What Can people Tell from My IP Address?

Q: Can They Hack Me Using My IP?

What Can Someone Do With Your IP Address?
How you view your email headers will depend on the email program you use. You can publish that number. My computer read out that another computer has been sharing the same IP address as I am! I was playing a virtual game and a guy from there threatened me that he got my ip adress. Want To Stay Secure?

Create an account or sign in to comment

Seven Scary Things Hackers Can Do to Your Computer

That's how you'd feel if a hacker managed to gain access to your home computer. Yes, it may seem that hackers primarily attack large companies, but the truth is that they can also target your computer just as easily. Of course, they can't do anything until they get "inside" your computer, but there are plenty of ways they can make that happen.

One way hackers have attacked computers in the past is through a program call "Sub7" or SubSeven. But for that to happen, Sub7 needs to get into your computer Sub7 can work its way into your computer through an email, or the program can be "delivered" to you if you use the Internet Relay Chat IRC protocol. You might think that a hacker just gets lucky and happens to target a victim who's in the wrong place at the wrong time, but that's not the case. Hackers rely on sophisticated hardware and software to help them scan thousands of computers at a time.

That's one way they can find out whether or not you have the Sub7 program on your computer. One of the tools a hacker uses sends out packets of data to probe computers and find out if there are any vulnerable ports available that are ripe for exploitation.

All computers have ports that are open when they're on the Internet. The ports accept different types of data from different sources—think of them as different doors in a house, or boating docks in a busy seaside port. The nasty Sub7 program, for example, is known to use port , as well as others. If port happens to be running that day, Sub7 will open that port. The port probe then alerts the hacker that, indeed, port is open for business The hacker knows that with a few keystrokes, they can take control of your computer.

Can you imagine a stranger—or even worse, a thief—sitting in front of your computer, going through your files and doing whatever they want? That's what happens once a hacker has used Sub7 to take control of your computer. It's as if they're sitting in your cozy computer chair, using your computer and seeing all of your data and files on your computer monitor. If you are connected to the internet and running multiple programs, your device could have ports open that might allow hackers to access your connection and learn your IP.

If a hacker gains access to your PC remotely, such as through the use of malware or a trojan, they could be able to access all of the files on your computer, along with your internet history.

The files you have could be accessed and manipulated and your internet passwords, financial information, and social media could all be at risk. To keep yourself safe online, it is recommended that you hide your true IP address.

This can be done through setting up a virtual private network, or VPN. Learn how to instantly unblock your favorite sites like Facebook, Twitter, and YouTube when you are at school or work. Many questions arise concerning IP addresses — How do they work? How are they assigned? What is an IP address made of? VPNs can be used to unblock websites, protect your private data, secure your Wi-Fi connection, and unblock websites at school or work.

Easily get access to YouTube content privately without being traced at school or your job.

The hacker takes over.