ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpgLike your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

How to Determine Your IP Address
To understand what your IP address is all about, you first have to know what it is. Doing this is as simple as visiting the website Tracemyip.com. Upon visiting this URL, the site will display a string of numbers that may appear random, but they actually serve an important purpose as far as your Internet browsing is concerned.

What’s an IP Address Anyway?
Gartner’s IT Glossary defines an IP (Internet Protocol) address as such:

A unique number assigned by an Internet authority that identifies a computer on the Internet. The number consists of four groups of numbers between 0 and 255, separated by periods (dots). For example, 195.112.56.75 is an IP address.

From the perspective of a business owner who’s overseeing a network full of sensitive data, IP addresses serve as a valuable security component because they inform you who is accessing your data, or at least, what computer the address originates from. Like footprints from a walk, all traffic on your network leaves behind IP addresses in a log. Therefore, checking your network activity logs is an easy way to spot if you’ve been visited by someone that doesn’t belong.

How to Find Out Where an IP Address is From
For example, an IP address can trace a computer back to its country of origin. Red flags include IP addresses originating from:

  • Countries with a reputation for harboring hackers.
  • Your competition.
  • Former employees.
  • Foreign country that your business has absolutely nothing to do with.

To find out information like this, you can easily copy and paste the IP address in question into a form found here: WhatIsMyIPAddress.com/ip-lookup.

A free online tool like this won’t provide you with super specific information about the IP Address, like a street address or user name, but it will at least narrow it down to what country or region the IP Address originates from, as well as:

  • The ISP and organization's name.
  • The IP's host name.
  • The city (a best guess).
  • The latitude and longitude of the location (a best guess).
  • The area code for that region.
  • Any known services running on that IP.

Why You Should Care about IP Addresses
Of course, hackers have caught on to the fact that they can be tracked down by their IP addresses, which is why high-level hackers go to extra lengths to bounce their signal from different routers around the globe before accessing your network. Using this method, a hacker can potentially use an IP address from Arizona, while in Timbuktu.

Therefore, it’s always a good move to give your network logs a thorough look over for suspicious IP addresses. Although, to catch sneaky hackers like in the above example, you will need the help of a more comprehensive security solution, like having ClearView IT monitor your network for suspicious activity, along with an enterprise-level firewall solution.

After determining that an IP address is a risk, we can then blacklist it so it can no longer access your network. In fact, with a network security tool like a UTM solution, you can even block IP addresses from entire countries that are known to be hotbeds for hackers. For additional help with locking down your network so that only approved IP addresses can access it, give us a call at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 05 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Cybersecurity Phishing IT Services Backup Ransomware Data Backup communications Smartphone Small Business Microsoft Office Upgrade Smartphones Mobile Devices Network Managed IT Services Data Recovery Communication Productivity Quick Tips Social Media Users VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Passwords Holiday Disaster Recovery Covid-19 Apps Managed Service Windows 10 IT Support Browser Miscellaneous Cloud Computing Outsourced IT Data Management Remote Work Managed Service Provider Internet of Things Government Saving Money Operating System Gadgets Networking Windows Artificial Intelligence Workplace Strategy Managed IT services Bandwidth Encryption App Virtualization Blockchain Business Technology Spam WiFi Information Remote Mobile Device Management Server Employee/Employer Relationship Apple Information Technology Gmail History Office Two-factor Authentication Office 365 Budget Cybercrime Data Security BDR Big Data Health Analytics Wi-Fi Conferencing Access Control Vendor Compliance Patch Management Cost Management Remote Monitoring Employer-Employee Relationship Voice over Internet Protocol Help Desk Document Management Hacking Save Money IT Management Training Remote Computing Hacker Applications Vendor Management Hard Drive Augmented Reality Word Vulnerabilities IBM Search... Best Practice Website Project Management Legal Mobile Office Retail Alert Data storage Managed Services Data loss Hiring/Firing Outlook Password Money BYOD Customer Service Unified Threat Management Computing Firewall Mobile Computing iPhone Education Paperless Office Cortana Marketing Antivirus Running Cable Content Filtering Twitter Maintenance Monitoring Healthcare Law Enforcement End of Support Storage Router Remote Workers Printer Websites The Internet of Things Windows 7 YouTube Free Resource Mobility Meetings How To Travel User Virtual Reality Google Maps Laptop Social Engineering Windows 11 Scam Cryptocurrency Black Market Cleaning VPN Chrome Robot Social Update Sports SaaS Data Breach DDoS Taxes Presentation Disaster Specifications Cooperation IT Consultant Chromebook Drones Video Conferencing Automobile Virtual Machines Customer Relationship Management Lithium-ion battery Computer Repair Multi-factor Authentication Physical Security Co-Managed IT How To Entertainment Professional Services Microchip Processors Flexibility Saving Time Start Menu Downloads Managed Services Provider Computer Care Hack Identity Theft Computers Bitcoin Notifications Vulnerability Virtual Private Network Telephone Unified Communications Software as a Service Data Protection Current Events HIPAA Google Docs Bluetooth Wireless Technology Distributed Denial of Service eWaste Solutions Excel Office Tips Memory Private Cloud Images 101 Downtime Integration Display Safety Virtual Assistant Virtual Desktop Politics Tech Terms Settings Employees Experience Machine Learning Avoiding Downtime Managed IT Digital PowerPoint Holidays Administration Solid State Drive Processor Username Access Virtual Machine Books Cables Language Reviews Society Time Management Optimization Startup Public Cloud Freedom of Information Teamwork email scam Phone System 2FA Navigation Addiction Data Storage Visible Light Communication Spyware Hypervisor Mobile Security Reading Point of Sale Monitors Audit Competition Shopping User Tip Windows 8 Legislation File Sharing Recovery Medical IT News SQL Server Paperless Evernote Shortcuts Redundancy Network Management Displays PCI DSS Advertising Cache LiFi Licensing Relocation Entrepreneur Application Computer Accessories Work/Life Balance Gig Economy Proxy Server Tech Support Unified Threat Management Humor Emails Workers Documents Fake News Azure Computing Infrastructure Business Intelligence Business Communications Be Proactive Internet Service Provider Service Level Agreement Printing Regulations Compliance Management Managed IT Service Device security CCTV In Internet of Things Touchscreen Memes Wireless Headphones Securty Microsoft Excel Business Cards Computer Malfunction Domains Hacks Human Resources Tech Workplace Strategies Network Congestion Emergency Net Neutrality Going Green Writing Financial Data Error Vendor Mangement Reliable Computing Risk Management Bookmark IT Samsung Uninterrupted Power Supply Piracy Webcam Google Apps Term Download Telework Business Mangement HTML Troubleshooting Scalability Administrator Public Speaking Text Messaging Smartwatch Browsers Proactive IT Communitications Nanotechnology Tablets Microsoft 365 Streaming Media Software License Bring Your Own Device Google Play Smart Technology Procurement Upload Google Calendar FinTech Social Network Supercomputer Keyboard Hard Drives CES Data Analysis Music Virus IT Assessment Screen Reader Trends Value Mobile Technology Motion Sickness intranet Security Cameras Supply Chain Management Comparison Organization Customer Resource management Google Drive Cyber security Devices Wireless Business Owner Shortcut Tip of the week Botnet Heating/Cooling Environment Fileless Malware Smart Devices Remote Working Gamification Corporate Profile Windows XP Company Culture Rental Service Social Networking Supply Chain Micrsooft Knowledge Flash Television AI Telephone System Telephony Trend Micro Regulations Employer Employee Relationship Transportation Telephone Systems Digital Security Cameras Directions Business Growth Electronic Health Records Backup and Disaster Recovery Cabling Content Tablet Wasting Time Desktop G Suite Workplace Mouse Electronic Medical Records VoIP eCommerce Accountants Tracking Inbound Marketing Modem Banking Videos Google Wallet Surveillance Database Managing Costs Web Server Messenger Scams Deep Learning SharePoint Health IT Equifax Digital Payment Staffing SSID Electronic Payment Employer/Employee Relationships Hard Drive Disposal IP Address Business Metrics Media Hosted Solution Development Tactics Worker

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?