IP Security Analyzer: A pro-grade Cloudflare Worker for forensic intelligence.
Detects VPNs, Proxies & Hosting IPs via heuristic ASN auditing.
Includes Security Scoring, WebRTC Leak Test, ISP classification, and Geo-location.
Built with a modern Bento UI and live terminal logs.
Powerful, open-source and real-time network forensic tool.
- π Heuristic ASN Auditing β Detects VPNs, Proxies, Hosting providers via ISP pattern analysis
- π‘οΈ Security Scoring β Dynamic 0-100 trust score based on infrastructure risk
- π WebRTC Leak Test β Real-time detection of IP leaks via browser STUN probing
- π·οΈ ISP Classification β Categorizes connections (Mobile, Hosting, Educational, Corporate, Residential)
- π Geo-Location β Country, city, region, coordinates from Cloudflare edge data
- π₯οΈ Modern Bento UI β Glass-morphism dashboard with responsive grid layout
- π Live Terminal Logs β Real-time forensic logging with animated timestamps
- β‘ Edge Performance β Sub-100ms response via Cloudflare's global network
- π JSON API β RESTful
/jsonendpoint for programmatic access - π One-Click Copy β Copy IP address to clipboard instantly
- Cloudflare account (Free tier works)
- Wrangler CLI:
npm install -g wrangler
# 1. Login
npx wrangler login
# 2. Create worker
npx wrangler init ip-security-analyzer
# 3. Paste code into src/index.js
# 4. Deploy
npx wrangler deployYour URL: https://ip-security-analyzer.YOUR_SUBDOMAIN.workers.dev
- Go to Cloudflare Dashboard β Workers & Pages
- Click "Create Application" β "Create Worker"
- Name it
ip-security-analyzer - Click "Edit Code", paste the code, "Save and Deploy"
- Add your domain to Cloudflare
- Update nameservers
Type: CNAME
Name: myip
Target: your-worker.YOUR_SUBDOMAIN.workers.dev
Proxy: Orange cloud (Proxied)
Via Wrangler:
npx wrangler route add "myip.yourdomain.com/*" ip-security-analyzerVia Dashboard:
- Workers & Pages β Your Worker β Settings β Triggers
- Click "Add Custom Domain"
- Enter:
myip.yourdomain.com
Visit: https://myip.yourdomain.com
| Endpoint | Description |
|---|---|
/ |
HTML Dashboard |
/json |
JSON Metadata |
{
"status": "success",
"metadata": {
"ip": "203.0.113.42",
"type": "IPv4",
"asn": "15169",
"isp": "Google LLC",
"connectionType": "Hosting / Proxy",
"country": "US",
"city": "Mountain View",
"region": "California",
"lat": "37.3860",
"lon": "-122.0838",
"colo": "SJC",
"timezone": "America/Los_Angeles",
"tlsVersion": "TLSv1.3",
"httpProtocol": "HTTP/2",
"rayId": "8f7e6d5c4b3a2190"
}
}cURL:
curl https://myip.theazizi.ir/jsonJavaScript:
const res = await fetch('https://myip.theazizi.ir/json');
const data = await res.json();
console.log(data.metadata.ip);Python:
import requests
print(requests.get('https://myip.theazizi.ir/json').json())| Type | Patterns |
|---|---|
| π± Mobile | Vodafone, Verizon, T-Mobile, LTE, 5G |
| βοΈ Hosting/Proxy | AWS, GCP, Azure, DigitalOcean, Hetzner, VPN |
| π Educational | University, .edu, Research networks |
| π’ Corporate | Enterprise, Business ASN ranges |
| π Residential | Standard consumer ISPs (default) |
| Risk Factor | Deduction |
|---|---|
| Hosting/VPN detected | -45 pts |
| Mobile network | -10 pts |
| Bot signature | -30 pts |
| Timezone mismatch | -20 pts |
| WebRTC leak | -15 pts |
Score Ranges:
- π’ 80-100: Trusted
- π‘ 50-79: Limited Trust
- π΄ 0-49: High Risk
npx wrangler secret put API_KEYAccess in code:
const apiKey = env.API_KEY;name = "ip-security-analyzer"
main = "src/index.js"
compatibility_date = "2026-02-14"
[[routes]]
pattern = "myip.yourdomain.com"
custom_domain = true# Local dev server
npx wrangler dev
# View logs
npx wrangler tail- Latency: Sub-100ms globally
- Cold Start: Near-zero (Cloudflare 2025 optimization)
- Requests: 100K/day (Free tier)
MIT License β Free to use, modify, and deploy.
TheGreatAzizi
- X: @the_azzi
- GitHub: @TheGreatAzizi
- Demo: myip.theazizi.ir
Built with β€οΈ