Problem Statement

Tracing IP Address behind VPN/Proxy Servers

Create a system that can tell whether an IP address is real or a proxy or VPN address. Additionally, the solution should be able to identify the real IP address and give information about the VPN provider.

PS Number: PSCBS004

Domain Bucket: Cyber Security
Category: Software
Dataset : NA

This problem statement’s main goal is to find a cybercriminal’s real IP address, if one is masked behind a proxy or VPN IP address.

 

Background of the Problem

Cybercriminals often operate using proxy IP addresses to mask their actual IP addresses for enhanced anonymity. Build a solution that can determine if an IP is actual or a proxy/VPN IP address. In addition to it, the solution should be able to trace the actual IP address as well as provide details of the VPN service provider. Use of external third party services is not recommended. 

Objective

The primary objective of this problem statement is to trace a cybercriminal’s actual IP address hidden behind a proxy or VPN IP address, if used.Build a solution that can take an IP address as input and determine if it belongs to a “proxy” or VPN service provider;If a “proxy” or VPN service provider has been used, details of the same should also be provided; The solution should also be able to trace the actual or real IP address behind the “proxy” or VPN IP address.;Participants may consider a simple browsing scenario, with and without a “proxy” or VPN, for demonstrating their solution.

Note: Use of external third-party services is not recommended.”

Summary

 The growth of cybercrime in recent years has been astounding. Cybercriminals sitting in any corner of the world are able to unleash significant damage through different types of cyber crimes such as hacking, identity theft and ransomware. The anonymity offered by the internet encourages them to commit these attacks without any fear whatsoever. Hackers use various techniques to hide their digital footprint making it difficult for law enforcement agencies to catch and prosecute them.One common technique is to not access the target computer directly but rather through a “proxy” server or a VPN server, which essentially acts as a layer between them and the target computer. As far as the target computer is concerned, it would only see requests coming from the “proxy” or the VPN server. There are a lot of free and paid proxies, and VPN service providers, available.