English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

8 answers

Every machine on the Internet has a unique identifying number, called an IP Address. A typical IP address looks like this:

216.27.61.137

There are five IP classes plus certain special addresses:


Default Network - The IP address of 0.0.0.0 is used for the default network.

Class A - This class is for very large networks, such as a major international company might have. IP addresses with a first octet from 1 to 126 are part of this class. The other three octets are used to identify each host. This means that there are 126 Class A networks each with 16,777,214 (224 -2) possible hosts for a total of 2,147,483,648 (231) unique IP addresses. Class A networks account for half of the total available IP addresses. In Class A networks, the high order bit value (the very first binary number) in the first octet is always 0.
Net Host or Node
115. 24.53.107



Loopback - The IP address 127.0.0.1 is used as the loopback address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing.

Class B - Class B is used for medium-sized networks. A good example is a large college campus. IP addresses with a first octet from 128 to 191 are part of this class. Class B addresses also include the second octet as part of the Net identifier. The other two octets are used to identify each host. This means that there are 16,384 (214) Class B networks each with 65,534 (216 -2) possible hosts for a total of 1,073,741,824 (230) unique IP addresses. Class B networks make up a quarter of the total available IP addresses. Class B networks have a first bit value of 1 and a second bit value of 0 in the first octet.
Net Host or Node
145.24. 53.107



Class C - Class C addresses are commonly used for small to mid-size businesses. IP addresses with a first octet from 192 to 223 are part of this class. Class C addresses also include the second and third octets as part of the Net identifier. The last octet is used to identify each host. This means that there are 2,097,152 (221) Class C networks each with 254 (28 -2) possible hosts for a total of 536,870,912 (229) unique IP addresses. Class C networks make up an eighth of the total available IP addresses. Class C networks have a first bit value of 1, second bit value of 1 and a third bit value of 0 in the first octet.
Net Host or Node
195.24.53. 107



Class D - Used for multicasts, Class D is slightly different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 0. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class D accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Net Host or Node
224. 24.53.107



Class E - Class E is used for experimental purposes only. Like Class D, it is different from the first three classes. It has a first bit value of 1, second bit value of 1, third bit value of 1 and fourth bit value of 1. The other 28 bits are used to identify the group of computers the multicast message is intended for. Class E accounts for 1/16th (268,435,456 or 228) of the available IP addresses.
Net Host or Node
240. 24.53.107



Broadcast - Messages that are intended for all computers on a network are sent as broadcasts. These messages always use the IP address 255.255.255.255.


You can use this link in order to get your answers:

http://computer.howstuffworks.com/question549.htm

2006-09-19 15:15:52 · answer #1 · answered by Nick 3 · 0 0

An IP or Internet Protocol address is a unique identifier. Any computer that transmits any information across anetwork must have an IP address. Each packet of info sent has a sender address and a receiver address. The protocols on the Internet itself route those packets from the sender to the specific intended receiver for assembly into the file or whatever that was sent. If you've noticed this is very similar to the addresses put on an envelope that is sent through the regular mail service. Well, should someone be doing something they shouldn't be doing, i.e. that is illegal, they wouldn't want anyone else to know who they were or where they were doing this illegal stuff from. There are no two computers online to the Internet at the same time with the same IP address. [Yes, they may have the exact same internal type network address for use from their home or workplace]. The Internet cannot recognize two different computers with same address at same time. If this was possible, then messages and information would not get to the destination it was supposed to arrive at. So, if one can grab or copy someone else's IP address to take the place of theirs then do something, it is possibly to hide their true identity and location from anyone else looking for those doing illegal things.
Each of the big ISPs has a certain set of IPs they are allowed to issue to their members when their members come online to the eyes of the Internet.
It is easy to capture and IP of a user. Most places like amazon.com ebay.com or anywhere you order items off the Net from will do this. That way if you get the item ordered but refute the charges by saying you didn't really order it, they can not only show your credit card number and authorizatin PIN as prrof, but that it was your machine that the transaction was conducted from.
Like most criminal activity, framing somone else is the best way to attampt to get away with the crime. By grabbing and making the Net think they have a different IP [i.e. as if they are someone else somewhere else], this is all the criminal is doing.

2006-09-19 15:28:35 · answer #2 · answered by quntmphys238 6 · 0 0

IP address is your computers address with this info someone can tell the location of the computer. They would also be able to look at you computer if you are on or off and do whatever they want. This is the info that company's IT department uses to do a lot of things to computers for example troubleshoot and reset passwords.

2006-09-19 15:20:52 · answer #3 · answered by sweetcincylove 3 · 0 0

IP stands for Internet Protocol. It's your computer's 'signiture'. you can find your IP and some details, for instance the country where you live. But not much more than that.

It's possible to do a few things to an IP if you the knowhow.. basically think of it as your footprint on the web.

2006-09-19 15:20:08 · answer #4 · answered by Anonymous · 1 0

they try to get your ip address because they think all these 'hacking' programs from 10 years ago that they just downloaded still work on modern pcs. they don't. that's kids for you.

2006-09-19 15:20:29 · answer #5 · answered by piquet 7 · 1 0

properly as they stated use a proxy provider.. How-ever it ought to b a secuerity breach in case your no longer carefull. acquiring an Ip tackle is step one in footprinting then enumeration it truly is haveing a glance to work out what ports r open, any firewallssoftware etc Eventuly in the experience that they r solid sufficient theyll b in a position 2 attack your comp immediately.. How-ever shall we get a million aspect clean. If some-one attempt's 2 hack your workstation then they r more advantageous then likely script kiddes/or youthful toddlers. A hacker wouldent even difficulty. He'd verify u out stated u the position a house workstation and leave No earnings.. till u run a house company o direction. in reality do u rember that courtcase about the dude who were given contained in the pentigon's workstation??? He turned right into a appropriate hacker. He wasent out 2 casue damage or malice or launch the nuclier missles. yet he made a aspect.. if some-you could hack the Pentigon's workstation how secure can we workstation consumer's sense??? they ought to in no way have taken it 2 courtroom. I examine a number of it they charged him with disrupting the Pentigons computers. How ever any a million solid sufficient 2 invade the Pentigon wouldent b so careless as to leave a huge path like he did nor ought to they DISRUPT ANY workstation's. it truly is the completed artwork of hacking like spying :-) till they are malicious yet in lengthy run it truly is not any longer well worth bothering about.. an outstanding firewall will look after it..

2016-11-28 03:07:57 · answer #6 · answered by leabow 3 · 0 0

basically its like a door or open window to your computer people can access your system with the IP addy, you cant get rid of it, you need it to access the net your server identifies your computer by it, you should be using a firewall/antivirus software, which should block attempts to access your system, if you are not using either, you should get them setup.

2006-09-19 15:18:08 · answer #7 · answered by rottie110 3 · 1 0

http://en.wikipedia.org/wiki/IP_address

2006-09-19 15:21:01 · answer #8 · answered by Col. Kurtz 3 · 0 0

fedest.com, questions and answers