• Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 419
  • Last Modified:

Can i locate a stolen laptop with its ip address?

I need to know if there is anyway to locate a stolen laptop, playstation4, ipad?
0
iwilde
Asked:
iwilde
  • 2
  • 2
  • 2
  • +3
1 Solution
 
Dave BaldwinFixer of ProblemsCommented:
Not with an IP address because that belongs to the network connection and/or ISP.  As soon as they plug it into a different network, the IP address changes.
0
 
iwildeAuthor Commented:
you sound very knowledgable, so maybe you could tell me if there is anyway possible to trace them?
0
 
iwildeAuthor Commented:
is there some way to track things that were stolen from me? my laptop, playstation4, ipad were all stolen can anyone help me with away possibly to get them back?
0
Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

 
Dave BaldwinFixer of ProblemsCommented:
You need to have proof of ownership in the form of the model numbers and serial numbers and you need to have reported it to the police.  Then watch Craig's List and eBay to see if they show up there.  It is often not easy to recover such things.
0
 
tmoore1962Commented:
Preyproject.com check it out
0
 
David Johnson, CD, MVPOwnerCommented:
there are apps and services that can help you retrieve stolen hardware i.e. ipad/phone, laptop.  but it depends on having the application installed before it is stolen. You will have to report it as stolen and be able to prove that you are the legitimate owner.   The odds are not very good that you will be able to recover your stolen items. You have to have good evidence for the police to get a search warrant and then execute it.
0
 
tliottaCommented:
The Preyproject.com service can be a good one, if it was used before the thefts. Similarly, the national Immobilize product registry in the U.S.A. can be helpful. (See the Immobilise product registry in the U.K. Other countries can have similar possibilities.)

But there is little that can be done if nothing was prepared ahead of time. The phone, perhaps, can be detected through its IMEI/MEID or perhaps SIM info. The other stuff is far less likely. IP address is relatively useless since it will be different as soon as someone else uses it from some other location -- for most devices, it identifies the "connection point" rather than the "device".
0
 
pierrejeanesCommented:
If you have the laptop's ip and remote desktop is enabled and you know the admin or an user with administrative rights and password you can login to your laptop and find out who using it, meaby turn on the webcam and get him.
0
 
David Johnson, CD, MVPOwnerCommented:
A laptop doesn't have an IP address, maybe in the ipv6 days the IP address can be set and stay constant but not now.. You get a WAN ip address dynamically from the ISP's address pool (each house gets 1 maybe 2 ip addresses) and one uses a router to connect more than 1/2 machines to the internet using private ip ranges (i.e. 192.168.x.x. 10.x.x.x 172.16.x.x ranges) AND the router has to have the NAT (network address translation) and Firewall (firewall exception port 3389 tcp/udp) configured on the router.

You have to be enrolled in the service i.e. prey project before the item is stolen. The software has to be running in the background and the thief must connect to the internet for it to be effective.  You have to gather your evidence and present it to the police who will issue the court order to obtain the subscribers information from the ISP and then allow them to get a search warrant. If the thief wipes the hard drive and reinstalls the operating system then your efforts will be to no avail (because the monitoring software will also be wiped from the hard drive)
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

  • 2
  • 2
  • 2
  • +3
Tackle projects and never again get stuck behind a technical roadblock.
Join Now