98% of your website visitors leave without filling out a form. For a B2B company with 10,000 monthly visitors, that means roughly 9,800 qualified prospects disappear every month — people who found your site, evaluated your product, and left without raising their hand.
Website visitor identification technology closes this gap. Modern platforms can identify 50-70% of anonymous B2B visitors by name, email, company, LinkedIn profile, and the specific pages they visited. This guide explains exactly how it works, what data you get, and how to implement it.
Why 98% of Visitors Stay Anonymous
Most visitors never fill out a form because they are early in their research. They are:
- Comparing you to competitors before reaching out
- Evaluating pricing before they are ready to talk
- Checking your features against a checklist
- Not quite ready but warming up to your category
Traditional analytics tools (Google Analytics, Mixpanel) only tell you that these visitors existed — pageviews, sessions, bounce rates. They do not tell you who they are. Visitor identification closes this gap by resolving anonymous sessions to real people and companies.
The 4 Technical Methods Behind Visitor Identification
Identification Method Comparison
1. IP Address Resolution
Maps visitor IP ranges to companies and individuals using ISP/business records.
2. Device Fingerprinting
Combines browser, OS, screen, font, and network signals into a probabilistic ID.
3. Identity Graph Matching
Cross-references device/IP signals against databases of 250M+ professional profiles.
4. First-Party Signals
Email link clicks, prior form submissions, and cookie matches from known contacts.
Method 1: IP Address Resolution
Every internet connection uses an IP address. Businesses typically use corporate IP ranges assigned to their company — often static addresses associated with office locations. IP resolution databases map these ranges to company names, sizes, and locations.
This method works well for identifying which company is visiting. For person-level identification, tools cross-reference the IP with their identity graph to match the IP to a specific individual who is known to work at that company and whose device signature matches.
Method 2: Device Fingerprinting
Device fingerprinting aggregates dozens of signals: browser type and version, operating system, screen resolution, installed fonts, timezone, language settings, and network characteristics. Combined, these create a probabilistic identifier that persists across sessions — even when cookies are cleared.
Fingerprinting is particularly valuable for re-identifying returning visitors who cleared their cookies or switched browsers. When a fingerprint matches a previously identified user, the system can associate the new session with the known individual.
Method 3: Identity Graph Matching
This is the core of person-level identification. Identity graph providers maintain databases of 200–300 million professional profiles, cross-referenced against known device fingerprints and IP associations. When a visitor's signals match a profile in the graph, the tool can return that person's name, work email, LinkedIn URL, and job title.
Cursive's identity graph covers 250M+ B2B professionals. When a visitor hits your site, their device and IP signals are matched against this graph in real time — typically within 2–5 seconds of the first page load.
Method 4: First-Party Signal Matching
When a known contact clicks a link in your email, submits a form, or visits while logged in, their session is definitively tied to their identity. Visitor identification tools use these anchor events to enrich future sessions — if the same device later visits anonymously, the system can still identify them.
What Data Do You Get?
When a visitor is successfully identified, you typically receive:
Person-Level Data
- • Full name
- • Work email address
- • LinkedIn profile URL
- • Job title and seniority
- • Phone number (when available)
Company Data
- • Company name
- • Employee count
- • Industry and vertical
- • Annual revenue (estimated)
- • Tech stack signals
Visit Behavior
- • Pages visited (with timestamps)
- • Time on page
- • Pricing page visits
- • Demo/trial page views
- • Return visit history
Intent Signals (Cursive)
- • Topics actively researching
- • Competitor pages viewed
- • Content category interest
- • Intent score / urgency rating
- • Active buying window signal
Is It Legal? Privacy Compliance Explained
B2B visitor identification is legal under GDPR, CCPA, and CASL when implemented correctly. The key distinction: tools like Cursive identify business professionals acting in their professional capacity — not consumers in personal contexts. This carries a lower regulatory burden.
Privacy Compliance Checklist
How to Set Up Visitor Identification: Step-by-Step
Step 1: Choose a Tool
Select a visitor identification platform based on: identification rate (target 60%+), data quality (person-level vs. company-only), CRM integrations, and pricing. Cursive identifies 70% of B2B visitors at $1,000/month with direct CRM sync.
Step 2: Install the Tracking Snippet
Every visitor identification tool provides a JavaScript snippet. Install it in the <head> tag of every page on your site. The fastest method is via Google Tag Manager — add a new Custom HTML tag, paste the snippet, and fire it on All Pages.
Verify installation: open your browser dev tools, go to the Network tab, and look for requests to the tool's tracking domain. If you see them, the snippet is firing.
Step 3: Connect Your CRM
Configure your CRM integration so identified visitors automatically create or update contact records. For Salesforce: use the native Cursive-Salesforce connector to push identified leads to a designated lead queue with all visit data attached. For HubSpot: contacts are created automatically with timeline activities showing each page visited.
Step 4: Set Up Routing Rules
Not every identified visitor should go to the same rep. Configure routing rules based on: company size (enterprise vs. SMB), industry, geography, or whether the account is already in your CRM. Cursive supports round-robin, territory-based, and account-based routing.
Step 5: Build Your First Workflow
The highest-value workflow is simple: when a visitor hits your pricing page, immediately identify them and send a personalized email within 5 minutes. Cursive automates this end-to-end — no manual steps required. This single workflow typically generates 10–20% of your pipeline from existing traffic.
Identification Rate Benchmarks by Traffic Type
| Traffic Type | ID Rate | Notes |
|---|---|---|
| Corporate office traffic | 75–85% | Static business IPs, strong identity graph matches |
| Remote workers (VPN) | 40–55% | VPNs mask IPs; fingerprinting still works |
| Mobile/cellular | 30–45% | Dynamic IPs; fingerprinting is primary method |
| Consumer/residential | 10–25% | Not in B2B identity graphs; lower priority |
| Paid ad traffic (B2B) | 60–70% | High overlap with B2B identity databases |
| Organic search (B2B) | 55–70% | Similar to overall B2B average |
Visitor ID vs. Traditional Lead Generation
Traditional Lead Gen
- Cost per lead$50–$500
- Lead intentUnknown (cold list)
- PersonalizationGeneric
- TimingWhenever you reach out
- Coverage2–5% of ICP traffic
Visitor Identification (Cursive)
- Cost per lead$2–$20
- Lead intentHigh (visited your site)
- PersonalizationPages they viewed
- TimingWithin minutes of visit
- Coverage70% of B2B traffic
Top Visitor Identification Tools Compared (2026)
| Tool | ID Level | ID Rate | Starting Price | Best For |
|---|---|---|---|---|
| CursiveTop Pick | Person + Company | 70% | $1,000/mo | Intent-first B2B teams |
| RB2B | Person (LinkedIn) | 50–60% | $79/mo | LinkedIn-first outreach |
| Warmly | Person + Company | 50–60% | $700/mo | Signal-based routing |
| Leadfeeder | Company only | ~70% | $139/mo | Company-level ABM |
| Albacross | Company only | ~65% | $299/mo | EU-focused companies |
| Demandbase | Person + Company | 55–65% | $50k+/yr | Enterprise ABM |
FAQ: Identifying Anonymous Website Visitors
Can you identify 100% of visitors?
No. The practical ceiling is about 70–75% for B2B traffic. The remaining 25–30% includes VPN users with masked IPs, individuals not in B2B identity databases (students, researchers, job seekers), and consumers visiting from personal devices. Focus on maximizing the B2B segment — this is where your buyers are.
Does visitor identification replace form fills?
No — forms are still valuable for capturing purchase intent signals. But visitor identification captures the 90%+ of qualified prospects who will never fill out a form. The two work together: forms provide high-intent leads, visitor ID surfaces the much larger pool of anonymous interested buyers.
What happens after I identify a visitor?
The most effective workflow: send a personalized email within 5–15 minutes of the visit referencing the specific pages they viewed. Response rates for behavior-personalized emails are 3–5x higher than cold outreach. Cursive automates this full loop — identification, enrichment, email generation, and send.
