whatsmyIPA

Network Intelligence

Your Public IP Address

Real-time network intelligence for your connection — location, ISP, and security posture.


Privacy Shield

Your IP Is Exposed — Protect It

Every website you visit logs your IP address. Advertisers, data brokers, and attackers use it to track and profile you. A VPN masks your real IP and encrypts all traffic.

Military-Grade Encryption

AES-256 makes your traffic unreadable to ISPs, hackers, and governments.

Bypass Geo-Restrictions

Access streaming libraries and content from any country instantly.

No-Logs Policy

A reputable VPN keeps zero records of your browsing activity.

DNS Leak Protection

Ensures DNS queries route through the VPN, not your ISP.

Kill Switch

Cuts internet automatically if VPN drops — your real IP stays hidden.

Public Wi-Fi Protection

Encrypt your connection on coffee shop and airport networks.

Recommended

ExpressVPN — Browse Freely & Securely

105+ countries, verified no-logs, kill switch, DNS protection. 30-day money-back guarantee.

105+ CountriesNo LogsKill SwitchDNS Protection
Get ExpressVPN

Affiliate disclosure: we may earn a commission if you purchase through the link above.


Deep Dive

Understanding IP Addresses

What Is an IP Address?

An IP (Internet Protocol) address is a unique numerical label assigned to every device connected to a network. Think of it as your device's digital postal address — without it, data packets traveling across the internet would have no destination. Every router, smartphone, server, and IoT device carries one.

IPv4 — The Classic Standard

IPv4 uses a 32-bit addressing scheme written as four decimal octets (e.g., 203.0.113.42). It supports approximately 4.3 billion unique addresses — a number exhausted by the explosion of internet-connected devices.

IPv6 — The Modern Solution

IPv6 uses 128-bit addresses in hexadecimal (e.g., 2001:0db8:85a3::8a2e:0370:7334), supporting 340 undecillion addresses. Beyond scale, IPv6 adds built-in IPSec security, improved routing efficiency, and eliminates NAT.

Public vs Private IPs

  • Public IP — assigned by your ISP, visible on the internet. This is what whatsmyIPA shows you.
  • Private IP — assigned by your router locally (10.x.x.x, 192.168.x.x). Not internet-facing.
  • Dynamic IP — changes periodically. Most home connections use this.
  • Static IP — permanently assigned. Used by servers and premium ISP plans.

How IP Routing Works

When you request a webpage, your device creates data packets containing the destination IP and your source IP. These packets hop through dozens of routers, each deciding the next best path — packet switching. The destination reassembles them and responds to your IP. This round-trip typically completes in under 100 milliseconds.

Key Concepts

  • Subnetting — dividing IP ranges into network segments for security and efficiency.
  • NAT — allows multiple devices to share a single public IP via port mapping.
  • DHCP — protocol that automatically assigns IPs to devices on a network.
  • BGP — Border Gateway Protocol, the routing protocol connecting ISP networks.

What Can Be Determined From Your IP?

IP geolocation databases resolve: country (99%+ accuracy), region (~80%), city (~60–80%), and ISP (very high). They cannot determine your street address or identity without a legal ISP subpoena. However, combined with fingerprinting and cookies, IP tracking becomes a powerful advertiser profiling tool.


Security Intelligence

IP Privacy & Online Security

Why Your IP Address Is a Privacy Risk

Every connection you make broadcasts your IP to the destination server, intermediate infrastructure, and third-party trackers embedded in websites. This creates a persistent digital fingerprint that advertisers, data brokers, governments, and bad actors exploit to build behavioral profiles — without your knowledge or consent.

What Attackers Can Do With Your IP

  • DDoS Attacks — flooding your IP with traffic to knock your connection offline.
  • Port Scanning — probing your IP for open ports and vulnerable services.
  • Geo-targeting — serving region-specific malware or phishing pages based on your location.
  • Cross-site Tracking — advertising networks correlating your IP across thousands of sites.
  • IP Ban Inheritance — if your shared IP was previously abused, you inherit its reputation.

Protecting Your Online Privacy

Layer 1: VPN (Recommended)

A VPN routes all traffic through an encrypted tunnel to a remote server. Choose one with a verified no-logs policy, RAM-only servers, kill switch, and DNS leak protection. Avoid free VPNs — they typically monetize your data.

Layer 2: DNS Security

DNS-over-HTTPS (DoH) or DNS-over-TLS (DoT) prevents your ISP from logging every domain you visit. Even without a VPN, switching to Cloudflare (1.1.1.1) or NextDNS dramatically reduces ISP-level surveillance.

Layer 3: Browser Hardening

WebRTC can expose your local IP even through a VPN. Canvas fingerprinting creates unique device signatures. Use Firefox with uBlock Origin and WebRTC disabled, or Brave with shields enabled.

Layer 4: Network Hygiene

  • Never use public Wi-Fi without a VPN — networks can intercept unencrypted traffic.
  • Keep router firmware updated — routers are frequent attack targets.
  • Use WPA3 or WPA2-AES, never WEP or open networks.
  • Disable UPnP on your router — it silently exposes ports to the internet.

IP Blacklisting and Reputation

Your IP may appear on blocklists (Spamhaus, AbuseIPDB, Barracuda) if it was ever used for spam or abuse. Shared residential IPs are frequently recycled — inheriting poor reputation scores. Check your standing regularly and contact your ISP for a new IP if blacklisted.

Legal Framework Around IP Data

In the EU, IP addresses are personal data under GDPR — requiring consent and strict retention limits. In the US, CCPA (California) grants some rights. ISPs may retain connection logs for 6–24 months depending on jurisdiction. Understanding your regional laws empowers you to submit data deletion requests.


Knowledge Base

Frequently Asked Questions

Your IP (Internet Protocol) address is a unique numerical label assigned to your device by your Internet Service Provider (ISP). It reveals your approximate geolocation (country, city, region), your ISP name, and can be used to infer your timezone. It does NOT reveal your exact street address, name, or personal identity without additional data.
IPv4 is the older standard using 32-bit addresses (e.g., 192.168.1.1), supporting about 4.3 billion unique addresses. IPv6 is the newer 128-bit standard (e.g., 2001:0db8:85a3::8a2e:0370:7334) supporting 340 undecillion addresses — solving IPv4 exhaustion. Most devices today support both through dual-stack configurations.
Yes. Every time you visit a website your IP address is transmitted in the HTTP request headers. Websites, advertisers, and CDNs use this to enforce geo-restrictions, detect bots, personalize content, and log traffic. Using a VPN or Tor replaces your real IP with the VPN server's IP.
A DNS leak occurs when your DNS queries bypass the encrypted VPN tunnel and are sent to your ISP's DNS servers, revealing your browsing activity even while connected to a VPN. To test: connect to your VPN, then visit a DNS leak test tool. If your ISP's DNS servers appear instead of your VPN provider's, you have a leak. Fix it by using a VPN with built-in DNS leak protection or configuring your OS to use encrypted DNS (DoH/DoT).
There are three main methods: (1) VPN — routes your traffic through an encrypted server, replacing your IP with the VPN server's IP. Best combination of speed, privacy, and ease of use. (2) Tor Network — bounces traffic through multiple volunteer relays, offering strong anonymity but slower speeds. (3) Proxy Server — acts as an intermediary, but typically offers no encryption. For everyday privacy, a reputable no-logs VPN is the recommended approach.
A Virtual Private Network (VPN) creates an encrypted tunnel between your device and a remote server. Benefits include: hiding your real IP, encrypting all traffic (protecting against man-in-the-middle attacks on public Wi-Fi), bypassing geo-restrictions, preventing ISP throttling, and protecting against surveillance. Choose a VPN with a verified no-logs policy, kill switch, and DNS leak protection.
Most home users have a dynamic IP — it changes periodically when your router reconnects to the ISP. Businesses and some ISP plans offer static IPs that never change. On mobile networks, IPs change frequently as you move between towers. You can check if your IP changed by refreshing this page.
No — IP geolocation is approximate. It typically resolves to your city or region, not your exact address. The data comes from ISP registration records and geolocation databases, which are often several miles off. Precise location requires court-ordered ISP subpoenas, device GPS, or social engineering — not just an IP address.
A public IP is the address your router presents to the internet — the one shown on this page. A private IP is the local address assigned to your device within your home network (e.g., 192.168.1.x, 10.0.0.x). Private IPs are not directly accessible from the internet and are shared within your LAN through NAT (Network Address Translation).
An Internet Service Provider (ISP) is the company that gives you internet access (e.g., Comcast, AT&T, BT). Without a VPN, your ISP can see every website you visit, when you connect, and how much data you use. In many countries, ISPs are legally required to retain this data for months or years. Using a VPN encrypts your traffic so the ISP only sees encrypted data to the VPN server.
IP blacklisting occurs when your IP address is added to a blocklist used by email servers, websites, or security systems — usually due to spam activity, hacking attempts, or abuse from your network. If your IP is shared (common with residential ISPs), a previous user's behavior can blacklist it. Check services like MXToolbox, Spamhaus, or AbuseIPDB. If blacklisted, contact your ISP to request a new IP.
No — a VPN significantly improves privacy but does not make you fully anonymous. Your VPN provider can still see your traffic. Browser fingerprinting, cookies, logged-in accounts, and behavioral tracking can still identify you. For stronger anonymity, combine a no-logs VPN with a privacy-focused browser, ad-blockers, and avoiding signing into personal accounts.