Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Protect Your Network By Blacklisting Malicious IP Addresses

b2ap3_thumbnail_know_your_ip_400.jpgLike your fingerprint, your computer’s IP address holds the key to your identity. Okay, it may not be as unique as your fingerprint, and you may actually use multiple IP addresses every day, but still, your IP address says a lot about you. What do you need to know about your IP address?

How to Determine Your IP Address
To understand what your IP address is all about, you first have to know what it is. Doing this is as simple as visiting the website Tracemyip.com. Upon visiting this URL, the site will display a string of numbers that may appear random, but they actually serve an important purpose as far as your Internet browsing is concerned.

What’s an IP Address Anyway?
Gartner’s IT Glossary defines an IP (Internet Protocol) address as such:

A unique number assigned by an Internet authority that identifies a computer on the Internet. The number consists of four groups of numbers between 0 and 255, separated by periods (dots). For example, 195.112.56.75 is an IP address.

From the perspective of a business owner who’s overseeing a network full of sensitive data, IP addresses serve as a valuable security component because they inform you who is accessing your data, or at least, what computer the address originates from. Like footprints from a walk, all traffic on your network leaves behind IP addresses in a log. Therefore, checking your network activity logs is an easy way to spot if you’ve been visited by someone that doesn’t belong.

How to Find Out Where an IP Address is From
For example, an IP address can trace a computer back to its country of origin. Red flags include IP addresses originating from:

  • Countries with a reputation for harboring hackers.
  • Your competition.
  • Former employees.
  • Foreign country that your business has absolutely nothing to do with.

To find out information like this, you can easily copy and paste the IP address in question into a form found here: WhatIsMyIPAddress.com/ip-lookup.

A free online tool like this won’t provide you with super specific information about the IP Address, like a street address or user name, but it will at least narrow it down to what country or region the IP Address originates from, as well as:

  • The ISP and organization's name.
  • The IP's host name.
  • The city (a best guess).
  • The latitude and longitude of the location (a best guess).
  • The area code for that region.
  • Any known services running on that IP.

Why You Should Care about IP Addresses
Of course, hackers have caught on to the fact that they can be tracked down by their IP addresses, which is why high-level hackers go to extra lengths to bounce their signal from different routers around the globe before accessing your network. Using this method, a hacker can potentially use an IP address from Saratoga Springs and the Tri-State area, while in Timbuktu.

Therefore, it’s always a good move to give your network logs a thorough look over for suspicious IP addresses. Although, to catch sneaky hackers like in the above example, you will need the help of a more comprehensive security solution, like having Evolve IT monitor your network for suspicious activity, along with an enterprise-level firewall solution.

After determining that an IP address is a risk, we can then blacklist it so it can no longer access your network. In fact, with a network security tool like a UTM solution, you can even block IP addresses from entire countries that are known to be hotbeds for hackers. For additional help with locking down your network so that only approved IP addresses can access it, give us a call at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 29 April 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Network Security Ransomware Hardware Business Continuity Operating System Disaster Recovery Communication Hacking The Internet of Things WiFi Social Media Facebook Bandwidth Microsoft Office Office Backup Apps Website Wireless Technology Android Apple Employer-Employee Relationship Best Practice History Two-factor Authentication Alert Small Business Phishing Networking App Data storage Data Windows Experience Mobile Computing Big Data communications Safety Unified Threat Management Quick Tips Smartphones Mobile Device Management Money Network Managed Service Provider Firewall Outlook Content Filtering Cybercrime Tech Support Compliance Automation Competition Drones Social Memory Presentation Entrepreneur Printer Browser Domains Virtual Desktop Wireless Deep Learning Unified Communications Securty BDR Hacker Document Management Encryption SaaS VoIP Vendor Management Application Law Enforcement Customer Service Cortana Proactive IT Monitors Network Congestion Save Money Router Music Office 365 Displays Saving Money Cryptocurrency Laptop Analytics IBM intranet Lithium-ion battery Education End of Support Google Docs Cleaning Holiday Processors Social Networking Black Market YouTube LiFi Staffing Writing Public Speaking Office Tips Virtualization BYOD Downtime IP Address Help Desk Passwords Streaming Media Visible Light Communication Disaster Government Micrsooft Keyboard Augmented Reality Search User Business Growth Data Management Advertising Recovery Retail Hard Drives Robot Shortcut Society Sports Remote Computing DDoS Google Wallet Spam Information Technology Running Cable Managed IT services Heating/Cooling Word Windows 8 Internet of Things IT Services Hosted Solution Windows XP Artificial Intelligence Documents Bluetooth Business Management
QR-Code