In computing, Internet geolocation is software capable of deducing the geographic position of a device connected to the Internet. For example, the device's IP address can be used to determine the country, city, or ZIP code, determining its geographical location. Other methods include examination of Wi-Fi hotspots, a MAC address, image metadata, or credit card information.[ citation needed ]
An IP address is assigned to each device (e.g. computer, printer) participating in a computer network that uses the Internet Protocol for communication. [1] The protocol specifies that each IP packet must have a header which contains, among other things, the IP address of the sender.
There are a number of free and paid subscription geolocation databases, ranging from country level to state or city—including ZIP/post code level—each with varying claims of accuracy (generally higher at the country level). These databases typically contain IP address data, which may be used in firewalls, ad servers, routing, mail systems, websites, and other automated systems where a geolocation may be useful. An alternative to hosting and querying a database is to obtain the country code for a given IP address through a DNSBL-style lookup from a remote server. [2]
Some commercial databases have augmented geolocation software with demographic data to enable demographic-type targeting using IP address data. [3]
The primary source for IP address data is the regional Internet registries which allocates and distributes IP addresses amongst organizations located in their respective service regions:
The registries allow assignees to specify country and geographical coordinates of each assigned block. [4] Starting from 2021 RFC 9092 allows assignees to specify location of any IP subnetwork they own. [5]
Secondary sources include:
Accuracy is improved by:
If geolocation software maps IP addresses associated with an entire county or territory to a particular location, such as the geographic center of the territory, this can cause considerable problems for the people who happen to live there, as law enforcement authorities and others may mistakenly assume any crimes or other misconduct associated with the IP address to originate from that particular location.
For example, a farmstead northeast of Potwin, Kansas became the default site of 600 million IP addresses when the Massachusetts-based digital mapping company MaxMind changed the putative geographic center of the contiguous United States from 39.8333333,-98.585522 to 38.0000,-97.0000. [9] Since 2012, a family in Pretoria, South Africa, has been regularly visited by police or angry private citizens who believed their stolen phones were to be found in the family's backyard. This was also the result of geolocation by MaxMind. The company used the National Geospatial-Intelligence Agency's coordinates for Pretoria, which pointed to the family's house, to represent IP addresses associated with Pretoria. [10]
A distinction can be made between co-operative and oppositional geolocation. In some cases, it is in the interest of users to be accurately located, for example, so that they can be offered information relevant to their location. In other cases, users prefer not to disclose their location for privacy or other reasons. [11]
Technical measures for ensuring anonymity, such as proxy servers, can be used to circumvent restrictions imposed by geolocation software. Some sites detect the use of proxies and anonymizers, and may either block service or provide non-localized content in response. [12]
Geolocation technology has been under development only since 1999, and the first patents were granted in 2004. [13] The technology is already widely used in multiple industries, [14] including e-retail, banking, media, telecommunications, education, travel, [15] hospitality, entertainment, health care, online gaming and law enforcement, for preventing online fraud, complying with regulations, managing digital rights [16] and serving targeted marketing content and pricing. [17] Additionally, the U.S. Federal Communications Commission (FCC) has proposed that geolocation software might be leveraged to support 9-1-1 location determination. [18]
An IP address or the related unique URL may also be investigated with basic functions, typing from the keyboard two instructions: ping and traceroute. [19] In Unix-like systems, they are available as a command line tool. In the same way, Microsoft Windows has the prompt of DOS working with those instructions.
Banks, software vendors and other online enterprises in the US and elsewhere became subject to strict "know your customer" laws imposed by the USA PATRIOT Act, the Bank Secrecy Act, the US Treasury Department's Office of Foreign Assets Control and other regulatory entities in the US and Europe from the early twenty-first century. These laws are intended to prevent money laundering, trafficking with terrorist organizations, and trading with banned nations. When it is possible to identify the true location of online visitors, geolocation can protect banks from participating in the transfer of funds for illicit purposes. More and more prosecuting bodies are bringing cases involving cyber-crimes such as cyber-stalking and identity theft. Prosecutors often have the capability of determining the IP address data necessary to link a computer to a crime. [20]
Online retailers and payment processors use geolocation to detect possible credit card fraud by comparing the user's location to the billing address on the account or the shipping address provided. A mismatch – an order placed from the US on an account number from Tokyo, for example – is a strong indicator of potential fraud. IP address geolocation can be also used in fraud detection to match billing address postal code or area code. [21] Banks can prevent "phishing" attacks, money laundering and other security breaches by determining the user's location as part of the authentication process. Whois databases can also help verify IP addresses and registrants. [22]
Government, law enforcement and corporate security teams use geolocation as an investigatory tool, tracking the Internet routes of online attackers to find the perpetrators and prevent future attacks from the same location.
Since geolocation software can get the information of user location, companies using geomarketing may provide web content or products that are famous or useful in that specific location. Advertisements and content on a website that uses geolocation software in the form of an API (also referred to as "IP API" or "IP address geolocation API") may be tailored to provide the information that a certain user wants. [23]
Internet movie vendors, online broadcasters who serve live streaming video of sporting events, or certain TV and music video sites that are licensed to broadcast their videos of episodes/music videos are permitted to serve viewers only in their licensed territories. By geolocating viewers, they can be certain of obeying licensing regulations. [24] Online gambling websites must also know where their customers violate gambling laws, or risk doing so.
Jim Ramo, chief executive of movie distributor Movielink, said studios were aware of the shortcomings going in and have grown more confident now that the system has been shown to work. [25]
A location-based game is a type of pervasive gamefor smartphones or other mobile devices in which the gameplay evolves and progresses via a player's real-world location which is typically obtained by GPS functionality from the device. [26]
This article needs to be updated. The reason given is: History section ends in 2008 (16 years ago); inaccurate artwork uses obsolete examples and 2010 data.(January 2024) |
The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.
An Internet Protocol address is a numerical label such as 192.0.2.1 that is assigned to a device connected to a computer network that uses the Internet Protocol for communication. IP addresses serve two main functions: network interface identification, and location addressing.
In computer networking, a proxy server is a server application that acts as an intermediary between a client requesting a resource and the server providing that resource. It improves privacy, security, and possibly performance in the process.
Wardriving is the act of searching for Wi-Fi wireless networks as well as cell towers, usually from a moving vehicle, using a laptop or smartphone. Software for wardriving is freely available on the internet.
IP address blocking or IP banning is a configuration of a network service that blocks requests from hosts with certain IP addresses. IP address blocking is commonly used to protect against brute force attacks and to prevent access by a disruptive address. It can also be used to restrict access to or from a particular geographic area; for example, syndicating content to a specific region through the use of Internet geolocation.
A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services – including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers.
Internet privacy involves the right or mandate of personal privacy concerning the storage, re-purposing, provision to third parties, and display of information pertaining to oneself via the Internet. Internet privacy is a subset of data privacy. Privacy concerns have been articulated from the beginnings of large-scale computer sharing and especially relate to mass surveillance.
Geotagging, or GeoTagging, is the process of adding geographical identification metadata to various media such as a geotagged photograph or video, websites, SMS messages, QR Codes or RgSSfeeds and is a form of geospatial metadata. This data usually consists of latitude and longitude coordinates, though they can also include altitude, bearing, distance, accuracy data, and place names, and perhaps a time stamp.
In marketing, geomarketing is a discipline that uses geolocation in the process of planning and implementation of marketing activities. It can be used in any aspect of the marketing mix — the product, price, promotion, or place. Market segments can also correlate with location, and this can be useful in targeted marketing.
In geomarketing and internet marketing, geotargeting is the method of delivering different content to visitors based on their geolocation. This includes country, region/state, city, metro code/zip code, organization, IP address, ISP, or other criteria. A common usage of geotargeting is found in online advertising, as well as internet television with sites such as iPlayer and Hulu. In these circumstances, content is often restricted to users geolocated in specific countries; this approach serves as a means of implementing digital rights management. Use of proxy servers and virtual private networks may give a false location.
Geobytes is a global company that provides geolocation and anti-spam software. Geobytes was incorporated in the State of Delaware, USA in 1999.
Geosocial networking is a type of social networking in which geographic services and capabilities such as geocoding and geotagging are used to enable additional social dynamics. User-submitted location data or geolocation techniques can allow social networks to connect and coordinate users with local people or events that match their interests. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking.
Cyril Lionel Houri is a New York-based entrepreneur who has founded two geolocation technology companies: InfoSplit, Inc. and Mexens Technology Inc.. Houri is recognized as one of the inventors of IP address geolocation, and has contributed in the advance of WiFi and cellular positioning technologies. For his expertise, he testified as an expert witness on location-based technology in LICRA vs. Yahoo!.
Wi-Fi positioning system is a geolocation system that uses the characteristics of nearby Wi‑Fi access points to discover where a device is located.
Mobile web analytics studies the behaviour of mobile website users in a similar way to traditional web analytics. In a commercial context, mobile web analytics refers to the data collected from the users who access a website from a mobile phone. It helps to determine which aspects of the website work best for mobile traffic and which mobile marketing campaigns work best for the business, including mobile advertising, mobile search marketing, text campaigns, and desktop promotion of mobile sites and services.
The W3C Geolocation API is an effort by the World Wide Web Consortium (W3C) to standardize an interface to retrieve the geographical location information for a client-side device. It defines a set of objects, ECMAScript standard compliant, that executing in the client application give the client's device location through the consulting of Location Information Servers, which are transparent for the application programming interface (API). The most common sources of location information are IP address, Wi-Fi and Bluetooth MAC address, radio-frequency identification (RFID), Wi-Fi connection location, or device Global Positioning System (GPS) and GSM/CDMA cell IDs. The location is returned with a given accuracy depending on the best location information source available.
Device tracking software is software installed in an electronic device that is capable of reporting the device's location remotely. Depending upon the software and the device on which it is installed, the software may obtain the location of the device by means of GPS, WiFi-location, IP address, or accelerometer logs, and it may report the address by means of e-mail, SMS, or other means.
Mozilla Location Service (MLS) was an open geolocation service that allowed devices to find their position by processing received signals of publicly observable radio transmitters: cellular network antennae, Wi-Fi access points, and Bluetooth beacons. The service was provided by Mozilla from 2013 to 2024. The service used Mozilla's open source software project called Ichnaea.
HMA is a VPN service founded in 2005 in the United Kingdom. It has been a subsidiary of the Czech cybersecurity company Avast since 2016.
Geopositioning is the process of determining or estimating the geographic position of an object or a person.
{{cite web}}
: Missing or empty |url=
(help)