last night the hacker tried to compromise my gmail account. Also he tried once in the morning. I have got google alerts for this. accounts-noreply@google.com 9:16 AM (4 hours ago) to me Shaon, Someone recently tried to sign in to your Google Account, <my email address> We prevented the sign-in attempt in case this was a hijacker trying to access your account. Please review the details of the sign-in attempt: Tuesday, June 26, 2012 3:16:31 AM GMT IP Address: 199.48.147.45 (appliedops.net) Location: Unknown Location If you do not recognize this sign-in attempt, someone else might be trying to access your account. You should sign in to your account and reset your password immediately. Find out how at http://support.google.com/accounts?p=reset_pw Sincerely, The Google Accounts Team
I received a letter from TOR stating that the victim of being spied on via TOR can only block a TOR address for a short while, as it might cause problems for other TOR users. Cyberbullying is a real problem, people commit suicide because of it. TOR needs to take things seriously when people use their program to cyberbully. Instead of telling the victims they can only block when necessary, they should find a way of persecuting the cyberbullies that used their system. I believe having a way to backwards trace the ip to the original user by the victim by putting in the url that was hit by a TOR user, revealing the original ip is the answer. People don't like that, well guess they better not be bothering anyone on their blogs.
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 199.48.147.45 IP address
- Hacked Gmail accounts
- WordPress Hacking Attempts
- SSH Hacking Attempts
- Why Can't I See The Exact Address?
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.