On our IP Geolocation Tool page, you will notice users describing hacking attempts that follow a common theme – someone’s devices and accounts keep getting hacked, the miscreants appear to be present in their network, even accessing their Wi-Fi, IoT, NFC and whatnot. Keyloggers is another common suspect that continues to be stealing information and uploading it via the internet. And the feeling of frustration and helplessness. Read on to see what options you have after knowing the IP address and, possibly, the location.
Geolocation of the suspect’s IP can give a general idea of where they are located. This can sometimes help narrow down potential (known people!) suspects and help with the investigation by the authorities. While knowing the location of the IP address can help provide evidence and support your case with law enforcement, it can also help you avoid the case altogether if you think this has to be solved differently (say a snooping Ex)
The geolocation can provide clues on the nature of the attack as well, e.g. an IP address from a foreign country notorious for paid hacking service providers may suggest someone has paid for the attack.
If you suspect an IP address as a repeat offender, you may want to block traffic from that IP using in your router or firewall.
It is anyways a good idea to monitor the geolocation of incoming traffic. For example, some routers help block traffic from certain countries or regions that are known to be notorious sources of attacks. Better safe than sorry!
Now, below are things that may help resolve the situation.
Contact Law Enforcement
You may want to report the hacking incident to the police. Be sure to provide as much information as possible – things that might act as evidence e.g. logs or screenshots. Do not forget to share information about the IP Address and location information if you feel the ip location tool was accurate enough.
Contact your ISP (Internet Service Provider)
Your ISP may not be able to identify the source of the problem, but they usually do have provisions to support in some common problems. They may be able to block traffic from those suspicious IP addresses and/or provide you with information about the devices stealthily connected to the network.
Considered Hiring a cybersecurity expert?
You may want to do that should you decide to investigate on your own. These folks can also help identify any vulnerabilities in your network and offer to fix them. You will find many such services offered online. Try to go with some reputable group – with a physical office, website and phone number at the least.
Changing your passwords may help
This may help if it is not keyloggers continuously recording your activities. Change passwords to unique (not dictionary words) phrases never used before. If that gets stolen in no time, probably it’s malware that has infected your device(s).
Scan the devices for malware
Malware can allow someone to gain access to your device and steal data. Even simple keyloggers can be installed by not-so-techy people around you and can be hard to detect. Consider scanning your devices for malware using antivirus and additionally with anti-malware software. If the scan says you are infected with malware remove them promptly. If possible, try using a new device or one you normally do not use.
Get into the habit of two-factor authentication
Most services online offer two-factor authentication e.g. an OTP or code sent to your phone, in addition to your password. This can help prevent someone from accessing your accounts even if they have your password.
Disable remote access in devices
Many devices have a provision for remote access which you don’t really need. Disable that. Remote access options sometimes come with standard passwords and can provide an easy entry point if the default password has not been changed. If you do need remote access enabled, make sure you do not leave the default passwords in place.
Always keep software and firmware up-to-date
Do let devices automatically update their firmware. Updates often include security patches against vulnerabilities. And do we need to say – never download or use software from questionable sources? There is a high chance that the software is laced with backdoor codes.
Solved a situation? Please feel free to comment. You never know you may be helping someone in distress!