No-IP

Last updated
Vitalwerks Internet Solutions, LLC
Company type Private
Industry DNS and Web Hosting
Founded1999;25 years ago (1999) (As Vitalwerks LLC)
Headquarters Reno, Nevada, US
Products
Website www.noip.com

Vitalwerks Internet Solutions, LLC is a domain and host service provider. No-IP offers DNS services, DDNS, email, network monitoring and SSL certificates. Email services include POP3, SMTP, mail backup services, mail reflection and filtering.

Contents

History

No-IP was launched in October 2000 offering free dynamic DNS and URL redirection. Users were able to create a sub-domain under a few domains owned by No-IP. In May 2000, Vitalwerks Internet Solutions, LLC was formed as the parent company of No-IP. In January 2001 No-IP began offering paid managed DNS services which allowed users to set up dynamic DNS using their own domain name. Later that year, they began to offer email services. They began reselling domain names in 2002 and in 2006 became an ICANN accredited registrar. No-IP was subsequently featured in MacUser [1] in 2004 and PCMag [2] in 2005.

Technology and services

No-IP provides dynamic DNS services. A basic one is provided free to use as long as the user refreshes their access from time to time, thus keeping it active. Upgrades to the DDNS comes from purchases. Dynamic IP addresses are common on residential cable or DSL broadband accounts, and the typical users of DDNS would be the users of these types of internet connections. The service allows users to create up to three hostnames on a No-IP domain. Software clients are provided for Windows, OS X, and Linux which allows the DDNS to connect with these OSes. More often, however, routers are used in such a DDNS configurations.

Most open-source firmware distributions, such as OpenWrt and DD-WRT, include DDNS in their downloadable packages, but OpenWrt requires an extra package for No-IP specifically. [3]

On 19 June 2014, Microsoft launched an ex parte legal action against No-IP, requesting that Microsoft be given control of 22 of No-IP's domain names. [4] This was granted without notifying No-IP on 26 June 2014, and Microsoft began redirecting domain traffic to their sinkhole. According to No-IP [5] this affected malicious and non malicious users alike, despite Microsoft's erroneous statement of intent to the contrary. Legitimate users of the service were also diverted to the Microsoft sinkhole. Backlash to the confiscation however led to Microsoft returning the domains to No-IP. [6]

See also

Related Research Articles

The Domain Name System (DNS) is a hierarchical and distributed naming system for computers, services, and other resources in the Internet or other Internet Protocol (IP) networks. It associates various information with domain names assigned to each of the associated entities. Most prominently, it translates readily memorized domain names to the numerical IP addresses needed for locating and identifying computer services and devices with the underlying network protocols. The Domain Name System has been an essential component of the functionality of the Internet since 1985.

<span class="mw-page-title-main">Domain name</span> Identification string in the Internet

In the Internet, a domain name is a string that identifies a realm of administrative autonomy, authority or control. Domain names are often used to identify services provided through the Internet, such as websites, email services and more. As of December 2023, 359.8 million domain names had been registered. Domain names are used in various networking contexts and for application-specific naming and addressing purposes. In general, a domain name identifies a network domain or an Internet Protocol (IP) resource, such as a personal computer used to access the Internet, or a server computer.

Dynamic DNS (DDNS) is a method of automatically updating a name server in the Domain Name System (DNS), often in real time, with the active DDNS configuration of its configured hostnames, addresses or other information.

<span class="mw-page-title-main">Web hosting service</span> Service for hosting websites

A web hosting service is a type of Internet hosting service that hosts websites for clients, i.e. it offers the facilities required for them to create and maintain a site and makes it accessible on the World Wide Web. Companies providing web hosting services are sometimes called web hosts.

Various anti-spam techniques are used to prevent email spam.

Zero-configuration networking (zeroconf) is a set of technologies that automatically creates a usable computer network based on the Internet Protocol Suite (TCP/IP) when computers or network peripherals are interconnected. It does not require manual operator intervention or special configuration servers. Without zeroconf, a network administrator must set up network services, such as Dynamic Host Configuration Protocol (DHCP) and Domain Name System (DNS), or configure each computer's network settings manually.

<span class="mw-page-title-main">Captive portal</span> Web page displayed to new users of a network

A captive portal is a web page accessed with a web browser that is displayed to newly connected users of a Wi-Fi or wired network before they are granted broader access to network resources. Captive portals are commonly used to present a landing or log-in page which may require authentication, payment, acceptance of an end-user license agreement, acceptable use policy, survey completion, or other valid credentials that both the host and user agree to adhere by. Captive portals are used for a broad range of mobile and pedestrian broadband services – including cable and commercially provided Wi-Fi and home hotspots. A captive portal can also be used to provide access to enterprise or residential wired networks, such as apartment houses, hotel rooms, and business centers.

The computer file hosts is an operating system file that maps hostnames to IP addresses. It is a plain text file. Originally a file named HOSTS.TXT was manually maintained and made available via file sharing by Stanford Research Institute for the ARPANET membership, containing the hostnames and address of hosts as contributed for inclusion by member organizations. The Domain Name System, first described in 1983 and implemented in 1984, automated the publication process and provided instantaneous and dynamic hostname resolution in the rapidly growing network. In modern operating systems, the hosts file remains an alternative name resolution mechanism, configurable often as part of facilities such as the Name Service Switch as either the primary method or as a fallback method.

The Web Proxy Auto-Discovery (WPAD) Protocol is a method used by clients to locate the URL of a configuration file using DHCP and/or DNS discovery methods. Once detection and download of the configuration file is complete, it can be executed to determine the proxy for a specified URL.

DNS spoofing, also referred to as DNS cache poisoning, is a form of computer security hacking in which corrupt Domain Name System data is introduced into the DNS resolver's cache, causing the name server to return an incorrect result record, e.g. an IP address. This results in traffic being diverted to any computer that the attacker chooses.

Browser hijacking is a form of unwanted software that modifies a web browser's settings without a user's permission, to inject unwanted advertising into the user's browser. A browser hijacker may replace the existing home page, error page, or search engine with its own. These are generally used to force hits to a particular website, increasing its advertising revenue.

Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt communications channels, otherwise falling back to unencrypted communications. This method requires no pre-arrangement between the two systems.

<span class="mw-page-title-main">OpenDNS</span> Domain name system provided by Cisco using closed-source software

OpenDNS is an American company providing Domain Name System (DNS) resolution services—with features such as phishing protection, optional content filtering, and DNS lookup in its DNS servers—and a cloud computing security product suite, Umbrella, designed to protect enterprise customers from malware, botnets, phishing, and targeted online attacks. The OpenDNS Global Network processes an estimated 100 billion DNS queries daily from 85 million users through 25 data centers worldwide.

<span class="mw-page-title-main">Fast flux</span> DNS evasion technique against origin server fingerprinting.

Fast flux is a domain name system (DNS) based evasion technique used by cyber criminals to hide phishing and malware delivery websites behind an ever-changing network of compromised hosts acting as reverse proxies to the backend botnet master—a bulletproof autonomous system. It can also refer to the combination of peer-to-peer networking, distributed command and control, web-based load balancing and proxy redirection used to make malware networks more resistant to discovery and counter-measures.

DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards.

SmartScreen is a cloud-based anti-phishing and anti-malware component included in several Microsoft products, including operating systems Windows 8 and later, the applications Internet Explorer, Microsoft Edge. SmartScreen intelligence is also used in the backend of Microsoft's online services such as the web app Outlook.com and Microsoft Bing search engine.

Domain Name System blocking, or DNS blocking / filtering, is a strategy for making it difficult for users to locate specific domains or websites on the Internet. It was first introduced in 1997 as a means to block spam email from known malicious IP addresses.

<span class="mw-page-title-main">Google Safe Browsing</span> Service that warns about malicious URLs

Google Safe Browsing is a service from Google that warns users when they attempt to navigate to a dangerous website or download dangerous files. Safe Browsing also notifies webmasters when their websites are compromised by malicious actors and helps them diagnose and resolve the problem. This protection works across Google products and is claimed to “power safer browsing experiences across the Internet”. It lists URLs for web resources that contain malware or phishing content. Browsers like Google Chrome, Safari, Firefox, Vivaldi, Brave, and GNOME Web use these lists from Google Safe Browsing to check pages against potential threats. Google also provides a public API for the service.

A DNS sinkhole, also known as a sinkhole server, Internet sinkhole, or Blackhole DNS is a Domain Name System (DNS) server that has been configured to hand out non-routable addresses for a certain set of domain names. Computers that use the sinkhole fail to access the real site. The higher up the DNS resolution chain the sinkhole is, the more requests will fail, because of the greater number of lower nameservers that in turn serve a greater number of clients. Some of the larger botnets have been made unusable by top-level domain sinkholes that span the entire Internet. DNS Sinkholes are effective at detecting and blocking bots and other malicious traffic.

Trojan.Win32.DNSChanger is a backdoor trojan that redirects users to various malicious websites through the means of altering the DNS settings of a victim's computer. The malware strain was first discovered by Microsoft Malware Protection Center on December 7, 2006 and later detected by McAfee Labs on April 19, 2009.

References

  1. "Serving websites from home using No-IP". macuser.co.uk. 2004-07-08. Archived from the original on 2008-02-26. Retrieved 2014-09-16.
  2. Craig Ellison (2005-05-04). "Dealing with Dynamic IP Addresses". PC Magazine. Archived from the original on 2014-02-15. Retrieved 2014-09-16.
  3. "DDNS client". 23 April 2017. Archived from the original on 24 January 2022. Retrieved 24 January 2022.
  4. Richard Domingues Boscovich (2014-06-30). "Microsoft takes on global cybercrime epidemic in tenth malware disruption". Microsoft TechNet. Archived from the original on 2014-07-07. Retrieved 2014-09-16.
  5. Natalie Goguen (2014-06-30). "No-IP's Formal Statement on Microsoft Takedown". No-IP. Archived from the original on 2014-09-06. Retrieved 2014-09-16.
  6. Dan Goodin (2014-07-03). "Order restored to universe as Microsoft surrenders confiscated No-IP domains". Ars Technica. Archived from the original on 2014-09-09. Retrieved 2014-09-16.