IPv4 Markets

Sponsored
by

Noteworthy

IPv4 Markets / Industry Updates

Why We Started IPXO - A Unique IPv4 Monetization and Leasing Platform

The Internet Protocol Exchange Organization, or IPXO for short, is a unique IPv4 lease and monetization platform. The current shortage of IPv4 addresses has led prices to increase dramatically and put pressure on companies wanting to grow their businesses. The IPXO team recognized that they could fill the market void and bridge the gap between supply and demand. more

How Can We Alleviate IPv4 Address Exhaustion

Back in the 1980s, no one would have foreseen that the Internet would grow the way it did and that IPv4 addresses would become a scarce asset. Today, we face a shortage of available IPs and the emergence of a secondary IP address market, proving that IPv4 addresses are sought after and are a valuable commodity. more

Leasing vs. Buying IPv4 Addresses

More than a decade ago, the cost per IP address was around $5, but when IANA allocated the last block of IP addresses in 2011, that soon changed. With the world experiencing a shortage of IPv4 addresses, many companies are now looking for ways to get their hands on IP addresses to continue expanding their businesses. more

Leasing IPv4 Addresses in the Dawn of the New Internet Era

Increased use of internet services, broader application of IoT devices, and COVID-related shift to remote work are just a few factors accelerating the transition to the new era of the Internet. However, the current network architecture is falling behind the imposed expectations to support new-age integrations, leaving one to wonder if the gap will close up any time soon. more

Expanding the List of Artifacts for the Recent JPMorgan Chase Squatting Campaign

On 13 March, IBM X-Force Exchange published nine artifacts -- three domain names and six IP addresses -- related to a squatting campaign targeting JPMorgan Chase and its stakeholders. We dug deeper into the list in hopes of publicizing additional artifacts that users may need to be wary of. more

Keeping Track of Ramnit through Artifact Expansion

Ramnit stands out as a malware as it continues to evolve and requires cybersecurity experts and law enforcement agents to stay alert. Variants have been recently detected, so that security companies such as Prevailion advise organizations to keep Ramnit on their radar. more

How to Monitor IP Netblocks for Possible Targeted Attacks

A couple of weeks back, a security researcher alerted his LinkedIn contacts about possibly ongoing targeted attacks stemming from the Iranian subnet 194[.]147[.]140[.]x. He advised cybersecurity specialists to watch out for subnets that may be threatful and consider blocking them. This post encouraged us to look into the subnets and details our findings using IP Netblocks WHOIS Database. more

Enriching Know-Your-Customer (KYC) Practices With IP Intelligence

Know-your-customers (KYC) policies aim to minimize the risk of money laundering, bribery, and other types of fraud. While it was originally implemented in financial institutions, companies outside the financial sector have adapted KYC with digital transactions as the primary driver. These days, the approach is enforced by virtual asset dealers, nonprofit organizations, and even social media companies. more

Blind Eagle Targeted Attack: Using Threat Intelligence Tools for IoC Analysis and Expansion

Blind Eagle is a South American threat actor group believed to be behind APT-C-36 and that has been active since at least 2018. It primarily targets Colombian government institutions and large corporations in the financial, petroleum, and professional manufacturing industries. more

Enriching Intrusion Detection and Prevention Systems with IP and Domain Intelligence

Intrusion detection systems (IDSs) and intrusion prevention systems (IPSs), collectively called "intrusion detection and prevention systems (IDPSs)," monitor network traffic to stave off unauthorized access. Roughly speaking, an IDS detects possible malicious network activities, while an IPS stops malicious traffic from entering and possibly damaging a network. more