How to Get IP Address by Sending Links ?
Networking
- Networking is a process of data transfer between two networks (MAC Address and IP Address).
- All these are checked and data starts to move/transfer from source to destination. It is also called inter connection of computer. The round shaped disc is called router.

Learn Ethical Hacking - Ethical Hacking tutorial - Networking Process - Ethical Hacking examples - Ethical Hacking programs
How to Find IP Address ?
Step 1:
- Go to command prompt and type ipconfig.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Config - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- Then you can find an IP address easily.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Address - Ethical Hacking examples - Ethical Hacking programs
Step 3:
- Another way to find IP Address after connecting to internet, go to connected network settings -> properties.

Learn Ethical Hacking - Ethical Hacking tutorial - Connected Network Properties - Ethical Hacking examples - Ethical Hacking programs
Step 4:
- Then the two networks (IP address and MAC address) can be find.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Address MacAddress - Ethical Hacking examples - Ethical Hacking programs
Step 5:
- IP Address can be manually set or automatically assign.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Settings - Ethical Hacking examples - Ethical Hacking programs
How DNS and Website Works ?
- DNS technology allows hosts on TCP/IP networks to be address by its name.
- DNS automatically convert the names we type in our web browsers address bar to the IP addresses of web servers hosting those sites.
- A user connects to the internet and ask for an address. Their internet service provider checks nameservers to find where the website is stored. Nameservers store the alias and IP address of the server with the website.
- Website are made up of files including images, videos, and the website code itself, which might be static HTML, or a dynamic web language like PHP.
- The server processes anything it needs and returns the site in HTML.

Learn Ethical Hacking - Ethical Hacking tutorial - how dns website works - Ethical Hacking examples - Ethical Hacking programs
- Normally, we search google.com and everything will navigate by IP address only.
- Client -> ISP (Internet Service Provider) -> route server WWW (World Wide Web)->Top Level Domain Server (1.1.1.1), Commercial ->Name server (2.2.2.2).
Database Connectivity - Config File
- Using this file, we can connect database. We need four terms, they are server name, user name, password, database name. Errors will be detected in catch. And try used to execute. Connections are initiated on the above four terms and attributes given for handling errors. This is the coding for simple configuration file.

Learn Ethical Hacking - Ethical Hacking tutorial - Database Connectivity Config File - Ethical Hacking examples - Ethical Hacking programs
IP Address Grabber - Create Hacking App
- Before seeing IP Address grabber, we need to know three important things. They are the following terms:
- Shared IP -> HTTP_CLIENT_IP (Single Modem, Many Computers)
- Proxy IP -> HTTP_X_FORWARDED_FOR (Indirect way by using VPN)
- Server IP -> REMOTE_ADDR (Extract the server IP)
- By using the technical words, we can extract the IP address.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Address Grabber - Ethical Hacking examples - Ethical Hacking programs
How MySQL Database / Table Created
Step 1:
- We can access MySQL by the IP address 192.168.1.100:88/phpmyadmin

Learn Ethical Hacking - Ethical Hacking tutorial - Mysql Database - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- We can also access the MySQL by localhost. Afterwards we have to create a database and named as ipaddress grabber1 then create table & named as ip address. There is only Column which is named as ip. Then click go, IP Address can be created. It is VARCHAR type and its length up to 20.

Learn Ethical Hacking - Ethical Hacking tutorial - Table Creation - Ethical Hacking examples - Ethical Hacking programs
Step 3:
- All Data will be inserted into the table.

Learn Ethical Hacking - Ethical Hacking tutorial - Table Created - Ethical Hacking examples - Ethical Hacking programs
IP Address Grabber - Run the Application
Step 1:
- Call ip address grabber php file and click enter. You will get ip address and MySQL file.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Address Grabber Run The Application - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- Run again to store ip address.

Learn Ethical Hacking - Ethical Hacking tutorial - Run Again to Store IP Address - Ethical Hacking examples - Ethical Hacking programs
Read Also
IP Address Grabber – Hack Network IP Address
Step 1:
- Hack IP address of others networks using the link.

Learn Ethical Hacking - Ethical Hacking tutorial - Hack IP Address - Ethical Hacking examples - Ethical Hacking programs
Step 2:
- Send the link to your team to find out other network ip address.

Learn Ethical Hacking - Ethical Hacking tutorial - IP Address Received - Ethical Hacking examples - Ethical Hacking programs
Step 3:
- Ip address of your team is received by the link.

Learn Ethical Hacking - Ethical Hacking tutorial - Send Link to Team - Ethical Hacking examples - Ethical Hacking programs