A visitor type is a category for classifying a visit. Gatekeeper uses visitor types to figure out what which visit information to check when authorizing a visit.
There are several visitor types available:
- User ID
This document will cover what each visitor type is, where the data comes from, and how it can be used when creating policies.
The IP type is a basic, but powerful visitor type. It is difficult for a malicious actor to spoof an IP address, making it a fairly reliable source of information about the visitor. In fact, most information used for other visitor types (e.g., organization, country) is derived from IP address for this very reason.
The visitor IP address should be provided by the client with each visit authorization.
The IP visitor type can be divided into two subtypes: IP address and IP range.
An IP address represents a single user of your application, making it useful for targeted whitelisting or blacklisting.
IP addresses are expressed in IPv4 dot notation. For example,
An IP range is a group of adjacent IP addresses. IP ranges can be used to quickly "tag" a set of IPs for special handling. For example, if you find that IPs in
22.214.171.124 - 126.96.36.199 are controlled by a single, malicious entity, you may choose to blacklist the entire IP range rather than each IP address individually.
IP ranges are expressed in CIDR notation. For example, a range starting with
188.8.131.52 and ending with
184.108.40.206 would be denoted as
The organization type refers to the organization controlling an IP address. Organizations may be telecom companies, web hosts, governmental institutions, universities, etc.
IP to organization mappings are maintained by the regional Internet registries, who handle distribution of IP addresses.
At the moment, organization names are provided as is, making them somewhat cumbersome to use. For example, Google has 8 different organization names registered, including
google-as, etc. NetToolKit plans to normalize organization names down the road.
The tag type is a label assigned to the visitor through a variety of means. Generally, tags are applied to an individual IP address or a block of IP addresses.
Some common tags include:
Tags come from a variety of sources. Some come in the form of IP lists publicized by internet citizens to root out bad actors. Some are published by cloud platforms to help identify users of their services. Others are derived by NetToolKit internally. For example, an IP address may be tagged with
abuse after an overenthusiastic bot attempts to crawl a page forbidden in
Tags can be used to enforce harsher or more lenient rules on different types of visitors. For example, you may want to require a CAPTCHA from
data center tagged visitors sooner than you would from
ISP tagged visitors.
The country type defines which country a visit originates from.
Like organization, the country is determined by IP address. The IP address to country mapping is maintained by the regional Internet registries.
The user ID type is used to authorize and track authenticated (i.e., logged in) users of your application.
User IDs may be provided by the client with each visit authorization, if available and applicable.
User IDs can be used to restrict access for unregistered users, whitelist authenticated users so they don't hit rate/CAPTCHA limits, or grant access to certain pages for specific users.