Joerg & Howard,

I run cable modem.  My IP (fixed) is recognized by the network as being
me.  However, the IP which is fed to any snoop page or appears in any
headers, is the network IP as far as I can tell... something like a
proxy??

Howard, you are correct that the IP shows up in headers.

Joerg, send yourself some mail.  When you download it, check the headers
and you should see something like this:

Return-Path: <[EMAIL PROTECTED]>
Received: from go-concepts.com (ip208.2.209.93.go-concepts.com [208.2.209.93])
        by mail2.go-concepts.com (8.11.1/8.11.1) with SMTP id e9SLwhR31966
        for <[EMAIL PROTECTED]>; Sat, 28 Oct 2000 17:58:43 -0400
Message-Id: <[EMAIL PROTECTED]>

Notice the 2nd line ... that's where the ip shown to foreign servers
will show up.

I get the feeling, that if this is a 'proxy' involved here, the final
two digits may range from 00 to 99 depending upon where you are in the
proxy queque??

Now, why you *need* this information is the question. :>

l.d.
====

On Thu, 19 Apr 2001 00:22:25 -0400 (EDT), [EMAIL PROTECTED] (Howard Eisenberger)
wrote:

> On Tue, 17 Apr 2001 13:01:07 +0100,
> "Joerg Dietze" <[EMAIL PROTECTED]> wrote:

>> my problem is not solved.

>> If I'm running tcpinfo or ftp they ask the pepa xDSL driver and this
>> will return the IP internally used on my machine. I'm interested in the
>> IP at which the internet sees my machine.

> That's another kettle of fish. I'm not sure how to get your
> "external" IP from your PC. I don't use xDSL (or cable), so
> I only have a vague idea how it works.

> I imagine that your external IP would be in the headers of any
> e-mail you send and would show up if you visit a "snoop" site
> on the web.

>> > The Clarkson NCSA telnet/ftp clients work since the CONFIG.TEL
>> > file is configured to use bootp when you install the APM.

>> Where can I find bootpchk.exe?

> FWIW, botpchk.exe is included in the (University of) Port Elizabeth
> version of NCSA Telnet at:

> ftp://ftp.is.co.za/networking/pc/ncsa/tel23074.zip

> Archive:  tel23074.zip
> Length     Date   Time    Name
> --------    ----   ----    ----
> 82360  15-09-94 20:49   BOOTPCHK.EXE
> 80204  15-09-94 20:48   FINGER.EXE
> 133006  15-09-94 20:48   FTPBIN.EXE
> 97304  15-09-94 20:49   HOPCHK.EXE       (traceroute)
> 81296  15-09-94 20:49   NETSTAT.EXE
> 78660  15-09-94 20:49   NSLOOKUP.EXE
> 97410  15-09-94 20:49   PING.EXE
> 268966  15-09-94 20:47   TELBIN.EXE
> 4996  15-09-94 20:55   HOWTO
> 1083  15-09-94 21:01   IT_WORKS.ON
> 5569  27-07-94 12:22   ENHANCED.KEY
> 8176  05-08-94 00:23   CONFIG.TEL
> 3783  27-07-94 12:23   STANDARD.KEY
> 1666  27-07-94 12:21   SERVICES
> 6165  15-09-94 21:26   WHATS.NEW
>    0  15-09-94 20:52   KEYMAP/
> 19418  27-03-92 22:17   KEYMAP/MSUCHK.C
>  380  06-08-90 22:13   KEYMAP/TESTMAP.C
> 10263  27-03-92 22:17   KEYMAP/MSUCHK.EXE
> 12597  23-08-90 20:08   KEYMAP/READMAP.EXE
> 12117  06-08-90 22:28   KEYMAP/TESTMAP.EXE
> 5569  24-01-94 11:51   KEYMAP/TELNET.KEY
> 12187  27-08-90 10:59   KEYMAP/KEYMAP.TXT
> --------                   -------
> 1023175                   23 files

> Howard E.

> --
> DOS TCP/IP * <URL:http://www.ncf.ca/~ag221/dosppp.html>

-- Arachne V1.70;rev.3, NON-COMMERCIAL copy, http://arachne.cz/


Reply via email to