In fact, it is not possible to just use the IP address, but you can achieve the corresponding purpose by monitoring the traffic of the IP. Regardless of whether the connection between the end and the end is encrypted, the first few data packets are generally in clear text, so You can detect the characteristics of the data packet to judge. For example, OpenVPN has strong characteristics when establishing a connection. You can understand the protocols of each VPN by how to implement it specifically
You can search on Baidu. The IP allocation is relatively fixed.
http://ip.lockview.cn/
In fact, it is not possible to just use the IP address, but you can achieve the corresponding purpose by monitoring the traffic of the IP. Regardless of whether the connection between the end and the end is encrypted, the first few data packets are generally in clear text, so You can detect the characteristics of the data packet to judge. For example, OpenVPN has strong characteristics when establishing a connection. You can understand the protocols of each VPN by how to implement it specifically