How To Identify A Computer By IP Address

Table of contents:

How To Identify A Computer By IP Address
How To Identify A Computer By IP Address

Video: How To Identify A Computer By IP Address

Video: How To Identify A Computer By IP Address
Video: How to Find an IP Address 2024, December
Anonim

Every computer connected to the Internet has a unique network IP address. There cannot be two computers with the same address on the network at the same time, which makes it possible to determine from which computer this or that activity was carried out.

How to identify a computer by IP address
How to identify a computer by IP address

It is necessary

  • - service who is;
  • - Metasploit program;

Instructions

Step 1

The need to collect all available information about a computer with a known IP address can arise in different situations - for example, in the case of suspicions of fraudulent actions by its owner or when a Trojan program is detected that connects to a specific IP address.

Step 2

To find out all available information about your computer, use one of the who is services, for example, All Nettools. Enter the address of the computer you are interested in in the search bar, and you will receive all the available information.

Step 3

Some services who is immediately give out data on the location of the computer, as an example, the Russian service IP Ping.ru. This resource allows you to get a fairly complete amount of information in a matter of seconds. True, determining the location of the computer is often erroneous.

Step 4

It should be understood that a person engaged in illegal activities on the Internet almost always takes measures to hide his real IP address, so you will most likely go to only one of the intermediate proxy servers. But even if you manage to determine the real network address of the computer, you will not be able to find out the data of its owner, since providers provide such information only at the request of law enforcement agencies.

Step 5

If the law enforcement agencies did not help you for one reason or another, you can try to collect information about the attacker using special utilities. For example, download and install the Metasploit program. This is a completely legal utility, you can download it for free from the manufacturer's website. With its help, you can conduct research on a remote computer and identify its weak points. Remember to use a proxy server when working.

Step 6

The Metasploit program allows not only to investigate remote computers, but also to penetrate them, using the found vulnerabilities. Just do not forget that penetration into someone else's computer is illegal, so this option can only be used when all other possibilities have already been exhausted.

Recommended: