Solved

unable to trace ip address

Posted on 2013-01-15
5
244 Views
Last Modified: 2014-10-10
Hi I have discovered someone tried to hack into my computer with the below address.

How can I trace this ipaddress? This is ipv6?

fe80::98ce:957d:9326:4c49

Thx!!
0
Comment
Question by:chrishong
5 Comments
 
LVL 3

Assisted Solution

by:FeMaster
FeMaster earned 250 total points
ID: 38781170
According to http://ipduh.com/ipv6/?fe80::98ce:957d:9326:4c49, it's a Local Unicast IPV6 IP Address.  A Local Unicast address is strictly an internal IP address. Routers will not forward such an address. (http://www.ipuptime.net/LinkLocal.aspx).

It would appear that you are trying to hack your own computer.  Or perhaps you already have some sort of malware on your local network that is trying to hack your computer.

In any case, it's internal to your network.
0
 
LVL 83

Accepted Solution

by:
Dave Baldwin earned 250 total points
ID: 38781174
Yes, it is IPV6.  See Local addresses on this page:  http://en.wikipedia.org/wiki/IPv6_address#Special_addresses   Check your own computer to see it belongs to it / you.  The IPV6 address of my computer is fe80::215:f2ff:fee5:931%4
0
 
LVL 16

Expert Comment

by:PaciB
ID: 38781846
Hi,

What make you think of a hack attempt ? What have you seen that let you suppose that ?
0

Featured Post

Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Adwords and keywords 2 36
Redirect Website for Mobile Devises 9 108
Domain Controller - Upgrade DNS Delegation 2 25
Scroll 5 news at a time. 4 27
Password hashing is better than message digests or encryption, and you should be using it instead of message digests or encryption.  Find out why and how in this article, which supplements the original article on PHP Client Registration, Login, Logo…
Any business that wants to seriously grow needs to keep the needs and desires of an international audience of their websites in mind. Making a website friendly to international users isn’t prohibitively expensive and can provide an incredible return…
This tutorial demonstrates how to identify and create boundary or building outlines in Google Maps. In this example, I outline the boundaries of an enclosed skatepark within a community park.  Login to your Google Account, then  Google for "Google M…
The viewer will learn how to look for a specific file type in a local or remote server directory using PHP.

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question