default

HTTPS Only

Encrypted connections mandatory

Deploy Enterprise-Grade Security Review Security Architecture

Get Started in Under 5 Minutes

Simple integration, powerful results

1

Sign Up

Create your free account in seconds. No credit card required to start.

2

Generate Your JWT Token

Get your secure authentication token from the dashboard instantly.

3

Add the Script

Copy and paste one line of code into your website's HTML.

4

Call InfiGeo.getData()

Start receiving real-time visitor intelligence immediately.

Create Your Free Account View Integration Guide

Stop Guessing. Start Knowing.

Know exactly who's on your site, detect threats instantly, and protect your business.