Is there anyway I can add a feature to eggdrop such that the eggdrop will automatically scan the user hostmask when the user joins a specific channel? Let's say if the user IP is spoofed (behind a firewall or BNC), it can detect the actual (ISP) hostmask.
If it is possible, what are the solutions?
I'll be grateful if anyone has any ideas or solutions
As far as I know, It is almost impossible to detect the real ISP hostmask behind a spoofed IP on IRC.
Correct me if I'm wrong, I like to know how to trace it
p/s: This is the 1000th post on this forum
<font size=-1>[ This Message was edited by: Leonhart on 2001-11-26 08:52 ]</font>
This is true, it is 100% impossible to detect a host that is connecting through a BNC or proxy.
If you had admin privliges (if the software provides them) to the proxy, there may be a command to see who is connected, but other wise there is no other way.
Well, there is one way, which relies on them having dcc auto-get enabled. However, seting up a bot to dcc someone on join just to get their ip is most likely just to either 1) get you klined, or 2) packeted (or both)
What about when someone (a flagged) user /dcc chat to the bot? Is there anyway the eggdrop can detect the actual hostmask despite the user is behind a firewall or BNC? I've seen logs like when a user is behind a firewall, the eggdrop was able to detect the actual host.
Should extract the host out of the dcc information.
Note, if they are using a BNC that extracts and converts the CTCP information, and tunnels the DCC connection for them, then this will only give you the host of the BNC.