Rotating IP's

Discussion in 'Announcements' started by padraig, Jan 11, 2017.

  1. padraig

    padraig New Member

    Due to the increasing use of rotating ISPs among internet trolls, retreads and other n'ayer-do-wells, if you use one to access MOG you will immediately fall under a higher level of suspicion. Your account will be banned without any recourse if your behavior is found to be unsatisfactory, at the sole discretion of the moderators.

    We realize that there are rare circumstances where, due to employment, Church related positions, etc., you may have a legitimate need to hide your identity and/or location, but due to the nature of emerging forum behavior our need to guard MOG supercedes your need for anonymity.
    djmoforegon, Dawn2, Beth B and 4 others like this.
  2. padraig

    padraig New Member


    What is an IP Address?
    An Internet Protocol address (IP address) is a numerical label that is assigned to devices participating in a computer network that uses the Internet Protocol for communication between its nodes. An IP address serves two principal functions: host or network interface identification and location addressing. Its role has been characterized as follows: "A name indicates what we seek. An address indicates where it is. A route indicates how to get there." [1]

    The designers of TCP/IP defined an IP address as a 32-bit number and this system, known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous growth of the Internet and the predicted depletion of available addresses, a new addressing system (IPv6), using 128 bits for the address, was developed in 1995 [2] , standardized by RFC 2460 in 1998, [3] and is in world-wide production deployment.

    IP is used to route data packets between networks; IP addresses specify the locations of the source and destination nodes in the topology of the routing system.

    In short, IP addresses provide the backbone of the internet we know of.

    How is an IP address assigned?
    IP addresses are assigned to a machine either at the time of booting, usually from local network servers or ISP (dynamic IP), or permanently by fixed configuration of its hardware or software (static IP).

    Each machine connected to internet must have its unique IP address to be able to communicate with other computers in order to avoid packet collusions. For most users, this IP address is provided dynamically by dial-up or DSL internet service provider from its IP pool and it changes at every disconnect from the network or when the machine is powered off.

    Servers (particularly DNS) or internet hosts on the other hand, need to have static or fixed IP addresses to be able to service requests and communicate with other internet hosts. IP addresses are central part of security management and access control implementations.

    What is IP Address Rotation?
    IP Rotation is the process of distributing allocated IPs to a resource randomly or in a configurable manner specified by the administrator.

    When a DSL user connects to his ISP, he is assigned an IP address from a pool of available IPs in his ISP's network topology. His internet address becomes whichever IP was allocated to him. If a disconnection occurs, the ISP will allocate next available IP from the available IP pool implementing IP address rotation transparently to the user.

    Internet facing daemons on many hosts already implement automatic IP address rotation for incoming traffic. For example, a DNS server might change the IP address of a web server in a round-robin fashion to facilitate load-balancing of incoming traffic or equal distribution of resources among role-based access control lists. This method is commonly employed by large datacenters and organizations.

    Real use of IP rotation can be observed for outgoing internet traffic. Since source IP is the foundation of access controls by destination firewalls in all forms of internet communications; by rotating IP addresses, a server, host or service can evade all restrictions put in place.

    IP Address Rotation Methods
    There are 4 main strategies in IP Rotation implementations.

    • Pre-configured IPs: IP rotation takes place at minutely intervals. Every minute or specifiable interval of time, a new IP is assigned.
    • Random IPs: Each connection initiated is assigned a randomly rotating IP.
    • Burst IPs: IP addresses are rotated as per specified number of hits. If 10 connections are initiated, 11th will be from a different IP.
    • Specific IPs: Originating source can choose which IP address to use for the outgoing connection.

    IP Address Rotation illegitimate uses
    Perhaps the most widespread abuse of IP address rotation is from spammers. Almost all spam farms employ some method of IP rotation to fool destination mail servers into believing that email connections are coming from different net blocks. The aim is to be able to deliver as many emails as possible so that their return rate on targeted product is high.

    Spammers also deploy rotating IPs in their link exchange farms for rouge SEO firms called BlackHat SEOs. The target is to deceive major Search Engines for better pageranks.

    There are various DDOS scenarios possible for when IPs are rotated. However, perpetrators of these attacks mostly prefer botnets.

    IP Address Rotation legitimate uses
    Google, Yahoo, Bing, Amazon all deploy IP rotation farms for their outgoing bots in order to distribute the load of their networks.

    Anti-counterfeiting and anti-piracy agencies deploy IP rotation methods for data harvesting or for researching questionable content

    Business intelligence companies use IP rotation to harvest, retrieval, scrape or mine data for performance metrics and data analytics.

    Quantative and qualitative research companies deploy IP rotation to observe variations.

    Data triangulation companies use IP rotation to verify the validity of their content.

    Data warehouses use IP rotation to access a wider selection from their destinations.

    Corporate firms use IP rotation to eliminate price gouging and geotargeted presentation.

    SEO companies use IP rotation to check keyword rankings from different localities.

    Despite having a high potential for abuse, legal uses of IP rotation far outweighs its negative sides. We at X5 Networks believe proper community vigilance is the key in having a better working environment for us and for our users.

    Attached Files:

  3. BrianK

    BrianK Guest

    Bravo. Btt
  4. Dolours

    Dolours Guest

    Is anyone willing to break all that down into language for dummies by answering these questions:

    1. Does it mean that my computer has a number that identifies it every time I access the internet and that the number is visible to the administrator of the webpage I visit?

    2. If the answer to question 1 is "yes", does it mean that if I had a laptop, tablet, and desktop pc, each of them would have its own number or would they all have the same number?

    3. If the answer to questions 1 and 2 is "no", does it mean that the number is allocated to the internet connection in my house rather than to each individual device?

    4. If the answer to question 3 is "yes", does it mean that anyone using the internet connection in my house will be accessing the internet under my identity?

    5. How do people get these Rotating Addresses? Are they provided by websites or special internet service providers? For example, our options for buying access to the internet are via the cable tv provider or via the landline phone company but I don't think we were given an option to have a Rotating Address.
    Clare A likes this.
  5. js1975

    js1975 New Member


    It is an incredibly uncommon scenario that would occur, and unless a user was intentionally doing it, there is no easy way to rotate your IP's like that. If you use 5 different devices from your house, all those devices will come from the same public IP address, which is provided by your Internet provider. Even if you used a few different IP addresses (maybe via cellular), it wouldn't breach the threshold of flagged traffic.

    This is such a small and minor risk and doesn't mask someone's identity at all (it is more likely used to work around automatic filters, as Padraig explained in email spam). A more prevalent risk is tagging traffic sourced from the TOR network, which the NSA cannot easily identify the actual user.

    Hope this helps,
    Dolours and Mac like this.
  6. Dolours

    Dolours Guest

    Thanks Jay. That made perfect sense to me until you introduced the TOR network and NSA to the conversation. I won't even try to figure out what TOR is because I'm happy that your first paragraph told me what I need to know. I don't bother backing up my computer any more because I reckon if it crashes the NSA will give me copies of any lost files if I ask them nicely because don't they have everybody's files stored somewhere? Well maybe not Hillary's but everybody else's. :) (The real reason I don't do back-ups is that there's nothing on it that I would miss if it did crash).
  7. BrianK

    BrianK Guest

    You don't have anything to worry about Dolours. Most of the recent retread trouble makers who were banned were using a rotating IP service that they had to sign up for in order to access the forum to hide their true identity/location. Now if someone accesses the forum and they have multiple IP addresses from all over the world, Padraig knows they're trying to hide their identity, most likely because they were previously banned. If their behavior was nasty enough their actual IP address was also blocked so they can't access the forum.
    Dolours and heyshepard like this.
  8. "Quis ut Deus"

    "Quis ut Deus" Powers Staff Member

    Hi Dolours as previously mentioned you don't have anything to be concerned about I will try and answer a few of your questions

    You need a router/hub/modem to access the internet that device connects to another computer ( A server) which provides an internet connection the person who owns that server is your ISP (internet service provider) when your router connects to the ISP server the server assigns a IP address (internet protocol) which is like a telephone number this enables the internet to identify your router this number stays the same until either you switch off or reset your router then you ISP will assign a new IP number these numbers are location specific. the equipment you use to connect to your router i.e laptop,tablet,pc identify themselves to the router by another number called a MAC address this is how computers talk to each other..

    So for instance if I had several computers using one router they would all use the one IP address, I could however identify which computer accessed whatever web content by it's MAC address..

    the whole rotating IP address is used to hide ones identity it is a clever idea but extremely obvious to forum administrators..
    Dolours, BrianK and Clare A like this.
  9. Dolours

    Dolours Guest

    Thanks, all, for you kindness is explaining this to me. Believe it or not, I once took a course in IT, actually passed the exam and got a diploma to prove it. I have long since forgotten everything I learned, probably do to a mixture of no longer needing to use it and the many advances in technology since then.
    BrianK likes this.

Share This Page