How to Hide My IP Address with a VPN

Use a VPN to conceal your IP address. LiquidVPN hides your IP address by routing your data through a different country. LiquidVPN’s network is strategically placed in countries that will not force us to restrict access to controversial traffic like BitTorrent and Kodi. We provide the tools needed to keep your IP hidden regardless of your physical location.

Hide your IP address and access censored websites

Use IP masking and instantly access websites and services censored by governments and ISPs:

  • YouTube
  • LinkedIn
  • Facebook
  • Twitter
  • Vimeo
  • Dropbox
  • Instagram
  • Amazon

Continue using the websites and services you know and love. Stay in contact with friends and relatives without fear of eavesdropping regardless of where you access the Internet from. When you hide your IP address eCommerce websites cannot charge you more money based on your location.

A VPN changes your IP address by encapsulating your data inside of a VPN tunnel before sending it to our servers. Our servers forward the data to final destination. Websites reply to you as if you were browsing the Internet from our IP instead of yours.

Are ISPs logging your IP address and monitoring your traffic?

IP Address Monitoring

Today we think of the Internet as a cloud, but that is just a clever marketing term. In 2006 Sen. Ted Stevens said “The Internet is a series of tubes” and he was kind of right. You can trace a physical wire from your house to a server owned by Netflix, Facebook, the NSA, and Twitter. Regardless of your traffics final destination first it flows through your ISP often in plain readable text.

Can ISPs look inside the “tubes?”

You bet they can. ISPs can easily log all of the sites you visit, your emails and your IMs. In some countries, they are required to log your traffic and store it for X year(s) in case law enforcement needs it. In the USA it is legal for them to do things like slow down your Netflix traffic and speed up traffic to a streaming service they own like DirectTV.

A glimpse inside data retention and IP monitoring around the world

IP Logging

IP logging and data retention in the United States

Ajit Pai, a former Verizon lawyer, is waging war on broadband privacy and Net Neutrality. Pai and Trump repealed an FCC ruling that required ISP’s to get consent from customers in order to collect, store, share or sell their personal data. The repeal is a massive windfall for ISP’s like AT&T, Verizon, and Comcast.

The U.S. does not have mandatory data retention laws but Congress got close to passing them several times. Nonetheless, ISPs now log petabytes of customer data and the Stored  Communications Act gives the government access to all of it.

ISP’s have a profit incentive to track the websites we visit and the media we stream but many ISP’s store our IP address logs for months.

IP logging and data retention in Europe

The EU repealed the DRD (EU Data Retention Directive) in 2014. EU as a whole has good privacy laws. But, many countries have taken it upon their selves to put data collection and retention guidelines in place.

IP logging and data retention in the United Kingdom

The “Snoopers Charter” requires ISP’s and Telecom companies to maintain logs of customers web browsing data and make them available to various UK agencies for one year.

In May 2017 the Open Rights Group responded to a secret consultation into the TCN regulation that would force Internet providers to weaken the security of their products by including backdoors and maintaining “black boxes” that give UK authorities direct access to the private telecoms network.

IP logging and data retention in Canada

Canada does not have data retention laws, but the Copyright Act requires IP address logging for one year. Some ISP’s monitor more than just your IP address.

Jason Laszlo a Bell spokesman said they collect and store URL information, MAC and IP address for one year.  “URL information varies but would include date, time and domain. Any use of the information would be for operational purposes such as network capacity and provisioning, network quality monitoring, resolving billing issues and so on.”

The Copyright Modernization Act (Bill C-11) requires Internet service providers to keep activity logs of suspected copyright infringers for six months.

IP logging and data retention in Australia

In 2015 Australia implemented a very draconian metadata retention law that requires ISPs to store two years of metadata that includes

  • IP addresses assigned or related to you including IPs related to websites, email and chat.
  • Email and IP address time stamps.
  • File metadata including size, extension and MD5 hash on downloads, e-mail attachments, torrents and FTP.

Conceal your IP address with a VPN and prevent third party IP monitoring and data logging

Conceal your IP

Unfortunately, ISP’s will continue logging, monitoring, and shape your traffic for as long as they can. If that invasion of privacy is not acceptable to you, there are a few options.


  • In 2015 AT&T started their “Internet Preferences” program that charges users $29 to $99 a month to turn off IP and data logging.

  • If your not in the U.S. you can find a new ISP. But if you are in the U.S. regional monopolies have you locked into one or two Internet service providers.

  • Get a VPN and encrypt your traffic. A VPN encrypts your traffic before sending it to your ISP who will not be able to see past the encryption. They are a great way to hide your IP address. 

How VPN encryption is used to prevent IP logging

IP Logging

A VPN hides your IP address by encapsulating your Internet traffic inside a VPN tunnel. It is a rather complicated process, but it can be broken down into three steps.

Exchange authentication key material

Your device reaches out to our server and asks to authenticate. Both sides generate and exchange random bits of information, and then they create separate authentication and data encryption keys using the combined random bits of information.

Data encryption and encapsulation

Your device uses the data encryption key generated in the first step to encrypt packets of data. The authentication key signs the packet and sends it to our server.

Decode and forward data to the Internet

Once the data is received. The signature is verified and the data decrypted. Our server forwards the packet to its final destination with our IP address as the return address instead of yours.

Conceal your IP address with a VPN and prevent third party IP monitoring and data logging

Hide your IP address

The more you share online, the easier it is for hackers, government organizations and corporate spies to access your information. Sophisticated programs and systems exist, and information gatherers are often several steps ahead of mainstream internet sites.

Don’t let your personal, private information be compromised by leaky internet connections or by using public internet access. A VPN is the simple, secure way to keep everything to yourself.

This includes your location, which can prevent you from accessing certain sites or making individual purchases. Hiding your location by changing your IP to another country allows you to access sites and services quickly, securely, and anonymously from wherever you are.