Each device operating on the network must have a unique network address (IP address) for correct communication with other nodes. On the local network, the administrator assigns IP addresses, on the Internet - the provider. The international organization ICANN allocates network addresses among five Regional Internet Registries (RIRs), which collectively serve the global address space.
Instructions
Step 1
For information on the distribution of IP addresses around the world, see https://www.ripe.net/data-tools in the RIPE (Regional Internet Registry) database. Click the Consalt the Atlas button to select the region and IP address of your interest on the world map. Use the left mouse button to navigate, and the scroll wheel to zoom.
Step 2
Hover over the triangle icon and click. Click the link next to Ipv4 ASN. A new page will provide details of the range of IP addresses allocated for this area and the providers that allocate them
Step 3
Many Internet services offer to determine the location of the user by his IP, for example, this one: https://smart-ip.net/tools/geoip. Enter the network address in the input field and click the button to confirm. The program will report the approximate location of this node
Step 4
However, these data may not correspond to reality. If the user wants to hide his location, various services will be at his service, for example, a proxy server. Proxy server is a remote computer that serves as an intermediary for connecting clients to the Internet. Among other useful tasks, it can hide information about the subscriber.
Step 5
Let's say your LiveJournel blog has the ability to see the IP addresses of those who leave comments. If your interlocutor uses a proxy, you will see the network address of this server, and the client may be thousands of kilometers away from it.
Step 6
To ensure anonymity on the network, anonymizers are also used - special programs or web resources that emulate a fictitious IP address for your computer. With the help of these services, you can not only hide your region, but also bypass the router in the office, which does not allow employees to have fun on social networks. For example,