{"@context":"https:\/\/schema.org\/","@type":"CollectionPage","@id":"https:\/\/wiki.fraudlogix.com\/blog\/category\/ip-risk-scoring\/#CollectionPage","headline":"IP Risk Scoring Category","description":"","url":"https:\/\/wiki.fraudlogix.com\/blog\/category\/ip-risk-scoring\/","hasPart":[{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/magento-fraud-detection-adobe-commerce","headline":"Magento Fraud Detection: Fraudlogix IP Risk Score Now on Adobe Commerce","url":"https:\/\/wiki.fraudlogix.com\/blog\/magento-fraud-detection-adobe-commerce","datePublished":"2026-03-05","dateModified":"2026-03-05","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/magento-fraud-detection-adobe-commerce","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/jessica\/#Person","name":"jessica","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/jessica\/","identifier":5,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/3b2b6a041171574f44806fe399dae635?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3b2b6a041171574f44806fe399dae635?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2026\/03\/fraudlogix-adobe-commerce-featured-image-1.png","url":"https:\/\/wiki.fraudlogix.com\/wp-content\/uploads\/2026\/03\/fraudlogix-adobe-commerce-featured-image-1.png","height":630,"width":1200},"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/understanding-ip-reputation-scores\/","headline":"Understanding IP Reputation Scores","url":"https:\/\/wiki.fraudlogix.com\/blog\/understanding-ip-reputation-scores\/","datePublished":"2024-12-19","dateModified":"2025-01-10","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/understanding-ip-reputation-scores\/","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/user\/#Person","name":"user","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/user\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/8245dd29ff15688019d08901d0fdcd0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8245dd29ff15688019d08901d0fdcd0d?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":null,"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/ip-masking-and-vpn-usage-understanding-how-proxies-can-hide-the-true-location-of-a-user-or-device\/","headline":"IP Masking\u00a0and VPN Usage: Understanding How Proxies Can Hide the True Location of a User or Device\u00a0\u00a0","url":"https:\/\/wiki.fraudlogix.com\/blog\/ip-masking-and-vpn-usage-understanding-how-proxies-can-hide-the-true-location-of-a-user-or-device\/","datePublished":"2023-01-26","dateModified":"2025-01-10","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/ip-masking-and-vpn-usage-understanding-how-proxies-can-hide-the-true-location-of-a-user-or-device\/","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/#Person","name":"Fraudlogix","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/","identifier":6,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":null,"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/the-importance-of-detecting-geo-mismatches-in-digital-advertising\/","headline":"The Importance of Detecting Geo Mismatches in Digital Advertising\u00a0","url":"https:\/\/wiki.fraudlogix.com\/blog\/the-importance-of-detecting-geo-mismatches-in-digital-advertising\/","datePublished":"2023-01-26","dateModified":"2025-01-10","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/the-importance-of-detecting-geo-mismatches-in-digital-advertising\/","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/#Person","name":"Fraudlogix","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/","identifier":6,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":null,"keywords":null},{"@type":"Article","@id":"https:\/\/wiki.fraudlogix.com\/blog\/understanding-and-detecting-forged-user-agents-a-guide-for-fraud-detection-and-prevention\/","headline":"User Agent Spoofing: Guide To Detecting Forged User Agents","url":"https:\/\/wiki.fraudlogix.com\/blog\/understanding-and-detecting-forged-user-agents-a-guide-for-fraud-detection-and-prevention\/","datePublished":"2023-01-26","dateModified":"2025-01-10","mainEntityOfPage":"https:\/\/wiki.fraudlogix.com\/blog\/understanding-and-detecting-forged-user-agents-a-guide-for-fraud-detection-and-prevention\/","author":{"@type":"Person","@id":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/#Person","name":"Fraudlogix","url":"https:\/\/wiki.fraudlogix.com\/blog\/author\/priscilla\/","identifier":6,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/06995c16354b313a238da61945d79b55?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"Fraudlogix","logo":{"@type":"ImageObject","@id":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","url":"https:\/\/fraudlogix.com\/wp-content\/uploads\/2018\/04\/FraudlogixLogo_black.jpg","width":600,"height":60}},"image":null,"keywords":null}]}