IPaddress

Your IP Address

What you should know
Stop digital profiling

IP Address Defined

An IP address is a unique address that identifies a device on the internet. Think of it like a home address for your computer or connected device. IP stands for “Internet Protocol”, which is tech talk for the way data is sent back & forth over the internet.In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information & make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, & websites. IP addresses provide a way of doing so & form an essential part of how the internet works.
 
Plainly stated, your IP address identifies where you are when you access the internet. All the activity from an IP address is gathered & put in a file by big tech companies. Every website visited, every purchase made, every item or pic viewed, etc etc…If you allow big tech companies to track your every move online, you’re essentially letting them create an entire digital profile of you & your family without even realizing it. This information could then be used for any number of reasons, some innocuous, some potentially malicious.
 
Therefore, using a VPN service allows you to use a different IP address that is not attached to you. This makes it far more difficult for any entity to create a digital profile, track you, hack your personal info, or engage in any number of other tech intrusions. If you’d like, you can continue reading, but this is the short definition.

What is an IP?

An IP address is a string of numbers separated by periods. IP addresses are expressed as a set of four numbers — an example address might be 192.158.1.38. Each number in the set can range from 0 to 255. So, the IP address range goes from 0.0.0.0 to 255.255.255.255.

IP addresses are not random. They are mathematically produced & allocated by the Internet Assigned Numbers Authority (IANA), a division of the Internet Corporation for Assigned Names & Numbers (ICANN). ICANN is a non-profit organization that was established in the United States in 1998 to help maintain the security of the internet & allow it to be usable by all. Each time anyone registers a domain on the internet, they go through a domain name registrar, who pays a small fee to ICANN to register the domain.

How do IP addresses work

If you want to understand why a particular device is not connecting in the way you would expect or you want to troubleshoot why your network may not be working, it helps understand how IP addresses work.

Internet Protocol works the same way as any other language, by communicating using set guidelines to pass information. All devices find, send, & exchange information with other connected devices using this protocol. By speaking the same language, any computer in any location can talk to one another.

The use of IP addresses typically happens behind the scenes. The process works like this:

  1. Your device indirectly connects to the internet by connecting at first to a network connected to the internet, which then grants your device access to the internet.
  2. When you’re home, that network will probably be your Internet Service Provider (ISP). At work, it will be your company network.
  3. Your IP address is assigned to your device by your ISP.
  4. Your internet activity goes through the ISP, & they route it back to you using your IP address. Since they are giving you access to the internet, it is their role to assign an IP address to your device.
  5. However, your IP address can change. For example, turning your modem or router on or off can change it. Or you can contact your ISP, & they can change it for you.
  6. When you are out & about – for example, traveling – & you take your device with you, your home IP address does not come with you. This is because you will be using another network (Wi-Fi at a hotel, airport, or coffee shop, etc.) to access the internet & will be using a different (& temporary) IP address, assigned to you by the ISP of the hotel, airport or coffee shop.

As the process implies, there are different types of IP addresses, which we explore below.

Types of IP addresses

There are different categories of IP addresses, & within each category, different types.

Consumer IP addresses

Every individual or business with an internet service plan has two types of IP addresses: their private IP addresses & their public IP address. The terms public & private relate to the network location — that is, a private IP address is used inside a network, while a public one is used outside a network.

Private IP addresses

Every device that connects to your internet network has a private IP address. This includes computers, smartphones, & tablets, but also any Bluetooth-enabled devices like speakers, printers, or smart TVs. With the growing internet of things, the number of private IP addresses you have at home is probably growing. Your router needs a way to identify these items separately, & many items need a way to recognize each other. Therefore, your router generates private IP addresses that are unique identifiers for each device that differentiate them on the network. Think of it like a serial number for the internet. This way the internet isn’t confused by all the different devices accessing its platform, rather it can tell which is which.

Public IP addresses

A public IP address is the primary address associated with your whole network. While each connected device has its own IP address, they are also included within the main IP address for your network. As described above, your public IP address is provided to your router by your ISP. Typically, ISPs have a large pool of IP addresses that they distribute to their customers. Your public IP address is the address that all the devices outside your internet network will use to recognize your network. Under the umbrella of your public IP address exists all the private IP addresses assigned to all the devices that connect to the internet.

Public IP addresses

Public IP addresses come in two forms – dynamic & static.

Dynamic IP addresses

Dynamic IP addresses change automatically and regularly. ISPs buy a large pool of IP addresses & assign them automatically to their customers. Periodically, they re-assign them & put the older IP addresses back into the pool to be used for other customers. The rationale for this approach is to generate cost savings for the ISP. Automating the regular movement of IP addresses means they don’t have to carry out specific actions to re-establish a customer’s IP address if they move home, for example. There are security benefits, too, because a changing IP address makes it harder for criminals to hack into your network interface.

Static IP addresses

In contrast to dynamic IP addresses, static addresses remain consistent. Once the network assigns an IP address, it remains the same. Most individuals & businesses do not need a static IP address, but for businesses that plan to host their own server, it is crucial to have one. This is because a static IP address ensures that websites & email addresses tied to it will have a consistent IP address — vital if you want other devices to be able to find them consistently on the web.

This leads to the next point – which is the two types of website IP addresses.

There are two types of website IP addresses

For website owners who don’t host their own server, & instead rely on a web hosting package – which is the case for most websites – there are two types of website IP addresses. These are shared & dedicated.

Shared IP addresses

Websites that rely on shared hosting plans from web hosting providers will typically be one of many websites hosted on the same server. This tends to be the case for individual websites or SME websites, where traffic volumes are manageable, & the sites themselves are limited in terms of the number of pages, etc. Websites hosted in this way will have shared IP addresses.

Dedicated IP addresses

Some web hosting plans have the option to purchase a dedicated IP address (or addresses). This can make obtaining an SSL certificate easier & allows you to run your own File Transfer Protocol (FTP) server. This makes it easier to share & transfer files with multiple people within an organization & allow anonymous FTP sharing options. A dedicated IP address also allows you to access your website using the IP address alone rather than the domain name — useful if you want to build & test it before registering your domain.

How to look up IP addresses

The simplest way to check your router’s public IP address is to search “What is my IP address?” on Google. Google will show you the answer at the top of the page.

Other websites will show you the same information: they can see your public IP address because, by visiting the site, your router has made a request & therefore revealed the information. Sites like WhatIsMyIP.com and IPLocation go further by showing the name of your ISP & your city.

Generally, you will only receive an approximation of location using this technique — where the provider is, but not the actual device location. If you are doing this, remember to log out of your VPN too. Obtaining the actual physical location address for the public IP address usually requires a search warrant to be submitted to the ISP.

IP address security threats

Cybercriminals can use various techniques to obtain your IP address. Two of the most common are social engineering & online stalking.

Attackers can use social engineering to deceive you into revealing your IP address. For example, they can find you through Skype or a similar instant messaging application, which uses IP addresses to communicate. If you chat with strangers using these apps, it is important to note that they can see your IP address. Attackers can use a Skype Resolver tool, where they can find your IP address from your username.

Online stalking

Criminals can track down your IP address by merely stalking your online activity. Any number of online activities can reveal your IP address, from playing video games to commenting on websites & forums.

Once they have your IP address, attackers can go to an IP address tracking website, such as whatismyipaddress.com, type it in, & then get an idea of your location. They can then cross-reference other open-source data if they want to validate whether the IP address is associated with you specifically. They can then use LinkedIn, Facebook, or other social networks that show where you live, & then see if that matches the area given.

If a Facebook stalker uses a phishing attack against people with your name to install spying malware, the IP address associated with your system would likely confirm your identity to the stalker.

If cybercriminals know your IP address, they can launch attacks against you or even impersonate you. It is important to be aware of the risks & how to mitigate them. Risks include:

Tracking down your location

If they know your IP address, hackers can use geolocation technology to identify your region, city, & state. They only need to do a little more digging on social media to identify your home & potentially try to break in when they know you are away.

Directly attacking your network

Criminals can directly target your network & launch a variety of assaults. One of the most popular is a DDoS attack (distributed denial-of-service). This type of cyberattack occurs when hackers use previously infected machines to generate a high volume of requests to flood the targeted system or server. This creates too much traffic for the server to handle, resulting in a disruption of services. Essentially, it shuts down your internet. While this attack is typically launched against businesses & video game services, it can occur against an individual, though this is much less common. Online gamers are at particularly high risk for this, as their screen is visible while streaming (on which an IP address can be discovered).

Hacking into your device

The internet uses ports as well as your IP address to connect. There are thousands of ports for every IP address, & a hacker who knows your IP can try those ports to attempt to force a connection. For example, they could take over your phone & steal your information. If a criminal does obtain access to your device, they could install malware on it.

How to protect & hide your IP address

Hiding your IP address is a way to protect your personal information & online identity. The two primary ways to hide your IP address are:

  • Using a proxy server
  • Using a virtual private network (VPN)

A proxy server is an intermediary server through which your traffic is routed:

  • The internet servers you visit see only the IP address of that proxy server & not your IP address.
  • When those servers send information back to you, it goes to the proxy server, which then routes it to you.

A drawback of proxy servers is that some of the services can spy on you — so you need to trust it. Depending on which one you use, they can also insert ads into your browser.

VPN offers a better solution:

  • When you connect your computer – or smartphone or tablet – to a VPN, the device acts as if it is on the same local network as the VPN.
  • All your network traffic is sent over a secure connection to the VPN.
  • Because your computer behaves as if it is on the network, you can securely access local network resources even when you are in another country.
  • You can also use the internet as if you were present at the VPN’s location, which has benefits if you are using public Wi-Fi or want to access geo-blocked websites.

vTech Ninja’s Connect App is a VPN that protects you on public Wi-Fi, keeps your communications private, & ensures that you are not exposed to phishing, malware, viruses, & other cyber threats.

When should you use VPN

Using a VPN changes your IP address & redirects your traffic through a separate server, making it much safer for you online. Situations where you might use a VPN include:

When using public Wi-Fi

When using a public Wi-Fi network, even one that is password-protected, a VPN is advisable. If a hacker is on the same Wi-Fi network, it is easy for them to snoop on your data. The basic security that the average public Wi-Fi network employs does not provide robust protection from other users on the same network.

Using a VPN will add an extra layer of security to your data, ensuring you bypass the public Wi-Fi’s ISP & encrypting all your communication.

When you are traveling

If you are traveling to a foreign country – for example, China, where sites like Facebook are blocked – a VPN can help you access services that may not be available in that country.

The VPN will often allow you to use streaming services that you paid for & have access to in your home country, but they are not available in another because of international rights issues. Using a VPN can enable you to use the service as if you were at home. Travelers may also be able to find cheaper airfare when using a VPN, as prices can vary from region to region.

When you are working remotely

This is especially relevant in the post-COVID world, where many people are working remotely. Often employers require the use of a VPN to access company services remotely for security reasons. A VPN that connects to your office’s server can give you access to internal company networks & resources when you are not in the office. It can do the same for your home network while you are out & about.

When you just want some privacy

Even in the comfort of your own home, using the internet for everyday purposes, using a VPN can be a good idea. Whenever you access a website, the server you connect to logs your IP address & attaches it to all the other data the site can learn about you: your browsing habits, what you click on, how long you spend looking at a particular page. They can sell this data to advertising companies who use it to tailor ads straight to you. This is why ads on the internet sometimes feel oddly personal: it’s because they are. Your IP address can also be used to track your location, even when your location services are turned off. Using a VPN prevents you from leaving footprints on the web.

Don’t forget your mobile devices, either. They have IP addresses too, & you probably use them in a wider variety of locations than your home computer, including public Wi-Fi hotspots. It is advisable to use a VPN on your mobile when connecting to a network you may not fully trust.

Other ways to protect your privacy

Change privacy settings on instant messaging applications

Apps installed on your device are a major source of IP address hacking. Instant messaging & other calling apps can be used as a tool by cybercriminals. Using IM apps only allows direct connections from contacts & doesn’t accept calls or messages from people you don’t know. Changing your privacy settings makes it harder to find your IP address because people who don’t know you cannot connect with you.

Create unique passwords

Your device password is the only barrier that can restrict people from accessing your device. Some people prefer to stick to their devices’ default passwords, which makes them vulnerable to attack. Like all your accounts, your device needs to have a unique & strong password that is not easy to decode. A strong password contains a mix of upper- & lower-case letters, numerals, & characters. This will help to safeguard your device against IP address hacking.

Stay alert to phishing emails & malicious content

A high proportion of malware & device tracking software is installed via phishing emails. When you connect with any site, this provides the site with access to your IP address & device location, making it vulnerable to hacking. Be vigilant when opening emails from unknown senders & avoid clicking on links that could send you to unauthorized sites. Pay close attention to the emails’ content, even if they appear to come from well-known sites & legitimate businesses.

Use a VPN & keep your digital footprint out of big tech’s hands

Protect your identity, both from malicious intent & from companies looking to monetize your behavior. Whether you realize it or not, your online behavior has value & it’s being monitored, tracked, & aggregated in a file to benefit big tech & advertising platforms like social media companies.