I discovered a nice beginner's tutorial that explains how you can trace people that try to break into your computer system. It covers lots of explanations to questions like "How do these people find their victims" and "What doe the terms TCP/UDP actually mean".
It explains the netstat command which shows all connections to your computer and how to find out which connections may be malicious or dangerous and which are not. After that the tracert command is explained which you can use to trace connections. Finally it gives information on dns, how to lookup an ip and get the host of the connection.
It's a useful tutorial that everyone who has none or only rudimentary knowledge about the discussed topics should read through to get a basic understanding. It does not explain proxies which most hackers nowadays use. A tracert would lead to the proxy but not to the IP address of the hacker.
Here are the most important steps that you need to undertake to trace hackers or other attackers:
Steps that you can undertake from here are to try and contact the abuse department if it is an IP or server, for instance by trying the email abuse@hostname.Advertisement
Advertising revenue is falling fast across the Internet, and independently-run sites like Ghacks are hit hardest by it. The advertising model in its current form is coming to an end, and we have to find other ways to continue operating this site.
We are committed to keeping our content free and independent, which means no paywalls, no sponsored posts, no annoying ad formats or subscription fees.
If you like our content, and would like to help, please consider making a contribution:
Ghacks is a technology news blog that was founded in 2005 by Martin Brinkmann. It has since then become one of the most popular tech news sites on the Internet with five authors and regular contributions from freelance writers.