Security Check-Up

Don’t get hacked. Get smart.

Local Server Internet Protocol Finder


Your current live public address is:   

An IP address is a number that identifies a device on the internet. It is kind of like a postal address for online communication between computers. Most internet users do not pay attention to the 'address' but it can be used successfully with malicious intent.


The IP address of a user or device can reveal certain attributes to the observer. The most commonly sought data point is location.

For example, using the IP address displayed from your device right now (shown above) it is simple to find the following information or if some security is enabled, this info would point to the server you're connected to. Data fields like 'City' and 'Region' are particularly useful for targeted hacking, advertising and spam.


Information found using only current user IP



    This is just scratching the surface but it hopefully provides some guidance on how threat actors start building a profile around a person, entity or device online.


    What are the risks of someone knowing your IP Address?

    Any IP address, once known, an be exploited by cyber criminals for malicious activities such as:


    Location Tracking - determine the geographical location of a device or user.


    Track Online Activity - track the activity of any user across websites and search (or form) information provided.

    Continue Reading

    DDoS Attack - A distributed denial of service (DDoS) attack is a malicious attempt to flood a website, server or network with traffic from multiple sources until the internet is no longer accessible to the user.


    Impersonation - Impersonation involves creating fake profiles, using similar usernames and crafting convincing messages meant to fool others for illegal purposes.


    Sell IP Address - A threat actor may sell your IP addresses on the dark web for profit.


    Hack Your Device - If a hacker has your IP address, they can scan your ports to find open ones on your device or network to find vulnerabilities and gain access.



    How to hide or protect your IP Address?


    Use a VPN - When you connect to a VPN server, your data is encrypted and routed through a secure tunnel. This means your IP address is masked and an extra layer of anonymity is used to protect your sensitive information.


    Change your Privacy Settings - Many messaging apps can reveal your IP address. Limit who can see your online status, profile picture and other personal information by adjusting the privacy settings for your device and for individual apps.

    Continue Reading

    Update the Firewall - Software vulnerabilities can expose your IP address to hackers and cyber criminals. Update your firewall and router regularly to get the latest security patches and change the password from the default.


    Disable WebRTC (if enabled) - WebRTC enables real-time audio, video and data communication between web browsers and other applications. However, WebRTC can leak your IP address, even with a VPN. Prevent IP address exposure by disabling WebRTC in your browser settings.


    Be careful on Social Media - Don not click on suspicious links, especially in emails or on social media. Malicious links can direct you to websites that collect your IP address and other sensitive information. Only share personal information with trusted sources that you can verify.


    Educate Yourself - Learn about common online threats and cyber security best practices. Knowing the potential risks will help you protect your private data.Reading the advice on this website is a great start!


    In summary, you can best keep your IP address safe by changing your privacy settings, updating your devices and not sharing personal information online. A VPN can also help you hide your IP address and will provide you with the most private way to use the web.



    Password Strength Checker

    This is a very basic indicator of password strength fed by several data indicators like length and character type. It is only a rough guide and should NOT be used as verification for actual strength of a specific password.

    The descriptors it assigns are defined as;
            Weak - this can be cracked by any hacker in seconds;
            Medium this would take days to weeks of targeted attack to breach; and
            Strong which would take years for the typical hacker to break.



    I trust this is not daunting and remember it is only and approximate guide, but if it prompts you to update any passwords for your accounts then that is a good thing.

    How much better to find out your password and only line of defense is week here rather than by receiving a notification that you've been hacked and your data is gone or encrypted!


    NB: Absolutely zero data is saved, collected or stored in the running of this password check.










    Stay secure out there.