Solved

Is it possible to check to whom belonga an email address

Posted on 2004-03-31
8
250 Views
Last Modified: 2010-04-08
Is it possible to check to whom belongs an email address?
0
Comment
Question by:vage78
8 Comments
 
LVL 49

Accepted Solution

by:
sunray_2003 earned 50 total points
ID: 10729932
Hi vage78,
Depends on where you are receiving the email .. Using the header information of the email you can check unless the sender has faked the information which is not that easy to do

If you are using outlook or outlook express or any email client, right-click the email and check properties for header

If you are using web based email like yahoo , click on the email and then click on "full headers" to look for that header information from which you can get the IP address

Thanks
0
 
LVL 32

Expert Comment

by:Luc Franken
ID: 10729964
Hi vage78,

An easy trick, and works a lot of times:

Search for the e-mailaddress in google, it might come up with some interesting info.

Greetings,

LucF
0
 
LVL 23

Expert Comment

by:slink9
ID: 10731155
There are also quite a few lookups you can try at www.ultimatelinks.com
0
Control application downtime with dependency maps

Visualize the interdependencies between application components better with Applications Manager's automated application discovery and dependency mapping feature. Resolve performance issues faster by quickly isolating problematic components.

 
LVL 23

Expert Comment

by:slink9
ID: 10731162
0
 

Author Comment

by:vage78
ID: 10739907
Is there any other way to do it from a Solaris machine?
I mean from any unix machine I mean reverse lookup etc.
I have not received an email from that email address. I just want to know to whom belongs an email address
0
 
LVL 49

Expert Comment

by:sunray_2003
ID: 10740118
How are you viewing email in Solaris ?

Are you just using Pine or using the mail client in solaris ? If you are using mail client, check the properties/headers of the email
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Check out this infographic on what you need to make a good email signature that will work perfectly for your organization.
This article lists the top 5 free OST to PST Converter Tools. These tools save a lot of time for users when they want to convert OST to PST after their exchange server is no longer available or some other critical issue with exchange server or impor…
Get people started with the process of using Access VBA to control Outlook using automation, Microsoft Access can control other applications. An example is the ability to programmatically talk to Microsoft Outlook. Using automation, an Access applic…
To add imagery to an HTML email signature, you have two options available to you. You can either add a logo/image by embedding it directly into the signature or hosting it externally and linking to it. The vast majority of email clients display l…

867 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now