Re:
I believe hackers can take over all those zombie computers that have been hacked / phished or whatever and post from their IP. Sure they can use proxies too. I'm just saying all of this means that the IP information is not that useful, or it can do worse damage as people convince themselves they are seeing something that isn't actually true.
I believe hackers can take over all those zombie computers that have been hacked / phished or whatever and post from their IP. Sure they can use proxies too. I'm just saying all of this means that the IP information is not that useful, or it can do worse damage as people convince themselves they are seeing something that isn't actually true.
How much time have you spent writing these replies? You're using the words "sophisticated hacker" like that explains everything. What would they have to hack? Your server? My explanation of a paid proxy service is the more reasonable explanation. You don't have to be a sophisticated hacker to use a proxy. Most proxy services have recognized IP's by the way. I would do the work for you if it was possible and didn't violate anyone's privacy.