Add a notation to a music on Kodi through internet

Hi,

I’d like to share something with you.
Two weeks ago, my SQL database has been hacked. All of my databases have been deleted, and the hacker created a database in which he wrote that he could restore all of the data in exchange of a certain amount of bitcoins.

I was able to uninstall mysql, reinstall it, restore my databases with a backup, it just took me time, but no money. Now, my mysql installation is secured (the system where mysql is does not secure the installation of mysql, and I left the default mysql port, which was an error).

I wonder if a hacker downloaded the log file is this discussion to hack my system. In the log file, we can easily find my IP address and the opened port on my router.

Do a hacker can use these informations to try to hack a system? If other people have done the same mistakes than me, I think the debug log should not contain the connection informations.

Could you make them unreadable ? I think they are not important in your debug process. You can replace ip address with xxx.xxx.xxx.xxx for example, and the same for the port.

What do you think about it ?
Sorry to explain this in this topic, it should be a fresh new subject. But I wanted to add a comment in the topic where my debug log was.

Thanks in advance.
Matthieu Le Gac