How Can Hackers Exploit Your IP Address and the Data It Reveals?