SlideShare une entreprise Scribd logo
1  sur  13
Forensic Science Informatics Unit 37    P4
Tracing e-mails BTEOTSSSBAT trace the origin of an e-mail
P4 identify the registrant’s name and address of five IP addresses using the WHOIS database.
Every computer has an IP address (Internet Protocol)
Every computer has an IP address (Internet Protocol) The IP address is a little like a finger print - it can help identify which computer has been used to send an e-mail or browse a web site.
Every computer has an IP address (Internet Protocol) The IP address is a little like a finger print - it can help identify which computer has been used to send an e-mail or browse a web site. The IP address is a ‘dotted quad’ - four numbers separated by a fullstop. For example 88.105.175.194 This can tell us a lot about the computer. The originating country, the ISP and sometimes even the location.
The who.is database enables us to find out information about IP addresses
To find your computer’s IP address, go here: http://www.ip-adress.com/ The to find out more information go here: http://www.whois-search.com/   or here http://whatismyipaddress.com/
To find out where an e-mail has come from we need to know the sender’s IP address. This information is usually contained in an e-mail’s full header.  Most web e-mails hide this but it can be easily uncovered.
Yahoo mail
Block of IP nos The ISP Country of origin

Contenu connexe

En vedette

Health & Safety at crime scene
Health & Safety at crime sceneHealth & Safety at crime scene
Health & Safety at crime sceneSteve Bishop
 
2.6 acids bases and salts
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and saltsSteve Bishop
 
Fractions - the four rules
Fractions - the four rulesFractions - the four rules
Fractions - the four rulesSteve Bishop
 
B1.3 use and abuse of drugs
B1.3 use and abuse of drugsB1.3 use and abuse of drugs
B1.3 use and abuse of drugsSteve Bishop
 
History UNIT 1- Germany 1918-39
History UNIT 1- Germany 1918-39History UNIT 1- Germany 1918-39
History UNIT 1- Germany 1918-39Louisatom
 
AQA GCSE Science: Biology B1 Revision
AQA GCSE Science: Biology B1 RevisionAQA GCSE Science: Biology B1 Revision
AQA GCSE Science: Biology B1 Revisionabcdefghij12345678910
 
Physics Unit P2
Physics Unit P2Physics Unit P2
Physics Unit P2Louisatom
 
Biology revision for B1
Biology revision for B1Biology revision for B1
Biology revision for B1Louisatom
 
AQA GCSE Science C1 notes
AQA GCSE Science C1 notesAQA GCSE Science C1 notes
AQA GCSE Science C1 notesSteve Bishop
 

En vedette (11)

Health & Safety at crime scene
Health & Safety at crime sceneHealth & Safety at crime scene
Health & Safety at crime scene
 
Simplex Algorithm
Simplex AlgorithmSimplex Algorithm
Simplex Algorithm
 
2.6 acids bases and salts
2.6 acids bases and salts2.6 acids bases and salts
2.6 acids bases and salts
 
Fractions - the four rules
Fractions - the four rulesFractions - the four rules
Fractions - the four rules
 
B1.3 use and abuse of drugs
B1.3 use and abuse of drugsB1.3 use and abuse of drugs
B1.3 use and abuse of drugs
 
Radioactivity
RadioactivityRadioactivity
Radioactivity
 
History UNIT 1- Germany 1918-39
History UNIT 1- Germany 1918-39History UNIT 1- Germany 1918-39
History UNIT 1- Germany 1918-39
 
AQA GCSE Science: Biology B1 Revision
AQA GCSE Science: Biology B1 RevisionAQA GCSE Science: Biology B1 Revision
AQA GCSE Science: Biology B1 Revision
 
Physics Unit P2
Physics Unit P2Physics Unit P2
Physics Unit P2
 
Biology revision for B1
Biology revision for B1Biology revision for B1
Biology revision for B1
 
AQA GCSE Science C1 notes
AQA GCSE Science C1 notesAQA GCSE Science C1 notes
AQA GCSE Science C1 notes
 

Similaire à Tracing Emails

What Are IP Addresses and How Do They Work.pdf
What Are IP Addresses and How Do They Work.pdfWhat Are IP Addresses and How Do They Work.pdf
What Are IP Addresses and How Do They Work.pdfEIHEducation
 
What Are IP Addresses and How Do They Work 1.pdf
What Are IP Addresses and How Do They Work 1.pdfWhat Are IP Addresses and How Do They Work 1.pdf
What Are IP Addresses and How Do They Work 1.pdfEIHEducation
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacksApijay Kumar
 
Understanding IP Addresses.pptx
Understanding IP Addresses.pptxUnderstanding IP Addresses.pptx
Understanding IP Addresses.pptxRye Raine
 
What is my IP address by Truly Explorer
What is my IP address by Truly ExplorerWhat is my IP address by Truly Explorer
What is my IP address by Truly ExplorerRohit Bhawani
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingSathishkumar A
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityManishKumarH
 
IP Address
IP AddressIP Address
IP AddressRahul P
 
IPv4 vs IPv6 Know the Difference Between Two IP Versions.pdf
IPv4 vs IPv6  Know the Difference Between Two IP Versions.pdfIPv4 vs IPv6  Know the Difference Between Two IP Versions.pdf
IPv4 vs IPv6 Know the Difference Between Two IP Versions.pdfTemok IT Services
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To InternetMohit Dhankher
 
Domain names and ip addresses
Domain names and ip addressesDomain names and ip addresses
Domain names and ip addresseserinismadness
 
Clase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfClase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfFERNANDOBONILLA43
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)Frank Fang Kuo Yu
 
IP Address
IP AddressIP Address
IP Addresstishko18
 
How to know my ip address with iplogger.org
How to know my ip address with iplogger.orgHow to know my ip address with iplogger.org
How to know my ip address with iplogger.orgiploggers
 
Intro tcpip-part1
Intro tcpip-part1Intro tcpip-part1
Intro tcpip-part1Kit Ramsey
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routersAdrian Suarez
 

Similaire à Tracing Emails (20)

Ip address
Ip addressIp address
Ip address
 
What Are IP Addresses and How Do They Work.pdf
What Are IP Addresses and How Do They Work.pdfWhat Are IP Addresses and How Do They Work.pdf
What Are IP Addresses and How Do They Work.pdf
 
What Are IP Addresses and How Do They Work 1.pdf
What Are IP Addresses and How Do They Work 1.pdfWhat Are IP Addresses and How Do They Work 1.pdf
What Are IP Addresses and How Do They Work 1.pdf
 
Ip spoofing attacks
Ip spoofing attacksIp spoofing attacks
Ip spoofing attacks
 
Understanding IP Addresses.pptx
Understanding IP Addresses.pptxUnderstanding IP Addresses.pptx
Understanding IP Addresses.pptx
 
What is my IP address by Truly Explorer
What is my IP address by Truly ExplorerWhat is my IP address by Truly Explorer
What is my IP address by Truly Explorer
 
Footprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hackingFootprinting-and-the-basics-of-hacking
Footprinting-and-the-basics-of-hacking
 
Networking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber SecurityNetworking:) Based on Ethical Hacking And Cyber Security
Networking:) Based on Ethical Hacking And Cyber Security
 
Week13
Week13Week13
Week13
 
IP Address
IP AddressIP Address
IP Address
 
IPv4 vs IPv6 Know the Difference Between Two IP Versions.pdf
IPv4 vs IPv6  Know the Difference Between Two IP Versions.pdfIPv4 vs IPv6  Know the Difference Between Two IP Versions.pdf
IPv4 vs IPv6 Know the Difference Between Two IP Versions.pdf
 
Introduction To Internet
Introduction To InternetIntroduction To Internet
Introduction To Internet
 
Domain names and ip addresses
Domain names and ip addressesDomain names and ip addresses
Domain names and ip addresses
 
Clase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdfClase 1 Direccionamiento IPv4.pdf
Clase 1 Direccionamiento IPv4.pdf
 
如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)如何做報告 (How to make a presentation?)
如何做報告 (How to make a presentation?)
 
IP Address
IP AddressIP Address
IP Address
 
How to know my ip address with iplogger.org
How to know my ip address with iplogger.orgHow to know my ip address with iplogger.org
How to know my ip address with iplogger.org
 
Fs Ch 19
Fs Ch 19Fs Ch 19
Fs Ch 19
 
Intro tcpip-part1
Intro tcpip-part1Intro tcpip-part1
Intro tcpip-part1
 
Ip, subnet, gateway and routers
Ip, subnet, gateway and routersIp, subnet, gateway and routers
Ip, subnet, gateway and routers
 

Plus de Steve Bishop

Cognitive load theory
Cognitive load theoryCognitive load theory
Cognitive load theorySteve Bishop
 
Blockbusters #soccd
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccdSteve Bishop
 
Blockbusters template
Blockbusters templateBlockbusters template
Blockbusters templateSteve Bishop
 
Blockbusters #socfam
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfamSteve Bishop
 
C2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsSteve Bishop
 
C2.3.3 quantitative chemistry
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistrySteve Bishop
 
C2.2 how structure influences
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influencesSteve Bishop
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bondingSteve Bishop
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bondingSteve Bishop
 
B2.7 meiosis and mitosis
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosisSteve Bishop
 
B2.7 genetic disorders
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disordersSteve Bishop
 
B2.7 cell division and inheritance
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritanceSteve Bishop
 
B2.5 proteins enzymes
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymesSteve Bishop
 
Aerobic & anaerobic respiration
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respirationSteve Bishop
 
B1.4 pollution detectors
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectorsSteve Bishop
 
B1.4 plants adaptation
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptationSteve Bishop
 
B1.4 animals adaptations
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptationsSteve Bishop
 

Plus de Steve Bishop (20)

Cognitive load theory
Cognitive load theoryCognitive load theory
Cognitive load theory
 
Blockbusters #soccd
Blockbusters #soccdBlockbusters #soccd
Blockbusters #soccd
 
Blockbusters template
Blockbusters templateBlockbusters template
Blockbusters template
 
Blockbusters #socfam
Blockbusters #socfamBlockbusters #socfam
Blockbusters #socfam
 
C2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactionsC2.5 exothermic and endothermic reactions
C2.5 exothermic and endothermic reactions
 
C2.3.3 quantitative chemistry
C2.3.3 quantitative chemistryC2.3.3 quantitative chemistry
C2.3.3 quantitative chemistry
 
C2.2 how structure influences
C2.2 how structure influencesC2.2 how structure influences
C2.2 how structure influences
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
 
C2.1 structure and bonding
C2.1 structure and bondingC2.1 structure and bonding
C2.1 structure and bonding
 
B2.8 speciation
B2.8 speciationB2.8 speciation
B2.8 speciation
 
B2.7 meiosis and mitosis
B2.7 meiosis and mitosisB2.7 meiosis and mitosis
B2.7 meiosis and mitosis
 
B2.7 genetic disorders
B2.7 genetic disordersB2.7 genetic disorders
B2.7 genetic disorders
 
B2.7 cell division and inheritance
B2.7 cell division and inheritanceB2.7 cell division and inheritance
B2.7 cell division and inheritance
 
B2.5 proteins enzymes
B2.5 proteins enzymesB2.5 proteins enzymes
B2.5 proteins enzymes
 
Aerobic & anaerobic respiration
Aerobic & anaerobic respirationAerobic & anaerobic respiration
Aerobic & anaerobic respiration
 
B1.4 red v grey
B1.4 red v greyB1.4 red v grey
B1.4 red v grey
 
B1.4 pollution detectors
B1.4 pollution detectorsB1.4 pollution detectors
B1.4 pollution detectors
 
B1.4 plants adaptation
B1.4 plants adaptationB1.4 plants adaptation
B1.4 plants adaptation
 
B1.4 animals adaptations
B1.4 animals adaptationsB1.4 animals adaptations
B1.4 animals adaptations
 
Stars
StarsStars
Stars
 

Dernier

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 

Dernier (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Tracing Emails

  • 2. Tracing e-mails BTEOTSSSBAT trace the origin of an e-mail
  • 3. P4 identify the registrant’s name and address of five IP addresses using the WHOIS database.
  • 4. Every computer has an IP address (Internet Protocol)
  • 5. Every computer has an IP address (Internet Protocol) The IP address is a little like a finger print - it can help identify which computer has been used to send an e-mail or browse a web site.
  • 6. Every computer has an IP address (Internet Protocol) The IP address is a little like a finger print - it can help identify which computer has been used to send an e-mail or browse a web site. The IP address is a ‘dotted quad’ - four numbers separated by a fullstop. For example 88.105.175.194 This can tell us a lot about the computer. The originating country, the ISP and sometimes even the location.
  • 7. The who.is database enables us to find out information about IP addresses
  • 8. To find your computer’s IP address, go here: http://www.ip-adress.com/ The to find out more information go here: http://www.whois-search.com/ or here http://whatismyipaddress.com/
  • 9. To find out where an e-mail has come from we need to know the sender’s IP address. This information is usually contained in an e-mail’s full header. Most web e-mails hide this but it can be easily uncovered.
  • 11.
  • 12.
  • 13. Block of IP nos The ISP Country of origin