yupps. your ip address is the location of your computer on the net. once the location is known, anything can be done, depending on the skill of the hack-attempter on the other end. that's why we have firewalls and other protection programs.
and no, before you ask, there's not any way to really conceal your IP, as it's needed by all the sites and filesharing systems you surf to. proxies can be used, but then all your data is filtered through a third party, meaning they have it recorded and could use it against you. that also means yet another party has been added that gains access to your ip to possibly do damage.
This is the first step.. I hit a well known site just as an example.
Quote:Initiating SYN Stealth Scan against llamma.wingsix.com (216.246.57.194) [1221 ports] at 09:41
Discovered open port 443/tcp on 216.246.57.194
Discovered open port 22/tcp on 216.246.57.194
Discovered open port 80/tcp on 216.246.57.194
Discovered open port 25/tcp on 216.246.57.194
Discovered open port 21/tcp on 216.246.57.194
Discovered open port 110/tcp on 216.246.57.194
Discovered open port 993/tcp on 216.246.57.194
Discovered open port 465/tcp on 216.246.57.194
Discovered open port 995/tcp on 216.246.57.194
Discovered open port 3306/tcp on 216.246.57.194
Discovered open port 143/tcp on 216.246.57.194
SYN Stealth Scan Timing: About 65.06% done; ETC: 09:43 (0:00:33 remaining)
The SYN Stealth Scan took 134.69s to scan 1221 total ports.
For OSScan assuming port 21 is open, 20 is closed, and neither are firewalled
For OSScan assuming port 21 is open, 20 is closed, and neither are firewalled
For OSScan assuming port 21 is open, 20 is closed, and neither are firewalled
Host llamma.wingsix.com (216.246.57.194) appears to be up ... good.
Interesting ports on llamma.wingsix.com (216.246.57.194):
(The 1206 ports scanned but not shown below are in state: filtered)
PORT STATE SERVICE
20/tcp closed FTP-data
21/tcp open FTP 22/tcp open ssh
25/tcp open smtp
80/tcp open http
110/tcp open pop3
143/tcp open imap
443/tcp open https
465/tcp open smtps
587/tcp closed submission
993/tcp open imaps
995/tcp open pop3s
3306/tcp open mysql
8888/tcp closed sun-answerbook
8892/tcp closed seosload
No exact OS matches for host (If you know what OS is running on it, see http://www.insecure.org/cgi-bin/nmap-submit.cgi). TCP/IP fingerprint:
SInfo(V=3.81%P=i686-pc-linux-gnu%D=12/19%Tm=4587B484%O=21%C=20)
TSeq(Class=RI%gcd=1%SI=3CDDB8%IPID=Z%TS=U)
TSeq(Class=RI%gcd=1%SI=3C2385%IPID=Z%TS=U)
TSeq(Class=RI%gcd=1%SI=3CC914%IPID=Z%TS=U)
T1(Resp=Y%DF=Y%W=16D0%ACK=S++%Flags=AS%Ops=M)
T2(Resp=N)
T3(Resp=N)
T4(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T5(Resp=Y%DF=Y%W=0%ACK=S++%Flags=AR%Ops=)
T6(Resp=Y%DF=Y%W=0%ACK=O%Flags=R%Ops=)
T7(Resp=N)
PU(Resp=Y%DF=N%TOS=0%IPLEN=164%RIPTL=148%RID=E%RIPCK=F%UCK=F%ULEN=134%DAT=E)
Nmap finished: 1 IP address (1 host up) scanned in 160.265 seconds
Raw packets sent: 3678 (148KB) | Rcvd: 151 (9718B)
I'm not a malicious hacker..you can get an application called nmap and run it against your localhost (127.0.0.1) and see if there are any strange ports open... You can send me your ip and I can run a scan against it to see if you are open to the world..but if you do, make sure it's by pm..as will be any results returned..
If you want more info about ports, IP's and security visit http://www.grc.com