How To Identify IP Address of Internet Trolls
We have an 80%-90% success rate for positively identifying IP addresses for anonymous internet users and internet trolls. In most cases we can gather much more evidence, leading to the positive identification of the individual behind unlawful or harassing internet activities.
As long as your antagonist is anonymous, it is difficult to escape the 24/7 torment that comes through anonymous criminal and civil wrong doing via the internet.
KNOWLEDGE IS POWER:
Our cyber crimes investigators can positively identify IP address and capture other user data about the trolls who harass you, or interfere with your business. All methods are legal, admissible in court, and very compelling. Once identified, many trolls will often delete the offending material for fear of criminal or civil court action. If they persist, our work and evidence gathered can help you seek injunctive relief through litigation or criminal charges.
Identify IP Address and Other User Data
Digital evidence comes in many forms. The evidence can be encrypted, protected or otherwise hidden. We identify IP address and other user data from fake review authors, cyber stalkers and corporate leaks via FaceBook, Twitter, WhatsApp, SnapChat, and so on.
Identifying Other Anonymous Users:
-Text Message & Phone Calls
-PO Boxes (physical)
-Hushmail & ProtonMail
-Defeating Proxy IP Servers (That’s right, we can ID trolls even when they are using Virtual Private Networks)
Positively Identify Internet Trolls
Rexxfield’s cyber tracing team of investigators and partner attorneys have a demonstrated track record of tracing and positively identifying anonymous trolls behind malicious Internet libel. We can help you identify your antagonists, often without court action. Contact us for free consultation…..
Rule in/rule out
“Rule in/rule out“ only applies when you have a suspect. For example, if we capture an IP address for the anonymous antagonist, and it is the same as the suspect, then we have “ruled in” the identity of the offender. If on the other hand, the message sent to the real person is a completely different device, IP address, etc., they can often be a ruled out, meaning the antagonist is someone other than the person who was suspected.
Identify IP Address Process In and Out of Court
The suggestion of cart blanche and absolute protection for all anonymous speech (disguised as “net neutrality”), particularly when it is malicious is absurd. It is reasonably presumed that proponents of such notions have never experienced the financial and emotional debilitation of these vicious assaults. The advent of anonymous, free-for-all, online character defamation platforms compounds the victims’ carnage exponentially — brought about by the enduring nature of the postings, instant availability through search engines and the viral republication thereof.
Notwithstanding the motives of the cowardly, malicious minority, there are still compelling First Amendment interests at stake when an anonymous blogger’s anonymity is threatened by a subpoena. The US Constitution (and similar provisions in other nations) demands a stringent test before a judge can order that the veil of anonymity can be pierced. At a minimum, the determination whether the court will permit discovery of confidential identifying information from a third-party generally comprises the following elements:
- The plaintiff must first establish a significant likelihood of success on the merits of his/her defamation claim.
- The plaintiff must establish that the balance of hardship tips in the plaintiff’s favor; and
- The plaintiff must establish that the subpoena is the least intrusive alternative available.
These factors, while mindful of the right to recover damages for legitimate defamation claims, ensure that a plaintiff will not be able to compel an ISP to disclose confidential identifying information, when disclosure is neither necessary nor fair to a defendant who has not committed and criminal or civil wrongdoing.
The data we uncover during cyber investigations
The information we will identify is, but is not limited to:
- IP address(es)
- Device details
- Unchangeable hardware of the device
- GPU, GPU vendor, retina, height, width, and more.
- Location and language settings of the device
An IP address will attempt to provide you details about:
- The Internet Service Provider (ISP)
- The IP’s hostname
- The country
- The region/state
- The city
- The approximated latitude and longitude of the area
- The location code for that region
- Any recognized services operating on that IP
The geographic location of the IP address, once we capture it, is based on open-source information, that services like InfoSniper provides. This information will give you a city, and the ISP of the sender. The area information from an IP address doesn’t provide you with a road name, residence number, or phone number, but it generally gives a good idea of the approximate location of the offender. IP addresses that are associated with mobile phones are generally less accurate geographically. But, we can still value add this information as the investigation advances.
Identify IP address hiding behind Proxy, VPN, and Tor
People involved in a malicious activity and harassment are usually tech-savvy and in some cases hide behind a proxy, VPN service, or the Tor Network, to hide his or her identity. In this case, it is hard to find any usable data about the antagonist. Not even Google would have a user’s real IP Address when the user hides behind a VPN service or a proxy. However, for our experienced cyber investigators, tracing anonymous cybercriminals hiding behind VPNs and uncovering their real identity to uncover someone’s real identity.
What you can do with the evidence
With the evidence, you may be able to get the antagonist to stop the harassment, or have the police issue a warning. Otherwise, you need to subpoena the Internet Service Provider for user information related to the IP address of the antagonist.
We regularly assist in the subpoenaing of ISPs on behalf of our clients and aid lawyers with the wording of the request. We have prepared hundreds of subpoenas, so we know exactly what to ask for, and how to ask for it.
In a Nutshell:
Rexxfield provides stealthy, legal and proactive digital investigations into anonymous Internet activities. This is achieved by identifying the anonymous antagonists often without him or her being aware of the scrutiny. Once identified the victim/client can make better informed decisions, based on the subject’s known behavior patterns, as to the best way to move forward, both tactically and strategically. That may or may not include litigation.