How do you Trace a person with IP Address?
How do you detect a person using Fake IP (Proxy IP)?
Answers were Sorted based on User's Feedback
Answer / yusuf zahir maimoon
if the IP is a public IP you can do a whois lookup using
sites like ping.eu and find out who owns the IP usually its
some service provider.service providers map static IP to
their customers usually so we can trace the IP to a user if
the mapping is static. if its dynamic then we have to trace
further.
In case of proxy IP the responsibility lies on the proxy to
keep a record of what translations it is doing.
usually public proxy are listed so we can check if its a
well known public proxy IP.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
By enabling command "debug icmp trace" on firewall one can
know the ip address and fake ip address being used it will
give you related information of the ip address.
asa#config t
asa(conf-t)#debug icmp trace
it will show all the ip's ping and their information.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / dhruv shah
In the DOS, one command to track your real IP is “tracert
web address” and with this you can get all the real IP or
you can find the real IP.
On the internet there is software known as “Visualroute”
which can track your real IP. This type of software will
trace all servers which are connected with your pc for
browsing. Your pc first communicates with local gateway so
that this first IP will be your Proxy’s gateway, then second
IP is shown which is your ISP’s real IP, and third IP is the
Static IP of your ISP. This IP is taken from government on
rent that is your ISP’s gateway to communicate with other
server which not in the same country.
| Is This Answer Correct ? | 0 Yes | 5 No |
What is BSOD?
What is Cross site scripting?
Difference between bit rate and baud rate.
What is http flood?
How can i check registry of the New Installing software.
What is site-to-site vpn?
SAP GRC / Security & Authorizations TRAINING / Virsa and CC tools(GRC 5.3)
If you need to encrypt and compress data for transmission, how would you achieve it?
Explain in mobile and computer and home is it possible that we see and listen person voice and activity carefully for destroying their privacy?
How does arp works?
What is an arp?
What is mesh network