in

You Should Know these Misuses of Your IP Address! DOS?

Ip misuse

Hello Everyone! Do you know that What a person can do with your IP address? There are such activities, which can be done using an IP address. Also, with the IP address, they can get some information about you as well. So today we’re going to talk about the misuse of IP addresses.

Table of Contents

IP Address

To know your IP Address, you can search on Google “What’s my IP?”. Click on the first result that appeared. It will show your IP address, your browser info, your screen resolution,  your approximate location, and etc.

ip address
Source- froggyads.com
  • What a Hacker can do with your IP address?

A Hacker can easily detect all the open Ports on our network which we have created. The thing here is that the open ports manage any Incoming and Outgoing Service on our Network.

Things to fear about-

meme
Source- memesteplate.com
  • You have to handle a DOS attack from hacker.
  • Your IP can be blacklisted on a particular website. After blacklisting, you will not be able to open that website.
  • Your IP can become a mask for the Hacker. The hacker can use or replace your IP to do cyber crimes. And the Police arrest you as they found your IP while doing that crime. By this the Hacker can save himself and make you trouble.
  • With your IP address, the Hacker or anyone can easily access your files.
  • If someone knows your IP, he can easily know all the vulnerabilities and loop holes on your Network. By this he can make you in trouble.

But this only works if you have a static IP.

The static IP means your IP will remain the same forever. If you don’t have a static IP, then no problem you’re safe. Because the IP gets changed at every restart or in a few moments.

What is DOS?

This term basically refers to Denial of Service. This can be possible Outside the Network and Inside the Network as well. In this, they send too many requests on your Network, which the Network is unable to handle. By this, the Network gets Shut.

dos attack
Source- techrepublic.com

The advanced version of DOS is DDOS. This term refers to Distributed Denial of Service. In this, they send a request in a very huge amount than DOS and from multiple computers on your IP. This makes your network down.

The above information is only for Public IP. In terms of Private IP, a single Computer is enough to make your Network Down.

IP Spoofing

Doing Crimes by using your IP means leaving your footprints in that crime, this is called IP Spoofing. In this the Hacker replaces his IP with yours, to make others feel that this crime is done by you.

ip spoofing
Source- wallarm.com
  • How it is possible to use our IP?

The networking devices use Data Packets for communicating with each other. The Data Packets contain all the information including your IP. A small modification in Data Packets makes you the criminal of that Crime. And IP Spoofing is used the most to do crimes.

Problem with Ports

You should not open or close any Port on your Network, until-unless you know why you’re using that port and you have all the information about that port.

Nmap

ip addres nmap
Source- geeks3d.com

It is a very popular and open-source tool based on Linux. If you enter your IP in it, it will show you all the open Ports on your Network.

Precautions to take

  • Change the Username and Password of your Router’s Configuration Page. Set a strong Username and Password.
  • Make sure your Network Firewall should be on Always in the Router’s Configuration Page. This is a layer of security from Router on your Network.
  • Make sure to turn off the Remote Management in your Router’s Configuration Page. Making it on means you’re giving permission to the others to access your Network.
  • Always Turn off Port Forwarding on your Router, until unless you know how to use it Perfectly.
  • Always Make sure to update your Devices as well as router to the latest firmware. The manufacturers release security patches for their devices to close all the back doors on their devices.

If you follow all the steps, you’ll never be into problems. That’s it for today. The comment section is open for all of your queries and suggestions. Subscribe to our Newsletter and YouTube Channel for more. We’ll meet in the next blog. Until then,

Stay Safe Stay Sarcastic!

Written by sarcasticsindhi

Leave a Reply

Your email address will not be published. Required fields are marked *

GIPHY App Key not set. Please check settings

Save Yourself from being Attacked on Internet! Pegasus Spyware

Fold 3

This Is The First Foldable Phone with IP Rating! Feat. Z Fold 3