Solved

Who is current ISP?

Posted on 2003-12-01
4
1,457 Views
Last Modified: 2013-11-30
Is there a way for me to (programmatically) determine who is the ISP giving access to the Internet?

Thanks.
0
Comment
Question by:glennuser
4 Comments
 
LVL 2

Accepted Solution

by:
rccguy earned 50 total points
ID: 9852943
Try a traceroute to any website and you should the ISP servers show up immediatly after the packet escapes your network.  You can do this by going to a command prompt and typing the following information:

tracert www.yahoo.com

The resulting information will be the steps it takes to get to the yahoo home page.  Meaning these are all of the routers that your request goes through in its attempt to contact yahoo.com.  You will notice in the first couple of steps some IP addresses that look familiar if you have a LAN and then once it leaves your network it goes to your ISP's servers and routers first.  From there it could go anywhere in the world trying to get to yahoo.

Good Luck and I hope this helps!
0
 
LVL 1

Assisted Solution

by:seoglee
seoglee earned 50 total points
ID: 9854293
If you whois arin.net with a ip address, it will tell you who the ip address is assigned to.  Theoretically, this should be you ISP (OrgName).

Here is a php command that i've used for a website (hosted on a linux server):

shell_exec ("whois -h whois.arin.net " . escapeshellcmd("$ipaddress"))

For more information check out:
http://www.arin.net/whois/index.html
0
 

Assisted Solution

by:yakcora
yakcora earned 50 total points
ID: 9887147
www.domainwhitepages.com this will give you the owner of the ip address just type in your public ip and check all the boxes on the page the info will be more than you need.
0
 

Author Comment

by:glennuser
ID: 9953902
Thanks, I used a combination of tracert and www.domainwhitepages.com.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

932 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now