<security.dev />

Security APIs

Integrate a full suite of security features: IP intelligence, threat blocking, user verification, and more. Protect against bots, fraud, and evolving threats with developer-friendly APIs for rapid implementation.

User Intel: Ensure Genuine Sign-ups & Reduce Abuse

import securitydev

e = securitydev.user_intel.check_email(email_address)

if e.is_disposable:
    raise InvalidSignup("You cannot create an account with a disposable email address.")
else:
    # Proceed with user registration

Block sign-ups from disposable email services with a simple API check.

Ensure a high-quality user base and prevent abuse. Our User Intel API identifies risky sign-ups, like those using disposable emails often linked to fake accounts, spam, or promo abuse.

With our User Intel API:

  • Instantly detect and block temporary emails.
  • Reduce spam, fraud, and platform abuse.
  • Improve user data integrity and analytics.
  • Build a healthier community by focusing on legitimate users.

View User Intel API Docs →

IP Intel: Secure Traffic & Enhance Account Protection

from securitydev import SecurityClient

client = SecurityClient(key="<your_app_key>")

# Get IP reputation data
rep = client.ip_intel.reputation(request.ip)

# Block TOR exit nodes
if rep.is_tor_exit:
    raise Http404("Not Found")

Check IP reputation and block unwanted traffic like TOR exit nodes.

Screen traffic and protect your apps from:

  • Known malicious actors and botnets
  • TOR exit nodes & anonymous proxies
  • High-risk geographical locations

Focus on your app, not complex threat databases.

Add Location-Aware User Verification

Use IP Geolocation for an added security layer. Detect suspicious logins from new cities/countries and trigger secondary verification (e.g., email confirmation) to prevent account takeover with minimal user friction.

Verify unusual login locations via API to reduce account takeover fraud.

View IP Intel API Docs →


import securitydev

def log_in():
    loc = securitydev.ip_intel.geolocate(request.ip)
    current_city = loc.city.name
    current_country = loc.country.name

    if current_city != last_known_city:
        raise Exception("Login from new location, verification required.")

Example: Trigger verification for logins from new locations.

Integrate in Minutes, Not Days

Straightforward, developer-first APIs & SDKs. No sales calls, no complex setup.

Get running quickly with:

  • Clear, example-driven documentation
  • Official SDKs (Python, more coming)
  • Standard RESTful API for any language
  • Generous free tier for testing & development

Explore Documentation & SDKs →

# Installation (Python)
$ pip install securitydev

# Basic Setup
from securitydev import SecurityClient
client = SecurityClient(key="<your_app_key>")

# Ready to make API calls!
geo = client.ip_intel.geolocate("9.9.9.9")
print(geo.city.name)

Simple setup with the Python SDK.

Continuously Evolving Security Toolkit

We're constantly expanding your security toolkit. security.dev actively develops new APIs and refines existing ones based on emerging threats and developer feedback, aiming for a comprehensive, developer-first platform.

IP Intel API

IP insights: assess reputation, geolocate users, detect TOR/proxies, and block threats.

Learn more about IP Intel →

User Intel API

User verification: check for disposable emails to ensure genuine sign-ups and reduce abuse.

Learn more about User Intel →

Powered by Real-Time Threat Intelligence

Access continuously updated threat data from multiple sources. We handle the complex aggregation and analysis.

  • Threat data updated multiple times per hour
  • Designed for low false-positive rates
  • Responsive to emerging threats & attack vectors
  • Built on scalable infrastructure

Focus on Your Core Product

Building security in-house is a significant, ongoing effort. Compare:

Building In-House Requires:

  • Sourcing & maintaining threat intelligence
  • Developing & updating detection logic
  • Diverting engineering from core features
  • Constant monitoring & threat reaction
  • Ongoing infrastructure & maintenance costs

Using security.dev Provides:

  • Updated threat intelligence access
  • Ready-to-use APIs for security tasks
  • Faster implementation, team stays focused
  • Proactive protection, aggregated data
  • Predictable costs, managed infrastructure

Implement security best practices without diverting from your core goals.

Prefer a Call?

Happy to discuss specific requirements, enterprise needs, or offer a personalized walkthrough.