Solved

Can an IP address be tracked to an address

Posted on 2008-06-17
4
722 Views
Last Modified: 2013-11-12
Is there a way to track an IP address to a physical address?
0
Comment
Question by:deklinm
  • 2
4 Comments
 
LVL 3

Accepted Solution

by:
superiz earned 250 total points
Comment Utility
Not without the help of law enforcement or the courts.
0
 
LVL 3

Assisted Solution

by:pzurowski
pzurowski earned 50 total points
Comment Utility
Maybe you are looking for hardware MAC address? If yes, it is possible, but only in your LAN. You must:
1) ping that host (sample command: ping 10.0.0.1)
2) display your arp table (sample command: arp -a)

Pinging is necessary, becose your box must know MAC address
0
 
LVL 3

Assisted Solution

by:superiz
superiz earned 250 total points
Comment Utility
Good pzurowsli. I hadn't considered that they might be wanting the MAC address. Of course the ping then arp method only works for machines on the same subnet, otherwise I think that they would only get the MAC of the router.
0
 
LVL 1

Assisted Solution

by:gin_smythe
gin_smythe earned 200 total points
Comment Utility
your provider saves the ip together with the user name in log files (thank your goverment)
so if someone really wants to know who is behind the ip they will find out.

Recently I've read that random people just go to the provider and demand the physical adresses because of suspision on some crime and get succesfully away with it - so yes you can be
sure that your physical adress is avaible for everyone whos really interested.

You arent completly defenseless, you could mask your ip by using a proxy.
- You connect over another computer so the target gets the ip from the computer in between.
Butl if the computer is in reach of the one whos looking for you they can check the log files
and then they got you again so the benefit depends on the proxy and proxys in general slow down your
connection

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Understanding FTPS File transfer is a common requirement in most Enterprises. While there are numerous ways to get a file from Point A to Point B over a network, perhaps the most common method still in use is FTP – File Transfer Protocol. FTP is …
SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now