How do you Trace a person with IP Address?
How do you detect a person using Fake IP (Proxy IP)?
Answers were Sorted based on User's Feedback
Answer / yusuf zahir maimoon
if the IP is a public IP you can do a whois lookup using
sites like ping.eu and find out who owns the IP usually its
some service provider.service providers map static IP to
their customers usually so we can trace the IP to a user if
the mapping is static. if its dynamic then we have to trace
further.
In case of proxy IP the responsibility lies on the proxy to
keep a record of what translations it is doing.
usually public proxy are listed so we can check if its a
well known public proxy IP.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
By enabling command "debug icmp trace" on firewall one can
know the ip address and fake ip address being used it will
give you related information of the ip address.
asa#config t
asa(conf-t)#debug icmp trace
it will show all the ip's ping and their information.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / dhruv shah
In the DOS, one command to track your real IP is “tracert
web address” and with this you can get all the real IP or
you can find the real IP.
On the internet there is software known as “Visualroute”
which can track your real IP. This type of software will
trace all servers which are connected with your pc for
browsing. Your pc first communicates with local gateway so
that this first IP will be your Proxy’s gateway, then second
IP is shown which is your ISP’s real IP, and third IP is the
Static IP of your ISP. This IP is taken from government on
rent that is your ISP’s gateway to communicate with other
server which not in the same country.
| Is This Answer Correct ? | 0 Yes | 5 No |
What is phishing?
In context of public key encryption, if you are using both signature and encryption features, what key will you use for encryption and which one will you use for signing?
What is the sense of a fingerprint?
What is cloud security?
How do you Trace a person with IP Address? How do you detect a person using Fake IP (Proxy IP)?
What protocol is used by DNS name servers
What is http flood?
What is stateful inspection firewall?
Why should you care about the OSI Reference Model
Name the port used by PING.
Explain what does cia stand for in security management?
What is Cross Site Request Forgery and how to defend against it?