I think he's refering to where its logged on the machine he is 'hacking' which could be any number of places depending on the software and/or network setup they are using and also at their and your ISPs and possibly other points along the way.