Browse Definitions :

IP address (Internet Protocol address)

What is an IP address (Internet Protocol address)?

An Internet Protocol (IP) address is a unique numerical identifier for every device or network that connects to the internet. Typically assigned by an internet service provider (ISP), an IP address is an online device address used for communicating across the internet.

There are two versions of IP addresses that are commonly used on the internet: IPv4 and IPv6. An IPv4 address is expressed as a set of four dotted decimal numbers, where each octet is separated by a period, such as The three digits in the first octet represent a particular network on the internet while the rest of the digits represent the actual host address within the local network, such as a workstation or a server. An IPv6 address represents eight groups of four hexadecimal digits separated by colons, such as 2620:cc:8000:1c82:544c:cc2e:f2fa:5a9b. 

Each internet protocol address can send information to other IP addresses through discrete chunks known as packets. Each network packet contains the data being transferred along with a header containing the metadata of the packet.

How do IP addresses work?

An IP address is part of the TCP/IP suite of protocols. It works behind the scenes, helping devices and websites connect with each other on the internet.

Every time a request is made to access a website, the requesting computer needs to know where the website resides and how to reach it. This is where the IP address comes into play. The requesting computer connects to the network router, which connects to the web server where the website lives. The web server then pulls the website information and sends it back to the requesting computer. Each device in this process -- including the computer, router and web server -- carries a uniquely identifiable IP address, without which the transfer of information will not take place.

IPv4 vs IPv6: What’s the difference?

Both IPv4 and IPv6 identify connected devices on the network. However, there are slight differences in the way they operate. IPv6 is the newer IP version and was introduced to address the limitations IPv4 posed on the availability of IP addresses.

The following is a list of differences between IPv4 and IPv6:

  • IPv4 is 32-bit, whereas IPv6 is 128-bit.
  • In IPv4, binary bits are separated by a dot (.); IPv6 separates binary bits by a colon (:).
  • IPv4 follows the numeric addressing method and IPv6 is alphanumeric.
  • IPv4 offers 12 header fields and IPv6 offers eight header fields.
  • IPv4 has checksum fields but IPv6 doesn't.
  • IPv4 supports broadcast address, which is a type of special address that transmits data packets to every node on the network. IPv6 doesn't support broadcast, but instead uses a multicast address, which is a logical identifier for a collection of hosts on a network.
  • IPv4 supports Variable Length Subnet Mask, but IPv6 doesn't.
  • When mapping to media access control addresses, IPv4 uses the Address Resolution Protocol. IPv6 uses the Neighbor Discovery Protocol, which uses stateless auto-configuration and address resolution.

Types of IP addresses

Here is a list of the five most common types of IP addresses:

1. Private IP addresses

Each device connected to a home network or a private network carries a private IP address. Private IP addresses are non-internet facing and are only used on an internal network. Devices with private IP addresses might include computers, tablets, smartphones, Bluetooth devices, smart TVs and printers. With the increasing popularity of internet of things products, the use of private IP addressing is likely to keep growing.

2. Public IP addresses

An ISP assigns these addresses, which enable a router to communicate with the internet or an outside network. Public IP addresses cover the entire network, meaning multiple devices sharing the same internet connection will also share the same public IP address.

3. Dynamic IP addresses

These IP addresses are constantly changing and a new dynamic IP address is assigned to a device every time it connects to the internet. ISPs buy large pools of IP addresses to assign to their customers automatically. They revolve and reuse these addresses between different customers to generate cost savings and to provide easier network management. A dynamic IP address also offers security benefits, as it's harder for cybercriminals to hack into a network interface if its IP is constantly changing.

4. Static IP addresses

Unlike dynamic IP addresses, static IP addresses never change once they're assigned by the network. While most internet users and businesses don't require static IP addresses, they're a requirement for businesses that wish to host their own web servers. A static IP address ensures that all websites and email addresses associated with a certain web server will always have a consistent IP address so it can be reached on the internet.

5. Website IP addresses

These are IP addresses for website owners who don't host their websites on their own servers but rely on a hosting company to do so. Website IP addresses are composed of the following two types:

  • Shared. This IP address is shared among many different websites and is mostly used by small businesses that use a managed hosting service, such as WordPress.
  • Dedicated. This is a unique IP address assigned to an individual website. Dedicated IP addresses help website owners avoid getting blocked or blacklisted, something that owners of shared IP addresses might face when malicious behavior is exhibited by other websites sharing the same IP. Owners of dedicated IP addresses can access their websites while waiting for a domain transfer.
private and public IP addresses
A side-by-side comparison of private and public IP addresses.

Looking up an IP address

There are many ways to look up the IP address of a device. However, the simplest way is to type what is my IP address? into an internet browser, such as Google Chrome. The returning address will be the public IP address of the requesting device.

Windows 10 and Windows 11

  1. Select Start>Settings>Network & internet>Wi-Fi and the Wi-Fi network you're connected to.
  2. Under Properties, look for your IP address listed next to IPv4 address.


  1. Go to System Preferences.
  2. Select network. This should show the IP address information.


  1. Go to Settings.
  1. Select Wi-Fi and click on the information icon, which is the blue "I" in a circle to the right of the connected network.
  2. The IP address should be visible under the Dynamic Host Configuration Protocol (DHCP) tab.

Various websites, such as, also automatically find the IP address of a device.

IP address security

Cybercriminals can exploit an IP address in several ways. Once an IP address is exposed, it can be used for various malicious purposes. Therefore, it's best to keep it as private as possible. Hiding the IP address and accessing the internet securely through a virtual private network service is a great option and so is masking the IP address by using a proxy server or a browser, such as Tor, that anonymizes the web traffic.

Here are some ways cybercriminals can exploit a stolen IP address.

  • Download illegal content. Cybercriminals often use stolen and unprotected IP addresses to access and download illegal content. This way they avoid being tracked, as the IP addresses are traced back to the IP address owners.
  • Location tracking. Most public addresses can be used to narrow down someone's physical location, such as their city of residence. With some digging, criminals can even locate the actual home address of an IP address owner.
  • Distributed denial-of-service attacks. By obtaining an IP address, criminals can carry out targeted DDoS attacks against a network. During these attacks, massive amounts of fake traffic is generally sent to a website to bring it down.
  • Send spam. Advertisers can embed tracking programs in online activities and articles that can record IP addresses. The recorded IP addresses are used to generate spam and to target advertising based on a visitor's browsing history.
  • Steal identity. Identity theft is on the rise and cybercriminals are always on the lookout for personally identifiable information (PII), such as social security numbers or mailing addresses. While an IP address isn't technically PII, it can help a cybercriminal gain access to other information. For example, if a cybercriminal obtains a person's IP address, they can easily track down their ISP and attempt to impersonate them through vishing attacks that can cause the ISP to divulge personal data.

When configuring a network, network administrators must choose between a static or a dynamic IP address. Learn what these IP addresses offer and also explore their pros and cons.

This was last updated in January 2023

Continue Reading About IP address (Internet Protocol address)

  • subnet (subnetwork)

    A subnet, or subnetwork, is a segmented piece of a larger network. More specifically, subnets are a logical partition of an IP ...

  • Transmission Control Protocol (TCP)

    Transmission Control Protocol (TCP) is a standard protocol on the internet that ensures the reliable transmission of data between...

  • secure access service edge (SASE)

    Secure access service edge (SASE), pronounced sassy, is a cloud architecture model that bundles together network and cloud-native...

  • personally identifiable information (PII)

    Personally identifiable information (PII) is any data that could potentially identify a specific individual.

  • zero-day vulnerability

    A zero-day vulnerability is a security loophole in software, hardware or firmware that threat actors exploit before the vendors ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.

  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.