Hot Take Tip for ZIGGO users in the Netherlands (and possibly for all MT-members using a big ISP in their home country)

LinuxFan58

Level 7
Thread author
Nov 30, 2025
327
919
567
My ISP allocates dynamical IP-addresses, this implies that your IP and the location of your IP-address might change after: network maintenance or modem restart. When you use your own router and have set your ISP modem in bridge mode, the IP allocation change is determined by the lease-time you have set in your router.

I use parental control to disable our WIFI every night from 02.00 to 06.00 and I reboot my own router daily at 05.00. Because I also set a 23 (yes 23 :- ) ) hour lease time in our 5 GHz network. This dynamic IP allocation mechanisme of my router changes my IP and location often. I notice my IP address and location switches every 1 or 2 days (usually the three large hubs Utrecht, Amsterm and Arnhem, but occasionally also one of the sub-hubs in their Giga-network like Groningen, which is 200 km from where I live).

So my tip is: check whether your ISP also uses dynamic IP allocation and where there network hubs are located. When you use the router/modem of your ISP, check whether you can set the lease time (usually located in the DHCP settings). This could be an easy way make IP-based tracking a little more complicated for advertising networks.


Reason for weird looking practice of disabling WIFI and rebooting daily.
I adopted this odd looking practice, because we had some script kiddies in our neighborhood which were sniffing WIFI. My previous neighbour was a security expert and he said he had noticed attacks. He explained a lot to me bout router settings and how to harden your router. He also told me that most home router protections can be circumvented by a pro with right tools and enough time, but for most script kiddies applying a few counter measures raises a big hurdle.

These are probably open door advice for seasoned MT-members, but this is what I wrote down
  1. Use the longest pass phrases possible
    Reason: they are easy to remember and require a bit more effort/time to crack.
  2. Use different passphrases for admin
    Reason: some people forget setting admin passwords, so setting it and using a different one than the WIFI passwords is good practice
  3. Use the latest encryption/security protocols
    Reason: latest versions are usually also the most secure versions
  4. Check whether firewall is enabled.
    Reason: Firewall is not always enabled by default. Some router's require explicit enabling of SPI-firewall for IPv6
  5. After you have set everything to your wishes, it is best practice to disable stuff you don't need
    Reason: things making usage or support easier are also often used to get in (easier), e.g. disable remote support, UPnP and WPS, google for more for your router). Modern routers have an (HTTPS) internet portal to set things up, because everything is encrypted that is safe to use via WIFI.
  6. Use your WIFI guest network for IOT devices.
    Reason, most vendors apply network partitioning in the quest network. Network partitioning means (in my layman's language) that the devices in that network can't see each other. Second measure you should take is to reduce the lease time to a maximum of 24 hours.
  7. Use parental control to take down the WIFI network when you normally don't use it (e.g. from 02.00 to 06.00 in our situation).
    Reason: Most script kiddies are teenagers and young adults and tend to increase their activities during holidays, weekends and late might hours. It also gives you more time to change the settings (using a cable, not WIFI) after you suspect being attacked. I also reboot the router at 05.00 daily.
    MT-member @Parkinsond mentioned that it might shorten life expectancy of your router. I guess my former neighbor being a security expert set it so high, because my router has an auto firmware update function, which is only applied after reboot. So rebooting every day ensures the firmware updates are applied as soon as possible.
  8. Use the email notification option of your router and set the notification level not to low or high.
    Reason: get automated notifications when something might go wrong. My router has 8 notification levels and I have set it to level 5 (critical).
  9. Never login directly to your router's IP using WIFI
    Reason: When you enter the IP address of your router, it is accessed via un-encrypted HTTP protocol, meaning anyone sniffing your WIFI network will see your admin password.
  10. Optional counter measure: use different SSID's and limit internal IP-range,
    Reason: Although using one SSID for all your networks is easy, using different networks has some security and performance advantages.
    Use your 2.4 Ghz network for your WIFI-printer and Mobile phones. The mobile phones and WIFI printer benefit from the larger range and signal strength of the 2.4 Ghz channel. Because most smart phones randomize MAC's for privacy. using enhanced security features like MAC-IP binding is impossible. A
    Use your 5 Ghz network for your PC's. This allows you use the advanced security features of your router (e.g. MAC IP binding) and prevents gaming PC's using the faster networks because the signal strenght of the 2.4 GHZ is stronger.
    Using smaller subnet masks (limiting internal IP-range) makes performance optimization easier for your build in QoS features (e.g prioritize certain devices or gaming or streaming) and reducing the DHCP pool also has a (low) security benefit (attack reduction).
 
Last edited:
I reboot my own router daily at 05.00
Why daily reboot? I have read rebooting too frequently is not good for router life expectancy.
May be once per month to clear cache.
some script kiddies in our neighborhood which were sniffing WIFI
Why not use MAC filter; I set it to whiltelist mode, only predetermined MAC addresses are allowed to connect.
Use the longest pass phrases possible
Use different passphrases for admin
Applied
Use the latest encryption/security protocols
Unfortunately only WPA2 is available for my router.
Check whether firewall is enabled
Set to high, not the default medium.
After you have set everything disable stuff you don't need
Applied
Never login directly to your router's IP using WIFI
Applied
 
Why daily reboot? I have read rebooting too frequently is not good for router life expectancy.
May be once per month to clear cache.
This is the second router I apply this on and the WIFI adaptors of smartphones and PC's are upgraded more often than my router. Until now (knock on wood) the impact it may have on life expectancy has not lead to router failure. We probably have bought a new router before that happened. But you got a good point . I added some text (thanks).
Maybe another consideration (which I forgot to mention) for my former neighbor: my router also has an auto-update firmware options, which is applied only after reboot. So a more pragmatic advice might be re-boot once a month (I guess the security expert wanted to apply the firmware updates as soon as possible).

Parkinsond said:
Why not use MAC filter; I set it to whitelist mode, only predetermined MAC addresses are allowed to connect.
You are correct, That is what I mentioned with optional 10: At tip 10, I only mentioned MAC-IP binding, because this is easier to setup and a litle safe than DHCP reservation. When you are careful (don't lock yourself out), MAC whitelisting adds another hurdle to take. I also apply MAC whitelisting on our 5Ghz networks
 
Last edited:
Sorry some typo's in optional number 10 advise to use different SSID's and limit internal IP-range,
Reason: Although using one SSID for all your networks is easy, using different networks has some security and performance advantages.

His advice was to use your 2.4 Ghz network for your WIFI-printer and Mobile phones. The mobile phones and WIFI printer benefit from the larger range and signal strength of the 2.4 Ghz channel. Because most smart phones randomize MAC's for privacy. using enhanced security features like MAC-IP binding and MAC filtering is impossible.

Put your IOT-devices on the 2.4 Guest Network. For performance it is better to put the often slow IOT device WIFI adapters on their own network. Because most vendors apply network partitioning on the guest network, it also has a security advantage (because IOT devices often run older firmware).

Use your fast (5 Ghz and up) network for your PC's. This allows you use the advanced security features of your router using the fixed Mac address (e.g. MAC IP binding and Mac filtering) and prevents gaming PC's NOT switching to faste rnetworks because the signal strenght of the 2.4 GHZ is stronger (keeping them on the slower 2.4 Ghz network).

Using smaller subnet masks (limiting internal IP-range) makes performance optimization easier for your build in QoS features (e.g prioritize certain devices or gaming or streaming) and reducing the DHCP pool also has a (low) security benefit in combination with MAC filtering (but that only applies when you have setup MAC filtering).
 
Last edited:
Bottom line: ISPs applying dynamic IP allocation, refresh the allocation when your own router reboots and the ISP provided modem/router is in bridge mode, so for everyone using their own router by simply rebooting your router you probably get a new IP from your ISP (y)
 
  • Applause
Reactions: Parkinsond
Bottom line: ISPs applying dynamic IP allocation, refresh the allocation when your own router reboots and the ISP provided modem/router is in bridge mode, so for everyone using their own router by simply rebooting your router you probably get a new IP from your ISP (y)
I used to reboot the router to bypass the limitation by file hosting domains for free users 🥹
 
  • Like
Reactions: LinuxFan58
Only downside of changing IP regularly through this trick is that streaming service tell me I reached the maximum of devices connected. :-)

1769723554375.png
 
Last edited: