• November 13, 2024

Are Ip Grabbers Illegal

Is IP Grabbing Illegal? (All Questions Answered) – SmartyDNS

Your IP address is how you communicate with the Internet. Without it, that wouldn’t be possible.
Since it’s so important, you have to wonder – is IP grabbing illegal? Is it illegal to track an IP address?
We’ll answer those questions (and more) in this quick five-minute article.
Is IP Grabbing Illegal – Yes or No?
First, what is IP grabbing?
Well, it’s when someone uses a third-party service to “grab” your IP address. For example, they might use Grabify. It lets them create a link which they can send to you. If you access it, they’ll be able to see your IP address (alongside other information) on their end, like this:
If they click “More Info” on the right, they can even see your local IP address – the one your device uses on your network.
So is IP grabbing illegal?
Nope. There’s no specific law preventing someone from targeting you with an IP grabbing tool. Your IP address is pretty much public information at this point – just like your street address or phone number.
However, what someone does with your IP address can become illegal.
Here’s When IP Grabbing Is Against the Law
When the person grabbing it decides to DDoS you (basically, force you offline with cyber attacks). They can target your network with a DDoS attack because they know your IP address. In most places, doing this is illegal. DoS attacks, however, might not always be illegal because they’re weaker than DDoS attacks. If someone targets you with them constantly, though, you can contact the the person who grabbed your IP address tries using it to remotely hack your computer. Normally, an IP address isn’t enough to do that, but some skilled hackers could abuse Shared Resources to perform such a cyber attack. They could also use it to scan for open ports, which they then try to exploit to take over your someone uses IP grabbing to target you with phishing attacks. For example, they use it to find who your ISP is, and then they target them with phishing and vishing attacks.
Is IP Tracking Illegal?
It sounds like it should be, but it normally isn’t. It’s how websites keep track of their users, and how they display ads on the Internet. Businesses also use it for all sorts of B2B purposes (marketing, delivering services, analytics, etc. ).
As long as they meet any legal data processing requirements (like the GDPR), there are no conflicts with the law.
Is It Illegal for an Individual to Track Your IP Address?
Again, not really. They can freely use services like IP Logger or IP Tracker to keep tabs on your IP address. There’s no specific law against that.
But if they track your IP address for illegal purposes (harassment, stalking, DDoS-ing, cyber attacks, etc. ), it obviously goes against the law.
Should You Hide Your IP Address?
That’s up to you.
If you want to enjoy more privacy, and not have websites and random people track it, you should definitely do it. The same goes if you don’t want hackers abusing it or using it to DDoS you.
Plus, you get to enjoy other perks if you hide your IP address:
The ability to prevent anyone from finding out what country and city you are from + who your ISP is and what your ZIP code can bypass geo-restrictions and unblock different websites and online services – like Netflix or Pandora can also bypass firewalls at work and school. Also, you can get around government censorship since it also relies on firewalls to block hiding your IP address, you make it much harder for advertisers to track your online movements and spam you with personalized might be able to bypass geographical price discrimination. That’s when sites display different prices based on your geo-location. Hiding your IP address means websites won’t be able to see your geo-location rrenting becomes safer because wannabe hackers, lawyers, and copyright trolls can’t see your IP address in the swarm risk of a cybercriminal logging it and selling it on the dark bans won’t stop you from gaming online or posting on forums.
How Can You Hide Your IP Address?
These are the most convenient ways to do it:
1. Use a VPN
This is an online service that masks your IP address and encrypts your traffic. Here’s how the process works:
You download and install a VPN app on your use the app to connect to a VPN app and the server establish a secure connection between data that passes through that connection is encrypted end-to-end (only the client and server can encrypt/decrypt it) you visit a website, your connection requests go to it through the VPN website receives the requests from the VPN server, so it only sees the server’s IP else who tries looking up your IP address will also only see the server’s address.
Overall, a VPN is a great way to protect your privacy. Plus, by encrypting your traffic, it makes sure that:
Hackers can’t abuse vulnerable WiFi networks to monitor your and surveillance agencies can’t spy on your online can’t throttle your bandwidth anymore.
Looking for a reliable VPN service?
Here at SmartyDNS we offer high-speed VPN servers with military grade 256-bit AES encryption and highly secure VPN protocols (OpenVPN, SoftEther and IKEv2), and we we adhere to a strict no-log policy.
Our VPN servers act as proxy servers and we also offer Smart DNS service that allows you to unblock 300+ geo-restricted websites around the world.
We offer convenient VPN apps for Windows, Mac, iPhone / iPad, Android and Fire TV / Stick, and extensions for Chrome and Firefox browsers.
Special offer! Get SmartyDNS for $ 2. 9 per month!
Yes, and we’ll also get your 30-day money-back guarantee.
Сэкономьте 63% сейчас
2. Use a Proxy
A proxy server works similar to a VPN – it intercepts your connection requests to the web, and forwards them on your behalf. So any site you visit will only see the proxy server’s IP address.
However, unlike a VPN, proxies don’t offer powerful encryption. Sometimes, they don’t offer any at all.
So you get some privacy by hiding your IP address, but your traffic might not be secure. Also, if you use a free proxy that’s run by a malicious actor, they could log your data.
Generally, you should only use a proxy if you need to unblock a web page. If you need security on top of that, use a VPN. Instead of getting separate services, consider using a VPN whose servers double as proxies. It’s much cheaper.
3. Use Mobile Data or Switch WiFi Networks
If you’re on your mobile and want to change your IP address realf fast, try switching from WiFi data to mobile data.
You’ll use your mobile provider’s network instead of your WiFi network’s ISP, so you’ll get a different IP address.
What if you have a limited mobile data plan and normally use WiFi, though?
In that case, you can switch WiFi networks to change your IP address.
4. Ask Your ISP to Change It
They assigned you your current IP address, so you can ask them to change it. Maybe see if they can offer a dynamic IP address too (one that changes at regular intervals).
If you already have a dynamic IP address, you can usually change it by restarting your router.
Can You Hide Your IP Address with Tor?
Yes, you can do that. Just like a VPN, your connections will go to the Internet through a server. So everybody will see the IP address of the Tor server you’re using.
But we have to warn you – Tor has had and continues to have issues with IP leaks:
In 2017, the TorMoil issue leaked users’ IP might leak your IP address when you try to open Windows DRM rrent clients can sometimes leak your IP address. Certain file types (like PDFs) can bypass proxy settings, causing Tor to leak your IP address.
Besides that, you’ll also get pretty slow speeds because there are only around 6, 000 servers for over two million users.
Is IP Grabbing Illegal? The Bottom Line
Not unless the person grabbing your IP address wants to use it to do something illegal – like DDoS-ing you or hacking into your computer.
For normal purposes, IP grabbing (and tracking) is generally legal. If you’re worried it violates your privacy, use a VPN to hide your IP address. It’s the easiest and most convenient way to do it. If you know other methods to mask your IP address (other than the ones we already mentioned), go ahead and tell us about them in the comments.
Technology vector created by freepik –
Is it Unlawful to Collect or Store TCP/IP Log Data for Security ...

Is it Unlawful to Collect or Store TCP/IP Log Data for Security …

It is a common and accepted practice for entities to collect, store, process and analyze log data. This log data includes the IP addresses of every person (computer) that accessed or attempted to access the network, the website or the process. These logs can be used to determine the source of attacks, the pattern of attacks and to provide and early warning about such attacks. Data analytics on such log data can not only identify sources of attacks, but also can be used to prevent future attacks—both at that institution and others.
But this activity raises two significant questions: Are IP addresses “personal data” under the EU General Data Protection Regulation (GDPR), and if so, can I collect, store and process them with or without the consent of the “data subject”—presumably the owner of the IP address? The answer (and you knew this already) is “it depends” and “it depends. ”
What is an IP Address Anyway?
“An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a computer network that uses the Internet Protocol for communication. An IP address serves two principal functions: host or network interface identification and location addressing. ” (Thank you, Wikipedia). First thing to note is that an IP address identifies (or can identify) a connected device, not the actual identity of the individual using that device. Second, the extent to which the IP address actually identifies a device may depend on whether the IP address is “static” (that is, that the device has a specific assigned IP address associated with it) or “dynamic” (that is, that the device is assigned a new IP address every time it connects to the internet. ) Even if dynamic, it may depend on whether the IP address is reassigned for every session, and how long each session may last. The longer an IP address is associated with a device (even if dynamically assigned) the more that IP address is “associated” with that device.
Most corporate or other networks now use network address translation (NAT) in one form or another, so that the internal IP addresses associated with specific devices or activity are not viewable to the outside world. Think of it as a mailroom where you simply address mail to “ABC Company” and the mailroom figures out to whom within the company the mail is intended. (Remember mailrooms? )
Finally, the information necessary to connect an IP address to either an individual or even a device is frequently not publicly available. The IP address 156. 33. 241. 5 may be associated with the U. S. Senate, but not with any specific individual or device at the Senate. Typically, an IP address will identify a provider—an ISP who assigned the IP address to a subscriber. Armed with the IP address, the date, the time and possibly other information, the provider can determine the subscriber to whom that IP address was assigned at that time. If the address is NAT’d, or if the subscriber used a VPN or TOR router, or travelled through a proxy server of any kind, then we need some complicated forensics or other tools or devices just to connect an IP address to a device. Oh, and these providers won’t give out this data to just anyone—generally a subpoena, warrant or other legal process is required to be able to trace and track an IP address to a subscriber. Generally. So it’s not like you can find an IP address and know, “Hey! This is the IP address of Boris Badenov. ” So, IP addresses are NOT personal data.
Not so fast.
Why exactly do we collect, store, analyze and log IP addresses? Obviously the machines we use—the computers, routers, hubs and firewalls—collect IP addresses to direct traffic to the right location. When a visitor comes to a website, the device associated with the IP address of that visitor makes a request to our web server to deliver the hypertext on our website to theirs. For that, we need the return address—the IP address. The internet does’t work without the collection and use of IP addresses. Emails don’t get sent, videos don’t get watched, websites don’t get visited, tweets don’t get tweeted, messages don’t get messaged—you get the idea. IP addresses are what make the internet work, and without collecting them and using them, there ain’t no internet.
So, irrespective of whether they are “personal data, ” it’s clear that some collection, use and analysis of IP addresses is both permitted and necessary. Whether that is because it is a “lawful purpose” to use the IP address, or whether there is express or implied consent to such use we will put aside. For the moment.
Security logging goes somewhat beyond the “normal” use of IP addresses to deliver traffic. Think of FedEx or UPS. They need the address of the sender to know where to pick up the package. They need the address of the recipient to know where to deliver the package. While the package is in transit, they need the tracking data to, well, track the package. They may need aggregate package tracking data to decide—both for the present and the future—how many trucks, planes, warehouses, etc. they will require. But FedEx and UPS also have the ability to print out (and to be compelled to print out by subpoena) records of every package delivered to you (or your address) from the dawn of time (say, 1990) to the present. They can slice and dice this data to show how many letters, packages and boxes. And from whom. Are you getting packages from drug dealers? Chemical manufacturers? Adam and Eve? This is similar to what IP logging and traffic analysis does. It collects traffic data to determine patterns. Patterns of “good” traffic and patterns of “bad. ” Comparing this data to those collected by others (e. g., threat intel) we can get a picture of the activities associated with the IP address. We can track the IP address over time. And, in certain circumstances, we can use this data with other data to determine the individual associated with the IP address (the threat actor). In some cases—such as employee misconduct, theft of intellectual property, denial of service attacks or data breaches, we collect, store and process IP addresses to actually identify (and then possibly sue or arrest) a specific identifiable person. So IP address ARE personal data, right?
To understand whether an IP address is, or is not “personal data” under GDPR, you have to understand what “personal data” is and why it is protected. Even then, assuming that IP addresses are personal data, this does not necessarily preclude its collection, storage and use. On the other hand, it doesn’t mean you can do whatever you want with IP information.
What IS ‘Personal Data’?
Personal data is at the heart of GDPR, it’s not clear whether an IP address does or does not fit this definition. GDPR states that “‘[P]ersonal data’ means any information relating to an identified or identifiable natural person (‘data subject’). ” It clarifies this statement by noting that:
“[A]n identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person. ”
So, does the number 187. 53. 42. 4 relate to an identified or identifiable natural person?
The EU Court dealt with this issue with respect to the predecessor to GDPR—the EU Data Privacy Directive—regarding German citizen Patrick Breyer’s claim that his IP address, held by the German Federal government (acting as an ISP), constituted “personal data. ” On Oct. 19, 2016, the EU Court agreed. Kinda. Sorta. The Court stated that:
“… a dynamic IP address registered by an online media services provider when a person accesses a website that the provider makes accessible to the public constitutes personal data within the meaning of that provision, in relation to that provider, where the latter has the legal means which enable it to identify the data subject with additional data which the internet service provider has about that person. ”
OK, what does that mean, exactly? It means that an IP address is personal data when the provider has the additional data necessary to link that IP address to a specific individual. So, if your provider is, say Comcast or Verizon, and they can track your activities by IP address and know who you are because you are a subscriber of theirs, then with respect to them, your IP address is personal data. But the case is ambiguous. It makes the data “personal” if the provider has the “legal means” to enable it to identify the data subject—not just where it actually has the necessary data or even access to that data.
In the United States, if all you have is an IP address, a date and a time, (the kind of stuff you typically log), do you have the “legal means” to enable you to identify the data subject? Depends what “legal means” means. Certainly you would have the ability to file a lawsuit against the “owner” of the IP address for—well, whatever bad thing you think they did. Then you could serve a subpoena on the ISP for it to pony up its own log and subscriber data. If a VPN or proxy, you could then do the same thing for each IP address uncovered, then file a lawsuit in Armenia or Ukraine or Singapore, and get a court to order the Armenian ISP to deliver this data through letters rogatory to a U. court, or otherwise produce it pursuant to a treaty, and then, five years later, you might have the fake subscriber’s name associated with the proxy server three steps removed from the threat actor. Or you might get lucky, and find the threat actor in just one subpoena. Nevertheless, you have the “legal means” to get the data. Maybe.
The Breyer court simply didn’t take into account how difficult it is in most circumstances to convert a naked IP address into an identity of a living, breathing human being. The court is not wrong, it’s just not right.
License Plates
An analogy can be made between IP addresses and license plate numbers. Neither of these are “personal data” per se. The Illinois license plate “BDR 529” tells you nothing about the activities of a specific individual standing alone. Add to that the ability to look up the registered owner of the vehicle and you have something much closer to personal data. As with the IP address which at best identifies a machine or process, the license plate at best identifies a vehicle itself (and its registered owner) but not the operator. So the plate + lookup + observation of activity lets you infer a great deal about the activities of the owner (if you assume the owner is driving) and would constitute personal data.
In a recent case, Fairfax County, Virginia, police were using a sophisticated camera linked to a state database to collect, store and process license plates of vehicles as they drove down the street. The Automated License Plate Reader (ALPR) would capture and process an image of the license plates of cars, then run these license plates to see if the cars were reported stolen or if there were warrants issued against the registered owner of the cars. But the police were also storing this data for an unlimited period of time. So they had the ability to, for example, identify all the vehicles that might have been in a particular neighborhood at a particular time. They also had the ability to put in a person’s name as registered owner and see all the places that person had been (and had been captured by the ALPR) for days, weeks or months. There was essentially no limit to how the police could use the data.
So are the scans of the license plates, which are just a series of numbers and letters (and the plates themselves are issued by and belong to the government), and the data collected about what these license plates are doing “personal data? ” The lower Virginia court, applying Virginia’s “Data Act, ” which protects certain “personal data, ” found “that a license plate number is not personal information, ” noting that each example of “personal information” listed in [the Data Act’s] definition referred to “an individual person” but a license plate number refers to “a vehicle rather than a person. ” Since the ALPR only identifies a car and not a person, it’s not protected. Just like an IP address identifies a computer or process, not a person.
The Virginia Supreme Court reversed. It found that the Data Act defines “personal information” broadly to “encapsulate[] ‘all information’ that … allows any inference about an individual’s ‘personal characteristics, ’ activities, or associations. ”
The Virginia Court took a nuanced approach to whether the license plate data is or is not “personal information. ” It noted that, because it is an agency-issued identification number under the statute, it may be deemed “personal information” in certain contexts. However, the court noted “in other contexts, a license plate number would not be ‘personal information’ because there is nothing about a license plate number that inherently ‘describes, locates or indexes anything about an individual. ’ Without something connecting the license plate number to an individual, it is just a combination of letters and numbers that does not describe, locate or index anything about anyone. ”
Sure, just like IP addresses. The court noted that “the pictures and data associated with each license plate number constitute ‘personal information, ’ …. The images of the vehicle, its license plate, and the vehicle’s immediate surroundings, along with the GPS location, time, and date when the image was captured ‘afford a basis for inferring personal characteristics, such as … things done by or to’ the individual who owns the vehicle, as well as a basis for inferring the presence of the individual who owns the vehicle in a certain location at a certain time. ”
So, applying this rationale to an IP address, a “naked” IP address, like a “naked” license plate number reveals and means nothing. Add to that the ability to link it to a person or a machine linked to a person, and you’re getting closer. Add to that the ability to track that “person” and their activity over time, and you’ve got personal data.
So whether a number is personal data often depends on what you do with it.
Copyright Infringement
When a person uses a P2P network to download (pirate) movies, music or software, typically the only information that can be gleaned from the P2P network is the pirate’s IP address. Recently, the makers of the 2015 Adam Sandler movie, “The Cobbler” pursued movie pirates by suing for copyright infringement and then attempting to idenitify the real human beings behind the IP addresses by compelling the ISP’s to deliver subscriber information.
Now the Cobbler got a rousing 9 percent on Rotten Tomatoes, and if you don’t remember the film, you can be excused. However, a recent California federal appeals Court ruling related to a person alleged to have unlawfully downloaded this movie. According to the case, the movie production company “identified an IP address located in Portland, Oregon, that had downloaded and distributed The Cobbler multiple times without authorization. [The production company] filed suit against the unknown holder of the IP address. ” The court went on to note that “Records subpoenaed from Comcast identified Thomas Gonzales as the subscriber of the internet service associated with the IP address. ”
Further investigation however revealed that Gonzales was a resident of an adult care facility, and that “the internet service was accessible to both residents and visitors at an adult care home. ” The studio’s investigator concluded that “it does not appear that [Gonzales] is a regular occupant of the residence or the likely infringer. ” Gonzales refused to share the names or work schedules of the individuals living and working in the home without a court order. Nevertheless, the studio continued to prosecute its copyright infringement case (and a claim of contributory infringment) against Gonzales.
So the court had to decide whether an IP address was enough to establish conduct by the owner of that address. Of course, it was not. The court dismissed the infringement case against Gonzales, noting:
“Although copyright owners can often trace infringement of copyrighted material to an IP address, it is not always easy to pinpoint the particular individual or device engaged in the infringement. Internet providers, such as Comcast or AT&T, can go so far as to identify the individual who is registered to a particular IP address (i. e., an account holder) and the physical address associated with the account, but that connection does not mean that the internet subscriber is also the infringer. The reasons are obvious—simply establishing an account does not mean the subscriber is even accessing the internet, and multiple devices can access the internet under the same IP address. Identifying an infringer becomes even more difficult in instances like this one, where numerous people live in and visit a facility that uses the same internet service. While we recognize this obstacle to naming the correct defendant, this complication does not change the plaintiff’s burden to plead factual allegations that create a reasonable inference that the defendant is the infringer. ”
The only connection between Gonzales and the infringement was that he was the registered internet subscriber and that he was sent infringement notices.
So, does this mean that an IP address is NOT linked with a specific person’s activities and therefore is NOT personal data?
Context, Context, Context
What’s missing in each of these cases is context. An IP address can be personal data if you want to track what a specific person is doing and you have the ability to do so and you have reasonable access to the data necessary to make that happen. If you are collecting IP information to see what porn sites employee John Smythe is going to—then it’s personal data. If you are doing load balancing or general traffic analysis, then no.
IP logging for security purposes has characteristics of both. For the most part, the logs are used to get a general picture of the security posture of a company. They show trends and general information. Even the “specific” information does not generally identify a specific individual except by IP address. We may know that an IP address has been identified as the source of a particular attack, and we may—with other information—suspect that that IP address is associated with a threat actor in Belarus. That doesn’t yet make it personal data. If we then tie that information to a hacker group—say, Not So Fancy Bear—we are getting closer. Tie it to a person, it’s personal data.
But we’re still not done. Personal data can still be collected provided that there is a “lawful basis” for such collection (and the collection, use and analysis is limited to the lawful purpose, and that the data is only kept for the time necessary for that use, and blah blah blah …) Securing a network or device is certainly a lawful basis, and IP information collection and processing is necessary for that purpose.
But the devil is in the details. If you are overcollecting, overstoring or even overanalyzing the data, you may run afoul of GDPR. Best advice is to get good advice.
— Mark Rasch
IMPORTANT: I was IP grabbed! - General Security - Bleeping Computer

IMPORTANT: I was IP grabbed! – General Security – Bleeping Computer

#1
Jimag
Members
1 posts
OFFLINE
Local time:09:58 PM
Posted 04 January 2017 – 01:13 AM
Recently I mistakenly thought a link was safe and decided to click on it, apparently it was an IP grabber. My simple question is, if someone has my IP address can they access passwords or see private emails or even be able to take bank details? I just need a basic answer such as yes or no or why they can or cannot gain my private information. Please reply soon as possible!
Edited by Jimag, 04 January 2017 – 01:14 AM.
Back to top
BC AdBot (Login to Remove)
Register to remove ads
#2
TarjaTaneli
20 posts
Local time:07:58 AM
Posted 04 January 2017 – 06:17 AM
No. They would need to hack you or infect you with malware for that, the person who got your ip is not an elite hacker most% of changes are… so you don’t need to worry regarding that.
But they can ddos you.
#3
quietman7
Bleepin’ Gumshoe
Global Moderator
58, 763 posts
Gender:Male
Location:Virginia, USA
Local time:01:58 AM
Posted 04 January 2017 – 06:53 AM
If someone knows my IP address, can they hack my computer? pending on how your computer is connected to the Internet and the type of security in place, your computer may vulnerable for hack. In reality, chances of your computer being hacked from your known IP address is very it possible to hack an IP address? In short, probably not. IP addresses are technically not able to be hacked. They’re fundamental to routing data on the internet, and as such an attempt to hack an IP address would break the hackers connection to whatever he was trying to can people tell from my IP address?.. people believe that with an IP address, its possible to find out all sorts of information about the person at that connected computer. Thats simply not the case. Exactly how much it does expose about you specifically depends on your ISP and how their (and your) network is configured. The very short answer? Not muchRelated discussion someone hack me if they know my ip address?.. Windows Insider MVP 2017-2020Microsoft MVP Reconnect 2016Microsoft MVP Consumer Security 2007-2015 Member of UNITE, Unified Network of Instructors and Trusted EliminatorsIf I have been helpful & you’d like to consider a donation, click
#4
BustedFlush
52 posts
Posted 06 January 2017 – 12:51 PM
Secure your router, check the settings and sys log to see if have been altered and set a password for it.
#5
shadow_647
Posted 06 January 2017 – 12:58 PM
Min you log on the net and go to your first web page your connection might pass threw & connect to like 20+ different computers and all of em have your ip, no one cares about that topic.
And the min you go to any internet anything they have your ip if they want it, knowing someones ip is like whatever.
#6
Posted 07 January 2017 – 06:45 PM
I have a similar question here.
Say someone gets your dynamic IP, almost immediately after giving it, you pull the power cord, disconnect from the net and reset your router. You are then given a new Dynamic IP, so can the person then do anything untoward with what is just at that point, an out of date IP?
#7
Posted 08 January 2017 – 03:51 AM
Doubt it, unless they have other ways to track you like some spyware installed on your computer phoning home or something, and all you have to do is power cycle the router for a new ip if you have a dynamic IP.
If your directly connected to the new like using a 56k modem or other modems and log on to the net from windows when you just log off/on and you have a new IP.
If your at a free internet wifi place and can’t control the logon or router then you can’t change your ip, unless of cores you use something like the TOR network or a proxy or VPN.
Depends who your dealing with too, if its just joe noobzor hacker then whatever just change ips and who cares to be 100% safe, if your dealing with one of the 14 eyes meaning one of the big cyber command internet warfare centers then it all most doesn’t mater what you do theirs nowhere to hide unless your a total pro/ghost on the net.
Same gos if your dealing with a scary botnet with millions of computers.
I know i got hacked hard once and that scared me.
I know as well in the after math once i was back up and running some weeks later seeing as all my computer died in the first attack i had a botnet on my case or something for a time and would get DDOS like 3~4 times a day for like 12 weeks, don’t know how buddy could keep finding me but it turned me in to a tinfoil hat when it comes to privacy & computer security.
#8
Posted 08 January 2017 – 04:01 AM
Thanks Shadow, interesting stuff.
#9
Posted 08 January 2017 – 04:35 AM
I could go on if you want
Its all i researched for like 6 years after i got hacked hard, i lived for years only off of ports 53, 80, 443.
Everything besides that was blocked on a firewall level and only used a web browser to touch the net and that’s all i would let connect to the net with no java script no flash player no html5.
I still don’t use flash and i don’t like java script and only use if it needed.
Atm i have 4 firewalls back to back on my setup and im thinking of adding in more lairs of deference to my network setup.
Before that i mostly just researched pc hardware.
Kind of sucks in a way cus once i started on the computer security topic i stopped luring about pc hardware and when it comes to the new stuff i don’t know much anymore and my level of understanding is far from up to date and i do fix other peoples computer for cash but mostly i just do windows reinstalls on old computers, backup data before a hdd purge or whatever maybe do a basic home or small business network setup that kind of thing.
Ps if you like to know more about this topic defcon conferences are really good to watch.
Back to top

Frequently Asked Questions about are ip grabbers illegal

Is collecting IP address legal?

IP addresses are what make the internet work, and without collecting them and using them, there ain’t no internet. So, irrespective of whether they are “personal data,” it’s clear that some collection, use and analysis of IP addresses is both permitted and necessary.Sep 6, 2018

What is the punishment for IP grabbing?

It is a violation of the Federal Computer Fraud and Abuse Act, which can be punishable with anywhere from 10 years to life in jail.May 25, 2017

Are IP grabbers real?

In short, probably not. IP addresses are technically not able to be hacked. They’re fundamental to routing data on the internet, and as such an attempt to hack an IP address would break the hackers connection to whatever he was trying to access.Jan 4, 2017

Leave a Reply

Your email address will not be published. Required fields are marked *