0

I use a couple of usenet groups on google groups and post there as well.
There are a lot of real people there who keep posting nonsensical stuff for fun.
But they aren't bots or anything and they don't copy paste,they just say things to other posters.

What happened was this one such user made a post about me with my
IP address,my Location,city,latitude Longitude,what kind of internet I use,and some other info.

There was no point in doing that but he/she simply did it.

Now my question is how did s/he,being an ordinary user get all that information about me.
Am I not anonymous on the web?Is there any danger now?

Edited by theguitarist: n/a

3
Contributors
7
Replies
8
Views
5 Years
Discussion Span
Last Post by theguitarist
1

You are never really anonymous on the web. Hence all the browser proxy servers and vpn services available for people who wish to obfuscate their identity.

All of that information can be obtained from simple analysis of your IP address, which is (as a matter of necessity) passed to the server with every web request. I'd say that person is just messing with you, and it is not really anything to worry about. This type of thing happens all the time, particularly on "hacker" forums and the like.

0

Hey Hearth.Thanks for your reply.
But is it possible for a fellow user to view another one's IP address which you is passed to the server on every request?

0

Hey Hearth.Thanks for your reply.
But is it possible for a fellow user to view another one's IP address which you is passed to the server on every request?

If you talking about the IP address in HTML browsing. It seem to be no way people could view other people ip, unless you are the one own the server which the request is passed thru your server.

People can use anonymous ip to browse via proxy, but some websites had equipped with some sort of proxy detection mechanism to filter out those proxy. Nothing should be worry about your identity being tracked down. But if you afraid your ip was recorded as proxy, here is one link you can check http://www.ip2proxy.com. Or, you can search the proxy detection on web for more sites to visit and confirm.

0

Hey. thanks!
I was wondering how a guy who doesn't own the server got hold of my ip address.

1

No offense chrislim2888, but you aren't 100% correct.

Below is the header information from a post on a Google group. While the specific details are irrelevant, it clearly shows email address, server name, ip address and a variety of other data that could be used to track a users virtual identity. The amount of information a person could glean from this depends on their intent, interest, and technical skill. Given that Google groups operates based on email, and email always contains IP data in the header, there is not much you can do besides looking into an anonymous server host of some sort.

However, the type of information you are talking about theguitarist, requires virtually no skill and only minimal knowledge to obtain and represents little threat to you. Geo-spacial data for example can be obtained from a number of free services once they know the source IP address.

Received: by 10.43.53.72 with SMTP id vp8mr2814576icb.0.1322663078573;
        Wed, 30 Nov 2011 06:24:38 -0800 (PST)
X-BeenThere: backbox-linux@googlegroups.com
Received: by 10.231.11.72 with SMTP id s8ls4042618ibs.3.gmail; Wed, 30 Nov
 2011 06:24:37 -0800 (PST)
Received: by 10.43.48.202 with SMTP id ux10mr2730390icb.6.1322663077799;
        Wed, 30 Nov 2011 06:24:37 -0800 (PST)
Received: by 10.43.48.202 with SMTP id ux10mr2730388icb.6.1322663077780;
        Wed, 30 Nov 2011 06:24:37 -0800 (PST)
Return-Path: <raffaele.fo...@gmail.com>
Received: from mail-iy0-f172.google.com (mail-iy0-f172.google.com [209.85.210.172])
        by gmr-mx.google.com with ESMTPS id ib2si372785icc.4.2011.11.30.06.24.37
        (version=TLSv1/SSLv3 cipher=OTHER);
        Wed, 30 Nov 2011 06:24:37 -0800 (PST)
Received-SPF: pass (google.com: domain of raffaele.fo...@gmail.com designates 209.85.210.172 as permitted sender) client-ip=209.85.210.172;
Authentication-Results: gmr-mx.google.com; spf=pass (google.com: domain of raffaele.fo...@gmail.com designates 209.85.210.172 as permitted sender) smtp.mail=raffaele.fo...@gmail.com; dkim=pass (test mode) header...@gmail.com
Received: by mail-iy0-f172.google.com with SMTP id o4so1022534iae.31
        for <backbox-linux@googlegroups.com>; Wed, 30 Nov 2011 06:24:37 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
        d=gmail.com; s=gamma;
        h=mime-version:in-reply-to:references:from:date:message-id:subject:to
         :content-type;
        bh=dneZ5tVcxG4VbJCP6V7HkByqJrIXsIzn7qlTcJ23ggg=;
        b=PruhVP02LWNj7RKxFnQTX99Qwzh1uKFmrc0fIkf63n8NsjZxj2UI0Omwu7zq+m64eE
         Ym+IgS1/rgDmF6QEj7Rtd/ap94KQ63IyjS4y61S+h+VJpFiQ4jUZbWE7hvN8faRuHlBf
         yun+iaiB7lTnhq19VaoSh5wFQIBv7JSgBbB4g=
Received: by 10.42.76.66 with SMTP id d2mr3105765ick.7.1322663077605; Wed, 30
 Nov 2011 06:24:37 -0800 (PST)
MIME-Version: 1.0
Received: by 10.231.36.129 with HTTP; Wed, 30 Nov 2011 06:24:16 -0800 (PST)
In-Reply-To: <CAGUo6nKrc5Q1+LZHd2-mnhYwa0z-Buk5dvRwvANcEAVad04A3g@mail.gmail.com>
References: <a60d09c3-3e58-428a-ace3-26d2a6d96...@v29g2000yqv.googlegroups.com>
 <CAGUo6nJrmJmPUaP27zTrUTs0djFfvgLuJnNbCTJbyG2RToX...@mail.gmail.com>
 <CA+RahPSSg9eCHhFh8cApD20MdH8Jn=c36AGvCK-Dnvz8Nog...@mail.gmail.com> <CAGUo6nKrc5Q1+LZHd2-mnhYwa0z-Buk5dvRwvANcEAVad04...@mail.gmail.com>
From: Raffaele Forte <raffaele.fo...@gmail.com>
Date: Wed, 30 Nov 2011 15:24:16 +0100
Message-ID: <CA+RahPQpTjGRgvxt__nosk9gg=9w7v+MZ6G=arT06eXgg5F...@mail.gmail.com>
Subject: Re: BackBox Linux Observations on BackBox's future
To: backbox-linux@googlegroups.com
Content-Type: multipart/alternative; boundary=90e6ba3fd25de5f36d04b2f47e25
0

Thanks for pointing out. Yes, if you refer to email tracking, then there are many free sites that allow you to trace route to the origin of sender via email header.

This question has already been answered. Start a new discussion instead.
Have something to contribute to this discussion? Please be thoughtful, detailed and courteous, and be sure to adhere to our posting rules.