We only store hashed IP address - and this is mostly for just tracking and auditing purposes. For example if we see potential abuse on our system coming from the same IP address we can resolve the issue. This is a common approach for how to securely store user passwords as well. Here's a little more information on one-way hash functions.

Did this answer your question?