IP Geolocation

This tool allows you to check the geolocation of an IPv4 and IPv6 address.


About this tool

This tool uses geojs.io API to check the geolocation of an IPv4 and IPv6 address. By using this tool, the IP address will be send to their API. You can check their Privacy Policy.

IPv4 address

Internet Protocol Version 4 is one of the core protocols of standards-based internetworking methods in the Internet and other packet-switched networks. IPv4 uses a 32-bit address space which provides 4,294,967,296 (232) unique addresses, but large blocks are reserved for special networking purposes.

IPv4 addresses are usually written in decimal in four blocks, for example 78.46.19.133.

IPv6 address

Internet Protocol version 6 is the most recent Internet Protocol (IP) version. IPv6 is intended to replace IPv4. IPv6 uses a 128-bit address, theoretically allowing 2128, or approximately 3.4×1038 addresses.

IPv6 addresses are represented as eight groups of four hexadecimal digits each, separated by colons. The full representation may be shortened; for example, 2001:0db8:0000:0000:0000:8a2e:0370:7334 becomes 2001:db8::8a2e:370:7334.

Frequently Asked Questions

Cybersecurity or IT security protects networks, computer systems, and devices from theft or damage to their hardware and software or the data they process and from disruption or misuse of the services and functions they provide. The information is both private and business, which in turn may be personal. Overall, cybersecurity is often (but not only) directed against cybercrime. Among the most significant challenges is the lack of global, centralized cybersecurity institutions and global agreements and regulations to detect and combat cybercrime and bring about cyber resilience.
A cyberattack can lead to identity theft and blackmail attempts on an individual level. Personal data, such as credit card details or family photos, can also be stolen. Critical infrastructures, such as power plants, hospitals, and financial service providers, are essential to the functioning of our society. In addition, industrial espionage is one of the most significant risks for companies.
These presentations aim at Analysts, Security Managers, Web Developers, Software Engineers, Administrators, DevOps, DevSecOps, Team Leads, Manager, CISO, CTO, and other Executives. The slide decks serve as an introduction and provides knowledge on all aspects of the subject area. To put it straight: Benefit from these online presentations and get more insights into the cybersecurity space.
These presentations introduce the topics and convey the contents, in short, concise slides. It is crucial that the contents are as self-explanatory as possible and that the topic areas with the essential information are outlined.
Cybersecurity is a vast field, and it is probably impossible to know everything or every detail. For this reason, many more courses will follow in the coming months to ensure the broadest possible coverage.
As you might imagine, cybersecurity is a broad field. Therefore, it is probably impossible to cover everything. It would go beyond the scope to write everything down. Hence, these slide decks are not intended to be exhaustive but will provide a good starting point.