60 terms
IP & Network Glossary
Plain-English definitions of IP, networking, and internet infrastructure terms. Each entry includes what it is, how it works, and how it's used in practice.
A
- Account Takeover (ATO)
- An attack where a fraudster gains control of a legitimate user's account — typically through credential theft — and then uses it to steal funds, data, or reputation.
- Anycast
- A routing technique where multiple servers in different locations share the same IP address, and the internet's routing protocols automatically direct users to the nearest one.
- ASN (Autonomous System Number)
- A globally unique number identifying a network of IP prefixes under a single administrative routing policy, used by BGP to route traffic across the internet.
B
- BGP (Border Gateway Protocol)
- Border Gateway Protocol — the routing protocol that directs traffic between the ~75,000 autonomous systems that make up the public internet.
- Bogon IP (Bogon, Martian address)
- An IP address that should not be appearing on the public internet — either from a reserved range, an unallocated block, or a private range — and which routers should drop.
- Botnet
- A network of compromised devices ("bots") controlled remotely by an attacker, used to launch DDoS attacks, send spam, mine cryptocurrency, or brute-force credentials at scale.
- Brute Force Attack (Brute-force attack, Password guessing attack)
- An attack that tries a large number of passwords, keys, or codes against a login or encryption endpoint until one works.
- Business Email Compromise (BEC, CEO fraud, invoice fraud)
- A targeted fraud in which an attacker impersonates an executive or trusted vendor over email, convincing an employee to wire money, change bank details, or share sensitive data.
C
- Carding (Credit card fraud, Card testing)
- The testing, trading, and fraudulent use of stolen credit card data — including "card testing" on e-commerce checkouts to validate which stolen numbers still work.
- CDN (Content Delivery Network)
- Content Delivery Network — a globally distributed set of caching servers that serves website assets from a location close to the end user, reducing latency and shielding the origin server.
- CIDR Notation (CIDR, Classless Inter-Domain Routing)
- A compact way to describe an IP address range, written as an address followed by a slash and a prefix length like 192.0.2.0/24.
- Command and Control (C2, C&C, Command-and-control server)
- The infrastructure an attacker uses to send instructions to, and receive data from, malware-infected hosts in a botnet or targeted intrusion.
- Comment Spam (Blog spam, Forum spam)
- Automated posting of promotional or malicious messages to blog comment sections, forums, guestbooks, and other user-generated-content fields, usually to manipulate SEO or distribute links.
- Credential Stuffing
- An attack that replays username-password pairs from prior data breaches against other services, exploiting password reuse.
D
- DDoS (Distributed Denial-of-Service)
- A Distributed Denial-of-Service attack — coordinated traffic from many compromised devices that overwhelms a target and makes it unresponsive to legitimate users.
- DDoS-as-a-Service (Booter, Stresser, DDoSaaS)
- A commercial service that rents out DDoS attack capacity by the minute through a web dashboard, lowering the skill barrier for launching denial-of-service attacks.
- DNS (Domain Name System)
- The Domain Name System — the internet's phone book, translating human-readable domain names like example.com into numeric IP addresses.
- Dual-Stack (Dual-stack networking)
- A networking configuration where a device, server, or network runs both IPv4 and IPv6 simultaneously, allowing it to communicate with endpoints on either protocol.
E
F
G
H
- Honeypot
- A deliberately vulnerable or decoy system deployed on a network to attract attackers so their tools, techniques, and source IPs can be observed.
- HTTP and HTTPS (HyperText Transfer Protocol, HTTP Secure)
- HTTP is the request-response protocol of the web; HTTPS is HTTP running inside a TLS-encrypted channel, providing confidentiality, integrity, and server authentication.
I
- ICMP (Internet Control Message Protocol)
- The Internet Control Message Protocol — a companion protocol to IP used for diagnostic and error-reporting messages like ping and traceroute.
- IP Address (Internet Protocol address)
- A numeric label assigned to each device on a network so that it can send and receive data over the internet.
- IPsec (Internet Protocol Security)
- A suite of protocols that authenticates and encrypts IP packets at Layer 3, widely used for site-to-site VPNs, remote-access VPNs, and mobile carrier backhaul.
- IPv4 (Internet Protocol version 4)
- The original 32-bit Internet Protocol address format, providing about 4.3 billion unique addresses in dotted-decimal notation like 192.0.2.1.
- IPv6 (Internet Protocol version 6)
- The 128-bit successor to IPv4, written in eight groups of hexadecimal digits like 2001:db8::1, providing 340 undecillion unique addresses.
- IXP (Internet Exchange Point, Internet Exchange)
- Internet Exchange Point — a shared Layer 2 fabric where many networks meet to exchange traffic via public peering, usually through a route server and BGP sessions.
M
- MAC Address (Media Access Control address, Hardware address, Physical address)
- A 48-bit unique hardware identifier burned into every network interface card, used for local Ethernet and Wi-Fi delivery within a single network segment.
- Malware (Malicious software)
- Any software intentionally built to damage, disrupt, or gain unauthorized access to a system — including viruses, worms, ransomware, trojans, and spyware.
- MTU (Maximum Transmission Unit)
- The Maximum Transmission Unit — the largest packet size that a network link can carry in one go without fragmentation. The standard Ethernet MTU is 1,500 bytes.
N
P
- Peering
- A settlement-free interconnection between two networks that agree to exchange traffic directly, bypassing transit providers and reducing cost and latency.
- Phishing
- An attack that impersonates a trusted sender (brand, coworker, service) to trick the victim into handing over credentials, card data, or access tokens.
- Port (Network port, TCP port, UDP port)
- A 16-bit numeric endpoint (0 to 65,535) that allows a single IP address to host multiple network services at once, each addressable by a different port number.
- Private IP (Private IP address, Internal IP, RFC 1918 address)
- An IP address from one of the reserved ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16) that is used inside a local network and is not routed on the public internet.
- Proxy Server (Proxy, HTTP proxy, SOCKS proxy)
- An intermediary server that forwards traffic between a client and a destination, masking the client's original IP address from the destination.
- Public IP (Public IP address, External IP)
- An IP address that is globally routable on the internet, assigned by an ISP or cloud provider, as opposed to a private IP that only works inside a local network.
R
- Ransomware
- Malware that encrypts a victim's files or locks their systems and demands payment — usually in cryptocurrency — for the decryption key and for the attackers not to publish stolen data.
- RDAP (Registration Data Access Protocol)
- The Registration Data Access Protocol — a modern JSON/HTTPS replacement for WHOIS that returns structured registration data for IP addresses, ASNs, and domain names.
- Remote Access Trojan (RAT)
- A type of malware that gives an attacker full, covert, interactive control of an infected computer — as if they were sitting at the keyboard.
- Reverse DNS (rDNS, PTR lookup)
- The process of resolving an IP address back to a hostname using PTR records in special DNS zones like in-addr.arpa (IPv4) and ip6.arpa (IPv6).
S
- SIM Swapping (SIM swap, SIM hijacking, port-out scam)
- A social-engineering attack against a mobile carrier that transfers a victim's phone number to a SIM the attacker controls, intercepting SMS codes and password-reset links.
- Sinkhole
- A technique that redirects traffic destined for a malicious domain or IP to a defender-controlled server, cutting off botnet command-and-control and collecting victim telemetry.
- Skimming (Magecart, e-skimming, web skimming)
- Theft of payment-card data at the point of entry — physical skimmers on ATMs and POS terminals, or malicious JavaScript (web skimming / Magecart) injected into checkout pages.
- SMTP (Simple Mail Transfer Protocol)
- Simple Mail Transfer Protocol — the standard protocol for sending email between mail servers on the internet, typically over port 25, 465, or 587.
- Spam (Unsolicited bulk email, UBE)
- Unsolicited bulk messaging — email, SMS, comments, or DMs — sent to large recipient lists for advertising, fraud, or malware delivery.
- SSH Scanning
- Automated scanning of the public internet for servers with open SSH (port 22), followed by brute-force login attempts against any that respond.
- SSL/TLS (SSL, TLS, Transport Layer Security, Secure Sockets Layer)
- Cryptographic protocols that encrypt communication between a client and a server, providing confidentiality, integrity, and authentication on top of TCP.
- Subnet Mask
- A 32-bit value that tells a device which portion of an IPv4 address identifies the network and which portion identifies the host.
T
- TCP (Transmission Control Protocol)
- Transmission Control Protocol — a reliable, connection-oriented transport protocol that guarantees ordered, error-checked delivery of packets between applications.
- Tor (The Onion Router, Tor Browser)
- An anonymity network that routes traffic through three volunteer-operated relays with layered encryption so that no single node knows both the source and the destination.
- Traceroute (tracert, tracepath)
- A network diagnostic tool that discovers each hop on the path from your device to a destination, listing every router in between and the latency to each.
- Transit
- The commercial internet service where one network pays another to carry its traffic to the rest of the internet, billed by bandwidth used (usually 95th-percentile).
U
V
W
- Web Crawler Abuse (Scraper abuse, Bad bot traffic)
- Aggressive, unauthorized, or deceptive automated crawling of a website — scraping content, harvesting data, ignoring robots.txt, or overwhelming the server with request volume.
- WHOIS
- A decades-old protocol and public database for looking up the registered owner of an IP address, ASN, or domain name.
- WireGuard
- A modern VPN tunneling protocol designed to be simpler, faster, and more auditable than OpenVPN or IPsec — around 4,000 lines of code with a fixed modern cryptographic suite.