Live Detection · No Signup

What Is My IP Address?

Your public IP address, CIDR notation, location, ISP — detected instantly. Plus ready-to-paste whitelist configs for AWS, MongoDB Atlas, GCP, and Linux.

ipwhitelist.dev — live detection
Secure · No logs
Your Public IP Address
Detecting…
CIDR:
📍 City
🌍 Country
📡 ISP / AS
⏱ Latency
IP Fingerprint
Checking…
Not a known proxy
No VPN detected
Not on blocklists
Residential IP
IPv4 public range
Low abuse score
Advertisement
1
AWS CLI — Security Group Ingress
Add your IP to an EC2 Security Group inbound rule
AWS CLI
# Authorize your IP in a Security Group
aws ec2 authorize-security-group-ingress \
  --group-id sg-xxxxxxxxxxxxxxxxx \
  --protocol tcp \
  --port 443 \
  --cidr Detecting…/32
2
Terraform Resource Block
Drop into your .tf file — IaC ready
Terraform HCL
resource "aws_security_group_rule" "dev_ip_access" {
  type              = "ingress"
  from_port         = 443
  to_port           = 443
  protocol          = "tcp"
  cidr_blocks       = [Detecting…/32]
  security_group_id = "sg-xxxxxxxxxxxxxxxxx"
  description       = "Dev IP — ipwhitelist.dev"
}
3
AWS Console Path
EC2 → Security Groups → Your Group → Inbound Rules → Edit → Add Rule
Type: Custom TCP · Port: 443 · Source: Detecting…/32
1
CIDR for Atlas UI
Network Access → Add IP Address
CIDR
Detecting…/32   # Paste in Atlas → Network Access → Add IP
2
Atlas CLI
Atlas CLI
# brew install mongodb-atlas
atlas accessLists create \
  --projectId YOUR_PROJECT_ID \
  --cidr Detecting…/32 \
  --comment "Dev IP — ipwhitelist.dev"
3
JSON Payload
JSON
{
  "ipAddress": Detecting…,
  "comment":   "Dev IP — ipwhitelist.dev"
}
1
GCP Firewall Rule
gcloud
gcloud compute firewall-rules create allow-dev-ip \
  --allow=tcp:443 \
  --source-ranges=Detecting…/32 \
  --description="Dev IP — ipwhitelist.dev" \
  --project=YOUR_PROJECT_ID
2
Cloud SQL Authorized Network
gcloud
gcloud sql instances patch YOUR_INSTANCE \
  --authorized-networks=Detecting…/32
1
iptables
bash
sudo iptables -I INPUT -s Detecting… -p tcp --dport 443 -j ACCEPT
sudo netfilter-persistent save
2
UFW
bash
sudo ufw allow from Detecting… to any port 443
sudo ufw reload
3
nginx allow directive
nginx.conf
location /admin {
    allow  Detecting…;
    deny   all;
}
1
All Formats at Once
All formats
# Plain IP
Detecting…

# CIDR /32 (single host)
Detecting…/32

# JSON
{ "ip": Detecting…, "mask": "255.255.255.255" }

# curl test
curl -v https://api.example.com/ 2>&1 | grep "Connected"
Advertisement

How to find your public IP address

Your public IP address is the unique identifier assigned by your Internet Service Provider (ISP) to your internet connection. Unlike your local or private IP address (typically in the 192.168.x.x or 10.x.x.x range), your public IP is visible to all servers and services you connect to on the internet.

IPWhitelist.dev detects your public IP instantly using two independent sources — ipify.org and ipapi.co — for maximum accuracy and reliability.

What is CIDR notation and why does it matter?

CIDR (Classless Inter-Domain Routing) notation expresses an IP address and its associated network mask. For a single IP address, the CIDR notation appends /32, meaning only that exact address is included. When whitelisting your IP in AWS Security Groups, MongoDB Atlas, or GCP Firewall rules, you must provide the CIDR format — for example, 203.0.113.42/32.

Free developer tools on IPWhitelist.dev

Advertisement

Common questions about IP addresses

What is my public IP address?
Your public IP is the address your ISP assigns to your internet connection — the one all servers on the internet see. Unlike your local IP (192.168.x.x), your public IP is globally unique. IPWhitelist.dev detects it in milliseconds with no setup required.
How do I whitelist my IP in AWS Security Groups?
Go to EC2 → Security Groups → select your group → Inbound Rules → Edit → Add Rule. Set Type to Custom TCP, enter your port, and paste your IP in CIDR format (e.g. 203.0.113.42/32) as the source. IPWhitelist.dev generates the exact AWS CLI command and Terraform config above — just copy and run.
How do I whitelist my IP in MongoDB Atlas?
In MongoDB Atlas, go to Network Access → Add IP Address, then paste your CIDR notation from IPWhitelist.dev. Alternatively, use the Atlas CLI command generated above. Your IP must be whitelisted before any client can connect to your Atlas cluster.
Do you store or log my IP address?
No. IP detection is done via client-side calls to public APIs (ipify.org and ipapi.co). We never proxy or log these requests. Your IP address never touches our servers.
Why does my IP change?
Most home and office ISPs assign dynamic IP addresses, meaning your public IP can change when your router reconnects, after a power cycle, or periodically based on your ISP's lease policy. If you have a dynamic IP and rely on whitelisting for database or server access, you'll need to update your whitelist rules each time it changes.
Copied!