How Hackers hide their IP addresses

Sharing is caring!

Nowadays,Hackers are responsible for hacking most secure web servers around the world and still no sign of them.That’s Because they hide their real identity by using several methods.So today I will show you how they hide their real identity or their real IP address.Most of people are familiar with this topic while some people are feeling uncomfortable.By the way let’s get in to today’s topic

There are mainly few methods can be used commonly and also can be used for our protection while we are on the internet.


No matter how you are expertise in those things most of people can manage the web access with a proxy server.There are two types of proxy mainly ,

  • paid
  • Free

No matter paid or free it will hide your information.But it’s depend on quality of the proxy service.However mechanism  of a proxy server is rerouting your web traffic through a proxy server instead of your your usual internet connectivity According to wikipedia

“proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers.”

As an example think about you are in Sri Lanka and you decided to use a proxy server belongs to USA .By implementing that your location will spoof from Sri Lanka to USA while browsing the internet.That’s why proxy is known as a intermediate service or service that reroute your traffic along a specific path instead of usual path

by the way if you are using a proxy for a series of tasks that require reliability I recommend to use a paid proxy service.

you can see some proxy services mentioned above.

TOR (The Onion Routing)

Another popular approach to hide your tracks and a very popular one – using the TOR browser and the Tor network. The Tor network in simpler terms sounds like a proxy with Vitamins.When you are using TOR your connection will bounce multiple points to give you a higher anonymity.Their network contains multiple tunnels across the globe, that are used to bounce the users signal. The network is accessed from the Tor browser and websites on the network have a specific address that you need to know to be able to access them. While it does provide anonymity, one should also note the threats from using the network. Being anonymous also means the people you interact with are anonymous. Also note-worthy is the fact that though the network is secure, the browser itself isn’t. The Tor browser is just a variation of the Firefox browser and is compatible to everything Firefox is compatible to.

Download Tor Browser


You can use vpn to stay anonymous.Basically there are two types of vpn

  1. Site to Site vpn(Router to Router)
  2. Remote access vpn

Site to Site

This type of vpn use to connect branches of companies or any other corporations world wide without accessing internet.

Remote Access VPN

Remote access VPN allows a user to connect to a private network and access its services and resources remotely. The connection between the user and the private network happens through the Internet and the connection is secure and private.

Remote Access VPN is useful for business users as well as home users.

A corporate employee, while traveling, uses a VPN to connect to his/her company’s private network and remotely access files and resources on the private network.

Home users, or private users of VPN, primarily use VPN services to bypass regional restrictions on the Internet and access blocked websites. Users conscious of Internet security also use VPN services to enhance their Internet security and privacy.

So you can use remote access vpn to stay anonymous while browsing the Internet.

I2P (invisible Internet Project)

I2P also similar to tor and know as garlic routing protocol.I2P is an “anonymous overlay network.” The garlic routing protocol encrypts multiple messages together to make data traffic analysis difficult, while simultaneously increasing network traffic speed. Garlic routing takes its name from actual garlic. Each message is a “garlic clove,” with the entire encrypted bundle representing the “bulb.” Each encrypted message has its own specific delivery instruction, and each end-point works as a cryptographic identifier (read one of a pair of public keys).

To use I2P you need to install I2P official install package.

Leave a Reply

Your email address will not be published. Required fields are marked *