Reporting IP Abuse

I would say if they are hacking you personally, then can only assume they want your IP address. Is this a business or personal residence? What firewall are you running?
 
You'd need to give them your external IP and port that the session was traversing. You should see end to end something like 'remotehost:sourceport to yourwanIP:destinationport'
 
I would say if they are hacking you personally, then can only assume they want your IP address. Is this a business or personal residence? What firewall are you running?


Hi JohnB35,

I like the way you think. ;-) It is personal between us. I can only say that their motives have appeared to changed over time and now that I've been trying to report them I'd say that they're continued presence is now mostly intimidation and stalking. Very determined individuals. And it's our home computer system. I thought months ago that the router was hacked (in addition to a keylogger on the laptop) because it didn't matter what computer was used but we changed router. I bought a new laptop, we got it ready on a different computer system, and yet when we brought it home, they were on there too.

We are using Comodo Anti-Virus and just installed PeerBlock firewall.
 
Last edited:
You'd need to give them your external IP and port that the session was traversing. You should see end to end something like 'remotehost:sourceport to yourwanIP:destinationport'

Hey Beers,

Thanks so much for the reply. Great! So how do I find that? Again, I've been using CPAC, PeerBlock, and Comodo Anti-Virus. I've seen the TCP, source IP, Destination IP on CPAC and PeerBlock. Sorry if this is "101" for you. :) Never really had any reason to see who's on my computer before.

I'd attached a screenshot of the PeerBlock firewall (without the local). Anyone use PeerBlock or Comodo and can tell me where exactly I'd see the end-to-end?

Thanks. Really. :)
 

Attachments

  • screenshot without source IP.png
    screenshot without source IP.png
    177.2 KB · Views: 4
Oh........ does anyone know if there's a virus that can sit in your email (Outlook, gmail, etc) that gives the hacker the ability to sign on no matter where you are or how often you change your password? Or if it can give the hacker remote access whenever/wherever you log on (like a jack in the box)?
 
I bought a new laptop, we got it ready on a different computer system, and yet when we brought it home, they were on there too.

I find this hard to believe. How do you know they were on it?
For example, one "remote address" tried to access protocols "SDFSSvc.exe

That file belongs to spybot search and destroy. Are you running that software? Get rid of it and use Malwarebytes.

Or if it can give the hacker remote access whenever/wherever you log on (like a jack in the box)?

Any remote login software can do this such as teamviewer, gotoassist, logmein.

Ever thought of unplugging your internet modem and then plugging it back in to see if you get a different IP address?

And instead of trying to report them why not go to the authorities?
 
I find this hard to believe. How do you know they were on it?

Same foreign IPs. Same issues. My problem is that it sounds like a bunch of rambling when I try to go into detail about my situation and what I'm looking for and need gets lost.



That file belongs to spybot search and destroy. Are you running that software? Get rid of it and use Malwarebytes.

I'll let my boyfriend know that it belongs to search and destroy. I think we have seen an error code about it. It might be running in the back ground.



Any remote login software can do this such as teamviewer, gotoassist, logmein.

They can do use that software by targeting the library? I've gone that far in order to get some space. The PeerBlock, etc is at home.



Ever thought of unplugging your internet modem and then plugging it back in to see if you get a different IP address?


I believe we have but I'll mention it again just in case.



And instead of trying to report them why not go to the authorities?

I have gone to the police before knowing the IP addresses and they didn't see enough. I saw things that suggested they know things only by having full access or keyloggers, etc. I messaged them recently that I have a little more proof but my thoughts are unless I get a tech person to find more proof of their hacking they might look at it the same way as before: ok, and? It feels a bit like going in circles. My states cyber crimes dept is busy and they have low priority about my situation. I was hoping to find someone to evaluate my computer and then I can forward that proof to the police. If I report their IPs and those companies file it, then it should be on record. But if I can't give them what they want (my original post) then I might not get that far.


Beers said:
You'd need to give them your external IP and port that the session was traversing. You should see end to end something like 'remotehost:sourceport to yourwanIP:destinationport'


Where do I find this? I'm at the library now and would like to jot it down before I leave.
 
Sorry, did you need me to repost anything? When I was at the library and I had a couple of suspected infected emails up, I could tell in my usual hard to prove way, that they may be somehow lurking in it. I'm sure you realize how hard it is to be completely detached from people or areas that may be monitored by them. If you would like more details to my situation, since you're, curious I can tell you what I know in a message off the board. I can do that here right? And the reason why I'll do it there is because it is long and tedious and I've had to explain this multiple times. If you're interested in helping me figure out possibly how the hackers are getting into my computer, who I can go to in order to have my computer looked at, or how I can find out how to properly report IP abuse, I would be happy to have that.

But all I need is the answer to Beers. If you're not happy with me being on the forum, I'll be happy to delete the account.
 
I'm a moderator, along with everyone else that has posted in this thread. I can see messages you delete. I was just curious as to why you deleted them.

I'm curious to know what makes you think you're being hacked. All the destination IP's I see in your above screenshot come from the same ISP based out of Massachusetts.

Oh........ does anyone know if there's a virus that can sit in your email (Outlook, gmail, etc) that gives the hacker the ability to sign on no matter where you are or how often you change your password? Or if it can give the hacker remote access whenever/wherever you log on (like a jack in the box)?
Unless you have a keylogger installed on your machine that is reporting back to them, the only way they would have is brute force attacks.
 
Last edited:
RE: Voyagerfan

I'll look into brute force attacks; thanks. I have used IPtracker .org and ARIN. Today I used a traceroute site and it's helping confirm my suspicions of who it is. I'm confident of who it is. I'm sure they're hacking me. I'm sure that many of those Mass & more foreign IPs are them. I just need the right proof. :)

RE: Beers

It does sound like paranoia because I'm leaving out a lot and when I do mention it a lot of it is hard to prove. If it was easier to prove, then I feel that the police would have already started a report. I told them at that time what I had and it wasn't enough.Then we used an app on the android phone that showed what IPs are accessing it. That was the first real sign that my suspicions of their keylogger/hacking is real. Then I learned about Command Prompt Active Connections and started using that to record and report. Then I wanted to find a way to disrupt their communication with my computer and found the firewall. That is where I also saw the multicast IPs will attempt to log on after I type something (If I gave more detail this would make more sense, too). After having my blocking sessions on PeerBlock I will see continued "visits" from the same suspected people. Now, I found a traceroute site. I don't assume to be right about all the suspicious IPs but I am finding that, as more time goes by, that they are definitely on my computer. The technical analysis is that this has been slow going but as soon as I decided to focus on their hacking and trying to change that and not their insults and veiled threat, I have gotten to the point where I would like to provide the proper IP Abuse report. Ok, so I left out a lot because I must, but I hope that helps with the back story? Because I know that I've already experiencing a firewall dropping, so-to-speak, from tech people who do not want to believe that I'm being hacked because I do not have sufficient details up front it has made it difficult finding the right information in a quicker manner. My determination on fighting their hacking is why I've gotten this far, it hasn't been from answers to my suspicions directly. So far I have used the CPAC, PeerBlock, and reporting the IP abuse, whereas before I was afraid of their threats and just going to the police. I'm certain they need a tech person's analysis of our computer system for more grounds to start a police report. They're going to keep at it until I find a way to stop them. I would like for this to end, for them to move on, and to have my computers back.

I'm glad that you provided me the information in your first response. If you can.. how do I find that? Where do I look?

Thanks for the help. And the patience? I'm not here because I know these things, I'm here because I don't. I would really like to provide the right info for the IP Abuse reports. And if I can add anything that you might think would help, that would be great. Or a way to find out how they're hacking. That would be great too. One good thing to come out of this lengthy drama is that I know how to see if someone's accessing my computer. Now, if I can find out to file the perfect IP abuse report then my future years on the computer will be that much more enjoyable.

Thanks again everyone~
 
Last edited:
I'll look into brute force attacks; thanks. I have used IPtracker .org and ARIN. Today I used a traceroute site and it's helping confirm my suspicions of who it is. I'm confident of who it is. I'm sure they're hacking me. I'm sure that many of those Mass & more foreign IPs are them. I just need the right proof. :)
What are you tracing? Traceroute is just telling you what hops a connection takes from the source to the destination. You have not stated any proof whatsoever that you are actively being hacked by anyone or anything.

It does sound like paranoia because I'm leaving out a lot and when I do mention it a lot of it is hard to prove.
You haven't submitted proof of anything.

You realize that plenty of services go out and connect to the internet right? So you could be interpreting normal internet traffic into paranoia about being hacked.
 
What are you tracing? Traceroute is just telling you what hops a connection takes from the source to the destination. You have not stated any proof whatsoever that you are actively being hacked by anyone or anything.


You haven't submitted proof of anything.

You realize that plenty of services go out and connect to the internet right? So you could be interpreting normal internet traffic into paranoia about being hacked.


Thanks for taking the time to read my message! Let's delete the thread.
 
Have you tried Wireshark or something and sniffing your own network to see if any other machine that you don't recognise is flashing packets about your LAN?

Might be a place to start.
 
Back
Top