English Deutsch Français Italiano Español Português 繁體中文 Bahasa Indonesia Tiếng Việt ภาษาไทย
All categories

I have no problem if you answer with just the numbers listed below. :)

1. The computer's online status
2. The computer's address
3. The computer's zipcode
4. The computer's owner
5. The computer's online time
6. The site's the computer visited
7. Other? ________________

2007-09-12 07:21:26 · 7 answers · asked by Lindsay 3 in Computers & Internet Internet Other - Internet

7 answers

With you IP address I can dowmload your hard drive in 30 mins.
I would have every bit of information you have on your pc about you!

2007-09-12 11:03:51 · answer #1 · answered by Kevin J 2 · 0 0

An IP address will give you the following:

1. The computer's online status? Yes, maybe, if you do a TracerRoute to see if a connection can be made. A good firewall will make your computer stealth on the internet. You can also try a Ping command, but most good firewalls ignore ping requests.

Keep in mind that many of us use online passwords and we log into sites that require a login name and password. So these are traces left that we are online, but not visible to everyone except those sites we're logged in to and anyone that might be monitoring us while we are logged in somewhere.

In Windows XP you can click Start + Run + type CMD + type tracert ipaddress. Go here to learn more about using the TracerRoute command line utility in XP: http://support.microsoft.com/kb/162326

2. The computer's address? I gather you mean the physical address of the owner's computer? The short answer, no. You can find out the person's internet service provider and of course, they would know who their customers are.

3. The computer's zip code? Yes and no. IP addresses can trace back to the city where the internet service provider's routers are located, but the owner could be in a neighboring city, or if on the border of another state, in another state. The zip code would help, but would not be a given.

4. The computer's owner? No. However, the internet service provider would know this information. But then there could be a small office of employees using the same computer or sharing the IP address. You could have an entire family and friends using the same IP address too.

5. The computer's online time? Only if that person on that specific computer visited a web page of a website that you could monitor and read it's raw usage log files. Or, if you had a spyware program on that specific computer monitoring it.

6. The site's the computer visited? No. But yes, if you had access to that computer's temporary internet files and cookies. You would need to be physically able to access the computer to get specific information unless you had a spyware program on that computer.

It's one thing to reach-out and try to find out about someone's IP address and another to get specific relevant information off that computer.

2007-09-12 07:42:03 · answer #2 · answered by desertcities 7 · 0 0

Number 3.

2007-09-12 07:40:37 · answer #3 · answered by Anonymous · 0 0

http://www.easywhois.com/?mode=iplookup lets you find out about 2, 3, 4.

1 could be determined with a ping

5 - uptime I'm not sure if could be determined on a random site, but you could start pinging a site, and save the responses

6 - would be very intrusive, certainly could not be done on a random IP: you would have to have a program sitting on the machine watching IP addresses (which would be illegal if it is not your machine, or a machine you have permission to do this on)

IP lookup also gives you a person responsible for the machine, and sometimes an email or phone number

2007-09-12 07:32:23 · answer #4 · answered by stevestone_ky 5 · 1 0

you can sometimes ping the IP to see if its online although some firewalls may block pings

no address
no zip code (maybe a general area such as a city)
the owener of the IP usually the ISP or the company
no timeonline
no sites its been to

usually an IP will give you who owns the subnet which will give you the name of the ISP or company then you can get their address / zip but not of the end user

2007-09-12 07:29:55 · answer #5 · answered by Z 6 · 0 0

The best reverse cell phone lookup service that I have tried is http://www.goobypls.com/r/rd.asp?gid=538

From using a reverse cell phone lookup you will be able to get the callers name and address just by typing the phone numbers they will tell you the details related to the number. The reverse cell phone lookup service has your details available they will give you the cell phones location. For a full report including a name and address and other interesting informations you will have to pay. All reverse cell phone lookup services charge for the information as it is a contract bind between the mobile company and themselves, where they pay for the info. Enter the number in the system and they will tell you a lot of informations about the phone number and the person who owns it. If they have extra details you will have to pay for the report. If you only want to reverse lookup one cell phone or land-line phone number you will be charged about $15 but if you need to reverse lookup more than one phone or cell phone number you can get a years access to their database.

Free reverse phone lookup sites generally provide the most basic of information such as name and it works only for landlines. To get further information, money will have to be paid. The free searches do not provide much more than what can be found through the phone book.

This service is great, I used it a lot f time with great results: I always obtained what I was searching for. I definitly reccomend this service, check it out: http://www.goobypls.com/r/rd.asp?gid=538

2014-08-20 08:47:18 · answer #6 · answered by Anonymous · 0 0

reverse phone number search compiles hundreds of millions of phone book records to help locate the owner's name, location, time zone, email and other public information.

Use a reverse phone lookup to:
Get the identity of an unknown caller.
Identify an area code.
Recall the name of a person whose number you wrote down.
Identify an unfamiliar phone number that shows up on your bill.
https://tr.im/721a7

2015-01-24 10:55:07 · answer #7 · answered by Anonymous · 0 0

The ping command alone would not give you any information other than that the computer at that particular IP address is booted up and active on the Internet. It just sends a series of four data packets and receives them back, plus the time it took to send/receive these data packets.

The ping command is used to test connectivity issues. Such as problems a home network might have with its connection, or to see if a certain site is up or having issues with its connectivity. I use the ping command when I recieve a "page will not display" error while browsing. I do this to see if it is the websites issue, or an issue my connection software/hardware is having. It can allow a administrator to troubleshoot and intercept what could turn into a serious issue while it is still minor, thus saving a lot of headache, time, effort and expense.

There are third party tools which can allow one to hack into anothers system via an IP address or ports. It is very invasive and requires extensive experince with computer technology.

If you are concerned over what type of information somebody could conceivably collect on you, via your IP Address, it really is little to none, other than your connection status. As I mentioned before, there are other methods and technology which could enable somebody to place a trojan to monitor your activities and collect data and information over time which would eventually allow them to know your physical address, and with that information they can gather your telephone number and ohter information.

There are safeguards you can take to ensure you are as safe as possible while using the Internet.

1. Keep your system patched with all the latest updates via
Microsoft Updates. An unpatched system is the most
vulnerable to those who take advantage of hole and buffer
over run issue, etc.

2. Use both software and hardware firewall. A Router will
usually supply a stateful firewall, and there are some good
software firewalls out. A great website to check out to see
if your current software and hardware firewalls are doing a
good job is http://www.grc.com The developer of these
free tools has well over twenty years of experiance in this
field and is kind enough to offer out these tools/utilities to
the Online community for free. He also has forums where
individuals can discuss security related issues and the use
of his utilities/tools.

3. Run with a regular user account instead of an administrator
account for everyday normal activities, such as browsing,
email, chat, etc. When you need to download items or do
routine maintance, use an adminstrator account or the
Run As command, which you can access via a right click
while holding down the Ctrl key. This key combination
opens the hidden shortcut menu selection for items.

4. Always download items and scan with your anti-virus
solution prior to opening any attachments, programs,
files, or multimedia items, etc. Even when you receive an
item from a trusted individual you can't know if s/he has an
infected system. Getting into the habit of scanning all items
prior to opening can save a lot of malware infections.

5. Bypass automatic cookie handling and do it yourself. It is
simple, just go into your Internet Options via the Tools menu
and then click Help and read how to perform these simple
steps. This way you can avoid all thirdparty cookies.

I also reccomend a super utility called CCleaner. It has
several neat tools in a small program which takes up a
very small amount of disk space and requires little memory
It is also free. Go here: http://www.cnet.com/downloads.

Once at Cnet, put CCleaner in the upper right hand corner
search box and hit Enter. Another webpage will open with
a list of items including CCleaner. Click on the link, read
user reviews and then decide if you think it something you
can benifit using. It also has a Disk Clean utility, which I
use in conjunction with the system Disk Cleanup tool. It
has a Registry cleaner, which is safe to use, a Software
removal tool which works far better than Windows Add--
Remove applet. It has a Startup Manager which allows a
user to control which third party applications load on startup
which speeds up the logon process.

6. Run your anti-virus program weekly in addition to its on
automatic scan settings. If you ever are misfortunate to
get an infection which your security solution has trouble
cleaning up, go to a HijackThis forum and volunteers will
walk you through the steps of removing the infection. The
individuals at these forums assist less experianced users
clean up an infected machine on their own time. Very nice
people.

7. A router will enable you to use a Private IP address which
basically makes the computer behind the router invisable
to the Internet. While the routers IP Address has to be
public in order to have a viable connection, it is still a very
good way to keep a low profile, especially if you use a
router which allows for Stealth settings. Mine uses Stealth
and the GRC--Gibson Research Corperation, the website
URL I provide above, has a super tool for exposing how
well a router hides the users computers behind it. Mine is
very well hidden. lol

8. Finally, there are both software and hardware applications
which allows an individual to "hide their tracts" whle Online.
Research the options to ensure you get one which actually
does what it claims. Some of these tools/utility programs
are not worth the bits they are written with. Also, more $$
for certain applications does not automatically mean it is
more secure or powerfull in its cloaking. Proxy Servers will
also enable a serfer to "hide" her tracts while Online. All
you do is log onto one of the many Proxy sites available
enter the URL you wish to browse to, and you are taken to
it via the Proxy Server. The Proxy Server's IP Address is
the one which is given out to the websites, not your own. It
is a very clever method of getting around the web in some
degree of secrecy.

If this information is not what you were seaking when you asked your question, I apologize most sincerely. I probably shoudn't have made an assumption of why you wanted the information and just provided what you requested, but the nature of the question led me to assume that perhaps you are concerned about others locating personal identifying informaton while you browse the web.

Good luck and have a nice day.

2007-09-12 08:16:21 · answer #8 · answered by Serenity 7 · 1 0

fedest.com, questions and answers