Page 3 of 3 FirstFirst 123
Results 21 to 25 of 25

Thread: IP tracing

  1. #21
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Redondo Beach, CA
    I don't know if you can. Web-based emails tend not to show full header information. Check your options or personal preferences (whatever the site calls it) and see if there is an option to see full headers.

    Ideally, collecting your email with a program like Eudora or some other email program would allow you to see the header info.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  2. #22
    Senior Member
    Join Date
    Nov 2002
    To grab info about an IPaddy there still some olmd fashion:
    Traceroute is good to give you the last router IP address and name (if the router accept to reply ICMP unreachable & main ISP does).
    From the name u can deduce the ISP and sometimes the city.
    [shadow] SHARING KNOWLEDGE[/shadow]

  3. #23
    Junior Member
    Join Date
    Jun 2003
    u may use not only trace route but ...things like www.visualroute.visualware.com or other programms to trace an ip... like neotrace....but i dont dont know what is happening if someone uses a proxy...like in the case of IRC .. and the person has loggined....u see another ip...and still how do i trace am email? on linux..or without eudora...

  4. #24
    @ΜĮЙǐЅŦГǻţΩЯ D0pp139an93r's Avatar
    Join Date
    May 2003
    St. Petersburg, FL
    I found an interesting site that has some usefull and easy to use tools for operations like IP tracing.

    Real security doesn't come with an installer.

  5. #25
    Senior Member Maestr0's Avatar
    Join Date
    May 2003
    E-mails are only traceable to a person who is not trying to hide. You can trace e-mails from their headers but often times these are incomplete or have spoofed information. Also there are still mailers that allow annoymous mail/relaying which means once you get to that mailer you've really got no where else to go. (Unless the owner of the mailer feels like letting you paw through his logs which is not likely to say the least.) REMEMBER: The only thing a clever attacker needs to become anonymous is 1 compromised machine.

    \"If computers are to become smart enough to design their own successors, initiating a process that will lead to God-like omniscience after a number of ever swifter passages from one generation of computers to the next, someone is going to have to write the software that gets the process going, and humans have given absolutely no evidence of being able to write such software.\" -Jaron Lanier

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts

We have made updates to our Privacy Policy to reflect the implementation of the General Data Protection Regulation.