{"version":"1.0","provider_name":"Imperative Business Ventures Limited","provider_url":"https:\/\/blog.ibvl.in","title":"IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th) - Imperative Business Ventures Limited","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"y5njONHHQC\"><a href=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/17\/ipv4-mapped-ipv6-addresses-tue-mar-17th\/\">IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.ibvl.in\/index.php\/2026\/03\/17\/ipv4-mapped-ipv6-addresses-tue-mar-17th\/embed\/#?secret=y5njONHHQC\" width=\"600\" height=\"338\" title=\"&#8220;IPv4 Mapped IPv6 Addresses, (Tue, Mar 17th)&#8221; &#8212; Imperative Business Ventures Limited\" data-secret=\"y5njONHHQC\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.ibvl.in\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"Yesterday, in my diary about the scans for &#8220;\/proxy\/&#8221; URLs, I noted how attackers are using IPv4-mapped IPv6 addresses to possibly obfuscate their attack. These addresses are defined in\u00a0RFC 4038. These addresses are one of the many transition mechanisms used to retain some backward compatibility as IPv6 is deployed. Many modern applications use IPv6-only networking [&hellip;]"}