IP Addresses: Unmasking the Mystery


Hey there, tech enthusiasts! Today, we're diving into the fascinating world of IP addresses. You might have heard of them, but do you know what they're all about? Let's break it down!
What's an IP Address? An IP address, or Internet Protocol address, is a unique set of numbers that identifies a device on a network. Think of it like a street address for your device. Just as a street address helps mail carriers deliver letters to the right house, an IP address helps devices communicate with each other online.
Static IP vs. DHCP: What's the Difference? There are two main types of IP addresses: static and dynamic.
Static IP: A static IP address is manually assigned to a device and remains the same until it's changed. It's like having a permanent street address.
DHCP (Dynamic Host Configuration Protocol): A DHCP address is assigned automatically by a network router or server. It's like having a temporary street address that might change next time you visit.
Using whoer.net to Check Someone's IP Address Now, let's get to the fun part! Have you ever received a suspicious email and wondered where it came from? whoer.net is a handy tool that can help you track down the IP address associated with an email.
Here's how:
Copy the email header (the part that includes the sender's email address and other technical details).
Go to whoer.net and paste the email header into the "Email Header" field.
Click "Analyze" to see the IP address associated with the email.
Keep in mind that this method isn't foolproof, as email headers can be spoofed or modified. However, it can give you a rough idea of where the email originated.
Proxy, VPN, and RDP: What's the Difference? You might have heard of these terms thrown around in tech conversations. Here's a quick rundown:
Proxy: A proxy server acts as an intermediary between your device and the internet. It hides your IP address and can help you bypass geo-restrictions or access blocked websites.
VPN (Virtual Private Network): A VPN creates a secure, encrypted connection between your device and a VPN server. It protects your data from prying eyes and can also mask your IP address.
RDP (Remote Desktop Protocol): RDP allows you to remotely access and control another computer or server. It's commonly used for technical support, remote work, or accessing files on a different device.
OSI Model: A Sneak Peek The OSI model is a 7-layer framework that helps us understand how data is transmitted over a network. We'll dive deeper into the OSI model in our next blog post, but here's a brief overview:
Physical
Data Link
Network
Transport
Session
Presentation
Application
Stay tuned for our next post, where we'll explore the OSI model in more detail!
Subscribe to my newsletter
Read articles from Idowu Wahab Olajide directly inside your inbox. Subscribe to the newsletter, and don't miss out.
Written by

Idowu Wahab Olajide
Idowu Wahab Olajide
Passionate about cybersecurity, creative design, and visual storytelling, I explore the intersections of technology, art, and adventure. From crafting graphics to capturing moments through photography and videography, I thrive on creativity and discovery. Music, drawing, and the thrill of new experiences inspire my journey.