Whois information
NetRange: 98.159.224.0 - 98.159.239.255
CIDR: 98.159.224.0/20
NetName: LOGICWEB
NetHandle: NET-98-159-224-0-1
Parent: NET98 (NET-98-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: LogicWeb Inc. (LOGIC-25)
RegDate: 2010-03-26
Updated: 2022-01-11
Ref: https://rdap.arin.net/registry/ip/98.159.224.0
OrgName: LogicWeb Inc.
OrgId: LOGIC-25
Address: 55 Broadway
Address: #686
City: Greenlawn
StateProv: NY
PostalCode: 11740
Country: US
RegDate: 2007-12-10
Updated: 2024-11-25
Comment: ABUSE / SUBPOENAS
Comment: ------------------------
Comment: Send to: abuse@logicweb.com (no other email is valid for abuse complaints).
Ref: https://rdap.arin.net/registry/entity/LOGIC-25
OrgTechHandle: TECH277-ARIN
OrgTechName: Tech
OrgTechPhone: +1-347-212-5047
OrgTechEmail: chad@logicweb.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECH277-ARIN
OrgAbuseHandle: ABUSE1808-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-347-212-5047
OrgAbuseEmail: abuse@logicweb.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1808-ARIN
NetRange: 98.159.226.0 - 98.159.226.255
CIDR: 98.159.226.0/24
NetName: EXPRESSVPN
NetHandle: NET-98-159-226-0-1
Parent: LOGICWEB (NET-98-159-224-0-1)
NetType: Reassigned
OriginAS: AS13213
Customer: EXPRESSVPN (C08160934)
RegDate: 2022-01-11
Updated: 2022-01-11
Ref: https://rdap.arin.net/registry/ip/98.159.226.0
CustName: EXPRESSVPN
Address: None
City: Road Town
StateProv:
PostalCode:
Country: VG
RegDate: 2022-01-11
Updated: 2022-01-11
Ref: https://rdap.arin.net/registry/entity/C08160934
OrgTechHandle: TECH277-ARIN
OrgTechName: Tech
OrgTechPhone: +1-347-212-5047
OrgTechEmail: chad@logicweb.com
OrgTechRef: https://rdap.arin.net/registry/entity/TECH277-ARIN
OrgAbuseHandle: ABUSE1808-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-347-212-5047
OrgAbuseEmail: abuse@logicweb.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/ABUSE1808-ARIN
Most recent complaints
Please help us keep Internet safer and cleaner by leaving a descriptive comment about 98.159.226.241 IP address
DNSBL* - is a list of IP addresses published through the Internet Domain Name Service (DNS) either as a zone file that can be used by DNS server software, or as a live DNS zone that can be queried in real-time. DNSBLs are most often used to publish the addresses of computers or networks linked to spamming; most mail server software can be configured to reject or flag messages which have been sent from a site listed on one or more such lists.
WHOIS** - is a query/response protocol that is widely used for querying databases in order to determine the registrant or assignee of Internet resources, such as a domain name, an IP address block, or an autonomous system number. WHOIS lookups were traditionally performed with a command line interface application, and network administrators predominantly still use this method, but many simplified web-based tools exist. WHOIS services are typically communicated using the Transmission Control Protocol (TCP). Servers listen to requests on the well-known port number 43.
** Approximate Geographic Location - This is NOT the exact geographical location of the person/organization with the given IP address. However, this should still give you a good idea about the area/region where this person/orgranization is located.
Complaint by Dasen Jardas :
My Bitstamp account was professionally hacked! On the 19th of January at 8.50 am somebody broke into my account. At 9:10am all assets have been converted into BTC and the BTC amount sent from this BTC transaction: fb1574e25fb9f22c973baa65b25c7950d8b9108bcc851144b9c7047156f97889 To this bitcoin address: 14M5yo1yDpVoEdmzZukRZibKrjuNUjzUki On the 25th of January at 4.10pm new BTC transaction was made: 91b95f30580cd2704cc779e2f4317ed73f5e56152bc3c2cadb80fbaf97e19eb0 To this bitcoin address: 1AAULVSineiXuMpFWFRVtJf24VryzMQLnF On the 31st of January at 1.05 pm new BTC transaction was made: 742fc75b5ca78b1410cdf660f152a3009c0ae3d85716d2c24346c9b15f85f52b To this bitcoin address: 1KhwdmaYuYUktLBkEaRQkrF3sTLDUq75wy I am using 2FA, the 2FA key is safely stored offline. My phone was next to me on my desk. I am sitting alone in my office, and I changed my password one week ago and that can be seen in my activity history. I never tell anybody my password. There are also no malwares on my phone. It has been checked by two technicians. Also, I have antivirus installed on my phone and I pay for it every month. How is it possible that the hacker had made a withdrawal and that email was confirmed but I didn’t get any e-mail about this transaction, why is that so? A few key facts: 1. 2FA Password was only stored physically on my phone. 2. How somebody can disable my 2FA without any info. 3. Bitstamp password is only in my head 4. No Emails received to authorize transactions 5. No malwares on my phone 6. My phone was next to me all the time 7. I have never used my 2FA password in public 8. I froze my account immediately when I realized that I couldn't log in. Account was frozen 5 minutes later from Bitstamp. 9. My e-mail wasn’t hacked. It is without leaks. 10. I didn’t get any quality reply from Bitstamp. I have no other explanation besides an unsafe system at Bitstamp. The IP who was taking the action was not mine but this: IP: 98.159.226.241. Police have been informed.