Monthly Archives: February 2018

Sheriff-tied political committee accepts money from convicted felon

Scott Israel booster convicted in tax evasion, gun cases

By Bob Norman – Investigative Reporter

(See Video)

PEMBROKE PARK, Fla. – A political committee supporting Broward County Sheriff Scott Israel has raised $96,000 so far, much of it at an April fundraiser for Israel at developer and garbage company owner Ron Bergeron’s ranch.

One of those leading the money list is developer Yoram Izhak, who is listed on campaign filings for “Citizens for Effective Law Enforcement” as giving $5,000 personally, with another $15,000 coming from companies listed at the building he owns in North Miami.

Izhak has invested a reported $200 million into properties of late, including purchases of the Lauderhill Mall and the Lakes Mall. But what may be troubling for Broward County’s top cop is that Izhak is also a convicted felon who was indicted 10 years ago in a massive organized crime case.

The crime ring was known as “The Corporation” or the “Cuban Mafia” and was allegedly involved in cocaine trafficking, arson, gambling and murder. The indictment alleges Izhak was involved in money laundering for the group. Racketeering and illegal gambling charges filed against him were dropped. He agreed to cooperate with the federal government and pleaded guilty to tax evasion for a sentence of probation.

The Israeli-born Izhak, who was in the textile business at the time of the indictment, refused to comment for this story, but his attorney, Glenn Widom, supplied Local 10 News with a 2011 email in which a federal prosecutor confirmed to Widom that Izhak was not involved in the Cuban Mafia’s criminal activity and wasn’t aware of the source of money that was coming into his businesses. Izhak in 2003 also pleaded guilty to violating airport security when he attempted to board a flight at Fort Lauderdale-Hollywood International Airport with a loaded pistol.

Israel didn’t respond to a request for an interview on why he would allow a political committee tied to his campaign to accept money from a convicted felon, but there is no indication the sheriff is going to return the money. Citizens for Effective Law Enforcement sent an email stating that it was not previously aware of Izhak’s criminal past and was “grateful” for his support.

Late Wednesday, Widom denied in a letter that Izhak had given the money at all to the sheriff, despite the fact that it was reported in filings to the federal government by Citizens for Effective Law Enforcement, including one contribution in Izhak’s name and two in companies listed at a building he owns.

“This is simply a mistake,” wrote Widom.

Those companies — Domestic Holdings and LFP1 — don’t appear to be registered with the state’s Division of Corporations.

“Mr. Izhak is neither an owner, shareholder, manager, partner, officer, employee, nor is Mr. Izhak otherwise affiliated with these two entities,” wrote Widom.

Not all politicians have been quick to associate themselves with Izhak. He was involved in some controversy back in 2012 when the Miami New Times reported that he was involved in a Liberty City shopping mall development that was awarded a $3 million grant from Miami-Dade County. When commissioners learned of Izhak’s involvement, they canceled the grant.

Follow Local 10 News on Twitter @WPLGLocal10

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Broward County Sheriff Scott Israels History

By Peter Hassen

  • Broward County Sheriff Scott Israel faces criticism for his department’s repeated failures to stop Florida school shooter Nikolas Cruz
  • Israel has been accused of using his department for political purposes
  • Israel faced criticism after a PAC supporting his campaign accepted donations from a felon with ties to organized crime

Broward County Sheriff Scott Israel, currently under fire for his department’s repeated failures to stop Florida school shooter Nikolas Cruz, is no stranger to controversy.

Israel was criticized in 2014 after a political action committee supporting his re-election campaign for sheriff accepted thousands of dollars in donations from a convicted felon.

https://www.local10.com/news/sheriff-tied-political-committee-accepts-money-from-convicted-felon

The donor, Yoram Izhak, was indicted for allegedly being part of an organized crime ring known as the “Cuban Mafia” that “was allegedly involved in cocaine trafficking, arson, gambling and murder,” according to Local10.

The sheriff has also faced corruption accusations: department employees routinely attended campaign events while on the clock for their taxpayer-funded positions, a Local10 investigation found in 2016.

A Sun-Sentinal investigation the same year found that the sheriff had routinely handed out taxpayer-funded jobs to political supporters. The sheriff’s response at the time: “lions don’t care about the opinions of sheep.”

Israel is now facing sharp criticism for his department’s repeated failures to stop Stoneman Douglas school shooter Nikolas Cruz. The sheriff’s office was warned repeatedly that Cruz was a school shooter in the making, by both his relatives and those close to him, but failed to act to prevent the shooting.

Cruz’s guardian told police that the Cruz had “bought tons of ammo,” “used a gun against (people) before” and “put the gun to others’ heads in the past.” (RELATED: The Government Repeatedly Failed To Stop The Parkland Shooter) 

Then, when Cruz opened fire at Stoneman Douglas high school last week, Israel’s sheriff’s deputies stood by as the shooter mowed down defenseless victims.

One of Israel’s sheriff’s deputies, Scot Peterson, stood outside the building and refused to confront the shooter, Israel admitted on Thursday.

Three other Broward County deputies reportedly waited outside while the shooting was going on, according to a report on Friday. Israel did not disclose that fact to the public.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Florida School Attack Exposes Pedophile Jewish Vigilantes

By Yoichi Shimatsu

Feb 19, 2018

Americans need to expose and fight the political criminals who are causing the violence against children.

“And I looked, and beheld a pale horse, and the one sitting on it, the name of him is Death, and Hades was following him; and authority was given to them over a fourth of the Earth” (Revelations 6:8)

Before delving into the sordid details, it should be noted that in the morning of the same Valentine’s Day massacre, that three young men in a truck drove without a permit onto the grounds of the NSA headquarters at Fort Meade, Maryland. Security opened fire on the wheels, and apparently one serviceman was hit by a ricocheting bullet. The young men were found to be high on drugs and claimed they took the wrong turn off from the adjoining road. The Pentagon and White House were put on a terrorist alert, and obviously the NSA suffered momentary confusion, since the truck could well have been mistaken for a suicidal bomb attack. Whether that driving violation was part of a deliberate attempt to throw the nation’s law enforcement off-guard is yet to be determined.

Further south, all hell did break loose on Saint Valentine’s, a Christian holy day dedicated to genuine love based on innocent affection. Then again, heart felt love in rare commodity amid the corruption of South Florida. Broward county, scene of the Parkland school massacre, is know for its Fort Lauderdale casual flings during college-days on Easter weekend (can anyone recall what that holy day stands for?), and is located between Palm Beach, pedophile capital of the Sunshine State, and the Miami-Dade transshipment hub for cocaine and DACA prostitution.

Welcome to Little Israel, where underage youths are traded on the slave block and drugs are more available than a cup of coffee, thanks to the quality of law enforcement, which has been thoroughly penetrated by a secretive Jewish vigilante group known as the Shomrim.

Ever wonder why director Michael Mann (a proud Jewish American as opposed to a fanatic Zionist thug) is permanently banned by the television industry from making a contemporary sequel to Miami Vice? Crockett and Tubbs, where were you on V-Day, when those high school kids needed your gunnery? Now that the tragedy is being hijacked by Congresswoman Debbie Wasserman Schultz for gun control legislation, her supporters in organized crime may soon have a monopoly over firepower. Instead of rolling over and playing dead, Americans need to expose and fight the political criminals who are causing the violence against children.

Little Israel

What’s in a name? The world knows him as Nikolas Cruz, which is the Hispanic surname of his adoptive parents. His biological mother was Jewish, making him a member of that Tribe. Another sign of an Khazar-Ashkenazi bloodline is his red hair, closely cropped on the sides with a step-cut modeled after that Gypsy-Jewish-gang of television series fame known as the Peaky Blinders. That’s why he’s still alive and not suicided like Adam Lanza in Newtown, Connecticut.

Nick Cruz fits into the demographic profile of Parkland in Broward County, the Little Israel of the Southeast region, where the Chosen People number some 150,000, although their population is declining with the die-off of retirees who flocked to the sunshine and racetracks promoted by mob boss Meyer Lansky, godfather of the South Florida real estate boom. The Lansky heritage of Jewish financial and political power is still reflected in the tenacious congresswoman Debbie Wasserman Schultz, who is running for re-election in the November midterms despite the onus of suspicion on her for the deaths of DNC staffer Seth Rich and attorney Shaun Lucas.

His Name is Israel

Say again, what’s in name? How about Sheriff Scott Israel. That a gem of a surname says it all about Broward County law enforcement, which is in charge of student safety in the school system, including the Marjorie Stoneman Douglas High on that fateful day. Every sheriff must take an oath of office: “I do solemnly swear that I will support, protect and defend the Constitution and Government of the United States, and of the State of Florida; that I am duly qualified to hold office under the Constitution of the State; and that I will well and faithfully perform the duties of Broward County Sheriff on which I am now about to enter. So help me God.”

Therefore, if he fails to tell the truth and nothing but the truth, and instead gets involved in covering up a felonious crime, he’s not only betraying the public trust, but also his moral obligation to a higher authority, which we shall hold him to here.

Now for the first truth test: Sheriff Israel and county school superintendent Robert Runcie, an African-American, claimed that the sole Parkland school security officer (who is one of Israel’s deputies) was “somewhere else on campus” and therefore could not respond to the shooting.

The sequence of events tell another story: When the shooting started, one of the teachers hit the button for Code Red, buzzed to every staff member’s cell phone, including and especially the security agent (school resource officer, SRO) Scott Petersen, who has worked at Parkland school since 2009. To counter the lock-down of classroom doors, three separate fire alarms were triggered by the assailant(s) in different buildings. These were loud old-style bells, with ringing that could be heard a long distance. After 6 minutes of gunfire, students had escaped into the outdoor areas or by the street. Still no SRO officer showed up, and the first responders were slow to arrive, enabling the shooter(s) to flee the scene.

As quoted in the daily Fort Lauderdale Sun-Sentinel, a top school administrator citing teacher accounts said about SRO Petersen’s absence on premises: “I have been told by a couple of sources that the SRO was either called off campus responding to something happening or it could have been his day off,” adding that a thorough investigation is needed as to his nonappearance.

Valentine’s Day, which often witnesses fights between boys over a girl’s attention, is never a day off for school guards. Deputy Peterson is under the direct command of the Broward County Sheriff’s department, which has 6,000 employees under a $730 million annual budget (being the biggest sheriff’s office in the entire USA). The only authority that could remove him from campus on a potentially volatile day is the Office of the Sheriff.

Therefore, contrary to speculation at a lot of alt news sites, there was NO DRILL that morning, or else SRO Petersen would have been on campus. There was a Code Red, but it was the real thing and not part of an exercise. Students in non-assaulted classrooms may have confused the Code Red as a drill (the teachers could have been following a pre assigned plan not to alarm their students). And the alt media should take the time to read the local newspapers, especially the Sun-Sentinal, which usually get the facts right before a full-on cover-up comes down. There are certainly many grounds for suspicion in this case, as in similar events in the past, so being fact-based and logical are important to figure out the sequence of events and the more complex issues involved in motives.

So far, no security camera videos have been released showing the chief suspect Cruz making his getaway by blending into the panicked crowd, as assumed but not yet proven. No student or teacher has made a positive identification by facial recognition, which is not easy when bullets are flying. There is still a possibility that Cruz is a patsy, and that the job was done, as in the Sandy Hook attack, by professional gunmen or law enforcement officers.

The Broward police reported arrested him one hour later, after he walked across the street to Walmarts to buy a soda from Subway and then on to McDonald’s where he sat to eat a burger and fries. The geography of Parkland, on the northwest corner of Broward, shows that in a span of 20 minutes, the suspect could have alternatively walked across the county line into either Hendry or Palm Beach counties. There he could have hidden in the dense foliage in the maze of canals until nightfall to make his escape. Instead, he orders a Big Mac to quell his appetite after shooting at dozens of victims. Then, the police force him down onto the grass for the arrest photo. This appears to be staged theater, virtual reality, not the facts.

Airport Shooter

Police officers reported Cruz saying that voices in his head told him to do the shooting. This telltale sign of an MK-ULTRA victim has similarities to another shooting incident in Sheriff Israel’s bailiwick. On Jan. 6, 2017, a gunman walked toward the baggage claim carousels at Fort Lauderdale-Hollywood Airport, and shot dead 6 people with a Walther PPK pistol.

That assailant, a National Guardsman named Esteban Santiago-Ruiz, had earlier visited the FBI field office in Anchorage, Alaska, where he was stationed, to complain that “the U.S. Government was controlling his mind and making him watch videos by the Islamic State of Iraq and the Levant (ISIS), and that the CIA was forcing him to join the group.” Well, Mr. Obama, that shows why so many foreign fighters from western countries joined the terrorist outfit created by your Agency. The coincidence of two shooting incidents, if either or both are actually false flag operations, would indicate that the Broward Sheriff’s Office can be depended on to clean up after the CIA and its partner in crime, the Democratic Party, whose former chief, the must-reviled Debbie Wasserman Schultz, is up for re-election in the November mid-terms. (see my article posted last week.)

Stone Cold Assessment

In the 2008 sheriff’s election campaign, Republican strategist Roger Stone described candidate Scott Israel, then head of the SWAT team that conducted illegal busts in the black community as “an unqualified punk, a racist and a thief.”

Thanks much for that character witness testimony, which confirms our own findings, Roger and out. Younger people have never seen video clips of Florida SWAT from those good old days in the 1980s, when back walls of low-end family homes were blown open with explosives and cops charged inside firing. If evidence could not be found during a raid, the cops planted on the suspect bags of crack, which were produced inside a lab at the Broward County Sheriff’s Office. Most of the confiscated evidence, money, from drug raids disappeared down a black hole. A local SWAT commander had the duty to the force, if not to God, to put a scrubbed handgun down next to the still-quivering body of another dead shvatsa. That’s the Yiddish variation on the “n-word” derived from German “schwartzen” for black.

The “good riddance” tactics explain why so many episodes of Miami Vice featured Sonny Crockett and Rico Tubbs going after thieving punks in the police force. Video cassettes of the Vice series should be mandatory in history classes and citizenship seminars for DACA youths.

Lunatic Fringe

Scott Israel is something worse than your average crooked Miami-style cop, due to his being honored as a “Man of the Year” by Shomrim. That law-defying ultra-Orthodox Jewish vigilante group protects pedophiles, covers up crimes by Zionists, infiltrates police departments, and trains recruits for murderous attacks by Israeli settlers against unarmed Palestinians. These moral men also organize “modesty patrols” to make sure Jewish women are properly attired, much like their counterparts in Salafist Islam, except that this is happening in Brooklyn, Baltimore and Miami.

The Shomrim chapter in South Florida was founded in Miami by a rabbi in the Coast Guard. Go figure. The USCG is tasked with pursuing and arresting drug traffickers and people smugglers. Of course little Haitian DACA girls are a major commodity in the nightclubs and the escort circuit. As for cocaine, the Orthodox Jewish rabbis of Miami have been fervently converted the “Marrano” community (hidden Jews) of Medellin, Colombia, back to the fold, and sending them on to Israel for further indoctrination. For the next major shipment of coke, dope dealers need to search no further than the local synagogue. (It would a spectacular start of a new Vice series to see Sheriff Israel blow out the back wall and make off with the dope and the silver menorahs, and toss a Saturday night special down on top of the rabbi.)

Yiddiots are Yiddish Idiots

Never mind the Holocaust sob story, here is a diamond-hard fact. In 1938, New York Mayor Fiorello La Guardia appointed Shomrin boss Max Finkelstein to provide bodyguards for visiting Nazi officials and protect the consulate of Hitler-run Germany. So my American Jewish friends, it’s high time to wake up to what these pedophile thugs have really been about, as Roger Stone put it so nicely. No yiddiot or shiksa (immodest women) liberal whining over gun control should be tolerated from the likes of DWS, not when it’s your children who are in constant danger of molestation and rape, or a school shooting, by the fetlocked creeps next door.

Instead of wasting interfaith tolerance on Debbie’s gang of hypocrites, here’s the skivvy on Shomrin: It translates as “watchers”, or more technically as “protection” as in racket. The Haredi (ultra-Orthodox) vigilante group is renowned for making “citizen’s arrests” involving brutal beatings of little black boys suspected of petty crimes, for example, stealing cartons of milk for survival of their younger siblings. As for Miranda rights, if they run into a Latino, they’ll beat him to a pulp, too. It so amusing to watch someone like Sen. Chuck Shumer preach interracial tolerance.

Under the code of “mesirah” (to turn over), any Jew who reports a crime by another Jew to the police, including rape of minors, is automatically ostracized as a “moser” (informant) and marked for execution. No, this is not from the Protocols of the Elders, it is a fact of life for Jews and their victims. As put by the authoritative voice of Jewish law, Maimonides (12th century Spain): “It is forbidden to hand over a Jew to the goyem (heathen), neither his person nor his goods, even if he is wicked and a sinner, even if he causes distress and pain to fellow Jews. Whoever hands over a Jew to the goyem has no part in the next world. It is permitted to kill a moser (informant) wherever he is. It is even permitted to kill him before he has handed over (a fellow Jew).”

Apparently, the only clause in the U.S. Constitution that Shomrim members respect is the Fifth Amendment. This outright rejection of U.S. law, including the rulings of the Supreme Court, bring up the question of “Why are these fanatic cultists allowed to hold U.S. citizenship?” Mormon polygamy is outlawed and Charlie Manson died in prison, so how can these wild-eyed zealots be allowed to get away with raping little boys?

You’re probably wondering why haven’t you heard this before. Because it’s a secret society, like their higher-ups in the Illuminati who’ve got the intelligence services, the police and the legal profession under their thumb, and participation in pedophilia is the guarantee of secrecy. Instead of exposing their own, Jewish editors like Marty Baron can go from the Miami Herald to the Boston Globe to accuse Catholic priests, as in the movie “Spotlight”, to divert public attention from the even worse atrocities by the rabbis. This only scratches the surface of Jewish bigotry and immorality, so let’s hope this “I shot the sheriff” expose can be the beginning of investigative journalism on a wide scale.

State-sponsored “Mental Illness”

Let’s turn back to Parkland, where the alleged shooter’s brother Zachary was quickly hauled off to a psychiatric center for the legal limit of 12 hours, apparently for a massive mind-altering dosage. Oddly, there has been zero mention of “younger brother” Zack ever having attended Parkland school. News reports suggest that he’s the younger brother, although Nikolas was adopted immediately at birth from the Jewish mother by the Cruz couple. This means that the “brothers” are unrelated by blood, so there is no genetic factor behind the duo’s mental issues.

The waters are already being muddied by dubious claims in the social media. Nikolas Cruz is portrayed as a troubled loner, as in the case of all such shooters. Yet one of his classmates claimed to be his girlfriend, who dropped him for an African-American rival, provoking his enraged reaction. (This sounds like another “I was bonked by Charlie Manson” claim to fame.) If so, why didn’t an angry Cruz wait outside school on Valentine’s Day to gun them down, instead of whacking 17 unrelated students and teachers? Everyone is trying to get their 15 minutes of fame off of crazy Nick.

Following stepmother Lynda Cruz’s death in late 2017, which happened some 3 months prior to the shooting, the boys were invited to stay at the home of a “family friend”, the Sneads, who are not officially registered as foster parents. The wife famously said: “We had a monster living under our roof and we didn’t know.” That brutal attempt to disassociate speaks for itself. What if he’s innocent? The so-called “confession” means absolutely nothing given the heinous criminal record of the South Florida police for frame-ups of innocent suspects.

Perhaps the couple knew all about the $800,000 inheritance the boys are entitled to receive from the sale of the Cruz family properties, once the estate lawyers complete the paperwork. A war veteran who served with him mentioned that James Snead, who runs an air-conditioner repair service in Coral Springs, served as a military intelligence analyst, meaning there could be an underlying connection to the nexus.

Nikolas was expelled from school apparently early in the first semester of the 2017-18 school year. Parkland school is unwilling to release the records showing grounds for expulsion and whether he was committed to psychiatric treatment. Classmates say “he went away” during those months. His flare-ups of violence, throwing eggs at cars, for instance, apparently occurred earlier.

Drugs alone could have exacerbated his anti-social attitudes, but with midterm elections on the horizon the Democratic Party is desperately in need of the gun control issue to prevent its wipeout by the Republicans. This motive alone suffices, especially when 6 congressional seats of Democrat incumbents, are at stake. The odds are therefore on a planned terror attack for political objectives, meaning Nikolas Jesus Cruz was set up all along as a patsy.

The fact that the brother, who is genetically dissimilar, also has severe mental issues suggest a common or similar social cause for their psychological disorders. In the context of pedophile-center South Florida, the probable cause is pedophilia, possibly related to that region’s booming child porn industry. That would explain the sensitivity of the school report, since photos of the students indicate a disproportionate number of girls with heavy makeup and freaks, kids with a perverse bent in fashion.

Something is rotten in Broward besides Debbie Wasserman Schultz, although they are probably linked at a financial level. What I suspect is that Nikolas Cruz’s previous run-ins with the police got him into the radar range of Parkland’s ultra-Orthodox pedophile circle. He being born a Jew made him an ideal target for Bar Mitzvah “training”. His messages indicate hatred of blacks and Hispanics, but curiously not Jews, aligning his racism identically with that of Shomrim.

His assignment to the Sneads may have been by school administrators trying to keep him out of the clutches of known pedophiles. Perhaps Nikolas resented the fact that he was the golden boy to the Orthodox cult members and then of being taken away on orders from the school.

The only way to begin to solve this case is to prevent Nikolas Jesus Cruz and adoptive brother Zachary from being silenced by the murderous politicians in Florida. The youths need to be moved under a federal witness program to another distant state for debriefing in detail and allowed enough space and comfort to provide honest answers.

The pattern of the shootings suggests at least two gunmen were involved, as indicated by some witnesses. Seven students were shot inside building 12, most of them on the third floor, before going down the stairwell to shoot others outside, but that would only be half of the gunshot victims. Three separate fire alarms were triggered in different locations. All of this happened in the span of 6 minutes, meaning the Parkland school attack appears to be yet another false flag incident done by a team of professional gunman. Which gets back to the earlier issue of why was deputy Petersen called away on that afternoon?

Sheriff Israel also claims that Cruz confessed to entering the school after 2 p.m and hiding in a service closet for two hours. Presumably the lunch hour is over by 1:30 p.m, when the only entrance is locked electronically and security cameras and motion detectors would spot an intruder. The much liklier scenario is that the gunmen had the access codes and may have entered and exited the campus through another route, with the aid of deputy Petersen and the Sheriff’s Department under orders from higher-ups, for example, someone like Eric Holder.

A Jewish Factor at Sandy Hook Elementary School

The Shomrim, with its variants like the Betar militia founded with funds and weapons from the Imperial Japanese military intelligence service, was the foundation for the creation of the Shin Beit internal security group in Israel. The Shin Beit organization structure was re-imported back from Israel into the USA by then Senator Joe Lieberman (D-CT) as the design for his post-911 creation called the Department of Homeland Security (DHS), which was tested in his backyard at the Sandy Hook elementary school in Newtown, Connecticut.

Two years prior to that successful test-run of upgraded school shootings, the ultra-Orthodox Shomrim movement gained control over the UConn campus in Waterbury, CT, which is the closest city to Newtown, just 18 miles apart. There, a yeshiva or Jewish rabbinical seminary was set up to train 200 young male Jews in the Torah and missionary tactics for evicting non-Jews from Israeli-occupied Palestine. What Americans have never comprehended is that Israeli expansionism is not just “over there” in the eastern Mediterranean, but that it begins at home in America with the accumulation of Jewish wealth in the markets and increasing control over real estate, to the ruin of long-established Christian communities.

Lieberman needed to shake down the DHS school security program, which is aimed at turning the public education system into razorwire-wrapped concentration camps, like architect Frank Gehry’s prison-like structures. Some people just can’t seem to get enough of Dachau. (My father was with the 552nd artillery corps when it broke open the gates to free the prisoners, so go ahead JDL and list me an as anti-Semite, as you’ve done before, you miserable pedophile victims.) Anyway, excuse me for that satisfying eye-for-an-eye. So the infrastructure for Sandy Hook was set into place, with a Hassidic yeshiva, a fortress, overlooking the one road in from the Atlantic coast.

The point here is: Sandy Hook serves as the model for Marjorie Stoneman Douglas school, with a Shomrin-ShinBeit unit in place and much of South Florida under Zionist settler control, as was developing in eastern Connecticut.

Handwriting on the Wall

Before signing off, how else is Parkland related to the Newtown attack in December 2012? Adam Lanza, the Sandy Hook suspect, was 20 years old, about the same age as Cruz, and reportedly shot 20 primary school students after killing his mother. As I reported at the time, the killing was probably done by a 2-man team of experienced shooters, retired from the New York State Police, based on their methods and escape route to Upstate New York.

Lanza’e emotional problems went untreated, according to a psychological profile done by Yale University for the state’s child advocate’s office. Cruz, in contrast, did receive repeated psychiatric care at a yet-to-be disclosed hospital. In terms of operational efficiency, the Parkland shooting was more expertly conceived and executed. Cruz was allowed to survive because he is cooperative and likely recruited by the Shomrim, which probably promised him a new start in life in Israel. His death will be faked with substitution by a John Doe’s body.

Location is important for these operations. Florida is most convenient for covert ops, such as the Orlando Pulse operation along with the rest. Newtown is located near centers for the CIA-sponsored MK-ULTRA program at Yale and in its vicinity As I discussed in my Sandy Hook series six years ago, J.D. Salinger wrote “Catcher in the Rye” in 1950-51 in Westbury, which is located very near Newtown, then and now just a Sunday drive through the countryside.

In World War II, Salinger served in the counter-intelligence corps (CIC), but his activities following the liberation of Dachau have gone unreported. CI requires interrogation of prisoners, and by then experimental drugs were tested as truth serums, the real start to MK-ULTRA. In 1938, the Sandoz pharmaceutical lab in Switzerland refined LSD from ergot, a mildew that grows on rye (which explains the book title) and human experimentation started in 1940.

As his final sentences at the end of Catcher assert: “’Don’t ever tell anybody anything. If you do, you start missing everybody.’ All the dead soldiers.”

A lot of those fallen soldiers in the drug tests at the military-supervised labs must have been children. The spoiler for Catcher is the protagonist Holden Caulfield’s dream of saving children falling out of the sky onto a field of rye. The key to preventing another Deep State-sponsored operation like Newtown or Parkland is for all of us to not just be hit-or-miss catchers desperately scrambling below the screaming children, but to once and for all to shoot down that damned airplane tossing kids out of its bomb bay.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Roger Stone who aided Sheriff Israel’s 2012 campaign

By Stew Webb Federal Whistle blower

Roger Stone who claims LBJ murdered JFK, not true Daddy Bush killed JFK.

Stone is a regular on Israel’s stooge Alex Jones radio a disinformation mouth for Daddy Bush.

You be the Judge??

Among the sheriff’s hires: three associates of the notorious political trickster Roger Stone, who aided Israel’s 2012 campaign; Israel’s campaign political strategist; the husband of Israel’s campaign manager; several members of his 2012 campaign team, and a Republican activist from New York.

Michael Colapietro, Dianne Thorne and Jennifer Hobbs, all associates of Fort Lauderdale-based political operative Roger Stone, who helped get Israel elected in 2012. Colapietro is a community affairs specialist II making $55,367. Thorne was hired as assistant to the chief of staff (Castillo) making $67,956. She has since departed. Hobbs was hired as a community affairs specialist making $65,980. She has since departed

Israel has also been scrutinized for his relationship with political operative Roger Stone. A Fort Lauderdale resident who built his career on smearing political enemies, Stone had a hand in the political campaigns of Richard Nixon, John McCain and Donald Trump. While backing then sheriff Al Lamberti in 2011, Stone told the Sun-Sentinel that “Scott Israel is an unqualified punk, a racist and a thief.”

 

Sheriff’s hiring of political supporters under fire

Since winning one of the most powerful elected posts in Broward, Sheriff Scott Israel has hired from the ranks of his political supporters, building a community outreach wing his critics say doubles as a re-election team.

The supporters receive public funds to go out into the community, including to political meetings, touting the agency’s successes under Israel, and getting feedback. Some of the same employees campaign for the sheriff at the polls. Broward Sheriff’s Office officials said they’re doing so on their free time.

Israel’s hiring practices have been criticized by his political foes since his 2012 election, but the controversy has moved to the forefront this year as he runs for re-election. He faces three fellow Democrats in the Aug. 30 primary; the winner faces a Republican in November.

A log of employees hired by the sheriff shows 10 workers were hired since 2013 into “outreach” roles, their salaries totalling $634,479. The unit is embedded into a $2.4 million community services division. When the budget year closes out in October, the outreach team expects to have made contact with 320,000 people, budget documents say.

The outreach workers, who mainly attend community events, are in addition to political activists and others Israel hired into community affairs roles, writing and designing printed pieces about the agency, and sharing it on social media. The employee log shows six hired into community affairs roles, their salaries totaling $388,729.

Israel’s opponents say he’s built a publicly funded political machine, paying back supporters with jobs and using them to keep him in office. They say the money could be better spent, particularly after the sheriff complained about not having enough funding to secure the county courthouse, where a murder suspect recently escaped.

Israel said he built the outreach wing from nearly nothing, aiming to foster “a love affair with the community.” He said it would engender trust with the community that was lacking under the tenure of predecessor Al Lamberti. He defending the tapping of people he knew, some from the campaign trail, into outreach and other roles.

What have I done differently than Don Shula or Abraham Lincoln or Martin Luther King, Ghandi?” asked Israel. “Men and women who assume leadership roles surround themselves with people who are loyal, who they can depend on and who they appreciate their skill set.”

Among the sheriff’s hires: three associates of the notorious political trickster Roger Stone, who aided Israel’s 2012 campaign; Israel’s campaign political strategist; the husband of Israel’s campaign manager; several members of his 2012 campaign team, and a Republican activist from New York.

At least one of the activists was hired as a deputy, but most are in civilian roles.

Candidate Willie Jones, a former BSO sergeant, said the sheriff is using BSO as “an extension of his political machine.”

Jones, who has a background in human resources, said when jobs are filled with friends and former colleagues, the longtime existing employees in the sheriff’s staff of 5,800 feel there’s little upward mobility.

Besides hiring from the political world, Israel filled some of the top jobs with former colleagues from Fort Lauderdale Police Department. He also made a childhood friend from Long Island, Anthony Stravino, the BSO fire chief. (Stravino has since departed for another job.)

“When people feel unwanted, unappreciated in the workforce, it reflects poorly on their job performance,” Jones said. “They do just enough to get through and survive.”

Opponent Jim Fondo, a former district chief for BSO, promises voters “less politics, more public safety!”

“It’s sad,” he said. “All of these people he’s hired, they’re all out at the polls. They’re sitting at the polls.”

Another candidate, Edison Jules, said the hiring of political activists whose campaigning for his re-election blurs the lines between their public and private roles is “inappropriate.”

“If you’re not part of his cliques,” Jules said, “you don’t get hired.”

But to criticize the team he built, Israel said, is to criticize “a team that won the Super Bowl.”

He cited a dramatic drop in violent crime during his tenure, and the issuing of thousands of civil citations — rather than arrests — for juveniles. Using one of his well-worn sayings, he said “lions don’t care about the opinions of sheep,” and maintained that he doesn’t spend “more than 10 seconds” listening to his opponents’ criticisms.

He said he noticed during the Olympic games that U.S. swimmer Michael Phelps stared ahead as he waited for the starting gun. But Ryan Lochte, his rival, focused on Phelps.

What he gleaned from that, he said, was that “winners concentrate on winning. Losers concentrate on winners. And that’s why they’re concentrating on me.”

To view the candidates’ answers to the Sun Sentinel candidate questionnaires, go to SunSentinel.com/browardsheriff.

Israel’s hires

  • Angelo Castillo and his wife, Lisa Castillo. Angelo Castillo is a Pembroke Pines city commissioner. He’s now also BSO’s director of strategic planning and research, making $126,789. Lisa Castillo is chief of staff at BSO, making $122,038. She used to work for then-County Commissioner Jim Scott and worked with lobbyist and political consultant Judy Stern, on the sheriff’s unsuccessful 2008 campaign.
  • Shevrin Jones, a state representative and son of West Park Mayor Eric Jones. He’s working as a research specialist part-time, that would pay $61,139 if full-time.
  • Nezar Hamze, an activist who is regional operations director for the Council on American-Islamic Relations Florida. He’s working as a sheriff’s deputy, at a salary of $49,274.
  • Wally Eccleston, a political consultant and husband of Israel campaign manager Amy Rose. Eccleston originally was hired as a purchasing agent and now is a community outreach manager making $78,489. The agency also had said it was bringing Rose on as a lobbyist, but she ultimately was not hired.
  • Elgin Jones, a former union leader and writer for the South Florida Times, targeted to Broward’s black community. Jones is community affairs manager, making $77,948. He continued writing for the newspaper after being hired at BSO.
  • Michael Colapietro, Dianne Thorne and Jennifer Hobbs, all associates of Fort Lauderdale-based political operative Roger Stone, who helped get Israel elected in 2012. Colapietro is a community affairs specialist II making $55,367. Thorne was hired as assistant to the chief of staff (Castillo) making $67,956. She has since departed. Hobbs was hired as a community affairs specialist making $65,980. She has since departed.
  • Kevin Ryan, the former president of the Northeast Queens Republican Club. Ryan is a community affairs specialist II making $67,299. Sheriff Israel also is a former New Yorker, and a former Republican, according to elections office records. Ryan also hosted Stone for a book signing.
  • Patti Lynn, a former political candidate, former head of the Broward Coalition group of homeowner associations and member of the Dolphin Democrats. She’s also a former dispatcher and police officer. Lynn is a special projects coordinator making $61,042.
  • Patrick Jabouin, former president of the Caribbean American Democratic Club of Broward County. He’s a community outreach liaison, making $61,042.
  • Carmen Jones, a former political candidate and activist in Deerfield Beach. She was a community outreach liaison making $45,070, but has since departed.
  • Ron Gunzburger, chief strategist for Israel’s successful 2012 election campaign and for his current re-election campaign. Gunzburger also is son of Sue Gunzburger, a former longtime county commissioner and Democratic activist. As general counsel for BSO, he makes $217,547. His sister also was rehired by Israel, after being terminated by the previous sheriff.
  • Ann Zucker, a Democratic activist and former Weston Democratic Club president who is helping with the sheriff’s re-election campaign. Zucker was a special projects coordinator for BSO, making $67,299, but has departed.
  • Stephen Greenberger, a political activist and campaign fundraiser whose Facebook page is full of photos of himself campaigning for the sheriff’s re-election. He’s a community outreach liaison, $67,299.
  • Don Maines, a former Southwest Ranches councilman active in the sheriff’s re-election campaign. He’s a treatment counselor making $61,093.
  • Harrison Grandwilliams, a Broward Young Democrat and member of the Democratic Executive Committee, who helped Israel get elected in 2012. He was hired as a community outreach liaison at a salary of $49,234. He now works as an aide to County Commissioner Beam Furr.

Related:

Who is Broward County Sheriff Scott Israel?

The national profile of Broward Sheriff’s Office Sheriff Scott Israel may have risen sharply in the aftermath of the Marjory Stoneman Douglas High School shooting, but the triumphs and missteps of the longtime South Florida cop have been well-documented over the past 10 years.

So have Israel’s strong connections to Parkland. The sheriff now lives in Davie but previously resided in Parkland with his wife, Susan. He is the father of triplets, Brett, Blake and Blair, who all attended Stoneman Douglas. Brett was once the starting quarterback for the school’s football team, even playing under slain assistant football coach Aaron Feis, as did his brothers. Blake, who now attends Palm Beach Atlantic University, was a midfielder in lacrosse at Stoneman. Israel, 61, also coached football at Stoneman Douglas and North Broward Preparatory Academy, and has been the head coach of the Coral Springs Chargers Tackle Football Team. In 2008, he won a Brian Piccolo Coach of the Year award.

Born in New York, Israel is the son of a New York homicide detective. He began his career as a patrol officer for the Fort Lauderdale police department in 1979, later working narcotics in the 1980s and 1990s, when crime was rampant. Israel has been the subject of 10 internal affairs complaints, mainly for excessive force, although he was cleared in all of them. He served a stint as a SWAT commander and was North Bay Village chief of police from 2004 to 2008, but left to run for sheriff in 2008 and 2012. Israel eventually won in 2012, and easily won re-election in 2016.

Israel has historically been vocal concerning gun violence, opposing open-carry legislation and one law that would allow concealed weapons on campuses. He began implementing body cameras for his deputies in 2016. This week, Israel announced that deputies guarding Broward County Schools will now carry rifle, including AR-15s.

On Thursday, the Sun-Sentinel reported that a police officer assigned to Stoneman Douglas resigned after failing to enter the Parkland school as a gunman opened fire and killed 17 students and faculty. Israel said Deputy Scot Peterson should have “went in. Addressed the killer. Killed the killer.” The sheriff placed two other deputies under investigation for their handling of possible warnings about the shooter, Nikolas Cruz.

This isn’t the first time Israel’s agency has encountered trouble over its response to a mass shooting. Months after the Greater Fort Lauderdale-Hollywood Airport shooting, a 2017 Sun-Sentinel investigation revealed that Israel’s Broward Sheriff’s Office failed to “seize control and set up an effective command system” at the airport. BSO “erred from the very beginning in controlling the shooting scene in the baggage claim area of Terminal 2, where five people died and six others were wounded.” The reason, cited in a 99-page draft report by the agency itself, mentioned the sheriff’s office’s aging radio system, which garbled communications among officers, forcing police to improvise with “hand signals, runners and cellphones.”

Israel has also been scrutinized for his relationship with political operative Roger Stone. A Fort Lauderdale resident who built his career on smearing political enemies, Stone had a hand in the political campaigns of Richard Nixon, John McCain and Donald Trump. While backing then sheriff Al Lamberti in 2011, Stone told the Sun-Sentinel that “Scott Israel is an unqualified punk, a racist and a thief.”

One year later, Stone switched sides, helping Israel defeat Lamberti in the 2012 sheriff’s race. Since then, Israel “added to BSO’s payroll Stone’s book-writing partner, Stone’s book publicist and Stone’s long-time executive assistant,” and even had “Stone’s stepson transferred to detective.”

Citing mud slinging between Israel and Lamberti during the 2012 race, the Sun-Sentinel’s Editorial Board endorsed no one in that year’s primary for Broward County Sheriff. The Editorial Board backed Israel for his 2016 re-election as sheriff, writing that burglaries and violent crimes in BSO-patrolled areas were “way down” in the sheriff’s first term.

As Israel significantly trailed Lamberti in the 2012 race, the Sun-Sentinel reported that a late infusion of attack-ad cash from former Aerosmith guitarist Richie Supa, of Plantation, and Massachusetts construction magnate Robert Pereira helped tip the election in Israel’s favor. According to the same story, Pereira alone gave $245,000 to groups supporting Israel.

Israel also came under scrutiny in 2015 after a Broward grand jury indicted Deputy Peter Peraza in the 2013 slaying of Jermaine McBean, who was shot dead by the office in his apartment complex for toting an air rifle in public. Peraza became the first cop charged in an on-duty shooting in Broward since 1980, and public trust waned in the Broward Sheriff’s Office, prompting Israel to tell the Sun-Sentinel, “It’s a tough time to be a cop.”

After much speculation over the sheriff’s religious affiliations, Israel told the Sun-Sentinel in 2016 that he is Jewish and “attends the Parkland Chabad from time to time.” Israel leaned heavily on his faith during the 2016 campaign, saying this in one campaign ad flier: “My late father Sonny Israel fought in the Korean War and became a police officer because he believed in the call from the Talmud.” This came after multiple public speeches from Israel laced with Scriptural references, comments about “church pews” and his reluctance to discuss his spiritual beliefs.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




US CIA or Israel Mossad Cyber attacks against Stew Webb Whistleblower 2018-02-08

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Note: These links are cyber terror attacks trying to plant malicious codes in stewwebb.com

this was after the cia was blocked see previous us cia cyber attacks against stew webb whistleblower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

US CIA or Israel Mossad Cyber attacks against Stew Webb Whistleblower 2018-02-08
Malicious File Upload
Valencia, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/dzs-portfolio/admin/upload.php
2/8/2018 8:05:52 PM (34 minutes ago)
IP: 50.113.182.82 Hostname: pxy01twcca.ladc.ca.charter.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X; sl-SI) AppleWebKit/531.36.7 (KHTML, like Gecko) Version/4.0.5 Mobile/8B115 Safari/6531.36.7
NetRange: 50.113.0.0 – 50.113.255.255
[65536 addresses in this network]
CIDR: 50.113.0.0/16 (50.113.0.0 – 50.113.255.255)
[65536 addresses in this network]
NetName: RRWE
NetHandle: NET-50-113-0-0-1
Parent: NET50 (NET-50-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS11955, AS21522, AS20001
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2011-05-20
Updated: 2011-05-20
Ref: https://whois.arin.net/rest/net/NET-50-113-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 13820 Sunrise Valley Drive
City: Herndon
StateProv: VA
PostalCode: 20171
Country: US
RegDate: 2000-10-04
Updated: 2017-01-30
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

ReferralServer: rwhois://ipmt.rr.com:4321

OrgTechHandle: IPTEC-ARIN
OrgTechName: IP Tech
OrgTechPhone: +1-703-345-3416
OrgTechEmail: abuse@rr.com
OrgTechRef: https://whois.arin.net/rest/poc/IPTEC-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN
pxy01twcca.ladc.ca.charter.com
Domain IPv4 address Ranking Alexa Pagerank
charter.ac.th 61.47.2.173 4
charter.accountants 37.58.107.93
charter.adult
charter.africa 199.73.55.48
charter.agency 66.96.160.140
charter.airforce 184.168.221.54
charter.amsterdam 52.58.78.16
charter.asia 192.64.147.221
charter.at 144.76.42.134
charter.bar 89.31.143.1
charter.be 52.58.78.16
charter.bet 216.239.131.99
charter.bg 85.25.148.40 1
charter.biz 54.208.24.193
charter.biz.ua 185.67.0.201
charter.bm 192.254.189.223 3
charter.business 89.31.143.1
charter.by 93.125.99.156 0
charter.bz 208.91.197.130
charter.ca 149.56.27.142 3
charter.capital 50.63.202.27
charter.casa 209.99.40.225
charter.cc
charter.center
charter.ch 128.65.195.67 3
charter.chat 34.195.211.251
charter.cheap
charter.city
charter.cloud 50.63.202.13
charter.cm 103.224.182.252
charter.cn 23.27.192.117
charter.co 208.73.211.70
charter.co.id 54.251.170.4
charter.co.in 45.55.118.33
charter.co.kr 121.78.127.249
charter.co.nz 13.210.235.63 2
charter.co.th 61.19.246.34 0
charter.co.uk 193.0.60.152 396,797
charter.co.za 197.221.14.32
charter.coach 198.46.82.242
charter.com 142.136.81.135 35,563 6
charter.com.au 52.64.13.194 4
charter.com.co 107.180.44.131 1
charter.com.eg 212.129.60.22
charter.com.mx 72.52.4.122
charter.com.pl
charter.com.ua 62.149.0.230
charter.community 216.239.32.21
charter.company 192.64.147.227
charter.coop 90.161.233.239
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Netherlands was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:59:23 PM (39 minutes ago)
IP: 103.251.164.13 Hostname: 103.251.164.13
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows NT 5.1) AppleWebKit/5321 (KHTML, like Gecko) Chrome/38.0.821.0 Mobile Safari/5321
% Information related to ‘103.0.0.0 – 103.255.255.255’
[16777216 addresses in this network]
% Abuse contact for ‘103.0.0.0 – 103.255.255.255’ is ‘security@apnic.net’
[16777216 addresses in this network]
inetnum: 103.0.0.0 – 103.255.255.255
[16777216 addresses in this network]
netname: APNIC-AP
descr: Asia Pacific Network Information Centre
descr: Regional Internet Registry for the Asia-Pacific Region
descr: 6 Cordelia Street
descr: PO Box 3646
descr: South Brisbane, QLD 4101
descr: Australia
country: AU
admin-c: HM20-AP
admin-c: IANA1-AP
tech-c: NO4-AP
mnt-by: APNIC-HM
mnt-lower: APNIC-HM
mnt-irt: IRT-APNIC-AP
status: ALLOCATED PORTABLE
last-modified: 2016-06-24T00:32:40Z
source: APNIC

irt: IRT-APNIC-AP
address: Brisbane, Australia
e-mail: helpdesk@apnic.net
abuse-mailbox: security@apnic.net
admin-c: HM20-AP
tech-c: NO4-AP
auth: # Filtered
remarks: APNIC is a Regional Internet Registry.
remarks: We do not operate the referring network and
remarks: is unable to investigate complaints of network abuse.
remarks: For more information, see www.apnic.net/irt
mnt-by: APNIC-HM
last-modified: 2011-01-24T04:06:22Z
source: APNIC

role: APNIC Hostmaster
address: 6 Cordelia Street
address: South Brisbane
address: QLD 4101
country: AU
phone: +61 7 3858 3100
fax-no: +61 7 3858 3199
e-mail: helpdesk@apnic.net
admin-c: AMS11-AP
tech-c: AH256-AP
nic-hdl: HM20-AP
remarks: Administrator for APNIC
notify: hostmaster@apnic.net
mnt-by: MAINT-APNIC-AP
last-modified: 2013-10-23T04:06:51Z
source: APNIC

role: Internet Assigned Numbers Authority
address: see http://www.iana.org.
country: US
phone: +1-310-823-9358
e-mail: nobody@apnic.net
admin-c: IANA1-AP
tech-c: IANA1-AP
nic-hdl: IANA1-AP
remarks: For more information on IANA services
remarks: go to IANA web site at http://www.iana.org.
mnt-by: MAINT-APNIC-AP
last-modified: 2011-12-06T03:04:43Z
source: APNIC

person: APNIC Network Operations
address: 6 Cordelia Street
address: South Brisbane
address: QLD 4101
country: AU
phone: +61 7 3858 3100
fax-no: +61 7 3858 3199
e-mail: netops@apnic.net
nic-hdl: NO4-AP
remarks: Administrator for APNIC Network Operations
notify: netops@apnic.net
mnt-by: MAINT-APNIC-AP
last-modified: 2010-12-17T01:17:45Z
source: APNIC
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????
Centerview, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/admin/upload.php
2/8/2018 7:58:07 PM (39 minutes ago)
IP: 76.0.4.88 Hostname: mo-76-0-4-88.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
NetRange: 76.0.0.0 – 76.7.255.255
[524288 addresses in this network]
CIDR: 76.0.0.0/13 (76.0.0.0 – 76.15.255.255)
[1048576 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-76-0-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2006-01-19
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-76-0-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
he first DNS server is authns2.qwest.net. The current IPv4 address is 64.45.201.2. The mail server with the highest priority is mc3.centurylinkservices.net.
DNS server (NS records) authns2.qwest.net (208.44.130.120)
authns1.qwest.net (63.150.72.4)
Mail server (MX records) mc3.centurylinkservices.net (205.138.230.170)
mc2.centurylinkservices.net (205.138.231.145)
IP address (IPv4) 64.45.201.2
IP address (IPv6)
ASN number 2379
ASN name (ISP) Embarq Corporation
IP-range/subnet 64.45.192.0/19
64.45.192.0 – 64.45.223.255

Domain IPv4 address Ranking Alexa Pagerank
embarqhsd.com
embarqhsd.info
embarqhsd.net 64.45.201.2 -1
embarqhsd.org
IPv4 routes
Startip Endip Description Country #domains #spamhosts
185.67.40.0 185.67.43.255 DHCP customer net NO 0 0
103.255.150.0 103.255.150.255 Delta Net Dhcp clients 150.0 – 150.255 PK 0 1
103.255.151.0 103.255.151.255 Delta Net Dhcp clients 151.0 – 151.255 PK 0 2
5.158.128.0 5.158.191.255 B2B customer static DHCP range DE 736 0
5.179.32.0 5.179.63.255 Residential Wi-Free DHCP IE 0 0
5.179.64.0 5.179.71.255 Residential DHCP IE 5 0
31.185.64.0 31.185.95.255 Syd Energi internet – DHCP pooled DK 40 0
37.128.208.0 37.128.223.255 Syd Energi internet – DHCP pooled DK 190 0
37.228.192.0 37.228.255.255 Residential DHCP IE 17 36
41.58.0.0 41.58.255.255 SWIFT-NETWORKS-DHCP NG 15 25
41.63.128.0 41.63.159.255 2G-3G Public DHCP Services MG 2 3
41.74.16.0 41.74.31.255 2G and 3G public DHCP services MG 7 3
41.74.208.0 41.74.223.255 2G-3G Public DHCP Services MG 0 0
41.217.128.0 41.217.159.255 Assigned for dynamic DHCP pool for RINGO S.A.’s customers in Yaounde. CM 0 1
41.223.100.0 41.223.103.255 Clients whit DHCP in Benguela and Lobito. AO 0 2
41.223.124.0 41.223.127.255 To provide ip for our Nextnet (wireless platform) DHCP MZ 25 1
46.7.0.0 46.7.255.255 Residential DHCP IE 55 1
77.41.0.0 77.41.127.255 BRAS E-320-01 DHCP-pool RU 301 3
78.157.96.0 78.157.127.255 Syd Energi internet – DHCP pooled DK 258 0
79.97.0.0 79.97.255.255 Residential DHCP IE 78 1
79.133.0.0 79.133.31.255 Residential broadband access, DHCP addressing. FI 12 0
80.242.112.0 80.242.127.255 CMTS BL-10K-01 – DHCP POOL BA 6 0
81.13.128.0 81.13.255.255 IP DHCP Villages CH 24 3
81.24.240.0 81.24.247.255 DHCP pool for broadband cable modem RS 0 0
84.205.128.0 84.205.159.255 FTTx DHCP Client Pool FR 0 0
85.191.0.0 85.191.127.255 AURA – DHCP Dynamic DK 641 1
89.20.224.0 89.20.255.255 DHCP nett for Enivest NO 25 0
89.98.0.0 89.99.255.255 Residential DHCP NL 422 2
89.150.64.0 89.150.127.255 DHCP customers of Danish Broadband A/S DK 39 0
89.237.0.0 89.237.63.255 Southern Urals TransTelecom MSS DHCP + IPoE RU 43 1
92.241.128.0 92.241.159.255 CMTS NTK-01 DHCP pool BA 15 0
93.92.56.0 93.92.63.255 COMUNIQUE-DHCP-POOL-3 HU 1 0
93.94.216.0 93.94.223.255 ADC SOHO internet access dhcp address range AM 36 0
93.152.128.0 93.152.255.255 OnlineDirect DHCP Pool Space BG 243 17
93.186.0.0 93.186.15.255 FTTC-DHCP-POOL-NORD DE 9 0
94.138.64.0 94.138.95.255 Syd Energi internet – DHCP pooled DK 253 0
95.85.128.0 95.85.191.255 DHCP pool for broadband cable modem customers RS 1 29
95.157.0.0 95.157.63.255 DHCP Space DE 53 0
111.125.152.0 111.125.159.255 KBL035 WLL BTS in Kabul (DHCP pool allocated to subscribers) AF 0 0
124.195.192.0 124.195.223.255 Dhivehinet-ADSL-DHCP-POOL MV 7 7
151.252.216.0 151.252.223.255 Pool for DHCP connections DE 7 0
154.70.96.0 154.70.127.255 Assigned to Broadband DHCP Postpaid Customers Douala CM 26 4
154.120.128.0 154.120.191.255 2G and 3G public DHCP services MG 7 4
165.16.240.0 165.16.255.255 DHCP rnge for FTTH users ZA 0 0
165.90.224.0 165.90.239.255 Voice and Data IPC dhcp Pool ZA 0 0
176.61.0.0 176.61.127.255 Residential DHCP IE 36 1
178.16.208.0 178.16.223.255 I2B DHCP IPs for Broadband customers, Sollentuna (Core 1) SE 50 0
178.21.48.0 178.21.55.255 COMUNIQUE-DHCP-POOL-3 HU 0 1
178.23.96.0 178.23.103.255 Cabel Modem DHCP Pool NO 12 1
178.132.224.0 178.132.239.255 Syd Energi internet – DHCP pooled DK 112 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 12 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 160 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 922 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
2001:df1:3f00:: 2001:df1:3f00:ffff:ffff:ffff:ffff:ffff Crystal Net Pte Ltd SG 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,005 74
20911 Net-Surf.net Ltd. BG 28 0 69 12
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 166 0
1618 Daytona Net Works, Inc. US 2 0 252 1
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 20 2
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 49 2 4,021 16
3254 Lucky Net Ltd UA 4 0 2,373 0
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 2
3595 Global Net Access, LLC US 37 3 91,367 13
3931 Logical Net Corporation US 6 0 744 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,844 22
4776 A-Net Co., Ltd. TH 35 1 147 2
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 385 13 33,876 741
5405 CSO.net Internet Services GmbH AT 1 1 3,955 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 676 7
6364 Atlantic.net, Inc. US 47 5 18,807 1
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,938 0 11,120 12
6624 Gower.Net US 2 0 27 0
6735 sdt.net AG DE 6 0 301 1
6831 Net & Com s.r.l. IT 2 1 649 0
6911 Pro-Net Internet Services Limited GB 4 0 165 0
7106 Com Net, Inc. US 9 1 964 0
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 3 0 0
7350 MetComm.Net, LLC US 1 0 38 0
7403 Colba Net Inc. CA 9 0 289 0
7600 Escape.net AU 54 4 518 0
7641 China Broadcasting TV Net CN 9 0 51 0
7806 Binary Net, LLC US 14 0 1,276 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,397 0
8057 Vision Net, Inc. US 43 1 315 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 294 8
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 506 0 342 3,679

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????????
Mount Gilead, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-portfolio/upload.php
2/8/2018 7:56:52 PM (39 minutes ago)
IP: 71.213.176.237 Hostname: 71-213-176-237.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Opera/8.91 (Windows 95; sl-SI) Presto/2.12.257 Version/12.00
NetRange: 71.208.0.0 – 71.223.255.255
[1048576 addresses in this network]
CIDR: 71.208.0.0/12 (71.208.0.0 – 71.223.255.255)
[1048576 addresses in this network]
NetName: QWEST-INET-118
NetHandle: NET-71-208-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2005-05-06
Updated: 2013-09-16
Ref: https://whois.arin.net/rest/net/NET-71-208-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????
malicious file upload
Kissimmee, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/upload.php
2/8/2018 7:56:33 PM (1 minute ago)
IP: 71.54.179.124 Hostname: fl-71-54-179-124.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
NetRange: 71.48.0.0 – 71.55.255.255
[524288 addresses in this network]
CIDR: 71.48.0.0/13 (71.48.0.0 – 71.63.255.255)
[1048576 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-71-48-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2005-04-26
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-71-48-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
This domain is hosted by Embarq Corporation (AS2379). The first DNS server is dns-auth-2.centurylinkservices.net. The current IPv4 address is 64.45.201.2. The mail server with the highest priority is mail.centurylinkservices.net.
DNS server (NS records) dns-auth-2.centurylinkservices.net (208.44.130.120)
dns-auth-3.embarqservices.net (63.150.72.4)
dns-auth-1.embarqservices.net (63.150.72.4)
dns-auth-5.embarqservices.net (63.150.72.4)
dns-auth-1.centurylinkservices.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
dns-auth-4.embarqservices.net (208.44.130.120)
authns1.qwest.net (63.150.72.4)
dns-auth-3.centurylinkservices.net (63.150.72.4)
dns-auth-5.centurylinkservices.net (63.150.72.4)
dns-auth-4.centurylinkservices.net (208.44.130.120)
dns-auth-2.embarqservices.net (208.44.130.120)
Mail server (MX records) mail.centurylinkservices.net (209.26.88.20)
IP address (IPv4) 64.45.201.2
IP address (IPv6)
ASN number 2379
ASN name (ISP) Embarq Corporation
IP-range/subnet 64.45.192.0/19
64.45.192.0 – 64.45.223.255

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Nusajaya, Malaysia visited http://www.stewwebb.com/
2/8/2018 7:55:24 PM (4 minutes ago)
IP: 60.51.63.126 Hostname: 60.51.63.126
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6
% Information related to ‘60.51.0.0 – 60.51.255.255’
[65536 addresses in this network]
% Abuse contact for ‘60.51.0.0 – 60.51.255.255’ is ‘abuse@tm.com.my’
[65536 addresses in this network]
inetnum: 60.51.0.0 – 60.51.255.255
[65536 addresses in this network]
netname: ADSL-STREAMYX
descr: TMNST
country: MY
admin-c: EAK2-AP
tech-c: EAK2-AP
status: ASSIGNED NON-PORTABLE
mnt-by: MAINT-AP-STREAMYX
mnt-lower: MAINT-AP-STREAMYX
mnt-routes: MAINT-AP-STREAMYX
mnt-irt: IRT-TMNST-MY
notify: tmcops@tm.net.my
last-modified: 2014-05-15T02:43:00Z
source: APNIC

irt: IRT-TMNST-MY
address: TELEKOM MALAYSIA BERHAD
address: TM BRICKFIELD
address: Jalan Tun Sambanthan
address: 43200 KUALA LUMPUR
e-mail: ipmc_ipcore@tm.com.my
abuse-mailbox: abuse@tm.com.my
admin-c: TIA7-AP
tech-c: TIA7-AP
auth: # Filtered
mnt-by: MAINT-AP-STREAMYX
last-modified: 2014-02-11T03:36:40Z
source: APNIC

person: EMRAN AHMED KAMAL
nic-hdl: EAK2-AP
e-mail: abuse@tm.com.my
address: Telekom Malaysia
address: Jalan Pantai Baru, Kuala Lumpur.
phone: +6-03-83185434
fax-no: +6-03-22402126
country: MY
mnt-by: TM-NET-AP
abuse-mailbox: abuse@tm.com.my
last-modified: 2014-02-11T04:58:41Z
source: APNIC

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
???????????????????????
Malicious File Upload
United States Warrenton, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/uploader/uploadify/uploadify.php
2/8/2018 7:55:17 PM (5 minutes ago)
IP: 174.125.14.182 Hostname: 174-125-14-182.dyn.centurytel.net
Human/Bot: Bot
IP address 174.125.14.182
Location Warrenton, Missouri, United States
IP address 174.125.14.182
Reverse DNS (PTR record) 174-125-14-182.dyn.centurytel.net
DNS server (NS record) authns1.qwest.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
ASN number 22561
ASN name (ISP) CenturyTel Internet Holdings, Inc.
IP-range/subnet 174.125.0.0/16
174.125.0.0 – 174.125.255.255
Number of SPAM hosts on 174.125.0.0/16 32
centurytel.net
This domain is hosted by Synacor, Inc. (AS36271). The first DNS server is authns2.qwest.net. The current IPv4 address is 69.168.97.85. The mail server with the highest priority is mx.centurylink.net.
v=spf1 include:centurylink.net ip4:206.152.134.0/24
ip4:209.235.148.0/24 ip4:209.235.152.0/24 ip4:205.219.233.0/24
ip4:69.179.208.252 ip4:209.142.136.105 ~a
DNS server (NS records) authns2.qwest.net (208.44.130.120)
authns1.qwest.net (63.150.72.4)
Mail server (MX records) mx.centurylink.net (206.152.134.65)
IP address (IPv4) 69.168.97.85
IP address (IPv6)
ASN number 36271
ASN name (ISP) Synacor, Inc.
IP-range/subnet 69.168.97.0/24
69.168.97.0 – 69.168.97.255

Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_6_6 rv:2.0) Gecko/20161124 Firefox/36.0
Domain IPv4 address Ranking Alexa Pagerank
centurytel.adult
centurytel.ch 216.239.38.21
centurytel.com 155.70.44.25 7
centurytel.info
centurytel.net 69.168.97.85 5
centurytel.porn
centurytel.sex
centurytel.xxx 199.253.28.249 -1
centurytelarena.com
centurytelbusiness.com 155.70.55.25 -1
centurytelcenter.com 208.91.196.113 4
centurytelco.com 162.241.217.210
centuryteldigitaltv.com 184.168.221.47
centurytele.com 52.73.124.185
centurytelecom.com 207.148.248.143
centurytelecom.com.br 174.36.74.106
centurytelecom.net 212.32.242.61
centurytelecom.net.br 174.36.74.106
centurytelecomhn.com 74.208.236.253
centurytelemail.com
centurytelemail.net 64.91.66.178 -1
centurytelembarqmerger.com 155.70.44.25 -1
centurytelephone.com 54.174.212.152
centurytelevision.co.uk 217.160.0.216
centurytelfax.com
centurytelgallery.com 204.115.251.24 -1
centurytelhosting.com
centurytelhotspots.com 155.70.44.25 7
centurytelink.com
centurytelink.net
centurytelink.org
centurytelinsider.com 64.91.66.179 -1
centurytell.com 69.162.80.54
centurytell.net 208.91.196.94
centurytellincv.com 206.188.192.54
centurytellink.com 72.52.4.122
centurytellink.net
centurytellink.org
centurytelmail.net
centurytelmyway.com
centurytelnet.com 173.230.149.193 0
centuryteloffers.com 184.168.221.57
centurytelpersonaltouch.com
centurytelphones.com
centurytelportal.com
centurytelrewards.com 155.70.55.25 -1
centurytels.net
centurytelsecurity.com
centurytelsolutions.com 155.70.44.25 -1
centurytelsolutions.net 63.172.100.91 -1
IPv4 routes
Startip Endip Description Country #domains #spamhosts
91.109.174.0 91.109.174.255 Comuni Riuniti XL s.r.l. Net 174 IT 0 0
95.182.32.0 95.182.63.255 ASVT-NET-95.182.32 RU 13 0
27.0.156.0 27.0.159.255 6F, Yue Xie Building, No.160-174, Lockhart Road, Wanchai HK 2,899 0
103.106.66.0 103.106.67.255 174.io New Zealand Network NZ 0 0
103.208.8.0 103.208.11.255 6F, Yue Xie Building, No.160-174, Lockhart Road, Wanchai HK 2,452 0
103.106.67.0 103.106.67.255 174.io Anycast Network NZ 0 0
103.208.8.0 103.208.8.255 6F, Yue Xie Building, No.160-174, Lockhart Road, Wanchai HK 0 0
195.123.174.0 195.123.175.255 NTCU 195.123.174.0/23 UA 4 0
202.1.174.0 202.1.174.255 ADSL Subscribers in 202.1.174.0/24 SB 7 1
94.125.168.0 94.125.175.255 Armatis-LC public net 94.125.168.0/24 FR 8 0
94.125.168.0 94.125.168.255 Armatis-LC public net 94.125.168.0/24 FR 8 0
81.26.112.0 81.26.127.255 AS5587.NET ADSL Dyn range 2 GB 0 0
5.152.182.0 5.152.182.255 MMI-A 5.152.182.0/24 GB 74 0
45.126.182.0 45.126.182.255 Action POS LLC – 45.126.182.0/24 HK 330 0
82.163.68.0 82.163.71.255 SuperLink ADSL Service 182 PS 1 0
89.108.182.0 89.108.182.255 89.108.182.0/24 LB 0 0
93.126.182.0 93.126.182.255 93.126.182.0/23, 93.126.184.0/22 LB 0 4
93.126.183.0 93.126.183.255 93.126.182.0/23, 93.126.184.0/22 LB 0 7
93.126.184.0 93.126.187.255 93.126.182.0/23, 93.126.184.0/22 LB 0 12
93.126.184.0 93.126.184.255 93.126.182.0/23, 93.126.184.0/22 LB 0 5
93.126.185.0 93.126.185.255 93.126.182.0/23, 93.126.184.0/22 LB 0 2
93.126.186.0 93.126.186.255 93.126.182.0/23, 93.126.184.0/22 LB 0 2
93.126.187.0 93.126.187.255 93.126.182.0/23, 93.126.184.0/22 LB 0 3
195.123.182.0 195.123.183.255 RIM2000 195.123.182.0/23 UA 0 0
91.198.100.0 91.198.100.255 Al. Jerozolimskie 125/127 PL 0 0
103.68.200.0 103.68.203.255 Woodlands Drive 14 BLK 514 #09-125 SG 0 0
125.255.0.0 125.255.255.255 125.255.0.0/17 JP 1,527 0
193.43.90.0 193.43.90.255 Al. Jerozolimskie 125/127 PL 1 0
202.9.65.0 202.9.65.255 Level 1, 125 Queen St AU 2 0
202.12.103.0 202.12.103.255 Sector 125 IN 1 1
5.105.124.0 5.105.127.255 TRINITY-CLNTS-BLOCK-125 UA 0 3
89.34.125.0 89.34.125.255 Noop-89-34-125-0-24 GB 0 0
125.255.64.0 125.255.95.255 125.255.0.0/17 JP 490 0
125.255.116.0 125.255.119.255 125.255.0.0/17 JP 11 0
125.255.120.0 125.255.127.255 125.255.0.0/17 JP 0 0
125.255.224.0 125.255.231.255 125.255.128.0/17 JP 0 0
125.255.240.0 125.255.255.255 125.255.128.0/17 JP 268 0
178.236.125.0 178.236.125.255 COMENERSOL-125/24 ES 0 0
202.21.96.0 202.21.96.255 MobiNet-Customer-125 MN 1 1
202.21.122.0 202.21.122.255 MobiNet-Customer-125 MN 0 0
31.7.16.0 31.7.31.255 ELISA-DYN-EX-KYMP FI 0 0
85.157.0.0 85.157.255.255 ELISA-DYN FI 195 1
91.198.22.0 91.198.22.255 Dyn Ltd GB 8 0
134.90.208.0 134.90.215.255 Dyn. address space for broadband users RU 0 0
185.38.96.0 185.38.99.255 Dyn Ltd GB 0 0
188.117.192.0 188.117.255.255 RS-IKOMLINE-CUST-CABLE-DYN AT 14 4
31.200.234.0 31.200.235.255 ISP Podryad – ART – PPP Dyn Pool – 1 RU 5 0
46.47.8.0 46.47.15.255 Dyn clients Yaroslavl region RU 0 0
46.47.16.0 46.47.23.255 Dyn clients Yaroslavl region RU 0 0
80.95.38.0 80.95.39.255 Dyn. address space for broadband users RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df3:2600:: 2001:df3:2600:ffff:ffff:ffff:ffff:ffff Woodlands Drive 14 BLK 514 #09-125 SG 0 0
2402:3e40:: 2402:3e40:ffff:ffff:ffff:ffff:ffff:ffff 174.io New Zealand Network NZ 0 0
2a02:e180:: 2a02:e187:ffff:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:: 2a02:e180::ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:1:: 2a02:e180:1:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:2:: 2a02:e180:2:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:3:: 2a02:e180:3:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:4:: 2a02:e180:4:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:5:: 2a02:e180:5:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:6:: 2a02:e180:6:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:7:: 2a02:e180:7:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e180:8:: 2a02:e180:8:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e184:: 2a02:e184:ffff:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e185:: 2a02:e185:ffff:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e186:: 2a02:e186:ffff:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a02:e187:: 2a02:e187:ffff:ffff:ffff:ffff:ffff:ffff Dyn Ltd GB 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 12 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 160 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
137259 174.net.nz Limited NZ 1 1 0 0
56056 Sector 125 IN 2 0 3 1
5668 CenturyTel Internet Holdings, Inc. US 3 0 6 0
7191 CenturyTel Internet Holdings, Inc. US 1 0 0 0
16835 CenturyTel Internet Holdings, Inc. US 17 0 17 0
17047 CenturyTel Solutions, LLC US 1 0 1 0
22561 CenturyTel Internet Holdings, Inc. US 344 0 1,838 136
23126 CenturyTel Solutions, LLC US 40 0 56 0
12714 Net By Net Holding LLC RU 193 2 4,005 74
20911 Net-Surf.net Ltd. BG 28 0 69 12
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 166 0
1618 Daytona Net Works, Inc. US 2 0 252 1
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 20 2
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 49 2 4,021 16
3254 Lucky Net Ltd UA 4 0 2,373 0
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 2
3595 Global Net Access, LLC US 37 3 91,367 13
3931 Logical Net Corporation US 6 0 744 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,844 22
4776 A-Net Co., Ltd. TH 35 1 147 2
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 385 13 33,876 741
5405 CSO.net Internet Services GmbH AT 1 1 3,955 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 676 7
6364 Atlantic.net, Inc. US 47 5 18,807 1
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,938 0 11,120 12
6624 Gower.Net US 2 0 27 0
6735 sdt.net AG DE 6 0 301 1
6831 Net & Com s.r.l. IT 2 1 649 0
6911 Pro-Net Internet Services Limited GB 4 0 165 0
7106 Com Net, Inc. US 9 1 964 0
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 3 0 0
7350 MetComm.Net, LLC US 1 0 38 0
7403 Colba Net Inc. CA 9 0 289 0
7600 Escape.net AU 54 4 518 0
7641 China Broadcasting TV Net CN 9 0 51 0
7806 Binary Net, LLC US 14 0 1,276 0
7850 iHighway.net, Inc. US 22
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????
Malicious File Upload
Belleville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:54:58 PM (6 minutes ago)
IP: 67.234.107.79 Hostname: pa-67-234-107-79.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2

NetRange: 67.232.0.0 – 67.239.255.255
[524288 addresses in this network]
CIDR: 67.232.0.0/13 (67.232.0.0 – 67.239.255.255)
[524288 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-67-232-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2008-01-14
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-67-232-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????
Malicious File Upload
Mebane, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/simple-ads-manager/sam-ajax-admin.php
2/8/2018 7:54:51 PM (8 minutes ago)
IP: 99.194.16.24 Hostname: 99-194-16-24.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_7) AppleWebKit/5312 (KHTML, like Gecko) Chrome/37.0.818.0 Mobile Safari/5312
NetRange: 99.194.0.0 – 99.195.255.255
[131072 addresses in this network]
CIDR: 99.194.0.0/15 (99.194.0.0 – 99.195.255.255)
[131072 addresses in this network]
NetName: NETBLK-CENTURYTEL13
NetHandle: NET-99-194-0-0-1
Parent: NET99 (NET-99-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2007-09-04
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-99-194-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgTechHandle: NA397-ORG-ARIN
OrgTechName: Network Availability
OrgTechPhone: +1-800-809-1410
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/NA397-ORG-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????????
United States Lake Saint Louis, United States tried to access non-existent page http://stewwebb.com/wp-content/plugins/gallery-slider/register.php
2/8/2018 7:54:47 PM (10 minutes ago)
IP: 174.125.5.69 Hostname: 174-125-5-69.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/5322 (KHTML, like Gecko) Chrome/39.0.836.0 Mobile Safari/5322
NetRange: 174.124.0.0 – 174.125.255.255
[131072 addresses in this network]
CIDR: 174.124.0.0/15 (174.124.0.0 – 174.127.255.255)
[262144 addresses in this network]
NetName: NETBLK-CENTURYTEL14
NetHandle: NET-174-124-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2009-04-07
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-124-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgTechHandle: NA397-ORG-ARIN
OrgTechName: Network Availability
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/NA397-ORG-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????
Bucyrus, United States tried to access non-existent page http://stewwebb.com/wp-content/plugins/cardoza-facebook-like-box/cardoza_facebook_like_box.php
2/8/2018 7:54:42 PM (11 minutes ago)
IP: 71.213.242.51 Hostname: 71-213-242-51.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Opera/8.27 (X11; Linux i686; en-US) Presto/2.9.234 Version/11.00
NetRange: 71.208.0.0 – 71.223.255.255
[1048576 addresses in this network]
CIDR: 71.208.0.0/12 (71.208.0.0 – 71.223.255.255)
[1048576 addresses in this network]
NetName: QWEST-INET-118
NetHandle: NET-71-208-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2005-05-06
Updated: 2013-09-16
Ref: https://whois.arin.net/rest/net/NET-71-208-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
???????????????????????????????????????????????????
Malicious File Upload
Trussville, United States was blocked by firewall for a Malicious File Upload in file: files=2W4yr.php.php.png at http://stewwebb.com/wp-admin/admin-ajax.php?action=load_ajax_function
2/8/2018 7:54:33 PM (13 minutes ago)
IP: 174.125.207.38 Hostname: 174-125-207-38.dyn.centurytel.net
Human/Bot: Bot
Browser: undefined
Opera/8.18 (Windows 98; Win 9x 4.90; sl-SI) Presto/2.11.335 Version/10.00
NetRange: 174.124.0.0 – 174.125.255.255
[131072 addresses in this network]
CIDR: 174.124.0.0/15 (174.124.0.0 – 174.127.255.255)
[262144 addresses in this network]
NetName: NETBLK-CENTURYTEL14
NetHandle: NET-174-124-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2009-04-07
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-124-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: NA397-ORG-ARIN
OrgTechName: Network Availability
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/NA397-ORG-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
???????????????????????????????
Shippensburg, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/page-google-maps/pr.php
2/8/2018 7:54:28 PM (14 minutes ago)
IP: 67.234.191.187 Hostname: pa-67-234-191-187.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux i686) AppleWebKit/5340 (KHTML, like Gecko) Chrome/38.0.825.0 Mobile Safari/5340
NetRange: 67.232.0.0 – 67.239.255.255
[524288 addresses in this network]
CIDR: 67.232.0.0/13 (67.232.0.0 – 67.239.255.255)
[524288 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-67-232-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2008-01-14
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-67-232-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????
Malicious File Upload
United States Centerburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:54:07 PM (16 minutes ago)
IP: 71.213.21.24 Hostname: 71-213-21-24.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows CE; en-US; rv:1.9.2.20) Gecko/20100828 Firefox/36.0
NetRange: 71.208.0.0 – 71.223.255.255
[1048576 addresses in this network]
CIDR: 71.208.0.0/12 (71.208.0.0 – 71.223.255.255)
[1048576 addresses in this network]
NetName: QWEST-INET-118
NetHandle: NET-71-208-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2005-05-06
Updated: 2013-09-16
Ref: https://whois.arin.net/rest/net/NET-71-208-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????????
Sparta, United States was blocked by firewall for a Malicious File Upload in file: files=yt93x.php at http://stewwebb.com/wp-content/plugins/simple-dropbox-upload-form/dragup/
2/8/2018 7:54:00 PM (17 minutes ago)
IP: 184.158.68.215 Hostname: 184-158-68-215.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows CE) AppleWebKit/5341 (KHTML, like Gecko) Chrome/37.0.875.0 Mobile Safari/5341
NetRange: 184.156.0.0 – 184.159.255.255
[262144 addresses in this network]
CIDR: 184.156.0.0/14 (184.156.0.0 – 184.159.255.255)
[262144 addresses in this network]
NetName: NETBLK-CENTURYTEL16
NetHandle: NET-184-156-0-0-1
Parent: NET184 (NET-184-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2010-06-21
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-184-156-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: NA397-ORG-ARIN
OrgTechName: Network Availability
OrgTechPhone: +1-800-809-1410
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/NA397-ORG-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????????????
Pleasant Hill, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/font-uploader/font-upload.php
2/8/2018 7:53:53 PM (19 minutes ago)
IP: 184.5.199.59 Hostname: mo-184-5-199-59.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_7_0 rv:6.0; sl-SI) AppleWebKit/532.35.3 (KHTML, like Gecko) Version/5.0 Safari/532.35.3
NetRange: 184.0.0.0 – 184.7.255.255
[524288 addresses in this network]
CIDR: 184.0.0.0/13 (184.0.0.0 – 184.15.255.255)
[1048576 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-184-0-0-0-1
Parent: NET184 (NET-184-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2009-06-23
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-184-0-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????
Bucyrus, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:43 PM (20 minutes ago)
IP: 71.213.171.142 Hostname: 71-213-171-142.mnfd.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
NetRange: 71.208.0.0 – 71.223.255.255
[1048576 addresses in this network]
CIDR: 71.208.0.0/12 (71.208.0.0 – 71.223.255.255)
[1048576 addresses in this network]
NetName: QWEST-INET-118
NetHandle: NET-71-208-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2005-05-06
Updated: 2013-09-16
Ref: https://whois.arin.net/rest/net/NET-71-208-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????
Shippensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php?Year=2018&Month=…
2/8/2018 7:53:41 PM (21 minutes ago)
IP: 67.234.2.7 Hostname: pa-67-234-2-7.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Opera/8.30 (X11; Linux i686; sl-SI) Presto/2.8.251 Version/10.00
NetRange: 67.232.0.0 – 67.239.255.255
[524288 addresses in this network]
CIDR: 67.232.0.0/13 (67.232.0.0 – 67.239.255.255)
[524288 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-67-232-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2008-01-14
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-67-232-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????????
Las Vegas, United States tried to access non-existent page http://stewwebb.com/wp-content/plugins/wp-symposium/server/php/index.php
2/8/2018 7:53:27 PM (22 minutes ago)
IP: 71.222.9.200 Hostname: 71-222-9-200.lsv2.qwest.net
Human/Bot: Bot
Browser: Firefox version 35.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64; rv:7.0) Gecko/20160710 Firefox/35.0
NetRange: 71.208.0.0 – 71.223.255.255
[1048576 addresses in this network]
CIDR: 71.208.0.0/12 (71.208.0.0 – 71.223.255.255)
[1048576 addresses in this network]
NetName: QWEST-INET-118
NetHandle: NET-71-208-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2005-05-06
Updated: 2013-09-16
Ref: https://whois.arin.net/rest/net/NET-71-208-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????
Ulan-Ude, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/gallery-plugin/upload/php.php
2/8/2018 7:53:22 PM (23 minutes ago)
IP: 92.126.154.118 Hostname: 92.126.154.118.stbur.ru
Human/Bot: Bot
Browser: Firefox version 35.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_6 rv:3.0) Gecko/20111223 Firefox/35.0
% Information related to ‘92.126.152.0 – 92.126.155.255’
[1024 addresses in this network]
% Abuse contact for ‘92.126.152.0 – 92.126.155.255’ is ‘abuse@rt.ru’
[1024 addresses in this network]
inetnum: 92.126.152.0 – 92.126.155.255
[1024 addresses in this network]
netname: WEBSTREAM
descr: OJSC “Sibirtelecom”
remarks: Buryat branch of OJSC “Sibirtelecom”
remarks: broadband service
country: RU
remarks:
remarks: NCC#2008111874
remarks: INFRA AW
remarks:
admin-c: JSN33-RIPE
tech-c: JSN33-RIPE
mnt-by: NSOELSV-NCC
mnt-lower: NSOELSV-NCC
mnt-lower: STBUR-RIPE-MNT
mnt-domains: STBUR-RIPE-MNT
mnt-domains: NSOELSV-NCC
mnt-routes: STBUR-RIPE-MNT
mnt-routes: NSOELSV-NCC
status: ASSIGNED PA
remarks:
remarks: Direct reference for the general info on spam
remarks: In unsoluble cases for the general info on spam,
remarks: abusing & hacking complaints email abuse@sinor.ru
remarks:
created: 2011-02-01T09:40:07Z
last-modified: 2011-02-01T09:40:07Z
source: RIPE # Filtered

person: Juriy S. Nikolaev
address: JSC “Sibirtelecom” Buryat branch
phone: +7 3012 214650
fax-no: +7 3012 220606
nic-hdl: JSN33-RIPE
mnt-by: STBUR-RIPE-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2007-11-22T10:35:24Z
source: RIPE # Filtered

% Information related to ‘92.126.128.0/19AS41440’ (92.126.128.0 – 92.126.191.255)
[16384 addresses in this network]
route: 92.126.128.0/19 (92.126.128.0 – 92.126.191.255)
[16384 addresses in this network]
descr: RU-SIBNET-NETWORKS
descr: OJSC “Rostelecom”
origin: AS41440
mnt-by: NSOELSV-NCC
created: 2012-02-27T02:35:06Z
last-modified: 2012-02-27T02:35:06Z
source: RIPE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????????
Wake Forest, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-post.php?task=wpmp_upload_previews
2/8/2018 7:53:21 PM (24 minutes ago)
IP: 184.3.173.178 Hostname: nc-184-3-173-178.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64; rv:6.0) Gecko/20140513 Firefox/36.0
NetRange: 184.0.0.0 – 184.7.255.255
[524288 addresses in this network]
CIDR: 184.0.0.0/13 (184.0.0.0 – 184.15.255.255)
[1048576 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-184-0-0-0-1
Parent: NET184 (NET-184-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2009-06-23
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-184-0-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????????????
embarq
United States Greenville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:13 PM (26 minutes ago)
IP: 76.0.176.164 Hostname: nc-76-0-176-164.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
NetRange: 76.0.0.0 – 76.7.255.255
[524288 addresses in this network]
CIDR: 76.0.0.0/13 (76.0.0.0 – 76.15.255.255)
[1048576 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-76-0-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2006-01-19
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-76-0-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????
lists
Alibaba.com
San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (28 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (28 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
NetRange: 198.11.128.0 – 198.11.191.255
[16384 addresses in this network]
CIDR: 198.11.128.0/18 (198.11.128.0 – 198.11.255.255)
[32768 addresses in this network]
NetName: ALIBABA-US-CDN
NetHandle: NET-198-11-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS45102
Organization: Alibaba.com LLC (AL-3)
RegDate: 2013-04-23
Updated: 2017-04-26
Ref: https://whois.arin.net/rest/net/NET-198-11-128-0-1

OrgName: Alibaba.com LLC
OrgId: AL-3
Address: 400 S El Camino Real, Suite 400
City: San Mateo
StateProv: CA
PostalCode: 94402
Country: US
RegDate: 2010-10-29
Updated: 2017-06-16
Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:
Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:
Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:
Comment: 4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref: https://whois.arin.net/rest/org/AL-3

OrgTechHandle: ALIBA-ARIN
OrgTechName: Alibaba NOC
OrgTechPhone: +1-408-748-1200
OrgTechEmail: noc@list.alibaba-inc.com
OrgTechRef: https://whois.arin.net/rest/poc/ALIBA-ARIN

OrgNOCHandle: ALIBA-ARIN
OrgNOCName: Alibaba NOC
OrgNOCPhone: +1-408-748-1200
OrgNOCEmail: noc@list.alibaba-inc.com
OrgNOCRef: https://whois.arin.net/rest/poc/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName: Network Abuse
OrgAbusePhone: +1-408-785-5580
OrgAbuseEmail: intl-abuse@list.alibaba-inc.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NETWO4028-ARIN
198.11.183.69
P address 198.11.183.69
Location San Mateo, California, United States
IP address 198.11.183.69
Reverse DNS (PTR record) not available
DNS server (NS record) rdns1.alidns.com (140.205.71.250)
rdns2.alidns.com (140.205.253.62)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.128.0/18
198.11.128.0 – 198.11.191.255
198.11.183.69
Domains around 198.11.183.69
@@@@@@@@@@@@@@@@@@@@@@@@@@
left off

IP address #domains
198.11.183.9 3
198.11.183.11 3
198.11.183.14 1
198.11.183.15 1
198.11.183.17 1
198.11.183.24 1
198.11.183.25 2
198.11.183.26 5
198.11.183.28 10
198.11.183.30 5
198.11.183.33 4
198.11.183.35 4
198.11.183.36 1
198.11.183.46 1
198.11.183.50 13
198.11.183.55 2
198.11.183.60 2
198.11.183.61 1
198.11.183.63 2
198.11.183.66 1
198.11.183.67 1
198.11.183.70 2
198.11.183.71 2
198.11.183.72 2
198.11.183.75 1
198.11.183.79 11
198.11.183.86 1
198.11.183.88 1
198.11.183.95 162
198.11.183.105 1
198.11.183.109 1
198.11.183.110 2
198.11.183.114 1
198.11.183.116 2
198.11.183.122 1
198.11.183.124 63
198.11.183.129 4
198.11.183.133 1
198.11.183.138 1
198.11.183.144 3
198.11.183.147 1
198.11.183.150 1
198.11.183.154 1
198.11.183.155 1
198.11.183.161 2
198.11.183.167 4
198.11.183.168 10
198.11.183.169 1
198.11.183.171 2
198.11.183.177 1
198.11.183.179 1
198.11.183.180 1
198.11.183.183 2
198.11.183.185 38
198.11.183.187 1
198.11.183.189 7
198.11.183.190 2
198.11.183.193 2
198.11.183.194 1
198.11.183.195 1
198.11.183.197 1
198.11.183.207 2
198.11.183.209 10
198.11.183.211 1
198.11.183.214 1
198.11.183.216 2
198.11.183.221 3
198.11.183.225 2
198.11.183.226 196
198.11.183.228 1
198.11.183.230 3
198.11.183.231 1
198.11.183.232 6
198.11.183.234 2
198.11.183.238 4
198.11.183.239 2
198.11.183.240 2

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
completed below
@@@@@@@@@@@@@@@@@@@@@@@@@@
Whois information
NetRange: 198.11.128.0 – 198.11.191.255
CIDR: 198.11.128.0/18
NetName: ALIBABA-US-CDN
NetHandle: NET-198-11-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS45102
Organization: Alibaba.com LLC (AL-3)
RegDate: 2013-04-23
Updated: 2017-04-26
Ref: https://whois.arin.net/rest/net/NET-198-11-128-0-1

OrgName: Alibaba.com LLC
OrgId: AL-3
Address: 400 S El Camino Real, Suite 400
City: San Mateo
StateProv: CA
PostalCode: 94402
Country: US
RegDate: 2010-10-29
Updated: 2017-06-16
Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:
Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:
Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: removed email address and removed email address
Comment:

ipp.alibabagroup.com
Domain IPv4 address Ranking Alexa Pagerank
alibabagroup.asia -1
alibabagroup.bid
alibabagroup.cc
alibabagroup.click 47.89.58.141
alibabagroup.club
alibabagroup.co
alibabagroup.co.in 50.63.202.21
alibabagroup.co.uk 50.63.202.16
alibabagroup.com 198.11.132.52 12,450 -1
alibabagroup.com.au 50.63.202.40
alibabagroup.com.cn
alibabagroup.company 50.63.202.55
alibabagroup.de 81.169.145.93
alibabagroup.es
alibabagroup.eu 130.185.109.77
alibabagroup.gift 47.89.58.141
alibabagroup.in 103.232.215.150
alibabagroup.info
alibabagroup.ir
alibabagroup.kz 81.177.140.214 0
alibabagroup.loan 47.89.58.141
alibabagroup.ltd 170.178.178.37
alibabagroup.me
alibabagroup.mobi 116.251.214.80
alibabagroup.net 141.8.225.31 -1
alibabagroup.net.cn
alibabagroup.news 47.89.58.141
alibabagroup.nu 185.53.178.9
alibabagroup.online 118.193.11.34
alibabagroup.org 50.63.202.63
alibabagroup.party
alibabagroup.pw 141.8.226.58
alibabagroup.ren
alibabagroup.ru 185.12.92.179
alibabagroup.space
alibabagroup.top 23.234.27.209
alibabagroup.trade 47.89.58.141
alibabagroup.us 69.64.147.242
alibabagroup.video 47.89.58.141
alibabagroup.vn 103.1.236.124
alibabagroup.wang 205.204.101.42
alibabagroup.win
alibabagroup.xn--io0a7i 47.89.58.32
alibabagroup.xn--ses554g
alibabagroup.xxx 125.212.224.227
alibabagroup-inc.com 50.63.202.27
alibabagroupbd.com
alibabagroupholding.com 184.168.221.46
alibabagroupholdinglimited.com 50.62.160.249
alibabagroupholdingltd.com 50.63.202.47
Are you looking for IPv4 address 198.11.188.72?
Are you looking for domain alibabagroup.com?
alibabagroup.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp2.alibabaonline.com. The current IPv4 address is 198.11.132.52. The mail server with the highest priority is mxn.mxhichina.com.
v=spf1 include:spf.mxhichina.com -all
DNS server (NS records) nsp2.alibabaonline.com (198.11.138.242)
ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
nsp.alibabaonline.com (200.196.225.111)
Mail server (MX records) mxn.mxhichina.com (205.204.101.145)
mxw.mxhichina.com (198.11.189.243)
IP address (IPv4) 198.11.132.52
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Registrant Street: 19/F Building A Xihu International Technology Bldg, 391 Wen Er Road
Registrant City: Hangzhou
Registrant State/Province: Zhejiang
Registrant Postal Code: 310099
Registrant Country: CN
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Timothy Alexander Steinert
Alibaba.com
Alibaba.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp.alibabaonline.com. The current IPv4 address is 198.11.132.23. The mail server with the highest priority is mx01.mail.alibaba.com.
v=spf1 include:spf1.alibaba.mail.aliyun.com -all
DNS server (NS records) nsp.alibabaonline.com (200.196.225.111)
ns8.alibabaonline.com (198.11.138.244)
nsp2.alibabaonline.com (198.11.138.242)
nshz.alibabaonline.com (198.11.138.243)
Mail server (MX records) mx01.mail.alibaba.com (42.120.219.27)
mx02.mail.alibaba.com (42.120.219.135)
IP address (IPv4) 198.11.132.23
205.204.101.42
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Admin Street: No. 699 Wangshang Road , Binjiang District
Admin City: Hangzhou
Admin State/Province: Zhejiang
Admin Postal Code: 310052
Admin Country: CN
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: Timothy Alexander Steinert
852.22155100
Aliexpress.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp2.alibabaonline.com. The current IPv4 address is 198.11.132.250. The mail server with the highest priority is mx2.mail.aliyun.com.
v=spf1 include:spf1.service.alibaba.com include:spf2.service.alibaba.com include:spf2.ocm.aliyun.com -al
DNS server (NS records) nsp2.alibabaonline.com (198.11.138.242)
nsp.alibabaonline.com (200.196.225.111)
ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
Mail server (MX records) mx2.mail.aliyun.com (140.205.94.14)
IP address (IPv4) 198.11.132.250
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Domain Name: aliexpress.com
Registry Domain ID: 413519034_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2016-03-16T02:23:44-0700
Creation Date: 2006-04-16T11:16:46-0700
Registrar Registration Expiration Date: 2018-04-16T00:00:00-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: clientUpdateProhibited (https://www.icann.org/epp#clientUpdateProhibited)
Domain Status: clientTransferProhibited (https://www.icann.org/epp#clientTransferProhibited)
Domain Status: clientDeleteProhibited (https://www.icann.org/epp#clientDeleteProhibited)
Domain Status: serverUpdateProhibited (https://www.icann.org/epp#serverUpdateProhibited)
Domain Status: serverTransferProhibited (https://www.icann.org/epp#serverTransferProhibited)
Domain Status: serverDeleteProhibited (https://www.icann.org/epp#serverDeleteProhibited)
Registry Registrant ID:
Registrant Name: Timothy Alexander Steinert
Registrant Organization: Hangzhou Alibaba Advertising Co., Lt
Registrant Street: No. 699 Wangshang Road , Binjiang District
Registrant City: Hangzhou
Registrant State/Province: Zhejiang
Registrant Postal Code: 310052
Registrant Country: CN
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Timothy Alexander Steinert
list.alibaba-inc.com
Are you looking for IPv4 address 10.20.3.90?
IP address 10.20.3.90
Summary IP Address 10.20.3.90 is a private IP address. Private IP addresses are used inside a local area network (LAN) and are not visible on the internet. Private IP addresses are defined in RFC 1918 (IPv4) and RFC 4193 (IPv6).
NetRange: 10.0.0.0 – 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2013-08-30
Are you looking for domain alibaba-inc.com?
This domain is hosted by Hangzhou Alibaba Advertising Co.,Ltd. (AS37963). The first DNS server is ns8.alibabaonline.com. The current IPv4 address is 121.0.17.65. The mail server with the highest priority is mx1.alibaba-inc.com.
v=spf1 include:spf1.staff.mail.aliyun.com -al
DNS server (NS records) ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
nsp2.alibabaonline.com (198.11.138.242)
nsp.alibabaonline.com (200.196.225.111)
Mail server (MX records) mx1.alibaba-inc.com (205.204.101.143)
mxus1.alibaba-inc.com (205.204.101.143)
IP address (IPv4) 121.0.17.65
IP address (IPv6)
ASN number 37963
ASN name (ISP) Hangzhou Alibaba Advertising Co.,Ltd.
IP-range/subnet 121.0.16.0/21
121.0.16.0 – 121.0.23.255

Domain IPv4 address Ranking Alexa Pagerank
alibaba-inc.asia -1
alibaba-inc.bid
alibaba-inc.biz 60.205.17.162
alibaba-inc.cc 35.201.173.170
alibaba-inc.club 10.244.35.92 -1
alibaba-inc.cn -1
alibaba-inc.co
alibaba-inc.com 121.0.17.65 2,111 2
alibaba-inc.com.cn
alibaba-inc.date
alibaba-inc.ink 121.42.72.40
alibaba-inc.jp 5
alibaba-inc.loan
alibaba-inc.ltd
alibaba-inc.mobi 219.137.207.17
alibaba-inc.mom
alibaba-inc.net 222.76.250.26 -1
alibaba-inc.net.cn
alibaba-inc.nl 185.53.177.20
alibaba-inc.org 93.191.168.52
alibaba-inc.pro
alibaba-inc.shop
alibaba-inc.site
alibaba-inc.tech 127.0.0.1
alibaba-inc.top
alibaba-inc.us 184.168.221.38
alibaba-inc.vip 47.89.58.32
alibaba-inc.wang
alibaba-inc.xin
alibaba-inc.xn--ses554g
alibaba-inc.xyz
alibaba-incs.com 104.16.91.230
IPv4 routes
Startip Endip Description Country #domains #spamhosts
135.84.40.0 135.84.41.255 Angie’s List, Inc. US 0 0
204.27.248.0 204.27.248.255 Amarican List Counsel, Inc. US 0 0
204.130.201.0 204.130.201.255 American List Counsel, Inc US 0 0
91.236.59.0 91.236.59.255 List Technology Iberica S.A. ES 0 0
157.247.0.0 157.247.255.255 AVL LIST GmbH AT 3 0
185.178.64.0 185.178.67.255 Martin List-Petersen trading as Tuxbox IE 0 0
192.102.17.0 192.102.17.255 AVL LIST GmbH AT 8 0
193.26.220.0 193.26.220.255 Javno podjetje uradni list Republike Slovenije d.o.o. SI 8 0
77.74.229.0 77.74.229.255 Sluzbeni list Bosne i Hercegovine BA 15 0
43.230.32.0 43.230.35.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
43.250.12.0 43.250.15.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 1 0
45.112.208.0 45.112.211.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.212.0 45.112.215.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.216.0 45.112.219.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.220.0 45.112.223.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
47.56.0.0 47.57.255.255 Alibaba.com LLC US 1 0
47.74.0.0 47.75.255.255 Alibaba.com LLC US 48,712 2
47.76.0.0 47.79.255.255 Alibaba.com LLC US 3 0
47.80.0.0 47.87.255.255 Alibaba.com LLC US 14 0
47.88.0.0 47.91.255.255 Alibaba.com LLC US 1,830,436 20
47.235.0.0 47.235.255.255 Alibaba.com LLC US 0 0
47.236.0.0 47.239.255.255 Alibaba.com LLC US 0 0
47.240.0.0 47.243.255.255 Alibaba.com LLC US 1 0
47.244.0.0 47.245.255.255 Alibaba.com LLC US 0 0
47.246.0.0 47.246.255.255 Alibaba.com LLC US 1 0
47.250.0.0 47.251.255.255 Alibaba.com LLC US 0 0
47.252.0.0 47.253.255.255 Alibaba.com LLC US 12 0
47.254.0.0 47.254.255.255 Alibaba.com LLC US 3,743 0
72.254.0.0 72.254.255.255 Alibaba.com LLC US 0 0
103.216.108.0 103.216.111.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
110.75.192.0 110.75.255.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 81 0
119.38.208.0 119.38.223.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 9 0
121.0.16.0 121.0.31.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 88 0
139.95.0.0 139.95.255.255 Alibaba.com LLC US 0 0
147.139.0.0 147.139.255.255 Alibaba.com LLC US 0 0
155.102.0.0 155.102.255.255 Alibaba.com LLC US 0 0
157.119.240.0 157.119.243.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
161.117.0.0 161.117.255.255 Alibaba.com Singapore E-Commerce Private Limited SG 0 0
163.181.0.0 163.181.255.255 Alibaba.com LLC US 27 0
170.33.0.0 170.33.255.255 Alibaba.com Singapore E-Commerce Private Limited SG 14 0
185.218.176.0 185.218.179.255 Alibaba Cloud (Singapore) Private Limited RU 0 0
198.11.128.0 198.11.191.255 Alibaba.com LLC US 103,048 1
205.204.96.0 205.204.127.255 Alibaba.com LLC US 14,189 0
45.112.212.0 45.112.212.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.213.0 45.112.213.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.214.0 45.112.214.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.215.0 45.112.215.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
47.74.0.0 47.74.63.255 Alibaba.com LLC US 15,381 0
47.74.0.0 47.74.7.255 Alibaba.com LLC US 5,806 0
47.74.64.0 47.74.127.255 Alibaba.com LLC US 85 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a0a:5780:: 2a0a:5780:ffff:ffff:ffff:ffff:ffff:ffff Martin List-Petersen trading as Tuxbox IE 0 0
2401:2e00:: 2401:2e00:ffff:ffff:ffff:ffff:ffff:ffff Alibaba (China) Technology Co., Ltd. CN 0 0
2a0b:da40:: 2a0b:da47:ffff:ffff:ffff:ffff:ffff:ffff Alibaba Cloud (Singapore) Private Limited RU 0 0
2001:330:: 2001:330:1fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:2000:: 2001:330:3fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:4000:: 2001:330:7fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:8000:: 2001:330:ffff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:3e8:: 2001:3e8:ffff:ffff:ffff:ffff:ffff:ffff MediaLive Japan,Inc. JP 0 0
2001:410:: 2001:410:ffff:ffff:ffff:ffff:ffff:ffff Canarie Inc CA 12 0
2001:418:: 2001:418:ffff:ffff:ffff:ffff:ffff:ffff NTT America, Inc. US 132 0
2001:420:: 2001:420:ffff:ffff:ffff:ffff:ffff:ffff Cisco Systems, Inc. US 384 0
2001:450:: 2001:450:ffff:ffff:ffff:ffff:ffff:ffff Level 3 Communications, Inc. US 4 0
2001:458:: 2001:458:ffff:ffff:ffff:ffff:ffff:ffff Stealth Communications, Inc. US 3 0
2001:470:: 2001:470:ffff:ffff:ffff:ffff:ffff:ffff Hurricane Electric, Inc. US 18,918 0
2001:4b0:: 2001:4b0:ffff:ffff:ffff:ffff:ffff:ffff AOL Inc. US 0 0
2001:4b8:: 2001:4b8:ffff:ffff:ffff:ffff:ffff:ffff Wayport, Inc. US 0 0
2001:4e8:: 2001:4e8:ffff:ffff:ffff:ffff:ffff:ffff Shaw Communications Inc. CA 0 0
2001:4f8:: 2001:4f8:ffff:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 28 0
2001:500:10:: 2001:500:10:ffff:ffff:ffff:ffff:ffff Gauss Research Laboratory, Inc. PR 0 0
2001:500:2e:: 2001:500:2f:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:60:: 2001:500:60:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:61:: 2001:500:61:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:62:: 2001:500:62:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:63:: 2001:500:63:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:64:: 2001:500:64:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:65:: 2001:500:65:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:66:: 2001:500:66:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:67:: 2001:500:67:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:68:: 2001:500:68:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:69:: 2001:500:69:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6a:: 2001:500:6a:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6b:: 2001:500:6b:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6c:: 2001:500:6c:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6d:: 2001:500:6d:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6e:: 2001:500:6e:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6f:: 2001:500:6f:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:70:: 2001:500:70:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:71:: 2001:500:71:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:72:: 2001:500:72:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:73:: 2001:500:73:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:74:: 2001:500:74:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:75:: 2001:500:75:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:76:: 2001:500:76:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:77:: 2001:500:77:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:78:: 2001:500:78:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:79:: 2001:500:79:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7a:: 2001:500:7a:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7b:: 2001:500:7b:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7c:: 2001:500:7c:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:85:: 2001:500:85:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
56651 Javno podjetje uradni list Republike Slovenije d.o.o. SI 1 0 8 0
37963 Hangzhou Alibaba Advertising Co.,Ltd. CN 238 0 2,038,735 121
45102 Alibaba (China) Technology Co., Ltd. CN 233 0 2,278,472 36
134963 Alibaba.com Singapore E-Commerce Private Limited SG 22 0 225 0
1 Level 3 Communications, Inc. US 10 0 15 8
5 Symbolics, Inc. US 15 0 5 12
6 Bull HN Information Systems Inc. US 29 0 82 0
19 Leidos, Inc. US 8 0 85 0
78 BT Americas, Inc US 6 0 2 0
97 NTT America, Inc. US 2 0 0 0
106 General Dynamics Advanced Information Systems, Inc. US 10 0 48 0
109 Cisco Systems, Inc. US 77 26 816 2
125 Honeywell International, Inc. US 49 0 907 0
158 Ericsson Network Systems, Inc. US 89 12 252 0
161 Texas Instruments, Inc. US 16 0 134 0
200 Level 3 Communications, Inc. US 2 0 0 9
202 Level 3 Communications, Inc. US 1 0 7 0
229 Merit Network Inc. US 2 0 0 0
231 Merit Network Inc. US 4 1 1 0
237 Merit Network Inc. US 55 5 1,270 1
260 Xconnect24 Inc. US 16 4 97 1
262 NTT America, Inc. US 1 1 0 0
283 MPower Labs, Inc. US 5 0 7 0
555 Velocity Technology Solutions II, Inc. US 3 0 193 0
560 Level 3 Communications, Inc. US 0 2 0 0
572 Greater Baltimore Medical Center Inc US 6 0 0 0
598 Level 3 Communications, Inc. US 1 0 0 0
605 Vanguard Health Management, Inc. US 1 0 0 0
613 BP America, Inc. US 2 0 0 0
684 MTS Inc. CA 2 0 0 0
699 KANOBE INC US 3 0 16 0
701 MCI Communications Services, Inc. d/b/a Verizon Business US 1,164 19 151,206 170
702 MCI Communications Services, Inc. d/b/a Verizon Business US 198 54 60,385 5
703 MCI Communications Services, Inc. d/b/a Verizon Business US 91 3 1,106 1
705 MCI Communications Services, Inc. d/b/a Verizon Business US 145 0 9 0
714 Apple Inc. US 597 68 9,598 5
797 AT&T Services, Inc. US 57 0 742 0
801 AtTask, Inc US 1 0 0 0
812 Rogers Communications Canada Inc. CA 501 43 26,501 45
813 MCI Communications Services, Inc. d/b/a Verizon Business US 28 0 140 0
852 TELUS Communications Inc. CA 700 21 18,343 36
1236 General Dynamics C4 Systems, Inc. US 6 0 86 0
1280 Internet Systems Consortium, Inc. US 22 8 466 0
1313 Adobe Systems Inc. US 9 2 161 0
1321 Advanced Networks & Services Inc. US 11 0 0 0
1323 Advanced Networks & Services Inc. US 1 0 0 0
1325 Advanced Networks & Services Inc. US 2 0 0 0
1326 Advanced Networks & Services Inc. US 8 0 1 0
1331 Advanced Networks & Services Inc. US 4 0 0 0
1337 Advanced Networks & Services Inc. US 12 12 0 0

left off

@@@@@@@@@@@@@@
hk.alibaba-inc.com

https://ipp.alibabagroup.com
https://intl.aliyun.com/

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????
Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (30 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (30 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
NetRange: 184.156.0.0 – 184.159.255.255
[262144 addresses in this network]
CIDR: 184.156.0.0/14 (184.156.0.0 – 184.159.255.255)
[262144 addresses in this network]
NetName: NETBLK-CENTURYTEL16
NetHandle: NET-184-156-0-0-1
Parent: NET184 (NET-184-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2010-06-21
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-184-156-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgTechHandle: NA397-ORG-ARIN
OrgTechName: Network Availability
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/NA397-ORG-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????????
Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (31 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (30 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
% Information related to ‘31.43.192.0 – 31.43.223.255’
[8192 addresses in this network]
% Abuse contact for ‘31.43.192.0 – 31.43.223.255’ is ‘aospan@netup.ru’
[8192 addresses in this network]
inetnum: 31.43.192.0 – 31.43.223.255
[8192 addresses in this network]
netname: Sotrudnik-NET
country: RU
org: ORG-SL304-RIPE
admin-c: AT7077-RIPE
tech-c: AT7077-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-by: MNT-Sotrudnik
mnt-routes: MNT-Sotrudnik
mnt-domains: MNT-Sotrudnik
created: 2011-03-01T14:05:45Z
last-modified: 2016-04-14T08:58:34Z
source: RIPE
sponsoring-org: ORG-NA225-RIPE

organisation: ORG-SL304-RIPE
org-name: Sotrudnik LTD
org-type: OTHER
address: 659322 Biisk, Altai Krai, a ul.Sotsialisticheskaya
abuse-c: AR23001-RIPE
mnt-ref: MNT-Sotrudnik
mnt-by: MNT-Sotrudnik
created: 2011-01-13T10:14:40Z
last-modified: 2014-11-17T16:27:59Z
source: RIPE # Filtered

person: Alexandr Tulin
address: 659322 Biisk, Altai Krai, a ul.Sotsialisticheskaya
phone: +7 3854 303306
nic-hdl: AT7077-RIPE
mnt-by: MNT-Sotrudnik
created: 2011-01-13T10:14:27Z
last-modified: 2012-09-12T11:39:29Z
source: RIPE # Filtered

% Information related to ‘31.43.192.0/19AS56487’ (31.43.192.0 – 31.43.255.255)
[16384 addresses in this network]
route: 31.43.192.0/19 (31.43.192.0 – 31.43.255.255)
[16384 addresses in this network]
descr: Sotrudnik LTD
origin: AS56487
mnt-by: MNT-Sotrudnik
created: 2011-07-13T08:47:55Z
last-modified: 2011-07-13T08:47:55Z
source: RIPE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
???????????????????????
West Plains, United States tried to access non-existent page http://stewwebb.com/wp-content/plugins/google-maps-by-daniel-martyn/inuse.php
2/8/2018 7:52:32 PM (33 minutes ago)
IP: 72.161.5.120 Hostname: 72-161-5-120.dyn.centurytel.net
Human/Bot: Bot
Browser: Firefox version 35.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_2 rv:6.0) Gecko/20150704 Firefox/35.0
NetRange: 72.160.0.0 – 72.161.255.255
[131072 addresses in this network]
CIDR: 72.160.0.0/15 (72.160.0.0 – 72.163.255.255)
[262144 addresses in this network]
NetName: NETBLK-CENTURYTEL10
NetHandle: NET-72-160-0-0-1
Parent: NET72 (NET-72-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2005-09-23
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-72-160-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: NA397-ORG-ARIN
OrgTechName: Network Availability
OrgTechPhone: +1-800-809-1410
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/NA397-ORG-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Clifton, United States left http://stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-… and visited http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
2/8/2018 8:11:31 PM (16 minutes ago)
IP: 159.203.67.240 Hostname: 159.203.67.240
Browser: undefined
Go-http-client/1.1
NetRange: 159.203.0.0 – 159.203.255.255
[65536 addresses in this network]
CIDR: 159.203.0.0/16 (159.203.0.0 – 159.203.255.255)
[65536 addresses in this network]
NetName: DIGITALOCEAN-12
NetHandle: NET-159-203-0-0-1
Parent: NET159 (NET-159-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: DigitalOcean, LLC (DO-13)
RegDate: 2015-08-10
Updated: 2015-08-11
Comment: Simple Cloud Host
Comment: http://www.digitalocean.com
Ref: https://whois.arin.net/rest/net/NET-159-203-0-0-1

OrgName: DigitalOcean, LLC
OrgId: DO-13
Address: 101 Ave of the Americas
Address: 10th Floor
City: New York
StateProv: NY
PostalCode: 10013
Country: US
RegDate: 2012-05-14
Updated: 2017-07-03
Comment: http://www.digitalocean.com
Comment: Simple Cloud Hosting
Ref: https://whois.arin.net/rest/org/DO-13

OrgAbuseHandle: ABUSE5232-ARIN
OrgAbuseName: Abuse, DigitalOcean
OrgAbusePhone: +1-347-875-6044
OrgAbuseEmail: abuse@digitalocean.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5232-ARIN

OrgNOCHandle: NOC32014-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-347-875-6044
OrgNOCEmail: noc@digitalocean.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC32014-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-347-875-6044
OrgTechEmail: noc@digitalocean.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC32014-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????????
United States Warrensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/real3d-flipbook/includes/process.php
2/8/2018 7:51:59 PM (51 minutes ago)
IP: 76.0.26.95 Hostname: mo-76-0-26-95.dyn.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (compatible; MSIE 5.0; Windows 95; Trident/5.1)
NetRange: 76.0.0.0 – 76.7.255.255
[524288 addresses in this network]
CIDR: 76.0.0.0/13 (76.0.0.0 – 76.15.255.255)
[1048576 addresses in this network]
NetName: EMBARQ-GLOBAL
NetHandle: NET-76-0-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2006-01-19
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-76-0-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2017-04-07
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: ESC36-ARIN
OrgTechName: Embarq Services – CDS
OrgTechPhone: +1-407-741-0500
OrgTechEmail: ipsupport@centurylinkservices.net
OrgTechRef: https://whois.arin.net/rest/poc/ESC36-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????
Manchester, United States was blocked by firewall for UserPro – User Profiles with Social Login <= 4.9.17 – Authentication Bypass in query string: up_auto_log=true at http://stewwebb.com/?up_auto_log=true
2/8/2018 7:51:53 PM (52 minutes ago)
IP: 98.174.87.168 Hostname: customernet.completeitcenter.com
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows NT 4.0; en-US; rv:1.9.0.20) Gecko/20120810 Firefox/35.0
NetRange: 98.160.0.0 – 98.191.255.255
[2097152 addresses in this network]
CIDR: 98.160.0.0/11 (98.160.0.0 – 98.191.255.255)
[2097152 addresses in this network]
NetName: CXA
NetHandle: NET-98-160-0-0-1
Parent: NET98 (NET-98-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cox Communications Inc. (CXA)
RegDate: 2007-07-20
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-98-160-0-0-1
OrgName: Cox Communications Inc.
OrgId: CXA
Address: 1400 Lake Hearn Dr.
City: Atlanta
StateProv: GA
PostalCode: 30319
Country: US
RegDate:
Updated: 2017-05-30
Comment: For legal requests/assistance please use the
Comment: following contact information:
Comment: Cox Subpoena Info: https://www.cox.com/aboutus/policies/law-enforcement-and-subpoenas-information.html
Ref: https://whois.arin.net/rest/org/CXA

OrgTechHandle: ADA131-ARIN
OrgTechName: Anderson, Alvin Demond
OrgTechPhone: +1-404-269-4416
OrgTechEmail: alvin.anderson@cox.com
OrgTechRef: https://whois.arin.net/rest/poc/ADA131-ARIN

OrgTechHandle: BERUB3-ARIN
OrgTechName: Berube, Tori
OrgTechPhone: +1-404-269-4416
OrgTechEmail: tori.berube@cox.com
OrgTechRef: https://whois.arin.net/rest/poc/BERUB3-ARIN

OrgTechHandle: RWA196-ARIN
OrgTechName: Waldron, Roderick
OrgTechPhone: +1-404-269-7626
OrgTechEmail: abuse@cox.net
OrgTechRef: https://whois.arin.net/rest/poc/RWA196-ARIN

OrgAbuseHandle: IC146-ARIN
OrgAbuseName: Cox Communications Inc
OrgAbusePhone: +1-404-269-7626
OrgAbuseEmail: abuse@cox.net
OrgAbuseRef: https://whois.arin.net/rest/poc/IC146-ARIN

OrgTechHandle: BAABO-ARIN
OrgTechName: BA, Aboubakr
OrgTechPhone: +1-404-269-4416
OrgTechEmail: abuse@cox.net
OrgTechRef: https://whois.arin.net/rest/poc/BAABO-ARIN

OrgTechHandle: NIA16-ARIN
OrgTechName: National IP Administrator
OrgTechPhone: +1-404-269-4416
OrgTechEmail: tiffany.coleman@cox.com
OrgTechRef: https://whois.arin.net/rest/poc/NIA16-ARIN

OrgTechHandle: MEROL3-ARIN
OrgTechName: Merola, Cari
OrgTechPhone: +1-404-269-4416
OrgTechEmail: cari.merola@cox.com
OrgTechRef: https://whois.arin.net/rest/poc/MEROL3-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????
London, United Kingdom was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:50:39 PM (55 minutes ago)
IP: 35.178.19.46 Hostname: ec2-35-178-19-46.eu-west-2.compute.amazonaws.com
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
NetRange: 35.178.0.0 – 35.179.255.255
[131072 addresses in this network]
CIDR: 35.178.0.0/15 (35.178.0.0 – 35.179.255.255)
[131072 addresses in this network]
NetName: AMAZON-LHR
NetHandle: NET-35-178-0-0-1
Parent: AT-88-Z (NET-35-152-0-0-1)
NetType: Reallocated
OriginAS: AS16509
Organization: Amazon Data Services UK (ADSU)
RegDate: 2017-06-23
Updated: 2017-06-23
Ref: https://whois.arin.net/rest/net/NET-35-178-0-0-1

OrgName: Amazon Data Services UK
OrgId: ADSU
Address: Amazon Development Centre London
Address: Leadenhall Court
Address: One Leadenhall Street
City: London
StateProv:
PostalCode: EC3V 1PP
Country: GB
RegDate: 2016-12-14
Updated: 2016-12-14
Ref: https://whois.arin.net/rest/org/ADSU

OrgTechHandle: IPMAN40-ARIN
OrgTechName: IP Management
OrgTechPhone: +1-206-266-4064
OrgTechEmail: ipmanagement@amazon.com
OrgTechRef: https://whois.arin.net/rest/poc/IPMAN40-ARIN

OrgAbuseHandle: IPMAN40-ARIN
OrgAbuseName: IP Management
OrgAbusePhone: +1-206-266-4064
OrgAbuseEmail: ipmanagement@amazon.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPMAN40-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????????????????
Auburn, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:49:24 PM (57 minutes ago)
IP: 75.172.5.254 Hostname: 75-172-5-254.tukw.qwest.net
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
NetRange: 75.160.0.0 – 75.175.255.255
[1048576 addresses in this network]
CIDR: 75.160.0.0/12 (75.160.0.0 – 75.191.255.255)
[2097152 addresses in this network]
NetName: QWEST-INET-124
NetHandle: NET-75-160-0-0-1
Parent: NET75 (NET-75-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2006-10-24
Updated: 2013-09-19
Ref: https://whois.arin.net/rest/net/NET-75-160-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN

RTechHandle: QIA-ARIN
RTechName: Qwest IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
All above malicious file upload

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Stew Webb in United States Providence, United States tried to access non-existent page http://www.stewwebb.com/blog/tag/israel-spying/

Blocked by firewall
United States Valencia, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/dzs-portfolio/admin/upload.php
2/8/2018 8:05:52 PM (42 minutes ago)
IP: 50.113.182.82 Hostname: pxy01twcca.ladc.ca.charter.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X; sl-SI) AppleWebKit/531.36.7 (KHTML, like Gecko) Version/4.0.5 Mobile/8B115 Safari/6531.36.7
Type: Blocked
Netherlands Netherlands was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:59:23 PM (48 minutes ago)
IP: 103.251.164.13 Hostname: 103.251.164.13
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows NT 5.1) AppleWebKit/5321 (KHTML, like Gecko) Chrome/38.0.821.0 Mobile Safari/5321
Type: Blocked
United States Centerview, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/admin/upload.php
2/8/2018 7:58:07 PM (50 minutes ago)
IP: 76.0.4.88 Hostname: mo-76-0-4-88.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
Type: Blocked
United States Mount Gilead, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-portfolio/upload.php
2/8/2018 7:56:52 PM (51 minutes ago)
IP: 71.213.176.237 Hostname: 71-213-176-237.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Opera/8.91 (Windows 95; sl-SI) Presto/2.12.257 Version/12.00
Type: Blocked
United States Kissimmee, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/upload.php
2/8/2018 7:56:33 PM (51 minutes ago)
IP: 71.54.179.124 Hostname: fl-71-54-179-124.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
Type: Blocked
United States Warrenton, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/uploader/uploadify/uploadify.php
2/8/2018 7:55:17 PM (53 minutes ago)
IP: 174.125.14.182 Hostname: 174-125-14-182.dyn.centurytel.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_6_6 rv:2.0) Gecko/20161124 Firefox/36.0
Type: Blocked
United States Belleville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:54:58 PM (53 minutes ago)
IP: 67.234.107.79 Hostname: pa-67-234-107-79.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States Mebane, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/simple-ads-manager/sam-ajax-admin.php
2/8/2018 7:54:51 PM (53 minutes ago)
IP: 99.194.16.24 Hostname: 99-194-16-24.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_7) AppleWebKit/5312 (KHTML, like Gecko) Chrome/37.0.818.0 Mobile Safari/5312
Type: Blocked
United States Trussville, United States was blocked by firewall for a Malicious File Upload in file: files=2W4yr.php.php.png at http://stewwebb.com/wp-admin/admin-ajax.php?action=load_ajax_function
2/8/2018 7:54:33 PM (54 minutes ago)
IP: 174.125.207.38 Hostname: 174-125-207-38.dyn.centurytel.net
Human/Bot: Bot
Browser: undefined
Opera/8.18 (Windows 98; Win 9x 4.90; sl-SI) Presto/2.11.335 Version/10.00
Type: Blocked
United States Shippensburg, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/page-google-maps/pr.php
2/8/2018 7:54:28 PM (54 minutes ago)
IP: 67.234.191.187 Hostname: pa-67-234-191-187.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux i686) AppleWebKit/5340 (KHTML, like Gecko) Chrome/38.0.825.0 Mobile Safari/5340
Type: Blocked
United States Centerburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:54:07 PM (54 minutes ago)
IP: 71.213.21.24 Hostname: 71-213-21-24.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows CE; en-US; rv:1.9.2.20) Gecko/20100828 Firefox/36.0
Type: Blocked
United States Sparta, United States was blocked by firewall for a Malicious File Upload in file: files=yt93x.php at http://stewwebb.com/wp-content/plugins/simple-dropbox-upload-form/dragup/
2/8/2018 7:54:00 PM (54 minutes ago)
IP: 184.158.68.215 Hostname: 184-158-68-215.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows CE) AppleWebKit/5341 (KHTML, like Gecko) Chrome/37.0.875.0 Mobile Safari/5341
Type: Blocked
United States Pleasant Hill, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/font-uploader/font-upload.php
2/8/2018 7:53:53 PM (54 minutes ago)
IP: 184.5.199.59 Hostname: mo-184-5-199-59.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_7_0 rv:6.0; sl-SI) AppleWebKit/532.35.3 (KHTML, like Gecko) Version/5.0 Safari/532.35.3
Type: Blocked
United States Bucyrus, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:43 PM (55 minutes ago)
IP: 71.213.171.142 Hostname: 71-213-171-142.mnfd.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States Shippensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php?Year=2018&Month=…
2/8/2018 7:53:41 PM (55 minutes ago)
IP: 67.234.2.7 Hostname: pa-67-234-2-7.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Opera/8.30 (X11; Linux i686; sl-SI) Presto/2.8.251 Version/10.00
Type: Blocked
Russia Ulan-Ude, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/gallery-plugin/upload/php.php
2/8/2018 7:53:22 PM (55 minutes ago)
IP: 92.126.154.118 Hostname: 92.126.154.118.stbur.ru
Human/Bot: Bot
Browser: Firefox version 35.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_6 rv:3.0) Gecko/20111223 Firefox/35.0
Type: Blocked
United States Wake Forest, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-post.php?task=wpmp_upload_previews
2/8/2018 7:53:21 PM (55 minutes ago)
IP: 184.3.173.178 Hostname: nc-184-3-173-178.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64; rv:6.0) Gecko/20140513 Firefox/36.0
Type: Blocked
United States Greenville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:13 PM (55 minutes ago)
IP: 76.0.176.164 Hostname: nc-76-0-176-164.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (55 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (55 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (55 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (55 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
Russia Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (55 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Type: Blocked
Russia Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (55 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Type: Blocked
United States Warrensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/real3d-flipbook/includes/process.php
2/8/2018 7:51:59 PM (57 minutes ago)
IP: 76.0.26.95 Hostname: mo-76-0-26-95.dyn.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (compatible; MSIE 5.0; Windows 95; Trident/5.1)
Type: Blocked
United States Manchester, United States was blocked by firewall for UserPro – User Profiles with Social Login <= 4.9.17 – Authentication Bypass in query string: up_auto_log=true at http://stewwebb.com/?up_auto_log=true
2/8/2018 7:51:53 PM (57 minutes ago)
IP: 98.174.87.168 Hostname: customernet.completeitcenter.com
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows NT 4.0; en-US; rv:1.9.0.20) Gecko/20120810 Firefox/35.0
Type: Blocked
United Kingdom London, United Kingdom was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:50:39 PM (58 minutes ago)
IP: 35.178.19.46 Hostname: ec2-35-178-19-46.eu-west-2.compute.amazonaws.com
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
Type: Blocked
United States Auburn, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:49:24 PM (59 minutes ago)
IP: 75.172.5.254 Hostname: 75-172-5-254.tukw.qwest.net
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=4
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=3
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=2
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=1
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=0
2/8/2018 7:43:25 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Venezuela Caracas, Venezuela was blocked by firewall at http://www.stewwebb.com/
2/8/2018 6:24:10 PM (2 hours 25 mins ago)
IP: 190.72.143.141 Hostname: 190-72-143-141.dyn.dsl.cantv.net
Human/Bot: Bot
Browser: Chrome version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.86 Safari/537.36
Type: Blocked
Venezuela Caracas, Venezuela left http://www.stewwebb.com/ and was blocked by firewall at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
2/8/2018 6:23:55 PM (2 hours 25 mins ago)
IP: 190.72.143.141 Hostname: 190-72-143-141.dyn.dsl.cantv.net
Human/Bot: Bot
Browser: Chrome version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.86 Safari/537.36
Type: Blocked
United States Dallas, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php
2/8/2018 2:42:28 PM (6 hours 6 mins ago)
IP: 50.22.59.195 Hostname: linux.servidor5.net
Human/Bot: Bot
Browser: undefined
wp-windowsphone

 

Your kind Contributions are very much appreciated thank you. – Stew Webb




US Gov or Israel Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

ThrottlingFeb172018

@@@@@@@@@@@@@@@@
35.171.223.159 United States US 479 hits in last 4 hours
IP address 35.171.223.159
Location Ashburn, Virginia, United States
IP address 35.171.223.159
Reverse DNS (PTR record) ec2-35-171-223-159.compute-1.amazonaws.com
DNS server (NS record) x4.amazonaws.org (204.13.251.31)
x3.amazonaws.org (208.78.71.31)
x1.amazonaws.com (156.154.64.10)
pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 35.168.0.0/13
35.168.0.0 – 35.175.255.255
@@@@@@@
Number of SPAM hosts on 35.168.0.0/13 1
@@@@@@@@
Domains around 35.171.223.159
IP address #domains
35.171.223.21 1
IP address 35.171.223.21
Reverse DNS (PTR record) ec2-35-171-223-21.compute-1.amazonaws.com
DNS server (NS record) x1.amazonaws.com (156.154.64.10)
x3.amazonaws.org (208.78.71.31)
pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
x4.amazonaws.org (204.13.251.31)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 35.168.0.0/13
35.168.0.0 – 35.175.255.255
@@@@@@@@@@@@@
Domains around 35.171.223.21
IP address #domains
35.171.223.21 1
@@@@@@@@@@@@
Domain Tools
rare-herbs.com
This domain is hosted by Amazon.com, Inc. (AS14618). The first DNS server is ns78.domaincontrol.com. The current IPv4 address is 35.171.223.21.
DNS server (NS records) ns78.domaincontrol.com (208.109.255.49)
ns77.domaincontrol.com (216.69.185.49)
Mail server (MX records)
IP address (IPv4) 35.171.223.21
IP address (IPv6)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 35.168.0.0/13
35.168.0.0 – 35.175.255.255
Domain Name: rare-herbs.com
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization:
Name Server: NS77.DOMAINCONTROL.COM
Name Server: NS78.DOMAINCONTROL.COM
DNSSEC: unsigned
godaddy.com

@@@@@@@@@@
NetRange: 35.152.0.0 – 35.183.255.255
CIDR: 35.152.0.0/13, 35.176.0.0/13, 35.160.0.0/12
NetName: AT-88-Z
NetHandle: NET-35-152-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
@@@@@@@@@@@@@@@@@@@
92.17.214.236 United Kingdom GB 157 hits in last 4 hours
P address 92.17.214.236
Location Leominster, England, United Kingdom
IP address 92.17.214.236
Reverse DNS (PTR record) host-92-17-214-236.as13285.net
DNS server (NS record) ds1.opaltelecom.net (62.24.202.57)
ds0.opaltelecom.net (62.24.128.200)
ASN number 13285
ASN name (ISP) TalkTalk Communications Limited
IP-range/subnet 92.16.0.0/15
92.16.0.0 – 92.17.255.255
inetnum: 92.16.0.0 – 92.23.255.255
netname: CPWBBSERV-NET
descr: Carphone Warehouse Broadband Services
country: GB
admin-c: GJB18-RIPE
admin-c: PM58-RIPE
tech-c: GJB18-RIPE
tech-c: PM58-RIPE
status: ASSIGNED PA
mnt-by: OPAL-MNT
created: 2007-06-29T11:58:45Z
last-modified: 2007-06-29T11:58:45
person: Gareth J Bowen
address: Opal Telecommunications Plc
address: Northbank Industrial Estate
address: Irlam
address: Manchester
address: United Kingdom
address: UK
44.161.2222000
44.161.2222003
person: Phill Magill
address: TalkTalk Communications Limited
address: Northbank Industrial Estate
address: Irlam
address: Manchester
address: M44 5BL
address: United Kingdom
route: 92.22.0.0/15
descr: TalkTalk Technology B2C Dynamic Range
origin: AS13285
mnt-by: OPAL-MNT

@@@@@
Number of SPAM hosts on 92.16.0.0/15 20
92.17.214.236
@@@@@@@@@@@
174.223.17.47 United States US 105 hits in last 4 hours
IP address 174.223.17.47
Location United States
IP address 174.223.17.47
Reverse DNS (PTR record) 47.sub-174-223-17.myvzw.com
DNS server (NS record) ns1.vzwdomain.com (66.174.0.3)
carkdns.vzwdomain.com (66.174.92.13)
njbbdns.vzwdomain.com (69.78.134.171)
ASN number 22394
ASN name (ISP) Cellco Partnership DBA Verizon Wireless
IP-range/subnet 174.223.0.0/17
174.223.0.0 – 174.223.127.255
NetRange: 174.192.0.0 – 174.255.255.255
CIDR: 174.192.0.0/10
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cellco Partnership DBA Verizon Wireless (CLLC)
RegDate: 2008-12-16
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-192-0-0-1

OrgName: Cellco Partnership DBA Verizon Wireless
OrgId: CLLC
Address: 180 Washington Valley Road
City: Bedminster
StateProv: NJ
PostalCode: 07039
Country: US
RegDate: 2001-09-30
Updated: 2017-10-12
908-306-7000
@@@@@@@@@@@@@@@@@@
mail only
VerizonWireless.com
This domain is hosted by Cellco Partnership DBA Verizon Wireless (AS12079). The first DNS server is ns-orbg.verizonwireless.com. The current IPv4 address is 162.115.208.90. The mail server with the highest priority is mx0b-0024a201.pphosted.com.
v=spf1 ip4:162.115.0.0/16 ip4:137.188.0.0/16 ip4:140.108.26.0/24
ip4:199.249.25.0/24 ip4:69.78.0.0/16 ip4:66.174.0.0/16 ip4:199.74.155.0
ip4:206.127.27.11 ip4:204.93.64.116/30 ip4:204.93.80.116/30 ip4:204.93.95.57
include:spf-0024a201.pphosted.com ~al
Domain IPv4 address Ranking Alexa Pagerank
pphosted.co 185.53.179.7
pphosted.com 149.126.77.135 28,345 -1
pphosted.net -1
pphosted.org
This domain is hosted by Incapsula Inc (AS19551). The first DNS server is ns3.proofpoint.com. The current IPv4 address is 149.126.77.135. The mail server with the highest priority is mx1.proofpoint.com.gslb.pphosted.com.
v=spf1 ip4:208.84.66.28 a mx a:support1.proofpoint.com include:mktomail.com include:spf-00148501.pphosted.com include:_spf.salesforce.com include:spf-00148503.pphosted.com ?
DNS server (NS records) ns3.proofpoint.com (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.com (156.154.64.99)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.biz (156.154.66.99)
Mail server (MX records) mx1.proofpoint.com.gslb.pphosted.com (67.231.144.185)
mx2.proofpoint.com.gslb.pphosted.com (67.231.152.185)
IP address (IPv4) 149.126.77.135
IP address (IPv6) 2a02:e980:d::87
ASN number 19551
ASN name (ISP) Incapsula Inc
IP-range/subnet 149.126.77.0/24
149.126.77.0 – 149.126.77.255

DNS server (NS records) ns-orbg.verizonwireless.com (162.115.227.17)
ns-twbg.verizonwireless.com (137.188.98.17)
ns-dbln.verizonwireless.com (162.115.99.17)
ns-scrm.verizonwireless.com (162.115.34.17)
Mail server (MX records) mx0b-0024a201.pphosted.com (148.163.153.92)
mx0a-0024a201.pphosted.com (148.163.149.93)
IP address (IPv4) 162.115.208.90
137.188.80.90
162.115.16.90
IP address (IPv6)
ASN number 12079
ASN name (ISP) Cellco Partnership DBA Verizon Wireless
IP-range/subnet 162.115.192.0/18
162.115.192.0 – 162.115.255.255
Registry Registrant ID:
Registrant Name: Network Operations
Registrant Organization: Proofpoint, Inc.
Registrant Street: 892 Ross Drive,
Registrant City: Sunnyvale
Registrant State/Province: CA
Registrant Postal Code: 94089
Registrant Country: US
408-517-4710
Mail only
proofpoint.com
his domain is hosted by Incapsula Inc (AS19551). The first DNS server is pdns99.ultradns.com. The current IPv4 address is 192.230.74.135. The mail server with the highest priority is mxb-00148501.gslb.pphosted.com.
v=spf1 a:spf-mailers.proofpoint.com ip4:66.77.73.0/24 ip4:66.77.69.0/24 a:support1.proofpoint.com include:i.ppops.net include:mktomail.com include:_spf.salesforce.com ip4:68.233.77.18 ip6:2620:100:9001:b9::1 ip6:2620:100:9005:b9::1 include:spf.protection.outlook.com include:spf-00148501.pphosted.com ~al
DNS server (NS records) pdns99.ultradns.com (156.154.64.99)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.biz (156.154.66.99)
ns3.proofpoint.com (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
Mail server (MX records) mxb-00148501.gslb.pphosted.com (67.231.152.185)
mxa-00148501.gslb.pphosted.com (67.231.144.185)
mx0b-00148501.pphosted.com (67.231.152.185)
mx0a-00148501.pphosted.com (67.231.144.185)
mx2.proofpoint.com (208.86.202.15)
IP address (IPv4) 192.230.74.135
192.230.66.135
IP address (IPv6) 2a02:e980:11::87
2a02:e980:17::87
ASN number 19551
ASN name (ISP) Incapsula Inc
IP-range/subnet 192.230.74.0/24
192.230.74.0 – 192.230.74.255
Registry Admin ID:
Admin Name: Network Operations
Admin Organization: Proofpoint, Inc.
Admin Street: 892 Ross Drive,
Admin City: Sunnyvale
Admin State/Province: CA
Admin Postal Code: 94089
Admin Country: US

@@@@@@@@@@@@@@@@@@@@@@
76.164.90.224 United States US 79 hits in last 4 hours
IP address 76.164.90.224
Location Montgomery, Texas, United States
IP address 76.164.90.224
Reverse DNS (PTR record) dsl-dhcp-conrtxxahre-76-164-90-224.consolidated.net
DNS server (NS record) ns8.consolidated.net (72.22.1.3)
ns1.consolidated.net (72.22.1.3)
ASN number 6300
ASN name (ISP) Consolidated Communications, Inc.
IP-range/subnet 76.164.64.0/18
76.164.64.0 – 76.164.127.255
Whois information

Error in retrieving information!

consolidated.net
This domain is hosted by Synacor, Inc. (AS36271). The first DNS server is dns02.consolidated.net. The current IPv4 address is 208.47.184.8. The mail server with the highest priority is smtp.consolidated.net.
v=spf1 ip4:206.123.242.148/32 ip4:206.123.242.149/32 ip4:66.60.130.50/32 ip4:66.60.130.0/24 ~al
DNS server (NS records) dns02.consolidated.net (207.70.129.222)
dns01.consolidated.net (209.195.136.242)
Mail server (MX records) smtp.consolidated.net (72.22.9.17)
smtp2.consolidated.net (72.22.9.17)
IP address (IPv4) 208.47.184.8
IP address (IPv6)
ASN number 36271
ASN name (ISP) Synacor, Inc.
IP-range/subnet 208.47.184.0/23
208.47.184.0 – 208.47.185.255
Domain Name: CONSOLIDATED.NET
Registry Domain ID: 2503336_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registry Registrant ID:
Registrant Name: Consolidated Communications
Registrant Organization: Consolidated Communications
Registrant Street: 121 S. 17th Street
Registrant City: Mattoon
Registrant State/Province: IL
Registrant Postal Code: 61938
Registrant Country: US

@@@@@@@@@@@@@@@@@@@
23.124.129.35 United States US 76 hits in last 4 hours
IP address 23.124.129.35
Location Spring, Texas, United States
IP address 23.124.129.35
Reverse DNS (PTR record) 23-124-129-35.lightspeed.hstntx.sbcglobal.net
DNS server (NS record) ns10a.attdns.net (144.160.229.221)
ns10b.attdns.net (144.160.128.177)
ASN number 7018
ASN name (ISP) AT&T Services, Inc.
IP-range/subnet 23.112.0.0/12
23.112.0.0 – 23.127.255.255
Number of SPAM hosts on 23.112.0.0/12 4
NetRange: 23.112.0.0 – 23.127.255.255
CIDR: 23.112.0.0/12
NetName: SIS-80-7-23-2013
NetHandle: NET-23-112-0-0-1
Parent: NET23 (NET-23-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7132
Organization: AT&T Internet Services (SIS-80)
RegDate: 2013-08-09
Updated: 2013-08-09
OrgName: AT&T Internet Services
OrgId: SIS-80
Address: 3300 E Renner Rd
Address: Mailroom B2139
Address: Attn:IP Management
City: Richardson
StateProv: TX
PostalCode: 75082
Country: US
RegDate: 2000-06-19
Updated: 2017-05-30
Comment: For all subpoena, Internet, court order related matters and emergency requests contact
Comment: 11760 US Highway 1
Comment: North Palm Beach, FL 33408
Comment: Main Number: 800-635-6840
888-983-4715

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Hundreds of hits 310pm cst
Ashburn, United States visited http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2015%2F01%2F07%2Fleo…
2/17/2018 3:08:36 PM (15 seconds ago)
IP: 34.239.250.28 Hostname: ec2-34-239-250-28.compute-1.amazonaws.com
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html)

Ashburn, United States tried to access non-existent page http://www.stewwebb.com/INVESTORS_ASSET_MANAGEMENT_LTD.htm
2/17/2018 3:05:14 PM (26 seconds ago)
IP: 34.239.250.28
Human/Bot: Bot
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html)
United States Ashburn, United States visited http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2013%2F10%2F07%2Fste…
2/17/2018 3:01:04 PM (10 minutes ago)
IP: 34.239.250.28 Hostname: ec2-34-239-250-28.compute-1.amazonaws.com
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html)
NetRange: 34.192.0.0 – 34.255.255.255
[4194304 addresses in this network]
CIDR: 34.192.0.0/10 (34.192.0.0 – 34.255.255.255)
[4194304 addresses in this network]
NetName: AT-88-Z
NetHandle: NET-34-192-0-0-1
Parent: NET34 (NET-34-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2016-09-12
Updated: 2016-09-12
Ref: https://whois.arin.net/rest/net/NET-34-192-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://whois.arin.net/rest/org/AT-88-Z

OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-266-4064
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://whois.arin.net/rest/poc/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-266-4064
OrgAbuseEmail: abuse@amazonaws.com
OrgAbuseRef: https://whois.arin.net/rest/poc/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-266-4064
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://whois.arin.net/rest/poc/ANO24-ARIN
34.239.250.28
IP address 34.239.250.28
Location Ashburn, Virginia, United States
34.239.250.28
IP address 34.239.250.28
Reverse DNS (PTR record) ec2-34-239-250-28.compute-1.amazonaws.com
DNS server (NS record) x1.amazonaws.com (156.154.64.10)
x2.amazonaws.com (156.154.65.10)
x3.amazonaws.org (208.78.71.31)
x4.amazonaws.org (204.13.251.31)
pdns1.ultradns.net (204.74.108.1)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 34.224.0.0/12
34.224.0.0 – 34.239.255.255

Number of SPAM hosts on 34.224.0.0/12 14

IP address 34.239.250.28
Location Ashburn, Virginia, United States
Number of SPAM hosts on 34.224.0.0/12 14

Domains around 34.239.250.28
IP address #domains
34.239.250.3 1
IP address 34.239.250.3
Location Ashburn, Virginia, United States

IP address 34.239.250.3
Reverse DNS (PTR record) ec2-34-239-250-3.compute-1.amazonaws.com
DNS server (NS record) x4.amazonaws.org (204.13.251.31)
x1.amazonaws.com (156.154.64.10)
x3.amazonaws.org (208.78.71.31)
pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 34.224.0.0/12
34.224.0.0 – 34.239.255.255
NetRange: 34.192.0.0 – 34.255.255.255
CIDR: 34.192.0.0/10
NetName: AT-88-Z
@@@
Domain Tools
componentowl.com
This domain is hosted by Amazon.com, Inc. (AS14618). The first DNS server is ns-1452.awsdns-53.org. The current IPv4 address is 34.239.250.3. The mail server with the highest priority is inbound-smtp.us-east-1.amazonaws.com.
v=spf1 include:emailsrvr.com include:amazonses.com -a
DNS server (NS records) ns-1452.awsdns-53.org (205.251.197.172)
ns-1975.awsdns-54.co.uk (205.251.199.183)
ns-227.awsdns-28.com (205.251.192.227)
ns-881.awsdns-46.net (205.251.195.113)
Mail server (MX records) inbound-smtp.us-east-1.amazonaws.com (176.32.102.11)
IP address (IPv4) 34.239.250.3
IP address (IPv6)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 34.224.0.0/12
34.224.0.0 – 34.239.255.255
Domain Name: COMPONENTOWL.COM
Registry Domain ID: 1603127595_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.enom.com
Registrar: ENOM, INC.
Registrar IANA ID: 48
Reseller: NAMECHEAP.COM
Registrant Name: WHOISGUARD PROTECTED
Registrant Organization: WHOISGUARD, INC.
Registrant Street: P.O. BOX 0823-03411
Registrant City: PANAMA
Registrant State/Province: PANAMA
Registrant Postal Code: 00000
Registrant Country: PA
51.17057182
507.8365503

whoisguard.com
This domain is hosted by eNom, Incorporated (AS21740). The first DNS server is dns3.name-services.com. The current IPv4 address is 98.124.199.32. The mail server with the highest priority is smx1.registrar-servers.com.
v=spf1 mx a:mail.whoisguard.com ip4:75.126.26.114/32 ip4:208.116.62.210/32
ipv4:98.142.221.8
include:ox.registrar-servers.com ~a

DNS server (NS records) dns3.name-services.com (162.88.61.39)
dns4.name-services.com (162.88.60.39)
dns2.name-services.com (162.88.60.23)
dns1.name-services.com (162.88.61.23)
dns5.name-services.com (162.88.61.41)
Mail server (MX records) smx1.registrar-servers.com (162.255.118.61)
smx2.registrar-servers.com (162.255.118.62)
IP address (IPv4) 98.124.199.32
IP address (IPv6)
ASN number 21740
ASN name (ISP) eNom, Incorporated
IP-range/subnet 98.124.199.0/24
98.124.199.0 – 98.124.199.255

@@@@@@
enom.com
This domain is hosted by eNom, Incorporated (AS21740). The first DNS server is ns1.enom.com. The current IPv4 address is 98.124.253.221. The mail server with the highest priority is mx.enom.com.cust.a.hostedemail.com.
v=spf1 a mx ip4:69.64.144.0/20 ip4:98.124.192.0/18 ip4:216.40.44.0/24 ip4:216.40.42.17/32
include:relay.mailchannels.net include:_spf.google.com
include:stspg-customer.com
include:mail.zendesk.com ~al

DNS server (NS records) ns1.enom.com (64.98.175.11)
ns2.enom.com (64.98.149.11)
ns3.enom.com (64.99.100.11)
Mail server (MX records) mx.enom.com.cust.a.hostedemail.com (216.40.42.4)
IP address (IPv4) 98.124.253.221
IP address (IPv6) 2620:10f:5000:5000::2
ASN number 21740
ASN name (ISP) eNom, Incorporated
IP-range/subnet 98.124.253.0/24
98.124.253.0 – 98.124.253.255

Registry Registrant ID:
Registrant Name: DOMAIN ADMIN
Registrant Organization: TUCOWS.COM CO
Registrant Street: 96 MOWAT AVENUE
Registrant City: TORONTO
Registrant State/Province: ON
Registrant Postal Code: M6K3M1
Registrant Country: CA
416-535-0123
Registry Admin ID:
Admin Name: DOMAIN ADMIN
Admin Organization: ENOM LLC
Admin Street: 5808 LAKE WASHINGTON BLVD. NE
Admin Street: SUITE 200
Admin City: KIRKLAND
Admin State/Province: WA
Admin Postal Code: 98033
Admin Country: US
452-274-4500
Registry Tech ID:
Tech Name: DNS ADMINISTRATOR
Tech Organization: ENOM LLC
Tech Street: 5808 LAKE WASHINGTON BLVD. NE
Tech Street: SUITE 200
Tech City: KIRKLAND
Tech State/Province: WA
Tech Postal Code: 98033
Tech Country: US
@@@@@@@@@@@@@@@@@@@
mail only
tucows.com
This domain is hosted by Tucows.com Co. (AS15348). The first DNS server is ns3.tucows.com. The current IPv4 address is 64.99.128.15. The mail server with the highest priority is mx.tucows.com.cust.hostedemail.com.
v=spf1 ip4:216.40.44.0/24 ip4:216.40.42.17/32
include:_spf.zdsys.com
Domain IPv4 address Ranking Alexa Pagerank
zdsys.cn 103.24.228.126
zdsys.com -1
zdsys.net 23.225.134.24
zdsys.org
zdsysc.com 180.178.60.156
zdsystem.com 116.124.128.121
zdsystem.it 208.43.88.227
zdsystems.com
zdsystems.com.br
zdsystemy.cz 194.228.35.35
zdsystest.com
IPv4 routes
The first DNS server is pdns69.ultradns.com. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.zdsys.com include:_spf.google.com ~al
DNS server (NS records) pdns69.ultradns.com (156.154.64.69)
pdns69.ultradns.info (156.154.68.69)
pdns69.ultradns.net (156.154.65.69)
pdns69.ultradns.co.uk (156.154.69.69)
pdns69.ultradns.org (156.154.67.69)
pdns69.ultradns.biz (156.154.66.69)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.130.26)
alt1.aspmx.l.google.com (64.233.163.27)
aspmx2.googlemail.com (64.233.162.27)
aspmx3.googlemail.com (64.233.187.27)
IP address (IPv4)
IP address (IPv6)
ASN number not available

Registry Registrant ID:
Registrant Name: Domain Administrator
Registrant Organization: Zendesk, Inc.
Registrant Street: 1019 Market St,
Registrant City: San Francisco
Registrant State/Province: CA
Registrant Postal Code: 94103
Registrant Country: US
415-418-7506
@@@@@@@@@@
zendesk.com
This domain is hosted by Zendesk, Inc. (AS21880). The first DNS server is pdns69.ultradns.co.uk. The current IPv4 address is 192.161.154.1. The mail server with the highest priority is us-smtp-inbound-2.mimecast.com.
v=spf1 ip4:192.161.144.0/20 ip4:185.12.80.0/22 ip4:96.46.150.192/27
ip4:174.137.46.0/24 ip4:188.172.128.0/20 ip4:216.198.0.0/18
ip4:64.233.160.0/19 ip4:66.102.0.0/20 ip4:66.249.80.0/20
ip4:72.14.192.0/18 ip4:74.125.0.0/16
include:_spf1.zendesk.com
DNS server (NS records) pdns69.ultradns.co.uk (156.154.69.69)
pdns69.ultradns.biz (156.154.66.69)
pdns69.ultradns.org (156.154.67.69)
pdns69.ultradns.com (156.154.64.69)
pdns69.ultradns.net (156.154.65.69)
ns3.p08.dynect.net (208.78.71.8)
ns1.p08.dynect.net (208.78.70.8)
ns4.p08.dynect.net (204.13.251.8)
ns2.p08.dynect.net (204.13.250.8)
pdns69.ultradns.info (156.154.68.69)
Mail server (MX records) us-smtp-inbound-2.mimecast.com (205.139.110.141)
us-smtp-inbound-1.mimecast.com (207.211.30.242)
aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.130.26)
alt1.aspmx.l.google.com (64.233.163.27)
aspmx2.googlemail.com (64.233.162.27)
IP address (IPv4) 192.161.154.1
IP address (IPv6)
ASN number 21880
ASN name (ISP) Zendesk, Inc.
IP-range/subnet 192.161.154.0/24
192.161.154.0 – 192.161.154.255
Registrant Name: Domain Administrator
Registrant Organization: Zendesk, Inc.
Registrant Street: 1019 Market St,
Registrant City: San Francisco
Registrant State/Province: CA
Registrant Postal Code: 94103
Registrant Country: US

include:mail.zendesk.com ?all
google-site-verification=vr8jtntuguzqwmrucm7p9cgg5fhsou_ilz7-lz-mzmwms=ms54709270
DNS server (NS records) ns3.tucows.com (64.99.97.32)
ns2.tucows.com (64.98.148.15)
ns1.tucows.com (216.40.47.20)
Mail server (MX records) mx.tucows.com.cust.hostedemail.com (216.40.42.4)
IP address (IPv4) 64.99.128.15
IP address (IPv6)
ASN number 15348
ASN name (ISP) Tucows.com Co.
IP-range/subnet 64.99.128.0/24
64.99.128.0 – 64.99.128.255

NetRange: 34.192.0.0 – 34.255.255.255
CIDR: 34.192.0.0/10
NetName: AT-88-Z
NetHandle: NET-34-192-0-0-1
Parent: NET34 (NET-34-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2016-09-12
Updated: 2016-09-12
Ref: https://whois.arin.net/rest/net/NET-34-192-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Malakhovka, Russia left http://www.stewwebb.com/wp-login.php and was at attempted a failed login using an invalid username “www.stewwebb”. http://www.stewwebb.com/wp-login.php
2/17/2018 3:07:28 PM (2 minutes ago)
IP: 91.203.196.105 Hostname: 91-203-196-105.malnet.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
% Information related to ‘91.203.196.0 – 91.203.197.255’
[512 addresses in this network]
% Abuse contact for ‘91.203.196.0 – 91.203.197.255’ is ‘abuse@malnet.ru’
[512 addresses in this network]
inetnum: 91.203.196.0 – 91.203.197.255
[512 addresses in this network]
netname: Malnet_NAT_Pool_1
country: RU
admin-c: AOO7-RIPE
tech-c: AOO7-RIPE
status: ASSIGNED PA
mnt-by: MNT-MALNET
created: 2016-05-23T12:31:26Z
last-modified: 2016-05-23T12:31:26Z
source: RIPE

person: Albegov Oleg Olegovich
address: 140180, Russia, Moscow region, Malakhovka, Shosseynaya str., 2a
phone: +7 (353) 87-215-5087
nic-hdl: AOO7-RIPE
mnt-by: MNT-MALNET
created: 2008-02-08T08:03:08Z
last-modified: 2015-10-09T09:48:23Z
source: RIPE # Filtered

% Information related to ‘91.203.196.0/22AS47156’ (91.203.196.0 – 91.203.199.255)
[1024 addresses in this network]
route: 91.203.196.0/22 (91.203.196.0 – 91.203.199.255)
[1024 addresses in this network]
descr: Malnet broadband in Moscow, Russia
origin: AS47156
mnt-by: MNT-MALNET
created: 2008-05-12T08:51:56Z
last-modified: 2010-07-01T08:31:35Z

@@@@@@@@@@@@@@@@@@@@@@@@@@

Wentworth, United States was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://stewwebb.com/
2/17/2018 12:46:04 PM (2 hours 26 mins ago)
IP: 75.102.164.50 Hostname: 75-102-164-50.d2.itctel.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; SM-T350 Build/NMF26X) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Safari/537.36
NetRange: 75.102.160.0 – 75.102.191.255
[8192 addresses in this network]
CIDR: 75.102.160.0/19 (75.102.160.0 – 75.102.191.255)
[8192 addresses in this network]
NetName: INTERSTATE-TELEPHONE-COOPERATIVE
NetHandle: NET-75-102-160-0-1
Parent: NET75 (NET-75-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS13576
Organization: INTERSTATE TELECOMMUNICATIONS COOPERATIVE, INC. (ITC-84)
RegDate: 2009-05-18
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-75-102-160-0-1

OrgName: INTERSTATE TELECOMMUNICATIONS COOPERATIVE, INC.
OrgId: ITC-84
Address: 312 Fourth Street West
Address: PO Box 920
City: Clear Lake
StateProv: SD
PostalCode: 57726
Country: US
RegDate: 2007-08-31
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/ITC-84

OrgAbuseHandle: ABUSE2763-ARIN
OrgAbuseName: abuse-Itc
OrgAbusePhone: +1-605-693-9052
OrgAbuseEmail: abuse@itctel.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE2763-ARIN

OrgTechHandle: GS227-ARIN
OrgTechName: Skon, George
OrgTechPhone: +1-605-693-9052
OrgTechEmail: gskon@itctel.com
OrgTechRef: https://whois.arin.net/rest/poc/GS227-ARIN

RNOCHandle: GS227-ARIN
RNOCName: Skon, George
RNOCPhone: +1-605-693-9052
RNOCEmail: gskon@itctel.com
RNOCRef: https://whois.arin.net/rest/poc/GS227-ARIN

RTechHandle: GS227-ARIN
RTechName: Skon, George
RTechPhone: +1-605-693-9052
RTechEmail: gskon@itctel.com
RTechRef: https://whois.arin.net/rest/poc/GS227-ARIN
75-102-164-50.d2.itctel.com
This domain is hosted by SOUTH DAKOTA NETWORK (AS13576). The first DNS server is ns2.itctel.com. The current IPv4 address is 75.102.163.136. The mail server with the highest priority is itctel.com.mx1.itc.rcimx.net.
v=spf1 ip4:75.102.160.224/27 ip4:75.102.161.224/27
ip4:75.102.163.0/24 ip4:208.80.200.0/21 -al
DNS server (NS records) ns2.itctel.com (75.102.160.231)
ns1.itctel.com (75.102.161.234)
Mail server (MX records) itctel.com.mx1.itc.rcimx.net (75.102.160.236)
itctel.com.mx2.itc.rcimx.net (208.80.204.12)
itctel.com.mx3.itc.rcimx.net (75.102.160.236)
itctel.com.mx4.itc.rcimx.net (208.80.204.253)
IP address (IPv4) 75.102.163.136
IP address (IPv6)
ASN number 13576
ASN name (ISP) SOUTH DAKOTA NETWORK
IP-range/subnet 75.102.163.0/24
75.102.163.0 – 75.102.163.255

Domain IPv4 address Ranking Alexa Pagerank
itctel.com 75.102.163.136 3
itctel.info 75.102.161.234
itctel.it 212.131.30.50
itctel.net 205.178.189.131
itctelaviv.com 184.168.221.33
itcteleco.com 109.203.107.26
itcteleco.net 74.220.199.15
itcteleco.org
itctelecom.com 23.236.62.147 1
itctelecom.com.br 186.202.150.203
itctelecom.ro 217.115.213.26
itctelecomconnect.com 192.64.119.248
itctelecomtechnologyllc.com 184.168.221.43
itctelephonie.com 213.186.33.50
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.7.164.0 103.7.167.255 Ninefold_Public-164 AU 52 0
139.80.0.0 139.80.255.255 imported inetnum object for UNIVER-164 NZ 75 0
203.15.104.0 203.15.104.255 164 Bourke St AU 224 0
210.17.164.0 210.17.167.255 210.17.164.0/22 HK 1 0
89.108.164.0 89.108.167.255 89.108.164.0/29 LB 2 0
89.108.164.0 89.108.164.255 89.108.164.0/29 LB 0 0
93.126.164.0 93.126.167.255 93.126.164.0/22 LB 0 4
93.126.164.0 93.126.164.255 93.126.164.0/22 LB 0 4
93.126.165.0 93.126.165.255 93.126.164.0/22 LB 0 0
93.126.166.0 93.126.166.255 93.126.164.0/22 LB 0 0
93.126.167.0 93.126.167.255 93.126.164.0/22 LB 0 0
110.74.164.0 110.74.167.255 AIMS-MY-DIA advertised prefix – 110.74.164.0/22 MY 14 0
185.89.164.0 185.89.164.255 FR-PICHET-164 FR 0 0
202.1.164.0 202.1.164.255 ADSL Subscribers in 202.1.164.0/24 SB 0 0
213.214.164.0 213.214.164.255 fuj-fin-k5-164 FI 0 0
220.247.164.0 220.247.164.255 220.247.164.0/24 BTS BD 1 1
14.102.240.0 14.102.255.255 PCCW.IXLINK.NET 14.102.240.0/24 HK 1,574 0
64.111.16.0 64.111.31.255 Data 102, LLC US 727 0
91.213.101.0 91.213.101.255 Lipscani, 102 Nouveau Center, et 1 4 si pod RO 0 0
96.47.0.0 96.47.15.255 Data 102, LLC US 590 0
103.210.8.0 103.210.9.255 102 Le Gran 45 Eisenhower St. Greenhills, PH 0 1
103.228.68.0 103.228.71.255 NO.4 1-1-102, New Hope Road CN 2,633 0
14.102.244.0 14.102.244.255 PCCW.IXLINK.NET 14.102.244.0/24 HK 0 0
14.102.246.0 14.102.246.255 PCCW.IXLINK.NET 14.102.246.0/24 HK 1,206 0
14.102.247.0 14.102.247.255 PCCW.IXLINK.NET 14.102.247.0/24 HK 178 0
14.102.248.0 14.102.248.255 PCCW.IXLINK.NET 14.102.248.0/24 HK 39 0
14.102.249.0 14.102.249.255 PCCW.IXLINK.NET 14.102.249.0/24 HK 66 0
14.139.255.0 14.139.255.255 NKN INSTITUTE 102 IN 0 0
64.111.17.0 64.111.17.255 Data 102, LLC US 0 0
64.111.22.0 64.111.22.255 Data 102, LLC US 51 0
66.253.148.0 66.253.148.255 Savoye 102 US 0 0
74.174.204.0 74.174.207.255 CABLE TV OF BELZONI 102 S Hayden St -JAN LAN US 5 0
91.187.102.0 91.187.102.255 Ipko Prishtina scope 102 AL 2 6
103.210.8.0 103.210.8.255 102 Le Gran 45 Eisenhower St. Greenhills, PH 0 1
103.210.9.0 103.210.9.255 102 Le Gran 45 Eisenhower St. Greenhills, PH 0 0
103.228.68.0 103.228.68.255 NO.4 1-1-102, New Hope Road CN 67 0
103.228.69.0 103.228.69.255 NO.4 1-1-102, New Hope Road CN 95 0
103.228.70.0 103.228.70.255 NO.4 1-1-102, New Hope Road CN 130 0
103.228.71.0 103.228.71.255 NO.4 1-1-102, New Hope Road CN 2,341 0
185.64.102.0 185.64.102.255 Noop-185-64-102-0-23 GB 0 0
185.64.103.0 185.64.103.255 Noop-185-64-102-0-23 GB 0 0
192.187.196.0 192.187.199.255 Data 102, LLC US 0 0
213.255.193.0 213.255.193.255 ZANYAR- 102 Diyala GB 2 2
213.255.245.0 213.255.245.255 Link 102 Fria GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2400:e6c0:: 2400:e6c0:ffff:ffff:ffff:ffff:ffff:ffff 102 Le Gran 45 Eisenhower St. Greenhills, PH 0 0
2607:2800:: 2607:2800:ffff:ffff:ffff:ffff:ffff:ffff Data 102, LLC US 3 0
2a07:8980:102:: 2a07:8980:102:ffff:ffff:ffff:ffff:ffff HOSTLINE-UAB-LT-V6-2a07-8980-102/48 netblock LT 8 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
38498 203.31.164.0/23 ID 4 0 4 0
26896 Data 102, LLC US 1 0 0 0
33302 Data 102, LLC US 12
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Novosibirsk, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
2/17/2018 12:07:38 PM (3 hours 5 mins ago)
IP: 5.137.64.16 Hostname: ppp-5.137.64.16.nsk.rt.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Novosibirsk, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
2/17/2018 12:07:38 PM (3 hours 5 mins ago)
IP: 5.137.64.16 Hostname: ppp-5.137.64.16.nsk.rt.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
% Information related to ‘5.137.0.0 – 5.137.255.255’
[65536 addresses in this network]
% Abuse contact for ‘5.137.0.0 – 5.137.255.255’ is ‘abuse@rt.ru’
[65536 addresses in this network]
inetnum: 5.137.0.0 – 5.137.255.255
[65536 addresses in this network]
netname: WEBSTREAM
descr: JSC Rostelecom regional branch “Siberia”
remarks: Novosibirsk broadband service
country: RU
remarks:
remarks: NCC#2012063717
remarks: INFRA AW
remarks:
admin-c: NSOE11-RIPE
tech-c: NSOE22-RIPE
mnt-by: NSOELSV-NCC
mnt-by: ROSTELECOM-MNT
mnt-routes: NSOELSV-NCC
mnt-domains: NSOELSV-NCC
status: ASSIGNED PA
remarks:
remarks: Direct reference for the general info on spam
remarks: In unsoluble cases for the general info on spam,
remarks: abusing & hacking complaints email abuse@sinor.ru
remarks:
created: 2012-07-16T02:00:48Z
last-modified: 2012-07-16T02:00:48Z
source: RIPE

role: NSOELSVZ admin-c role
address: JSC “Sibirtelecom”
address: 18, Ordjenikidze str.,
address: 630099, Novosibirsk, Russia
phone: +7 383 2 270669
fax-no: +7 383 2 270017
admin-c: YOL1-RIPE
admin-c: VIK15-RIPE
tech-c: YOL1-RIPE
tech-c: VIK15-RIPE
nic-hdl: NSOE11-RIPE
mnt-by: NSOELSV-NCC
created: 2005-03-29T04:58:27Z
last-modified: 2008-09-08T05:37:10Z
source: RIPE # Filtered

role: NSOELSVZ tech-c role
address: JSC “Sibirtelecom”
address: 18, Ordjenikidze str.,
address: 630099, Novosibirsk, Russia
phone: +7 383 2 270669
fax-no: +7 383 2 270017
admin-c: YOL1-RIPE
admin-c: VIK15-RIPE
tech-c: YOL1-RIPE
tech-c: VIK15-RIPE
nic-hdl: NSOE22-RIPE
mnt-by: NSOELSV-NCC
created: 2005-03-29T04:55:41Z
last-modified: 2008-09-08T05:37:11Z
source: RIPE # Filtered

% Information related to ‘5.137.0.0/16AS41440’ (5.137.0.0 – 5.137.255.255)
[65536 addresses in this network]
route: 5.137.0.0/16 (5.137.0.0 – 5.137.255.255)
[65536 addresses in this network]
descr: JSC Rostelecom regional branch “Siberia”
remarks: Novosibirsk
origin: AS41440
mnt-by: NSOELSV-NCC
mnt-by: ROSTELECOM-MNT
created: 2012-07-16T03:17:36Z
last-modified: 2012-07-16T03:17:36Z
source: RIPE

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Makati City, Philippines was blocked by firewall at http://www.stewwebb.com/wp-login.php
2/17/2018 9:46:25 AM (5 hours 27 mins ago)
IP: 122.2.249.113 Hostname: 122.2.249.113.static.pldt.net
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
% Information related to ‘122.2.240.0 – 122.2.255.255’
[4096 addresses in this network]
% Abuse contact for ‘122.2.240.0 – 122.2.255.255’ is ‘abuse@pldt.net’
[4096 addresses in this network]
inetnum: 122.2.240.0 – 122.2.255.255
[4096 addresses in this network]
netname: CONSUMER
country: PH
descr: SPCC7300i06_Consumer
admin-c: HM8-AP
tech-c: NS141-AP
tech-c: NT31-AP
tech-c: SS843-AP
status: ASSIGNED NON-PORTABLE
mnt-by: PHIX-NOC-AP
last-modified: 2008-09-04T07:17:20Z
source: APNIC

person: Henry Marcelino
nic-hdl: HM8-AP
e-mail: himarcelino@pldt.com.ph
address: PLDT Sampaloc
phone: +63-2-885-9176
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2008-09-04T07:33:19Z
source: APNIC

person: Nelson Sibal
nic-hdl: NS141-AP
e-mail: nbsibal@pldt.com.ph
address: MGO Bldg, Dela Rosa cor. Legaspi Sts., Makati City
phone: +63-2-885-9174
fax-no: +63-2-813-5794
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2008-09-04T07:35:15Z
source: APNIC

person: Nonilon Topacio
nic-hdl: NT31-AP
e-mail: nvtopacio@pldt.com.ph
address: MGO Bldg, Dela Rosa cor. Legaspi Sts., Makati City
phone: +63-2-885-9174
fax-no: +63-2-813-5794
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2008-09-04T07:35:15Z
source: APNIC

person: Sigfred Saliendra
nic-hdl: SS843-AP
e-mail: sssaliendra@pldt.com.ph
address: MGO Bldg, Dela Rosa cor. Legaspi Sts., Makati City
phone: +63-2-885-9174
fax-no: +63-2-813-5794
country: PH
mnt-by: PHIX-NOC-AP
last-modified: 2008-09-04T07:35:15Z
source: APNIC

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Malakhovka, Russia left http://www.stewwebb.com/wp-login.php and was at attempted a failed login using an invalid username “www.stewwebb”. http://www.stewwebb.com/wp-login.php
2/17/2018 3:07:28 PM (8 minutes ago)
IP: 91.203.196.105 Hostname: 91-203-196-105.malnet.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
% Information related to ‘91.203.196.0 – 91.203.197.255’
[512 addresses in this network]
% Abuse contact for ‘91.203.196.0 – 91.203.197.255’ is ‘abuse@malnet.ru’
[512 addresses in this network]
inetnum: 91.203.196.0 – 91.203.197.255
[512 addresses in this network]
netname: Malnet_NAT_Pool_1
country: RU
admin-c: AOO7-RIPE
tech-c: AOO7-RIPE
status: ASSIGNED PA
mnt-by: MNT-MALNET
created: 2016-05-23T12:31:26Z
last-modified: 2016-05-23T12:31:26Z
source: RIPE

person: Albegov Oleg Olegovich
address: 140180, Russia, Moscow region, Malakhovka, Shosseynaya str., 2a
phone: +7 (353) 87-215-5087
nic-hdl: AOO7-RIPE
mnt-by: MNT-MALNET
created: 2008-02-08T08:03:08Z
last-modified: 2015-10-09T09:48:23Z
source: RIPE # Filtered

% Information related to ‘91.203.196.0/22AS47156’ (91.203.196.0 – 91.203.199.255)
[1024 addresses in this network]
route: 91.203.196.0/22 (91.203.196.0 – 91.203.199.255)
[1024 addresses in this network]
descr: Malnet broadband in Moscow, Russia
origin: AS47156
mnt-by: MNT-MALNET
created: 2008-05-12T08:51:56Z
last-modified: 2010-07-01T08:31:35Z
source: RIPE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Londrina, Brazil left http://www.stewwebb.com/ and was blocked access via country blocking at http://www.stewwebb.com/tag/stew-webb/page/7/
2/17/2018 2:40:53 PM (36 minutes ago)
IP: 177.220.156.42 Hostname: mx.holm.adv.br
Human/Bot: Bot
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
inetnum: 177.220.156.40/30 (177.220.156.40 – 177.220.156.47)
[8 addresses in this network]
aut-num: AS14868
abuse-c: MLM
owner: SERVICO NACIONAL DE APRENDIZAGEM INDUSTRIAL – SEN
ownerid: 03.776.284/0001-09responsible: João Barreto Lopes
owner-c: DOFPG
tech-c: DOFPG
created: 20170307
changed: 20170307
inetnum-up: 177.220.144.0/20 (177.220.144.0 – 177.220.159.255)
[4096 addresses in this network]
nic-hdl-br: DOFPG
person: Dominios FIEP – PG
created: 20090729
changed: 20130812

nic-hdl-br: MLM
person: Administrador de Dominios COPEL Telecom
created: 19971218
changed: 20120709

% Security and mail abuse issues should also be addressed to
% cert.br, http://www.cert.br/ , respectivelly to cert@cert.br
% and mail-abuse@cert.br

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
São Paulo, Brazil left https://www.stewwebb.com/ and was blocked access via country blocking at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
2/17/2018 2:09:03 PM (1 hour 9 mins ago)
IP: 189.62.96.208 Hostname: bd3e60d0.virtua.com.br
Human/Bot: Bot
Browser: Firefox version 53.0 running on Linux
inetnum: 189.60.0.0/14 (189.60.0.0 – 189.63.255.255)
[262144 addresses in this network]
aut-num: AS28573
abuse-c: GRSVI
owner: CLARO S.A.
ownerid: 40.432.544/0835-06responsible: CLARO S.A.
owner-c: GRSVI
tech-c: GRSVI
inetrev: 189.62.0.0/16 (189.62.0.0 – 189.63.255.255)
[131072 addresses in this network]
nserver: ns7.virtua.com.br
nsstat: 20180215 AA
nslastaa: 20180215
nserver: ns8.virtua.com.br
nsstat: 20180215 AA
nslastaa: 20180215
created: 20070906
changed: 20151020

nic-hdl-br: GRSVI
person: Grupo de Segurança Vírtua
created: 20080512

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Phoenix, United States was blocked for Manual block by administrator at http://www.stewwebb.com/
2/17/2018 2:12:10 PM (1 hour 6 mins ago)
IP: 107.77.245.12 Hostname: 107.77.245.12
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_0_3 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A432 Safari/604.1
att.com

@@@@@@@@@@@@@@@@@@@@@

Birmingham, United States was blocked for Manual block by administrator at http://www.stewwebb.com/
2/17/2018 1:59:01 PM (1 hour 20 mins ago)
IP: 174.223.17.47 Hostname: 47.sub-174-223-17.myvzw.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/602.1 CFNetwork/811.5.4 Darwin/16.6.0

West Lafayette, United States was blocked for Manual block by administrator at http://www.stewwebb.com/favicon.ico
2/17/2018 1:18:56 PM (2 hours 1 min ago)
IP: 98.223.101.183 Hostname: c-98-223-101-183.hsd1.in.comcast.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/893.14.2 Darwin/17.3.0

Columbus, United States was blocked for Manual block by administrator at http://www.stewwebb.com/favicon.ico
2/17/2018 1:04:47 PM (2 hours 15 mins ago)
IP: 166.170.0.34 Hostname: mobile-166-170-000-034.mycingular.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0

Aston Mills, United States was blocked for Manual block by administrator at http://www.stewwebb.com/
2/17/2018 12:46:21 PM (2 hours 34 mins ago)
IP: 98.114.131.124 Hostname: pool-98-114-131-124.phlapa.fios.verizon.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Hacker
McNary, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/02/15/witness-stoneman-douglas-high-school-parkland-florida-2nd-shooter/
2/17/2018 2:29:11 PM (53 minutes ago)
IP: 50.38.247.27 Hostname: 50.38.247.27
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0

Sorry, but no data for that IP or domain was found.

IP address 50.38.247.27
Location Show Low, Arizona, United States

IP address 50.38.247.27
Reverse DNS (PTR record) not available
DNS server (NS record) auth.roch.ny.frontiernet.net (66.133.170.3)
auth.dlls.pa.frontiernet.net (199.224.64.201)
auth.lkvl.mn.frontiernet.net (66.133.150.11)
ASN number 5650
ASN name (ISP) Frontier Communications of America, Inc.
IP-range/subnet 50.32.0.0/12
50.32.0.0 – 50.47.255.255
Number of SPAM hosts on 50.32.0.0/12 6
NetRange: 50.32.0.0 – 50.55.255.255
CIDR: 50.48.0.0/13, 50.32.0.0/12
NetName: FRONTIER-COMMUNICATIONS
NetHandle: NET-50-32-0-0-1
Parent: NET50 (NET-50-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5650
Organization: Frontier Communications of America, Inc. (FRTR
OrgName: Frontier Communications of America, Inc.
OrgId: FRTR
Address: 95 Fitzhugh St N
City: Rochester
StateProv: NY
PostalCode: 14614
Country: US
RegDate: 1996-05-08
Updated: 2017-01-28
Comment: all abuse complaints will only be answered when sen
866-474-7662

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Covington, United States left http://www.stewwebb.com/resources-blogs/ and visited http://www.stewwebb.com/2016/12/09/george-w-bush-fraud-lock-him-up/
2/17/2018 12:28:08 PM (2 hours 56 mins ago)
IP: 72.49.110.215 Hostname: nw-esr1-72-49-110-215.fuse.net
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:58.0) Gecko/20100101 Firefox/58.0

Sorry, but no data for that IP or domain was found.

IP address 72.49.110.215
Reverse DNS (PTR record) nw-esr1-72-49-110-215.fuse.net
DNS server (NS record) ns1.fuse.net (216.68.1.100)
ns2.fuse.net (216.68.2.100)
ASN number 6181
ASN name (ISP) Cincinnati Bell Telephone Company LLC
IP-range/subnet 72.49.0.0/17
72.49.0.0 – 72.49.127.255
@@@@@@@@
Domains around 72.49.110.215
IP address #domains
72.49.110.206 1
Domains on 72.49.110.206
Domain Tools
goofyhippo.com
This domain is hosted by Cincinnati Bell Telephone Company LLC (AS6181). The first DNS server is dns1.zoneedit.com. The current IPv4 address is 72.49.110.206. The mail server with the highest priority is mx-caprica.zoneedit.com.
DNS server (NS records) dns1.zoneedit.com (45.77.82.193)
dns2.zoneedit.com (45.79.110.158)
Mail server (MX records) mx-caprica.zoneedit.com (166.88.18.34)
IP address (IPv4) 72.49.110.206
IP address (IPv6)
ASN number 6181
ASN name (ISP) Cincinnati Bell Telephone Company LLC
IP-range/subnet 72.49.0.0/17
72.49.0.0 – 72.49.127.255
Domain Name: goofyhippo.com
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Goofy Hippo
Name Server: DNS1.ZONEEDIT.COM
Name Server: DNS2.ZONEEDIT.COM
DNSSEC: unsigned
OrgName: Fuse Internet Access
OrgId: FIAI
Address: 209 W. Seventh St.
City: Cincinnati
StateProv: OH
PostalCode: 45202
Country: US
RegDate: 1998-09-10
Updated: 2017-01-28
OrgName: Fuse Internet Access
OrgId: FIAI
Address: 209 W. Seventh St.
City: Cincinnati
StateProv: OH
PostalCode: 45202
Country: US
RegDate: 1998-09-10
Updated: 2017-01-28
OrgTechHandle: GSP36-ARIN
OrgTechName: Pennington, Gregory Scott
513-608-7516
RTechHandle: RW855-ARIN
RTechName: Wagner, Rick
@@@@@@@@@@@@
fuse.net
This domain is hosted by Cincinnati Bell Telephone Company LLC (AS6181). The first DNS server is ns1.fuse.net. The current IPv4 address is 216.68.1.60. The mail server with the highest priority is mx2.fuse.net.
=spf1 ip4:216.68.8.0/24 ip4:216.68.1.178
mx a:mail-out1.fuse.net
a:mail-out2.fuse.net
a:mail-out3.fuse.net
a:smtp.fuse.net
a:smtp1.fuse.net
a:smtp2.fuse.net
a:smtp3.fuse.net
include:zoomtown.com
include:_spf.cincibell.syn-alias.com ?a

DNS server (NS records) ns1.fuse.net (216.68.1.100)
Mail server (MX records) mx2.fuse.net (64.8.71.15)
mx3.fuse.net (64.8.71.15)
mx4.fuse.net (64.8.71.15)
mx1.fuse.net (64.8.71.15)
IP address (IPv4) 216.68.1.60
IP address (IPv6)
ASN number 6181
ASN name (ISP) Cincinnati Bell Telephone Company LLC
IP-range/subnet 216.68.0.0/16
216.68.0.0 – 216.68.255.255
Domain Name: FUSE.NET
Registry Domain ID: 491567_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registry Registrant ID:
Registrant Name: Cincinnati Bell Telephone, Fuse Internet
Registrant Organization: Cincinnati Bell Telephone, Fuse Internet
Registrant Street: 201 E 4TH ST STE 121-920
Registrant City: CINCINNATI
Registrant State/Province: OH
Registrant Postal Code: 45202-4248
Registrant Country: US
88886381699
8003337680
Registry Tech ID:
Tech Name: Blades, Mitch
Tech Organization: Cincinnati Bell Telephone, Fuse Internet Access
Tech Street: 209 W 7TH ST # 121-700
Tech City: CINCINNATI
Tech State/Province: OH
Tech Postal Code: 45202-2373
Tech Country: US

cinbell.com
v=spf1 ip4:161.155.0.0/16
include:spf.messagelabs.com
include:_spf1.cinbell.com ~a
DNS server (NS records) ns2.cinbell.com (161.155.111.59)
ns3.cinbell.com (161.155.111.60)
ns1.cinbell.com (161.155.111.57)
Mail server (MX records) cluster6.us.messagelabs.com (216.82.251.38)
cluster6a.us.messagelabs.com (216.82.251.230)
IP address (IPv4) 161.155.103.94
IP address (IPv6)
ASN number 6181
ASN name (ISP) Cincinnati Bell Telephone Company LLC
IP-range/subnet 161.155.96.0/19
161.155.96.0 – 161.155.127.255
Registry Admin ID:
Admin Name: Administrator, Domain
Admin Organization: Cincinnati Bell
Admin Street: 221 E 4th St
Admin City: Cincinnati
Admin State/Province: OH
Admin Postal Code: 45202
Admin Country: US
5133975104

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
mail
Stevens Point, United States visited http://www.stewwebb.com/
2/17/2018 12:04:06 PM (3 hours 20 mins ago)
IP: 66.190.11.43 Hostname: 66-190-11-43.dhcp.stpt.wi.charter.com
Browser: Chrome version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_5 like Mac OS X) AppleWebKit/604.1.34 (KHTML, like Gecko) CriOS/64.0.3282.112 Mobile/15D60 Safari/604.1

chartercom.com

charter.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@
Hacker
Saint-Quentin, Canada left http://www.stewwebb.com/stewwebb/ and visited http://www.stewwebb.com/
2/17/2018 10:40:29 AM (4 hours 48 mins ago)
IP: 67.215.1.147 Hostname: objective.myoriginating.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.167 Safari/537.36

NetRange: 67.215.0.0 – 67.215.15.255
[4096 addresses in this network]
CIDR: 67.215.0.0/20 (67.215.0.0 – 67.215.31.255)
[8192 addresses in this network]
NetName: GTCOMM
NetHandle: NET-67-215-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS36666
Organization: GloboTech Communications (GLOBO)
RegDate: 2007-10-08
Updated: 2014-08-07
Comment: www.gtcomm.net
Ref: https://whois.arin.net/rest/net/NET-67-215-0-0-1

OrgName: GloboTech Communications
OrgId: GLOBO
Address: PO Box 1402
City: Saint-Quentin
StateProv: NB
PostalCode: E8A-1A2
Country: CA
RegDate: 2003-01-11
Updated: 2017-01-28
Comment: Please send abuse complaints to abuse@gtcomm.net
Comment: This space is statically assigned
Comment: www.gtcomm.net
Ref: https://whois.arin.net/rest/org/GLOBO

OrgNOCHandle: GNO-ARIN
OrgNOCName: GloboTech Network Operations Center
OrgNOCPhone: +1-514-907-0050
OrgNOCEmail: noc@gtcomm.net
OrgNOCRef: https://whois.arin.net/rest/poc/GNO-ARIN

OrgTechHandle: PQU-ARIN
OrgTechName: Quimper, Pierre-Luc
OrgTechPhone: +1-514-907-0750
OrgTechEmail: plquimper@gtcomm.net
OrgTechRef: https://whois.arin.net/rest/poc/PQU-ARIN

OrgAbuseHandle: GNO-ARIN
OrgAbuseName: GloboTech Network Operations Center
OrgAbusePhone: +1-514-907-0050
OrgAbuseEmail: noc@gtcomm.net
OrgAbuseRef: https://whois.arin.net/rest/poc/GNO-ARIN

RNOCHandle: GNO-ARIN
RNOCName: GloboTech Network Operations Center
RNOCPhone: +1-514-907-0050
RNOCEmail: noc@gtcomm.net
RNOCRef: https://whois.arin.net/rest/poc/GNO-ARIN

RTechHandle: GNO-ARIN
RTechName: GloboTech Network Operations Center
RTechPhone: +1-514-907-0050
RTechEmail: noc@gtcomm.net
RTechRef: https://whois.arin.net/rest/poc/GNO-ARIN

RAbuseHandle: ABUSE4826-ARIN
RAbuseName: Abuse Coordinator
RAbusePhone: +1-514-907-0050
RAbuseEmail: abuse@gtcomm.net
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE4826-ARIN

@@@@@@@@@@@@@@@@@@@
his domain is not registered in the DNS. It is archived in our system on 2014-07-08.

objective.myoriginating.net
Startip Endip Description Country #domains #spamhosts
192.84.85.0 192.84.85.255 Objective Interface Systems, Inc. US 0 0
198.137.135.0 198.137.135.255 Objective Systems Integrators, Inc. US 0 0
202.49.123.0 202.49.123.255 Objective Solutions NZ 0 0
204.138.143.0 204.138.143.255 Objective Edge, Inc. CA 0 0
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 12 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 123 12
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 1
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 1
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 2
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 52 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 205 5
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 402 2
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 6 0
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 1
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 108 1
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 82 0
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 0 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 0
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 31 6
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 10 4
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 19 0
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 49 2
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 14 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 2 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 21 2
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 1
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 12 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 157 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,440 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 931 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
2001:df1:3f00:: 2001:df1:3f00:ffff:ffff:ffff:ffff:ffff Crystal Net Pte Ltd SG 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,033 88
20911 Net-Surf.net Ltd. BG 28 0 68 12
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 166 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 19 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 49 2 4,205 15
3254 Lucky Net Ltd UA 4 0 2,296 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 90,956 14
3931 Logical Net Corporation US 6 0 746 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,839 24
4776 A-Net Co., Ltd. TH 35 1 147 1
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 386 13 33,848 509
5405 CSO.net Internet Services GmbH AT 1 1 3,971 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 666 5
6364 Atlantic.net, Inc. US 47 5 18,835 1
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,937 0 11,097 14
6624 Gower.Net US 2 0 27 0
6735 sdt.net AG DE 6 1 301 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 164 0
7106 Com Net, Inc. US 9 1 959 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 3 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 516 0
7641 China Broadcasting TV Net CN 8 0 54 0
7806 Binary Net, LLC US 14 0 1,277 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,349 0
8057 Vision Net, Inc. US 43 1 315 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 294 7
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI
@@@@@@@
gtcomm.net
This domain is hosted by GloboTech Communications (AS36666). The first DNS server is dns2.gtcomm.net. The current IPv4 address is 67.43.229.5. The mail server with the highest priority is barracuda-1001-mtl3.gtcomm.net.
v=spf1 ip4:68.168.125.37 ip4:173.209.62.186 ip4:67.215.15.242
ip4:67.215.15.243 ip4:72.10.164.10 ip4:67.215.2.170 ip4:67.43.224.2 ~al
DNS server (NS records) dns2.gtcomm.net (72.10.164.70)
dns1.gtcomm.net (72.10.164.69)
Mail server (MX records) barracuda-1001-mtl3.gtcomm.net (67.215.3.114)
IP address (IPv4) 67.43.229.5
IP address (IPv6)
ASN number 36666
ASN name (ISP) GloboTech Communications
IP-range/subnet 67.43.224.0/20
67.43.224.0 – 67.43.239.255
Domain Name: GTCOMM.NET
Registry Domain ID: 38771499_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.publicdomainregistry.com
Registry Registrant ID: Not Available From Registry
Registrant Name: Pierre-Luc Quimper
Registrant Organization: GloboTech Communications
Registrant Street: PO Box 1402
Registrant City: Saint-Quentin
Registrant State/Province: New-Brunswick
Registrant Postal Code: E8A 1A2
Registrant Country: CA
1.5149070050
Registry Admin ID: Not Available From Registry
Admin Name: Pierre-Luc Quimper
Admin Organization: GloboTech Communications
Admin Street: PO Box 1402
Admin City: Saint-Quentin
Admin State/Province: New-Brunswick
Admin Postal Code: E8A 1A2
Admin Country: CA
gtcomm.net

publicdomainregistry.com
. It is not listed in the DMOZ directory. This domain is hosted by PDR (AS394695). The first DNS server is andy.ns.cloudflare.com. The current IPv4 address is 162.251.80.231. The mail server with the highest priority is mx3.mailhostbox.com.
v=spf1 a:115.114.106.25
a:livechat-1.myorderbox.com
a:livechat.myorderbox.com
a:mx.directi.com redirect=_spf.mailhostbox.com
include:_spf.mailersportal.smtp.com
DNS server (NS records) andy.ns.cloudflare.com (173.245.59.101)
dora.ns.cloudflare.com (173.245.58.108)
Mail server (MX records) mx3.mailhostbox.com (162.222.225.6)
mx2.mailhostbox.com (162.222.225.7)
mx1.mailhostbox.com (162.222.225.8)
IP address (IPv4) 162.251.80.231
162.251.80.249
IP address (IPv6)
ASN number 394695
ASN name (ISP) PDR
IP-range/subnet 162.251.80.0/21
162.251.80.0 – 162.251.87.255
Domain Name: PUBLICDOMAINREGISTRY.COM
Registry Domain ID: 108966382_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.publicdomainregistry.com
egistry Registrant ID: Not Available From Registry
Registrant Name: Domain Manager
Registrant Organization: P.D.R. Solutions (U.S.) LLC
Registrant Street: 10 Corporate Drive
Registrant City: Burlington
Registrant State/Province: Massachusetts
Registrant Postal Code: 01803
Registrant Country: US
Registry Admin ID: Not Available From Registry
Admin Name: Domain Manager
Admin Organization: P.D.R. Solutions (U.S.) LLC
Admin Street: 10 Corporate Drive
Admin City: Burlington
Admin State/Province: Massachusetts
Admin Postal Code: 01803
Admin Country: US
91.2267209000

@@@@@@@@@@@@@@@@@@@@@
Eindhoven, Netherlands visited http://www.stewwebb.com/
2/17/2018 10:01:47 AM (5 hours 27 mins ago)
IP: 80.57.98.143 Hostname: g98143.upc-g.chello.nl
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36 OPR/50.0.2762.67
% Information related to ‘80.56.0.0 – 80.57.255.255’
[131072 addresses in this network]
% Abuse contact for ‘80.56.0.0 – 80.57.255.255’ is ‘abuse@ziggo.nl’
[131072 addresses in this network]
inetnum: 80.56.0.0 – 80.57.255.255
[131072 addresses in this network]
netname: NL-CHELLO-20000509
country: NL
org: ORG-CB6-RIPE
admin-c: LGI-RIPE
tech-c: LGI-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-LGI
mnt-lower: ZIGGO-SERVICES-MNT
mnt-lower: MNT-LGI
mnt-routes: AS6830-MNT
created: 2001-12-11T16:14:52Z
last-modified: 2016-09-15T15:51:42Z
source: RIPE # Filtered

organisation: ORG-CB6-RIPE
org-name: Ziggo Services B.V.
org-type: LIR
address: Postbus 43048
address: 3540AA
address: Utrecht
address: NETHERLANDS
phone: +31 20 7788200
fax-no: +31 20 7788203
admin-c: SB666-RIPE
admin-c: JK8125-RIPE
admin-c: LGI-RIPE
mnt-ref: ZIGGO-SERVICES-MNT
abuse-c: UNA7-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: MNT-LGI
mnt-by: RIPE-NCC-HM-MNT
mnt-by: MNT-LGI
created: 2004-04-17T11:40:21Z
last-modified: 2016-06-20T14:02:07Z
source: RIPE # Filtered

role: Liberty Global RIPE DBM
address: Liberty Global Europe
address: Boeing Avenue 53
address: 1119 PE Schiphol Rijk
address: Netherlands
phone: +31 20 7788200
fax-no: +31 20 7788203
admin-c: SB666-RIPE
admin-c: JK8125-RIPE
admin-c: SVS4-RIPE
tech-c: SB666-RIPE
tech-c: JK8125-RIPE
tech-c: SVS4-RIPE
nic-hdl: LGI-RIPE
mnt-by: MNT-LGI
created: 2012-07-03T07:33:27Z
last-modified: 2015-10-28T09:47:29Z
source: RIPE # Filtered

% Information related to ‘80.57.0.0/16AS6830’ (80.57.0.0 – 80.57.255.255)
[65536 addresses in this network]
route: 80.57.0.0/16 (80.57.0.0 – 80.57.255.255)
[65536 addresses in this network]
descr: chello Broadband
origin: AS6830
mnt-by: AS6830-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2010-01-25T10:18:09Z
source: RIPE # Filtered
@@@@@@@@@@@@@@@@@@@@@@@@@@@
Hacker
South New Berlin, United States arrived from https://www.bing.com/ and visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
2/17/2018 8:01:24 AM (7 hours 30 mins ago)
IP: 172.79.148.69 Hostname: 172.79.148.69
Browser: IE version 11.0 running on Win8.1

Sorry, but no data for that IP or domain was found.

P address 172.79.148.69
Location South New Berlin, New York, United States
IP address 172.79.148.69
Reverse DNS (PTR record) not available
DNS server (NS record) auth.dlls.pa.frontiernet.net (199.224.64.201)
auth.lkvl.mn.frontiernet.net (66.133.150.11)
auth.roch.ny.frontiernet.net (66.133.170.3)
ASN number 5650
ASN name (ISP) Frontier Communications of America, Inc.
IP-range/subnet 172.76.0.0/14
172.76.0.0 – 172.79.255.255
@@@@@@@@@@@@
Number of SPAM hosts on 172.76.0.0/14

OrgName: Frontier Communications of America, Inc.
OrgId: FRTR
Address: 95 Fitzhugh St N
City: Rochester
StateProv: NY
PostalCode: 14614
Country: US
RegDate: 1996-05-08
Updated: 2017-01-28

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
left off
all above blocked on cloud
7pm cst
Top 5 Ips Throttlibg site
174.223.17.47 United States US 105 hits in 2 hours
71.30.46.242 United States US 53 hits in 2 hours
107.77.104.86 United States US 52 hits in 2 hours
71.215.54.86 United States US 44 hits in 2 hours
166.170.0.34 United States US 42 hits in 2 hours

United States Ashburn, United States visited http://www.stewwebb.com/2016/02/28/ted-cruz-wife-former-george-w-bush-nsa-stooge/
2/17/2018 7:08:57 PM (36 seconds ago)
IP: 54.227.48.147 Hostname: ec2-54-227-48-147.compute-1.amazonaws.com
Browser: undefined
CCBot/2.0 (http://commoncrawl.org/faq/)
NetRange: 54.224.0.0 – 54.239.255.255
[1048576 addresses in this network]
CIDR: 54.224.0.0/12 (54.224.0.0 – 54.255.255.255)
[2097152 addresses in this network]
NetName: AMAZON-2011L
NetHandle: NET-54-224-0-0-1
Parent: NET54 (NET-54-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS16509
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2012-03-01
Updated: 2012-04-02
Ref: https://whois.arin.net/rest/net/NET-54-224-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
United States Ashburn, United States visited http://www.stewwebb.com/
2/17/2018 7:10:03 PM (17 seconds ago)
IP: 34.230.79.190 Hostname: ec2-34-230-79-190.compute-1.amazonaws.com
Browser: Chrome version 60.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.78 Safari/537.36

NetRange: 34.192.0.0 – 34.255.255.255
[4194304 addresses in this network]
CIDR: 34.192.0.0/10 (34.192.0.0 – 34.255.255.255)
[4194304 addresses in this network]
NetName: AT-88-Z
NetHandle: NET-34-192-0-0-1
Parent: NET34 (NET-34-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2016-09-12
Updated: 2016-09-12
Ref: https://whois.arin.net/rest/net/NET-34-192-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US

@@@@@@@@@@@@@@@@@@@@@@@@@
United States Ashburn, United States visited http://www.stewwebb.com/2016/02/21/us-president-john-f-kennedy-murder-case-reopened/
2/17/2018 7:11:20 PM (17 seconds ago)
IP: 54.227.48.147 Hostname: ec2-54-227-48-147.compute-1.amazonaws.com
Browser: undefined
CCBot/2.0 (http://commoncrawl.org/faq/)
NetRange: 54.224.0.0 – 54.239.255.255
[1048576 addresses in this network]
CIDR: 54.224.0.0/12 (54.224.0.0 – 54.255.255.255)
[2097152 addresses in this network]
NetName: AMAZON-2011L
NetHandle: NET-54-224-0-0-1
Parent: NET54 (NET-54-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS16509
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2012-03-01
Updated: 2012-04-02
Ref: https://whois.arin.net/rest/net/NET-54-224-0-0-1

@@@@@@@@@@@@@@@@@@@@@@@@@
Australia Adelaide, Australia visited http://www.stewwebb.com/2018/02/15/witness-stoneman-douglas-high-school-parkland-florida-2nd-shooter/
2/17/2018 7:03:06 PM (10 minutes ago)
IP: 49.178.21.6 Hostname: pa49-178-21-6.pa.nsw.optusnet.com.au
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 10_3_2 like Mac OS X) AppleWebKit/603.2.4 (KHTML, like Gecko) Mobile/14F89 [FBAN/FBIOS;FBAV/142.0.0.79.88;FBBV/72578945;FBDV/iPhone9,3;FBMD/iPhone;FBSN/iOS;FBSV/10.3.2;FBSS/2;FBCR/OPTUS;FBID/phone;FBLC/en_GB;FBOP/5;FBRV/73520697]
% Information related to ‘49.176.0.0 – 49.191.255.255’
[1048576 addresses in this network]
% Abuse contact for ‘49.176.0.0 – 49.191.255.255’ is ‘abuse@optus.net.au’
[1048576 addresses in this network]
inetnum: 49.176.0.0 – 49.191.255.255
[1048576 addresses in this network]
netname: OPTUSINTERNET-AU
descr: Optus Internet Pty Ltd
descr: Building A, 2nd Floor
descr: 1 Lyonpark Road
country: AU
admin-c: OI3-AP
tech-c: OI3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-OPTUSINTERNET
mnt-routes: MAINT-AU-OPTUSINTERNET
mnt-irt: IRT-OPTUSINTERNET-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2016-05-04T00:27:14Z
source: APNIC

irt: IRT-OPTUSINTERNET-AU
address: 1 Lyonpark Rd.
address: Macquarie Park, NSW 2113
e-mail: abuse@optus.net.au
abuse-mailbox: abuse@optus.net.au
admin-c: OI3-AP
tech-c: OI3-AP
auth: # Filtered
mnt-by: MAINT-AU-OPTUSINTERNET
last-modified: 2010-11-24T02:09:46Z
source: APNIC

role: Optus Internet
address: 1 Lyonpark Rd.
address: Macquarie Park, NSW 2113
country: AU
phone: +61-2-8082 7800
fax-no: +61-2-8082 7100
e-mail: ipadmin@optus.net.au
admin-c: OI1-AP
tech-c: OI1-AP
nic-hdl: OI3-AP
notify: ipadmin@optus.net.au

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
blocked by firwall
Oklahoma City, United States was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://stewwebb.com/
2/17/2018 4:28:09 PM (2 hours 46 mins ago)
IP: 68.12.90.178 Hostname: ip68-12-90-178.ok.ok.cox.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; VS995 Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@
cber attacker
Vienna, Austria was blocked by firewall at http://stewwebb.com/wp-content/plugins/delete-all-comments/readme.txt
2/17/2018 5:47:40 PM (1 hour 28 mins ago)
IP: 80.122.98.69 Hostname: 80.122.98.69
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win8
Mozilla/5.0 (Windows NT 6.2; WOW64; rv:48.0) Gecko/20100101 Firefox/48.0
% Information related to ‘80.122.98.64 – 80.122.98.71’
[8 addresses in this network]
% Abuse contact for ‘80.122.98.64 – 80.122.98.71’ is ‘abuse@a1telekom.at’
[8 addresses in this network]
inetnum: 80.122.98.64 – 80.122.98.71
[8 addresses in this network]
netname: NITZKYCHRIST-HWY-AT
descr: Christian Nitzky
descr: Rudolf Jursitzky-Weg
descr: 2442 Unterwaltersdorf
country: AT
admin-c: HMH25-RIPE
tech-c: HMH25-RIPE
status: ASSIGNED PA
mnt-by: AS8447-MNT
mnt-lower: AS8447-MNT
created: 2016-04-28T07:57:01Z
last-modified: 2016-04-28T07:57:01Z
source: RIPE

role: Host Master Highway
address: A1 Telekom Austria AG
address: Arsenal Objekt 24
address: 1030 Vienna
address: Austria
phone: +43 50664 0
fax-no: + 43 1 7962565
abuse-mailbox: abuse@a1telekom.at
remarks: for database maintenance please contact
remarks: < hostmaster @ aon.at >
admin-c: MA3804-RIPE
admin-c: AJ2061-RIPE
tech-c: MA3804-RIPE
tech-c: AJ2061-RIPE
tech-c: HH1035-RIPE
nic-hdl: HMH25-RIPE
mnt-by: AS8447-MNT
created: 2002-05-31T10:41:49Z
last-modified: 2017-08-28T10:41:39Z
source: RIPE # Filtered

% Information related to ‘80.120.0.0/14AS8447’ (80.120.0.0 – 80.127.255.255)
[524288 addresses in this network]
route: 80.120.0.0/14 (80.120.0.0 – 80.127.255.255)
[524288 addresses in this network]
descr: HIGHWAY194
origin: AS8447

@@@@@@
Moscow, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
2/17/2018 3:31:33 PM (3 hours 45 mins ago)
IP: 86.62.76.100 Hostname: h86-62-76-100.ln.rinet.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
% Information related to ‘86.62.76.96 – 86.62.76.111’
[16 addresses in this network]
% Abuse contact for ‘86.62.76.96 – 86.62.76.111’ is ‘abuse@rinet.ru’
[16 addresses in this network]
inetnum: 86.62.76.96 – 86.62.76.111
[16 addresses in this network]
netname: DUB17A-NET
descr: Residential networks segment
descr: RiNet ISP Neighbourhood
country: RU
admin-c: RNH-RIPE
tech-c: RNH-RIPE
status: ASSIGNED PA
remarks: INFRA-AW
mnt-by: RINET-MNT
created: 2007-03-23T12:13:04Z
last-modified: 2007-03-23T12:13:04Z
source: RIPE

role: RiNet Home-Residential Networks NOC
address: RiNet NOC, Home/Residential Dept.
address: Cronyx Plus Ltd (RiNet ISP)
address: Off.111, Bld.11a, 1st Khvostov Lane
address: Moscow 119180 RU
phone: +7 (495) 287-0877
fax-no: +7 (495) 783-9181
abuse-mailbox: abuse@rinet.ru
remarks: ———————————————-
remarks: NOC working hours:
remarks: 10am-10pm MSK/MSD (GMT+3/+4) everyday
remarks: ———————————————-
remarks: Contact addresses by category:
remarks: Routing: noc@rinet.ru
remarks: Domains/IP delegation: hostmaster@rinet.ru
remarks: SPAM/UCE: abuse@rinet.ru
remarks: Scans/Hacking attempts: security@rinet.ru
remarks: Mail: postmaster@rinet.ru
remarks: ———————————————-
admin-c: SIR-RIPE
admin-c: MCK-RIPE
tech-c: MCK-RIPE
tech-c: OBUL-RIPE
tech-c: DF254-RIPE
tech-c: RHM-RIPE
nic-hdl: RNH-RIPE
remarks: $Revision: 1.10 $
mnt-by: RINET-MNT
created: 2003-06-17T11:45:07Z
last-modified: 2015-04-09T16:00:13Z
source: RIPE # Filtered

% Information related to ‘86.62.64.0/18AS8331’ (86.62.64.0 – 86.62.127.255)
[16384 addresses in this network]
route: 86.62.64.0/18 (86.62.64.0 – 86.62.127.255)
[16384 addresses in this network]
descr: Cronyx Plus (RiNet ISP)
origin: AS8331
mnt-by: RINET-MNT
created: 2005-06-07T15:24:36Z

@@@@@@@@@@@@@@@@@@@@@@
Argentina Mendoza, Argentina was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://stewwebb.com/
2/17/2018 6:43:23 PM (34 minutes ago)
IP: 186.130.190.190 Hostname: 186-130-190-190.speedy.com.ar
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0.1; SM-J510MN Build/MMB29M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

@@@@@@@@@@@
inetnum: 186.128/14
status: allocated
aut-num: N/A
owner: Telefonica de Argentina
ownerid: AR-TEAR7-LACNIC
responsible: José Luis Pérez Elias
address: AV. ING. HUERGO, 723, GERENCIA DE REQUERIMIENTOS JUDICIALES
address: 1065 – Buenos Aires – CF
country: AR
phone: +54 8102220102 []
owner-c: TEA
tech-c: TEA
abuse-c: TEA
inetrev: 186.128/14
nserver: DNS1.MRSE.COM.AR
nsstat: 20180217 AA
nslastaa: 20180217
nserver: DNS2.MRSE.COM.AR
nsstat: 20180217 AA
nslastaa: 20180217
nserver: DNS3.MRSE.COM.AR
nsstat: 20180217 AA
nslastaa: 20180217
nserver: DNS4.MRSE.COM.AR
nsstat: 20180217 AA
nslastaa: 20180217
created: 20090928
changed: 20090928
@@@@@@@@@@@@@@@@@@@@@@@@@@@
South Sioux City, United States arrived from https://search.yahoo.com/ and visited http://www.stewwebb.com/2016/05/25/hillary-clinton-lesbian-demon-pedophile-child-rapist/
2/17/2018 5:34:32 PM (1 hour 46 mins ago)
IP: 66.172.210.199 Hostname: SSC-FTTH-DHCP.longlines.com
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.167 Safari/537.36

NetRange: 66.172.192.0 – 66.172.255.255
[16384 addresses in this network]
CIDR: 66.172.192.0/18 (66.172.192.0 – 66.172.255.255)
[16384 addresses in this network]
NetName: LLI-BLCK1
NetHandle: NET-66-172-192-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Long Lines Internet (LLI-9)
RegDate: 2004-08-13
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-66-172-192-0-1

OrgName: Long Lines Internet
OrgId: LLI-9
Address: 504 Fourth Street
City: Sergeant Bluff
StateProv: IA
PostalCode: 51054
Country: US
RegDate: 2002-10-29
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/LLI-9

OrgTechHandle: LLINO1-ARIN
OrgTechName: Long Lines Internet Network Operations
OrgTechPhone: +1-712-271-5900
OrgTechEmail: netops@longlines.com
OrgTechRef: https://whois.arin.net/rest/poc/LLINO1-ARIN

OrgTechHandle: COLLI88-ARIN
OrgTechName: Collison, Karla
OrgTechPhone: +1-712-271-5904
OrgTechEmail: karlac@longlines.com
OrgTechRef: https://whois.arin.net/rest/poc/COLLI88-ARIN

OrgAbuseHandle: LLINO1-ARIN
OrgAbuseName: Long Lines Internet Network Operations
OrgAbusePhone: +1-712-271-5900
OrgAbuseEmail: netops@longlines.com
OrgAbuseRef: https://whois.arin.net/rest/poc/LLINO1-ARIN

longlines.com
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Netherlands Veendam, Netherlands left http://www.stewwebb.com/satanic_human_sacrifice_fbi_raid_1998Picture.mpg and visited http://www.stewwebb.com/well-known-dnt-policy
2/17/2018 5:29:23 PM (1 hour 52 mins ago)
IP: 46.244.60.164 Hostname: host-46-244-60-164.netvisit.nl
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
% Information related to ‘46.244.48.0 – 46.244.63.255’
[4096 addresses in this network]
% Abuse contact for ‘46.244.48.0 – 46.244.63.255’ is ‘info@netvisit.nl’
[4096 addresses in this network]
inetnum: 46.244.48.0 – 46.244.63.255
[4096 addresses in this network]
netname: NL-NETVISIT-20101228
country: NL
org: ORG-NB46-RIPE
admin-c: HH124-RIPE
tech-c: FE1868-RIPE
status: ALLOCATED PA
mnt-by: RIPE-NCC-HM-MNT
mnt-by: NETVISIT-MNT
mnt-routes: NETVISIT-MNT
created: 2014-04-08T09:01:55Z
mnt-domains: NETVISIT-MNT
last-modified: 2017-03-01T20:43:24Z
source: RIPE # Filtered

organisation: ORG-NB46-RIPE
org-name: Netvisit B.V.
org-type: LIR
address: Locomobielstraat 8
address: 9641 MB
address: Veendam
address: NETHERLANDS
phone: +31598712021
fax-no: +31598635078
abuse-c: AR16239-RIPE
mnt-ref: NETVISIT-MNT
mnt-ref: RIPE-NCC-HM-MNT
mnt-by: RIPE-NCC-HM-MNT
mnt-by: NETVISIT-MNT
created: 2013-05-08T10:59:44Z
last-modified: 2017-10-30T15:32:52Z
source: RIPE # Filtered

person: Freddy van Egmond
address: Locomobielstraat 8
address: 9641 MB
address: Veendam
phone: +31 598 626417
nic-hdl: FE1868-RIPE
mnt-by: NETVISIT-MNT
created: 2013-05-14T09:37:10Z
last-modified: 2013-05-14T09:37:11Z
source: RIPE # Filtered

person: H Huising
address: Locomobielstraat 8
address: 9641 MB Veendam
phone: +31 (0)598 626417
nic-hdl: HH124-RIPE
mnt-by: OPENPEERING-MNT
created: 2009-08-25T13:31:17Z
last-modified: 2009-08-25T13:31:17Z
source: RIPE

% Information related to ‘46.244.48.0/20AS49784’ (46.244.48.0 – 46.244.63.255)
[4096 addresses in this network]
route: 46.244.48.0/20 (46.244.48.0 – 46.244.63.255)
[4096 addresses in this network]
descr: Netvisit B.V.
origin: AS49784
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Meadville, United States arrived from https://duckduckgo.com/ and visited http://www.stewwebb.com/2016/05/25/hillary-clinton-lesbian-demon-pedophile-child-rapist/
2/17/2018 5:03:06 PM (2 hours 19 mins ago)
IP: 24.154.152.13 Hostname: dynamic-acs-24-154-152-13.zoominternet.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; LG-LS777 Build/NRD90U) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@@
Columbia, United States visited http://www.stewwebb.com/2018/02/15/witness-stoneman-douglas-high-school-parkland-florida-2nd-shooter/
2/17/2018 7:24:32 PM (1 minute ago)
IP: 174.193.143.191 Hostname: 191.sub-174-193-143.myvzw.com
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 10_3_3 like Mac OS X) AppleWebKit/603.3.8 (KHTML, like Gecko) Mobile/14G60 [FBAN/FBIOS;FBAV/159.0.0.48.97;FBBV/91994325;FBDV/iPhone9,1;FBMD/iPhone;FBSN/iOS;FBSV/10.3.3;FBSS/2;FBCR/Verizon;FBID/phone;FBLC/en_US;FBOP/5;FBRV/92489346]

@@@@@@@@@@@@@@@@@@@@@@@@@

Type: Bot
United States White Lake, United States visited http://www.stewwebb.com/
2/17/2018 7:26:22 PM (2 minutes ago)
IP: 76.122.163.135 Hostname: c-76-122-163-135.hsd1.mi.comcast.net
Browser: Safari version 0.0 running on iOS
MobileSafari/602.1 CFNetwork/811.5.4 Darwin/16.6.0

@@@@@@@@@@@@@@@@@@@@@@@@@
United States Ashburn, United States visited http://www.stewwebb.com/tag/leoard-millman/
2/17/2018 7:29:31 PM (19 seconds ago)
IP: 54.162.75.204 Hostname: ec2-54-162-75-204.compute-1.amazonaws.com
Browser: undefined
Mozilla/5.0 (compatible; Cliqzbot/2.0; +http://cliqz.com/company/cliqzbot)

NetRange: 54.160.0.0 – 54.175.255.255
[1048576 addresses in this network]
CIDR: 54.160.0.0/12 (54.160.0.0 – 54.191.255.255)
[2097152 addresses in this network]
NetName: AMAZON-2011L
NetHandle: NET-54-160-0-0-1
Parent: NET54 (NET-54-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2014-06-20
Updated: 2014-06-20
Ref: https://whois.arin.net/rest/net/NET-54-160-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of act

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Las Vegas, United States visited http://www.stewwebb.com/
2/17/2018 7:30:15 PM (13 seconds ago)
IP: 71.38.255.140 Hostname: 71-38-255-140.lsv2.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
@@@@@@@@@@@@@@@@@@@@@@@

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Witness Stoneman Douglas High School Parkland Florida 2nd shooter

By Stew Webb Federal Whistleblower

This school shooting smells like George HW Bush “Daddy Bush” behind it?

Question were is the story about yesterdays NSA attack and the three they caught?

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




RIP Otis Johnson Stone-R to death July 2017 by George HW Bush

By Stew Webb Federal Whistleblower

RIP Super Spook NSA – CIA Otis Johnson Stone-R to death July 2017 by George HW Bush and his E-Systems Weststar Satellite’s a Department of Defense Contractor based in Dallas, Texas.

Super Spook Otis Johnson Maritime activities against the USSR

In 1973, SAD/SOG and the CIA’s Directorate of Science and Technology built and deployed the USNS Glomar Explorer (T-AG-193), a large deep-sea salvage ship, on a secret operation. This operation was called Project Azorian (erroneously called Project Jennifer by the press).[63] Her mission was to recover a sunken Soviet submarine, K-129, which had been lost in April 1968.[64][65] A mechanical failure caused two-thirds of the submarine to break off during recovery,[63] but SAD recovered two nuclear-tipped torpedoes, cryptographic machines and the bodies of six Soviet submariners.[66] An alternative theory claims that all of K-129 was recovered[67] and that the official account was an “elaborate cover-up”.[68]

Also in the 1970s, the U.S. Navy, the National Security Agency (NSA) and SAD/SOG [69] conducted Operation Ivy Bells and a series of other missions to place wire taps on Soviet underwater communications cables. These operations were covered in detail in the 1998 book Blind Man’s Bluff: The Untold Story of American Submarine Espionage.[70] In the 1985 edition of “Studies in Intelligence”, the CIA’s in-house journal that outsiders rarely get to see, the CIA describes the “staggering expense and improbable engineering feats” that culminated in the August 1974 mission.[71]

Intelligence in Public Literature

The Glomar Explorer in Film and Print

AZORIAN: The Raising of the K-129, written, directed, and produced by Michael White (Michael White Films, 2009).

Project AZORIAN: The CIA and the Raising of the K-129, by Norman Polmar and Michael White (Annapolis, MD: Naval Institute Press, 2010), 239 pages.

Reviewed by David Robarge

For years, CIA’s involvement with the Glomar Explorer project, the technologically path-breaking effort to use a specially designed ship to retrieve a sunken Soviet submarine from the Pacific Ocean floor in 1974, was one of the Agency’s most open secrets. Much information about the vessel, usually referred to simply as the Glomar, and its mission has been publicly available since they were exposed in the press in 1975. Confusion and inaccuracies quickly emerged, however, over how the wreck was located, how much of it was raised, what was found in it, and what the payoff of the costly project was.

The first book written on the topic established one of the most persistent errors by misnaming the project JENNIFER (the codename for its security procedures) rather than AZORIAN. 1 Later works—based on insider interviews, leaked documents, and speculations of varying reliability—revealed new information but still fell short of being authoritative. 2 More recent titles have postulated unlikely scenarios to explain why the Soviet submarine was where it was when it sank—a favorite is that it had “gone rogue” and was headed toward the United States to launch nuclear missiles—and what caused it to do so. 3 Meanwhile, no detailed official information about the Glomar program was publicly available until CIA declassified one of several internal accounts in 2010. 4

In the film AZORIAN and the companion book Project AZORIAN, military and intelligence historian Norman Polmar and documentarian Michael White have collaborated on the definitive accounts of this remarkable effort: using a battleship-sized, uniquely outfitted ship constructed under exceptionally tight security to salvage nuclear weapons and cryptographic equipment from a Soviet Golf-class submarine (the K-129) that sank in April 1968 approximately 1,500 miles northwest of Hawaii. It was the first strategicmissile submarine to have been lost and potentially had substantial intelligence value, but the odds against retrieving it seemed insurmountable. Before AZORIAN, the deepest ocean salvage of a ship was from 245 feet, and the only object known to have been recovered as far down as the K-129 lay was a satellite “bucket” weighing only several hundred pounds. The “target object,” as the submarine was euphemistically called then, was nearly 17,000 feet underwater and weighed 2,000 tons. “Project AZORIAN was unquestionably the most ambitious and the most audacious ocean engineering effort ever attempted,” Polmar and White rightly state. (xi)

In both the movie and the book, Polmar and White draw on a much wider range of sources than have previous chroniclers of the project, including the ship’s logs, a declassified CIA history, other documents from US and Soviet sources, and extensive interviews with members of the crews of the Glomar and other vessels involved and with US naval intelligence officers and Soviet naval officers and scientists. Polmar and White put these new sources to excellent effect, presenting numerous fascinating and hitherto unpublicized or underappreciated facts about the planning, implementation, and accomplishments of AZORIAN. Among the most interesting insights:

  • The K-129 probably sank because the rocket engines in two of its missiles ignited sequentially for unknown reasons and burned for more than three minutes over a six-minute time span. The exhaust plumes would have burned into the pressure hull and, with their extremely high temperatures and poisonous fumes, quickly killed all the crew. The misfirings occurred while the submarine was near the surface, with its internal compartments open for ventilation. After part of its sail structure tore away and its bottom was breached, it began to flood and then sank. While investigating the cause of the K-129’s demise, Polmar and White refute alternative theories, such as a collision with or attack by a US nuclear submarine.
  • The “acoustic events” that indicated something unusual had happened to the K-129 were identified not by the US Navy’s underwater SOSUS (Sound Surveillance System) array but by hydrophones monitored by the Air Force’s Technical Applications Center (AFTAC). SOSUS may have picked up the reverberations from the explosion, but they were unrecognizable to the operators because of their short duration. AFTAC’s recorders, originally deployed to detect Soviet nuclear detonations, were 10 times more sensitive than the SOSUS displays.
  • To keep the project going after four years of development with costs mounting and no immediate end in sight, DCI Richard Helms had to overcome strong opposition from the chairman of the Joint Chiefs of Staff, the deputy secretary of defense, the chief of naval operations, and the director of the Defense Intelligence Agency, who argued on grounds of cost, intelligence return, and likely diplomatic repercussions that AZORIAN should be cancelled. In late 1972 the DCI persuaded National Security Advisor Henry Kissinger and President Richard Nixon to the contrary, and the program continued without further bureaucratic resistance. In April and May 1974, just as the last tests of the Glomar were completed and the salvage operation was about to begin, the US Intelligence Board gave a final favorable evaluation of the project. On 7 June the president approved the mission with the caveat that the recovery itself not begin before he returned from a visit to Moscow on 3 July.
  • On its way from the East Coast to southern California after transiting the Strait of Magellan—the ship was too wide for the Panama Canal—the Glomar entered the port of Valparaiso, Chile, on 12 September 1973, one day after a military junta overthrew the socialist government of Salvadore Allende, which had been the target of one of CIA’s most notorious covert actions three years before. “Seven [Global Marine] technicians were to board the ship at Valparaiso. After checking in to their hotel, early on 11 September, the Global Marine personnel were awakened by the sounds of the revolution in the streets.” (85) The declassified Agency account of AZORIAN notes that “The presence of a covert US intelligence ship in a Chilean port during the military coup was a bizarre coincidence quite unrelated to the rumors that ‘the CIA had 200 agents in Chile for the sole purpose of ousting Allende.’ There were no unfavorable incidents involving the ship, crew members, or the Global Marine representative[s].”5
  • If the Soviets had learned of the Glomar’s true mission and tried to disrupt the recovery, the ship would have been helpless because it had no protection within days of it. Ships of the Pacific Fleet were too far away to help unless warning of a threat to the Glomar came well in advance. If, as Polmar and White assert, submarines were sent to deal with a Soviet challenge and possible seizure of the Glomar, their “only option [upon arrival on the scene] would be to sink the lift ship….The men on board the Glomar knew nothing of this plan.” (106)
  • Soviet ships started coming to the search area two weeks after the Glomar got there. The first was a missile range instrumentation ship, the Chazhma, whose crew took photographs from on deck and from a helicopter circling above the Glomar. The two ships exchanged messages, and the Chazhma left four days later. A Soviet naval tug, the SB-10, was more persistent, staying for nearly two weeks and coming as close as 200 yards.6 It was nearby just as the capture vehicle—the 179-foot-by-31-foot claw designed to grasp the submarine7—was about to be pulled inside, raising fears that debris from the retrieved wreckage might float up around the Glomar and reveal what was happening. Nothing like that occurred, and the tug left abruptly. The released CIA account notes, “One can only conjecture the reaction and chagrin of Soviet authorities when they later realized that two Soviet Navy ships were on the scene and, in effect, witnessed the recovery operation against their lost submarine.” 8
  • The capture vehicle had been pulled up over 6,700 feet when two of its grabber arms snapped, causing nearly 100 feet of the retrieved front section of the K-129 to break away and fall through the gap created. Back to the ocean floor went the missile, its fire control system, and possibly some cryptographic equipment—one of the most coveted prizes in the whole operation. Engineers determined that the failure had two causes: an additional million pounds of weight had to placed on the pipe string and capture vehicle to drive the arms deeper into the bottom soil because the seafloor was harder than expected; and the steel used for the grabber devices, although stronger and tougher than other structural steels, also was brittle, especially at low temperatures like those encountered at great ocean depths.
  • As if living its cover through and through, the Glomar brought up some manganese nodules along with part of the submarine. They apparently had lodged between the pressure hull and the outer hull as the K-129 slid down a slope after reaching bottom. Despite an “absolutely no souvenirs” order to the crew, some of the nodules disappeared.
  • Many photographs, drawings, and CGI images and animation enliven the book and movie, adding sometimes startling visual impact to the narrative and helping explain the almost unfathomable complexity of the challenge the project engineers faced.

Polmar and White add a human touch to the technology-heavy AZORIAN story by giving details about the K-129’s crew and their living conditions aboard the vessel. Previous works about the Glomar often have gotten so caught up in engineering esoterica that, except for mentioning the retrieval of several bodies from the wreckage that were then buried at sea, readers might forget that many Soviet submariners perished in the mishap. The Soviet government told the crewmen’s families only that they had drowned accidentally and did not allow their names to be published for more than 25 years. The 10-page appendix in the book gives details about each of them and serves as a haunting reminder of the dangers faced in the undersea Cold War.

The descriptions of life aboard the Glomar also lighten the technical load of the story. The Glomar’s crew members got along well because of the comfortable living conditions and the camaraderie that developed around working together on a secret and historic mission. The Glomar was well outfitted with creature comforts: three recreation lounges with cards, games, color television sets, and videoplayers; an exercise room; a daily newspaper; and sumptuous food served four times a day, with the mess hall open around the clock. Polmar provides a menu on page 104 of the book.

While previous accounts have concentrated on the salvage operation itself, Polmar and White bring to the fore other important but overlooked aspects of the project. Among them was the construction of the world’s largest submersible barge, the HMB-1 (Hughes Mining Barge No. 1), to hide the construction of the capture vehicle. After the capture vehicle was assembled, the HMB-1 and its “cargo” were towed next to the ship in a cove along Catalina Island. The transfer of the capture vehicle to the Glomar occurred at night to discourage curious swimmers and divers. The Glomar maneuvered over the HMB-1, whose roof was opened so the capture vehicle could be pulled up into the moon pool. The ship then moved out of the cove, carrying the capture vehicle and some unexpected passengers: thousands of squid attracted by the lights.

One of the most remarkable aspects of Project AZORIAN is that it was conducted simultaneously in secret and in the open, and, even with a tip from an anonymous (and still unidentified) source, the Soviets evidently did not act because such an operation seemed technical unfeasible (67–68). The security regime held up for more than five years. Polmar and White note that AZORIAN

was carried out under intense press scrutiny because the ‘cover’ for the salvage was a seafloor-mining project sponsored by the notorious Howard Hughes. Thus, the salvage of the K-129, besides being of unprecedented scope and depth, was conducted in the public view and with intensive Soviet naval surveillance and with the Soviet embassy in Washington, DC, having been previously notified. (xii)

Polmar and White were unable to determine who came up with the idea of having Hughes “sponsor” the operation, but they rightly observe that “the Hughes empire was the perfect ‘front’ for the endeavor; it was a collection of privately owned corporations, not responsible to stockholders or to the Securities Exchange Commission.” Moreover, Hughes was known for undertaking exotic projects, such as building the enormous wooden aircraft dubbed the “Spruce Goose.”

AZORIAN was not compromised until February 1975, when the Los Angeles Times ran a story that the offices of a Hughes company (the Summa Corporation) that provided cover for the project had been broken into in June 1974 and a document about the Glomar stolen.9 Already dealing with the heartbreaking failure to retrieve all of the sunken submarine, beleaguered Director of Central Intelligence William Colby for several months had dissuaded members of the media from writing about the burglary, which they learned about from the Los Angeles Police Department. Then the Times published its somewhat garbled account (it had the operation occurring in the Atlantic Ocean, among other errors), and syndicated columnist Jack Anderson pieced together the full story, rejected a personal appeal from Colby to spike it, and broadcast it nationwide. A media frenzy quickly developed in southern California where the Glomar was berthed. AZORIAN’s deputy mission director recalled that

local, regional and national news reporters poured into the Long Beach area….Reporters frequented the Long Beach bars and tried all the arts and tricks of their trade to find knowledgeable sources and persuade them to talk. Waterfront hangers on were plied with drinks, and prostitutes were enlisted in attempts to buy crew lists. Crew members were pestered, badgered and propositioned.10

At the time, Anderson said he publicized the operation because “Navy experts have told us that the sunken sub contains no real secrets and that the project, therefore, is a waste of the taxpayers’ money.”11 Because of the leaks and the charges that AZORIAN had not been worth its great expense, the White House decided to kill Colby’s proposal for a second Glomar mission, codenamed MATADOR, to raise the portion of the submarine that had broken off.

Few shortcomings detract from Polmar and White’s authoritative two-part work. At times Polmar, the principal author of Project AZORIAN, tries too hard to display his expertise about warships and naval history. The third chapter, a “biography” of two submarines involved with AZORIAN, is superfluous, as are some of the appendices with detail about Soviet submarines and their operations. The book fails to mention the A-12 along with the U-2 and the SR-71 as one of the aeronautical achievements of the Lockheed “Skunk Works,” which built the capture vehicle. Cinematically, White’s movie is well produced and keeps the viewer’s attention. Some of the engineering sections drag a bit, but the segment in which participants revisit some key decisions shows some unintentionally amusing blame-passing.

A former US naval intelligence officer told Polmar and White that “AZORIAN was a great gamble, displaying the actions of a confident country with the wealth and the will to make such a gamble if the potential gain would make the effort worthwhile.” (171) Based on the intelligence acquired, was the AZORIAN gamble worth the cost? The arguments on either side are largely ex post facto because no one knows for sure what intelligence of what potential value was lost when only a part of the K-29 was recovered and MATADOR was cancelled. The Agency account concludes that “To attempt to evaluate Project AZORIAN in terms of costs and benefits, one must consider not only the immediate intelligence … but the broader aspects and achievements as well”—the development of “an advanced deep–ocean system with important future economic, political, and strategic potential for the United States.” 12

On the intelligence side, Polmar and White correctly assess that AZORIAN failed at its primary mission. After the second mission was scrubbed, the Glomar drifted from owner to owner for two decades, first with the US Navy’s Maritime Administration, then briefly with the Global Marine Development Corporation for deep sea drilling, then back to the Maritime Administration to spend 18 years laid up in a bay in California, and finally over to the GlobalSantaFe Corporation for 10 years of more deep-sea drilling. In 2007 that firm merged with Transocean, which bought the Glomar—renamed the GSF Explorer—from the US Government for $20 million. It now works under contract for oil companies on drilling projects around the world. “In a way,” Polmar and White aptly conclude, “the ship is performing the role for which she was originally publicized—exploiting the resources of the ocean floor.” (147)

[Top of page]

 

Endnotes

1Clyde W. Burleson, The Jennifer Project (Englewood Cliffs, NJ: Prentice-Hall, 1977). Jennifer was the name of the daughter of a US Navy officer who suggested it as a cryptonym for AZORIAN’s security compartment. Polmar and White, 63. In his biography of DCI William Colby, John Prados compounds the error by saying that the overall project name Jennifer was later changed to Zodiac. Lost Crusader: The Secret Wars of CIA Director William Colby (New York: Oxford University Press, 2003), 267.

2Roy Varner and Wayne Collier, A Matter of Risk: The Incredible Story of the CIA’s Hughes Glomar Explorer Mission to Raise a Russian Submarine (New York: Random House, 1978); Sherry Sontag and Christopher Drew, Blind Man’s Bluff: The Untold Story of American Submarine Espionage (New York: Public Affairs, 1998).

3John P. Craven, The Silent War: The Cold War Battle Beneath the Sea (New York: Simon & Schuster, 2001); Kenneth Sewell and Clint Richmond, Red Star Rogue: The Untold Story of a Soviet Submarine’s Nuclear Strike Attempt on the U.S. (New York: Simon & Schuster, 2005); Viktor Dygalo, A Rear Admiral’s Notes (Moscow: Kuchkovo Pole, 2009); Peter A. Huchthausen and Alexandre Sheldon-Duplaix, Hide and Seek: The Untold Story of Cold War Naval Espionage (Hoboken, NJ: John Wiley & Sons, 2009); Craig W. Reed, Red November: Inside the Secret U.S.-Soviet Submarine War (New York: William Morrow, 2010).

4“Project AZORIAN: The Story of the Hughes Glomar Explorer,” Studies in Intelligence 22, No. 3 (Fall 1978): 1–50; declassified 2010. In the several years after the first media disclosures about the project in 1975, CIA acknowledged that it had used the Glomar for intelligence purposes and named the contractors involved in its construction but would release no other details. The “neither confirm nor deny” phrase the Agency uses when responding to document search requests has come to be known in information management parlance as the “Glomar response.” “Glomar Chronology-Releases,” 8 July 1999, copy in History Staff files.

5Global Marine, Inc., was the California-based firm that oversaw the construction of the Glomar—hence the ship’s name. “ Project AZORIAN,” 24.

6The SB-10 attracted the attention of the Glomar crew in part because its crew included two women who frequently appeared on deck wearing dresses that they traded daily. A project engineer recalled that “the Global Marine people had lots of fun” with the tug’s crew. “They would fill plastic trash bags with unclassified computer printouts that had to be disposed of anyway…[and] they would smear aqua lube over these papers—aqua lube [used on the threads of the three miles of pipes in the lift system] is the slipperiest substance known to man—stuff them into the plastic trash bag, tie it up, and throw it overboard. Sometimes they put a little acetylene in to make sure that it was buoyant…and it would skip across the waves as the wind took it….Whenever a bag of trash was thrown overboard, they would immediately go after it.” (112)

7The capture vehicle was nicknamed “Clementine.”

8Ibid., 46.

9The Glomar-related document apparently never left the building; a security guard found it and later destroyed it. (138)

10Harold R. Ford, William E. Colby as Director of Central Intelligence, 1973–1976 (Washington, DC: CIA Center for the Study of Intelligence, 1993; declassified 2011), 185. Colby focuses on the security and publicity aspects of AZORIAN, rather than the salvage effort, in his memoir. Honorable Men: My Life in the CIA (New York: Simon & Schuster, 1978), 413–18.

11Ford, 187.

12“Project AZORIAN,” 49.

[Top of page]

 

All statements of fact, opinion, or analysis expressed in this article are those of the author. Nothing in the article should be construed as asserting or implying US government endorsement of an article’s factual statements and interpretations.

 

Posted: May 02, 2012 04:00 PM

Last Updated: May 02, 2012 04:00 PM

Raising Sunken Ships

http://www.pbs.org/saf/1305/features/ship2.htm

The Glomar Explorer

In 1968, a flurry of coded communications alerted the U.S. Navy to the loss of a Soviet Golf-class submarine, an older diesel vessel that had sunk in 17,000 feet of water about 750 miles northwest of Hawaii. U.S. Intelligence reports soon revealed that an explosion had occurred, probably while the sub was at the surface, but that it was mostly intact – and that it still carried nuclear missiles on board. A few years later the wealthy eccentric Howard Hughes constructed the Glomar Explorer, an enormous barge built for the ostensible purpose of mining manganese nodules from the ocean floor. Although manganese nodules are real, the mining venture was actually an elaborate hoax.

   
The Glomar Explorer, built to retrieve a Soviet Golf-class submarine that was lost in 1968.  

In reality, the Glomar Explorer was built as part of an audacious CIA effort to retrieve the Golf. Codenamed “Project Jennifer,” the plan was to use a giant claw dangling on the end of a three-mile-long tether to grasp the submarine and raise it into a “moon pool” – a large area open to the sea – built inside the Glomar Explorer. The submarine would then be searched for Soviet codebooks, communications gear, and nuclear warheads.

The retrieval, begun in 1974, did not go smoothly. Trouble began when the claw (nicknamed “Clementine” by the crew) had been lowered almost within reach of the wreck of the Golf. While tantalizingly close to the submarine, the operators lost control, and the claw collided violently with the seabed. Inspection by remote camera showed no visible damage to the claw assembly, however, so the engineers decided to continue with the operation. The claw was lowered the final few feet, and found purchase around the hull of the wreck. The slow, methodical process of bringing the Golf to the surface began, and the success of the salvage effort was apparently in sight, despite the earlier mistake.

Hours later, when the submarine was about two miles below the surface, disaster struck. The impact of Clementine with the ocean bottom had seriously weakened the claw assembly. Three of the five tines that carried the load in the claw suddenly broke off, leaving most of the 5000-ton Golf unsupported. Unable to take the strain, the submarine tore apart under its own weight, most of it plunging back into the depths – but not before spilling a missile from an open missile bay.

Tense moments passed onboard the Glomar Explorer, as the crew steeled themselves for the nuclear explosion that many expected when the lost warhead smashed into the ocean floor. The explosion never came. Only a small part of the forward section of the submarine that remained in the grasp of the claw could be brought to the surface. This section contained little of interest to the CIA, but found among the wreckage were the remains of six Soviet sailors. They were given a solemn burial at sea by the crew of the Glomar Explorer, the ceremony performed in Russian.

http://en.wikipedia.org/wiki/GSF_Explorer

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




US CIA Cyber attacks against Stew Webb Whistle blower

 

By Stew Webb Federal Whistle blower

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

US CIA Cyber attacks against Stew Webb Whistle blower
United States Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/embed/
2/1/2018 7:45:03 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Type: Bot
United States Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/2016/11/07/clinton-pedophile-scandal-exposed-u-s-republic-brink/embed/
2/1/2018 7:45:03 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Type: Bot
United States Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/2016/10/09/hillary-clinton-also-known-hildabeast/embed/
2/1/2018 7:45:03 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/
2/1/2018 7:45:06 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
NetRange: 198.81.128.0 – 198.81.191.255
[16384 addresses in this network]
CIDR: 198.81.128.0/18 (198.81.128.0 – 198.81.255.255)
[32768 addresses in this network]
NetName: OIT-BLK1
NetHandle: NET-198-81-128-0-1
Parent: BLK198-15-ANS (NET-198-80-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Central Intelligence Agency (CIA-1)
RegDate: 1997-02-11
Updated: 1998-03-30
Ref: https://whois.arin.net/rest/net/NET-198-81-128-0-1

OrgName: Central Intelligence Agency
OrgId: CIA-1
Address: GCS, ND1
City: Washington
StateProv: DC
PostalCode: 20505
Country: US
RegDate: 1992-07-21
Updated: 2011-09-24
Ref: https://whois.arin.net/rest/org/CIA-1

OrgTechHandle: DW1276-ARIN
OrgTechName: Wheelock, David
OrgTechPhone: +1-703-613-9840
OrgTechEmail: davidw@ucia.gov
OrgTechRef: https://whois.arin.net/rest/poc/DW1276-ARIN

OrgAbuseHandle: DW1276-ARIN
OrgAbuseName: Wheelock, David
OrgAbusePhone: +1-703-613-9840
OrgAbuseEmail: davidw@ucia.gov
OrgAbuseRef: https://whois.arin.net/rest/poc/DW1276-ARIN

RTechHandle: ANM3-ORG-ARIN
RTechName: Central Intelligence Agency
RTechPhone: +1-703-874-5401
RTechEmail: edsn@ucia.gov
RTechRef: https://whois.arin.net/rest/poc/ANM3-ORG-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#

US CIA Cyber attacks against Stew Webb Whistle blower
United States Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/embed/
2/1/2018 7:45:03 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Type: Bot
United States Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/2016/11/07/clinton-pedophile-scandal-exposed-u-s-republic-brink/embed/
2/1/2018 7:45:03 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Type: Bot
United States Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/2016/10/09/hillary-clinton-also-known-hildabeast/embed/
2/1/2018 7:45:03 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Arlington, United States arrived from https://opkloud.com/wp-admin/admin.php?page=cf7_storage and visited https://www.stewwebb.com/
2/1/2018 7:45:06 AM (2 minutes ago)
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
IP: 198.81.129.193 Hostname: relay201.net.cia.gov
NetRange: 198.81.128.0 – 198.81.191.255
[16384 addresses in this network]
CIDR: 198.81.128.0/18 (198.81.128.0 – 198.81.255.255)
[32768 addresses in this network]
NetName: OIT-BLK1
NetHandle: NET-198-81-128-0-1
Parent: BLK198-15-ANS (NET-198-80-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Central Intelligence Agency (CIA-1)
RegDate: 1997-02-11
Updated: 1998-03-30
Ref: https://whois.arin.net/rest/net/NET-198-81-128-0-1

OrgName: Central Intelligence Agency
OrgId: CIA-1
Address: GCS, ND1
City: Washington
StateProv: DC
PostalCode: 20505
Country: US
RegDate: 1992-07-21
Updated: 2011-09-24
Ref: https://whois.arin.net/rest/org/CIA-1

OrgTechHandle: DW1276-ARIN
OrgTechName: Wheelock, David
OrgTechPhone: +1-703-613-9840
OrgTechEmail: davidw@ucia.gov
OrgTechRef: https://whois.arin.net/rest/poc/DW1276-ARIN

OrgAbuseHandle: DW1276-ARIN
OrgAbuseName: Wheelock, David
OrgAbusePhone: +1-703-613-9840
OrgAbuseEmail: davidw@ucia.gov
OrgAbuseRef: https://whois.arin.net/rest/poc/DW1276-ARIN

RTechHandle: ANM3-ORG-ARIN
RTechName: Central Intelligence Agency
RTechPhone: +1-703-874-5401
RTechEmail: edsn@ucia.gov
RTechRef: https://whois.arin.net/rest/poc/ANM3-ORG-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
ucia.gov
The first DNS server is a1-22.akam.net. The mail server with the highest priority is mail1.cia.gov.
v=spf1 mx a:mail1a.cia.gov
Are you looking for IPv4 address 198.81.129.68?Are you looking for domain cia.gov?
Domains around 198.81.129.68
IP address #domains
198.81.129.100 2
198.81.129.107 3

Domain IPv4 address Ranking Alexa Pagerank
cia.ac.uk 195.195.187.14
cia.academy 192.64.147.234
cia.accountants 162.255.119.207
cia.ae 69.172.201.153
cia.aero
cia.africa 199.73.55.48
cia.agency 89.31.143.1
cia.airline.aero
cia.airport.aero
cia.al
cia.as 51.174.95.49 0
cia.asia 69.64.147.34
cia.asso.fr 91.121.63.21
cia.at 188.118.210.140
cia.auction
cia.audio
cia.az 204.93.177.100 -1
cia.be 62.182.63.148 -1
cia.berlin 178.254.0.121 -1
cia.bg 217.174.156.100 1
cia.biz 98.124.199.113 -1
cia.blue 69.172.201.153
cia.bo 132.148.100.118
cia.business 50.63.202.57 -1
cia.buzz 184.168.221.75
cia.bz 157.7.188.104 1
cia.ca 54.246.98.46 5
cia.camp 50.63.202.61 -1
cia.care 64.68.200.44
cia.careers
cia.cc 203.78.142.12
cia.ch 5
cia.chat 50.63.202.25
cia.cl 72.52.4.122
cia.club
cia.cn 49.51.8.200
cia.co.at 81.223.238.250
cia.co.id
cia.co.il 104.45.14.249 1
cia.co.in 72.52.4.122
cia.co.jp 150.60.154.214
cia.co.kr 218.38.12.231
cia.co.nz 210.48.69.34
cia.co.uk
cia.co.za 41.204.202.40
cia.cologne 85.13.154.240
cia.com 54.208.9.165 845,198 3
cia.com.au 210.8.91.43 4
cia.com.br
cia.com.cn 114.215.175.181
IPv4 routes
Startip Endip Description Country #domains #spamhosts
146.129.0.0 146.129.255.255 King County Gov US 114 0
198.49.222.0 198.49.222.255 King County Gov US 0 0
200.198.0.0 200.198.63.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 279 0
12.166.216.0 12.166.223.255 LAFAYETTE CITY-PARISH CON. GOV. US 26 0
146.129.0.0 146.129.127.255 King County Gov US 0 0
146.129.0.0 146.129.63.255 King County Gov US 0 0
146.129.64.0 146.129.127.255 King County Gov US 0 0
146.129.128.0 146.129.191.255 King County Gov US 0 0
146.129.192.0 146.129.223.255 King County Gov US 0 0
146.129.224.0 146.129.239.255 King County Gov US 0 0
146.129.240.0 146.129.240.255 King County Gov US 70 0
146.129.249.0 146.129.249.255 King County Gov US 4 0
146.129.250.0 146.129.250.255 King County Gov US 1 0
188.94.170.0 188.94.170.255 OJSC Megafon, Urals dep., PA leased to informatisation department of Tumen region gov RU 0 0
194.226.16.0 194.226.16.255 GOV-CERT RU 4 0
198.94.156.0 198.94.156.255 Assc. of Bay Area Gov. (ABAG) US 1 0
198.94.157.0 198.94.157.255 Assc. of Bay Area Gov. (ABAG) US 0 0
198.94.158.0 198.94.158.255 Assc. of Bay Area Gov. (ABAG) US 0 0
200.198.16.0 200.198.16.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.58.0 200.198.58.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.60.0 200.198.60.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.61.0 200.198.61.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
45.4.52.0 45.4.55.255 EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
131.0.208.0 131.0.211.255 Duarte Aragon & Cia Ltda BR 0 1
131.72.248.0 131.72.251.255 Antônio Vasconcelos e Cia Ltda BR 0 0
131.161.4.0 131.161.7.255 CIA Itabirana de Informática – VALENET BR 0 0
131.161.96.0 131.161.99.255 Porto Seguro Cia de Seguros BR 0 0
138.0.220.0 138.0.223.255 Porto Seguro Cia de Seguros BR 3 0
138.94.228.0 138.94.231.255 Antônio Vasconcelos e Cia Ltda BR 0 0
138.186.52.0 138.186.55.255 Rogerio Batista Dos Santos E Cia LTDA ME BR 4 1
143.137.104.0 143.137.107.255 Porto Seguro Cia de Seguros BR 0 0
143.208.172.0 143.208.175.255 Adilson Vanderlei dos Santos Alves e Cia BR 1 3
143.208.208.0 143.208.211.255 José Carlos Roque Oliveira & Cia Ltda BR 0 0
167.250.216.0 167.250.219.255 M DANTAS & CIA LTDA ME BR 0 0
168.194.84.0 168.194.87.255 jose nilton de freitas e cia ltda BR 0 0
168.227.8.0 168.227.11.255 CIA Itabirana de Informática – VALENET BR 0 0
170.80.6.0 170.80.7.255 Cia Brasileira de Metalurgia e Mineração BR 0 0
170.233.8.0 170.233.11.255 Antônio Vasconcelos e Cia Ltda BR 0 0
170.233.52.0 170.233.55.255 RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
170.239.40.0 170.239.43.255 M DANTAS & CIA LTDA ME BR 0 0
170.239.192.0 170.239.195.255 CIA Itabirana de Informática – VALENET BR 0 0
170.246.4.0 170.246.7.255 Antônio Vasconcelos e Cia Ltda BR 0 0
177.11.56.0 177.11.59.255 R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
177.20.0.0 177.20.127.255 Prodasal Cia Proc de Dados do Salvador BR 14 0
177.38.152.0 177.38.159.255 Antônio Vasconcelos e Cia Ltda BR 11 0
177.86.120.0 177.86.123.255 Cancelier, Granemann e Cia Ltda BR 2 1
177.91.144.0 177.91.159.255 GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 3
177.125.112.0 177.125.119.255 José Carlos Roque Oliveira & Cia Ltda BR 8 1
177.152.112.0 177.152.119.255 Duarte Aragon & Cia Ltda BR 1 0
177.152.160.0 177.152.175.255 CIA Itabirana de Informática – VALENET BR 0 3
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:f1:: 2001:df0:f1:ffff:ffff:ffff:ffff:ffff AEC-GOV-AU AU 0 0
2804:bd0:: 2804:bd0:ffff:ffff:ffff:ffff:ffff:ffff Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
2801:80:130:: 2801:80:130:ffff:ffff:ffff:ffff:ffff Prodasal Cia Proc de Dados do Salvador BR 0 0
2801:80:b00:: 2801:80:b00:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2801:80:1b30:: 2801:80:1b30:ffff:ffff:ffff:ffff:ffff Cia Brasileira de Metalurgia e Mineração BR 0 0
2804:5c:: 2804:5c:ffff:ffff:ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
2804:344:: 2804:344:ffff:ffff:ffff:ffff:ffff:ffff R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
2804:830:: 2804:830:ffff:ffff:ffff:ffff:ffff:ffff Cancelier, Granemann e Cia Ltda BR 0 0
2804:a14:: 2804:a14:ffff:ffff:ffff:ffff:ffff:ffff José Carlos Roque Oliveira & Cia Ltda BR 0 0
2804:b34:: 2804:b34:ffff:ffff:ffff:ffff:ffff:ffff Antônio Vasconcelos e Cia Ltda BR 0 0
2804:e28:: 2804:e28:ffff:ffff:ffff:ffff:ffff:ffff RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
2804:e7c:: 2804:e7c:ffff:ffff:ffff:ffff:ffff:ffff Joniel Carraro & Cia Ltda BR 0 0
2804:11d4:: 2804:11d4:ffff:ffff:ffff:ffff:ffff:ffff GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 0
2804:1ad4:: 2804:1ad4:ffff:ffff:ffff:ffff:ffff:ffff Duarte Aragon & Cia Ltda BR 0 0
2804:2188:: 2804:2188:ffff:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2804:26c8:: 2804:26c8:ffff:ffff:ffff:ffff:ffff:ffff Rogerio Batista Dos Santos E Cia LTDA ME BR 0 0
2804:2ab0:: 2804:2ab0:ffff:ffff:ffff:ffff:ffff:ffff Adilson Vanderlei dos Santos Alves e Cia BR 0 0
2804:2c84:: 2804:2c84:ffff:ffff:ffff:ffff:ffff:ffff M DANTAS & CIA LTDA ME BR 0 0
2804:3348:: 2804:3348:ffff:ffff:ffff:ffff:ffff:ffff jose nilton de freitas e cia ltda BR 0 0
2804:39a0:: 2804:39a0:ffff:ffff:ffff:ffff:ffff:ffff EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
2804:5c:1000:: 2804:5c:1000::ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
2544 King County Gov US 12 0 114 0
8867 E-Gov – Tehila Project – Prime Minister Office’s IL 28 0 213 0
7465 PROCERGS – Cia de Processamento de Dados do RGS BR 21 0 721 1
10412 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 1 1 44 1
19723 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 7 0 446 0
25832 Cia. de Processamento de Dados do Estado da Bahia BR 1 0 239 1
26606 Cia de Proc. de Dado do Município de Porto Alegre BR 23 1 294 0
28280 A. P. OLIVEIRA & CIA. INFORMATICA LTDA. BR 37 1 31 2
28637 Cia Proc. de Dados do Estado de S Paulo – Prodesp BR 21 1 448 3
52517 EVERTON HAISE TAQUES & CIA LTDA BR 3 0 19 0
52547 Rodrigo José Marasca e Cia Ltda BR 24 1 0 1
52587 João M. S. de Almeida junior & Cia ltda BR 1 0 2 2
52591 S. C. Terres e Cia Ltda BR 5 1 2 0
52607 Irmãos Giotto Oliveira & Cia.Ltda. BR 7 0 9 0
52652 BENCHIMOL IRMAO & CIA LTDA BR 3 0 0 0
52653 Marlon L. Larger & Cia Ltda BR 13 1 1 0
52843 Magnos A. Both e Cia Ltda BR 9 0 1 0
52865 R. Jose da Silva e Cia Ltda – OndaÁgil BR 9 1 1 0
52910 A. Angeloni & Cia Ltda BR 1 0 7 0
53096 Faviero, Duarte e CIA LTDA BR 1 1 3 0
53168 CIA ESTADUAL DE GERAÇÃO E TRANSMISSÃO DE ENERGIA E BR 3 0 3 0
53227 M.V. Martin & Cia Ltda. BR 4 0 0 1
61506 Insacom y Cia. Limitada CL 1 0 81 0
61794 DONATO JUNIOR E CIA LTDA BR 7 0 0 3
61833 P. R. LIMA & CIA LTDA BR 1 1 1 0
61938 Damaris Figueredo Antunes e Cia Ltda BR 3 0 0 0
262223 Nettplus – Necusoft Cia. Ltda. EC 2 0 3 18
262282 MARIA LUCIANA MACHADO E CIA LTDA-ME BR 5 1 2 3
262342 JOSE CARLOS ROQUE OLIVEIRA & CIA LTDA BR 8 1 8 2
262362 B. D. MATOS & CIA LTDA – SINET INTERNET BR 9 1 4 1
262417 Gustavo Zanatta e Cia Ltda BR 31 1 4 5
262573 GILMAR DOS SANTOS & CIA. LTDA. BR 6 0 8 0
262619 Thielke & Cia Ltda. BR 18 1 10 1
262657 DENDENA E CIA LTDA ME BR 4 0 0 1
262749 Andries & Cia Ltda BR 1 3 3 0
262810 C. R. BARDI & CIA LTDA – ME BR 3 0 0 0
262812 K.H.D. SILVESTRI E CIA LTDA BR 10 0 1 49
262831 N G B Pires & CIA LTDA BR 4 0 4 0
262871 R.D.S. Bortoluzzi & Cia Ltda – ME BR 3 0 0 0
262958 CARRARO, HAINOSZ & CIA LTDA – ME BR 12 1 1 1
263002 RAFAEL ORSSATTO & CIA LTDA BR 14 0 0 3
263018 Zapelini & Cia. Ltda. BR 11 3 3 0
263037 ISMAEL STROHER & CIA. LTDA. – ME BR 8 0 0 0
263060 Atílio Marcos Marcari e Cia Ltda Me BR 1 0 21 1
263066 RVNet – R V PORTELA AGUIAR & CIA LTDA BR 14 0 2 1
263293 CODERP-CIA DESENVOLVIMENTO ECONOMICO DE RIBEIRAO BR 2 1 8 0
263419 Edilso Fuchter & Cia Ltda BR 1 0 1 0
263442 GIALES FISCHER GRUTZMANN & CIA LTDA BR 19 0 0 3
263451 Geovane Matheus Rossetto & Cia Ltda BR 4 0 0 0
263475 Breno Vilela Santana e Cia. Ltda. BR
@@@@@@@@@@@@@@@@
a:mail1b.cia.gov
Are you looking for IPv4 address 198.81.129.68?
IP address 198.81.129.68
Location Great Falls, Virginia, United States
IP address 198.81.129.68
Reverse DNS (PTR record) mail1.cia.gov
DNS server (NS record) a12-65.akam.net (184.26.160.65)
a3-64.akam.net.81.198.in-addr.arpa ()
a1-22.akam.net (193.108.91.22)
a22-66.akam.net (23.211.61.66)
a13-65.akam.net (2.22.230.65)
a16-67.akam.net (23.211.132.67)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Mail server Tools
mail1.cia.gov
###########################
Domains around 198.81.129.68
IP address #domains
198.81.129.100 2
IP address 198.81.129.100
Reverse DNS (PTR record) cia.cia.gov
DNS server (NS record) auth101.ns.uu.net (198.6.1.210)
auth51.ns.uu.net (198.6.1.162)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Domains on 198.81.129.100
@@@@@@@@@@
?????????
Domain Tools
odci.gov
The first DNS server is a3-64.akam.net. The current IPv4 address is 198.81.129.100. The mail server with the highest priority is mail1.cia.gov.
DNS server (NS records) a3-64.akam.net (96.7.49.64)
a1-22.akam.net (193.108.91.22)
a16-67.akam.net (23.211.132.67)
a22-66.akam.net (23.211.61.66)
a13-65.akam.net (2.22.230.65)
a12-65.akam.net (184.26.160.65)
Mail server (MX records) mail1.cia.gov (198.81.129.68)
mail2.cia.gov (198.81.129.148)
IP address (IPv4) 198.81.129.100
IP address (IPv6)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
@@@@@@@@
dragonraiser.com
This domain is hosted by MCI Communications Services, Inc. d/b/a Verizon Business (AS7046). The first DNS server is ns58.domaincontrol.com. The current IPv4 address is 198.81.129.100. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 a
a:local.cristalink.com
Are you looking for IPv4 address 125.236.218.90?
IP address 125.236.218.90
Location New Zealand (NZ
P address 125.236.218.90
Reverse DNS (PTR record) 125-236-218-90.adsl.xtra.co.nz
DNS server (NS record) terminator.xtra.co.nz (202.27.184.5)
alien.xtra.co.nz (202.27.184.3)
ASN number 4771
ASN name (ISP) Spark New Zealand Trading Ltd.
IP-range/subnet 125.236.192.0/19
125.236.192.0 – 125.236.223.255
Number of SPAM hosts on 125.236.192.0/19 1
% Abuse contact for ‘125.236.128.0 – 125.236.255.255’ is ‘removed email address’

inetnum: 125.236.128.0 – 125.236.255.255
netname: SPARKNZ
descr: SPARK NEW ZEALAND TRADING LIMITED
country: NZ
org: ORG-SNZT1-AP
admin-c: IA174-AP
tech-c: IA174-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-NZ-SPARK
mnt-routes: MAINT-NZ-SPARK
mnt-irt: IRT-SPARK-NZ
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:00:59Z
source: APNIC

irt: IRT-SPARK-NZ
address: Spark New Zealand Trading Ltd
address: 31 Airedale Street
address: Auckland
address: New Zealand
e-mail: removed email address
abuse-mailbox: removed email address
admin-c: IA174-AP
tech-c: IA174-AP
auth: # Filtered
mnt-by: MAINT-NZ-SPARKNZ
last-modified: 2014-09-14T20:27:44Z
source: APNIC

organisation: ORG-SNZT1-AP
org-name: Spark New Zealand Trading Limited
country: NZ
address: L 10, SPARK Central – Willis
address: 42-52 Willis St
phone: removed phone number
fax-no: removed phone number
e-mail: removed email address
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:09Z
source: APNIC

person: IP Administrator
address: 31 Airedale Street,
address: Auckland
country: NZ
64-7-839-6195
@@@@@@@

extra.co.nz
This domain is hosted by ICONZ Ltd (AS4770). The first DNS server is ns1.melco.co.nz. The current IPv4 address is 210.48.127.37.
DNS server (NS records) ns1.melco.co.nz (202.36.76.3)
ns2.melco.co.nz (202.36.76.12)
Mail server (MX records)
IP address (IPv4) 210.48.127.37
IP address (IPv6)
ASN number 4770
ASN name (ISP) ICONZ Ltd
IP-range/subnet 210.48.0.0/17
210.48.0.0 – 210.48.127.255
The WHOIS service is provided by NZRS Limited.
%
version: 8.0
query_datetime: 2018-02-02T09:10:22+13:00
domain_name: extra.co.nz
query_status: 200 Active
domain_dateregistered: 1996-08-28T00:00:00+12:00
domain_datebilleduntil: 2018-07-17T00:00:00+12:00
domain_datelastmodified: 2017-07-12T11:27:08+12:00
domain_delegaterequested: yes
domain_signed: no
%
registrar_name: Umbrellar Limited t/a Freeparking
registrar_address1: Level 2, 2 Devon St East
registrar_address2: www.freeparking.co.nz
registrar_city: New Plymouth
registrar_country: NZ (NEW ZEALAND)
registrar_phone: removed phone number
registrar_fax: removed phone number
registrar_email: removed email address
%
registrant_contact_name: New Zealand City Limited
registrant_contact_address1: P.O.Box 44126
registrant_contact_city: Lower Hutt
registrant_contact_province: Wellington
registrant_contact_postalcode: 5010
registrant_contact_country: NZ (NEW ZEALAND)
registrant_contact_phone: removed phone number
registrant_contact_email: removed email address
%
admin_contact_name: New Zealand City Limited
admin_contact_address1: P.O.Box 44126
admin_contact_city: Lower Hutt
admin_contact_postalcode: 5010
admin_contact_country: NZ (NEW ZEALAND)
admin_contact_phone: removed phone number
admin_contact_email: removed email address
%
technical_contact_name: Freeparking
technical_contact_address1: Level 2
technical_contact_address2: 2 Devon Street East
technical_contact_city: New Plymouth
technical_contact_postalcode: 4310
technical_contact_country: NZ (NEW ZEALAND)
technical_contact_phone: removed phone number
technical_contact_fax: removed phone number
technical_contact_email: removed email address

freeparking.co.nz
nzcity.co.nz
64-4-5609093

@@@@@@@@@@@@@@@@@@@
spark.co.nz
This domain is hosted by Spark New Zealand Trading Ltd (AS2570). The first DNS server is ns2.spark.co.nz. The current IPv4 address is 146.171.248.36. The mail server with the highest priority is spark-co-nz.mail.protection.outlook.com.
v=spf1 include:mktomail.com include:mailout.snaphire.com include:aspmx.pardot.com include:spf.protection.outlook.com include:_spf1.spark.co.nz include:_spf2.spark.co.nz ~a

DNS server (NS records) ns2.spark.co.nz (146.171.247.25)
ns1.spark.co.nz (146.171.13.195)
ns3.spark.co.nz (146.171.13.194)
Mail server (MX records) spark-co-nz.mail.protection.outlook.com (65.55.88.170)
IP address (IPv4) 146.171.248.36
IP address (IPv6)
ASN number 2570
ASN name (ISP) Spark New Zealand Trading Ltd
IP-range/subnet 146.171.248.0/23
146.171.248.0 – 146.171.249.255

registrar_name: Domainz Limited
registrar_address1: Private Bag 1810
registrar_city: Wellington
registrar_country: NZ (NEW ZEALAND)
registrar_phone: removed phone number
registrar_fax: removed phone number
registrar_email: removed email address
%
registrant_contact_name: Spark New Zealand Trading Limited
registrant_contact_address1: PO Box 949
registrant_contact_city: Wellington
registrant_contact_country: NZ (NEW ZEALAND)
registrant_contact_phone: removed phone number
registrant_contact_fax: removed phone number
registrant_contact_email: removed email address
%
admin_contact_name: DNS Adminstrator
admin_contact_address1: PO Box 949
admin_contact_city: Wellington
admin_contact_country: NZ (NEW ZEALAND)
admin_contact_phone: removed phone number
admin_contact_fax: removed phone number
admin_contact_email: removed email address
%
technical_contact_name: Domainz Admin
jpark.com
This domain is hosted by ARP NETWORKS, INC. (AS25795). The first DNS server is a.ns.jpark.com. The current IPv4 address is 206.162.242.3. The mail server with the highest priority is a.mx.jpark.com.
v=spf1 a mx ip4:66.59.3.204 ~all
DNS server (NS records) a.ns.jpark.com (206.162.242.2)
b.ns.jpark.com (206.162.242.11)
Mail server (MX records) a.mx.jpark.com (206.162.242.3)
IP address (IPv4) 206.162.242.3
IP address (IPv6)
ASN number 25795
ASN name (ISP) ARP NETWORKS, INC.
IP-range/subnet 206.162.240.0/20
206.162.240.0 – 206.162.255.255
Domain Name: JPARK.COM
Registry Domain ID: 94027718_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.tucows.com
Registrar URL: http://www.tucowsdomains.com
Updated Date: 2015-08-08T02:11:18Z
Creation Date: 2003-01-15T18:52:20Z
Registry Expiry Date: 2023-01-15T18:52:20Z
Registrar: Tucows Domains Inc.
Registrar IANA ID: 69
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Name Server: NS3.JPARK.COM
Name Server: NS4.JPARK.COM
DNSSEC: unsigned

########################
???????????????????????
Domains around 125.236.218.90
IP address #domains
125.236.218.17 1
125.236.218.37 1
125.236.218.196 1
125.236.218.213 1
125.236.218.218 1

Are you looking for domain cristalink.com?
Domain IPv4 address Ranking Alexa Pagerank
cristalink.com 69.64.75.49 2
cristalink.com.br 45.77.154.75
IPv4 routes
Startip Endip Description Country #domains #spamhosts
0.0.0.0 0.255.255.255 IANA – Local Identification UN 0 0
5.45.16.0 5.45.31.255 VEBER-LOCAL GB 2 0
5.57.192.0 5.57.199.255 PROVIDER Local Registry DE 4 0
5.154.0.0 5.154.127.255 Local TV and ISP Provider ES 15 7
37.72.0.0 37.72.31.255 LOCAL TV AND ISP ES 12 0
37.190.0.0 37.190.127.255 Moscow Local Telephone Network (OAO MGTS) RU 4 6
37.230.64.0 37.230.95.255 Local TV and ISP Provider ES 5 0
41.78.92.0 41.78.95.255 Reserved for local server network BW 1 0
41.138.88.0 41.138.91.255 Sous classe utilisée par les équipements du réseau local et les accès VPN BJ 1 27
41.202.192.0 41.202.223.255 Orange Cameroun Local Registry CM 7 22
41.203.240.0 41.203.255.255 Local Registry / ISP SC 2 1
41.207.32.0 41.207.63.255 Provider Local Registry MG 20 1
41.208.64.0 41.208.127.255 Provider Local Registry LY 3,117 14
41.211.32.0 41.211.63.255 [Provider ] Local Registry SZ 2 0
41.215.144.0 41.215.159.255 SPTC is the local Telco and has implemented an IP Core SZ 1 17
41.220.96.0 41.220.111.255 Local Registry / ISP SC 3 3
41.221.64.0 41.221.79.255 Provider Local Registry MZ 0 3
41.222.40.0 41.222.47.255 Local Registry NG 2 3
41.222.56.0 41.222.63.255 Local Registry TZ 46 0
41.223.120.0 41.223.123.255 Enterprise Local Registry ZA 0 0
41.223.128.0 41.223.131.255 Local Registry NG 0 0
41.223.148.0 41.223.151.255 [Provider / Enterprise] Local Registry KE 0 0
46.29.136.0 46.29.143.255 Boly City Local Government HU 70 0
46.138.0.0 46.138.255.255 Moscow Local Telephone Network (OAO MGTS) RU 3 0
62.3.0.0 62.3.31.255 PROVIDER Local Registry SA 3 0
62.3.32.0 62.3.63.255 PROVIDER Local Registry SA 9 0
62.77.32.0 62.77.63.255 PROVIDER LOCAL REGISTRY IT 823 0
62.108.128.0 62.108.159.255 PROVIDER Local Registry CH 33 0
62.112.64.0 62.112.95.255 PROVIDER Local Registry DE 353 0
62.123.0.0 62.123.255.255 Provider Local Registry IT 98 0
62.150.0.0 62.150.255.255 Provider Local Registry KW 160 14
62.153.0.0 62.153.255.255 Provider Local Registry DE 9,339 0
62.154.0.0 62.154.255.255 Provider Local Registry DE 3,968 0
62.155.0.0 62.155.255.255 Provider Local Registry DE 11 0
62.156.0.0 62.156.255.255 Provider Local Registry DE 2,400 0
62.157.0.0 62.157.255.255 Provider Local Registry DE 4,582 0
62.158.0.0 62.158.255.255 Provider Local Registry DE 48 0
62.159.0.0 62.159.255.255 Provider Local Registry DE 6,015 2
62.201.160.0 62.201.191.255 PROVIDER Local Internet Registry DE 1,502 0
62.204.32.0 62.204.63.255 Provider Local Registry GB 221 0
69.18.0.0 69.18.63.255 Local Internet Service Company US 121 0
74.117.96.0 74.117.103.255 LOCAL TV AND ELECTRONICS, INC. US 7 0
76.76.224.0 76.76.239.255 Local Internet Service Company US 37 0
77.95.128.0 77.95.135.255 Local Resources RU 284 0
78.152.64.0 78.152.95.255 AINET-AT, Provider Local Registry Block AT 0 0
79.105.0.0 79.105.255.255 Local infrastructure expansion for DSL (PPPoE) RU 3 9
79.139.128.0 79.139.255.255 Moscow Local Telephone Network (OAO MGTS) RU 7 1
79.172.0.0 79.172.63.255 “Ural WES local clients” RU 252 2
80.64.112.0 80.64.127.255 PROVIDER Local Registry IT 7 0
80.64.240.0 80.64.255.255 PROVIDER Local Registry NL 130 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:6d0:: 2001:6d0:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry RU 32 0
2001:7f8:16:: 2001:7f8:16:ffff:ffff:ffff:ffff:ffff Santa Monica Internet Local Exchange – SMILE IXP LV 0 0
2001:990:: 2001:990:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry NL 10 0
2001:a48:: 2001:a48:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry PL 0 0
2001:df6:4e00:: 2001:df6:4e00:ffff:ffff:ffff:ffff:ffff Queensland Local Government Superannuation Board AU 0 0
2001:1488:: 2001:1488:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry CZ 58 0
2001:1a30:: 2001:1a30:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry DE 23 0
2001:1a40:: 2001:1a40:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry BH 0 0
2001:1a68:: 2001:1a68:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry PL 219 0
2001:1b10:: 2001:1b10:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry DE 24 0
2001:1b50:: 2001:1b57:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry CH 11,552 0
2001:1b60:: 2001:1b67:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry DE 703 0
2001:1b78:: 2001:1b78:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry FR 161 0
2001:1bc0:: 2001:1bc0:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry DE 582 0
2001:1be0:: 2001:1be0:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry GB 0 0
2001:4000:: 2001:4000:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry FR 0 0
2001:4018:: 2001:4018:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry NL 663 0
2001:4038:: 2001:4038:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry NL 1,200 0
2001:4088:: 2001:4088:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry GB 0 0
2001:40c0:: 2001:40c0:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry CH 0 0
2001:4128:: 2001:4128:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry NL 30 0
2001:4178:: 2001:417f:ffff:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry DE 1,227 0
2001:4200:: 2001:4200:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry ZA 19 0
2001:4270:: 2001:4270:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry NG 0 0
2001:42c0:: 2001:42c0:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry ML 0 0
2001:4308:: 2001:4308:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry ZA 0 0
2001:4310:: 2001:4310:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry MA 5 0
2001:43f8:30:: 2001:43f8:30:ffff:ffff:ffff:ffff:ffff Provider Local Registry ZA 5 0
2804:1008:: 2804:1008:ffff:ffff:ffff:ffff:ffff:ffff Local Int Acesso a Internet LTDA BR 0 0
2a00:f88:: 2a00:f88:ffff:ffff:ffff:ffff:ffff:ffff Provider Local Registry DE 1,075 0
2a00:4ca0:: 2a00:4ca0:ffff:ffff:ffff:ffff:ffff:ffff Local Exchange Global Operation Services SAS FR 0 0
2a00:8280:: 2a00:8280:ffff:ffff:ffff:ffff:ffff:ffff For local company use SE 0 0
2a00:d160:: 2a00:d160:ffff:ffff:ffff:ffff:ffff:ffff Internet and local telephone service provider RU 0 0
2a02:ac80:: 2a02:ac87:ffff:ffff:ffff:ffff:ffff:ffff TEKNOTEL Local Registry TR 0 0
2a04:e80:: 2a04:e87:ffff:ffff:ffff:ffff:ffff:ffff LOCAL TV AND ISP ES 0 0
2a04:41c0:: 2a04:41c7:ffff:ffff:ffff:ffff:ffff:ffff Local TV and ISP Provider ES 11 0
2a06:1d80:: 2a06:1d87:ffff:ffff:ffff:ffff:ffff:ffff local.ch AG CH 175 0
2a0b:5c80:: 2a0b:5c87:ffff:ffff:ffff:ffff:ffff:ffff Local Loop Oy FI 0 0
2a0b:fb40:: 2a0b:fb47:ffff:ffff:ffff:ffff:ffff:ffff LOCAL ADVERTISING SRL RO 0 0
2001:6d0:d6:: 2001:6d0:d6:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry RU 0 0
2001:6d0:4004:: 2001:6d0:4004:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry RU 0 0
2001:6d0:6d08:: 2001:6d0:6d08:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry RU 0 0
2001:6d0:8000:: 2001:6d0:8000:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry RU 0 0
2001:6d0:ffb7:: 2001:6d0:ffb7:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry RU 0 0
2001:1a40:: 2001:1a40::ffff:ffff:ffff:ffff:ffff Provider Local Registry BH 0 0
2001:1a40:b:: 2001:1a40:b:ffff:ffff:ffff:ffff:ffff Provider Local Registry BH 0 0
2001:1a68:15:: 2001:1a68:15:ffff:ffff:ffff:ffff:ffff Provider Local Registry PL 8 0
2001:1a68:15:: 2001:1a68:2a:ffff:ffff:ffff:ffff:ffff Provider Local Registry PL 0 0
2001:1a68:2c:: 2001:1a68:2c:ffff:ffff:ffff:ffff:ffff Provider Local Registry PL 0 0
2001:1b60:8:: 2001:1b60:8:ffff:ffff:ffff:ffff:ffff PROVIDER Local Registry DE 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
3219 Ministry of Local Government and Regional Development HU 2 0 30 0
5096 411 LOCAL SEARCH CORP. CA 1 0 1 0
17471 Grameen Cybernet Ltd. Bangladesh. AS for local peering and transit. Dhaka BD 68 0 122 32
18082 Japan Agency for Local Authority Information Systems JP 2 1 2 0
25125 Local Authorities Data Processing Center Company Ltd Corp IL 7 0 112 2
28333 Local Datacenter Soluções em Comunicação Ltda. BR 8 0 5 0
30786 local.ch AG CH 1 1 206 0
35330 Local Exchange Global Operation Services SAS FR 4 0 0 0
41411 ROO Local network RA RU 1 0 0 0
45768 Local non-transit AS for the AU 7 0 71 0
51438 Boly city local government HU 6 0 91 0
52300 Internet Local AR 8 0 0 1
53324 LOCAL TV AND ELECTRONICS, INC. US 1 0 7 0
135675 Queensland Local Government Superannuation Board AU 1 0 0 0
205575 Canal Local Veo TV, S.L. ES 2 0 0 0
263615 Local Int Acesso a Internet LTDA BR 5 0 0 0

@@@@@@@@@@@@
????????????
include:_spf.google.com ~al

DNS server (NS records) ns58.domaincontrol.com (208.109.255.29)
ns57.domaincontrol.com (216.69.185.29)
Mail server (MX records) aspmx.l.google.com (74.125.133.27)
alt1.aspmx.l.google.com (209.85.233.26)
alt2.aspmx.l.google.com (74.125.130.26)
aspmx2.googlemail.com (74.125.205.26)
aspmx3.googlemail.com (74.125.24.26)
IP address (IPv4) 198.81.129.100
IP address (IPv6) 2a00:1450:4001:816::2013
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Domain Name: DRAGONRAISER.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Name Server: NS57.DOMAINCONTROL.COM
Name Server: NS58.DOMAINCONTROL.COM
DNSSEC: unsigned
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
198.81.129.107 3
IP address 198.81.129.107
Reverse DNS (PTR record) not available
DNS server (NS record) a22-66.akam.net (23.211.61.66)
a13-65.akam.net (2.22.230.65)
a12-65.akam.net (184.26.160.65)
a1-22.akam.net (193.108.91.22)
a3-64.akam.net.81.198.in-addr.arpa ()
a16-67.akam.net (23.211.132.67)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
@@@@@@@@@@@@@@@@@@@@@@
???????????????????
ploenk.net
This domain is hosted by MCI Communications Services, Inc. d/b/a Verizon Business (AS7046). The first DNS server is dns3.nsdns.info. The current IPv4 address is 198.81.129.107. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com ~all
DNS server (NS records) dns3.nsdns.info (198.27.76.32)
dns2.nsdns.info (188.165.164.171)
dns1.nsdns.info (94.23.153.36)
Mail server (MX records) aspmx.l.google.com (74.125.133.27)
alt2.aspmx.l.google.com (74.125.130.26)
alt1.aspmx.l.google.com (209.85.233.26)
aspmx2.googlemail.com (74.125.205.26)
aspmx3.googlemail.com (74.125.24.26)
IP address (IPv4) 198.81.129.107
IP address (IPv6)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Domain Name: ploenk.net
Registry Domain ID: 1863460947_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.rrpproxy.net
Registrar URL: http://www.key-systems.net
Updated Date: 2017-06-20T07:10:24.0Z
Creation Date: 2014-06-19T09:31:47.0Z
Registrar Registration Expiration Date: 2018-06-19T09:31:47.0Z
Registrar: Key-Systems GmbH
Registrar IANA ID: 269
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: ok https://icann.org/epp#ok
Registry Registrant ID: Not Available From Registry
Registrant Name: Thomas Scholz
Registrant Organization:
Registrant Street: Wolfsheck 2
Registrant City: Malsch
Registrant State/Province: Baden-Wuerttemberg
Registrant Postal Code: 69254
Registrant Country: DE
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID: Not Available From Registry
Admin Name: Thomas Scholz
Admin Organization:
Admin Street: Wolfsheck 2
Admin City: Malsch
Admin State/Province: Baden-Wuerttemberg
Admin Postal Code: 69254
Admin Country: DE
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID: Not Available From Registry
Tech Name: Thomas Scholz
Tech Organization:
Tech Street: Wolfsheck 2
Tech City: Malsch
Tech Postal Code: 69254
Tech State/Province: Baden-Wuerttemberg
Tech Country: DE
Tech Phone: removed phone number
Tech Phone Ext:
Tech Fax: removed phone number
Tech Fax Ext:
Tech Email: removed email address
Registry Billing ID: Not Available From Registry
Billing Name: Thomas Scholz
Billing Organization:
Billing Street: Wolfsheck 2
Billing City: Malsch
Billing State/Province: Baden-Wuerttemberg
Billing Postal Code: 69254
Billing Country: DE
Billing Phone: removed phone number
Billing Phone Ext:
Billing Fax: removed phone number
Billing Fax Ext:
Billing Email: removed email address
Name Server: dns1.nsdns.info
Name Server: dns2.nsdns.info
Name Server: dns3.nsdns.info
49.72539574400
@@@@@@@
key-systems.net
This domain is hosted by Key-Systems GmbH (AS196763). The first DNS server is ns2b.ksregistry.com. The current IPv4 address is 109.234.109.138. The mail server with the highest priority is mx19a.antispameurope.com.
v=spf1 ip4:109.234.108.0/23 ~al
DNS server (NS records) ns2b.ksregistry.com (72.0.48.76)
ns1a.ksregistry.net (203.119.88.75)
ns1b.ksregistry.net (72.0.48.75)
ns2a.ksregistry.com (203.119.88.76)
Mail server (MX records) mx19a.antispameurope.com (94.100.132.100)
mx19b.antispameurope.com (94.100.134.10)
mx19c.antispameurope.com (94.100.132.100)
mx19d.antispameurope.com (83.246.65.85)
IP address (IPv4) 109.234.109.138
IP address (IPv6)
ASN number 196763
ASN name (ISP) Key-Systems GmbH
IP-range/subnet 109.234.104.0/21
109.234.104.0 – 109.234.111.255
Domain Name: key-systems.net
Registry Domain ID: 30428855_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.rrpproxy.net
Registrar URL: http://www.key-systems.net
Updated Date: 2017-01-24T10:23:00.0Z
Creation Date: 2000-06-29T07:04:01.0Z
Registrar Registration Expiration Date: 2023-06-29T07:04:01.0Z
Registrar: Key-Systems GmbH
Registrar IANA ID: 269
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: clientDeleteProhibited https://icann.org/epp#clientDeleteProhibited
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: serverDeleteProhibited https://icann.org/epp#serverDeleteProhibited
Domain Status: serverTransferProhibited https://icann.org/epp#serverTransferProhibited
Domain Status: serverUpdateProhibited https://icann.org/epp#serverUpdateProhibited
Registry Registrant ID: Not Available From Registry
Registrant Name: Key-Systems GmbH
Registrant Organization: Key-Systems GmbH
Registrant Street: Im oberen Werk 1
Registrant City: St. Ingbert
Registrant State/Province:
Registrant Postal Code: 66386
Registrant Country: DE
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID: Not Available From Registry
Admin Name: Key-Systems GmbH
Admin Organization: Key-Systems GmbH
Admin Street: Im oberen Werk 1
Admin City: St. Ingbert
Admin State/Province:
Admin Postal Code: 66386
Admin Country: DE
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID: Not Available From Registry
Tech Name: Key-Systems GmbH
Tech Organization: Key-Systems GmbH
Tech Street: Im oberen Werk 1
Tech City: St. Ingbert
Tech Postal Code: 66386
Tech State/Province:
Tech Country: DE
49.68949396850

@@@@@@@@@@@@@@@@
??????
hacknshare.org
This domain is hosted by MCI Communications Services, Inc. d/b/a Verizon Business (AS7046). The first DNS server is dns2.nsdns.info. The current IPv4 address is 198.81.129.107. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com ~a
DNS server (NS records) dns2.nsdns.info (188.165.164.171)
dns1.nsdns.info (94.23.153.36)
dns3.nsdns.info (198.27.76.32)
Mail server (MX records) aspmx.l.google.com (74.125.133.27)
alt2.aspmx.l.google.com (74.125.130.26)
alt1.aspmx.l.google.com (209.85.233.26)
aspmx2.googlemail.com (74.125.205.26)
aspmx3.googlemail.com (74.125.24.26)
IP address (IPv4) 198.81.129.107
IP address (IPv6)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Domain Name: HACKNSHARE.ORG
Registry Domain ID: D106674064-LROR
Registrar WHOIS Server: whois.rrpproxy.net
Registrar URL: http://www.key-systems.net
Updated Date: 2017-06-21T01:30:42Z
Creation Date: 2005-06-20T11:32:05Z
Registry Expiry Date: 2018-06-20T11:32:05Z
Registrar Registration Expiration Date:
Registrar: Key-Systems GmbH
Registrar IANA ID: 269
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Reseller:
Domain Status: ok https://icann.org/epp#ok
Registry Registrant ID: C178405726-LROR
Registrant Name: Thomas Scholz
Registrant Organization:
Registrant Street: Wolfsheck 2
Registrant City: Malsch
Registrant State/Province: Baden-Wuerttemberg
Registrant Postal Code: 69254
Registrant Country: DE
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID: C178405726-LROR
Admin Name: Thomas Scholz
Admin Organization:
Admin Street: Wolfsheck 2
Admin City: Malsch
Admin State/Province: Baden-Wuerttemberg
Admin Postal Code: 69254
Admin Country: DE
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID: C178405726-LROR
Tech Name: Thomas Scholz
Tech Organization:
Tech Street: Wolfsheck 2
Tech City: Malsch
Tech State/Province: Baden-Wuerttemberg
Tech Postal Code: 69254
Tech Country: DE
Tech Phone: removed phone number
Tech Phone Ext:
Tech Fax: removed phone number
Tech Fax Ext:
Tech Email: removed email address
Name Server: DNS2.NSDNS.INFO
Name Server: DNS1.NSDNS.INFO
Name Server: DNS3.NSDNS.INFO
DNSSEC: unsigned

@@@@@@@@@@@@@@@@@@@@@@@@@
rescengito.com
This domain is hosted by MCI Communications Services, Inc. d/b/a Verizon Business (AS7046). The first DNS server is dns3.nsdns.info. The current IPv4 address is 198.81.129.107. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com ~all

DNS server (NS records) dns3.nsdns.info (198.27.76.32)
dns2.nsdns.info (188.165.164.171)
dns1.nsdns.info (94.23.153.36)
Mail server (MX records) aspmx.l.google.com (74.125.133.27)
aspmx3.googlemail.com (74.125.24.26)
aspmx2.googlemail.com (74.125.205.26)
alt1.aspmx.l.google.com (209.85.233.26)
alt2.aspmx.l.google.com (74.125.130.26)
IP address (IPv4) 198.81.129.107
IP address (IPv6)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Domain Name: rescengito.com
Registry Domain ID: 2085444838_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.rrpproxy.net
Registrar URL: http://www.key-systems.net
Updated Date: 2018-02-01T13:08:41.0Z
Creation Date: 2016-12-28T08:27:51.0Z
Registrar Registration Expiration Date: 2018-12-28T08:27:51.0Z
Registrar: Key-Systems GmbH
Registrar IANA ID: 269
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: ok https://icann.org/epp#ok
Registry Registrant ID: Not Available From Registry
Registrant Name: Thomas Scholz
Registrant Organization:
Registrant Street: Wolfsheck 2
Registrant City: Malsch
Registrant State/Province: Baden-Wuerttemberg
Registrant Postal Code: 69254
Registrant Country: DE
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID: Not Available From Registry
Admin Name: Thomas Scholz
Admin Organization:
Admin Street: Wolfsheck 2
Admin City: Malsch
Admin State/Province: Baden-Wuerttemberg
Admin Postal Code: 69254
Admin Country: DE
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID: Not Available From Registry
Tech Name: Thomas Scholz
Tech Organization:
Tech Street: Wolfsheck 2
Tech City: Malsch
Tech Postal Code: 69254
Tech State/Province: Baden-Wuerttemberg
Tech Country: DE
Tech Phone: removed phone number
Tech Phone Ext:
Tech Fax: removed phone number
Tech Fax Ext:
Tech Email: removed email address
Registry Billing ID: Not Available From Registry
Billing Name: Thomas Scholz
Billing Organization:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
NetRange: 198.81.128.0 – 198.81.191.255
CIDR: 198.81.128.0/18
NetName: OIT-BLK1
NetHandle: NET-198-81-128-0-1
Parent: BLK198-15-ANS (NET-198-80-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Central Intelligence Agency (CIA-1)
RegDate: 1997-02-11
Updated: 1998-03-30
Ref: https://whois.arin.net/rest/net/NET-198-81-128-0-1

OrgName: Central Intelligence Agency
OrgId: CIA-1
Address: GCS, ND1
City: Washington
StateProv: DC
PostalCode: 20505
Country: US
RegDate: 1992-07-21
Updated: 2011-09-24
NetRange: 198.80.0.0 – 198.81.255.255
CIDR: 198.80.0.0/15
NetName: BLK198-15-ANS
NetHandle: NET-198-80-0-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ANS Communications, Inc (ANS)
RegDate: 1993-03-26
Updated: 2002-10-10
Ref: https://whois.arin.net/rest/net/NET-198-80-0-0-1

OrgName: ANS Communications, Inc
OrgId: ANS
Address: 22001 Loudoun County Parkway
City: Ashburn
StateProv: VA
PostalCode: 20147
Country: US
RegDate: 1991-07-11
Domain IPv4 address Ranking Alexa Pagerank
cia.ac.uk 195.195.187.14
cia.academy 192.64.147.234
cia.accountants 162.255.119.207
cia.ae 69.172.201.153
cia.aero
cia.africa 199.73.55.48
cia.agency 89.31.143.1
cia.airline.aero
cia.airport.aero
cia.al
cia.as 51.174.95.49 0
cia.asia 69.64.147.34
cia.asso.fr 91.121.63.21
cia.at 188.118.210.140
cia.auction
cia.audio
cia.az 204.93.177.100 -1
cia.be 62.182.63.148 -1
cia.berlin 178.254.0.121 -1
cia.bg 217.174.156.100 1
cia.biz 98.124.199.113 -1
cia.blue 69.172.201.153
cia.bo 132.148.100.118
cia.business 50.63.202.57 -1
cia.buzz 184.168.221.75
cia.bz 157.7.188.104 1
cia.ca 54.246.98.46 5
cia.camp 50.63.202.61 -1
cia.care 64.68.200.44
cia.careers
cia.cc 203.78.142.12
cia.ch 5
cia.chat 50.63.202.25
cia.cl 72.52.4.122
cia.club
cia.cn 49.51.8.200
cia.co.at 81.223.238.250
cia.co.id
cia.co.il 104.45.14.249 1
cia.co.in 72.52.4.122
cia.co.jp 150.60.154.214
cia.co.kr 218.38.12.231
cia.co.nz 210.48.69.34
cia.co.uk
cia.co.za 41.204.202.40
cia.cologne 85.13.154.240
cia.com 54.208.9.165 845,198 3
cia.com.au 210.8.91.43 4
cia.com.br
cia.com.cn 114.215.175.181
IPv4 routes
Startip Endip Description Country #domains #spamhosts
146.129.0.0 146.129.255.255 King County Gov US 114 0
198.49.222.0 198.49.222.255 King County Gov US 0 0
200.198.0.0 200.198.63.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 279 0
12.166.216.0 12.166.223.255 LAFAYETTE CITY-PARISH CON. GOV. US 26 0
146.129.0.0 146.129.127.255 King County Gov US 0 0
146.129.0.0 146.129.63.255 King County Gov US 0 0
146.129.64.0 146.129.127.255 King County Gov US 0 0
146.129.128.0 146.129.191.255 King County Gov US 0 0
146.129.192.0 146.129.223.255 King County Gov US 0 0
146.129.224.0 146.129.239.255 King County Gov US 0 0
146.129.240.0 146.129.240.255 King County Gov US 70 0
146.129.249.0 146.129.249.255 King County Gov US 4 0
146.129.250.0 146.129.250.255 King County Gov US 1 0
188.94.170.0 188.94.170.255 OJSC Megafon, Urals dep., PA leased to informatisation department of Tumen region gov RU 0 0
194.226.16.0 194.226.16.255 GOV-CERT RU 4 0
198.94.156.0 198.94.156.255 Assc. of Bay Area Gov. (ABAG) US 1 0
198.94.157.0 198.94.157.255 Assc. of Bay Area Gov. (ABAG) US 0 0
198.94.158.0 198.94.158.255 Assc. of Bay Area Gov. (ABAG) US 0 0
200.198.16.0 200.198.16.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.58.0 200.198.58.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.60.0 200.198.60.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.61.0 200.198.61.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
45.4.52.0 45.4.55.255 EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
131.0.208.0 131.0.211.255 Duarte Aragon & Cia Ltda BR 0 1
131.72.248.0 131.72.251.255 Antônio Vasconcelos e Cia Ltda BR 0 0
131.161.4.0 131.161.7.255 CIA Itabirana de Informática – VALENET BR 0 0
131.161.96.0 131.161.99.255 Porto Seguro Cia de Seguros BR 0 0
138.0.220.0 138.0.223.255 Porto Seguro Cia de Seguros BR 3 0
138.94.228.0 138.94.231.255 Antônio Vasconcelos e Cia Ltda BR 0 0
138.186.52.0 138.186.55.255 Rogerio Batista Dos Santos E Cia LTDA ME BR 4 1
143.137.104.0 143.137.107.255 Porto Seguro Cia de Seguros BR 0 0
143.208.172.0 143.208.175.255 Adilson Vanderlei dos Santos Alves e Cia BR 1 3
143.208.208.0 143.208.211.255 José Carlos Roque Oliveira & Cia Ltda BR 0 0
167.250.216.0 167.250.219.255 M DANTAS & CIA LTDA ME BR 0 0
168.194.84.0 168.194.87.255 jose nilton de freitas e cia ltda BR 0 0
168.227.8.0 168.227.11.255 CIA Itabirana de Informática – VALENET BR 0 0
170.80.6.0 170.80.7.255 Cia Brasileira de Metalurgia e Mineração BR 0 0
170.233.8.0 170.233.11.255 Antônio Vasconcelos e Cia Ltda BR 0 0
170.233.52.0 170.233.55.255 RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
170.239.40.0 170.239.43.255 M DANTAS & CIA LTDA ME BR 0 0
170.239.192.0 170.239.195.255 CIA Itabirana de Informática – VALENET BR 0 0
170.246.4.0 170.246.7.255 Antônio Vasconcelos e Cia Ltda BR 0 0
177.11.56.0 177.11.59.255 R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
177.20.0.0 177.20.127.255 Prodasal Cia Proc de Dados do Salvador BR 14 0
177.38.152.0 177.38.159.255 Antônio Vasconcelos e Cia Ltda BR 11 0
177.86.120.0 177.86.123.255 Cancelier, Granemann e Cia Ltda BR 2 1
177.91.144.0 177.91.159.255 GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 3
177.125.112.0 177.125.119.255 José Carlos Roque Oliveira & Cia Ltda BR 8 1
177.152.112.0 177.152.119.255 Duarte Aragon & Cia Ltda BR 1 0
177.152.160.0 177.152.175.255 CIA Itabirana de Informática – VALENET BR 0 3
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:f1:: 2001:df0:f1:ffff:ffff:ffff:ffff:ffff AEC-GOV-AU AU 0 0
2804:bd0:: 2804:bd0:ffff:ffff:ffff:ffff:ffff:ffff Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
2801:80:130:: 2801:80:130:ffff:ffff:ffff:ffff:ffff Prodasal Cia Proc de Dados do Salvador BR 0 0
2801:80:b00:: 2801:80:b00:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2801:80:1b30:: 2801:80:1b30:ffff:ffff:ffff:ffff:ffff Cia Brasileira de Metalurgia e Mineração BR 0 0
2804:5c:: 2804:5c:ffff:ffff:ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
2804:344:: 2804:344:ffff:ffff:ffff:ffff:ffff:ffff R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
2804:830:: 2804:830:ffff:ffff:ffff:ffff:ffff:ffff Cancelier, Granemann e Cia Ltda BR 0 0
2804:a14:: 2804:a14:ffff:ffff:ffff:ffff:ffff:ffff José Carlos Roque Oliveira & Cia Ltda BR 0 0
2804:b34:: 2804:b34:ffff:ffff:ffff:ffff:ffff:ffff Antônio Vasconcelos e Cia Ltda BR 0 0
2804:e28:: 2804:e28:ffff:ffff:ffff:ffff:ffff:ffff RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
2804:e7c:: 2804:e7c:ffff:ffff:ffff:ffff:ffff:ffff Joniel Carraro & Cia Ltda BR 0 0
2804:11d4:: 2804:11d4:ffff:ffff:ffff:ffff:ffff:ffff GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 0
2804:1ad4:: 2804:1ad4:ffff:ffff:ffff:ffff:ffff:ffff Duarte Aragon & Cia Ltda BR 0 0
2804:2188:: 2804:2188:ffff:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2804:26c8:: 2804:26c8:ffff:ffff:ffff:ffff:ffff:ffff Rogerio Batista Dos Santos E Cia LTDA ME BR 0 0
2804:2ab0:: 2804:2ab0:ffff:ffff:ffff:ffff:ffff:ffff Adilson Vanderlei dos Santos Alves e Cia BR 0 0
2804:2c84:: 2804:2c84:ffff:ffff:ffff:ffff:ffff:ffff M DANTAS & CIA LTDA ME BR 0 0
2804:3348:: 2804:3348:ffff:ffff:ffff:ffff:ffff:ffff jose nilton de freitas e cia ltda BR 0 0
2804:39a0:: 2804:39a0:ffff:ffff:ffff:ffff:ffff:ffff EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
2804:5c:1000:: 2804:5c:1000::ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
2544 King County Gov US 12 0 114 0
8867 E-Gov – Tehila Project – Prime Minister Office’s IL 28 0 213 0
7465 PROCERGS – Cia de Processamento de Dados do RGS BR 21 0 721 1
10412 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 1 1 44 1
19723 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 7 0 446 0
25832 Cia. de Processamento de Dados do Estado da Bahia BR 1 0 239 1
26606 Cia de Proc. de Dado do Município de Porto Alegre BR 23 1 294 0
28280 A. P. OLIVEIRA & CIA. INFORMATICA LTDA. BR 37 1 31 2
28637 Cia Proc. de Dados do Estado de S Paulo – Prodesp BR 21 1 448 3
52517 EVERTON HAISE TAQUES & CIA LTDA BR 3 0 19 0
52547 Rodrigo José Marasca e Cia Ltda BR 24 1 0 1
52587 João M. S. de Almeida junior & Cia ltda BR 1 0 2 2
52591 S. C. Terres e Cia Ltda BR 5 1 2 0
52607 Irmãos Giotto Oliveira & Cia.Ltda. BR 7 0 9 0
52652 BENCHIMOL IRMAO & CIA LTDA BR 3 0 0 0
52653 Marlon L. Larger & Cia Ltda BR 13 1 1 0
52843 Magnos A. Both e Cia Ltda BR 9 0 1 0
52865 R. Jose da Silva e Cia Ltda – OndaÁgil BR 9 1 1 0
52910 A. Angeloni & Cia Ltda BR 1 0 7 0
53096 Faviero, Duarte e CIA LTDA BR 1 1 3 0
53168 CIA ESTADUAL DE GERAÇÃO E TRANSMISSÃO DE ENERGIA E BR 3 0 3 0
53227 M.V. Martin & Cia Ltda. BR 4 0 0 1
61506 Insacom y Cia. Limitada CL 1 0 81 0
61794 DONATO JUNIOR E CIA LTDA BR 7 0 0 3
61833 P. R. LIMA & CIA LTDA BR 1 1 1 0
61938 Damaris Figueredo Antunes e Cia Ltda BR 3 0 0 0
262223 Nettplus – Necusoft Cia. Ltda. EC 2 0 3 18
262282 MARIA LUCIANA MACHADO E CIA LTDA-ME BR 5 1 2 3
262342 JOSE CARLOS ROQUE OLIVEIRA & CIA LTDA BR 8 1 8 2
262362 B. D. MATOS & CIA LTDA – SINET INTERNET BR 9 1 4 1
262417 Gustavo Zanatta e Cia Ltda BR 31 1 4 5
262573 GILMAR DOS SANTOS & CIA. LTDA. BR 6 0 8 0
262619 Thielke & Cia Ltda. BR 18 1 10 1
262657 DENDENA E CIA LTDA ME BR 4 0 0 1
262749 Andries & Cia Ltda BR 1 3 3 0
262810 C. R. BARDI & CIA LTDA – ME BR 3 0 0 0
262812 K.H.D. SILVESTRI E CIA LTDA BR 10 0 1 49
262831 N G B Pires & CIA LTDA BR 4 0 4 0
262871 R.D.S. Bortoluzzi & Cia Ltda – ME BR 3 0 0 0
262958 CARRARO, HAINOSZ & CIA LTDA – ME BR 12 1 1 1
263002 RAFAEL ORSSATTO & CIA LTDA BR 14 0 0 3
263018 Zapelini & Cia. Ltda. BR 11 3 3 0
263037 ISMAEL STROHER & CIA. LTDA. – ME BR 8 0 0 0
263060 Atílio Marcos Marcari e Cia Ltda Me BR 1 0 21 1
263066 RVNet – R V PORTELA AGUIAR & CIA LTDA BR 14 0 2 1
263293 CODERP-CIA DESENVOLVIMENTO ECONOMICO DE RIBEIRAO BR 2 1 8 0
263419 Edilso Fuchter & Cia Ltda BR 1 0 1 0
263442 GIALES FISCHER GRUTZMANN & CIA LTDA BR 19 0 0 3
263451 Geovane Matheus Rossetto & Cia Ltda BR 4 0 0 0
263475 Breno Vilela Santana e Cia. Ltda. BR 3 1 0 0

@@@@@@@@@@@@@@@@@@@@@@@@
????????????????????????

a:mail2a.cia.gov
Are you looking for IPv4 address 198.81.129.148?
P address 198.81.129.148
Location Great Falls, Virginia, United States
IP address 198.81.129.148
Reverse DNS (PTR record) mail2.cia.gov
DNS server (NS record) auth101.ns.uu.net (198.6.1.210)
auth51.ns.uu.net (198.6.1.162)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
NetRange: 198.81.128.0 – 198.81.191.255
CIDR: 198.81.128.0/18
NetName: OIT-BLK1
NetHandle: NET-198-81-128-0-1
Parent: BLK198-15-ANS (NET-198-80-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Central Intelligence Agency (CIA-1)
RegDate: 1997-02-11
Updated: 1998-03-30
Ref:
-198-81-128-0-1

OrgName: Central Intelligence Agency
OrgId: CIA-1
Address: GCS, ND1
City: Washington
StateProv: DC
PostalCode: 20505
Country: US
RegDate: 1992-07-21
Updated: 2011-09-24
Ref: https://whois.arin.net/rest/org/CIA-1

OrgTechHandle: DW1276-ARIN
OrgTechName: Wheelock, David
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/DW1276-ARIN

OrgAbuseHandle: DW1276-ARIN
OrgAbuseName: Wheelock, David
NetRange: 198.80.0.0 – 198.81.255.255
CIDR: 198.80.0.0/15
NetName: BLK198-15-ANS
NetHandle: NET-198-80-0-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ANS Communications, Inc (ANS)
RegDate: 1993-03-26
Updated: 2002-10-10
Ref: https://whois.arin.net/rest/net/NET-198-80-0-0-1

OrgName: ANS Communications, Inc
OrgId: ANS
Address: 22001 Loudoun County Parkway
City: Ashburn
StateProv: VA
PostalCode: 20147
Country: US
RegDate: 1991-07-11
Updated: 2009-12-07
Ref: https://whois.arin.net/rest/org/ANS

OrgTechHandle: SWIPP-ARIN
OrgTechName: swipper
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/SWIPP-ARIN
@@@@@@@@@@@@@@@@@@@
Domains around 198.81.129.148
IP address #domains
198.81.129.100 2
IP address 198.81.129.100
Reverse DNS (PTR record) cia.cia.gov
DNS server (NS record) auth101.ns.uu.net (198.6.1.210)
auth51.ns.uu.net (198.6.1.162)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
odci.gov
dragonraiser.com
blocked above
Domain Tools
ploenk.net
rescengito.com
hacknshare.org
@@@@@@@@@@@@
?????????
198.81.129.107 3
Domain Tools
ploenk.net
rescengito.com
hacknshare.org
????????????????
Mail server Tools
mail2.cia.gov
Are you looking for IPv4 address 198.81.129.148?
IP address 198.81.129.148
Location Great Falls, Virginia, United State
IP address 198.81.129.148
Reverse DNS (PTR record) mail2.cia.gov
DNS server (NS record) auth101.ns.uu.net (198.6.1.210)
auth51.ns.uu.net (198.6.1.162)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255

Are you looking for domain cia.gov?
Domain IPv4 address Ranking Alexa Pagerank
cia.ac.uk 195.195.187.14
cia.academy 192.64.147.234
cia.accountants 162.255.119.207
cia.ae 69.172.201.153
cia.aero
cia.africa 199.73.55.48
cia.agency 89.31.143.1
cia.airline.aero
cia.airport.aero
cia.al
cia.as 51.174.95.49 0
cia.asia 69.64.147.34
cia.asso.fr 91.121.63.21
cia.at 188.118.210.140
cia.auction
cia.audio
cia.az 204.93.177.100 -1
cia.be 62.182.63.148 -1
cia.berlin 178.254.0.121 -1
cia.bg 217.174.156.100 1
cia.biz 98.124.199.113 -1
cia.blue 69.172.201.153
cia.bo 132.148.100.118
cia.business 50.63.202.57 -1
cia.buzz 184.168.221.75
cia.bz 157.7.188.104 1
cia.ca 54.246.98.46 5
cia.camp 50.63.202.61 -1
cia.care 64.68.200.44
cia.careers
cia.cc 203.78.142.12
cia.ch 5
cia.chat 50.63.202.25
cia.cl 72.52.4.122
cia.club
cia.cn 49.51.8.200
cia.co.at 81.223.238.250
cia.co.id
cia.co.il 104.45.14.249 1
cia.co.in 72.52.4.122
cia.co.jp 150.60.154.214
cia.co.kr 218.38.12.231
cia.co.nz 210.48.69.34
cia.co.uk
cia.co.za 41.204.202.40
cia.cologne 85.13.154.240
cia.com 54.208.9.165 845,198 3
cia.com.au 210.8.91.43 4
cia.com.br
cia.com.cn 114.215.175.181
IPv4 routes
Startip Endip Description Country #domains #spamhosts
146.129.0.0 146.129.255.255 King County Gov US 114 0
198.49.222.0 198.49.222.255 King County Gov US 0 0
200.198.0.0 200.198.63.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 279 0
12.166.216.0 12.166.223.255 LAFAYETTE CITY-PARISH CON. GOV. US 26 0
146.129.0.0 146.129.127.255 King County Gov US 0 0
146.129.0.0 146.129.63.255 King County Gov US 0 0
146.129.64.0 146.129.127.255 King County Gov US 0 0
146.129.128.0 146.129.191.255 King County Gov US 0 0
146.129.192.0 146.129.223.255 King County Gov US 0 0
146.129.224.0 146.129.239.255 King County Gov US 0 0
146.129.240.0 146.129.240.255 King County Gov US 70 0
146.129.249.0 146.129.249.255 King County Gov US 4 0
146.129.250.0 146.129.250.255 King County Gov US 1 0
188.94.170.0 188.94.170.255 OJSC Megafon, Urals dep., PA leased to informatisation department of Tumen region gov RU 0 0
194.226.16.0 194.226.16.255 GOV-CERT RU 4 0
198.94.156.0 198.94.156.255 Assc. of Bay Area Gov. (ABAG) US 1 0
198.94.157.0 198.94.157.255 Assc. of Bay Area Gov. (ABAG) US 0 0
198.94.158.0 198.94.158.255 Assc. of Bay Area Gov. (ABAG) US 0 0
200.198.16.0 200.198.16.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.58.0 200.198.58.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.60.0 200.198.60.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.61.0 200.198.61.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
45.4.52.0 45.4.55.255 EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
131.0.208.0 131.0.211.255 Duarte Aragon & Cia Ltda BR 0 1
131.72.248.0 131.72.251.255 Antônio Vasconcelos e Cia Ltda BR 0 0
131.161.4.0 131.161.7.255 CIA Itabirana de Informática – VALENET BR 0 0
131.161.96.0 131.161.99.255 Porto Seguro Cia de Seguros BR 0 0
138.0.220.0 138.0.223.255 Porto Seguro Cia de Seguros BR 3 0
138.94.228.0 138.94.231.255 Antônio Vasconcelos e Cia Ltda BR 0 0
138.186.52.0 138.186.55.255 Rogerio Batista Dos Santos E Cia LTDA ME BR 4 1
143.137.104.0 143.137.107.255 Porto Seguro Cia de Seguros BR 0 0
143.208.172.0 143.208.175.255 Adilson Vanderlei dos Santos Alves e Cia BR 1 3
143.208.208.0 143.208.211.255 José Carlos Roque Oliveira & Cia Ltda BR 0 0
167.250.216.0 167.250.219.255 M DANTAS & CIA LTDA ME BR 0 0
168.194.84.0 168.194.87.255 jose nilton de freitas e cia ltda BR 0 0
168.227.8.0 168.227.11.255 CIA Itabirana de Informática – VALENET BR 0 0
170.80.6.0 170.80.7.255 Cia Brasileira de Metalurgia e Mineração BR 0 0
170.233.8.0 170.233.11.255 Antônio Vasconcelos e Cia Ltda BR 0 0
170.233.52.0 170.233.55.255 RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
170.239.40.0 170.239.43.255 M DANTAS & CIA LTDA ME BR 0 0
170.239.192.0 170.239.195.255 CIA Itabirana de Informática – VALENET BR 0 0
170.246.4.0 170.246.7.255 Antônio Vasconcelos e Cia Ltda BR 0 0
177.11.56.0 177.11.59.255 R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
177.20.0.0 177.20.127.255 Prodasal Cia Proc de Dados do Salvador BR 14 0
177.38.152.0 177.38.159.255 Antônio Vasconcelos e Cia Ltda BR 11 0
177.86.120.0 177.86.123.255 Cancelier, Granemann e Cia Ltda BR 2 1
177.91.144.0 177.91.159.255 GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 3
177.125.112.0 177.125.119.255 José Carlos Roque Oliveira & Cia Ltda BR 8 1
177.152.112.0 177.152.119.255 Duarte Aragon & Cia Ltda BR 1 0
177.152.160.0 177.152.175.255 CIA Itabirana de Informática – VALENET BR 0 3
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:f1:: 2001:df0:f1:ffff:ffff:ffff:ffff:ffff AEC-GOV-AU AU 0 0
2804:bd0:: 2804:bd0:ffff:ffff:ffff:ffff:ffff:ffff Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
2801:80:130:: 2801:80:130:ffff:ffff:ffff:ffff:ffff Prodasal Cia Proc de Dados do Salvador BR 0 0
2801:80:b00:: 2801:80:b00:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2801:80:1b30:: 2801:80:1b30:ffff:ffff:ffff:ffff:ffff Cia Brasileira de Metalurgia e Mineração BR 0 0
2804:5c:: 2804:5c:ffff:ffff:ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
2804:344:: 2804:344:ffff:ffff:ffff:ffff:ffff:ffff R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
2804:830:: 2804:830:ffff:ffff:ffff:ffff:ffff:ffff Cancelier, Granemann e Cia Ltda BR 0 0
2804:a14:: 2804:a14:ffff:ffff:ffff:ffff:ffff:ffff José Carlos Roque Oliveira & Cia Ltda BR 0 0
2804:b34:: 2804:b34:ffff:ffff:ffff:ffff:ffff:ffff Antônio Vasconcelos e Cia Ltda BR 0 0
2804:e28:: 2804:e28:ffff:ffff:ffff:ffff:ffff:ffff RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
2804:e7c:: 2804:e7c:ffff:ffff:ffff:ffff:ffff:ffff Joniel Carraro & Cia Ltda BR 0 0
2804:11d4:: 2804:11d4:ffff:ffff:ffff:ffff:ffff:ffff GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 0
2804:1ad4:: 2804:1ad4:ffff:ffff:ffff:ffff:ffff:ffff Duarte Aragon & Cia Ltda BR 0 0
2804:2188:: 2804:2188:ffff:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2804:26c8:: 2804:26c8:ffff:ffff:ffff:ffff:ffff:ffff Rogerio Batista Dos Santos E Cia LTDA ME BR 0 0
2804:2ab0:: 2804:2ab0:ffff:ffff:ffff:ffff:ffff:ffff Adilson Vanderlei dos Santos Alves e Cia BR 0 0
2804:2c84:: 2804:2c84:ffff:ffff:ffff:ffff:ffff:ffff M DANTAS & CIA LTDA ME BR 0 0
2804:3348:: 2804:3348:ffff:ffff:ffff:ffff:ffff:ffff jose nilton de freitas e cia ltda BR 0 0
2804:39a0:: 2804:39a0:ffff:ffff:ffff:ffff:ffff:ffff EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
2804:5c:1000:: 2804:5c:1000::ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
2544 King County Gov US 12 0 114 0
8867 E-Gov – Tehila Project – Prime Minister Office’s IL 28 0 213 0
7465 PROCERGS – Cia de Processamento de Dados do RGS BR 21 0 721 1
10412 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 1 1 44 1
19723 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 7 0 446 0
25832 Cia. de Processamento de Dados do Estado da Bahia BR 1 0 239 1
26606 Cia de Proc. de Dado do Município de Porto Alegre BR 23 1 294 0
28280 A. P. OLIVEIRA & CIA. INFORMATICA LTDA. BR 37 1 31 2
28637 Cia Proc. de Dados do Estado de S Paulo – Prodesp BR 21 1 448 3
52517 EVERTON HAISE TAQUES & CIA LTDA BR 3 0 19 0
52547 Rodrigo José Marasca e Cia Ltda BR 24 1 0 1
52587 João M. S. de Almeida junior & Cia ltda BR 1 0 2 2
52591 S. C. Terres e Cia Ltda BR 5 1 2 0
52607 Irmãos Giotto Oliveira & Cia.Ltda. BR 7 0 9 0
52652 BENCHIMOL IRMAO & CIA LTDA BR 3 0 0 0
52653 Marlon L. Larger & Cia Ltda BR 13 1 1 0
52843 Magnos A. Both e Cia Ltda BR 9 0 1 0
52865 R. Jose da Silva e Cia Ltda – OndaÁgil BR 9 1 1 0
52910 A. Angeloni & Cia Ltda BR 1 0 7 0
53096 Faviero, Duarte e CIA LTDA BR 1 1 3 0
53168 CIA ESTADUAL DE GERAÇÃO E TRANSMISSÃO DE ENERGIA E BR 3 0 3 0
53227 M.V. Martin & Cia Ltda. BR 4 0 0 1
61506 Insacom y Cia. Limitada CL 1 0 81 0
61794 DONATO JUNIOR E CIA LTDA BR 7 0 0 3
61833 P. R. LIMA & CIA LTDA BR 1 1 1 0
61938 Damaris Figueredo Antunes e Cia Ltda BR 3 0 0 0
262223 Nettplus – Necusoft Cia. Ltda. EC 2 0 3 18
262282 MARIA LUCIANA MACHADO E CIA LTDA-ME BR 5 1 2 3
262342 JOSE CARLOS ROQUE OLIVEIRA & CIA LTDA BR 8 1 8 2
262362 B. D. MATOS & CIA LTDA – SINET INTERNET BR 9 1 4 1
262417 Gustavo Zanatta e Cia Ltda BR 31 1 4 5
262573 GILMAR DOS SANTOS & CIA. LTDA. BR 6 0 8 0
262619 Thielke & Cia Ltda. BR 18 1 10 1
262657 DENDENA E CIA LTDA ME BR 4 0 0 1
262749 Andries & Cia Ltda BR 1 3 3 0
262810 C. R. BARDI & CIA LTDA – ME BR 3 0 0 0
262812 K.H.D. SILVESTRI E CIA LTDA BR 10 0 1 49
262831 N G B Pires & CIA LTDA BR 4 0 4 0
262871 R.D.S. Bortoluzzi & Cia Ltda – ME BR 3 0 0 0
262958 CARRARO, HAINOSZ & CIA LTDA – ME BR 12 1 1 1
263002 RAFAEL ORSSATTO & CIA LTDA BR 14 0 0 3
263018 Zapelini & Cia. Ltda. BR 11 3 3 0
263037 ISMAEL STROHER & CIA. LTDA. – ME BR 8 0 0 0
263060 Atílio Marcos Marcari e Cia Ltda Me BR 1 0 21 1
263066 RVNet – R V PORTELA AGUIAR & CIA LTDA BR 14 0 2 1
263293 CODERP-CIA DESENVOLVIMENTO ECONOMICO DE RIBEIRAO BR 2 1 8 0
263419 Edilso Fuchter & Cia Ltda BR 1 0 1 0
263442 GIALES FISCHER GRUTZMANN & CIA LTDA BR 19 0 0 3
263451 Geovane Matheus Rossetto & Cia Ltda BR 4 0 0 0
263475 Breno Vilela Santana e Cia. Ltda. BR 3 1 0 0

@@@@@@@@@@@@@@@@@@@@
Are you looking for domain cia.gov?
Domain IPv4 address Ranking Alexa Pagerank
cia.ac.uk 195.195.187.14
cia.academy 192.64.147.234
cia.accountants 162.255.119.207
cia.ae 69.172.201.153
cia.aero
cia.africa 199.73.55.48
cia.agency 89.31.143.1
cia.airline.aero
cia.airport.aero
cia.al
cia.as 51.174.95.49 0
cia.asia 69.64.147.34
cia.asso.fr 91.121.63.21
cia.at 188.118.210.140
cia.auction
cia.audio
cia.az 204.93.177.100 -1
cia.be 62.182.63.148 -1
cia.berlin 178.254.0.121 -1
cia.bg 217.174.156.100 1
cia.biz 98.124.199.113 -1
cia.blue 69.172.201.153
cia.bo 132.148.100.118
cia.business 50.63.202.57 -1
cia.buzz 184.168.221.75
cia.bz 157.7.188.104 1
cia.ca 54.246.98.46 5
cia.camp 50.63.202.61 -1
cia.care 64.68.200.44
cia.careers
cia.cc 203.78.142.12
cia.ch 5
cia.chat 50.63.202.25
cia.cl 72.52.4.122
cia.club
cia.cn 49.51.8.200
cia.co.at 81.223.238.250
cia.co.id
cia.co.il 104.45.14.249 1
cia.co.in 72.52.4.122
cia.co.jp 150.60.154.214
cia.co.kr 218.38.12.231
cia.co.nz 210.48.69.34
cia.co.uk
cia.co.za 41.204.202.40
cia.cologne 85.13.154.240
cia.com 54.208.9.165 845,198 3
cia.com.au 210.8.91.43 4
cia.com.br
cia.com.cn 114.215.175.181
IPv4 routes
Startip Endip Description Country #domains #spamhosts
146.129.0.0 146.129.255.255 King County Gov US 114 0
198.49.222.0 198.49.222.255 King County Gov US 0 0
200.198.0.0 200.198.63.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 279 0
12.166.216.0 12.166.223.255 LAFAYETTE CITY-PARISH CON. GOV. US 26 0
146.129.0.0 146.129.127.255 King County Gov US 0 0
146.129.0.0 146.129.63.255 King County Gov US 0 0
146.129.64.0 146.129.127.255 King County Gov US 0 0
146.129.128.0 146.129.191.255 King County Gov US 0 0
146.129.192.0 146.129.223.255 King County Gov US 0 0
146.129.224.0 146.129.239.255 King County Gov US 0 0
146.129.240.0 146.129.240.255 King County Gov US 70 0
146.129.249.0 146.129.249.255 King County Gov US 4 0
146.129.250.0 146.129.250.255 King County Gov US 1 0
188.94.170.0 188.94.170.255 OJSC Megafon, Urals dep., PA leased to informatisation department of Tumen region gov RU 0 0
194.226.16.0 194.226.16.255 GOV-CERT RU 4 0
198.94.156.0 198.94.156.255 Assc. of Bay Area Gov. (ABAG) US 1 0
198.94.157.0 198.94.157.255 Assc. of Bay Area Gov. (ABAG) US 0 0
198.94.158.0 198.94.158.255 Assc. of Bay Area Gov. (ABAG) US 0 0
200.198.16.0 200.198.16.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.58.0 200.198.58.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.60.0 200.198.60.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.61.0 200.198.61.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
45.4.52.0 45.4.55.255 EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
131.0.208.0 131.0.211.255 Duarte Aragon & Cia Ltda BR 0 1
131.72.248.0 131.72.251.255 Antônio Vasconcelos e Cia Ltda BR 0 0
131.161.4.0 131.161.7.255 CIA Itabirana de Informática – VALENET BR 0 0
131.161.96.0 131.161.99.255 Porto Seguro Cia de Seguros BR 0 0
138.0.220.0 138.0.223.255 Porto Seguro Cia de Seguros BR 3 0
138.94.228.0 138.94.231.255 Antônio Vasconcelos e Cia Ltda BR 0 0
138.186.52.0 138.186.55.255 Rogerio Batista Dos Santos E Cia LTDA ME BR 4 1
143.137.104.0 143.137.107.255 Porto Seguro Cia de Seguros BR 0 0
143.208.172.0 143.208.175.255 Adilson Vanderlei dos Santos Alves e Cia BR 1 3
143.208.208.0 143.208.211.255 José Carlos Roque Oliveira & Cia Ltda BR 0 0
167.250.216.0 167.250.219.255 M DANTAS & CIA LTDA ME BR 0 0
168.194.84.0 168.194.87.255 jose nilton de freitas e cia ltda BR 0 0
168.227.8.0 168.227.11.255 CIA Itabirana de Informática – VALENET BR 0 0
170.80.6.0 170.80.7.255 Cia Brasileira de Metalurgia e Mineração BR 0 0
170.233.8.0 170.233.11.255 Antônio Vasconcelos e Cia Ltda BR 0 0
170.233.52.0 170.233.55.255 RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
170.239.40.0 170.239.43.255 M DANTAS & CIA LTDA ME BR 0 0
170.239.192.0 170.239.195.255 CIA Itabirana de Informática – VALENET BR 0 0
170.246.4.0 170.246.7.255 Antônio Vasconcelos e Cia Ltda BR 0 0
177.11.56.0 177.11.59.255 R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
177.20.0.0 177.20.127.255 Prodasal Cia Proc de Dados do Salvador BR 14 0
177.38.152.0 177.38.159.255 Antônio Vasconcelos e Cia Ltda BR 11 0
177.86.120.0 177.86.123.255 Cancelier, Granemann e Cia Ltda BR 2 1
177.91.144.0 177.91.159.255 GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 3
177.125.112.0 177.125.119.255 José Carlos Roque Oliveira & Cia Ltda BR 8 1
177.152.112.0 177.152.119.255 Duarte Aragon & Cia Ltda BR 1 0
177.152.160.0 177.152.175.255 CIA Itabirana de Informática – VALENET BR 0 3
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:f1:: 2001:df0:f1:ffff:ffff:ffff:ffff:ffff AEC-GOV-AU AU 0 0
2804:bd0:: 2804:bd0:ffff:ffff:ffff:ffff:ffff:ffff Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
2801:80:130:: 2801:80:130:ffff:ffff:ffff:ffff:ffff Prodasal Cia Proc de Dados do Salvador BR 0 0
2801:80:b00:: 2801:80:b00:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2801:80:1b30:: 2801:80:1b30:ffff:ffff:ffff:ffff:ffff Cia Brasileira de Metalurgia e Mineração BR 0 0
2804:5c:: 2804:5c:ffff:ffff:ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
2804:344:: 2804:344:ffff:ffff:ffff:ffff:ffff:ffff R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
2804:830:: 2804:830:ffff:ffff:ffff:ffff:ffff:ffff Cancelier, Granemann e Cia Ltda BR 0 0
2804:a14:: 2804:a14:ffff:ffff:ffff:ffff:ffff:ffff José Carlos Roque Oliveira & Cia Ltda BR 0 0
2804:b34:: 2804:b34:ffff:ffff:ffff:ffff:ffff:ffff Antônio Vasconcelos e Cia Ltda BR 0 0
2804:e28:: 2804:e28:ffff:ffff:ffff:ffff:ffff:ffff RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
2804:e7c:: 2804:e7c:ffff:ffff:ffff:ffff:ffff:ffff Joniel Carraro & Cia Ltda BR 0 0
2804:11d4:: 2804:11d4:ffff:ffff:ffff:ffff:ffff:ffff GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 0
2804:1ad4:: 2804:1ad4:ffff:ffff:ffff:ffff:ffff:ffff Duarte Aragon & Cia Ltda BR 0 0
2804:2188:: 2804:2188:ffff:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2804:26c8:: 2804:26c8:ffff:ffff:ffff:ffff:ffff:ffff Rogerio Batista Dos Santos E Cia LTDA ME BR 0 0
2804:2ab0:: 2804:2ab0:ffff:ffff:ffff:ffff:ffff:ffff Adilson Vanderlei dos Santos Alves e Cia BR 0 0
2804:2c84:: 2804:2c84:ffff:ffff:ffff:ffff:ffff:ffff M DANTAS & CIA LTDA ME BR 0 0
2804:3348:: 2804:3348:ffff:ffff:ffff:ffff:ffff:ffff jose nilton de freitas e cia ltda BR 0 0
2804:39a0:: 2804:39a0:ffff:ffff:ffff:ffff:ffff:ffff EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
2804:5c:1000:: 2804:5c:1000::ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
2544 King County Gov US 12 0 114 0
8867 E-Gov – Tehila Project – Prime Minister Office’s IL 28 0 213 0
7465 PROCERGS – Cia de Processamento de Dados do RGS BR 21 0 721 1
10412 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 1 1 44 1
19723 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 7 0 446 0
25832 Cia. de Processamento de Dados do Estado da Bahia BR 1 0 239 1
26606 Cia de Proc. de Dado do Município de Porto Alegre BR 23 1 294 0
28280 A. P. OLIVEIRA & CIA. INFORMATICA LTDA. BR 37 1 31 2
28637 Cia Proc. de Dados do Estado de S Paulo – Prodesp BR 21 1 448 3
52517 EVERTON HAISE TAQUES & CIA LTDA BR 3 0 19 0
52547 Rodrigo José Marasca e Cia Ltda BR 24 1 0 1
52587 João M. S. de Almeida junior & Cia ltda BR 1 0 2 2
52591 S. C. Terres e Cia Ltda BR 5 1 2 0
52607 Irmãos Giotto Oliveira & Cia.Ltda. BR 7 0 9 0
52652 BENCHIMOL IRMAO & CIA LTDA BR 3 0 0 0
52653 Marlon L. Larger & Cia Ltda BR 13 1 1 0
52843 Magnos A. Both e Cia Ltda BR 9 0 1 0
52865 R. Jose da Silva e Cia Ltda – OndaÁgil BR 9 1 1 0
52910 A. Angeloni & Cia Ltda BR 1 0 7 0
53096 Faviero, Duarte e CIA LTDA BR 1 1 3 0
53168 CIA ESTADUAL DE GERAÇÃO E TRANSMISSÃO DE ENERGIA E BR 3 0 3 0
53227 M.V. Martin & Cia Ltda. BR 4 0 0 1
61506 Insacom y Cia. Limitada CL 1 0 81 0
61794 DONATO JUNIOR E CIA LTDA BR 7 0 0 3
61833 P. R. LIMA & CIA LTDA BR 1 1 1 0
61938 Damaris Figueredo Antunes e Cia Ltda BR 3 0 0 0
262223 Nettplus – Necusoft Cia. Ltda. EC 2 0 3 18
262282 MARIA LUCIANA MACHADO E CIA LTDA-ME BR 5 1 2 3
262342 JOSE CARLOS ROQUE OLIVEIRA & CIA LTDA BR 8 1 8 2
262362 B. D. MATOS & CIA LTDA – SINET INTERNET BR 9 1 4 1
262417 Gustavo Zanatta e Cia Ltda BR 31 1 4 5
262573 GILMAR DOS SANTOS & CIA. LTDA. BR 6 0 8 0
262619 Thielke & Cia Ltda. BR 18 1 10 1
262657 DENDENA E CIA LTDA ME BR 4 0 0 1
262749 Andries & Cia Ltda BR 1 3 3 0
262810 C. R. BARDI & CIA LTDA – ME BR 3 0 0 0
262812 K.H.D. SILVESTRI E CIA LTDA BR 10 0 1 49
262831 N G B Pires & CIA LTDA BR 4 0 4 0
262871 R.D.S. Bortoluzzi & Cia Ltda – ME BR 3 0 0 0
262958 CARRARO, HAINOSZ & CIA LTDA – ME BR 12 1 1 1
263002 RAFAEL ORSSATTO & CIA LTDA BR 14 0 0 3
263018 Zapelini & Cia. Ltda. BR 11 3 3 0
263037 ISMAEL STROHER & CIA. LTDA. – ME BR 8 0 0 0
263060 Atílio Marcos Marcari e Cia Ltda Me BR 1 0 21 1
263066 RVNet – R V PORTELA AGUIAR & CIA LTDA BR 14 0 2 1
263293 CODERP-CIA DESENVOLVIMENTO ECONOMICO DE RIBEIRAO BR 2 1 8 0
263419 Edilso Fuchter & Cia Ltda BR 1 0 1 0
263442 GIALES FISCHER GRUTZMANN & CIA LTDA BR 19 0 0 3
263451 Geovane Matheus Rossetto & Cia Ltda BR 4 0 0 0
263475 Breno Vilela Santana e Cia. Ltda. BR 3 1 0 0

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
???????????????????????????????
a:mail2b.cia.gov
Are you looking for IPv4 address 198.81.129.148?
Are you looking for domain cia.gov?
@@@@@@@@@@@@@@@@@@
??????????????????????????????
mx:cia.gov
This domain is hosted by Akamai Technologies, Inc. (AS16625). The first DNS server is a22-66.akam.net. The current IPv4 address is 23.66.188.82. The mail server with the highest priority is mail1.cia.gov.
=spf1 mx a:mail1a.cia.gov a:mail1b.cia.gov a:mail2a.cia.gov a:mail2b.cia.gov mx:cia.gov mx:ucia.gov ~a
r (NS records) a22-66.akam.net (23.211.61.66)
a16-67.akam.net (23.211.132.67)
a12-65.akam.net (184.26.160.65)
a13-65.akam.net (2.22.230.65)
a3-64.akam.net (96.7.49.64)
a1-22.akam.net (193.108.91.22)
Mail server (MX records) mail1.cia.gov (198.81.129.68)
mail2.cia.gov (198.81.129.148)
IP address (IPv4) 23.66.188.82
IP address (IPv6) 2001:418:1433:197::184d
2001:418:1433:1a8::184d
ASN number 16625
ASN name (ISP) Akamai Technologies, Inc.
IP-range/subnet 23.66.176.0/20
23.66.176.0 – 23.66.191.255
DOTGOV WHOIS Server ready
Domain Name: CIA.GOV
Status: ACTIVE

@@@@@@@@@@@@@@
mx:ucia.gov ~a
The first DNS server is a1-22.akam.net. The mail server with the highest priority is mail1.cia.gov.
=spf1 mx a:mail1a.cia.gov a:mail1b.cia.gov a:mail2a.cia.gov a:mail2b.cia.gov mx:cia.gov mx:ucia.gov ~al
DNS server (NS records) a1-22.akam.net (193.108.91.22)
a16-67.akam.net (23.211.132.67)
a13-65.akam.net (2.22.230.65)
a22-66.akam.net (23.211.61.66)
a3-64.akam.net (96.7.49.64)
a12-65.akam.net (184.26.160.65)
Mail server (MX records) mail1.cia.gov (198.81.129.68)
mail2.cia.gov (198.81.129.148)
IP address (IPv4)
IP address (IPv6)
ASN number not available
% DOTGOV WHOIS Server ready
Domain Name: UCIA.GOV
Status: ACTIVE

@@@@
DNS server (NS records) a1-22.akam.net (193.108.91.22)
a16-67.akam.net (23.211.132.67)
a13-65.akam.net (2.22.230.65)
a22-66.akam.net (23.211.61.66)
a3-64.akam.net (96.7.49.64)
a12-65.akam.net (184.26.160.65)
Mail server (MX records) mail1.cia.gov (198.81.129.68)
mail2.cia.gov (198.81.129.148)
IP address (IPv4)
IP address (IPv6)
ASN number not available
% DOTGOV WHOIS Server ready
Domain Name: UCIA.GOV
Status: ACTIVE
Wheelock, David

IP: 198.81.129.193 Hostname:
IP address 198.81.129.193
Location Great Falls, Virginia, United States
IP address 198.81.129.193
Reverse DNS (PTR record) relay201.net.cia.gov
DNS server (NS record) a22-66.akam.net (23.211.61.66)
a16-67.akam.net (23.211.132.67)
a13-65.akam.net (2.22.230.65)
a1-22.akam.net (193.108.91.22)
a3-64.akam.net.81.198.in-addr.arpa ()
a12-65.akam.net (184.26.160.65)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
@@@@@@@@@@
Domains around 198.81.129.193
IP address #domains
198.81.129.100 2
IP address 198.81.129.100
Location Great Falls, Virginia, United States
address 198.81.129.100
Reverse DNS (PTR record) cia.cia.gov
DNS server (NS record) auth101.ns.uu.net (198.6.1.210)
auth51.ns.uu.net (198.6.1.162)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
Domains on 198.81.129.100
Domain Tools
odci.gov
dragonraiser.com
NetRange: 198.81.128.0 – 198.81.191.255
CIDR: 198.81.128.0/18
NetName: OIT-BLK1
NetHandle: NET-198-81-128-0-1
Parent: BLK198-15-ANS (NET-198-80-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Central Intelligence Agency (CIA-1)
RegDate: 1997-02-11
Updated: 1998-03-30
Ref: https://whois.arin.net/rest/net/NET-198-81-128-0-1

OrgName: Central Intelligence Agency
OrgId: CIA-1
Address: GCS, ND1
City: Washington
StateProv: DC
PostalCode: 20505
Country: US
RegDate: 1992-07-21
Updated: 2011-09-24
Ref: https://whois.arin.net/rest/org/CIA-1

OrgTechHandle: DW1276-ARIN
OrgTechName: Wheelock, David
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/DW1276-ARIN

OrgAbuseHandle: DW1276-ARIN
OrgAbuseName: Wheelock, David
OrgAbusePhone: removed phone number
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/DW1276-ARIN

RTechHandle: ANM3-ORG-ARIN
RTechName: Central Intelligence Agency
RTechPhone: removed phone number
RTechEmail: removed email address
RTechRef: https://whois.arin.net/rest/poc/ANM3-ORG-ARIN
NetRange: 198.80.0.0 – 198.81.255.255
CIDR: 198.80.0.0/15
NetName: BLK198-15-ANS
NetHandle: NET-198-80-0-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ANS Communications, Inc (ANS)
RegDate: 1993-03-26
Updated: 2002-10-10
Ref: https://whois.arin.net/rest/net/NET-198-80-0-0-1

OrgName: ANS Communications, Inc
OrgId: ANS
Address: 22001 Loudoun County Parkway
City: Ashburn
StateProv: VA
PostalCode: 20147
Country: US
RegDate: 1991-07-11
Updated: 2009-12-07
Ref: https://whois.arin.net/rest/org/ANS

OrgTechHandle: SWIPP-ARIN
OrgTechName: swipper
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/SWIPP-ARIN

OrgNOCHandle: OA12-ARIN
OrgNOCName: UUnet Technologies, Inc., Technologies
OrgNOCPhone: removed phone number
OrgNOCEmail: removed email address
OrgNOCRef: https://whois.arin.net/rest/poc/OA12-ARIN

OrgAbuseHandle: ABUSE3-ARIN
OrgAbuseName: abuse

Domains around 198.81.129.193
198.81.129.107 3
Mail servers on 198.81.129.193
No mail servers found.
Name servers on 198.81.129.193
P address 198.81.129.107
Location Great Falls, Virginia, United States
IP address 198.81.129.107
Reverse DNS (PTR record) not available
DNS server (NS record) a22-66.akam.net (23.211.61.66)
a13-65.akam.net (2.22.230.65)
a12-65.akam.net (184.26.160.65)
a1-22.akam.net (193.108.91.22)
a3-64.akam.net.81.198.in-addr.arpa ()
a16-67.akam.net (23.211.132.67)
ASN number 7046
ASN name (ISP) MCI Communications Services, Inc. d/b/a Verizon Business
IP-range/subnet 198.81.128.0/18
198.81.128.0 – 198.81.191.255
ploenk.net
rescengito.com
hacknshare.org

NetRange: 198.81.128.0 – 198.81.191.255
CIDR: 198.81.128.0/18
NetRange: 198.80.0.0 – 198.81.255.255
CIDR: 198.80.0.0/15
NetName: BLK198-15-ANS

@@@@@@@@@@@@@
Overview of name servers hosted on this IP address. You can use the NS Neighbors tool to find domains using a name server.
Name server Tools
relay1.ucia.gov
Are you looking for IPv4 address 198.81.129.193?

Are you looking for domain ucia.gov?
The first DNS server is a1-22.akam.net. The mail server with the highest priority is mail1.cia.gov.
2a.cia.gov a:mail2b.cia.gov mx:cia.gov mx:ucia.gov ~
DNS server (NS records) a1-22.akam.net (193.108.91.22)
a16-67.akam.net (23.211.132.67)
a13-65.akam.net (2.22.230.65)
a22-66.akam.net (23.211.61.66)
a3-64.akam.net (96.7.49.64)
a12-65.akam.net (184.26.160.65)
Mail server (MX records) mail1.cia.gov (198.81.129.68)
mail2.cia.gov (198.81.129.148)
IP address (IPv4)
IP address (IPv6)
ASN number not available
% DOTGOV WHOIS Server ready
Domain Name: UCIA.GOV
Status: ACTIVE

Domain IPv4 address Ranking Alexa Pagerank
ucia.ca 50.63.202.52
ucia.cn 47.89.58.32
ucia.co.uk 94.136.40.51
ucia.com 66.39.102.85
ucia.com.cn
ucia.de 94.102.212.171
ucia.eu
ucia.fr
ucia.gov -1
ucia.net 184.168.221.104
ucia.online 67.212.237.138
ucia.or.jp 153.122.128.175 3
ucia.org
ucia.pro 45.32.196.42
ucia.ru 185.26.122.63
ucia.space 60.205.27.19
ucia-anduze.com 195.154.21.69
ucia-arkansas.com 50.62.237.1 2
ucia-beaugency.fr 213.186.33.2
ucia-bletterans.com 94.23.18.187
ucia-chaumont.fr 178.237.108.116 3
ucia-deauville.fr 212.227.247.137
ucia-deauville.org 212.227.247.137
ucia-falaise.com 23.236.62.147
ucia-falaise.fr
ucia-jargeau.com 164.132.235.17
ucia-laloupe.fr 5.196.3.65
ucia-langres.fr 178.237.108.116
ucia-marnay70.com 213.186.33.4
ucia-matour.com 213.186.33.3
ucia-nj.org 66.147.244.99
ucia-saint-mihiel.fr 213.186.33.3
ucia-sezanne.com 217.70.184.38
ucia-st-germaindubois.fr 213.186.33.5
ucia-stgenislesollieres.com
ucia-villers-bocage.fr 51.254.103.88
ucia-vouziers.fr 196.196.25.12
ucia3p.fr 216.239.34.21
ucia5.com 98.126.19.202
ucia8s6.us
uciaa.fr 178.237.108.116
uciaas.cn 103.26.3.164
uciaas.com 211.155.88.249 -1
uciaas.com.cn 103.26.3.164
uciab.fr 195.154.21.77
uciabarleduc.com 52.210.8.34
uciabc.com 212.98.178.204
uciabourbonlancy.fr 40.115.55.251
uciabrou.com 212.129.44.233
uciac.com 54.174.212.152
IPv4 routes
Startip Endip Description Country #domains #spamhosts
146.129.0.0 146.129.255.255 King County Gov US 114 0
198.49.222.0 198.49.222.255 King County Gov US 0 0
200.198.0.0 200.198.63.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 279 0
12.166.216.0 12.166.223.255 LAFAYETTE CITY-PARISH CON. GOV. US 26 0
146.129.0.0 146.129.127.255 King County Gov US 0 0
146.129.0.0 146.129.63.255 King County Gov US 0 0
146.129.64.0 146.129.127.255 King County Gov US 0 0
146.129.128.0 146.129.191.255 King County Gov US 0 0
146.129.192.0 146.129.223.255 King County Gov US 0 0
146.129.224.0 146.129.239.255 King County Gov US 0 0
146.129.240.0 146.129.240.255 King County Gov US 70 0
146.129.249.0 146.129.249.255 King County Gov US 4 0
146.129.250.0 146.129.250.255 King County Gov US 1 0
188.94.170.0 188.94.170.255 OJSC Megafon, Urals dep., PA leased to informatisation department of Tumen region gov RU 0 0
194.226.16.0 194.226.16.255 GOV-CERT RU 4 0
198.94.156.0 198.94.156.255 Assc. of Bay Area Gov. (ABAG) US 1 0
198.94.157.0 198.94.157.255 Assc. of Bay Area Gov. (ABAG) US 0 0
198.94.158.0 198.94.158.255 Assc. of Bay Area Gov. (ABAG) US 0 0
200.198.16.0 200.198.16.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.58.0 200.198.58.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.60.0 200.198.60.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.61.0 200.198.61.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:f1:: 2001:df0:f1:ffff:ffff:ffff:ffff:ffff AEC-GOV-AU AU 0 0
2804:bd0:: 2804:bd0:ffff:ffff:ffff:ffff:ffff:ffff Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
2544 King County Gov US 12 0 114 0
8867 E-Gov – Tehila Project – Prime Minister Office’s IL 28 0 213 0

@@@@@@@@@@@@@@@@@@
relay201.net.cia.gov
Are you looking for IPv4 address 198.81.129.193?
Are you looking for domain cia.gov?
The first DNS server is a22-66.akam.net. The current IPv4 address is 23.66.188.82. The mail server with the highest priority is mail1.cia.gov.
DNS server (NS records) a22-66.akam.net (23.211.61.66)
a16-67.akam.net (23.211.132.67)
a12-65.akam.net (184.26.160.65)
a13-65.akam.net (2.22.230.65)
a3-64.akam.net (96.7.49.64)
a1-22.akam.net (193.108.91.22)
Mail server (MX records) mail1.cia.gov (198.81.129.68)
mail2.cia.gov (198.81.129.148)
IP address (IPv4) 23.66.188.82
IP address (IPv6) 2001:418:1433:197::184d
2001:418:1433:1a8::184d
ASN number 16625
ASN name (ISP) Akamai Technologies, Inc.
IP-range/subnet 23.66.176.0/20
23.66.176.0 – 23.66.191.255
% DOTGOV WHOIS Server ready
Domain Name: CIA.GOV
Status: ACTIVE

Domain IPv4 address Ranking Alexa Pagerank
cia.ac.uk 195.195.187.14
cia.academy 192.64.147.234
cia.accountants 162.255.119.207
cia.ae 69.172.201.153
cia.aero
cia.africa 199.73.55.48
cia.agency 89.31.143.1
cia.airline.aero
cia.airport.aero
cia.al
cia.as 51.174.95.49 0
cia.asia 69.64.147.34
cia.asso.fr 91.121.63.21
cia.at 188.118.210.140
cia.auction
cia.audio
cia.az 204.93.177.100 -1
cia.be 62.182.63.148 -1
cia.berlin 178.254.0.121 -1
cia.bg 217.174.156.100 1
cia.biz 98.124.199.113 -1
cia.blue 69.172.201.153
cia.bo 132.148.100.118
cia.business 50.63.202.57 -1
cia.buzz 184.168.221.75
cia.bz 157.7.188.104 1
cia.ca 54.246.98.46 5
cia.camp 50.63.202.61 -1
cia.care 64.68.200.44
cia.careers
cia.cc 203.78.142.12
cia.ch 5
cia.chat 50.63.202.25
cia.cl 72.52.4.122
cia.club
cia.cn 49.51.8.200
cia.co.at 81.223.238.250
cia.co.id
cia.co.il 104.45.14.249 1
cia.co.in 72.52.4.122
cia.co.jp 150.60.154.214
cia.co.kr 218.38.12.231
cia.co.nz 210.48.69.34
cia.co.uk
cia.co.za 41.204.202.40
cia.cologne 85.13.154.240
cia.com 54.208.9.165 845,198 3
cia.com.au 210.8.91.43 4
cia.com.br
cia.com.cn 114.215.175.181
IPv4 routes
Startip Endip Description Country #domains #spamhosts
146.129.0.0 146.129.255.255 King County Gov US 114 0
198.49.222.0 198.49.222.255 King County Gov US 0 0
200.198.0.0 200.198.63.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 279 0
12.166.216.0 12.166.223.255 LAFAYETTE CITY-PARISH CON. GOV. US 26 0
146.129.0.0 146.129.127.255 King County Gov US 0 0
146.129.0.0 146.129.63.255 King County Gov US 0 0
146.129.64.0 146.129.127.255 King County Gov US 0 0
146.129.128.0 146.129.191.255 King County Gov US 0 0
146.129.192.0 146.129.223.255 King County Gov US 0 0
146.129.224.0 146.129.239.255 King County Gov US 0 0
146.129.240.0 146.129.240.255 King County Gov US 70 0
146.129.249.0 146.129.249.255 King County Gov US 4 0
146.129.250.0 146.129.250.255 King County Gov US 1 0
188.94.170.0 188.94.170.255 OJSC Megafon, Urals dep., PA leased to informatisation department of Tumen region gov RU 0 0
194.226.16.0 194.226.16.255 GOV-CERT RU 4 0
198.94.156.0 198.94.156.255 Assc. of Bay Area Gov. (ABAG) US 1 0
198.94.157.0 198.94.157.255 Assc. of Bay Area Gov. (ABAG) US 0 0
198.94.158.0 198.94.158.255 Assc. of Bay Area Gov. (ABAG) US 0 0
200.198.16.0 200.198.16.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.58.0 200.198.58.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.60.0 200.198.60.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
200.198.61.0 200.198.61.255 Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
45.4.52.0 45.4.55.255 EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
131.0.208.0 131.0.211.255 Duarte Aragon & Cia Ltda BR 0 1
131.72.248.0 131.72.251.255 Antônio Vasconcelos e Cia Ltda BR 0 0
131.161.4.0 131.161.7.255 CIA Itabirana de Informática – VALENET BR 0 0
131.161.96.0 131.161.99.255 Porto Seguro Cia de Seguros BR 0 0
138.0.220.0 138.0.223.255 Porto Seguro Cia de Seguros BR 3 0
138.94.228.0 138.94.231.255 Antônio Vasconcelos e Cia Ltda BR 0 0
138.186.52.0 138.186.55.255 Rogerio Batista Dos Santos E Cia LTDA ME BR 4 1
143.137.104.0 143.137.107.255 Porto Seguro Cia de Seguros BR 0 0
143.208.172.0 143.208.175.255 Adilson Vanderlei dos Santos Alves e Cia BR 1 3
143.208.208.0 143.208.211.255 José Carlos Roque Oliveira & Cia Ltda BR 0 0
167.250.216.0 167.250.219.255 M DANTAS & CIA LTDA ME BR 0 0
168.194.84.0 168.194.87.255 jose nilton de freitas e cia ltda BR 0 0
168.227.8.0 168.227.11.255 CIA Itabirana de Informática – VALENET BR 0 0
170.80.6.0 170.80.7.255 Cia Brasileira de Metalurgia e Mineração BR 0 0
170.233.8.0 170.233.11.255 Antônio Vasconcelos e Cia Ltda BR 0 0
170.233.52.0 170.233.55.255 RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
170.239.40.0 170.239.43.255 M DANTAS & CIA LTDA ME BR 0 0
170.239.192.0 170.239.195.255 CIA Itabirana de Informática – VALENET BR 0 0
170.246.4.0 170.246.7.255 Antônio Vasconcelos e Cia Ltda BR 0 0
177.11.56.0 177.11.59.255 R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
177.20.0.0 177.20.127.255 Prodasal Cia Proc de Dados do Salvador BR 14 0
177.38.152.0 177.38.159.255 Antônio Vasconcelos e Cia Ltda BR 11 0
177.86.120.0 177.86.123.255 Cancelier, Granemann e Cia Ltda BR 2 1
177.91.144.0 177.91.159.255 GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 3
177.125.112.0 177.125.119.255 José Carlos Roque Oliveira & Cia Ltda BR 8 1
177.152.112.0 177.152.119.255 Duarte Aragon & Cia Ltda BR 1 0
177.152.160.0 177.152.175.255 CIA Itabirana de Informática – VALENET BR 0 3
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:f1:: 2001:df0:f1:ffff:ffff:ffff:ffff:ffff AEC-GOV-AU AU 0 0
2804:bd0:: 2804:bd0:ffff:ffff:ffff:ffff:ffff:ffff Prodemge Ger. Rede – Dominios MG.GOV.BR BR 0 0
2801:80:130:: 2801:80:130:ffff:ffff:ffff:ffff:ffff Prodasal Cia Proc de Dados do Salvador BR 0 0
2801:80:b00:: 2801:80:b00:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2801:80:1b30:: 2801:80:1b30:ffff:ffff:ffff:ffff:ffff Cia Brasileira de Metalurgia e Mineração BR 0 0
2804:5c:: 2804:5c:ffff:ffff:ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
2804:344:: 2804:344:ffff:ffff:ffff:ffff:ffff:ffff R.D.S. Bortoluzzi & Cia Ltda – ME BR 0 0
2804:830:: 2804:830:ffff:ffff:ffff:ffff:ffff:ffff Cancelier, Granemann e Cia Ltda BR 0 0
2804:a14:: 2804:a14:ffff:ffff:ffff:ffff:ffff:ffff José Carlos Roque Oliveira & Cia Ltda BR 0 0
2804:b34:: 2804:b34:ffff:ffff:ffff:ffff:ffff:ffff Antônio Vasconcelos e Cia Ltda BR 0 0
2804:e28:: 2804:e28:ffff:ffff:ffff:ffff:ffff:ffff RODRIGO JOSE MARASCA & CIA LTDA – ME BR 0 0
2804:e7c:: 2804:e7c:ffff:ffff:ffff:ffff:ffff:ffff Joniel Carraro & Cia Ltda BR 0 0
2804:11d4:: 2804:11d4:ffff:ffff:ffff:ffff:ffff:ffff GIALES FISCHER GRUTZMANN & CIA LTDA BR 0 0
2804:1ad4:: 2804:1ad4:ffff:ffff:ffff:ffff:ffff:ffff Duarte Aragon & Cia Ltda BR 0 0
2804:2188:: 2804:2188:ffff:ffff:ffff:ffff:ffff:ffff Porto Seguro Cia de Seguros BR 0 0
2804:26c8:: 2804:26c8:ffff:ffff:ffff:ffff:ffff:ffff Rogerio Batista Dos Santos E Cia LTDA ME BR 0 0
2804:2ab0:: 2804:2ab0:ffff:ffff:ffff:ffff:ffff:ffff Adilson Vanderlei dos Santos Alves e Cia BR 0 0
2804:2c84:: 2804:2c84:ffff:ffff:ffff:ffff:ffff:ffff M DANTAS & CIA LTDA ME BR 0 0
2804:3348:: 2804:3348:ffff:ffff:ffff:ffff:ffff:ffff jose nilton de freitas e cia ltda BR 0 0
2804:39a0:: 2804:39a0:ffff:ffff:ffff:ffff:ffff:ffff EBER DEJANI PEREIRA DE ALBERNAZ CIA LTDA BR 0 0
2804:5c:1000:: 2804:5c:1000::ffff:ffff:ffff:ffff CIA Itabirana de Informática – VALENET BR 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 13 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
2544 King County Gov US 12 0 114 0
8867 E-Gov – Tehila Project – Prime Minister Office’s IL 28 0 213 0
7465 PROCERGS – Cia de Processamento de Dados do RGS BR 21 0 721 1
10412 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 1 1 44 1
19723 CIA. DE TECNOL. DA INFOR. E COMUNICAÇÃO DO PARANÁ BR 7 0 446 0
25832 Cia. de Processamento de Dados do Estado da Bahia BR 1 0 239 1
26606 Cia de Proc. de Dado do Município de Porto Alegre BR 23 1 294 0
28280 A. P. OLIVEIRA & CIA. INFORMATICA LTDA. BR 37 1 31 2
28637 Cia Proc. de Dados do Estado de S Paulo – Prodesp BR 21 1 448 3
52517 EVERTON HAISE TAQUES & CIA LTDA BR 3 0 19 0
52547 Rodrigo José Marasca e Cia Ltda BR 24 1 0 1
52587 João M. S. de Almeida junior & Cia ltda BR 1 0 2 2
52591 S. C. Terres e Cia Ltda BR 5 1 2 0
52607 Irmãos Giotto Oliveira & Cia.Ltda. BR 7 0 9 0
52652 BENCHIMOL IRMAO & CIA LTDA BR 3 0 0 0
52653 Marlon L. Larger & Cia Ltda BR 13 1 1 0
52843 Magnos A. Both e Cia Ltda BR 9 0 1 0
52865 R. Jose da Silva e Cia Ltda – OndaÁgil BR 9 1 1 0
52910 A. Angeloni & Cia Ltda BR 1 0 7 0
53096 Faviero, Duarte e CIA LTDA BR 1 1 3 0
53168 CIA ESTADUAL DE GERAÇÃO E TRANSMISSÃO DE ENERGIA E BR 3 0 3 0
53227 M.V. Martin & Cia Ltda. BR 4 0 0 1
61506 Insacom y Cia. Limitada CL 1 0 81 0
61794 DONATO JUNIOR E CIA LTDA BR 7 0 0 3
61833 P. R. LIMA & CIA LTDA BR 1 1 1 0
61938 Damaris Figueredo Antunes e Cia Ltda BR 3 0 0 0
262223 Nettplus – Necusoft Cia. Ltda. EC 2 0 3 18
262282 MARIA LUCIANA MACHADO E CIA LTDA-ME BR 5 1 2 3
262342 JOSE CARLOS ROQUE OLIVEIRA & CIA LTDA BR 8 1 8 2
262362 B. D. MATOS & CIA LTDA – SINET INTERNET BR 9 1 4 1
262417 Gustavo Zanatta e Cia Ltda BR 31 1 4 5
262573 GILMAR DOS SANTOS & CIA. LTDA. BR 6 0 8 0
262619 Thielke & Cia Ltda. BR 18 1 10 1
262657 DENDENA E CIA LTDA ME BR 4 0 0 1
262749 Andries & Cia Ltda BR 1 3 3 0
262810 C. R. BARDI & CIA LTDA – ME BR 3 0 0 0
262812 K.H.D. SILVESTRI E CIA LTDA BR 10 0 1 49
262831 N G B Pires & CIA LTDA BR 4 0 4 0
262871 R.D.S. Bortoluzzi & Cia Ltda – ME BR 3 0 0 0
262958 CARRARO, HAINOSZ & CIA LTDA – ME BR 12 1 1 1
263002 RAFAEL ORSSATTO & CIA LTDA BR 14 0 0 3
263018 Zapelini & Cia. Ltda. BR 11 3 3 0
263037 ISMAEL STROHER & CIA. LTDA. – ME BR 8 0 0 0
263060 Atílio Marcos Marcari e Cia Ltda Me BR 1 0 21 1
263066 RVNet – R V PORTELA AGUIAR & CIA LTDA BR 14 0 2 1
263293 CODERP-CIA DESENVOLVIMENTO ECONOMICO DE RIBEIRAO BR 2 1 8 0
263419 Edilso Fuchter & Cia Ltda BR 1 0 1 0
263442 GIALES FISCHER GRUTZMANN & CIA LTDA BR 19 0 0 3
263451 Geovane Matheus Rossetto & Cia Ltda BR 4 0 0 0
263475 Breno Vilela Santana e Cia. Ltda. BR 3 1 0 0

@@@@@@@@@@@@
NetRange: 198.81.128.0 – 198.81.191.255
CIDR: 198.81.128.0/18
NetName: OIT-BLK1
NetHandle: NET-198-81-128-0-1
Parent: BLK198-15-ANS (NET-198-80-0-0-1)
NetType: Reassigned
OriginAS:
Organization: Central Intelligence Agency (CIA-1)
RegDate: 1997-02-11
Updated: 1998-03-30
Ref: https://whois.arin.net/rest/net/NET-198-81-128-0-1

OrgName: Central Intelligence Agency
OrgId: CIA-1
Address: GCS, ND1
City: Washington
StateProv: DC
PostalCode: 20505
Country: US
RegDate: 1992-07-21
Updated: 2011-09-24
Ref: https://whois.arin.net/rest/org/CIA-1

OrgTechHandle: DW1276-ARIN
OrgTechName: Wheelock, David
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/DW1276-ARIN

OrgAbuseHandle: DW1276-ARIN
OrgAbuseName: Wheelock, David
OrgAbusePhone: removed phone number
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/DW1276-ARIN

RTechHandle: ANM3-ORG-ARIN
RTechName: Central Intelligence Agency
RTechPhone: removed phone number
RTechEmail: removed email address
RTechRef: https://whois.arin.net/rest/poc/ANM3-ORG-ARIN
703-613-9840
NetRange: 198.80.0.0 – 198.81.255.255
CIDR: 198.80.0.0/15
NetName: BLK198-15-ANS
NetHandle: NET-198-80-0-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: ANS Communications, Inc (ANS)
RegDate: 1993-03-26
Updated: 2002-10-10
Ref: https://whois.arin.net/rest/net/NET-198-80-0-0-1

OrgName: ANS Communications, Inc
OrgId: ANS
Address: 22001 Loudoun County Parkway
City: Ashburn
StateProv: VA
PostalCode: 20147
Country: US
RegDate: 1991-07-11
Updated: 2009-12-07
Ref: https://whois.arin.net/rest/org/ANS

OrgTechHandle: SWIPP-ARIN
OrgTechName: swipper
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/SWIPP-ARIN

OrgNOCHandle: OA12-ARIN
OrgNOCName: UUnet Technologies, Inc., Technologies
OrgNOCPhone: removed phone number
OrgNOCEmail: removed email address
OrgNOCRef: https://whois.arin.net/rest/poc/OA12-ARIN

OrgAbuseHandle: ABUSE3-ARIN
OrgAbuseName: abuse
OrgAbusePhone: removed phone number
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE3-ARIN

RTechHandle: AH-ORG-ARIN
RTechName: UUNET Technologies Inc
RTechPhone: removed phone number
RTechEmail: removed email address
RTechRef: https://whois.arin.net/rest/poc/AH-ORG-ARIN
verizpnbusiness.com
@@@@@@@
ans.net
This domain is hosted by unknown (AS1663).
The first DNS server is auth101.ns.uu.net.
The current IPv4 address is 147.225.22.28.
The mail server with the highest priority is ansrelay.uu.net.
DNS server (NS records) auth101.ns.uu.net (198.6.1.210)
auth51.ns.uu.net (198.6.1.162)
Mail server (MX records) ansrelay.uu.net (198.5.241.45)
IP address (IPv4) 147.225.22.28
IP address (IPv6)
ASN number 1663
ASN name (ISP) unknown
IP-range/subnet 147.225.16.0/21
147.225.16.0 – 147.225.23.255
Domain Name: ans.net
Registry Domain ID: 1926312_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2017-08-25T02:25:58-0700
Creation Date: 1990-09-26T21:00:00-0700
Registrar Registration Expiration Date: 2019-09-25T00:00:00-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: clientUpdateProhibited (https://www.icann.org/epp#clientUpdateProhibited)
Domain Status: clientTransferProhibited (https://www.icann.org/epp#clientTransferProhibited)
Domain Status: clientDeleteProhibited (https://www.icann.org/epp#clientDeleteProhibited)
Registry Registrant ID:
Registrant Name: Verizon Business Global LLC
Registrant Organization: Verizon Business Global LLC
Registrant Street: One Verizon Way
Registrant City: Basking Ridge
Registrant State/Province: NJ
Registrant Postal Code: 07920
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Domain Administrator
Admin Organization: Verizon Trademark Services LLC
Admin Street: 1320 North Court House Road
Admin City: Arlington
Admin State/Province: VA
Admin Postal Code: 22201
Admin Country: US
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: Domain Technician
Tech Organization: Verizon
Tech Street: 1320 North Court House Road
Tech City: Arlington
Tech State/Province: VA
Tech Postal Code: 22201
Tech Country: US
Tech Phone: removed phone number
Tech Phone Ext:
Tech Fax: removed phone number
Tech Fax Ext:
Tech Email: removed email address
Name Server: auth101.ns.uu.net
Name Server: auth51.ns.uu.net
DNSSEC: unsigned

https://opkloud. com
This domain is hosted by SingleHop, Inc. (AS32475). The first DNS server is ns70.domaincontrol.com. The current IPv4 address is 146.66.96.170. The mail server with the highest priority is aspmx.l.google.com.
DNS server (NS records) ns70.domaincontrol.com (208.109.255.45)
ns69.domaincontrol.com (216.69.185.45)
Mail server (MX records) aspmx.l.google.com (74.125.133.27)
alt1.aspmx.l.google.com (209.85.233.26)
alt2.aspmx.l.google.com (74.125.130.26)
aspmx2.googlemail.com (74.125.205.26)
aspmx3.googlemail.com (74.125.24.26)
IP address (IPv4) 146.66.96.170
IP address (IPv6)
ASN number 32475
ASN name (ISP) SingleHop, Inc.
IP-range/subnet 146.66.96.0/24
146.66.96.0 – 146.66.96.255

Are you looking for IPv4 address 146.66.96.170?
IP address 146.66.96.170
Location Bulgaria (BG
IP address 146.66.96.170
Reverse DNS (PTR record) ip-146-66-96-170.siteground.com
DNS server (NS record) ns1.clev1.net (181.224.128.6)
ns2.clev1.net (198.20.77.76)
ASN number 32475
ASN name (ISP) SingleHop, Inc.
IP-range/subnet 146.66.96.0/24
146.66.96.0 – 146.66.96.255
Domains on 146.66.96.170
Domain Tools
stawok.com
opkloud.com
rashadmoore.com
greenbadgerjobs.com
Domains around 146.66.96.170
IP address #domains
146.66.96.4 3
146.66.96.5 1
146.66.96.6 3
146.66.96.8 5
146.66.96.9 1
146.66.96.10 3
146.66.96.11 1
146.66.96.12 1
146.66.96.13 5
146.66.96.14 6
146.66.96.15 1
146.66.96.16 1
146.66.96.18 1
146.66.96.19 1
146.66.96.21 1
146.66.96.22 1
146.66.96.23 8
146.66.96.25 2
146.66.96.27 1
146.66.96.28 1
146.66.96.29 2
146.66.96.30 1
146.66.96.36 1
146.66.96.39 1
146.66.96.40 1
146.66.96.41 5
146.66.96.42 5
146.66.96.47 1
146.66.96.49 6
146.66.96.50 1
146.66.96.52 1
146.66.96.53 1
146.66.96.54 1
146.66.96.55 1
146.66.96.56 10
146.66.96.58 2
146.66.96.59 1
146.66.96.60 1
146.66.96.62 1
146.66.96.63 2
146.66.96.64 1
146.66.96.65 1
146.66.96.66 1
146.66.96.67 14
146.66.96.68 1
146.66.96.69 1
146.66.96.70 5
146.66.96.71 63
146.66.96.72 1
146.66.96.73 1
146.66.96.74 1
146.66.96.75 1
146.66.96.77 1
146.66.96.78 1
146.66.96.79 1
146.66.96.81 1
146.66.96.82 1
146.66.96.83 1
146.66.96.85 1
146.66.96.86 1
146.66.96.87 2
146.66.96.89 1
146.66.96.90 1
146.66.96.91 29
146.66.96.93 1
146.66.96.94 1
146.66.96.95 1
146.66.96.96 5
146.66.96.97 1
146.66.96.102 1
146.66.96.103 1
146.66.96.104 2
146.66.96.105 1
146.66.96.106 1
146.66.96.107 1
146.66.96.108 1
146.66.96.110 1
146.66.96.112 1
146.66.96.113 2
146.66.96.115 2
146.66.96.116 2
146.66.96.117 1
146.66.96.118 1
146.66.96.119 1
146.66.96.120 1
146.66.96.121 1
146.66.96.122 1
146.66.96.123 1
146.66.96.126 1
146.66.96.129 1
146.66.96.130 1
146.66.96.131 8
146.66.96.132 2
146.66.96.133 1
146.66.96.134 1
146.66.96.136 1
146.66.96.137 1
146.66.96.138 1
146.66.96.139 1
146.66.96.140 1
inetnum: 146.66.96.0 – 146.66.96.255
netname: SG-GETCLOUDER-CHI3
descr: SiteGround Chicago
country: US
admin-c: MDM-SG
tech-c: MDM-SG
status: ASSIGNED PA
language: EN
geoloc: 41.86956082699458 -87.62695312
mnt-by: YANI-SG
mnt-by: MDM-SG
created: 2017-10-02T13:32:26Z
last-modified: 2017-10-02T13:32:26Z
source: RIPE
mnt-domains: MDM-SG
mnt-domains: YANI-SG

person: Marian Marinov
address: Racho Petkov Kazandjiata 8, Floor 3, SiteGround
phone: removed phone number
nic-hdl: MDM-SG
mnt-by: MDM-SG
created: 2014-04-29T15:50:14Z
last-modified: 2017-10-30T22:34:57Z
source: RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.90 (WAGYU)

siteground.com
This domain is hosted by SingleHop, Inc. (AS32475). The first DNS server is ns1.sgsrv1.com. The current IPv4 address is 181.224.128.30. The mail server with the highest priority is mx10.mailspamprotection.com.

v=spf1 include:_spf.siteground.com include:mail.registrar.eu ~al

NS server (NS records) ns1.sgsrv1.com (181.224.128.50)
ns1.clev1.net (181.224.128.6)
Mail server (MX records) mx10.mailspamprotection.com (107.6.149.10)
mx20.mailspamprotection.com (69.175.69.91)
mx30.mailspamprotection.com (96.127.176.252)
IP address (IPv4) 181.224.128.30
181.224.128.31
IP address (IPv6)
ASN number 32475
ASN name (ISP) SingleHop, Inc.
IP-range/subnet 181.224.128.0/24
181.224.128.0 – 181.224.128.255
Domain Name: SITEGROUND.COM
Domain ID: 114783038_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.tucows.com
Registrar URL: http://tucowsdomains.com
Updated Date: 2017-01-16T09:44:41Z
Creation Date: 2004-03-22T11:29:36Z
Registrar Registration Expiration Date: 2026-03-22T10:29:36Z
Registrar: TUCOWS, INC.
Registrar IANA ID: 69
Reseller: removed email address
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registry Registrant ID:
Registrant Name: Irina Zaharieva
Registrant Organization: IT Web Capital Ltd.
Registrant Street: 3rd Floor, 11-12 St James’s Square
Registrant City: London
Registrant State/Province: London
Registrant Postal Code: SW1Y 4LB
Registrant Country: GB
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Irina Zaharieva
Admin Organization: IT Web Capital Ltd.
Admin Street: 3rd Floor, 11-12 St James’s Square
Admin City: London
Admin State/Province: London
Admin Postal Code: SW1Y 4LB
Admin Country: GB
Admin Phone: removed phone number

Are you looking for domain opkloud.com?
Domain Name: OPKLOUD.COM
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Rashad Moore
Name Server: NS69.DOMAINCONTROL.COM
Name Server: NS70.DOMAINCONTROL.COM
DNSSEC: unsigned

Domain IPv4 address Ranking Alexa Pagerank
opkloud.com 146.66.96.170
IPv4 routes
Startip Endip Description Country #domains #spamhosts
176.32.128.0 176.32.159.255 CityTelekom LLC, Armavir https://city-telekom.ru/ RU 4 0
185.66.200.0 185.66.203.255 https://www.skhosting.eu SK 2,003 0
185.101.140.0 185.101.143.255 https://www.skhosting.eu SK 0 0
185.141.4.0 185.141.7.255 https://www.e-si.fr FR 9 0
80.83.184.0 80.83.187.255 https://anycast.io DE 7 0
185.101.140.0 185.101.140.255 https://www.skhosting.eu SK 0 0
185.115.127.0 185.115.127.255 https://hosting4real.net EU 12 0
185.120.23.0 185.120.23.255 https://bunnycdn.com EU 1 0
185.141.4.0 185.141.5.255 https://www.e-si.fr FR 9 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:4ce9:: 2001:4ce9:ffff:ffff:ffff:ffff:ffff:ffff https://anycast.io DE 0 0
2001:4cea:: 2001:4cea:ffff:ffff:ffff:ffff:ffff:ffff https://anycast.io DE 2,972 0
2001:4cec:: 2001:4cec:ffff:ffff:ffff:ffff:ffff:ffff https://anycast.io DE 0 0
2001:4cee:: 2001:4cee:ffff:ffff:ffff:ffff:ffff:ffff https://anycast.io DE 0 0




US CFTC to fine UBS, Deutsche Bank, HSBC for futures market spoofing

U.S. CFTC to fine UBS, Deutsche Bank, HSBC for futures market spoofing, manipulation

January 26, 2018, 06:35:00 PM EDT By Reuters

WASHINGTON, Jan 26 (Reuters) – The U.S. derivatives regulator is set to announce it has fined European lenders UBS, HSBC and Deutsche Bank millions of dollars each for so-called “spoofing” and manipulation in the U.S. futures market, three people with direct knowledge of the matter told Reuters.

The enforcement action by the Commodity Futures Trading Commission (CFTC) is the result of a multi-agency investigation that also involves the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), the people said.

Spokesmen for all three banks declined to comment.

https://www.reuters.com/article/us-usa-cftc-enforcement-exclusive/u-s-cftc-to-fine-ubs-deutsche-bank-hsbc-for-spoofing-manipulation-sources-idUSKBN1FF2YK

The enforcement action by the Commodity Futures Trading Commission (CFTC) is the result of a multi-agency investigation that also involves the Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) – the first of its kind for the CFTC, the people said.

The fines for UBS and Deutsche Bank will be upward of ten million, while the fine for HSBC will be slightly less than that, the people said, without providing exact figures.

Spokesmen for HSBC, Deutsche Bank and UBS declined to comment.

Spoofing involves placing bids to buy or offers to sell futures contracts with the intent to cancel them before execution. By creating an illusion of demand, spoofers can influence prices to benefit their market positions.

Spoofing is a criminal offense under a provision implemented as part of the 2010 Dodd-Frank financial reform.

Some of the manipulative behavior came to light as a result of the authorities’ previously-settled probes into forex market manipulation while UBS self-reported the wrong doing, according to two of the people with knowledge of the matter.

The bank investigations have been ongoing for more than a year, one of the people said.

The settlement is the most high-profile brought so far by the CFTC’s head of enforcement James McDonald who was appointed to the role in March 2017.

McDonald, who was previously a prosecutor in the Southern District of New York, said in September he plans to encourage companies and staff to report their own wrongdoing and cooperate with investigators, a strategy he hopes will make it easier to prosecute more individuals.

In August, a U.S. appeals court upheld the conviction of former New Jersey-based high-speed trader Michael Coscia who was the first individual was the first person to be criminally prosecuted for the manipulative trading practice.

A spokeswoman for the CBOE, one of the U.S.’s major futures exchanges, declined to comment. A spokeswoman for the CME Group, the other major futures bourse, did not immediately respond to a request for comment.

(This version of the story corrects to remove extraneous words from penultimate paragraph.)

Reporting by Michelle Price; additional reporting by Karen Freifeld in New York; editing by Clive McKeef.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

Bush Illuminati Human Sacrifice Denver June 20-21 2018

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

FBI Raids Satanic Human Sacrifice Video

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism April 18 2010

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Please email or twitter to President Trump


Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton’s Assassins. There were two more crashes and attempts one year later.
Contributions are much appreciated Thank You.– Stew Webb

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.






Archives


Stew Webb 34 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”