SOLD:/24 ARIN @ $32/IP
LEASED:/18 RIPE @ $0.45/IP
SOLD:/24 ARIN @ $32/IP/Mo
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
LEASED:/18 RIPE @ $0.45/IP
SOLD:/24 ARIN @ $32/IP/Mo
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP
SOLD:/24 ARIN @ $32/IP

Blog

119 posts in this category

Infographic illustrating the comparison between a Host and an IP Address, showing they are distinct but connected networking concepts.
Blog

Are Host and IP Addresses the same?

When learning the complexities of networking, you might encounter terms like “host” and “IP address” used frequently. These terms are fundamental to how devices communicate over the internet. While they are related, host and IP addresses are not the same. This article aims to clarify the differences and relationships between a host and an IP address, providing a comprehensive understanding of each term and their roles in network communication.Read more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more IPv4 address price history from exhaustion to 2026   An exploration of IPv4 address price trends from scarcity‑driven spikes to market corrections, and how exhaustion shaped prices up to Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Mitigating the Risks of Public IP Addresses (Part 2)
Blog

Mitigating the Risks of Public IP Addresses (Part 2)

While the risks associated with public IP addresses are significant, several measures can be taken to mitigate these dangers. Here’s a detailed guide on how to protect your network from the potential hazards of using public IP addresses. Use Firewalls Implementing a robust firewall is one of the first lines of defense against unauthorized access and cyber-attacks. Firewalls act as a barrier between your internal network and the internet,Read more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image illustrating cybersecurity threats. On the left, a server rack labeled "PUBLIC IP: 203.0.113.1" transmits data through a large, broken, red padlock with a skull icon. On the right, hooded hacker figures at computers intercept the data flow amidst warning triangles and broken chains.
Blog

The Potential Risks of Using Public IP Addresses (Part 1)

Public IP addresses allow devices to communicate directly with the internet, but they also come with several risks that can jeopardize security and privacy. This article explores the potential dangers associated with using public IP addresses and offers tips on how to mitigate these risks in Part 2 What is a public IP address? A public IP address is an address that is accessible over the internet. It isRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
A futuristic digital infographic titled "IP ADDRESS LEASING: HOW TO LEASE," illustrating the process of transferring IP addresses from an IP Lessor (RIRs, ISPs) to an IP Lessee (Businesses) via a digital contract and handshake. Icons highlight key benefits including flexibility, cost-effectiveness, temporary use, scalability, and global reach.
Blog

IP Address Leasing: How to lease IP Addresses

The digital world we navigate today relies heavily on IP addresses, unique identifiers assigned to devices connected to the internet or a local network. As the demand for IP addresses continues to rise, businesses and individuals are exploring various options to secure the necessary resources. One increasingly popular method is IP address leasing. This article delves into the concept of leasing IP addresses, its benefits, and why it hasRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
A split-panel infographic titled "PUBLIC IP ADDRESS & THE ROLE OF VPN". The left panel, labeled "WITHOUT VPN," shows a computer with an exposed public IP address connected directly to the internet, vulnerable to tracking and cyber threats. The right panel, labeled "WITH VPN," illustrates a computer connecting through a secure, encrypted tunnel to a VPN server, masking the real IP with an anonymous VPN IP for enhanced privacy and security.
Blog

What is Public IP Address and the Role of VPNs

Public IP addresses are unique identifiers assigned to devices connected to the internet, enabling them to communicate with other devices globally. These addresses are essential for the functioning of the internet, enabling the routing of data between different networks and ensuring that information reaches the correct destination. However, the visibility and accessibility of public IP addresses also pose certain privacy and security risks. This is where Virtual Private NetworksRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image titled "What Information Can Be Obtained From An IP Address?" illustrating a digital magnifying glass analyzing an IP address. The analysis reveals connected data points including a geolocation map, Internet Service Provider (ISP) details, and network information.
Blog

What information can be obtained from IP address?

The IP address is a fundamental component of the internet, acting as a unique identifier for devices connected to the network. While it serves a crucial role in routing data, the information that can be derived from an IP address alone can be quite revealing. Here’s a detailed look at what can be gleaned purely from IP addresses. 1. Geolocation One of the most common pieces of information derivedRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image comparing standard VPN connections with Dedicated IP services. On one side, a "Dynamic IP" icon shows changing numbers, representing standard VPN use. On the other side, a "Fixed IP" icon shows a single, static address locked in place, symbolizing the consistent identity provided by a dedicated VPN IP.
Blog

Can we get a fixed IP address if we use a VPN?

In the world of internet connectivity and digital privacy, Virtual Private Networks (VPNs) have become a staple tool for many users. One common question that arises is whether it’s possible to obtain a fixed IP address when using a VPN.   The answer is yes, but it depends on the VPN service provider you choose. In this article, we’ll explore how you can get a fixed IP address withRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image titled "How Governments Track IP Addresses," illustrating the surveillance process. A central "Government" monitoring hub is shown receiving data streams from an "ISP" (Internet Service Provider) to trace a user's digital footprint and physical location on a global map.
Blog

How does the government track down people using their IP addresses?

Queries: How does the government track down people using their IP addresses? Why is it difficult for them to catch scammers and hackers?   IP addresses serve as unique identifiers for internet users, enabling connectivity and interaction. Governments and law enforcement agencies utilize these digital signatures to track down individuals involved in illegal online activities.   However, capturing scammers and hackers isn’t as straightforward as it might seem. DespiteRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image for an article on IP Solutions, illustrating a complex digital network with overlapping layers. Key elements include icons representing IP Address Management (IPAM), IPv4/IPv6 transition, network security (firewalls/shields), and scalability, highlighting enhanced connectivity and business efficiency.
Blog

IP Solutions: Enhancing Connectivity and Business Efficiency

The Internet underpins most business operations, and hence, managing IP (Internet Protocol) resources effectively is crucial. IP solutions involve a range of services and technologies designed to optimize the management and use of IP addresses, which are essential for devices to communicate over the Internet.   This article delves into what IP solutions are, their benefits, and why they are critical for businesses looking to thrive in a connectedRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image illustrating the reasons people lease IP addresses, featuring dual-pane comparison: one side shows limited/depleted IPv4 space (full traffic/limited blocks), and the other side shows an IP Leasing solution offering immediate access, scalability, and cost-effectiveness (handshake icon).
Blog

Why People Lease IP Addresses

We could imagine that IP addresses are like physical real estate on the World Wide Web. Every device connecting to the internet needs an IP address to interact online. But as more devices go online globally, IP addresses, especially IPv4 types, are becoming scarce. This scarcity has led many to opt for leasing IP addresses instead of buying them.   In this article, let’s dive into why people areRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
IoT (Internet of Things) and IP Address Management
Blog

IoT (Internet of Things) and IP Address Management

When we talk about the Internet of Things, abbreviated IoT, in digital transformation, the Internet of Things (IoT) has emerged as a transformative force, connecting billions of devices and enabling innovative applications across industries. At the heart of this interconnected ecosystem lies IP address management, a critical aspect that ensures the seamless communication and operation of IoT devices.   Let’s delve into the symbiotic relationship between IoT and IPRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →
Feature image illustrating the function of the Domain Name System (DNS). A user's device requests a website name, which is shown being translated by a central DNS server into the corresponding numerical IP address, allowing the user to connect to the website server.
Blog

What is the Domain Name System, the DNS?

The Domain Name System (DNS) stands as a fundamental component that underpins seamless communication and accessibility across digital networks. While users navigate the internet using familiar domain names, such as google.com or facebook.com, behind the scenes, DNS quietly performs the vital task of translating these human-readable domain names into machine-readable IP addresses, facilitating the flow of data packets across the global network. Let’s unravel what DNS is and exploreRead more Related Posts What happens when IP resources are mismanaged Poor IP resource management can lead to outages, security breaches, blacklisting, legal exposure and reputational damage across networks and business Read more Top considerations when trading IPv4 addresses on the secondary market  Navigating the IPv4 secondary market requires careful attention to legality, reputation, pricing, compliance and risk management to ensure successful transactions.Legal Read more Benefits of using i.Lease for IPv4 lease management Modern IPv4 scarcity drives demand for flexible leasing; i.Lease delivers rapid deployment, clean address pools and expert management for resilient Read more .related-post {} .related-post .post-list { text-align: left; } .related-post .post-list .item { margin: 5px; padding: 10px; } .related-post .headline { font-size: 18px !important; color: #999999 !important; } .related-post .post-list .item .post_thumb { max-height: 220px; margin: 10px 0px; padding: 0px; display: block; } .related-post .post-list .item .post_title { font-size: 16px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } .related-post .post-list .item .post_excerpt { font-size: 13px; color: #3f3f3f; margin: 10px 0px; padding: 0px; display: block; text-decoration: none; } @media only screen and (min-width: 1024px) { .related-post .post-list .item { width: 30%; } } @media only screen and (min-width: 768px) and (max-width: 1023px) { .related-post .post-list .item { width: 90%; } } @media only screen and (min-width: 0px) and (max-width: 767px) { .related-post .post-list .item { width: 90%; } }

Read more →