Page 1 of 3 123 LastLast
Results 1 to 10 of 22

Thread: How do ISPs know what IP you have?

  1. #1
    Junior Member
    Join Date
    Jul 2004
    Posts
    2

    How do ISPs know what IP you have?

    Everybody hears how the RIAA and the MPAA can track your IP and ask your ISP for your information.

    My question is: how do ISPs know which customer has what IP?

    My theory is that they check their DHCP server logs to see which IPs are issued to whom.

    But, I could just make linux claim another IP and do my leeching from there instead, and dispose of it when I don't need it anymore. Would that make me hidden from them?

    I know that the MAC address could link it to me, but do routers keep track of the MAC address and which IPs they used?

    I'm relating these questions to a cable ISP (optimum online).

  2. #2
    Honestly I don't know the answer to your question but to add to what you're saying even a mac address can be spoofed. It is possible to spoof a mac address and from there really what can they do? The combination of what you said and spoofing the mac would make it extremely hard to trace.

  3. #3
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    IPs tend to be issued to a certain area (physically) based on subnet. Using DHCP they identify which users have which address (you are paying for the access so they will associate it to you). Routers can keep track of MACs (do some research on ARP and RARP). That said, even if you "spoof" the mac the other users on the subnet aren't necessarily doing so. As a result, by simply elimination, they will find you.

    Lastly, it's not that hard to figure out who's downloading. Volume tends to give it away. All they'd have to do is stop the access for the high volume users (a technique that is used) and see who "whines" first about losing access.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  4. #4
    Very true, I didn't really think about them issuing by area... But what if you spoofed the Mac Addy of one of the other users in the area? And by using more and more ways of concealing your Identity proxy chains etc. etc. They really won't be able to take the time or money to find you. The ISP may and I know that's what is in question but outside sites wouldn't be able to. And I'm sure there are other means of concealing identity between you and your ISP though...

  5. #5
    Senior Member
    Join Date
    Apr 2004
    Posts
    1,130
    ISP connection servers can "track" users/physical link/ip address.

    So when you connect, server logs you and ip assigned.

    Depending on ISP technology, yes, you can change and use other ip address after connection. Most of ISPs try to simply "shutdown" your connection when detect this misbehavior.
    Some treat this like a TOS violation and ends your contract

    Eventually, it will cause an odd behavior on ISP network and they will find you, using an ip
    address diferent that was assign by them. So, cops go there and arrested you.

    BTW, you are pirating music and spoof address, what do the cops think about you? an innocent guy downloading files from internet, or a professional hackers that must go to jail?
    Meu sítio

    FORMAT C: Yes ...Yes??? ...Nooooo!!! ^C ^C ^C ^C ^C
    If I die before I sleep, I pray the Lord my soul to encrypt.
    If I die before I wake, I pray the Lord my soul to brake.

  6. #6
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    But what if you spoofed the Mac Addy of one of the other users in the area? And by using more and more ways of concealing your Identity proxy chains etc. etc. They really won't be able to take the time or money to find you. The ISP may and I know that's what is in question but outside sites wouldn't be able to. And I'm sure there are other means of concealing identity between you and your ISP though...
    If you spoof the MAC, someone will complain and the ISP will know about it. Using proxy chains might be helpful but don't bet that it's a 100% guarantee of anonimity. There is ALWAYS a way to find out and there is always a trail. And given the depth of the pockets of both these organizations, it does sound like they are willing to foot the bill.

    an innocent guy downloading files from internet, or a professional hackers that must go to jail?
    Innocent? Ya. Right. Professional Hacker?! Good lord! Anything but. I don't, and I suspect I'm not alone in this, consider downloaders as "hackers". Crackers or pirates maybe but Hackers? Please.

    Even if you hide yourself from the RIAA or whoever, the volume downloaded will be picked up by someone and will probably constitute a violation of the TOS, which gets you banned from their services. Piss off enough ISPs and you maybe trying to find access via war-driving (MMVPA).
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

  7. #7
    Hey, I didn't say was doing it I was just helpin a brother out! LoL. Personally I don't pirate music or software anymore... Became a security issue and with the lawsuits that started poppin up I wasn't gonna risk it... Instead I use LaunchCast!!!

    www.launch.com
    Free Internet Radio and Video Radio

  8. #8
    Senior Member
    Join Date
    Apr 2004
    Posts
    1,130
    Dear MsMittens, be aware that term "hacker" is general used as "criminal" outside there.
    There is no such thing, out of security community, as white hats, gray hats, pink hats, hacker, cracker.
    For them, hacker is a guy that do bad things thru internet. Include piracy, porn, hacking, cracking, defacind, whatever.
    And cops (that are outside our community) can distinguish between those "types".
    Meu sítio

    FORMAT C: Yes ...Yes??? ...Nooooo!!! ^C ^C ^C ^C ^C
    If I die before I sleep, I pray the Lord my soul to encrypt.
    If I die before I wake, I pray the Lord my soul to brake.

  9. #9
    Senior Member
    Join Date
    Mar 2004
    Location
    Colorado
    Posts
    421
    Most Internet wrongdoers don't not get caught because of some super technique
    they used to stay in the shadows but because they didn't piss the right person at the right time.
    Do something really illegal and find out just how poorly spoofing works for you.
    In regard to operating from a your home cable connection anyway.

    File swapper lawsuits are a parade to create FUD more than anything.
    Millions of swappers and a handful of trips to court..

    Stop being a cheapa$$ and buy the content...

    With that in mind, I doubt there is anything you can do to NOT associate your home/account/billing info with your cable connection regardless of your chosen spoofing technique.
    As has already been stated, the process of elimination will probably handle that.

  10. #10
    Just a Virtualized Geek MrLinus's Avatar
    Join Date
    Sep 2001
    Location
    Redondo Beach, CA
    Posts
    7,323
    Dear MsMittens, be aware that term "hacker" is general used as "criminal" outside there.
    Uh huh. I'm well aware of that. But we're not "outside". This is a security community.
    Goodbye, Mittens (1992-2008). My pillow will be cold without your purring beside my head
    Extra! Extra! Get your FREE copy of Insight Newsletter||MsMittens' HomePage

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •