Tracing IP Address Behind VPN/Proxy Servers
Meghashyam Y[1], Pappu Saicharan[2] , P Rajeshwari[3] , R Dhanush[4] Students, Dayananda Sagar Academy of Technology & Management, Bengaluru, India
D.r Rahmi Amardeep[5], Assistant Professor , Dayananda Sagar Academy of Tech & MGMT, Bengaluru, India
shyamsj001@gmail.com[1] , saicharanpappu208@gmail.com[2] , podamalarajeswari07@gmail.com [3] , dhanushramesh6@gmail.com[4] , dr.rashmi-is@dsatm.edu.in[5]
ABSTRACT
To strengthen their anonymity, cybercriminals frequently utilize pseudonymous IP addresses to conceal genuine IP addresses. To address this, we intend to develop a tool that can determine if an IP address is genuine or a proxy or VPN IP. The solution should also be able to track the VPN user's actual IP address and offer location data. It is more difficult for authorities to identify and bring to justice offenders when hackers utilize a range of tools and tactics to conceal their digital tracks. One of the better ways is through a "proxy" or VPN server, which effectively serves as a layer between the target computer and the target computer and allows access to the target computer without going directly through it.
One of the better methods is to connect to the target's computer via a "proxy" or VPN server rather than directly, which effectively creates a layer between the target computer and the target computer. It only observes requests coming from the target computer's name server or VPN server. This solution's primary goal is to discover the genuine IP address of cybercriminals who are hiding it behind the IP address of a server or VPN (if utilized). a system that can use an IP address as a login and distinguish between a VPN service provider and a "proxy". This information must be given if a "proxy" or VPN service provider is being utilized. The remedy can also identify the actual IP address that is. Additionally, it makes use of (optional) sophisticated heuristic methods that can aid in the discovery of new risks (like malware).
Keywords
VPN, Honey Pots, Canary Tokens.