当前位置: 主页 > 产品中心 > 网络与系统应用 > 网络与系统安全

产品名称:CallerIP

  • 出版厂商:
  • 版  本:最新版本
  • 语  言:
  • 授权期限:
  • 上架时间:
  • 更新时间:
  • 交货方式:联系销售人员
  • 配货周期:与销售联系
  • 销售热线:010-51266616
  • 市场价格:(以销售人员正式报价为准) 如何获得此产品的本地化服务?
产品介绍

CallerIP用于查看链接入你的网络的IP地址,同时为你提供IP地址的报告,让你轻松了解你的网络。

Benefits and Features

Plot all connections
This feature enables you to have CallerIP plot all the connections on the world map. This in turn allows for easy and quick analysis of where connections made to/from your machine reside.

New look table
The new look table includes gradient fills. This means the color of the row in the table depends on the threat of the connection. If the connection being made to your machine is harmless then the gradient will be green. Another quick an easy way to identify the threat of a connection.

Condensed CallerIP
CallerIP now allows you to minimize it to a very small and detailed dialog box. The small window gives you everything you need to know but stays in the background.

Realtime monitoring instantly identifies suspect activity and spyware
CallerIP monitors all connections to and from your system and actively scans ports for possible back doors that allow unauthorized access.

Identifies the country of origin for all connections
A connection to/from a high-risk country is a key indicator of suspect activity and could likely be someone looking to steal your confidential information or compromise your system. CallerIP shows you the country location of connections so you can identify suspect activity and protect your information.

Network Provider reporting with abuse reporting information
See the contact and abuse reporting information for the company providing internet access for an IP address or website, so you can easily report hackers or Internet abuse.

Worldwide Whois reports
CallerIP Pro queries worldwide databases to report the up-to-date registration information for the 'owner' of an IP address or domain. Information includes name, address, phone and email contact information.

Detailed log of connection history with search options
Each connection or attempted connection is automatically logged, with search capabilities for quick lookups of past connection activity.

 

推荐内容
  • Undelete Server Edition

    Undelete 您的计算机或网络上往往存有重要数据:如财政汇报、工作或学校文档、PowerPoint报告、数据库文件、数字照片等,一旦这些文件被删除,如何将其恢复呢? 文件的意外误删操作是

  • CheckPoint FireWall Enterprise

    Check Point FireWall-1 简介 安全的存取 伪冒IP(IP Spoofing) 侵入者企图取得未授权的存取的技术,经由变更封包的IP位址,让它当做网路部份的原始封包出现,具有很高存取权限。譬如,一

  • CheckPoint Firewall Internet Gateway

    Check Point FireWall-1 简介 安全的存取 伪冒IP(IP Spoofing) 侵入者企图取得未授权的存取的技术,经由变更封包的IP位址,让它当做网路部份的原始封包出现,具有很高存取权限。譬如,一

  • CheckPoint VPN-1 25User

    VPN-1 Gateway简介 ●企业面临的问题 Internet 触角已到达世界每个角落,它让企业网络延伸到所有员工及重要企业伙伴,提供了弹性而具经济效益的建设。然而,为了让企业可以完全善用

  • CheckPoint VPN-1 Enterprise Unlimited

    VPN-1 Gateway简介 ●企业面临的问题 Internet 触角已到达世界每个角落,它让企业网络延伸到所有员工及重要企业伙伴,提供了弹性而具经济效益的建设。然而,为了让企业可以完全善用

  • CheckPoint VPN-1 Power VSX

    提供具有不能匹敌的管理性能的有效安全管理 VPN-1 Power VSX是一个安全网关,为管理服务供应商和企业提供了有效化网络,创建了250个有效的安全系统包括在一个硬件平台上集成的防火墙

Copyright 软件中国 -打造中国最专业的正版软件供应平台 2022-2023

昆仑永通(北京)信息技术有限公司版权所有 未经授权禁止复制或建立镜像

京ICP备10037049号-2