Duplicate IP explained: how fraudsters use it and how to stop it