Welcome!

A self-serve online library of information to learn 24scan functionality.

Knowledge Base

Comprehensive guide to integrating, tracking, and protecting with 24scan.

Get Started by Navigating

Overview

The API Key section allows you to securely authenticate requests and track activity across your application.

  • Generate and manage your secure API keys
  • View your endpoint preview
  • Revoke keys instantly if compromised
  • Only available when your subscription package is active
API Key Management
  • Generate and manage your secure API keys
  • Revoke keys instantly if compromised
  • API keys are only available with an active subscription
Request Tracking
  • Enable Request Tracking for full analytics
  • Track request metadata in real time
  • Monitor usage and behavior

Parameters (Important)

  • Add custom tracking parameters using Add Param
  • Maximum limit: 15 parameters
  • Analyze user behavior, traffic sources, and custom query data
API Usage Example
Endpoint:
GET https://api.24scan.com/v1/api?api_key=YOUR_API_KEY&ip=8.8.8.8
Query Parameters
ParameterTypeRequiredDescription
api_keystringYesYour unique API key
ipstringYesIP address to analyze
Example Request
curl "https://api.24scan.com/v1/api?api_key=YOUR_API_KEY&ip=8.8.8.8"
Example Response
{
  "status": "success",
  "data": {
    "ip": "8.8.8.8",
    "network": {
      "ip_version": 4,
      "cidr": "8.8.8.0/24",
      "asn": "AS15169",
      "hostname": null,
      "provider": "Google LLC",
      "organisation": "Level 3",
      "connection_type": "business"
    },
    "location": {
      "country_code": "US",
      "region_name": "California",
      "region_code": "CA",
      "city_name": "Mountain View",
      "postal_code": "94043",
      "continent_name": "North America",
      "continent_code": "NA",
      "latitude": 37.422,
      "longitude": -122.085,
      "timezone": "America/Los_Angeles"
    },
    "currency": {
      "code": "USD",
      "name": "Dollar",
      "symbol": "$"
    },
    "device": {
      "estimated_address": 1,
      "estimated_subnet": 6
    },
    "detections": {
      "risk_score": 0,
      "confidence": 100,
      "is_proxy": false,
      "is_vpn": true,
      "is_tor": false,
      "is_hosting": false,
      "is_anonymous": false,
      "is_scraper": false,
      "is_compromised": false
    }
  }
}
Response Breakdown

Example Use Case
if (data.detections.risk_score > 70) {
  blockUser();
} else if (data.detections.is_vpn) {
  requireVerification();
}
API Tracking Activity
  • Monitor all incoming API requests with detailed logs and insights
  • Track total requests, failed or rejected requests, risk level, and active tracking parameters
  • Detailed logs include IP, timestamp, risk score, and status
Script Guard (No-Code Protection)
  • Create a Script Key
  • Add your website or domain
  • Copy the embed script
  • Paste it into your website <head>
  • Protection is active instantly
Detection Rules and Protection Settings
  • Customize how your system handles proxy, VPN, Tor, bots, and anonymous traffic
  • Action options: Allow, Block, Challenge, or Verify
Risk Score Escalation
  • Automatically take action based on fraud risk score (0-100)
  • Set thresholds for warning, verification, and blocking
  • Example: Low risk -> Allow, Medium risk -> Verification, High risk -> Block immediately
Trusted Sources (Allowlist)
  • Whitelist trusted traffic to bypass security checks
  • Supported: Country ISO codes, IP addresses, and network ASN
  • Use cases: Internal teams, trusted partners, and verified sources
Script Guard Events
  • Track all detected events from Script Guard in real time
  • See total events, blocked attempts, warnings, and high-risk activity
  • Event details include IP or domain, triggered rule, action taken, and risk score