Introducing G2.ai, the future of software buying.Try now

IP Address

by Alyssa Towns
IP addresses allow computers to send and receive information. Understand how they work and what type of information they reveal.

What is an IP address?

An Internet Protocol (IP) address is a unique identifier assigned to an internet-connected device. It comprises a string of numbers separated by dots. IP addresses are used as digital addresses for devices that reveal some information about the user.

Internet service providers (ISPs) assign unique IP addresses to internet-connected devices. Desktop computers, laptops, tablets, mobile phones, and routers all have IP addresses. IP addresses allow these devices to send and receive information. 

Businesses use IP address intelligence software to de-anonymize business-to-business (B2B) and business-to-consumer (B2C) web traffic, which lets them identify new professional opportunities, uncover trends, and enhance marketing campaigns. Companies turn to these tools to estimate the real-world location of internet-connected devices based on IP addresses. 

What is the purpose of an IP address?

An IP address ensures that data gets sent to the right location. Similar to addresses for physical mail, internet-connected devices require some form of identification to send and receive data. Internet-connected devices cannot connect to or use the internet without an IP address.

History of IP addresses

The first public IP version, IPv4 (signifying version four), was created in 1981. IPv4 uses 32-bit addresses and is most commonly seen in dot-decimal notation. The notation consists of four octets. The octets are represented by decimal numbers between 0 and 255 separated by periods.

The Internet Engineering Task Force (IETF) and the Internet Assigned Numbers Authority (IANA) have special-use addresses reserved for particular purposes. Below is an example of an IPv4 address:

172.11.134.2

The IPv4 design needed to account for the rapidly growing number of internet users. Throughout the 1980s, it quickly became apparent that the pool of available IPv4 addresses was depleting more quickly than anticipated. The IETF developed IPv6, the most recent version of IP, to address the problem of IPv4 address exhaustion. IETF formalized IPv6 by 1998 with the intention of replacing IPv4. 

IPv6 uses 128-bit addresses, offering significantly more addresses than IPv4. IPv6 addresses consist of eight groups of four hexadecimal values between 0 and FFFF separated by colons. It is important to note that IPv4 and IPv6 weren’t designed with interoperability, so they can’t communicate with each other. Below is an example of an IPv6 address:

2002:AC4:2233:4444:C067:DDDD:3654:5678

Basic parts of IPv4 addresses

IPv4 addresses consist of these two distinct parts: 

  • Network ID: Computers on the same network share a network ID. This part of the IP address conveys which network the host belongs to. Network IDs are assigned by an ISP, company network, or public network, depending on the type.
  • Host ID: Each device has its own unique host ID. Hosts can communicate directly with other hosts on the same network. The network ID is the same for each device on a network, but the host ID is different because it is used to identify each host. 

Basic parts of IPv6 addresses

IPv6 addresses consist of three components:

  • The site prefix. Similar to the network ID in IPv4, the site prefix is the number assigned by an ISP. 
  • The subnet ID. This part of the address is private and represents the topology of the network’s site. The subnet ID defines a network subnet; 16 bits in length.
  • The interface ID. Similar to the host ID in IPv4, this element identifies the individual host on the network.

Types of IP addresses

Four main types of IP addresses are used today. The first two below detail the network’s location, and the latter two indicate the network’s permanency. 

  • Public: A public IP address is associated with an entire network. All internet-connected devices in that network share the same IP address. ISPs provide public IP addresses to routers. A public IP address connects users to the internet outside their network.
  • Private: Private IP addresses are assigned to each device that connects to a home network. Each device in the same network receives a unique private IP address. That is, computers, tablets, smartphones, and other devices in a household have separate, private IP addresses. 
  • Static: A static IP address is one that never changes. Static IP addresses are consistent and stay the same once their ISPs assign them to a device. 
  • Dynamic: A dynamic IP address is temporary and constantly changes over time. Dynamic IP addresses are assigned by a Dynamic Host Configuration Protocol (DHCP) server. 

What information do IP addresses reveal?

An IP address reveals users’ geolocation. This doesn’t include precise location information, but an IP address might disclose a user’s city, ZIP code, or area code. While IP addresses do not explicitly expose a user’s identity, physical location attributes can make it easier to discover a user and track their activity.

What parties might be interested in accessing IP addresses?

Although IP addresses don’t reveal personal information or confidential data, some parties have various reasons for accessing IP addresses. Some examples include:

  • Advertisers and retailers who want to target users with relevant products and services.
  • Employers that need to understand how employees are spending their time online during working hours.
  • Authorities piecing together illegal activities or tracing actions leading up to crimes.
  • Cybercriminals attempting to create a Distributed-Denial-of-Service (DDoS) attack or install malware on devices.

Learn how to protect IP addresses with virtual private networks (VPNs).

Alyssa Towns
AT

Alyssa Towns

Alyssa Towns works in communications and change management and is a freelance writer for G2. She mainly writes SaaS, productivity, and career-adjacent content. In her spare time, Alyssa is either enjoying a new restaurant with her husband, playing with her Bengal cats Yeti and Yowie, adventuring outdoors, or reading a book from her TBR list.

IP Address Software

This list shows the top software that mention ip address most on G2.

ipstack offers IP to geolocation APIs and global IP database services worldwide

Xref is trusted by businesses globally to offer reference, background and ID checks that are fast, simple and secure.

IPinfo is a reliable, accurate, and in-depth source of IP address data.

Google Analytics not only lets you measure sales and conversions, but also gives you fresh insights into how visitors use your site, how they arrived on your site, and how you can keep them coming back. Delivered on Google's world-class platform.

GoodAccess is a Zero Trust cybersecurity platform (SASE/SSE) built for medium-sized businesses (50–5000+ employees). It enables rapid, low-code/no-code deployment—without hardware or expert staff—to secure remote and hybrid teams. With identity-based access, BYOD protection, network segmentation, and full visibility, GoodAccess simplifies enterprise-grade security for modern, multi-cloud environments.

SurveyMonkey is a leading survey and feedback management solution, trusted by millions of users across more than 300,000 organizations around the world. SurveyMonkey and its AI-powered tools empower organizations of all sizes to deliver world-class experiences for their employees, customers, and stakeholders.

TunnelBear for Teams is a virtual private network (VPN) service designed to provide small businesses with secure and private internet access, especially when employees connect via public Wi-Fi networks. By encrypting internet traffic with AES-256 bit encryption, TunnelBear ensures that sensitive company data remains protected from potential threats such as data leaks, eavesdropping, and cyberattacks. The service is compatible with multiple platforms, including Mac, Windows, iOS, and Android, allowing teams to maintain security across various devices. Key Features and Functionality: - Proactive Security Alerts: TunnelBear notifies users when connecting to unsecured public networks, enabling them to take immediate action to safeguard their data. - Full Device Connection Encryption: All internet traffic is encrypted, ensuring that browsing activities and app usage are secure from unauthorized access. - Comprehensive Platform Support: The service offers applications for Mac, Windows, iOS, and Android devices, facilitating seamless integration into existing workflows. - Centralized Team Management: Administrators can easily add or remove users, manage billing information, and view invoices through a user-friendly admin console. - Domain Sign-Up for New Hires: This feature allows for the automatic inclusion of new employees into the company's TunnelBear account, streamlining the onboarding process. - Simplified Billing: TunnelBear provides a single, annual invoice for the entire team, reducing administrative overhead and simplifying expense management. - Fair Billing Policy: If a user is removed from the team, the company receives a credit for the remaining subscription time, ensuring cost-effectiveness. Primary Value and Problem Solved: TunnelBear for Teams addresses the critical need for secure internet access in today's mobile and remote work environments. By encrypting internet connections, it protects businesses from the inherent risks associated with public Wi-Fi, such as unauthorized data interception and cyber threats. The centralized management features and fair billing policies further enhance operational efficiency, making it an ideal solution for small businesses seeking to safeguard their online activities without adding administrative complexity.

Amazon Virtual Private Cloud (Amazon VPC) is a service that enables users to launch AWS resources within a logically isolated virtual network. This setup closely mirrors a traditional network that one might operate in a data center, offering the scalability and flexibility of AWS infrastructure. With Amazon VPC, users have complete control over their virtual networking environment, including the selection of IP address ranges, creation of subnets, and configuration of route tables and network gateways. This control allows for the customization of network configurations to meet specific requirements, such as creating public-facing subnets for web servers with internet access and private subnets for backend systems without internet connectivity. Key Features and Functionality: - Customizable Network Configuration: Users can define their own IP address ranges, create subnets, and configure route tables and network gateways to tailor the network to their needs. - Security Controls: Amazon VPC provides multiple layers of security, including security groups and network access control lists, to control inbound and outbound traffic at both the instance and subnet levels. - Hybrid Connectivity: The service supports secure connections between the VPC and on-premises data centers via IPsec VPN or AWS Direct Connect, facilitating hybrid cloud deployments. - Resource Isolation: By launching resources in a VPC, users can isolate them from other AWS customers, enhancing security and compliance. - IPv4 and IPv6 Support: Amazon VPC supports both IPv4 and IPv6 protocols, allowing for flexible addressing options. Primary Value and User Solutions: Amazon VPC addresses the need for secure, scalable, and customizable cloud networking. It allows organizations to extend their on-premises networks into the cloud, creating a seamless and secure hybrid environment. By providing full control over network configurations and security settings, Amazon VPC enables businesses to deploy applications and services in the cloud with confidence, ensuring compliance with internal policies and industry regulations. The service's flexibility and integration capabilities make it suitable for a wide range of use cases, from hosting simple websites to running complex multi-tier applications.

PureDome is a corporate VPN with integrated cybersecurity, secure remote team connectivity, and data access solutions. It allows businesses to safeguard assets and boost productivity through a centralized platform. Moreover, PureDome’s intuitive dashboard lets businesses effectively manage their teams and employees operating on their corporate network, create groups, and control permissions through a unified point of administration. It offers various features and functionalities, including Wireguard protocol, cloud-based gateways, remote access capabilities, data access control, and dedicated IPs for individual users and teams. Features Dedicated IPs Dedicated Gateways AES 256-bit encryption Obfuscation Internet Kill Switch Split Tunneling Benefits Increased security Ease of deployment Multilayered protection Tailored VPN solution Prevents unauthorized access

Tor is a free and open-source software that enables anonymous communication over the internet by directing traffic through a worldwide, volunteer-operated network of servers. This process conceals a user's location and usage from surveillance and traffic analysis, ensuring privacy and freedom online. Key Features and Functionality: - Anonymity: Tor routes internet traffic through a series of encrypted relays, making it difficult to trace the origin of the data. - Privacy Protection: By encrypting data multiple times and sending it through various nodes, Tor safeguards users against network surveillance and traffic analysis. - Access to Blocked Content: Tor allows users to bypass censorship and access websites and services that may be restricted in their region. - Onion Services: Tor supports the creation of ".onion" sites, which are accessible only through the Tor network, providing anonymity for both users and service providers. Primary Value and User Solutions: Tor addresses the need for privacy and freedom in online communications. It protects users from surveillance, tracking, and censorship by anonymizing their internet activities. This is particularly valuable for individuals in regions with restricted internet access, journalists communicating with sources, activists organizing under oppressive regimes, and anyone seeking to maintain their privacy online. By using Tor, users can access the internet without fear of being monitored or having their data collected, thus promoting free expression and access to information.

Lead Forensics is the essential software in B2B marketing, instantly know who is visiting your website and get contact info. Try for free.

ASocks is one of the fastest-rising names in the world of proxy service providers. We offer unlimited fast residential proxies for our users. The list of over 150 countries and the cheapest tariff across board without a dump down on quality or compromise in security. We are honest and the user will, in fact, pay only for the amount of traffic consumed. Unlike competitors, users don’t have to make payment for services which they didn’t use.

VNC Connect enables you to remotely access and control your devices wherever you are in the world, whenever you need to. VNC has a widespread user base from individuals to the world's largest multi-national companies utilizing the technology for a range of applications.

Marketing automation software to help you attract the right audience, convert more visitors into customers, and run complete inbound marketing campaigns at scale — all on one powerful, easy-to-use CRM platform.

Smartlook is a tool designed to record the screens of real users on your website. It allows users to see what visitors clicked with their mouse, what they filled into a form field, where they spend most of their time, and how they browse through each page.

Sales Hub is a modern sales software that helps teams build pipeline, accelerate deal velocity, and create stronger customer connections. Powered by HubSpot’s Smart CRM, it combines AI, automation, and insights in one easy-to-use platform, so reps can sell smarter and scale without added complexity.

Twilio SendGrid Email API- Integrate in minutes with our email API.

A stress-free way to secure your network.

Cloudflare Application Security and Performance solutions provide performance, reliability, and security for all of your web applications and APIs, wherever they are hosted and wherever your users are.