How does the police trace someone through their IP address?
Your IP address leaves a trace with every internet connection. But to what extent can the police actually use it to identify you? The answer is more nuanced than most people think: while an IP address is a valuable tool for investigators, exploiting it requires strict judicial procedures and runs into several technical and legal limitations. Here is how tracing a person via their IP address actually works.
What does an IP address really reveal?
An IP address (Internet Protocol) is a numerical identifier assigned to every device connected to the internet. It allows data to be routed between servers and users. But what many people do not realise is that an IP address alone is not enough to identify a person.
From an IP address, it is possible to determine:
- The country and approximate city of the connection (via IP geolocation)
- The internet service provider (ISP) that assigned the address
- The type of connection (residential, mobile, VPN, datacenter...)
What an IP address does not directly reveal:
- The name and precise identity of the user
- The exact physical home address
- The content of the browsing session
Key takeaway: an IP address identifies an internet subscription, not necessarily a person. If several people share the same connection (family, corporate network, public Wi-Fi), the IP points to the account holder, not necessarily to the person who carried out the actions.
The concrete steps of an IP address investigation
Step 1 — Collecting the IP address
Investigators retrieve a suspect's IP address from various sources: connection logs from a website, forum, messaging service or online platform. Platforms retain these logs for varying periods depending on local legislation.
Step 2 — Identifying the ISP
Once they have the IP address, investigators use public databases (WHOIS, ARIN, RIPE NCC...) to determine which internet service provider assigned that IP on the date and time in question. This is a simple and quick step.
Step 3 — Court order to the ISP
This is where the procedure becomes formal. Investigators cannot obtain the subscriber's identity without a court order — an official act issued by a judge or prosecutor. The ISP is then legally required to provide:
- The name and address of the account holder
- The connection data associated with the IP at the precise date and time
The ISP must retain connection data and respond to court orders or face penalties.
Step 4 — Arrest or continuation of the investigation
Once the subscriber's identity is known, investigators can carry out a search, seize electronic devices or make an arrest. Additional digital analysis (computer forensics) then confirms or rules out the person's involvement.
Comparison: what police can obtain depending on the source
| IP source | Available data | Time to obtain | Required procedure |
|---|---|---|---|
| Website / forum | Connection IP, timestamp | Days to weeks | Court order |
| Social network | IP, device, location | Days to weeks | Court order or international cooperation |
| Sending IP (sometimes hidden) | Variable | Court order | |
| ISP (subscriber) | Name, address, connection history | A few days | Court order required |
| Public Wi-Fi | Shared IP, access point logs | Variable | Court order + additional analysis |
The limits of IP address tracking
Dynamic IP addresses
Most residential subscribers have a dynamic IP address — one that changes regularly (at each reconnection, daily or weekly). This is why precise timestamps are crucial: investigators need to know exactly which IP was used at what time so the ISP can match the subscriber.
NAT and shared IPs
Due to the shortage of IPv4 addresses, many ISPs use NAT (Network Address Translation), which allows multiple subscribers to share the same public IP address. In this case, identifying the right person requires even more precise logs including connection ports.
VPNs and proxies
A VPN (virtual private network) hides the user's real IP address by replacing it with the VPN server's address. If police trace back to the VPN provider, they may attempt to obtain connection logs — but many VPNs located outside domestic jurisdiction operate a no-log policy and do not cooperate with foreign authorities.
The Tor network
The Tor network routes traffic through multiple encrypted nodes in different countries, making tracing extremely difficult. Specialised agencies have advanced methods to attempt to de-anonymise Tor users, but this remains technically complex and time-consuming.
Cybercafés and public Wi-Fi
A connection from a public Wi-Fi (café, library, hotel) or cybercafé makes identification much harder: the IP points to the establishment, not to a specific individual. Surveillance cameras and access records may then become additional investigative tools.
Good to know: an IP address is just one lead among many in a digital investigation. Investigators typically cross-reference multiple data sources (metadata, browser fingerprints, online accounts, mobile geolocation...) to build a solid body of evidence.
The legal framework
The use of IP addresses in criminal investigations is strictly regulated in most countries:
- IP addresses are considered personal data subject to data protection laws (GDPR in Europe)
- Only a judicial authority (judge, prosecutor) can order ISPs to disclose identification data
- ISPs are required to retain connection data for a set period (typically one year) and respond to court orders or face penalties
- Online platforms have similar obligations and must respond to lawful requests
- Access to content data (what the user browsed) requires even more strictly controlled procedures
Can someone be wrongly identified?
Yes, and this has happened in several cases. The main causes of error are:
- An unsecured Wi-Fi network used by a third party without the account holder's knowledge
- A device infected by malware used as a remote relay
- Errors in logs or server clock synchronisation issues
- Shared NAT pointing to the wrong subscriber
This is why IP address evidence alone is never sufficient in legal proceedings: it must be corroborated by other material evidence.
What this means for your online privacy
Understanding how IP address tracking works helps you better grasp the stakes of online privacy. Your IP address is recorded by every site you visit, every service you use, every email you send. It is one of the most systematically collected digital footprints.
If you want to better control your online exposure, several tools can limit the visibility of your IP address: VPNs, the Tor browser, or proxies. Keep in mind, however, that these tools do not make you completely anonymous and their use for illegal purposes remains punishable.
Good to know: knowing your current IP address is the first step to understanding what you expose with every connection. You can check it instantly and for free using our online tool.
Nicolas,