{"id":8275,"date":"2022-06-16T16:01:14","date_gmt":"2022-06-16T16:01:14","guid":{"rendered":"https:\/\/www.use-snip.com\/kb\/?post_type=ht_kb&#038;p=8275"},"modified":"2022-08-17T20:38:50","modified_gmt":"2022-08-17T20:38:50","slug":"common-ips-tasks","status":"publish","type":"ht_kb","link":"https:\/\/www.use-snip.com\/kb\/knowledge-base\/common-ips-tasks\/","title":{"rendered":"Common IPs Tasks"},"content":{"rendered":"<p>The below list provides quick links to FAQs regarding managing <b>IP connections<br \/>\n<\/b><\/p>\n<p><a href=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2019\/01\/LLLsm.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-5943 size-full\" src=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2019\/01\/LLLsm.png?_t=1655161092\" alt=\"\" width=\"256\" height=\"256\" srcset=\"https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2019\/01\/LLLsm.png 256w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2019\/01\/LLLsm-150x150.png 150w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2019\/01\/LLLsm-50x50.png 50w, https:\/\/www.use-snip.com\/kb\/wp-content\/uploads\/2019\/01\/LLLsm-60x60.png 60w\" sizes=\"auto, (max-width: 256px) 100vw, 256px\" \/><\/a>See <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/common-users-tasks\/\">this article<\/a> for a similar set of links for <strong>User <\/strong>tasks<br \/>\nSee <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/common-base-station-tasks\/\">this article<\/a> for a similar set of links for <strong>Base Station <\/strong>tasks<br \/>\nSee <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/common-caster-management-tasks\/\">this article<\/a> for a summary of these links.<\/p>\n<h2><b>Common IP Related Tasks<\/b><\/h2>\n<h3>How it works&#8230;<\/h3>\n<p>Every time a connection attempt is make to <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span>, the remote IP involved is logged.\u00a0 User names and mountPt requests are recorded.\u00a0 The <em>agent<\/em> used (the name of the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/question-what-is-an-ntrip-client\/\">NTRIP Client<\/a> software or of the browser) is also logged along with timestamps and other details.\u00a0 <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> uses a process called <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/geographic-reverse-ip-look-up\/\">geographic reverse IP look-up<\/a> to determine an estimated geographical location of the IP used.\u00a0 This process completes a few seconds after the initial use of the IP.\u00a0 This information is used to produce the reports and table which the below command displays.<\/p>\n<h3>See a summary of how an IP has been used<\/h3>\n<p>A usage report about any IP and how it has been used can be brought up in the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/the-document-viewer\/\">document viewer<\/a> by <strong>clicking on any IP link<\/strong> seen in various reports or in the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/console-logging\/\">console log<\/a>.\u00a0 There are hundreds of routine places these are used.\u00a0 A typical example is shown below of a routine new NTRIP Client connection.<\/p>\n<pre style=\"padding-left: 40px;\"><strong>[C83517]: New Client [#C83517] appears to an NTRIP Client connecting \r\n<\/strong><strong>Thu 03:23:36 PM (local), from <span style=\"color: #0000ff;\">AA.BB.CC.CC<\/span>:xxxxx with:\r\n[C83517]: An NTRIP Client sent: ====================== (172 chars)<\/strong>\r\nGET \/xxxFarms HTTP\/1.1\r\nHost: rtk2go.com\r\nAccept: *\/*\r\nUser-Agent: NTRIP RTKBridgeX\/1.0\r\nAuthorization: Basic Qxxxxxxvcg==\r\nConnection: close\r\n\u00a0\u00a0=<strong>END<\/strong>=\r\n[<strong>xxxFarms<\/strong>]: Mount Pt [ <span style=\"color: #00ccff;\">xxxFarms<\/span> ] is a <strong>match<\/strong> - allow C83517 connection (nnnnth active client on node).\r\n[<strong>xxxFarms<\/strong>]: Client <strong>'Case4440' #C83517<\/strong> [<span style=\"color: #0000ff;\"><strong>AA.BB.CC.DD<\/strong><\/span>:xxxxx] Connected to <span style=\"color: #00ccff;\"><strong>xxxFarms<\/strong><\/span> (nnnnth active client on node) at HH:MM:SS.sss PM (local)<\/pre>\n<p>Clicking on one of the the blue links marked\u00a0 <span style=\"color: #0000ff;\"><strong>AA.BB.CC.DD<\/strong><\/span>\u00a0 would display a report with details about the IP and how it has been used.<\/p>\n<h3>See what IP a User Account is using<\/h3>\n<p>Every connected User Account uses an IP to make the connection.\u00a0 Therefore you can click on the IP displayed in different reports about the user to see connection details.\u00a0 This can also be useful for debugging needs when a given user account is connecting with different tools from the same IP.\u00a0\u00a0 For various ways to display user reports <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/common-users-tasks\/\">see this article<\/a>.<\/p>\n<h3>See a specific IP report, over the Web<\/h3>\n<p>First <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/web-api-login\/\"><strong>Login<\/strong> <\/a>from an authorized account.\u00a0 Do this:\u00a0 From the Web API <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/web-api-top-page\/\">top page<\/a>, go to the <strong>Current <span style=\"color: blue;\">IP Address<\/span> Connection Records<\/strong>\u00a0 section near bottom of the page.\u00a0\u00a0 Filter for the IP of interest by adding all or part of the IP address and press <strong>Search for IPs<\/strong>.\u00a0 If no filter text is entered, all current IPs are shown. \u00a0\u00a0 A sorted list of all IPs matching the filter is then presented. <strong>Click<\/strong> on the IP of interest for a report.<\/p>\n<p>The master Admin account must be used to show the IPs section in the Web API top page.\u00a0 You can be logged in with <em>read-only<\/em> or <em>read-write<\/em> modes.\u00a0 This section of the Web API report is not available to Customer Account log ins.\u00a0 The <a href=\"https:\/\/www.use-snip.com\/downloads\/snip_web\/\">Web API Plug-In<\/a> is required for this feature.<\/p>\n<h3>See what IP a Base is using<\/h3>\n<p>Every connected Base Station uses an IP to make the connection.\u00a0 Therefore you can click on the IP displayed in different reports about the Base to see connection details.\u00a0 The IP displayed is typically where the remote <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/question-what-is-an-ntrip-caster\/\">NTRIP Caster<\/a> (in the case the <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/the-relay-streams-tab\/\">Remote-Relay<\/a> connections) or the remote <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/question-what-is-an-ntrip-server\/\">NTRIP Server<\/a> (in the case of <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/the-pushed-streams-tab\/\">Push_In<\/a> connections) is located.\u00a0 If a front facing proxy is being used at the remote site, that is the IP which is displayed.\u00a0 For various ways to display Base Station reports <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/common-base-station-tasks\/\">see this article<\/a>.<\/p>\n<h3>Look up an IP<\/h3>\n<p>You can also use <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> to look up any arbitrary IP you wish, even if it has never connected to<span style=\"color: #0000ff;\"><strong> SNIP<\/strong><\/span>.<\/p>\n<p style=\"padding-left: 40px;\">Use either of these menu commands:<br \/>\n<strong>Reports<\/strong> \u21d2 <strong>Active Users<\/strong> \u21d2 <strong>By IP Used&#8230;<\/strong> \u00a0\u00a0\u00a0 or<br \/>\n<strong>Reports<\/strong> \u21d2 <strong>Network Traffic <\/strong>\u21d2 <strong>IP Lookup&#8230;<\/strong><\/p>\n<p>And enter the IP you wish to lookup in the the resulting dialog.<\/p>\n<p>The result in displayed in about ~3 seconds in the document viewer [<strong>Aside<\/strong>: During this interval, your copy of <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> makes a secure JSON request to one of the <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> cloud servers and displays the resulting reply.\u00a0 The database used for this is updated daily as IP records change.]<\/p>\n<h3>Block a specific IP<\/h3>\n<p>Select the menu command: <strong>SetUp<\/strong> \u21d2 <strong>IP Ban Setting&#8230;<\/strong> to bring up the IP Ban Settings Dialog.\u00a0 Press the <strong>Edit<\/strong> button to add a new entry.\u00a0 Press the <strong>Add&#8230;<\/strong> button.\u00a0 Enter the IP string and the length of time it should be banned.\u00a0 See <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/banning-abusive-users-editing\/\">this article<\/a> for further details.<\/p>\n<h3>What IPs are Blocked<\/h3>\n<p>Select the menu command: <strong>Reports<\/strong> -&gt; <strong>Network Traffic<\/strong> -&gt; <strong>IP Bans Report<\/strong> to bring up a summary of the current and past IPs that have been blocked.\u00a0 Both permanent and temporary IPs are listed as well as the mountPt involved and any details (typically error reports from the last connective attempt).\u00a0 See <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/ip-ban-report\/\">this article<\/a> for further details.<\/p>\n<h3>Block a specific IP on the Host firewall<\/h3>\n<p>You can also use the firewall found on the host windows machine to block an IP or a range of IPs.\u00a0 Any IP blocked in this way will never reach <span style=\"color: #0000ff;\"><strong>SNIP<\/strong><\/span> (and therefore there are no logs of that IP or the user device trying to connect either).\u00a0 The article <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/managing-unwanted-user-connections\/\">Managing Unwanted Connections<\/a> has a discussion of this as well as more detailed instructions.<\/p>\n<h3>What IPs have used the Caster the most<\/h3>\n<p>Select the menu command: <strong>Reports<\/strong> -&gt; <strong>Network Traffic<\/strong> -&gt; <strong>IP Usage Report<\/strong> to bring up a summary of which IPs have connected to the Caster the most.\u00a0 For details see <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/ip-most-used-report\/\">this article<\/a>.\u00a0 This report is of value to detect when a given IP has become abusive and action needs to be taken.\u00a0 Some NTRIP Clients are not well behaved when the mountPt they are seeking is not found; and they will attempt to reconnect many times every second for hours on end.\u00a0 The <a href=\"https:\/\/www.use-snip.com\/kb\/knowledge-base\/banning-abusive-users-simple\/\">general IP blocking logic<\/a> handles such cases, but this report can be used for see where the problem originated from.<\/p>\n<h3>List Every IP Connection<\/h3>\n<p>To show a report with every IP connection and the users\/agent associated with it, select the menu command: <strong>Reports<\/strong> -&gt; <strong>Network Traffic<\/strong> -&gt; <strong>IP Connections<\/strong>\u00a0 This will display a (perhaps very long) report in the document viewer.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The below list provides quick links to FAQs regarding managing IP connections See this article for a similar set of links for User tasks See this article for a similar set of links for Base Station tasks See this article for a summary of these links. Common IP Related Tasks [&hellip;]<\/p>\n","protected":false},"author":13,"comment_status":"open","ping_status":"closed","template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"ht-kb-category":[114],"ht-kb-tag":[183,431,517],"class_list":["post-8275","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-faqs","ht_kb_tag-ip","ht_kb_tag-ip-adress","ht_kb_tag-ip-blocking"],"_links":{"self":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/8275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/comments?post=8275"}],"version-history":[{"count":14,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/8275\/revisions"}],"predecessor-version":[{"id":8523,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb\/8275\/revisions\/8523"}],"wp:attachment":[{"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/media?parent=8275"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb-category?post=8275"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.use-snip.com\/kb\/wp-json\/wp\/v2\/ht-kb-tag?post=8275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}