How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Andy Your Own Question

Andy, Computer Consultant
Category: Computer
Satisfied Customers: 5316
Experience:  11yr exp, Comp Engg, Internet expert, Web developer, SEO
Type Your Computer Question Here...
Andy is online now
A new question is answered every 9 seconds

How can I trace incoming ip addresses or the diagnostic proof

Customer Question

how can I trace incoming ip addresses or the diagnostic proof of systems used if it is done through private sources or codes
Submitted: 6 months ago.
Category: Computer
Customer: replied 6 months ago.
I just want whoever this is to know that I have definitely linked all this back to him and it is very involved in which two of my macs are shut down as is my iphone; it was made to look like my current husband did it all and I have lost all my artwork (which I sale), writings, photos and other because he permanently erased my disk. On top of that, he has been taking photos of my when I start my computer, in all of my accounts, uses aliases which look like it is me (double of all my contacts); poses as account emails asking me to update info, gets all incoming and outgoing texts, emails, etc and has about 30 ips; computer hacking accounts and aliases along with MITM; google hybrid, github, and on and on involvement and color coded coding systems hidden in articles and advertisements. I have spent the last week learning this but cannot make a direct link due to all the hidden techniques and languages encrypted. I made one trace that led directly to his house but he has since changed all (which I do have all ip's and info in tech form)...please help me trace it more accurately and have what I need when I for a case. Tiffany dont send to my email because he will get it too
Customer: replied 6 months ago.
System Profile:
AirPort: spairport_wireless_card_type_airport_extreme (0x14E4, 0x93), Broadcom BCM43xx 1.0 (
Bluetooth: Version 4.3.6f3 16238, 3 services, 18 devices, 1 incoming serial ports
Thunderbolt Bus:
Memory Module: BANK 0/DIMM0, 2 GB, DDR3, 1067 MHz, 0x80CE, 0x4D34373142353637334648302D4346382020
Memory Module: BANK 1/DIMM0, 2 GB, DDR3, 1067 MHz, 0x80CE, 0x4D34373142353637334648302D4346382020
USB Device: Hub
USB Device: Internal Memory Card Reader
USB Device: BRCM2070 Hub
USB Device: Bluetooth USB Host Controller
USB Device: Apple Internal Keyboard / Trackpad
USB Device: Hub
USB Device: Built-in iSight
USB Device: IR Receiver
Serial ATA Device: TOSHIBA MK5055GSXF, 500.11 GB
Serial ATA Device: MATSHITADVD-R UJ-898
Model: MacBookPro6,2, BootROM MBP61.0057.B0C, 2 processors, Intel Core i7, 2.66 GHz, 4 GB, SMC 1.58f17
Network Service: AirPort, AirPort, en1
Graphics: Intel HD Graphics, Intel HD Graphics, Built-In
Graphics: NVIDIA GeForce GT 330M, NVIDIA GeForce GT 330M, PCIe, 512 MBConnected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00
Connected IP Address: at: 2016-04-10 02:59:00/* Web Font Loader v1.5.6 - (c) Adobe Systems, Google. License: Apache 2.0 */
;(function(window,document,undefined){var j=!0,k=null,m=!1;function n(a){return function(){return this[a]}}var p=this;function q(a,b){var c=a.split("."),d=p;!(c[0]in d)&&d.execScript&&d.execScript("var "+c[0]);for(var f;c.length&&(f=c.shift());)!c.length&&void 0!==b?d[f]=b:d=d[f]?d[f]:d[f]={}}function aa(a,b,c){return,arguments)}
function ba(a,b,c){if(!a)throw Error();if(2<arguments.length){var,2);return function(){var;Array.prototype.unshift.apply(c,d);return a.apply(b,c)}}return function(){return a.apply(b,arguments)}}function r(a,b,c){r=Function.prototype.bind&&-1!=Function.prototype.bind.toString().indexOf("native code")?aa:ba;return r.apply(k,arguments)}var||function(){return+new Date};function t(a,b)these are just a few examples I pulled when inspecting his activity on my own computers
Customer: replied 6 months ago.
(Posted by JustAnswer at customer's request) Hello. I would like to request the following Expert Service(s) from you: Live Phone Call. Let me know if you need more information, or send me the service offer(s) so we can proceed.
Customer: replied 6 months ago.
(###) ###-####is my home phone because he is in my iphone systems and my personal phone has been disabled.
Expert:  Richard replied 6 months ago.
Hi there and welcomeThe IP Addresses I see are all private, from within your own network.Is this person accessing your computer remotely?