Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpgLike your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

How to Determine Your IP Address
To understand what your IP address is all about, you first have to know what it is. Doing this is as simple as visiting the website Tracemyip.com. Upon visiting this URL, the site will display a string of numbers that may appear random, but they actually serve an important purpose as far as your Internet browsing is concerned.

What’s an IP Address Anyway?
Gartner’s IT Glossary defines an IP (Internet Protocol) address as such:

A unique number assigned by an Internet authority that identifies a computer on the Internet. The number consists of four groups of numbers between 0 and 255, separated by periods (dots). For example, 195.112.56.75 is an IP address.

From the perspective of a business owner who’s overseeing a network full of sensitive data, IP addresses serve as a valuable security component because they inform you who is accessing your data, or at least, what computer the address originates from. Like footprints from a walk, all traffic on your network leaves behind IP addresses in a log. Therefore, checking your network activity logs is an easy way to spot if you’ve been visited by someone that doesn’t belong.

How to Find Out Where an IP Address is From
For example, an IP address can trace a computer back to its country of origin. Red flags include IP addresses originating from:

  • Countries with a reputation for harboring hackers.
  • Your competition.
  • Former employees.
  • Foreign country that your business has absolutely nothing to do with.

To find out information like this, you can easily copy and paste the IP address in question into a form found here: WhatIsMyIPAddress.com/ip-lookup.

A free online tool like this won’t provide you with super specific information about the IP Address, like a street address or user name, but it will at least narrow it down to what country or region the IP Address originates from, as well as:

  • The ISP and organization's name.
  • The IP's host name.
  • The city (a best guess).
  • The latitude and longitude of the location (a best guess).
  • The area code for that region.
  • Any known services running on that IP.

Why You Should Care about IP Addresses
Of course, hackers have caught on to the fact that they can be tracked down by their IP addresses, which is why high-level hackers go to extra lengths to bounce their signal from different routers around the globe before accessing your network. Using this method, a hacker can potentially use an IP address from Saratoga Springs and the Tri-State area, while in Timbuktu.

Therefore, it’s always a good move to give your network logs a thorough look over for suspicious IP addresses. Although, to catch sneaky hackers like in the above example, you will need the help of a more comprehensive security solution, like having Evolve IT monitor your network for suspicious activity, along with an enterprise-level firewall solution.

After determining that an IP address is a risk, we can then blacklist it so it can no longer access your network. In fact, with a network security tool like a UTM solution, you can even block IP addresses from entire countries that are known to be hotbeds for hackers. For additional help with locking down your network so that only approved IP addresses can access it, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 04 May 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Computer Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Hardware Network Security Ransomware Business Continuity Disaster Recovery Communication Hacking WiFi Facebook Operating System Microsoft Office The Internet of Things Office Social Media Backup Apps Bandwidth Website Data Windows Experience Employer-Employee Relationship Mobile Device Management Two-factor Authentication Money History Network Small Business Phishing Managed Service Provider App Outlook Mobile Computing Big Data communications Smartphones Safety Wireless Technology Unified Threat Management Android Quick Tips Apple Best Practice Firewall Alert Content Filtering Cybercrime Networking Data storage Deep Learning Cryptocurrency Laptop BDR Competition IBM Presentation Entrepreneur Google Docs Education Vendor Management Cleaning Domains Holiday Black Market YouTube Processors Hacker Staffing Office Tips LiFi Monitors BYOD Downtime Passwords Streaming Media Application Help Desk Customer Service Disaster Micrsooft Visible Light Communication Displays Business Growth Data Management Advertising Recovery Router Robot End of Support Society Office 365 Sports Google Wallet Spam Information Technology Analytics Running Cable Saving Money Writing Windows 8 Lithium-ion battery Internet of Things intranet IT Services Hosted Solution Windows XP Artificial Intelligence Documents Tech Support Compliance Social Networking Public Speaking Drones Social IP Address Virtualization Retail Printer Browser Wireless Government Virtual Desktop Unified Communications Augmented Reality Securty Keyboard Managed IT services Document Management Search Encryption User Hard Drives VoIP Law Enforcement SaaS Remote Computing Shortcut Bluetooth Proactive IT DDoS Cortana Heating/Cooling Word Network Congestion Automation Save Money Memory Music Business Management
QR-Code