Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

How do you Trace a person with IP Address?
How do you detect a person using Fake IP (Proxy IP)?

Answer Posted / dhruv shah

In the DOS, one command to track your real IP is “tracert
web address” and with this you can get all the real IP or
you can find the real IP.

On the internet there is software known as “Visualroute”
which can track your real IP. This type of software will
trace all servers which are connected with your pc for
browsing. Your pc first communicates with local gateway so
that this first IP will be your Proxy’s gateway, then second
IP is shown which is your ISP’s real IP, and third IP is the
Static IP of your ISP. This IP is taken from government on
rent that is your ISP’s gateway to communicate with other
server which not in the same country.

Is This Answer Correct ?    0 Yes 5 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What is network access control?

1133


Why is it important to have a nac solution?

1249


What is frame relay, in which layer it comes

1186


What is secure remote access?

1157


What is a DNS resource record

1124


Why do we use virtual private network?

1112


Explain the difference between discretionary access control and mandatory access control?

1028


Can you give me some ransomware variants?

1038


What is remote access vpn?

1051


How does ransomware work?

1106


Explain what does cia stand for in security management?

1036


How the telecommunicaton is working?I have heared that one control will be there for asia countries for other countries there will be another,what is that how they work?

2410


How do we use rsa for both authentication and secrecy?

1032


Is vpn traffic encrypted?

1116


What a security mean in your sense?

1297