How do you Trace a person with IP Address?
How do you detect a person using Fake IP (Proxy IP)?
Answers were Sorted based on User's Feedback
Answer / yusuf zahir maimoon
if the IP is a public IP you can do a whois lookup using
sites like ping.eu and find out who owns the IP usually its
some service provider.service providers map static IP to
their customers usually so we can trace the IP to a user if
the mapping is static. if its dynamic then we have to trace
further.
In case of proxy IP the responsibility lies on the proxy to
keep a record of what translations it is doing.
usually public proxy are listed so we can check if its a
well known public proxy IP.
| Is This Answer Correct ? | 2 Yes | 0 No |
Answer / s.m.feroz ahmed
Hi,
By enabling command "debug icmp trace" on firewall one can
know the ip address and fake ip address being used it will
give you related information of the ip address.
asa#config t
asa(conf-t)#debug icmp trace
it will show all the ip's ping and their information.
| Is This Answer Correct ? | 1 Yes | 0 No |
Answer / dhruv shah
In the DOS, one command to track your real IP is “tracert
web address” and with this you can get all the real IP or
you can find the real IP.
On the internet there is software known as “Visualroute”
which can track your real IP. This type of software will
trace all servers which are connected with your pc for
browsing. Your pc first communicates with local gateway so
that this first IP will be your Proxy’s gateway, then second
IP is shown which is your ISP’s real IP, and third IP is the
Static IP of your ISP. This IP is taken from government on
rent that is your ISP’s gateway to communicate with other
server which not in the same country.
| Is This Answer Correct ? | 0 Yes | 5 No |
What do you do when you get blue screen in a computer? How do you troubleshoot it?
What is a Smart Card or Chip Card or Integrated Circuit Card (ICC)?
How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?
0 Answers Excel, RT Outsourcing,
How does the HTTP handle state?
What are the methods of defense (in context to IT-Security)?
I am working in a Engg college at Orissa. I am having windows xp OS. We have a linux server in CSE dept. My question is that in client site I want access facebook and torrent sites. The above sites are blocked in Linux server. So How can I unblock these particular sites in client system. Is there any software available for that ? plz give me some idea about this ?
What is terminal emulation, in which layer it comes
What is intrusion prevention systems (ips)?
What is frame relay, in which layer it comes
What is classful and classless routing?
explain what is meant by port blocking within lan?
Where do you get updates on security?