If the connection is
Hacker <-> You <-> Victim
then you can see the Hacker's IP address and the Victim can see your IP address. More likely the connection will be
Hacker <-> Zombie <-> You <-> Zombie <-> Victim
In that case each member of the chain can only see IPs of those adjacent to themselves. [ theymos's advice column | Ask theymos A Question ]
Attention: NOTHING on this site may be reproduced in any fashion whatsoever without explicit consent (in writing) of the owner of said material, unless otherwise stated on the page where the content originated. Search engines are free to index and cache our content. Users who post their account names or personal information in their questions have no expectation of privacy beyond that point for anything they disclose. Questions are otherwise considered anonymous to the general public.