×
Real-Time Visitor Intelligence API

Know who's on your site. Detect bots instantly. Stop threats before they convert.

No backend changes. No databases. No infrastructure. Just one script tag.

Add This. Get Everything.
<script src="https://geo.infiflex.com/infiflex-geo.js"
data-token="YOUR_TOKEN"></script>

Within milliseconds, you receive complete visitor intelligence

Live Output · InfiGeo.getData()

This Is What We See
About Every Visitor

// Real intelligence payload · resolved in < 80ms

Country
,
IP
UTC +05:30
Timezone
Asia/Kolkata
Browser
infigeo · response payload LIVE
{
"ip": "",
"geo": {
"country": "",
"region": "",
"city": "",
"timezone": "",
"latlong": ,
},
"device": {
"type": ""
},
"browser": {
"name": "",
"version": ""
},
"threat": {
"allocationStatus": ,
"registry": ,
"registryCountry": ,
"isDatacenter": ,
"isKnownAttacker": ,
"isTor": ,
"threatLevel":
"threatScore":
},
}
threat score
/ 100

Legitimate residential visitor
No suspicious indicators detected

security signals
Tor Exit Node
Not a Tor relay or exit point
Datacenter / Cloud
Residential ISP — Bharti Airtel
Attacker Blocklist
Not present in threat databases
VPN / Proxy
Minor proxy signal detected
Registry Verified
ASN 45609 — APNIC delegated

This is a live demo. The data above reflects what InfiGeo resolves for any real visitor in under 80ms — no backend, no database, no setup required. Add one <script> tag and call InfiGeo.getData().

Know Exactly Who's Visiting

Comprehensive visitor intelligence in real-time

Real Geolocation

Country, region, city and coordinates resolved at Google's edge

Accurate IP Resolution

Capture the real public IP, even behind CDNs and proxies

Browser & OS Detection

Chrome, Safari, Edge, Firefox, Windows, macOS, iOS, Android

Device Classification

Desktop, Mobile, Tablet, TV detection with precision

Language Preferences

Detect user's preferred languages for personalization

Datacenter Detection

AWS, Azure, GCP cloud IP ranges and hosting detection

Tor & Attacker Signals

Official Tor exit nodes and known attacker blocklists

Unified Threat Score

Single threat score (0–100) combining all security signals

Built-In Threat Intelligence

Every request is checked against multiple security databases

Official Tor Exit Nodes

Real-time detection of Tor network exit points

Known Attacker Blocklists

Continuously updated malicious IP databases

Cloud IP Ranges

AWS, Azure & GCP hosting detection

Regional Registry Data

Internet Registry delegation verification

LOW (0-30)

Normal Visitor

Legitimate user with no suspicious indicators

MEDIUM (31-70)

Suspicious Indicators

Some red flags detected, requires attention

HIGH (71-100)

Strong Malicious Signals

Multiple threat indicators, likely malicious

Automatic Threat Blocking
<script data-block-threats></script>

No firewall configuration required. No extra setup.

Why InfiGeo Wins

The most powerful visitor intelligence with the simplest setup

Script Tag

1 Script Tag Setup

Integrate in seconds with a single line of code. No complex configuration required.

Zero maintenance

Zero Maintenance

Automatic updates, no manual configuration needed. Set it and forget it.

Multi Source Intelligence

Multi-Source Intelligence

Combined threat data from multiple authoritative sources.

No Server Load

No Server Load

Edge-resolved at Google's infrastructure. Zero backend impact.

Edge Resolved Accuracy

Edge-Resolved Accuracy

Maximum speed and precision. Results in milliseconds.

Enterprise Security

Enterprise Security

RS256 JWT authentication with strict CORS enforcement.

Use Cases

Powerful applications across industries

Fraud Prevention
Bot Detection
Geo-Restriction
Personalized UX
Analytics Enrichment
Risk-Based Checkout

Enterprise-Grade Security

Built with security-first architecture

RS256 JWT Authentication

Industry-standard cryptographic security

Origin-Bound Tokens

Tokens restricted to authorized domains only

Per-Tenant Rate Limits

Customizable rate limiting per account

Distributed Throttling

Global edge-based request management

Strict CORS Enforcement

Cross-origin security by default

HTTPS Only

Encrypted connections mandatory

Simple Pricing

All plans include full threat intelligence and edge-based detection

Starter

  • 10,000 requests/day
  • 10 requests per second
  • Full threat intelligence
  • Edge geolocation
  • Basic support
Get Started

Enterprise

  • Unlimited requests
  • Custom rate limits
  • Full threat intelligence
  • Edge geolocation
  • 24/7 dedicated support
  • SLA guarantees
  • Custom integrations
Contact Sales

Get Started in Under 5 Minutes

Simple integration, powerful results

1

Sign Up

Create your free account in seconds. No credit card required to start.

2

Generate Your JWT Token

Get your secure authentication token from the dashboard instantly.

3

Add the Script

Copy and paste one line of code into your website's HTML.

4

Call InfiGeo.getData()

Start receiving real-time visitor intelligence immediately.

Stop Guessing. Start Knowing.

Know exactly who's on your site, detect threats instantly, and protect your business.