• Home
  • About 404TS
  • Contact

404 Tech Support

Where IT Help is Found

  • Articles
    • Code
    • Entertainment
    • Going Green
    • Hardware, Gadgets, and Products
    • Management
    • Network
    • News
    • Operating Systems
    • Security and Privacy
    • Software
    • System Administration
    • Talking Points
    • Tech Solutions
    • Web
    • Webmaster
  • Reviews
  • Media
    • Infographics
    • Videos
  • Tech Events
  • Tools
    • How do I find my IP address?
    • Browser and plugin tests
  • Get a Technical Consultation
You are here: Home / Media / How To See If Your Computer is Part of a BotNet

How To See If Your Computer is Part of a BotNet

2011-06-20 by Jason

Malware has a few different intentions when it infects your computer. It could want to:

  • show you ads to make money (adware)
  • Watch where you go on the web and steal your passwords to either use your accounts for sending out spam or access your bank/credit card account
  • Make you think you have a virus so you pay them to fix it (scareware)
  • Make your computer part of a botnet

Joining your computer to the botnet might not actually give you any symptoms like the other options would and sometimes it’s just one of the many side effects of becoming infected with malware. By your computer being part of a botnet, you are giving somebody else access to your computing and network resources. Computers in a botnet are used to pass along data so that it is untraceable or is used in Dynamic Denial Of Service attacks, where a large number of computers send so many requests to a server that it crashes. Computers running botnets might also be running hidden browsers in the background and submit spam comments to every page you visit.

Some try to identify bots and other unauthorized access by setting up bait for the bots to take. These traps are called Honeypots and a network of them are called a Honeynet. Taking the identifying information about where infected computers are, you can check to see if your computer has been detected in a honeynet at www.botnetchecker.com.

Just visit the site and it will capture your IP address (which you give to every website you visit anyways) and run it through their list of recently trapped bots. If nothing is found, it should give you a better sense of security. If it has been seen recently, they’ll let you know and you’ll have some cleaning up to do. The site lists some resources that can help you take back your PC from the botnet. Fewer PCs in the botnet is better for us all. Any time you’re suspicious of your computer, you can just freely head over to Bot Net Checker and see if anything has been detected lately.

Filed Under: Media, Security and Privacy

Trending

  • ThreatFire – Proactive Antivirus and Spyware Protection
    In Security and Privacy, Software
  • Simple Tip: Windows 7 includes Copy as Path on the context menu
    In Operating Systems, Tech Solutions
  • ASUS launches their version of the Google OnHub wireless router
    In Hardware, Gadgets, and Products

Latest Media Posts

Find Out Where To Download SNES ROMs

Find Out Where To Download SNES ROMs

Multifunctional Video Conversion Tools – Wondershare Video Converter

Multifunctional Video Conversion Tools – Wondershare Video Converter

  • Popular
  • Latest
  • Today Week Month All
  • Access to the resource [servershare] has been disallowed Access to the resource [servershare] has been disallowed
  • What is the AllJoyn Router Service on Windows 10? What is the AllJoyn Router Service on Windows 10?
  • How a DirecTV bill really works in 2015 How a DirecTV bill really works in 2015
  • Read the Event Logs on Windows Server Core Read the Event Logs on Windows Server Core
  • Increase IIS Private Memory Limit to improve WSUS availability Increase IIS Private Memory Limit to improve WSUS availability
  • How Virtual Reality Supports Mental Health Therapy How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting
  • Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams Making Distributed Software Development Work: Strategies and Best Practices for Managing Remote Teams
  • customer contactless payment for drink with mobile phon at cafe counter bar,seller coffee shop accept payment by mobile.new normal lifestyle concept The Latest Innovations In Payment Technology
Ajax spinner

Elevator Pitch

404 Tech Support documents solutions to IT problems, shares worthwhile software and websites, and reviews hardware, consumer electronics, and technology-related books.

Subscribe to 404TS articles by email.

Recent Posts

  • How Virtual Reality Supports Mental Health Therapy
  • Key Strategies of Successful Coin Listing on Exchange
  • Keeping Your Mac Healthy: A Comprehensive Guide to Maintenance and Troubleshooting

Search

FTC Disclaimer

404TechSupport is an Amazon.com affiliate; when you click on an Amazon link from 404TS, the site gets a cut of the proceeds from whatever you buy. This site also uses Skimlinks for smart monetization of other affiliate links.
Use of this site requires displaying and viewing ads as they are presented.

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in