Solved

Visitor to Web site (Log showing Strange IP Address)

Posted on 2016-07-27
9
132 Views
Last Modified: 2016-07-30
Amidst all the IP addresses in the visitor log to the web site, I saw this:
2604:2000:e100:200:c9fc:51b7:15eb:911b

That does not look like an IP address.
What visited my web site, if that's not an IP address or PC?
0
Comment
Question by:brothertruffle880
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
  • 2
  • +1
9 Comments
 
LVL 95

Expert Comment

by:John Hurst
ID: 41731553
That is an IPv6 IP address. Nothing to be concerned over.
1
 

Author Comment

by:brothertruffle880
ID: 41731578
Hi John:
do IPv6 addresses give off any more information than IPv4?
Does the site owner have the capability of determining what type of hardware the visitor is running, etc?
0
 
LVL 95

Expert Comment

by:John Hurst
ID: 41731586
IPv6 just allows more IP addresses from a particular point.

Second question:  Possibly. They know here what my IP address is and Microsoft knows what OS I am running. Lenovo knows what hardware I am running. But that is not from the IP address at all.
0
SharePoint Admin?

Enable Your Employees To Focus On The Core With Intuitive Onscreen Guidance That is With You At The Moment of Need.

 
LVL 95

Accepted Solution

by:
John Hurst earned 500 total points
ID: 41731619
You can see some of the technical benefits in this WIKI article.

https://en.wikipedia.org/wiki/IPv6

There are so many IPv6 addresses that every device will have an address. There are so many devices, that the address space had to be enlarged.
1
 
LVL 45

Expert Comment

by:Jackie Man
ID: 41731621
IPv6 is only designed to accommodate more real ip address as IPv4 have been used up already.

Whether you can detect the client hardware, it depends on whether the user of the client machine allowed you to install an agent in their client machine.

Normally, you cannot do so as most antivirus  software will detect the install of agent as malware. Only if you provide something, i.e., benefits in exchange to the user, say you provide some content for them to download via your client software to be install before they can have the access to your content, you will be able to collect the info required.

Otherwise, you can only detect their browser and ISP details.
0
 
LVL 83

Expert Comment

by:Dave Baldwin
ID: 41731627
This page http://www.useragentstring.com/pages/useragentstring.php shows 'User Agent Strings' that browsers send to the web site when they make a request.  This happens for IPv4 and IPv6, it's just part of the process.  Are you trying to hide something?
0
 
LVL 45

Expert Comment

by:Jackie Man
ID: 41731629
2604:2000:e100:200:c9fc:51b7:15eb:911b

The above IPv6 addresses only give info that the client machine is using ISP of Times Warner Cable.
0
 

Author Closing Comment

by:brothertruffle880
ID: 41735673
Thanks again John!
0
 
LVL 95

Expert Comment

by:John Hurst
ID: 41735691
You are very welcome and I was happy to help.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article was originally published on Monitis Blog, you can check it here . Today it’s fairly well known that high-performing websites and applications bring in more visitors, higher SEO, and ultimately more sales. By the same token, downtime…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
The viewer will get a basic understanding of what section 508 compliance can entail, learn about skip navigation links, alt text, transcripts, and font size controls.
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question