
Frequently Asked Questions
Find answers to common questions about IPFingerPrints, IP addresses, ports, firewalls, and network security.
Can IPFingerPrints detect IPv6 domains?
IPFingerPrints mainly supports IPv4 addresses for lookups and scans. In some cases, limited IPv6 detection may be available depending on the tool or service you use. Full IPv6 support is not guaranteed, but you may try IPv6 addresses.
Why does my IP address appear differently each time I check?
Your IP address may change if your Internet Service Provider (ISP) assigns dynamic IPs using DHCP. These addresses are leased for a period and can change when the lease expires or your device reconnects to the network. If you need a consistent IP, ask your ISP about static IP options.
Is my computer at risk if IPFingerPrints can discover my IP address?
Not necessarily. Public IP addresses are meant to be discoverable so devices can communicate over the internet. However, exposing your IP can make you a target for unwanted traffic or attacks. Using firewalls, VPNs, and regularly updating your software helps protect your device. If you use a proxy or VPN, your public IP may show as the proxy’s address instead of your own.
Can IPFingerPrints find IP addresses for secure (HTTPS) websites?
Yes, IPFingerPrints can discover IP addresses for HTTPS websites. HTTPS encrypts data between your browser and the server, but does not hide the server’s IP address. Some administrators may block scans or restrict access, so results can vary depending on server configuration and firewall rules.
Why is my geo-location correct for ISP and country, but not for my physical address?
Geo-location accuracy depends on the data provided by ISPs and network infrastructure. Some ISPs only share general location data, such as the city or region of their headquarters. If your IP is behind a firewall or NAT device, only the public-facing IP’s location is shown, not your exact device location.
What is a Domain Name Server (DNS) and why is it important?
A DNS translates human-friendly domain names (like ipfingerprints.com) into numeric IP addresses required for network communication. This makes browsing easier and more intuitive. DNS servers maintain large databases mapping domain names to IPs, enabling you to access websites without memorizing long strings of numbers.
What is a firewall and how does it protect my network?
A firewall is a hardware device or software program that filters incoming and outgoing network traffic based on security rules. It can block unauthorized access, restrict traffic by port or protocol, and enforce access policies. Advanced firewalls can inspect traffic at multiple layers, helping protect sensitive data and prevent attacks. Most routers and operating systems include built-in firewall features.
Is a software firewall as effective as a hardware firewall?
Software firewalls provide good protection for individual devices, especially when combined with antivirus and anti-malware tools. Hardware firewalls are better for larger networks, offering higher performance and more granular control. For most home users, a software firewall is sufficient, but businesses should consider hardware solutions for added security.
What is a subdomain and do subdomains have different IP addresses?
A subdomain is a subdivision of a main domain, such as blog.example.com under example.com. Subdomains can point to different IP addresses or servers, allowing organizations to separate services or content. DNS servers resolve subdomains to their respective IPs, but not all subdomains require unique addresses—some may share the main domain’s IP.
What is a public IP address?
A public IP address is a unique identifier assigned to devices that connect directly to the internet. These addresses are distributed by IANA and ISPs, and are required for web servers, email servers, and other public-facing services. Public IPs are routable and visible to other devices on the internet.
What is a private IP address?
Private IP addresses are used within local networks and are not routable on the public internet. They fall within specific ranges (e.g., 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) and allow multiple devices to communicate internally. Routers use NAT to translate private IPs to a public IP for internet access.
What are network protocol ports?
Network ports are logical endpoints for communication, allowing different types of data to be sent and received. Common ports include 80 (HTTP), 443 (HTTPS), 21 (FTP), and 23 (Telnet). Ports help organize traffic and enable troubleshooting by separating services on the same device.
What is a ping test and how is it different from ARP?
A ping test sends ICMP packets to a target IP to check if it is reachable and measure response time. ARP (Address Resolution Protocol) operates at a lower layer, mapping IP addresses to MAC addresses within a local network. Ping is used for connectivity checks, while ARP helps devices communicate on the same subnet.
How many network ports are there?
There are over 49,000 registered ports recognized by IANA, plus about 25,000 private or dynamic ports. Ports range from 0 to 65535, with lower numbers reserved for well-known services and higher numbers used for custom or temporary connections.
Which ports should I keep closed on my network?
Close all ports you do not actively use to reduce your attack surface. Open ports can be exploited by attackers, so regularly scan your network and disable unused services. Use a port scanner to identify open ports and close those that are unnecessary.
What is Network Address Translation (NAT) and how does it work?
NAT allows multiple devices on a private network to share a single public IP address for internet access. It translates private IPs to a public IP, conserving address space and adding a layer of security. NAT is commonly implemented on routers and firewalls, and is essential for home and business networks.
What is a Virtual Private Network (VPN)?
A VPN creates a secure, encrypted tunnel between your device and a remote network, allowing private communication over public infrastructure. VPNs protect your data from eavesdropping and can help bypass geographic restrictions. They are widely used for remote work, privacy, and secure browsing.
Which ports need to be open for VPN connections?
VPN protocols require specific ports: PPTP uses TCP 1723 and GRE 47, L2TP uses UDP 500 and 1701, and OpenVPN typically uses UDP 1194. Make sure these ports are open on your firewall or router to establish VPN connections.
What does the "s" in https mean?
The "s" in https stands for "secure." HTTPS uses SSL/TLS encryption to protect data exchanged between your browser and the web server. This is essential for sensitive transactions, such as online banking and shopping, ensuring privacy and integrity of your information.
What is a proxy server and how does it work?
A proxy server acts as an intermediary between your device and the internet, forwarding requests and responses. Proxies can provide anonymity, filter content, and improve security. They are used in corporate networks, public Wi-Fi, and by individuals seeking privacy or access to restricted content.
What are SSL and TLS?
SSL (Secure Socket Layer) and TLS (Transport Layer Security) are cryptographic protocols that secure data transmission over networks. TLS is the successor to SSL and is widely used for securing web traffic, email, and other communications. Both protocols help prevent data interception and tampering.
What is DHCP and how does it assign IP addresses?
DHCP (Dynamic Host Configuration Protocol) automatically assigns IP addresses to devices on a network. When a device connects, it requests an IP from the DHCP server, which leases an address for a set period. This simplifies network management and ensures efficient use of available IPs.
Can my IP be discovered if I am browsing behind a proxy?
If you use a secure proxy, your real IP is hidden from websites you visit. However, poorly configured proxies or certain requests may leak your IP. Always use reputable proxy services and check for IP leaks using online tools.
What is IPv6 and how is it different from IPv4?
IPv6 is the latest version of the Internet Protocol, designed to replace IPv4 and provide a vastly larger address space. IPv6 uses 128-bit addresses, supports improved routing, and includes built-in security features. Adoption is increasing as IPv4 addresses become scarce.
How can I increase my anonymity while browsing?
To enhance your online privacy, use VPNs, proxies, and privacy-focused browsers. Avoid sharing personal information on untrusted sites, regularly clear cookies, and keep your software updated. Read privacy policies and use strong, unique passwords for all accounts.
How can I prevent my computer from being hijacked?
Protect your computer by keeping your operating system and software updated, using strong passwords, and avoiding suspicious downloads. Enable firewalls, use antivirus software, and be cautious with email attachments and links. Regularly scan for malware and review your network for open ports.
What is an ACK port scan?
An ACK scan sends TCP packets with the ACK flag set to map firewall rules and determine which ports are filtered. If a port responds with RST, it is unfiltered; if there is no response, it may be filtered. This scan does not reveal if a port is open or closed, but helps assess firewall behavior.
What is a Window port scan?
A Window scan is similar to an ACK scan but exploits operating system details to distinguish between open and closed ports. It analyzes TCP window sizes in responses to provide more information about port status, especially on systems with specific TCP implementations.
What is a FIN port scan?
A FIN scan sends TCP packets with the FIN flag set, signaling the end of a connection. Closed ports respond with RST, while open ports ignore the packet. This technique can bypass some firewalls and is useful for stealth scanning.
What is an XMAS port scan?
An XMAS scan sends TCP packets with multiple flags (FIN, URG, PSH) set, resembling a "Christmas tree." Like FIN scans, closed ports respond with RST, while open ports do not respond. XMAS scans can help identify open ports and evade basic filtering.
What is a SYN port scan?
A SYN scan sends TCP packets with the SYN flag to initiate a connection. If the target responds with SYN-ACK, the port is open; if it responds with RST, the port is closed. SYN scans are fast and stealthy, making them popular for network reconnaissance.
What is a WHOIS lookup?
A WHOIS lookup retrieves registration details for domain names, including owner, registrar, and contact information. Some registrants use privacy services to mask their identity. WHOIS data is useful for investigating domain ownership and resolving disputes.
What do different port states mean when scanning a network?
When you scan ports on a network, you may see several possible states for each port. If a port is open, it means a service is available and accepting connections. A closed port is not accepting connections, but it is reachable and responds to requests. Sometimes, a port may not respond at all, which could mean it is protected by security measures or not accessible. In some cases, the scanner cannot determine the exact status of a port, so it may be reported as unknown or ambiguous. These states help you understand which services are available and which may be restricted or hidden on a device or server.
I can't find my question here!
If you have a question that is not listed here, please email us at: info@ipfingerprints.com. We are happy to help with any inquiries about IP addresses, networking, or our services.