{"id":35,"date":"2009-11-17T09:39:11","date_gmt":"2009-11-17T13:39:11","guid":{"rendered":"http:\/\/blog.wavecrestcomputing.com\/?p=35"},"modified":"2010-05-17T14:06:45","modified_gmt":"2010-05-17T18:06:45","slug":"what-is-the-purpose-of-the-ip-address-category","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/","title":{"rendered":"What Is the Purpose of the &#8216;IP Address&#8217; Category?"},"content":{"rendered":"<p>From time to time we are asked, \u201cWhat is the purpose of the \u2018IP Address\u2019 category used by Wavecrest products?\u201d\u00a0The short answer is &#8212; it\u2019s used to capture and segregate the IP addresses of Web sites that the product was unable to associate with \u2018regular\u2019 categories. Customers can then analyze them to identify network security threats, traffic to intranet sites, or other patterns of interest.<\/p>\n<p>Here\u2019s a bit more detail.<\/p>\n<p>First note that our products identify many IP addresses and place them in content categories. The Wavecrest URL (control) list contains many such addresses.<\/p>\n<p>Unfortunately though, initially unidentifiable IP addresses still appear from time to time. Generally speaking, we see three types, i.e., addresses associated with:<\/p>\n<ol>\n<li>Internal (and partner) Web pages<\/li>\n<li>Innocent links on Web sites<\/li>\n<li>Possible malware or virus servers<\/li>\n<\/ol>\n<p>When the product encounters any of these three types, it places them in a special \u2018IP Address\u2019 category. Customers can then run reports on that category the same way they do on any other category. In addition, if the customer runs a Top Non-Categorized report, the uncategorized IP addresses will be listed along with uncategorized domain names.<\/p>\n<p>Because the traffic associated with unidentified IP addresses can be important or even dangerous, it\u2019s obviously desirable to pursue the matter further.\u00a0So what can be done?\u00a0Well, with a bit of work\u2014and in some cases with some help from Wavecrest\u2014it is possible to:<\/p>\n<ul>\n<li>determine the source and purpose of most of the addresses<\/li>\n<li>categorize the legitimate ones<\/li>\n<li>isolate\/neutralize the malicious ones<\/li>\n<\/ul>\n<p>Let\u2019s see how this is done. We\u2019ll take it one \u2018type\u2019 at a time.<\/p>\n<ol>\n<li><strong>Internal and Partner Web Pages.<\/strong> Some unidentified IP addresses may have resulted from users going to internal (intranet) or partner sites. (These normally would not be in the Wavecrest URL list.) To address this issue, start by running a Top Non-Categorized Sites Report or IP Address Category Report. Using your local knowledge, try to determine the IP addresses of those sites and then enter the information in one or more custom categories. (Instructions on how to create custom categories can be found in our manual.)<\/li>\n<li><strong>Innocent links on Web Sites.<\/strong> These addresses could be associated with image or ad servers. If you want to address this issue, send a copy of a Top Non-Categorized Sites (\u201c<a href=\"https:\/\/www.wavecrest.net\/products\/otherwise.html\" target=\"_blank\">OtherWise<\/a>\u201d) Report to Wavecrest (sites@wavecrest.net).\u00a0Our categorization team will then research and categorize the unidentified IPs for you the same way they categorize domains. If you would like to identify the IPs yourself, you can use IP address lookup tools such as the one available from <a href=\"https:\/\/www.networksolutions.com\" target=\"_blank\">https:\/\/www.networksolutions.com<\/a>. This tool will provide you with information about the owner of the IP address(es) of interest. For example, the owner of the IP address could be a marketing company that serves ads, or it could be an image server. Once identified, if you desire, you can add the addresses to one or more custom categories.<\/li>\n<li><strong>Possible Malware or Virus Servers.<\/strong> Some of the unidentified IP addresses could be associated with malware, spyware or virus servers. The clue here is very high around-the-clock traffic.\u00a0This is an indication that the user\u2019s computer has been infected or attacked. The solution in these cases is to isolate the internal computer(s) and remove the malware\/spyware or virus. Here\u2019s an approach you can use to help solve this problem.<\/li>\n<\/ol>\n<ul>\n<li>Using the Dashboard, run a Trend report on the IP Address category and look for any unusual spikes. If you see anything suspicious then \u2026<\/li>\n<li>Run a category audit on the IP Address category and look for large amounts of activity coming from a particular PC(s). Make a note of the IP address(es) and then scan for infected files.<\/li>\n<\/ul>\n<p><strong>Summary.<\/strong> The IP address category was created to be a \u2018red flag.\u2019 Its purpose is to alert you that further action may be needed to resolve problems or to simply give you a more complete and comprehensive picture of all Web activity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>From time to time we are asked, \u201cWhat is the purpose of the \u2018IP Address\u2019 category used by Wavecrest products?\u201d\u00a0The short answer is &#8212; it\u2019s used to capture and segregate the IP addresses of Web sites that the product was unable to associate with \u2018regular\u2019 categories. Customers can then analyze them to identify network security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,206],"tags":[136,132,134,131,137,7,135,133,138],"class_list":["post-35","post","type-post","status-publish","format-standard","hentry","category-security-threats","category-tech-tips","tag-custom-categories","tag-ip-adresses","tag-malware","tag-network-security","tag-otherwise","tag-spyware","tag-virus","tag-wavecrest-control-list","tag-web-activity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is the Purpose of the &#039;IP Address&#039; Category? - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is the Purpose of the &#039;IP Address&#039; Category? - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"From time to time we are asked, \u201cWhat is the purpose of the \u2018IP Address\u2019 category used by Wavecrest products?\u201d\u00a0The short answer is &#8212; it\u2019s used to capture and segregate the IP addresses of Web sites that the product was unable to associate with \u2018regular\u2019 categories. Customers can then analyze them to identify network security [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2009-11-17T13:39:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-05-17T18:06:45+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"What Is the Purpose of the &#8216;IP Address&#8217; Category?\",\"datePublished\":\"2009-11-17T13:39:11+00:00\",\"dateModified\":\"2010-05-17T18:06:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\"},\"wordCount\":681,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"keywords\":[\"custom categories\",\"ip adresses\",\"malware\",\"network security\",\"otherwise\",\"Spyware\",\"virus\",\"wavecrest control list\",\"web activity\"],\"articleSection\":[\"Security Threats\",\"Tech Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\",\"name\":\"What Is the Purpose of the 'IP Address' Category? - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"datePublished\":\"2009-11-17T13:39:11+00:00\",\"dateModified\":\"2010-05-17T18:06:45+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is the Purpose of the &#8216;IP Address&#8217; Category?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is the Purpose of the 'IP Address' Category? - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/","og_locale":"en_US","og_type":"article","og_title":"What Is the Purpose of the 'IP Address' Category? - Wavecrest Blog","og_description":"From time to time we are asked, \u201cWhat is the purpose of the \u2018IP Address\u2019 category used by Wavecrest products?\u201d\u00a0The short answer is &#8212; it\u2019s used to capture and segregate the IP addresses of Web sites that the product was unable to associate with \u2018regular\u2019 categories. Customers can then analyze them to identify network security [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2009-11-17T13:39:11+00:00","article_modified_time":"2010-05-17T18:06:45+00:00","author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"What Is the Purpose of the &#8216;IP Address&#8217; Category?","datePublished":"2009-11-17T13:39:11+00:00","dateModified":"2010-05-17T18:06:45+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/"},"wordCount":681,"commentCount":0,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"keywords":["custom categories","ip adresses","malware","network security","otherwise","Spyware","virus","wavecrest control list","web activity"],"articleSection":["Security Threats","Tech Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/","url":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/","name":"What Is the Purpose of the 'IP Address' Category? - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"datePublished":"2009-11-17T13:39:11+00:00","dateModified":"2010-05-17T18:06:45+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/what-is-the-purpose-of-the-ip-address-category\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"What Is the Purpose of the &#8216;IP Address&#8217; Category?"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/35","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=35"}],"version-history":[{"count":1,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/35\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/35\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=35"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=35"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=35"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}