Recent Articles
Phishing Email Red Flags and How To Recognize

As you've probably heard, phishing is one of the most often-used techniques hackers use to break into devices or computer systems. And as you've also probably heard, the best defense against phishing attacks is to use "common sense." But what does that actually look like?

Adware Explained and How it Works

Adware is short for "advertising-supported software." Essentially, it is software installed on your device that shows you unwanted advertisements, typically in the form of pop-up ads. It is not necessarily malicious - however, if you suspect your device has it, you should make sure it is removed.

See More Recent Articles

What Is My IP?® is the industry leader in providing REAL IP address information. We provide IP address tools that allow users to perform an Internet Speed Test, IP address lookup, proxy detection, IP Whois Lookup, and more. We have extensive tutorials that show users how to trace an email address, how to change IP addresses, and how to hide their IP information. Knowing your IP address is crucial for online gaming, tech support, using remote desktop connections, connecting to a security camera DVR, anonymity or even running an email server. If you’ve got questions about IP addresses and can’t find the answer on our site, feel free to post your question in our IP Address Q & A section.

What Is An IP Address?

This number is an exclusive number on all information technology devices (printers, routers, modems, etc) use which identifies and allows them the ability to communicate with each other on a computer network. [Read more...]

What Is IPv6?

IPv6 or Internet Protocol version 6 is the replacement for IPv4. An IPv6 address looks like this 2600:1005:b062:61e4:74d7:f292:802c:fbfd and an IPv4 addresses looks like this [Read more...] API

Our API (Application Programming Interface) gives you access to most of our tools programmatically. In order to access the API, you must be a Gold level member. Gold level accounts get 10 API keys. Each key is allowed 1,440 calls per day (1 per minute) for a total of 14,400 calls per day (10 per minute). [Read more...]

Speed Test

A broadband speed test can help you determine if you're getting the most bang for your buck with your ISP. You could be paying upwards of $50 dollars a month for access to the web from your ISP. Knowing exactly how fast your link actually is, will be an important step in identifying whether you are really getting value for your money.

IP Lookup

Your IP Location can be found using our IP Lookup tool. No IP Lookup tool is 100% accurate due to many different factors. Some of those factors include where the owner of the IP has it registered, where the agency that controls the IP is located, proxies, cellular IPs, etc.

Change IP

There are MANY methods to change your IP address. Some methods will work for you but may not work for someone else and vice versa. We're going to cover how to change your IP address in Windows 2000, XP, 2003, and Vista using command prompt. You may be asking "What if I have a static IP Address".

Recent Articles

Online Privacy for Seniors

Online privacy for seniors is incredibly important, but it’s difficult to stay private in an ever-changing digital world. It’s easier now than ever to get caught up in scams, lose your bank account information, or have your identify stolen.

Learn Privacy From Hackers While You Are Online

Malicious actors and governments have easy access to see our private communications and habits through our use of smartphones, tablets, laptops, or any other device connected to the internet. Hackers do this by using various tools and techniques.

Spyware Explained and How it Works

Since the inception of the internet, bad actors have taken advantage of security holes for criminal purposes. To clarify, spyware is one of the oldest and most common threats that we all face on the internet.

Has Your Device Been Hacked?

With so much of our information housed on smart devices, it's no surprise that hackers are targeting our phones to steal our data. From text messages and emails to calls and social media, smartphones are the ideal gateway to our sensitive information.

Ordering Food Online for Beginners

Ordering food online as takeout from a restaurant to your home has steadily become one of the most popular meal options. The convenience of having a meal delivered right to your house is hard to beat, especially during the COVID-19 pandemic. But just because everyone is doing it doesn’t mean that it’s easy!

Avoid Being Catfished: Warning Signs and Safety Tips

A catfish may be looking to lure someone under the guise of being a friend or romantic interest, or they may be looking for money or assistance through financial means. Whatever the case, here are the warning signs that can help you avoid being catfished online.

Protect Yourself With Two-Factor Authentication

Two-Factor authentication simply adds a second step to the log-in process to verify yourself. This extra verification usually takes the form of a numeric code that is sent to your phone.

Ways to Prevent Hacking

Because of TV and movies, most of us have a similar picture in our head of a hacker. To clarify, he's a younger guy, maybe wearing a hoodie, peering into a computer screen in a dark room furiously punching in lines of code.