Internet/Network Security/Tracking and Tracing Hackers.


Dear Bryan

Will this be the best approach for tracking and Tracing Hackers who have attacked web sites ?.

The Consumer Who knows about that his/her web applications have been attacked by Hackers can approach the Web Hosting service company who have hosted the web applications (Website content and Database) in their data center ?.

The consumer will pay the necessary fees to the Web site Hosting company for these special service of tracing and tracking Hackers.

Will the Web Hosting co help in this regard for tracking and tracing Hackers ?.

Thanks & Regards,
Prashant S Akerkar

If you have a website that you know has been hacked, you will need to contact the hosting company to get logs for the time frame that you believe the action occurred. While you may or may not have to pay for the information, it is likely not all you need. Often, attackers use numerous proxies in an attempt to hide their identities. Just because the hosting company can give you the IP address of the attacker, does not mean that the address in question maps directly back to the person responsible. It takes the ability to back track the various proxy points to locate the originating place. I highly recommend that if something malicious was done resulting in a loss of some sort that you contact law enforcement. They have the tools, both technical and legal, to be able to handle a situation such as this.

Internet/Network Security

All Answers

Answers by Expert:

Ask Experts


Bryan Maynard


I can answer questions pertaining to computer systems (design, architecture, engineering, troubleshooting, etc), as well as networking, and all things related to IT security. I can also answer novice to intermediate programming questions in PHP, PowerShell, VBScript, C#/ASP.NET.


I am a professional with over 12 years of experience in the IT industry. I have worked extensively with data center systems, including numerous types of servers, storage arrays, connectivity technologies and virtualization platforms.

I am a member of my local CISSP chapter and maintain membership with both ISC2 and ISACA.

I have a bachelor's degree in network security and am working towards a master's degree in information assurance. I also hold numerous professional certifications including the CISSP, CISM, ITILv3, VCP, MCITP (Server 2012), CEH, and Linux+.

©2017 All rights reserved.