educational

The IP Address: Your Internet Identity, Part 1

The Internet, sometimes called "the network of networks," is based upon one simple principle: transferring information from one computer to another. In order to do this each computer needs an identity which is called the "Internet Protocol address" or "IP address."

It is similar to a telephone number or street address. The IP address is personally identifiable information that is automatically captured by another computer when any communications link is made over the Internet. This includes visiting web pages, sending or receiving e-mail, visiting newsgroups, or using a chat room. Often, a user's IP address is automatically sent to a third party when visiting a remote web site using banner ad networks or, under certain circumstances, when opening an e-mail message. This usually occurs before there is any opportunity for surfers to review a privacy policy.

The amount of information available about users from their IP addresses varies greatly depending on how they are connected to the Internet and other information that may be available. Logging the IP address is also essential in system security for tracing unauthorized use and computer break-ins. As fixed Internet connections increase, more and more users can be traced directly from their IP address. Click Here to see a demonstration of IP address tracing.

IP Addresses and Domain Names
Computers connected to the Internet must speak the "Internet language" called the "Internet Protocol" or simply "IP." Each computer is assigned a unique address somewhat similar to a street address or telephone number. Under the current system there are four numbers that range from 0 to 255 (Example: 255.255.255.255). Every computer, whether it functions as a web site, is being used by a web surfer, is a mail server, and / or is used for any other function, has an IP address so it can communicate across the Internet. Communication is accomplished by sending pieces of information called "packets" that include the IP address of the destination computer.

Up to this point, domain names have not yet been mentioned because they are not needed for the Internet to work! An optional feature of the Internet is to use domain names. With this system I can tell users to visit 'domain.com' rather than 255.255.255.255. If there are several computers in a network they can be grouped under a single domain and could be given 'friendly' names for convenience such as: computer1.domain.com, computer2.domain.com, etc. This has the added convenience of keeping the same computer names even when the IP addresses change or if the computers move to a different physical location. Again, this naming is optional and is not always done. As a side note, the underlying IP addresses have no intrinsic value but the optional domain names can be worth thousands of dollars and have been the subject of many court cases.

The Domain Name System (often called DNS) is the system where the IP addresses are converted into names. When www.domain.com is entered by a user into a browser a (somewhat hidden) process converts that name into 255.255.255.255. This allows the user to connect to the proper Website and usually involves a domain registration service funded by domain name fees. A common situation that causes IP addresses to be distributed to a third party is when visiting a web site and that site participates in banner ad networks where the ads are served from a third party site.

How Are IP Addresses Distributed
Every transfer of information over the Internet must include the capture of the IP address. Some examples of automatic logging are: visiting a web site, sending or receiving e-mail, using a chat room, or reading and posting to newsgroups. A common situation that causes IP addresses to be distributed to a third party is when visiting a web site and that site participates in banner ad networks where the ads are served from a third party site. This third party site retrieves the IP address when it sends the ad. This information is used to measure the number of ad views and calculate click-through rates.

Transferring IP addresses to a third party can also be accomplished by sending a web page via e-mail. When the user opens the attachment (if they are connected to the Internet) the e-mailed web page could make a request to a web site anywhere on the Internet (such as requesting an image file). This transfers the user's IP address to that web site along with the date and time that the user opened the message. An Internet cookie can also be placed on the user's system at that time. Several advertisers already engage in this practice. This method could also be used to defeat anonymous e-mail.

In my next article, we'll see how users can be traced from their IP Addresses, and discuss the privacy implications that this raises:

Copyright © 2025 Adnet Media. All Rights Reserved. XBIZ is a trademark of Adnet Media.
Reproduction in whole or in part in any form or medium without express written permission is prohibited.

More Articles

profile

WIA Profile: Lexi Morin

Lexi Morin’s journey into the adult industry began with a Craigslist ad and a leap of faith. In 2011, fresh-faced and ambitious, she was scrolling through job ads on Craigslist when she stumbled upon a listing for an assistant makeup artist.

Women In Adult ·
profile

Still Rocking: The Hun Celebrates 30 Years in the Game

In the ever-changing landscape of adult entertainment, The Hun’s Yellow Pages stands out for its endurance. As one of the internet’s original fixtures, literally nearly as old as the web itself, The Hun has functioned as a living archive for online adult content, quietly maintaining its relevance with an interface that feels more nostalgic than flashy.

Jackie Backman ·
opinion

Digital Desires: AI's Emerging Role in Adult Entertainment

The adult industry has always been ahead of the curve when it comes to embracing new technology. From the early days of dial-up internet and grainy video clips to today’s polished social media platforms and streaming services, our industry has never been afraid to innovate. But now, artificial intelligence (AI) is shaking things up in ways that are exciting but also daunting.

Steve Lightspeed ·
opinion

More Than Money: Why Donating Time Matters for Nonprofits

The adult industry faces constant legal battles, societal stigma and workplace challenges. Fortunately, a number of nonprofit organizations work tirelessly to protect the rights and well-being of adult performers, producers and industry workers. When folks in the industry think about supporting these groups, donating money is naturally the first solution that comes to mind.

Corey D. Silverstein ·
opinion

Consent Guardrails: How to Protect Your Content Platform

The adult industry takes a strong and definite stance against the creation or publication of nonconsensual materials. Adult industry creators, producers, processors, banks and hosts all share a vested interest in ensuring that the recording and publication of sexually explicit content is supported by informed consent.

Lawrence G. Walters ·
opinion

Payment Systems: Facilitator vs. Gateway Explained

Understanding and selecting the right payment platform can be confusing for anyone. Recently, Segpay launched its payment gateway. Since then, we’ve received numerous questions about the difference between a payment facilitator and a payment gateway. Most merchants want to know which type of platform best meets their business needs.

Cathy Beardsley ·
opinion

Reinventing Intimacy: A Look at AI's Implications for Adult Platforms

The adult industry has long revolved around delivering pleasure and entertainment, but now it’s moving into new territory: intimacy, connection and emotional fulfillment. And AI companions are at the forefront of that shift.

Daniel Keating ·
profile

WIA: Sara Edwards on Evolving Clip Culture and Creator Empowerment

Though she works behind the scenes, Sara Edwards has had a front-row seat to the evolution of adult content creation. Having been immersed in the sector since 1995, she has a unique perspective on the industry.

Jackie Backman ·
profile

Segpay Marks 20 Years of High-Risk Triumphs

Payment processors are behind-the-scenes players in the world of ecommerce, yet their role is critical. Ensuring secure, seamless transactions while navigating a rapidly changing regulatory landscape requires both technological expertise and business acumen.

Jackie Backman ·
opinion

The SCREEN Test: How to Prepare for Federal Age Verification

For those who are counting, there are now 20 enacted state laws in the United States requiring age verification for viewing online adult content, plus numerous proposed laws in the works. This ongoing barrage has been exhausting for many in the adult industry — and it may be about to escalate in the form of a potential new AV law, this time at the federal level.

Corey D. Silverstein ·
Show More