Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium


tracking IP address from yahoo messenger IM

Posted on 2005-03-06
Medium Priority
Last Modified: 2011-08-18
i need to trace a persons IP address whos is using Yahoo messenger instant messages to bug me.

how this can be done.

if anyone can help. i would be oblidged
Question by:tewarianuj

Accepted Solution

Top_nerd earned 1000 total points
ID: 13472276
You have to establish a direct connection with the person (when chatting, your messages pass thru the Yahoo! server). To do so:
Open a command prompt (start>run>cmd (or command in Win98)) and type netstat -n
Send them a file (send them a picture of your dog, for exemple) (if they send you a file it'll work and I believe if either the participants are using a web cam it will also work.)
While the transfer is occuring, type netstat -n again in the command promp.
Compare the previous netstat with this one and look for a different entry. The IP address of the person is the different one, normally the last entry.
note: it's important not to open other browser windows or anything else while doing this procedure: it could false the results.
LVL 38

Expert Comment

by:Rich Rumble
ID: 13472301
abuse@yahoo.com or

The only way to get the ip of someone IM'ing you is to trick them into connecting to you, or to have them upload or download a file to you.
If you have a web-site, or even a firewall that keeps good log's, you can send them your ip and a random port# and look for that in your log's like
 send http:\\
where is your ip address and colon 5678 is port 5678- should be easy to find in a log file.

Expert Comment

ID: 13474305
Actually, a simple chat message will divulge the sender's IP address.... try to simulate this. Go and view your netstat results. Then go ahead and chat some one, say your Yahoo messenger friend. Then view your netstat result again. You will see there the IP address of your friend. Go and ask him his IP address to verify.

On the other hand, this would not be applicable if the user is on a NATted network (inside a LAN and uses a router and IP translation to go out to the Internet). If the user is in a NATted network, what you will only see is IP of the router he/she is using. However, this would give you good lead on who is messing up with you.

Who's Defending Your Organization from Threats?

Protecting against advanced threats requires an IT dream team – a well-oiled machine of people and solutions working together to defend your organization. Download our resource kit today to learn more about the tools you need to build you IT Dream Team!


Expert Comment

ID: 13476091
Lapukman, what you suggested will not work because when your chatting, all your messages go to the Yahoo! server and from there they are sent to the person with whom you're talking. Therefore, if you do a netstat, you'll get the IP of the server and not the person. That's wy it's neccesarty to establish a direct connection with the person by exchanging files, a webcam, voice or anything else. Your suggestioin used to work, but Yahoo! corrected that problem.
LVL 12

Expert Comment

ID: 13476185
just block the contact and be doe with it.

Do not retalliate... you never know what kinda person you mess with. For all you know they might end up DDoSing you.

just block em.

Expert Comment

ID: 13494555
Top_nerd - Actually, that's what I thought before. However, I simulated it again by sending IM to some of my contacts and to my surprise, I was able to get their IP address. I'm not sure why, probably because of my Yahoo version 6,0,0,1750. Or probably, Yahoo has made it to make all IM or all communication between users to be direct to ease up load to their servers and network bandwidth. It's possible that the initial IM goes to the Yahoo server and the succeeding IMs becomes direct connection between the users.

Well, I'm not 100% sure about this, maybe you could try to simulate it too.


Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing emails are a popular malware delivery vehicle for attack.  While there are many ways for an attacker to increase the chances of success for their phishing emails, one of the most effective methods involves spoofing the message to appear to …
The article explains the process to deploy a Self-Service password reset portal I developed a few years ago. Hopefully, it will prove useful to someone.  Any comments, bug reports etc. are welcome...
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

564 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question