Enterprise IP Cloaking and Web Harvesting

<< Back to Enterprise Threat Center

IP Cloaking

IP Cloaking

What is IP cloaking?
IP cloaking is the process of delivering one version of a Web page to one user and a completely different version to another user.

Some administrators use IP cloaking to obtain higher rankings with search engines while other administrators use cloaking to keep their competitors from seeing accurate information on their Web site. And a few site administrators use IP cloaking to block Web harvesting activities by their competitors.

How does IP cloaking work?
The illustration on the right depicts a site that uses web cloaking to hide its information from Web harvesting and site scraping. When the Web server receives a page request, a script checks the IP address of the user against a list of known competitor IP addresses. If a match is found, the server delivers a Web page with false information including pricing and products. If no IP address match is found, the visitor is sent to a Web page with real or accurate information.

How can I protect my organization against IP cloaking?
The key to achieving completely discrete Internet surfing is a function of protecting your IP address when you visit Web sites. Using anonymous proxies, or IP hiding tools, allows you complete access to the real, accurate information you are searching for. Having access to accurate data makes Web harvesting easier and more beneficial.

Contact Anonymizer to learn about enterprise-class anonymous proxies and how to outsmart IP cloaking sites today.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top