How do you Trace a person with IP Address?
How do you detect a person using Fake IP (Proxy IP)?
Answers were Sorted based on User's Feedback
Answer / yusuf zahir maimoon
if the IP is a public IP you can do a whois lookup using
sites like ping.eu and find out who owns the IP usually its
some service provider.service providers map static IP to
their customers usually so we can trace the IP to a user if
the mapping is static. if its dynamic then we have to trace
further.
In case of proxy IP the responsibility lies on the proxy to
keep a record of what translations it is doing.
usually public proxy are listed so we can check if its a
well known public proxy IP.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
By enabling command "debug icmp trace" on firewall one can
know the ip address and fake ip address being used it will
give you related information of the ip address.
asa#config t
asa(conf-t)#debug icmp trace
it will show all the ip's ping and their information.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / dhruv shah
In the DOS, one command to track your real IP is “tracert
web address” and with this you can get all the real IP or
you can find the real IP.
On the internet there is software known as “Visualroute”
which can track your real IP. This type of software will
trace all servers which are connected with your pc for
browsing. Your pc first communicates with local gateway so
that this first IP will be your Proxy’s gateway, then second
IP is shown which is your ISP’s real IP, and third IP is the
Static IP of your ISP. This IP is taken from government on
rent that is your ISP’s gateway to communicate with other
server which not in the same country.
| Is This Answer Correct ? | 0 Yes | 5 No |
Is there any course for Hacking? How the people in become hackers?
What is Secure Sockets Layer (SSL)?
Explain what is difference between arp & rarp? How both of these protocols will work, and where it will use?
What factors would you consider before deploying a web intrusion detection system?
What is subnet
A System programmer have access to computer room, it is possible that he may undertake some unauthorised activities at any time, due to his deep knowledge how can a control build to avoid the risk?
What is meant by port blocking within lan?
How do we test for stateful packet in firewall ? Do we need scripts written for this ?
How does network security work?
What is the difference between a virus and malware?
Is vpn traffic encrypted?
How to implement PIX firewall security?