ip address

Posted on 2006-05-03
Last Modified: 2010-04-13
Is there a way I would know how to get the computer name or user name based on an ip address.
I would like to know who is peeping into a certain website.
Question by:zachvaldez
    LVL 45

    Expert Comment

    Hi zachvaldez,

    I myself have been using a neat utility called hostname for the purpose .. Can't recollect the site from where I downloaded it.

    But either of the above should serve your purpose.

    LVL 32

    Expert Comment

    go to and type in the IP address in the Search Whois field near the upper right of that page.
    LVL 1

    Expert Comment

    If it is on your internal network, to get the computer name, you can go to a command prompt  and type in "tracert (ip address)". For example; tracert
    In the results of the command, it will gice you the computer name.
    LVL 2

    Accepted Solution

    A lot of times when I am trying to track down the computer name with the ip address I use:

    nbtstat -A ipaddress
    nbtstat -A

    It will return information like the following:

              NetBIOS Remote Machine Name Table

          Name               Type         Status
       DELLXPS140     <00>  UNIQUE      Registered
       WORKGROUP      <00>  GROUP       Registered
       DELLXPS140     <20>  UNIQUE      Registered

       MAC Address = 00-18-6F-4F-FA-6B

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    Do You Know the 4 Main Threat Actor Types?

    Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

    NTFS file system has been developed by Microsoft that is widely used by Windows NT operating system and its advanced versions. It is the mostly used over FAT file system as it provides superior features like reliability, security, storage, efficienc…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    759 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    11 Experts available now in Live!

    Get 1:1 Help Now