Solved

unable to trace ip address

Posted on 2013-01-15
5
243 Views
Last Modified: 2014-10-10
Hi I have discovered someone tried to hack into my computer with the below address.

How can I trace this ipaddress? This is ipv6?

fe80::98ce:957d:9326:4c49

Thx!!
0
Comment
Question by:chrishong
5 Comments
 
LVL 3

Assisted Solution

by:FeMaster
FeMaster earned 250 total points
ID: 38781170
According to http://ipduh.com/ipv6/?fe80::98ce:957d:9326:4c49, it's a Local Unicast IPV6 IP Address.  A Local Unicast address is strictly an internal IP address. Routers will not forward such an address. (http://www.ipuptime.net/LinkLocal.aspx).

It would appear that you are trying to hack your own computer.  Or perhaps you already have some sort of malware on your local network that is trying to hack your computer.

In any case, it's internal to your network.
0
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 250 total points
ID: 38781174
Yes, it is IPV6.  See Local addresses on this page:  http://en.wikipedia.org/wiki/IPv6_address#Special_addresses   Check your own computer to see it belongs to it / you.  The IPV6 address of my computer is fe80::215:f2ff:fee5:931%4
0
 
LVL 16

Expert Comment

by:PaciB
ID: 38781846
Hi,

What make you think of a hack attempt ? What have you seen that let you suppose that ?
0

Featured Post

VMware Disaster Recovery and Data Protection

In this expert guide, you’ll learn about the components of a Modern Data Center. You will use cases for the value-added capabilities of Veeam®, including combining backup and replication for VMware disaster recovery and using replication for data center migration.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Learn by example how to specify CSS selectors for Selenium WebDriver test automation software.
"In order to have an organized way for empathy mapping, we rely on a psychological model and trying to model it in a simple way, so we will split the board to three section for each persona and a scenario and try to see what those personas would Do,…
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now