Terminology

Whether you're a developer integrating our service for the first go, an analyst seeking clarity on specific data structures, or simply keen to understand our terms, this section's been crafted just for you. Dive into our curated list of articles for detailed explanations, illustrative examples, and insights into how best to utilise the data we provide.

Related Articles

Autonomous Systems (AS) in Network Management: An Overview
What is an Autonomous System (AS)?An Autonomous System (AS) is a collection of connected Internet Protocol (IP) networks, routers and other network equipment. The main feature of an AS is that it's administered and operated by a single organisation or entity. Each AS is distinctively identified through a unique number called an Autonomous System Number (ASN). This unique identifier is provided by the Internet Assigned Numbers Authority (IANA)....
What is Border Gateway Protocol and BGP announcements?
Understanding Border Gateway Protocol (BGP)Border Gateway Protocol (BGP) serves as a pivotal routing protocol, facilitating the exchange of information between routers on the internet. It's the linchpin that transforms the internet into a cohesive "network of networks", steering traffic amongst various ...
FIPS Codes FAQ: Understanding Geographic Identification with BigDataCloud API
What are FIPS codes?FIPS (Federal Information Processing Standards) codes are a set of numeric codes used to uniquely identify geographic areas within the United States. They were developed by the National Institute of Standards and Technology (NIST) to ensure consistent identification of states, counties, and other geographic entities in computer systems and databases. The number of digits in FIPS codes varies depending on the level of geography....
Understanding the Hazard Report
Our Hazard Report introduces a cutting-edge set of cybersecurity metrics that equip businesses with both reactive and proactive tools to tackle cyber threats.Reactive ApproachOn the reactive front, we track IP addresses against esteemed blacklist databases like blocklist.de, uceprotect.net, and Spamhaus. Additionally, through advanced algorithms and third-party intelligence, we can spot anonymisers, such as VPNs and proxies. However, it's important to note that this method primarily identifies only those services mentioned on these datasets. As such, it might miss freshly-emerging malicious services, potentially exposing businesses to significant threats....
What is Confidence Area?
Due to the global shortage of IPv4 addresses, Internet Service Providers (ISPs) are working hard trying to utilise the IP address space available to them, in the most effective way possible. Hence, they usually dedicate a pool of IP addresses, to a section of their network, which sometimes covers a substantial geographical area. This method of dynamic address allocation significantly minimises the number of IP addresses required to serve the area because it effectively covers the active users rather than the entire clients base....
What is CIDR Notation?
CIDR ExplainedCIDR, or Classless Inter-Domain Routing, is a technique employed for IP address allocation and routing across both IPv4 and IPv6 networks.IPv4 NetworksIn the realm of IPv4 networks, IP addresses consist of 32-bit figures showcased in dotted decimal notation, like 192.0.2.0. Using CIDR notation, such an IPv4 address is paired with a forward slash and a subsequent number. This number pinpoints the quantity of initial bits in the IP address signifying the network segment. For instance, the CIDR notation 192.0.2.0/24 reveals that the starting 24 bits of the IP address denote the network, with the latter 8 bits indicating the host. This approach enables a more streamlined utilisation of IP addresses and refined routing in expansive networks....
Understanding BigDataCloud's 'Confidence Value' for IP Geolocation Accuracy
The 'confidence value' is an innovative and more effective approach to evaluate the accuracy and reliability of IP geolocation data using BigDataCloud's proprietary technology. Conventional methods can only provide a single-point location estimate that may not represent the actual location of a dynamically assigned IP address. This issue is further compounded by the challenge of verifying and reconciling conflicting data from multiple sources, which explains why human-based validation remains a common approach, despite its limitations....
What is the World Bank regions?
The World Bank RegionsThe World Bank classifies the globe into seven regions, considering factors such as geography, income, and cultural affinity. These regions, along with their associated codes, are:...
Canadian Geographic Codes FAQ: Understanding CSD Codes with BigDataCloud API
What are CSD codes?CSD (Census Subdivision) codes are a set of numeric codes used to uniquely identify geographic areas within Canada. They are part of Canada's geographic hierarchy and are used for various statistical and administrative purposes. The number of digits in CSD codes can vary depending on the province and level of geography....
What is Hosting Likelihood?
Navigating the intricate landscape of cybersecurity, especially when it comes to identifying nefarious IP addresses, poses significant challenges. Our Hazard Report, a cutting-edge cybersecurity metric, equips businesses with both proactive and reactive strategies to combat cyber threats effectively....

Contact support

If you have any further queries, feel free to contact our email support on our contact us page .


Topics