IP address is using my network and trying to encrypt information from my computer.
I knew it...for so long now i knew it that there where a hacker on my pc. my router a copy of it with all the details you know how to get in my router. It was there in the morning that i wake up and saw a copy with word in my screen. few hours later if was gone.. that was the time i knew it but how can i get him away of my router... because im a nodbody xD if you stand before me i put you in the grond. but furhter then that im nothing. don't have important information..don;t have money xD so ...its useless.. but i think this hacker is in the moden or router or something and not in my pc. but from my router/modem right when i put the power on and put the cables in my pc and pow after i using internet i got fucked for real!! so...don't buy a new pc. with a ****** password in a **** house with 12 people ;) for the hacker. i know you will read this. go **** you self loser :) if you are a man with honour then you come with only you fists and nothings else. to my adres are somewhere else here in holland. Believe it i will **** you up. and i you don't throw me ouut of you **** hack bullshit i will cut finger for finger till you will understand why you need to take rich people and not pore peolpe you're stupid pig.
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 192.168.0.199 IP address
- Hacked Gmail accounts
- WordPress Hacking Attempts
- SSH Hacking Attempts
- Why Can't I See The Exact Address?
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.