<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:wfw="http://wellformedweb.org/CommentAPI/" version="2.0">
<channel>
<title>Kensear</title>
<link>https://www.kensear.com/en/</link>
<atom:link href="https://www.kensear.com/en/feed/" rel="self" type="application/rss+xml"/>
<language>en-GB</language>
<description>Kensear provides detailed but easy-understanding experiments and tech knowledge, from Residential IP and Networking to Technology behind Web Servers.</description>
<lastBuildDate>Thu, 11 Sep 2025 08:00:00 +0800</lastBuildDate>
<pubDate>Thu, 11 Sep 2025 08:00:00 +0800</pubDate>
<item>
<title>Residential IP Labelled as IDC/Hosting? Why is this and How to Solve?</title>
<link>https://www.kensear.com/en/residential-ip-idc-label/</link>
<guid isPermaLink="false">https://www.kensear.com/en/residential-ip-idc-label/</guid>
<pubDate>Thu, 11 Sep 2025 08:00:00 +0800</pubDate>
<dc:creator>Kensear</dc:creator>
<description><![CDATA[You probably noticed that your Residential IP VPS can eventually be labelled as &ldquo;Data Centre IP&rdquo; after several weeks. Why is this? This article will explain more.]]></description>
<content:encoded xml:lang="en-GB"><![CDATA[<p>Do you notice this problem <span class="red">annoying</span> when you use Residential IPs or VPS?</p><p>Some IP or VPS providers managed to pick <span class="green">high-quality IPs</span>. When you just started using it, it's labelled as <span class="green">green "Home Broadband IP" type</span>.</p><p>After several weeks, it's eventually labelled as <span class="red">Internet Data Centre (IDC) IP</span> and even <span class="red">Hosting, Proxy and VPN types</span>.</p><p>No Worry! <span class="purple">Kensear Laboratory</span> will guide you <span class="blue">explore more about it</span>.</p><h2>Video</h2><p>Watch the YouTube video🎬 below for full experiments and solutions:</p><div class="half-margin-bottom"><iframe width="560" height="315" src="https://www.youtube.com/embed/FMazk9oKr1c?si=KmuMQ7AS9Loi2bWk" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div><p><a class="btn btn-red no-margin-bottom" href="https://youtu.be/FMazk9oKr1c" target="_blank"><i class="fa-brands fa-youtube"></i>&nbsp;<span>Watch on YouTube</span></a></p><h2>Background</h2><p>I have tested WiFis🛜 at 23 different places around Hong Kong during my last experiment (<a class="standard-link" href="https://www.kensear.com/en/hk-wifi-test/">article</a> and video).</p><p>You can notice that <span class="orange">nearly half</span> of the IPs were labelled as the <span class="red">red Internet Data Centre (IDC) IP type</span>. Some other IPs were labelled as <span class="red">Hosting or even VPN or Proxy</span> by other databases.</p><div class="img-box"><a class="img-link" style="width: 240px;" href="https://www.kensear.com/files/images/2025/08/ping0_iptype_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ping0_iptype_histogram.jpg" alt="IP Type Classification by Ping0 (Histogram)" /></a><p class="img-caption">IP Type Classification by Ping0 (Histogram)</p></div><p>Nearly everyone doesn't want their IPs to be <span class="red">labelled as Data Centre</span>. Some users may <span class="blue">keep changing the IP addresses of VPS servers</span> with support tickets.</p><p>If this problem continues, it will <span class="red">become worse</span> making many IP ranges labelled.</p><h2>Clue</h2><p>If you don't want your IPs being labelled as Data Centre or VPN, you need to know <span class="orange">HOW</span> do IP databases identify servers first.</p><p>Regardless of the databases (e.g., Ping0, IPinfo, ipdata), they <span class="red">all can identify</span> what IPs belong to servers or data centre.</p><p class="blue">Try to explore it with this clue.</p><div class="img-box"><a class="img-link" style="width: 600px;" href="https://www.kensear.com/files/images/2025/09/ip_database_detection_overview.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/ip_database_detection_overview.jpg" alt="IP Type Identification by IP Databases" /></a><p class="img-caption">IP Type Identification by IP Databases</p></div><h3>Ports of Computer IPs</h3><p>Now, using this clue, you can guess <span class="orange">what characteristics</span> do <span class="red">servers and data centres</span> typically have.</p><p>If you learned Linux OS, yYou might know that you can access to and manage a server with <span class="blue">Port 22 and SSH Protocol</span>.</p><p>Apart from Port 22, Port 80 is for HTTP and Port 443 is for HTTPS, and so on.</p><p>There are 65,535 ports under each computer and IP. Ports are necessary when you access to a server.</p><p>At this point, you might realise that IP database mainly checks whether an IP belongs to a server by <span class="red">port scanning</span>.</p><p>Especially IPinfo, labelling as “SSH” after successful scans of Port 22, labelling as “Webserver” after successful scans of Port 80 or 443 (including error pages like 404), and so on.</p><div class="img-box"><a class="img-link" style="width: 720px;" href="https://www.kensear.com/files/images/2025/09/common_ip_ports.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/common_ip_ports.jpg" alt="Common Ports of Computer IPs" /></a><p class="img-caption">Common Ports of Computer IPs</p></div><h2>Experiments</h2><h3>Experiment 1: Port Scanning Attempts</h3><p>I took out a <span class="green">Residential IP VPS server not being used often</span> in the first experiment.</p><p>Apart from my IP address, all other IP addresses were <span class="green">blocked by the firewall</span> and any <span class="orange">port scanning attempts</span> were <span class="red">saved to a log file</span>.</p><p>Around <span class="red">120 port scanning attempts</span> were received and logged within 5 minutes. <span class="red">15 to 30 times per minute</span> on average.</p><p>This proved that some IP databases <span class="blue">have their mass scanners</span> set up globally, <span class="red">scanning every single IP and port</span>.</p><div class="img-box"><a class="img-link" style="width: 640px;" href="https://www.kensear.com/files/images/2025/09/ip_scanners_worldwide.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/ip_scanners_worldwide.jpg" alt="Every IP can be Scanned 15 to 30 Times Per Minute" /></a><p class="img-caption">Every IP can be Scanned 15 to 30 Times Per Minute</p></div><p>Similarly, when you connect to a VPS server you have just bought via SSH, there can be <span class="red">many SSH login failed attempts</span> despite the <span class="blue">several-minute time gap</span>.</p><p>It's because some malicious scanners have been <span class="red">trying the SSH passwords around the world</span> by utilising this "time gap", especially the “root” account.</p><h3>Experiment 2: Proxy Discovered</h3><p>Now, move on to the second experiment.</p><p>I <span class="blue">set up Socks5 Proxy Server directly</span> on my first server as many Residential IP providers only provide Socks5 connections (can be connected from anywhere outside Mainland).</p><p>I will talk about the differences between Socks5 Proxy and VPS products here. While Socks5 Proxy is <span class="green">straightforward</span> <span class="blue">for beginners</span> and non-tech users, VPS servers <span class="green">can have more features</span> (e.g., web server) installed but <span class="orange">technical skills are required</span>.</p><p>The risk score of this IP was checked (<span class="green">near 0%</span>) after being purchased.</p><p>Several days later, however, it was <span class="red">labelled as "Proxy"</span> by IPQS with the risk score <span class="red">increased to 70% to 75%</span>.</p><p>This proved that many IP databases identify servers, whether server, proxy, etc., with <span class="red">global mass port scanning</span>.</p><p>While the port was specified like 1234 (<span class="blue">not default port</span>), the server was still labelled as Proxy. This also proved that <span class="red">any port</span> can be scanned.</p><div class="img-box"><a class="img-link" style="width: 760px;" href="https://www.kensear.com/files/images/2025/09/proxy_label_ipqs_appear.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/proxy_label_ipqs_appear.jpg" alt="Socks5 Proxy Discovered and so Labelled as Proxy by IPQS" /></a><p class="img-caption">Socks5 Proxy Discovered and so Labelled as Proxy by IPQS</p></div><h3>Experiment 3: All Ports Blocked</h3><p>Now, move on to the third interesting experiment.</p><p>Since the second experiment has made my IP labelled as Proxy or even High Risk, <span class="green">all ports were blocked</span> this time.</p><p>Another real Residential IP VPS I bought was <span class="red">directly VPN type</span> on IPinfo.</p><p>Same as the first experiment, all ports were blocked, including ICMP Ping, except my IP address.</p><p>One to two weeks later, IPinfo <span class="green">no longer identified it</span> as a VPN server. The VPN label <span class="green">eventually disappeared</span> changing back to a <span class="green">standard broadband IP</span>.</p><p>This proved that IP databases <span class="blue">always continue its scanning</span> regardless of whether it's labelled, so the labels can be removed if the problems no longer exist for a while. </p><div class="img-box"><a class="img-link" style="width: 720px;" href="https://www.kensear.com/files/images/2025/09/vpn_label_disappear.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/vpn_label_disappear.jpg" alt="VPN Label Disappeared After Port Blocking" /></a><p class="img-caption">VPN Label Disappeared After Port Blocking</p></div><h3>Experiment 4: Large IP Range of a University</h3><p>Then I used one of the <span class="purple">B Ranges of our university</span> as an example.</p><p>Simply speaking, B Range means the "/16" range. If an IP address has the same <span class="blue">first 2 parts</span>, it belongs to this B Range.</p><p>Similarly, A Range means the <span class="blue">first part</span> and C Range means the <span class="blue">first 3 parts</span>.</p><p>This B Range of our university is for wired network and servers. Some C Ranges are for <span class="blue">Computer Barn</span>, some are for <span class="blue">official website and other internal servers</span>, and some are for <span class="blue">Residential Wired Network</span>.</p><p>I predicted that Ping0 labels IP type based on each <span class="orange">C Range</span>, whether green “Home Broadband IP” or red “Data Centre IP”. We may check it with this experiment.</p><p>You can notice that all C Ranges for servers are labelled as <span class="red">red “Data Centre IP”</span> while all C Ranges for wired network are labelled as <span class="green">green “Home Broadband IP”</span>.</p><p>This is because the IT department of our university <span class="red">blocks all inbound connections</span> with the firewall for all C Ranges for other than servers, same as the university WiFi, including all ports and ICMP Ping. While it can’t be accessed by any IP address outside, it can access to any IP.</p><p>For this reason, it’s labelled as <span class="green">“Home Broadband IP”</span>.</p><div class="img-box"><a class="img-link" style="width: 720px;" href="https://www.kensear.com/files/images/2025/09/university_ip_b_range.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/university_ip_b_range.jpg" alt="Purposes of Different C Ranges under our University B Range" /></a><p class="img-caption">Purposes of Different C Ranges under our University B Range</p></div><h2>Solutions</h2><p>These are the reasons why a Residential IP can be labelled as Data Centre or even VPN.</p><p>These experiments proved that IP databases mainly rely on <span class="red">port scanning</span> to check whether every single IP belongs to a server.</p><p>Do you know <span class="orange">how to let IP databases recognise my IPs as <span class="green">broadbands</span> instead of <span class="red">server, VPN or proxy</span>?</span></p><p>Now move on to some possible solutions.</p><h3>Solution 1: Block All IPs (Inbound)</h3><p>First, make sure you <span class="green">block all ports with a firewall</span> not allowing ports to be discovered by the mass scanners running 24*7 worldwide.</p><p>Many home broadbands <span class="blue">don't allow any connection from the outside</span> so they are labelled as “Home Broadband IP”.</p><p>But if you block all ports, you will <span class="red">not be able to connect</span> to it as well!</p><p>As you can notice, this solution <span class="red">has a conflict</span>.</p><div class="img-box"><a class="img-link" style="width: 640px;" href="https://www.kensear.com/files/images/2025/09/block_all_ports.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/block_all_ports.jpg" alt="Block Inbound Connections from All IPs" /></a><p class="img-caption">Block Inbound Connections from All IPs</p></div><h3>Solution 2: Only Whitelist your IP</h3><p>You noticed that you will no longer be able to connect after blocking all IPs. How about <span class="green">only allowing your IP</span>?</p><p>You need to ensure it's a <span class="green">static IP✅</span>, not a <span class="red">dynamic IP❌</span>.</p><p>Generally speaking, the IP address <span class="orange">can be changed at any time</span> whether the broadband or university IPs outside Mainland I use or public proxy services for Mainland users.</p><p>Once it's changed, you will need to whitelist your latest IP again. <span class="red">Sounds annoying?</span></p><p>Also, if your dynamic IP eventually falls outside your whitelist, you will <span class="orange">not be able to connect</span> via SSH.</p><div class="img-box"><a class="img-link" style="width: 720px;" href="https://www.kensear.com/files/images/2025/09/dynamic_ip.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/dynamic_ip.jpg" alt="No Longer being Able to Connect After Dynamic IP Changes" /></a><p class="img-caption">No Longer being Able to Connect After Dynamic IP Changes</p></div><h3>Solution 3: Add Another Intermediate Server</h3><p>So, if my IP is dynamic, how can I <span class="green">connect to the server in a long-term </span>while <span class="red">not allowing mass scanners</span>?</p><p><span class="green">Yes, there is still a way to solve it</span>, but you may need to <span class="orange">spend a bit more</span>.</p><p>You will need to have a static IP address, <span class="blue">changing your dynamic IP to this static IP</span>.</p><p>What you will need to do is just to <span class="orange">buy another</span> intermediate server with a static IP, like your Residential IP VPS.</p><div class="img-box"><a class="img-link" style="width: 660px;" href="https://www.kensear.com/files/images/2025/09/add_an_intermediate_server.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/add_an_intermediate_server.jpg" alt="New Structure with an Intermediate Server Added" /></a><p class="img-caption">New Structure with an Intermediate Server Added</p></div><p>It's better to use an intermediate IP <span class="green">labelled as Hosting and Data Centre, and closer to your Residential IP</span>.</p><p>You <span class="blue">don't need to care how risky it is</span>. It's <span class="green">completely OK</span> if it is 100% risky or labelled as something like VPN.</p><p>After setting up both servers, you will still need to <span class="red">set up your IP whitelist</span> to not to let the mass scanners outside come into your Residential IP server.</p><h2>Real Demo</h2><p>These are the theoretical knowledge. Now, let's move into our demo!</p><p>Kensear Laboratory main uses <span class="purple">Debian 12 or 11 OS</span>, but the commands will be quite similar for other operating systems.</p><p>I have <span class="blue">an intermediate server and a residential IP server</span>.</p><p>Connect to the intermediate server first with your <span class="blue">SSH credentials</span> and combined command:</p><div class="img-box"><a class="img-link" style="width: 500px;" href="https://www.kensear.com/files/images/2025/09/ssh_server_info.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/ssh_server_info.jpg" alt="Server SSH Connection Information &amp; Command" /></a><p class="img-caption">Server SSH Connection Information &amp; Command</p></div><p>Then <span class="blue">connect to your Residential IP server via your intermediate one</span>, as you will only whitelist your intermediate server (the latter).</p><p>You will <span class="red">not be able to connect</span> to it directly from your computer.</p><div class="img-box"><a class="img-link" style="width: 560px;" href="https://www.kensear.com/files/images/2025/09/residential_ip_direct_connection_after_blocking.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/residential_ip_direct_connection_after_blocking.jpg" alt="Only Intermediate IP Allowed, Other IPs Blocked" /></a><p class="img-caption">Only Intermediate IP Allowed, Other IPs Blocked</p></div><p class="purple">Commands Used in the Video Demo:</p><p class="code code-shell">sudo -iapt updateapt upgradeapt purge ufw firewalld iptablesapt install iptables iptables-persistent netfilter-persistentiptables -A INPUT -i lo -j ACCEPTiptables -A INPUT -m state --state ESTABLISHED,RELATED -j ACCEPTiptables -A INPUT -s (Your Intermediate IP) -j ACCEPTiptables -A INPUT -j DROPnetfilter-persistent savereboot</p><p>After this setup, try to connect to your Residential IP <span class="blue">directly from your computer</span> with the following commands.</p><p>You will <span class="blue">not be able to connect</span> if you have <span class="green">set up correctly</span>.</p><p>Then run the following commands again after connecting to your intermediate server. You will <span class="blue">only be able to connect from it</span>.</p><p class="green">Well Done!</p><p class="code code-shell">ping -c 4 (Your Residential IP)ssh root@(Your Residential IP) -p 22curl (Your Residential IP):(Proxy Port)</p><h3>Still Labelled as Data Centre / Proxy?</h3><p>Some users may find it strange that their IPs are <span class="red">still labelled as Data Centre or even Proxy</span> after several weeks, even if they have <span class="green">confirmed that the firewall has been set up properly</span>.</p><p>Why is this?</p><p>This is because the database checks for IP types <span class="orange">based on C Range</span> rather than each IP and <span class="red">there were many other IPs and servers detected</span> under the same C Range.</p><p>Moreover, if you <span class="orange">can't access streaming services, see "IP Banned", or your IP labelled as Mainland</span>, it's <span class="green">not your fault!</span> It's because some other IPs under the <span class="orange">same C Range</span> are used by some <span class="red">Mainland public proxy providers</span>.</p><p>But anyway, while you can't control others, <span class="blue">just improve yourself first</span>.</p><div class="img-box"><a class="img-link" style="width: 780px;" href="https://www.kensear.com/files/images/2025/09/c_range_issue.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/c_range_issue.jpg" alt="Residential IP C Range Labelled as IDC" /></a><p class="img-caption">Residential IP C Range Labelled as IDC</p></div><h3>My Intermediate IP Disappeared, What can I Do?</h3><p>I also have a backup plan. If all your <span class="red">intermediate servers cannot be used</span>, what can I do?</p><p>No Worry! You can see the <span class="green">VNC function</span> for most VPS providers.</p><p>Use the VNC function, log in to your account, turn off your proxy software.</p><div class="img-box"><a class="img-link" style="width: 480px;" href="https://www.kensear.com/files/images/2025/09/vps_vnc_option.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/vps_vnc_option.jpg" alt="VNC Function in some VPS Providers" /></a><p class="img-caption">VNC Function in some VPS Providers</p></div><p>Type “<span class="blue">iptables -F</span>” to <span class="green">release your firewall temporarily</span>. All IPs will be able to connect again to reconfigure the firewall.</p><p class="code code-shell">iptables -F</p><h2>More Interesting Facts</h2><h3>Socks5 Proxy with Intermediate IP</h3><p>I also noticed some relevant interesting facts.</p><p>You <span class="red">can't connect</span> to the given Residential IP via Socks5 <span class="red">directly</span> for some Socks5 Residential Proxy providers. You will be given another shared <span class="green">entry node IP</span> like an intermediate server.</p><p>From my observation, the IPs by such providers have <span class="green">high trust scores</span> on IPData and labelled as <span class="green">green “Broadband IP”</span> on Ping0 which might be <span class="green">your favourite</span>.</p><p>But for those letting you connect to your Residential IP directly, the trust score are <span class="red">nearly zero</span> on IPData and might be labelled as <span class="red">red “Data Centre IP</span>” on Ping0.</p><div class="img-box"><a class="img-link" style="width: 720px;" href="https://www.kensear.com/files/images/2025/09/socks5_proxy_with_intermediate.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/socks5_proxy_with_intermediate.jpg" alt="Some Socks5 IP Proxy Cannot be Connected Directly without Intermediate IP" /></a><p class="img-caption">Some Socks5 IP Proxy Cannot be Connected Directly without Intermediate IP</p></div><h3>Anti-scan IP Blocking Method</h3><p>When you ban some IP addresses, <span class="red">don't give any response</span>, whether <span class="orange">Your IP is Banned, Invalid Password, 403 Forbidden, or even a blank webpage</span>.</p><p>This is because it <span class="red">may also be recognised as a server or proxy</span>.</p><p>So, what should you do? You must <span class="green">block the ports entirely</span> (i.e., connection timeout).</p><div class="img-box"><a class="img-link" style="width: 720px;" href="https://www.kensear.com/files/images/2025/09/block_entire_port.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/block_entire_port.jpg" alt="Error Messages may Still Result in Webserver IP Label" /></a><p class="img-caption">Error Messages may Still Result in Webserver IP Label</p></div><h3>Ping Blocked on some VPS Providers</h3><p>Some VPS providers <span class="orange">block ICMP Ping</span> for all their IPs as they <span class="blue">don't want their IPs labelled as “Data Centre” by Ping0</span>.</p><p>For example. Some VPS provider websites show this message:<br>“应IP提供方要求，本产品部分IP段<span class="orange">禁了ping</span>，但禁ping<span class="green">不影响正常使用</span>”</p><div class="img-box"><a class="img-link" style="width: 560px;" href="https://www.kensear.com/files/images/2025/09/vps_provider_ping_banned.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/09/vps_provider_ping_banned.jpg" alt="Ping Blocked on some VPS Providers" /></a><p class="img-caption">Ping Blocked on some VPS Providers</p></div><h2>Summary</h2><p>Many of my experiments proved that IP databases have <span class="red">many mass scanners</span> working 24*7, <span class="red">scanning IP addresses worldwide</span> and checking whether they are servers, proxies or VPN.</p><p>If you don't want your IPs labelled as “Data Centre”, you need to <span class="green">block all ports</span>.</p><p>But because <span class="red">you will not be able to access it</span> and your IP <span class="orange">may change at any time</span>, you will need <span class="blue">another intermediate server with a static IP</span>, whitelisting its IP address.</p><p>That's the end and see you next time! <span class="purple">You can also explore more on my website &amp; channel.</span></p>]]></content:encoded>
</item>
<item>
<title>HK Free &amp; University WiFi Real IP Test | Streaming &amp; IP Risk Score under Real Native Residential IP</title>
<link>https://www.kensear.com/en/hk-wifi-test/</link>
<guid isPermaLink="false">https://www.kensear.com/en/hk-wifi-test/</guid>
<pubDate>Sun, 24 Aug 2025 20:00:00 +0800</pubDate>
<dc:creator>Kensear</dc:creator>
<description><![CDATA[Everyone, especially Mainland users, cares about the risk score of each IP. How about HK broadband? I spent 3 days for the WiFi testing under 23 WiFi hotspots.]]></description>
<content:encoded xml:lang="en-GB"><![CDATA[<p>Everyone, especially Mainland students abroad🧑‍🎓 and company users, cares about the <span class="red">risk score</span> of each IP and <span class="green">whether online streaming services are accessible</span>🎬.</p><p>As mentioned on other channels and articles online, using proxies⛓️‍💥 with thousands of (or even more) other users <span class="red">increases the risk of account ban</span>🚫, making Residential IPs an <span class="blue">essential for Mainland users</span>.</p><p>Due to the <span class="orange">very large demand</span> of Residential IPs and relevant VPS servers by Mainland users, they can be <span class="red">sold out very quickly</span>🫙 and even <span class="red">majorly abused</span>⚠️, increasing the risk score of such IP addresses.</p><p>But do you know how do the IP addresses of the HK broadband that we use every day look like?</p><p>To answer this question, I spent 3 days for the WiFi testing under 23 WiFi hotspots🛜 around Hong Kong.</p><p>My Test Script: <a class="standard-link" href="https://github.com/Kensear/ip-check-hk-personal" target="_blank">https://github.com/Kensear/ip-check-hk-personal</a></p><h2>Video</h2><p>Watch the YouTube video🎬 below for full test progress:</p><div class="half-margin-bottom"><iframe style="width: 640px; max-width: 100%; aspect-ratio: 16 / 9;" src="https://www.youtube.com/embed/kR7mlgu3WmE?si=VDcYR6mzMT2n_fC6" title="YouTube video player" frameborder="0" allow="accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share" referrerpolicy="strict-origin-when-cross-origin" allowfullscreen></iframe></div><p><a class="btn btn-red no-margin-bottom" href="https://youtu.be/kR7mlgu3WmE?si=MGxl0bX9fQltZKvI" target="_blank"><i class="fa-brands fa-youtube"></i>&nbsp;<span>Watch on YouTube</span></a></p><h2>About this Research/Experiment</h2><h3>What were Mainly Tested?</h3><p>23 places with WiFi hotspots🛜 were random selected, including:</p><ul class="list-wide list-stick"><li><span class="blue">Free WiFi</span> in Coffee Shops☕️, Shopping Malls🏬, etc.</li><li>WiFi in 4 HK <span class="green">Universities</span>🏫</li></ul><p>The following information were collected for each WiFi hotspot:</p><ol class="list-wide list-stick"><li><span class="blue">ISP Info</span>, including AS (Autonomous Systems) Number (e.g., AS3363, AS4760)</li><li>Whether Accessible to (or Banned by) <span class="blue">Streaming Services (e.g., Netflix)</span></li><li>IP <span class="green">Quality</span> and <span class="red">Risk Score</span></li><li><span class="blue">DNS Servers</span> Used (whether ISP or Public DNS (like <span class="green">>8.8.4.4</span))</li><li><span class="blue">Routing and Latency</span> to Major 3 ISPs (Telecom, Mobile and Unicom) in Mainland</li></ol><div class="note-box note-box-orange note-box-reminder"><div class="note-box-content"><p class="note-box-title"><i class="fa-solid fa-circle-info"></i> Reminder</p><p>You may <span class="green">ignore</span> the test results of <span class="blue">TikTok, ChatGPT, Gemini and Claude</span> as they are <span class="red">not available</span> in HK region.</p></div></div><h3>WiFi Testing for HK Universities</h3><p>As a <span class="purple">HK university student</span>🧑‍🎓, it's my great opportunity to <span class="blue">test the "eduroam" WiFi</span> of each university.</p><p>It's worth to know that it <span class="orange">takes 5 to 12 seconds</span>⏳ to load content (like WeChat messages) when using Mainland websites and apps under <span class="purple">my university WiFi</span>🏫 with <span class="orange">latencies around 150ms</span>🐢 (discovered via traceroute/mtr commands, BGP routing issues).</p><div class="img-box"><a class="img-link" style="width: 520px;" href="https://www.kensear.com/files/images/2025/08/uni_wifi_to_mainland_ip_ping.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/uni_wifi_to_mainland_ip_ping.jpg" alt="Latency to Mainland IP Addresses from University WiFi" /></a><p class="img-caption">Latency to Mainland IP Addresses from University WiFi</p></div><p>This issue <span class="green">does not exist</span> loading <span class="green">under just 1 second</span>, however, when using them under broadbands or mobile data (e.g., HKT, HKBN and CMHK).</p><p>For this reason, I did another experiment🧪 <span class="blue">testing the "eduroam" WiFi of 8 HK universities around HK in one day</span>. Please stay tuned for my latest articles for more information.</p><p>Two (2) months later followed by my report to my university IT department, the routing was <span class="green">successfully fixed</span>✅ with latencies <span class="green">10-20ms</span> only.</p><h3>HK Local ISPs</h3><p>The following commonly-seen HK ISPs were discovered (for reference only) during this WiFi testing and basd on Residential IP VPS on the Internet:</p><p class="blue"><i class="fa-solid fa-arrows-left-right"></i> Swipe Left/Right for Full Table Content</p><div class="table-hscroll"><table border="1"><thead><tr><th>Name</th><th>Hostname Suffix</th><th>AS Number</th><th>Type</th></tr></thead><tbody><tr><td>HKT (PCCW)<br><span class="blue">(including HKT Enterprise)</span></td><td>netvigator.com, imsbiz.com</td><td>AS4760</td><td><span class="green">H</span>/<span class="blue">B</span></td></tr><tr><td>HKT GPRS Network (PCCW)</td><td>pccw-hkt.com</td><td>AS38819</td><td><span class="pink">M</span></td></tr><tr><td>HKT-DIA (PCCW)</td><td>imsbiz.com</td><td>AS4515</td><td><span class="blue">B</span></td></tr><tr><td>HKBN</td><td>ctinets.com</td><td>AS9269<br>AS10103</td><td><span class="green">H</span>/<span class="blue">B</span></td></tr><tr><td>WTT (HKBN Enterprise / HKBNes)</td><td></td><td>AS9381</td><td><span class="blue">B</span></td></tr><tr><td>CMHK</td><td>hk.chinamobile.com</td><td>AS9231<br>AS137872</td><td><span class="green">H</span>/<span class="pink">M</span></td></tr><tr><td>HGC</td><td>**-on-nets.com / hutchcity.com</td><td>AS9304</td><td><span class="green">H</span>/<span class="blue">B</span></td></tr><tr><td>3/Three</td><td></td><td>AS10118</td><td><span class="green">H</span>/<span class="pink">M</span></td></tr><tr><td>SmarTone</td><td>smartone.com</td><td>AS17924</td><td><span class="green">H</span>/<span class="pink">M</span></td></tr><tr><td>i-Cable</td><td>hkcable.com.hk</td><td>AS9908</td><td><span class="green">H</span></td></tr><tr><td>JUCC (Joint Universities Computer Centre)<br><span class="red">(University Only)</span><br><span class="blue">(similar to CERNET in Mainland)</span></td><td></td><td>AS3662</td><td><span class="blue">B</span></td></tr></tbody></table></div><p><span class="green"><b>H:</b> Home Broadband</span> / <span class="blue"><b>B:</b> Business Broadband</span> / <span class="pink"><b>M:</b> Mobile Data</span></p><h2>Result Data</h2><p>The experiment result data is available in <span class="blue">JSON, CSV and PDF format</span> you can download below. You may also refer to the <span class="red">YouTube video at the top⬆️</span>.</p><p>This is for <span class="green">better experience of showcasing experiment results</span>.</p><p><a class="btn btn-orange" href="https://www.kensear.com/files/research-results/hk-wifi-test-2025/hk_wifi_test.json"><i class="fa-solid fa-download"></i>&nbsp;<span>JSON</span></a><a class="btn btn-green" href="https://www.kensear.com/files/research-results/hk-wifi-test-2025/hk_wifi_test.csv"><i class="fa-solid fa-download"></i>&nbsp;<span>CSV</span></a><a class="btn" href="https://www.kensear.com/files/research-results/hk-wifi-test-2025/hk_wifi_test_summary.pdf"><i class="fa-solid fa-download"></i>&nbsp;<span>PDF</span></a></p><h2>Summary &amp; Statistics</h2><h3>IPinfo</h3><p>Many people enjoy IP addresses with <span class="green">both "ISP" labels for ASN and Company respectively (Both "ISP")</span> by IPinfo based on other online videos and articles.</p><div class="img-box"><a class="img-link" style="width: 550px;" href="https://www.kensear.com/files/images/2025/08/ipinfo_dual_isp_result.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipinfo_dual_isp_result.jpg" alt="IP Addresses with Both &quot;ISP&quot; Labels by IPinfo" /></a><p class="img-caption">IP Addresses with Both "ISP" Labels by IPinfo</p></div><p>In my real life, however, <span class="red">not all</span> IP addresses belong to Both "ISP" type.</p><p>The following table shows the IP address types collected in this experiment:</p><table border="1"><tbody><tr><td class="red">Both "Hosting"</td><td>WTT (HKBNes)</td></tr><tr><td class="blue">Both "Education"</td><td>All University ASNs</td></tr><tr><td class="green">Both "ISP"</td><td>All Other ISPs</td></tr></tbody></table><p>You may wonder why WTT/HKBNes is labelled as <span class="red">Both "Hosting" (and even "VPN")</span> type by IPinfo despite a <span class="green">real ISP (Internet Service Provider)</span>?</p><p>I have contacted IPinfo before.</p><p>In its email reply with the evidence from its mass scanners, however, IPinfo mentioned the <span class="orange">large number of domain names pointed to (DNS records) and VPN servers</span> under this ASN.</p><p>For this reason, this ASN was <span class="red">labelled as "Hosting"</span> and my appeal was not successful.</p><p>It's worth to note that IP labels (e.g., Hosting and VPN) <span class="green">do not directly impact the accessibility</span> to streaming services. That means, <span class="green">we can still use such services as usual</span> despite Hosting/VPN labels.</p><p>The IP ban of each Internet (especially streaming) service is actually based on the <span class="red">number of users/abusers</span> regardless of IP types (whether Home Broadband, Internet Data Centre (IDC), etc.).</p><div class="img-box"><a class="img-link" style="width: 550px;" href="https://www.kensear.com/files/images/2025/08/ipinfo_hosting_type_email_reply.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipinfo_hosting_type_email_reply.jpg" alt="Email Reply from IPinfo" /></a><p class="img-caption">Email Reply from IPinfo</p></div><h3>IPData</h3><p>The trust scores of real residential and business broadbands are usually <span class="green">between 60% and 70%</span> based on the statistics of IPData.</p><p>There are also a few IP addresses with trust scores <span class="green">over 80% to 90%</span> and a few <span class="red">under 30%</span> (high-risk) due to some open ports (e.g., Port 80/443).</p><p><b class="green">(Trust Score)</b> Mean: 62.57; SD: 24.52; Min: 3; Max: 96</p><p><b class="red">(Risk Score)</b> Mean: 37.43; SD: 24.52; Min: 4; Max: 97</p><div class="img-box"><a class="img-link" style="width: 350px;" href="https://www.kensear.com/files/images/2025/08/ipdata_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipdata_histogram.jpg" alt="IP Risk Scores by IPData (Histogram)" /></a><p class="img-caption">IP Risk Scores by IPData (Histogram)</p></div><div class="img-box"><a class="img-link" style="width: 520px;" href="https://www.kensear.com/files/images/2025/08/ipdata_box_plot.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipdata_box_plot.jpg" alt="IP Risk Scores by IPData (Box Plot)" /></a><p class="img-caption">IP Risk Scores by IPData (Box Plot)</p></div><h3>Ping0</h3><p>The risk scores of real residential/business broadbands were <span class="blue">all under 25%</span> based on statistics of Ping0.</p><p>Mean: 12.70; SD: 5.96; Min: 3; Max: 25</p><div class="img-box"><a class="img-link" style="width: 500px;" href="https://www.kensear.com/files/images/2025/08/ping0_risk_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ping0_risk_histogram.jpg" alt="IP Risk Scores by Ping0 (Histogram)" /></a><p class="img-caption">IP Risk Scores by Ping0 (Histogram)</p></div><div class="img-box"><a class="img-link" style="width: 450px;" href="https://www.kensear.com/files/images/2025/08/ping0_risk_box_plot.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ping0_risk_box_plot.jpg" alt="IP Risk Scores by Ping0 (Box Plot)" /></a><p class="img-caption">IP Risk Scores by Ping0 (Box Plot)</p></div><p>Nevertheless, <span class="orange">nearly half</span> of the IPs tested were labelled as <span class="red">red "Internet Data Centre (IDC) IP"</span> instead of <span class="green">green "Home Broadband IP"</span>.</p><div class="img-box"><a class="img-link" style="width: 240px;" href="https://www.kensear.com/files/images/2025/08/ping0_iptype_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ping0_iptype_histogram.jpg" alt="IP Type Classification by Ping0 (Histogram)" /></a><p class="img-caption">IP Type Classification by Ping0 (Histogram)</p></div><h3>Scamalytics</h3><p>The statistics of Scamalytics shows discrete data with <span class="green">0% risk score</span> for many IPs.</p><p>This indicate that real broadband IPs <span class="green">majorly have clean records</span>.</p><p><b class="green">0%:</b> 16; <b class="green">2%:</b> 3; <b class="green">5%:</b> 1; <b class="green">11%:</b> 3</p><div class="img-box"><a class="img-link" style="width: 320px;" href="https://www.kensear.com/files/images/2025/08/scamalytics_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/scamalytics_histogram.jpg" alt="IP Risk Scores by Scamalytics (Histogram)" /></a><p class="img-caption">IP Risk Scores by Scamalytics (Histogram)</p></div><h3>IP Jiance (IP检测)</h3><p>IP Jiance (IP检测) website mainly targets <span class="blue">Mainland users using outside Internet services for their business</span> with the <span class="green">need of dedicated IPs</span> (i.e., not shared with anyone else).</p><p>Nearly 1/3 IPs are shared by more than one (1) user (i.e., many user accounts under the same Internet service) and so labelled as <span class="red">red "Not Recommended"</span>, likely a public proxy service (a.k.a., 机场 Airport).</p><p><b class="green">优良 (Excellent):</b> 15<br><b class="orange">合格 (Satisfactory):</b> 0<br><b class="red">不建议 (机场) (Not Recommended due to Public Proxy):</b> 8</p><p></p><div class="img-box"><a class="img-link" style="width: 300px;" href="https://www.kensear.com/files/images/2025/08/ipjiance_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipjiance_histogram.jpg" alt="IP Risk Scores by ipjiance (Histogram)" /></a><p class="img-caption">IP Risk Scores by ipjiance (Histogram)</p></div><p>There is something important but interesting to know.</p><p>For my university WiFi IP address, IP Jiance shows <span class="green">green "Excellent"</span> during winter and summer but <span class="red">red "Not Recommended"</span> during regular terms (i.e., Fall/Spring Term).</p><p>From my prediction, many Mainland students <span class="blue">live in Halls (dormitory)</span> and so register accounts on Internet services like Google, Instagram and WhatsApp <span class="orange">under the university WiFi IP ranges</span>.</p><div class="img-box"><a class="img-link" style="width: 750px;" href="https://www.kensear.com/files/images/2025/08/uni_wifi_ipjiance_results.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/uni_wifi_ipjiance_results.jpg" alt="IP Jiance Test Results for University WiFi in Different Time" /></a><p class="img-caption">IP Jiance Test Results for University WiFi in Different Time</p></div><h3>IPQS</h3><p>Many IP addresses, regardless of whether real broadband IPs or IDC IPs, are labelled as <span class="red">VPN, Proxy or Abuser</span> by IPQS.</p><p>Many IP address show risk scores of <span class="blue">either 0 or 100</span> with a very large Standard Deviation (SD): 42.97</p><p>From my prediction, the risk scores can be determined by the <span class="red">number of users</span> for IPQS regardless of the open ports.</p><p>Mean: 58.32; SD: 42.97; Min: 0; Max: 100</p><div class="img-box"><a class="img-link" style="width: 600px;" href="https://www.kensear.com/files/images/2025/08/ipqs_histogram.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipqs_histogram.jpg" alt="IP Risk Scores by IPQS (Histogram)" /></a><p class="img-caption">IP Risk Scores by IPQS (Histogram)</p></div><div class="img-box"><a class="img-link" style="width: 450px;" href="https://www.kensear.com/files/images/2025/08/ipqs_box_plot.jpg" target="_blank"><img src="https://www.kensear.com/files/images/2025/08/ipqs_box_plot.jpg" alt="IP Risk Scores by IPQS (Box Plot)" /></a><p class="img-caption">IP Risk Scores by IPQS (Box Plot)</p></div><h3>My Summary</h3><p>Now, move on to <span class="purple">my personal summary</span>.</p><p>All IP addresses tested among the 23 places are <span class="green">Native IPs</span> rather than <span class="red">Broadcasted IPs</span> possibly with wrong country/region labels.</p><p>A very few network <span class="orange">may not have their routers or firewalls set up properly</span> with open ports, being labelled as <span class="red">Server, Proxy or VPN</span> types.</p><p>Other than Wikipedia Editing, all streaming services, including Instagram Licensed Audio library, <span class="green">can be used</span> by all IP addresses (all are <span class="green">green "Yes"</span>).</p><p>Hosting, VPN and Proxy labels are for reference only. This <span class="blue">only indicates open ports</span> but <span class="orange">doesn't mean</span> it will <span class="orange">definitely</span> be banned by websites/services.</p><div class="note-box note-box-orange note-box-reminder"><div class="note-box-content"><p class="note-box-title"><i class="fa-solid fa-circle-info"></i> Reminder</p><p>For safety reason, preventing IP abuse and protecting your user accounts, <span class="orange">don't give your Residential IP to any stranger on the <b class="red">Internet</b></span> (as a Residential Proxy)!</p></div></div>]]></content:encoded>
</item>
</channel>
</rss>