Learn how to a build a cloud-first strategyRegister Now



Posted on 2004-11-04
Medium Priority
Last Modified: 2010-04-11
Does anyone know how I can find out who owns a specific IP address?  I received a suspicious e-mail at school and I would like to find out who owns the IP address.  
Question by:mbcasey
LVL 49

Accepted Solution

sunray_2003 earned 2000 total points
ID: 12493450
If you know the IP address and if it is legitimate one , go to www.arin.net and search in that database

if you need more assistance post back

LVL 65

Expert Comment

ID: 12494256
or go here and enter ur required IP address >> http://psacake.com/web/eg.asp

Expert Comment

ID: 12544913
DNSStuff is by far the best one-stop-shopping web resource for ip address / domain name queries or tools:  Reverse lookups, whois, traceroute/ping, etc.  Lots of good stuff.


take care,

A Cyber Security RX to Protect Your Organization

Join us on December 13th for a webinar to learn how medical providers can defend against malware with a cyber security "Rx" that supports a healthy technology adoption plan for every healthcare organization.


Expert Comment

ID: 12637377
Hi all,

I want a help in my project, plz any one who can help me.. I am waiting experts answers..

well, I have a paper about security in IPv6..

I am asking  all who can help to write for me comparison between improvement security in IPv4 and IPv6.

I want to write introduction about how implementing security in the IPv4 versus IPv6
and what is the security algorithm used and how.
also I need to write about IPSEC and how it is implemented in both IPv4 and IPv6..

in summery: who can help write a small paper about security in IPv6 including the references and every thing pleeease.. minimum 6 - 7 pages..

I will be thankful and I am waiting..

Expert Comment

ID: 12652483
no significant difference between IPv4 and IPv6
especially from backbone ISP point of view
major change for IPv6 is gIP Address h
address space is expanded from 32bit to 128bit
text representation is fully changed
decimal expression to hex-decimal expression


Expert Comment

ID: 12686809
Hi cipriancomsa

well you are right..

But I am asking for a paper include the security issue in both IP4 and IP6

well, I want the paper to include:

(1)      Abstract. It comes first in your report, but you write it last.
(2)      Summary. Gives succinct information on the purpose, methods, results and conclusions reported.
(3)      Introduction. Include background material and discuss the scope and limitations of your project.
(4)      Discussion. The body of your report. This includes the methodology used. Be sure to fully describe any figures, tables or diagrams you include.
(5)      Results.
(6)      Conclusions.
(7)      Recommendations, especially for future work and unsolved problems.
(8)      References (must always be included), annotated if possible.
(9)      Appendices, including supporting material as needed.

can you help or any one who is professional in this area??? and I will be thankful..

plz reply sooooon

Expert Comment

ID: 12687373
Uh...i hate to write a paper.I think you can find more informations using google. Here it is an articole with your answer of you questions. Extract from link what you interested. Is not match but you can understand something to write your paper.
In the future if i found an information i will send to you.I'm sorry ...but idon't have time to write a paper for you.
Many informations for your interest you can find with google.

Expert Comment

ID: 12687454
Hi mbcasey,
If he use a proxy or a dial-up connections or a firewall it is a problem to find who send you a   e-mail
You must search a site with informations about  ip.

I give some links to resolve your problem or try to resolve your problem: http://www.programurl.com/easy-ip-address-manager.htm


Expert Comment

ID: 12688948

Thank you for your help, but still the link is not useful..

I really need a paper, plz who can help???

I am similar to you hate to write papers, but what can I do???

plz I need a paper with title Security in IPV6..


Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
Tech spooks aren't just for those who are tech savvy, it also happens to those of us running a business. Check out the top tech spooks for business owners.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses

810 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question