In this world everyone has some address having all details about your location in real life.
In the same way, Every internet user have his address in the world of internet. It is named as Internet Protocol address. Shortly named as IP address
When you send/receive emails they are transferred from IP address to IP address
Any data transfer is subjected to IP addresses of sender and receiver.
So this is a simple concept of IP address.
Types of IP address:
1. Static IP address: This IP address is fixed always for a single internet connection. Internet service Providers (ISP) never reveals your static IP address to you.
2. Dynamic IP address: Every time you get connected to internet your Dynamic IP changes.
How to get IP address Just by sending an email:
First of all you need a mail tracking system for tracing the IP of a person sending you an email
www.mailtracking .com has ready set up of IP tracing.
This gives you a free account.
You can connect it with your current email account
When you send email to someone named firstname.lastname@example.org, you simply have to add mailtracking.com to it.
As shown here: email@example.com
Now when Your message is opened by the receiver, you‘ll get email to you .
It describes following things to you
1.IP address of receiver,
2.His approximate geographical location,
3.Time of opening the email
4.His browser details
5.His screen resolution
And many more details as this.
Now every time he opens your message you’ll be notified
So finally by using this site you can simply get IP address of any person whose email address is known.
And good thing is the receiver can’t even notice that we are tracing him.
How hackers hack using IP address:
Hackers use server-client services like MIRC channel you can connect with known IP address.
But this need authentication from the receiver.
So hackers use tools as Trojan.
They enter the destination IP address in Trojan and it tries to connect to you.
And if he get success in connecting he can destroy your PC completely or he plays games with you its all his own choice.
His is how hacking through IP address takes place.
If you have any specific question, or you want more details comment your questions here.
I ‘ll be delighted to answer them.
Article by: Amol Wagh
Latest Technology With Security