WELCOME

for any suggestion's please mail to this id:

nanduriraja537@gmail.com,raja.mic539@gmail.com

Sunday, November 21, 2010

How to detect Anonymo...



Proxies are easiest ways to hide your Identity, However Proxy's are mostly used by fraudsters, scammers and hackers to hide their Identity while committing a cyber crimes and therefore in this article I will tell you how to detect those Anonymous IP address

Following are some of the examples where fraudsters use the proxies to hide their actual IP.

Credit Card Frauds

Anonymous IP's are used for credit card frauds, i.e. cashing out the stolen credit card numbers, When ever a transaction is done from a credit card, the IP address is captured by the Credit card providers, So if the hacker or Fraudster is cashing out from his original location, he can easily be traced.
So to avoid it the Hacker or Fraudster would use a proxy so he can hide his original location and the spoofed IP will be captured by the Credit card providers


Bypassing Restriction

In most offices or schools websites like Facebook, orkut etc and other websites are blocked so people use proxy to bypass the restrictions


Accessing hacked accounts

In Email service provides like gmail you can find the real IP Address from which you accessed the accounts previously, Say if a hacker has hacked some one's Gmail account and he is monitoring the hacked account, If he will login without a proxy so his real IP will be captured and therefore he will be traced

Proxy Detection Servies

Now a days proxy detection has became a critical component, There some services like Fraud labs and Free Proxy Detector to detect the usage of proxy or spoofed IP from users participating online

How Proxy Detection works?

Proxy detection services mostly rely on IP addresses to determine whether or not the IP is a proxy, they keep a record of the IP's which most proxy's use as a Spoofed IP and therefore by comparing the IP with the list of flagged IP's they could find that the IP is a proxy or not, If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy.

Hope you liked the post ! Please Pass the comments

No comments:

Post a Comment

LinkWithin

Related Posts Plugin for WordPress, Blogger...