Recent Articles
Online Privacy Checkup and Keeping Safe

It's no easy task to maintain your online privacy. It’s also hard to know how to stay in control of what you share. While there’s no way to guarantee that your information never gets out, there are many steps you can take to make sure that your accounts and information are as private as possible.

What A Search Engine Tracks About Me

It’s no longer a secret that most browsers and search engines on the Internet collect usage information. Auto-correct, location-relevant results and search suggestions are just a few of the things that search engines can improve through gathered user data.

See More Recent Articles

What Is My IP?

WhatIsMyIP.com® is the industry leader in providing IP address information. Moreover, we provide tools that allow users to perform an Internet Speed Test, Location Lookup, Proxy Detection, Whois Lookup, and more. Extensive tutorials that show users how to trace an email address are also available. Furthermore, knowing your IP address is crucial for online gaming, using remote desktop connections, connecting to a security camera DVR, and anonymity. If you’ve got questions and can’t find the answer on our site, feel free to post your question in our Q & A section.

What Is An IP Address?

This number is an exclusive number assigned to each network connect device such as printers and routers. Furthermore, the assigned IP address identifies each device. Therefore, it allows these connected devices the ability to communicate with each other over a computer network. Therefore, no device can be connected to a network without an IP address.

What Is IPv6?

Internet Protocol version 6 is the replacement for IPv4. First of all, an IPv6 address looks like this 2600:1005:b062:61e4:74d7:f292:802c:fbfd. While an IPv4 address looks like this 75.123.253.255.

API

Our API gives you access to most of our tools programmatically. To clarify, you must be a Gold level member to access our API. Most noteworthy, Gold level accounts get 10 API keys. Consequently, each key is allowed 1,440 calls per day (1 per minute) for a total of 14,400 calls per 24 hour period. API Definition

Recent Articles

Online Shopping for Seniors and the Simple Basics

Shopping online is one of the best ways to conveniently get what you need without having to venture into a physical store. If you’re feeling under the weather, don’t have the time to go through your shopping list, or simply want to try a new shopping method, then online is the way to go.

Social Media Content Ownership of What You Post

When you post on social media, you are not only sharing content with the Internet publicly. You’re also granting certain permissions to the platforms you post on.

Smartphones for Seniors and Which Are The Best

Almost everyone has a cellphone in 2020. According to a Pew Research Study, 96% of Americans are cellphone users, and of that group, 1% own a smartphone. 

Hide IP Address With Three Secure Ways

This article explains why you may need to hide IP address while you are online.  Your IP address is your online identity - it is what identifies your device or network when you use the Internet. You can think of it as your physical address. Just like a physical address, your IP address tells others how to find you, where to send messages, etc.

Are Proxies Safe and What To Know

One advantage to online safety and security is the use of proxies.  The goal for most people online is to stay secure and anonymous. One option that's touted to provide security and anonymity is the use of proxy servers.   Proxy servers are quick and (usually) free solutions that hide your IP address while you browse the internet.

Avoiding Security Threats on Your Mobile Device

Everyone knows that smartphone usage is at an all-time high, and that comes with increased security threats.  The reason is very simple.  The more connected to the Internet, the more vulnerable of a hack.  Like any other cybersecurity threat, mobile threats can include ID theft, spyware, and phishing scams.

Phishing Email Red Flags and How To Recognize

As you've probably heard, phishing is one of the most often-used techniques hackers use to break into devices or computer systems. And as you've also probably heard, the best defense against phishing attacks is to use "common sense." But what does that actually look like?

Adware Explained and How it Works

Adware is short for "advertising-supported software." Essentially, it is software installed on your device that shows you unwanted advertisements, typically in the form of pop-up ads. It is not necessarily malicious - however, if you suspect your device has it, you should make sure it is removed.