How am I able to identify where fraudalent communications are coming from if I have the IP address?

Posted on 2007-10-08
Last Modified: 2010-04-02
Fraudalent requests via email were sent on my behalf, which included very sensitive information like my SS#, phone #, address, etc. I was able to identify the IP address of these communications via a third party. How do I go about tracing it and identifying who exactly sent it?
Question by:kbenkowski
    1 Comment
    LVL 4

    Accepted Solution

    In order to find the person who used an IP address, you need to know the date and time that the IP address was used by that person.

    Let's say you know was used by the person at 1:45 PM EST on 1/1/2005.

    The company that owns that range of IP addresses can be located by using ARIN's database ( There is a WHOIS box on that website that will tell you what company owns that block.

    That ISP, however, is unlikely to look at their logs to determine which of their customers was using a particular IP at a particular time, mainly for privacy reasons. In order to obtain this, you'd have to get a court order signed by a judge. To do this, you'll need to hire a lawyer or file a lawsuit yourself. During the legal discovery process, the judge would likely authorize a court order and the ISP would need to provide the IP user's information to you, which could then be used for further legal proceedings.

    Also worth noting, that IP addresses used in spam are frequently not coming from your own country, meaning you would need to convince a company in another country to give you customer's information, or file a lawsuit in a foreign country which gets complicated.

    If you have any questions, let me know.

    Featured Post

    Looking for New Ways to Advertise?

    Engage with tech pros in our community with native advertising, as a Vendor Expert, and more.

    Join & Write a Comment

    Network ports are the threads that hold network communication together. They are an essential part of networking that can be easily ignore or misunderstood, my goals is to show those who don't have a strong network foundation how network ports opera…
    Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
    Polish reports in Access so they look terrific. Take yourself to another level. Equations, Back Color, Alternate Back Color. Write easy VBA Code. Tighten space to use less pages. Launch report from a menu, considering criteria only when it is filled…

    754 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now