Hello everyone!
Someone is using my cable internet connection for months...maybe for a year! i had suspected this for months but didnt have the inclination to chase or prove it.
But after seeing the log, and finding out that the connection was used when we were away from home, I now have the will to get to the bottom of this. But first I need help from this forum to do it.
I have 2 cable connection (because the connection in which the ip has been hacked used to disturb a lot(maybe because of this hack)).
About a 12-15 months back i used to get a lot of ip conflict alert at night. During that time I didnt have the router and it was a direct connection to the desktop. Maybe during that time the conn. was breached.
See the image and compare the date and time for urself...
Hacked Account
New account
I use a wireless router through which I have the connection shared between desktop and laptop.
The router is fully protected and encrypted.
Now please tell me how I need to find out which person in the neighbourhood is doing that.
I want to collect all the proof and then call the internet guys and tell them everything.
Waiting by...
Thank you.
Someone is using my cable internet connection for months...maybe for a year! i had suspected this for months but didnt have the inclination to chase or prove it.
But after seeing the log, and finding out that the connection was used when we were away from home, I now have the will to get to the bottom of this. But first I need help from this forum to do it.
I have 2 cable connection (because the connection in which the ip has been hacked used to disturb a lot(maybe because of this hack)).
About a 12-15 months back i used to get a lot of ip conflict alert at night. During that time I didnt have the router and it was a direct connection to the desktop. Maybe during that time the conn. was breached.
See the image and compare the date and time for urself...
Hacked Account
New account
I use a wireless router through which I have the connection shared between desktop and laptop.
The router is fully protected and encrypted.
Now please tell me how I need to find out which person in the neighbourhood is doing that.
I want to collect all the proof and then call the internet guys and tell them everything.
Waiting by...
Thank you.
Last edited: