This reviewer's identity has been verified by our review moderation team. They have asked not to show their name, job title, or picture.
Spur is effective in reducing both malicious online account creation and account takeover attacks by aiding in the detection of suspicious activity and the identification of threat actor methods. Threat actors frequently, and sometimes exclusively, use compromised devices with residential IP addresses to disguise their malicious traffic as if it is coming from a legitimate residential source. Spur is able to differentiate between genuine residential traffic and traffic that may be malicious.
I've been in the cyber intelligence field for more than 10 years and during more of that time believed IP intelligence was almost entirely useless until I came to know Spur. Review collected by and hosted on G2.com.
There isn't anything I do not like about Spur IP. As an advanced user proficient in creating my own API's it was straight forward. I would say new users or basic API knowledge could probably use example API code SDK for getting and using everything Spur offers you. Review collected by and hosted on G2.com.
Validated through a business email account added to their profile
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.




