Knowledge (XXG)

IP address blocking

Source 📝

209: 473: 146:
can complicate IP address blocking by making it difficult to block a specific user without blocking many IP addresses (blocks of IP address ranges), thereby creating collateral damage. For websites with low-enough popularity (often intentionally, with explicitly declaring the majority of potential
112:
Logging the IP address can, for example, monitor if a person has visited the site before, for example, to vote more than once, as well as to monitor their viewing pattern, how long since they performed any activity on the site (and set a time out limit), besides other things.
226:
and other methods can be used to bypass the blocking of traffic from IP addresses. However, anti-proxy strategies are available. Consumer-grade internet routers can sometimes obtain a new public IP address on-demand from the ISP using
151:(ISP), country, city and city districts, based on which IP ranges are assigned by ISPs. On websites with low-enough total visitor count, it is improbable that all these features match more than a single person. For large websites, 231:
renewal to circumvent individual IP address blocks. This, however, can be countered by blocking the range of IP addresses from which the internet service provider is assigning new IP addresses, which is usually a shared
147:
visitors as out-of-scope) the large-scale collateral damage is often tolerable: most of website accesses, for addresses belong to the same IP range, are accesses of persons just having a dynamic IP address, but the same
105:, which is needed to enable devices to communicate with each other. With appropriate software on the host website, the IP address of visitors to the site can be logged and can also be used to determine the visitor's 62:
and to prevent access by a disruptive address. It can also be used to restrict access to or from a particular geographic area; for example, syndicating content to a specific region through the use of
193:
for protection from unauthorized access while allowing permitted remote access. This is also useful for allowing remote access to computers. It is also used for Internet censorship.
142:
On a website, an IP address block can prevent a disruptive address from access, though a warning and/or account block may be used first. Dynamic allocation of IP addresses by
200:, which is a simple text file containing hostnames and IP addresses. Hosts files are used by many operating systems, including Microsoft Windows, Linux, Android, and OS X. 208: 236:. However, this may impact legitimate users from the same internet service provider who have IP addresses in the same range, which inadvertently creates a 120:
indicates, besides other things, the visitor's country. In some cases, requests from or responses to a certain country would be blocked entirely.
418: 447: 31: 155:
usually reserve the right of their admins to block access at own discretion, enabling them to create collateral damage this way.
477: 254: 492: 372: 148: 311: 275: 237: 213: 136: 497: 135:
Internet users may circumvent geo-blocking and censorship and protect their personal identity using a
63: 245: 129: 125: 426: 455: 59: 250: 233: 270: 152: 393: 47: 51: 486: 258: 253:
held that circumventing an address block to access a website is a violation of the
223: 197: 121: 117: 82: 295: 167: 106: 74: 228: 217: 102: 90: 70: 55: 336: 186: 163: 78: 17: 472: 128:
shows deemed inappropriate. This is especially frequent in places such as
190: 124:
has been used, for example, to block shows in certain countries, such as
364: 30:
For information about blocking IP addresses on Knowledge (XXG), see
207: 182: 166:
operating systems commonly implement IP address blocking using a
143: 337:"How cookies track you around the web & how to stop them" 81:
operating systems). It can be bypassed using methods such as
101:
Every device connected to the Internet is assigned a unique
297:
The John Marshall Journal of Computer & Information Law
181:
Both companies and schools offering remote user access use
58:. IP address blocking is commonly used to protect against 196:
IP address blocking is possible on many systems using a
257:
for "unauthorized access", and is thus punishable by
73:(e.g., for Mac, Windows, Android, or OS X) or with a 419:"[Community] The Trouble with IP Bans" 69:IP address blocking can be implemented with a 8: 365:"What Is Geo-Blocking and How to Bypass It" 170:, configured by host access control files 287: 27:Access restrictions based on IP address 448:"How to: Circumvent Online Censorship" 32:Knowledge (XXG):Blocking IP addresses 7: 359: 357: 25: 471: 375:from the original on 2023-01-03 300:, Center for Computer/Law, 2003 1: 398:Council on Foreign Relations 255:Computer Fraud and Abuse Act 394:"Media Censorship in China" 216:(FSB) about IP blocking of 514: 212:A letter from the Russian 50:that blocks requests from 29: 249:(2013), US federal judge 149:Internet service provider 89:can be circumvented with 312:"What is an IP address?" 276:Content-control software 238:denial-of-service attack 214:Federal Security Service 46:is a configuration of a 137:Virtual Private Network 423:blog.vanillaforums.com 220: 116:Knowing the visitor's 480:at Wikimedia Commons 211: 107:geographical location 64:Internet geolocation 478:IP address blocking 246:Craigslist v. 3Taps 60:brute force attacks 40:IP address blocking 221: 493:Internet security 476:Media related to 417:Groome, Patrick. 251:Charles R. Breyer 234:IP address prefix 185:programs such as 153:Terms of Services 16:(Redirected from 505: 475: 460: 459: 454:. Archived from 444: 438: 437: 435: 434: 425:. Archived from 414: 408: 407: 405: 404: 390: 384: 383: 381: 380: 361: 352: 351: 349: 348: 333: 327: 326: 324: 323: 308: 302: 301: 292: 271:Block (Internet) 176:/etc/hosts.allow 21: 513: 512: 508: 507: 506: 504: 503: 502: 483: 482: 469: 464: 463: 446: 445: 441: 432: 430: 416: 415: 411: 402: 400: 392: 391: 387: 378: 376: 363: 362: 355: 346: 344: 335: 334: 330: 321: 319: 310: 309: 305: 294: 293: 289: 284: 267: 206: 172:/etc/hosts.deny 161: 159:Implementations 99: 48:network service 35: 28: 23: 22: 15: 12: 11: 5: 511: 509: 501: 500: 495: 485: 484: 468: 467:External links 465: 462: 461: 458:on 2018-12-23. 439: 409: 385: 353: 328: 303: 286: 285: 283: 280: 279: 278: 273: 266: 263: 205: 202: 160: 157: 98: 95: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 510: 499: 496: 494: 491: 490: 488: 481: 479: 474: 466: 457: 453: 449: 443: 440: 429:on 2022-07-13 428: 424: 420: 413: 410: 399: 395: 389: 386: 374: 370: 366: 360: 358: 354: 342: 338: 332: 329: 317: 316:HowStuffWorks 313: 307: 304: 299: 298: 291: 288: 281: 277: 274: 272: 269: 268: 264: 262: 260: 259:civil damages 256: 252: 248: 247: 241: 239: 235: 230: 225: 224:Proxy servers 219: 215: 210: 204:Circumvention 203: 201: 199: 194: 192: 188: 184: 179: 177: 173: 169: 165: 158: 156: 154: 150: 145: 140: 138: 133: 131: 127: 123: 119: 114: 110: 108: 104: 96: 94: 92: 88: 84: 83:proxy servers 80: 76: 72: 67: 65: 61: 57: 54:with certain 53: 49: 45: 41: 37: 33: 19: 498:Blacklisting 470: 456:the original 451: 442: 431:. Retrieved 427:the original 422: 412: 401:. Retrieved 397: 388: 377:. Retrieved 368: 345:. Retrieved 343:. 2018-02-24 340: 331: 320:. Retrieved 318:. 2001-01-12 315: 306: 296: 290: 244: 243:In the case 242: 222: 195: 180: 175: 171: 162: 141: 134: 122:Geo-blocking 115: 111: 100: 97:How it works 86: 68: 56:IP addresses 43: 39: 38: 36: 452:ssd.eff.org 341:Privacy.net 168:TCP wrapper 118:geolocation 85:; however, 75:TCP wrapper 18:IP blocking 487:Categories 433:2021-10-12 403:2021-10-12 379:2021-10-12 347:2019-12-13 322:2019-12-13 282:References 229:DHCP lease 218:ProtonMail 198:hosts file 103:IP address 91:DHCP lease 71:hosts file 44:IP banning 187:DenyHosts 164:Unix-like 126:censoring 93:renewal. 79:Unix-like 373:Archived 265:See also 191:Fail2ban 369:Avast 183:Linux 130:China 77:(for 52:hosts 174:and 144:ISPs 87:this 189:or 42:or 489:: 450:. 421:. 396:. 371:. 367:. 356:^ 339:. 314:. 261:. 240:. 178:. 139:. 132:. 109:. 66:. 436:. 406:. 382:. 350:. 325:. 34:. 20:)

Index

IP blocking
Knowledge (XXG):Blocking IP addresses
network service
hosts
IP addresses
brute force attacks
Internet geolocation
hosts file
TCP wrapper
Unix-like
proxy servers
DHCP lease
IP address
geographical location
geolocation
Geo-blocking
censoring
China
Virtual Private Network
ISPs
Internet service provider
Terms of Services
Unix-like
TCP wrapper
Linux
DenyHosts
Fail2ban
hosts file

Federal Security Service

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.