In theory, if these numbers were appropriately used, the range would be enough for more than 4 billion devices. Originally, the IP address looked like four numbers ranging from 0 to 255, e.g., 192.168.0.111. The entire idea is based on computers connecting to each other by using IP addresses. I guess you wouldn’t be terribly surprised if I tell you that the Internet was poorly designed. Now, let me elaborate on all of this on examples of macOS and Windows. If the computer was shut down, then hackers cannot get into it if even it is connected to the power and network.
The hacker must know the public IP address, the computer must be either in sleep or hibernate mode, and wake on network access must be enabled. The following requirements must be true for hackers to get into your computer. While cybercriminals have lots of tools in their arsenals, they still cannot break laws of physics. I know some of my friends and family members turn off their devices at night, but even then, they worry what if mighty hackers can get into completely turned off the computer. And it is natural for people to fear being targeted. We hear stories about computers being hacked all the time.