Government Threat Center

<< Back to Government Threat Center

IP-Based Cloaking

IP-Based Cloaking

What is IP-based cloaking?
IP-based cloaking, or simply “cloaking”, is the process of delivering one version of a Web page to one user and a completely different version to another user.

There are several reasons site administrators may want to do this. For example, some administrators use cloaking to obtain higher rankings with search engines. Other administrators use cloaking to keep their competitors from seeing accurate information on their Web site. And there are other administrators who use cloaking to keep law enforcement and government officials from viewing their actual Web sites because they are promoting or engaging in illegal activities.

How does cloaking work?
The illustration on the right depicts a cloaking site that cloaks itself from government entities. When the Web server receives a page request, a script checks the IP address of the user against a list of known government IP addresses. If a match is found, the server delivers a Web page with fake information. If no match is found, the requesting user is sent to a Web page with real information.

How can I protect my organization against cloaking?
The key to achieving completely discrete Internet surfing is a function of protecting your IP address when you visit Web sites.

Contact Anonymizer to learn about enterprise-class non-attribution solutions.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top