How cybercriminals exploit vulnerabilities in IPv4 addresses? | DroidFeats