RE: Voyagerfan
I'll look into brute force attacks; thanks. I have used IPtracker .org and ARIN. Today I used a traceroute site and it's helping confirm my suspicions of who it is. I'm confident of who it is. I'm sure they're hacking me. I'm sure that many of those Mass & more foreign IPs are them. I just need the right proof.
RE: Beers
It does sound like paranoia because I'm leaving out a lot and when I do mention it a lot of it is hard to prove. If it was easier to prove, then I feel that the police would have already started a report. I told them at that time what I had and it wasn't enough.Then we used an app on the android phone that showed what IPs are accessing it. That was the first real sign that my suspicions of their keylogger/hacking is real. Then I learned about Command Prompt Active Connections and started using that to record and report. Then I wanted to find a way to disrupt their communication with my computer and found the firewall. That is where I also saw the multicast IPs will attempt to log on after I type something (If I gave more detail this would make more sense, too). After having my blocking sessions on PeerBlock I will see continued "visits" from the same suspected people. Now, I found a traceroute site. I don't assume to be right about all the suspicious IPs but I am finding that, as more time goes by, that they are definitely on my computer. The technical analysis is that this has been slow going but as soon as I decided to focus on their hacking and trying to change that and not their insults and veiled threat, I have gotten to the point where I would like to provide the proper IP Abuse report. Ok, so I left out a lot because I must, but I hope that helps with the back story? Because I know that I've already experiencing a firewall dropping, so-to-speak, from tech people who do not want to believe that I'm being hacked because I do not have sufficient details up front it has made it difficult finding the right information in a quicker manner. My determination on fighting their hacking is why I've gotten this far, it hasn't been from answers to my suspicions directly. So far I have used the CPAC, PeerBlock, and reporting the IP abuse, whereas before I was afraid of their threats and just going to the police. I'm certain they need a tech person's analysis of our computer system for more grounds to start a police report. They're going to keep at it until I find a way to stop them. I would like for this to end, for them to move on, and to have my computers back.
I'm glad that you provided me the information in your first response. If you can.. how do I find that? Where do I look?
Thanks for the help. And the patience? I'm not here because I know these things, I'm here because I don't. I would really like to provide the right info for the IP Abuse reports. And if I can add anything that you might think would help, that would be great. Or a way to find out how they're hacking. That would be great too. One good thing to come out of this lengthy drama is that I know how to see if someone's accessing my computer. Now, if I can find out to file the perfect IP abuse report then my future years on the computer will be that much more enjoyable.
Thanks again everyone~