2026 Best Software Awards are here!See the list
Product Avatar Image

Spur Intelligence

Show rating breakdown
4 reviews
  • 1 profiles
  • 1 categories
Average star rating
4.9
Serving customers since
2017

Profile Name

Star Rating

4
0
0
0
0

Spur Intelligence Reviews

Review Filters
Profile Name
Star Rating
4
0
0
0
0
Mike M.
MM
Mike M.
02/06/2026
Validated Reviewer
Verified Current User
Review source: Organic

Cohesive, easy-to-integrate IP intelligence with powerful threat signals

Spur provides a cohesive and comprehensive IP intelligence service that is simple to use, understand, parse, and integrate into your SOC workflows, security product, or even just monitoring your home network (I use it for all three). Depending on your needs, Spur will match it. Just need basic IP attributes? Want deep knowledge about proxies and tunnels? What to see what the connected clients are doing on the network? It's there. The API responses are easy to integrate into your workflows, and we had no issues implementing a system for 100k+ lookups-per-day (with some caching) that met all of our needs. Interestingly, searching for a bogon doesn't use up query quota, which was a nice surprise and only threw a _small_ spanner in our process. The amount of threat intelligence, infrastructure, client behaviors, and more is just so complete that we are _still_ underutilizing the data now.
Verified User in Information Technology and Services
AI
Verified User in Information Technology and Services
12/18/2025
Validated Reviewer
Verified Current User
Review source: Organic

The quality of data sets the standard.

The highly accurate insights, diverse data delivery mechanisms, and comprehensive IP address context.
Verified User in Banking
AB
Verified User in Banking
12/13/2025
Validated Reviewer
Review source: Organic

Constantly Updated IP Data for Powerful Detection

Spur is effective in reducing both malicious online account creation and account takeover attacks by aiding in the detection of suspicious activity and the identification of threat actor methods. Threat actors frequently, and sometimes exclusively, use compromised devices with residential IP addresses to disguise their malicious traffic as if it is coming from a legitimate residential source. Spur is able to differentiate between genuine residential traffic and traffic that may be malicious. I've been in the cyber intelligence field for more than 10 years and during more of that time believed IP intelligence was almost entirely useless until I came to know Spur.

About

Contact

HQ Location:
Mount Dora, US

Social

Details

Year Founded
2017
Website
spur.us