Tracing a Computer to an IP Address

5 pts.
Tags:
IP address
Dear Experts: Someone at my company is using their work computer to anonymously post blog comments from a ghost web-based (free) e-mail address to an another outside website.  I heard that the hosts of that website brought this to my company's attention because they were able to determine that the comment(s) came from one of my company's IP addresses (we have ten addresses). My question is this: If the website hosts provided the IP address to my company (which, I have no idea if they have or not), could the company then trace the comments back to the specific computer it came from?  Or, are there too many variables involved to make a definite determination? Thanks.

Software/Hardware used:
Internet Explorer

Answer Wiki

Thanks. We'll let you know when a new response is added.

It all depends on how much logging your company is doing on the network.

Odds are the public IP address that is captured by the blog host would be the router’s public IP. All users network traffic probably comes from this IP address. For the company to track this they’d need to track all network traffic through the router as well as what computers are issued which internal IP address, as well as what user was logged onto that computer at that time.

It is possible to track, if everything was setup in advance to make it happen.

___________________-

It is possible.

Discuss This Question: 2  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Kevin Beaver
    You really need to have logging and monitoring systems setup in advance to be able to respond to this type of situation. This might be a good time to consider a Web content filtering product/service from Webroot, Barracuda, St. Bernard, etc.
    17,625 pointsBadges:
    report
  • Ledlincoln
    Your corporate firewall may be logging this traffic, but you would need to know the time it occurs, and you would have to delve into it before the logs are overwritten.
    1,620 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following