123ArticleOnline Logo
Welcome to 123ArticleOnline.com!
ALL >> Computers >> View Article

How To Monitor Traffic From An Ip Address

Profile Picture
By Author: Aida Martin
Total Articles: 413
Comment this article
Facebook ShareTwitter ShareGoogle+ ShareTwitter Share

Monitoring network traffic is not only useful for large scale businesses, but you can also use it for home networks. You can monitor network traffic to understand issues in the IT environment. The network performance is important for several businesses, and when it decreases, it will have harmful effects especially in terms of money, time and resources. Here’s how to monitor traffic from an IP address.

Steps to Monitor Network Traffic on Desktop

•    Search the IP address of the wireless broadband router. You can find the IP address for the wireless broadband router by going through the steps given below:

For the Windows PC users:

Go to the start menu.
Press on the Settings option.
Tap on the Network and Internet button.
Press on the View your network properties option.
Go down to the Wi-Fi title.
Go through the IP address near the “Default gateway” column.
For Mac users:

Launch the Apple menu.
Press on the System Preferences option.
Tap on the Network button.
Press on the Wi-Fi connection given on the left-hand column.
Press ...
... on the Advanced option.
Tap on the TCP or IP option.
Copy the IP address near the “Router” title.
•    Click on the browsing software. Press or click twice on the application symbol for the desired browsing software such as Mozilla Firefox.

•    Press on the text box. You will get the text box at the upper side of the screen.

•    In case you wish to find any text in the address bar, then you need to remove it first.

•    Type the IP address of the wireless broadband router. Enter the IP address near the ” Default gateway” title if you are the user of Windows computer.

•    If you are the users of Mac, then type the IP address to the “Router” title.

•    After that, click on the Enter button.

•    Sign in to the wireless broadband router webpage. Type the registered username with a home router and a protected password.

•    Then, tap on the Enter option.

•    In case you do not create an account or don’t remember the username and password for the router webpage, then go to the end of the wireless broadband router.

•    Search the “Connected Devices” menu list. It depends on the home router you are currently using and check the Advanced Settings, Status, router settings, and Connections tabs.

•    Check the paired programs list. The programs which are showing in the menu list are recently paired to the home router.

•    You will also get the items menu list on the screen which is not recently paired to it.

Ellen Cooper  is a technology enthusiast who loves writing about new advancements and IT threats on a regular basis. Her work focuses on the latest advancements in the realm of technology, social media, and cyber security at norton.com/setup.

Source:- http://canorton.uk/how-to-monitor-traffic-from-an-ip-address/

More About the Author

IT expert having deep knowledge about PC antivirus products. Mainly researching and writing blogs. https://askmeyp.com/ | https://m4activate.co.uk/ | https://n4setup.co.uk/

Total Views: 179Word Count: 440See All articles From Author

Add Comment

Computers Articles

1. What Is Penetration Testing And How Penetration Tester Test A Web Application?
Author: PentesterX

2. What Is Future Of Artificial Intelligence?
Author: Subho Chowdhry

3. Haas Is Going To Revolutionise Your Business – Here’s Why
Author: Hamilton Rentals

4. Why Getting Your Voting Systems On A Rental Basis Is Guaranteed To Be The Single Best Approach
Author: Hamilton Rentals

5. How To Download Canon Printer Drivers For Mac And Windows?
Author: Russel Joseph

6. What Are The Benefits Of Working With A Professional Ecommerce Web Development Agency?
Author: Web Panel Solutions

7. I Will Accomplish Osint Investigation, Your Private Detective
Author: PentesterX

8. I Will Sanitize Malware Removal, Virus Removal From Your Full Server
Author: PentesterX

9. I Will Sanitize Wordpress Malware, Wordpress Security
Author: PentesterX

10. I Will Operate Digital Forensic Work, Private Investigation
Author: PentesterX

11. I Will Execute Osint Investigation, Research Background Information Of The Target
Author: PentesterX

12. I Will Operate Vulnerability Assessment And Penetration Testing
Author: PentesterX

13. Significance Of Iot In Metaverse Application Realization
Author: Satya K Vivek

14. Minimalist Website Design: 12 Beautiful Examples
Author: Mitesh Patel

15. Document Management Services In The Healthcare Industry
Author: candacegeller

Login To Account
Login Email:
Password:
Forgot Password?
New User?
Sign Up Newsletter
Email Address: