Log in

View Full Version : How to track a IP address



jriver309
08-05-2012, 04:14 AM
Hi not sure if this is allowed or if so where to ask but I would like to see who a IP address belongs to. Can give more details if this is ok. Thanks

wildman25
08-05-2012, 04:38 AM
For site ip's, use flagfox if you use firefox.
You could also type below into your address bar with the ip and it should work
geoip.flagfox.net/?ip=

KIDWCKED
08-05-2012, 05:28 AM
Hi not sure if this is allowed or if so where to ask but I would like to see who a IP address belongs to. Can give more details if this is ok. Thanks

That option will not likely be available for you regarding members here..

Terryl
08-05-2012, 05:29 AM
Try "Internetfrog.com" look at the free internet tools.

satchick
08-05-2012, 02:12 PM
Keep in mind that all you'll be able to see if the ISP that assigned the IP address at the time you looked it up. The geolocation data is somewhat accurate, depending on how the ISP's network is set up. In some cases the public IP that you see really belongs to the ISP's central office for that area.

jriver309
08-06-2012, 04:27 AM
Thank you everyone for your help, I got my emails passwords hacked and it showed the IP address, I changed all my passwords and another attempt was made and also now my computer is not working correct, so I gotta find a online scan that also removes virus. Just to be sure.

purriocity
08-06-2012, 04:37 AM
Thank you everyone for your help, I got my emails passwords hacked and it showed the IP address, I changed all my passwords and another attempt was made and also now my computer is not working correct, so I gotta find a online scan that also removes virus. Just to be sure.
just google housecall by trend micro

satchick
08-06-2012, 02:29 PM
AVG and Avast provide free antivirus software, and Microsoft Security Essentials is available to licensed users of Windows Vista and 7. I would also run Malwarebyes in addition to your AV.

That IP address more than likely isn't the hacker's real IP. Most of them use proxies, VPN's, or go through other compromised computers to carry out their attacks.