Your IP | 3.237.31.191 |
City | Ashburn |
Region | Virginia (VA) |
Country | United States of America |
Country Code | US |
ISP | Amazon.com |
Latitude | 39.0469 |
Longitude | -77.4903 |
Welcome to My IP Address. This tool prepares a short report for you that identifies your public IP address. We have augmented the report with geolocation data from publicly available databases. Feel free to take a look around to educate yourself on IP addresses and learn more about what this tool can do for you.
IP stands for Internet Protocol. On IP networks, addresses are numbers that are assigned to network devices like computers and servers. Addresses can be broken up into segments that can specify the structure of the networks that contain the IP addresses. Network technicians can address entire networks by splitting IP address ranges along binary bit fields.
For example, the common representation of the form 1.2.3.4 uses four individual bit fields of a size one byte each. 1.0.0.0 would address the class A network, 1.2.0.0 would address the class B network and 1.2.3.0 would address the class C network. Networks can also be split along non-byte boundaries. To learn more about what the numbers in IP addresses mean, take a look at how decimal and binary numbers are represented.
Your IP address is usually assigned to you by your ISP. If you have an internal network, you may have an internal IP address that exists only on your private network. These internal IP addresses often have the form 10.0.*.* or 192.168.*.*. They are considered non-routable and are unique only in the context of your network. Other networks may use non-routable addresses to represent other computers on their networks.
If you have a private IP address, the IP address shown here will be the front-facing IP address of your network. It could belong to a router or a proxy server.
IP addresses can change, but most do not change very often. In some network configurations, computers store their own IP addresses in their configuration data, and they remain the same unless the computer settings are altered with a new IP address. Computers with IP addresses assigned in this way have static IP addresses.
Many networks assign IP addresses using first-come, first-served logic and assign a vacant IP address every time a computer joins the network. Dynamic IP addresses are IP addresses that are maintained in a central location and given to computers on request. Some networks have both dynamic IP addresses and static IP addresses.
Some computers have fixed IP addresses that are configured on a central server or network appliance. Technically, these are dynamic IP addresses, but some people call them static IP addresses anyway. The IP addresses can be assigned using the computers' hardware MAC addresses, which are unique ID numbers given to network interfaces by the manufacturers. Unlike IP addresses, MAC addresses cannot be changed except on a temporary basis.
When you take your computer to another network, your computer's IP address will be assigned by that network.
Some networks can only be accessed by IP addresses meeting certain criteria. IP addresses should not be used by alone for secure authorization, but they can be used to boost security as part of a formula that validates sessions or grants access to remote computing resources.
Whenever a computer makes a request to a web server, it sends data packets to that server containing the details of the request. Part of the packet header contains the IP address of the computer that made the request. The web server uses the IP address for many purposes, including session validation and figuring out where to send web pages and other data.
My IP Address extracted your IP address from the web request made by your browser. The IP address you see in the report above is the IP address that was contained in the request when it reached our servers.
We used a technique called geolocation to link your IP address to a latitude and longitude. The latitude and longitude calculations are approximate; very precise information on your location can usually be derived from your IP address using specialized databases and computer hardware, but the geolocation data that we display publicly on this website contains blocks of IP addresses assigned to pools, with each pool covering a geographical area. The latitude and longitude that you see on this report represent an average latitude and longitude based on the pool that contains your IP address.
IP address geolocation is often used for flagging possible credit card fraud and other types of nefarious activity. Some websites use it to guess what language you might speak or to provide services customized by your location. Others use it for legal purposes such as verifying national jurisdiction or assigning sales tax. Law enforcement personnel sometimes use it to find criminals.
If you have a dynamic IP address, your IP address may change if you disconnect your Internet connection and then reconnect it. If that doesn't work, you can call your ISP and ask them to change it.
If you have a static IP address, you can change your IP address in your computer's settings. Be aware that you can't just change your static IP address arbitrarily and expect the new one to work; your new IP address must be suitable for your network configuration.
Many tools exist for using another network's Internet connection to conduct network activities. These tools have a variety of purposes, from keeping data secure to protecting anonymity to testing, troubleshooting, and debugging. You can use them to see what your website looks like from another country or from the outside of a corporate network. My Ip Address is particularly useful for testing purposes. You can use it to gain insight into network operations when using tools to make TCP connections using another network's Internet connection.
Some of these tools include:
Proxy servers are network appliances that receive connections from one or more computers and then forward them to web servers. They have many uses, such as letting library users access library networks from home and accessing networks through firewalls. They can also be used to throttle network connections or to engage in monitoring for debugging and development. Some proxy servers can handle secure HTTPS requests and non-web connections, and some cannot. Unlike VPNs, proxy servers are limited in that they can only handle TCP connections.
Open proxies are proxy servers that do not require a password to use. You can download lists of them from Internet forums or buy them from vendors. Open proxies are controversial because sometimes they are used by malevolent actors to engage in antisocial activities such as hacking and spamming.
Many security organizations maintain blacklists of open proxy servers. Email servers, chat servers, and blogs check the blacklists and usually reject connections from publicly-known open proxies to guard against spam and phishing attacks.
You should be careful using open proxy servers because there is no way of knowing if they are monitored by hackers. Many system administrators take efforts to block all open proxy server access to their websites. In conjunction with other tools, My IP Address can be used for evaluating proxy servers and debugging connections that run through them.
A VPN is a virtual network, literally a network that runs on top of another network using abstractions that resemble hardware network protocols. When logged into a VPN, your computer has at least two IP addresses: the IP address assigned by the local network and the IP address assigned by the VPN.
When your computer makes connections over the VPN, it forwards the connections over your Internet connection to a VPN server, which decodes connection requests and places them on its network, almost as if your computer were physically connected to the network. My IP Address can tell you your forward-facing IP address through a VPN with access to the Internet. The tool can also help detect whether your web browser is using the right network interface.
If you visit a library or Internet cafe while traveling, your computer will be assigned an IP address. Then, when you access the Internet, your network requests will be marked with the IP address of the coffee shop or library's firewall. After data is sent to the firewall on your behalf, the firewall will check to make sure that you requested the data and then forward it to your computer. You can use My IP Address to identify the firewall's external IP address that is presented to other websites to help resolve issues.
Some online applications will browse to other websites on your behalf, using their own IP addresses. These are often referred to as "web proxies" and function very differently from proxy servers. You find them pretty easily with an Internet search.
The SSH program, available under Unix and similar operating systems, will allow you to forward connections through firewalls, into private networks, and out of private networks with the IP address of a remote server. SSH tunneling has tremendous flexibility and can direct connections to or from anywhere that SSH can connect.
The Internet Protocol version 4 is a system that specifies how to transfer information between packet-switched computer networks. It splits data into blocks called datagrams and transfers datagrams from sources to destinations. Each source and each destination is identified by a 32-bit number, called the IP address.
The Internet Protocol is not designed to do much more. It doesn't have any fancy error checking or data recovery built in, and it provides no special means of controlling the flow of data. It does not structure the data in any way except to split it into packets and put them in order. Though the Internet Protocol is very simple, all Internet networking protocols are built on top of it.
The history of the Internet Protocol dates back to 1974 when two authors, Vint Cerf and Bob Kahn, published a paper titled "A Protocol for Packet Network Intercommunication." In this paper, they detailed a method for linking networks together and communicating between computers on different networks. The Department of Defense used their ideas to link some of their networks using what they called the Department of Defense (DoD) Internet Model and the Internet Protocol Suite.
As the Internet grew, academic networks were connected to DoD networks. Changes were made to Kahn and Cerf's original scheme. The low-level, inter-network data packet communication model came to be called Internet Protocol. In 1981, RFC 791 set down the standards for Internet Protocol version 4, which was used to build most of the modern Internet. IP version 6 was developed and implemented on a subset of Internet hosts, yet IP version 4 remains ubiquitous, addressing the overwhelming majority of Internet hosts.
And now, we present the My IP Address tool to help you discover the external address you display to web servers.