Solved

resolving ip addresses to host names.

Posted on 2004-08-12
2
699 Views
Last Modified: 2010-03-18
While monitoring our badndwidth usage through our firewall, we sometimes find an IP address using a huge chunk of bandwidth.  We would like to find out who it is, but we use DHCP, and when I "ping -a <ip address>" the address I get back the host name of a computer shut off or nothing at all.

Is there any sure fire way to resolve an IP address to a hostname?  What if the computer isn't part of our domain, but is recieving ip addresses from our DHCP server (Windows 2003 server)?
0
Comment
Question by:starmonkey
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 

Accepted Solution

by:
dcockrell earned 125 total points
ID: 11787232
You should be able to view all of the IP assignments in your DHCP app.  It should tell you the client IP address, host name, and so on.
0
 
LVL 4

Author Comment

by:starmonkey
ID: 11787340
Uh.  Oh.
Well that woulkd definitly work, I should have thought of that.
Thanks!
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Sometimes you might need to configure routing based not only on destination IP address, but also on a combination of destination IP address (or hostname) and destination port number. I will describe a method how to accomplish this with free tools. …
The Need In an Active Directory enviroment, the PDC emulator provide time synchronization for the domain. This is important since Active Directory uses Kerberos for authentication.  By default, if the time difference between systems is off by more …
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

739 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question