Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

unable to trace ip address

Posted on 2013-01-15
5
Medium Priority
?
254 Views
Last Modified: 2014-10-10
Hi I have discovered someone tried to hack into my computer with the below address.

How can I trace this ipaddress? This is ipv6?

fe80::98ce:957d:9326:4c49

Thx!!
0
Comment
Question by:chrishong
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 3

Assisted Solution

by:FeMaster
FeMaster earned 1000 total points
ID: 38781170
According to http://ipduh.com/ipv6/?fe80::98ce:957d:9326:4c49, it's a Local Unicast IPV6 IP Address.  A Local Unicast address is strictly an internal IP address. Routers will not forward such an address. (http://www.ipuptime.net/LinkLocal.aspx).

It would appear that you are trying to hack your own computer.  Or perhaps you already have some sort of malware on your local network that is trying to hack your computer.

In any case, it's internal to your network.
0
 
LVL 84

Accepted Solution

by:
Dave Baldwin earned 1000 total points
ID: 38781174
Yes, it is IPV6.  See Local addresses on this page:  http://en.wikipedia.org/wiki/IPv6_address#Special_addresses   Check your own computer to see it belongs to it / you.  The IPV6 address of my computer is fe80::215:f2ff:fee5:931%4
0
 
LVL 16

Expert Comment

by:Bruno PACI
ID: 38781846
Hi,

What make you think of a hack attempt ? What have you seen that let you suppose that ?
0

Featured Post

Simplify Your Workload with One Tool

How do you combat today’s intelligent hacker while managing multiple domains and platforms? By simplifying your workload with one tool. With Lunarpages hosting through Plesk Onyx, you can:

Automate SSL generation and installation with two clicks
Experience total server control

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to write a Context Sensitive Help (an online help that is obtained from a specific point in state of software to provide help with that state) ,  first we need to make the file that contains all topics, which are given exclusive IDs. …
When it comes to security, close monitoring is a must. According to WhiteHat Security annual report, a substantial number of all web applications are vulnerable always. Monitis offers a new product - fully-featured Website security monitoring and pr…
The viewer will learn how to create and use a small PHP class to apply a watermark to an image. This video shows the viewer the setup for the PHP watermark as well as important coding language. Continue to Part 2 to learn the core code used in creat…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question