Blog Archives

Radio Stew Webb and Tom Heneghan October 8 2018

Radio Stew Webb and Tom Heneghan October 8 2018

Intel Briefing – Tom Heneghan, Stew Webb (10-8-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb 35 years a US Federal Whistle blower

 




Radio Stew Webb and Tom Heneghan October 5 2018

Radio Stew Webb and Tom Heneghan October 5 2018

Intel Update – Tom Heneghan, Stew Webb (10-5-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb 35 years a US Federal Whistle blower

 




Radio Stew Webb and Tom Heneghan August 4 2018

Radio Stew Webb and Tom Heneghan August 4 2018

Intel Briefing – Tom Heneghan, Stew Webb (8-4-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb

Contact: Stew Webb Federal Whistle blower 35 years

816-492-9809

federalwhistleblower@gmail.com

10607 E. Sheley Road

Independence, Missouri 64052

 




Radio Stew Webb and Tom Heneghan July 27 2018

Radio Stew Webb and Tom Heneghan July 27 2018

Heneghan-Webb-7-27-18 from Truth Warriors on Vimeo.

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb

 




Bush Mizel Illuminati Human Sacrifice June 20-21 2018 Denver Colorado

Bush Mizel Illuminati Human Sacrifice June 20-21 2018 Denver Colorado

 

Click on picture below enjoy reading

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan June 11 2018

Radio Stew Webb and Tom Heneghan June 11 2018

Intel Briefing – Tom Heneghan Stew Webb (6-11-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan June 6 2018

Radio Stew Webb and Tom Heneghan June 6, 2018

Intel Briefing – Tom Heneghan, Stew Webb (6-6-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan May 13 2018

Radio Stew Webb and Tom Heneghan May 13 2018

Intel Briefing – Tom Heneghan, Stew Webb (5-13-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Radio Stew Webb and Tom Heneghan April 24 2018

Radio Stew Webb and Tom Heneghan April 24 2018

 

Intel Briefing – Tom Heneghan Stew Webb (4-24-18) from Truth Warriors on Vimeo.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism

Today April 18, 2018

Timothy Garrison US Attorney Kansas City, Missouri Appointed by US Attorney General Jeff Sessions

By Stew Webb Federal Whistle blower now 34 years

Welcome to the Web site for the U.S. Attorney’s Office in the Western District of Missouri.

U.S. Attorney Timothy A. Garrison is the top-ranking federal law enforcement official in the Western District of Missouri, which includes Kansas City, St. Joseph, Columbia, Jefferson City, Springfield and Joplin.

The office is responsible for prosecuting federal crimes in the district, including crimes related to terrorism, public corruption, child exploitation, firearms, and narcotics. The office also defends the United States in civil cases and prosecutes civil claims for the United States.

Kansas City Main Phone: (816) 426-3122 or toll free at 1-800-733-6558

Kansas City Fax Line: (816) 426-4210

Springfield Main Phone: (417) 831-4406 or toll free at 1-800-347-4493

Springfield Fax Line: (417) 831-0078

Jefferson City Main Phone: (573) 634-8214 or toll free at 1-800-836-3518

Jefferson City Fax Line: (573) 634-8723

Correspondence to the Western District of Missouri, including the U.S. Attorney , may be sent to:

Charles Evans Whittaker Courthouse
U.S. Attorney’s Office
Room 5510
400 East 9th Street
Kansas City, MO 64106

In Springfield:

U.S. Attorney’s Office
Hammons Tower, Suite 500
901 St. Louis
Springfield, MO 65806-2511

In Jefferson City:

U.S. Attorney’s Office
80 Lafayette Street, Suite 2100
Jefferson City, MO 65101

Contact Don Ledford, Public Affairs Officer, at ( 816) 426-4220 or by e-mail at Don.Ledford@usdoj.gov (link sends e-mail)

Letter to Kansas City US Attorney Timothy  Garrison purpose to Prosecute Cyber Terrorism

Certified Mail Sent: Number: add later

Reference Prosecution of Cyber Terrorism here is the evidence:

I also have  3 ½ — 4 years of evidence…

I am writing to inform you of Cyber Attacks against my website stewebb.com, my former telephone – internet company Comcast.net had direct dos attacks killing over 12 modems in 14 months.

I lost 4 computer screens and 2 computers due to these attacks.

I have enclosed links to evidence posted today for your benefit to expedite your prosecutions regarding cyber attacks against me.

Reference Prosecution of Cyber Terrorism here is the evidence:

Evidence of Cyber Attacks against Stew Webb US Federal Whistle blower April 18 2018

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

Cyber Attackers Felonies against Stew Webb Whistle blower April 26 2018
http://www.stewwebb.com/2018/04/26/cyber-attackers-felonies-against-stew-webb-whistle-blower-april-26-2018/

Plus 3 ½ — 4 years of evidence.

Please Note the links below enclosed to President Donald Trump and Attorney General Jeff Sessions

Today April 18, 2018

When may I come to the Grand Jury the Judge Richard Matsch of Denver gave me a standing order in 1995.

Sincerely,

Stewart A. Webb

816-492-9809

Stewart A. Webb

federalwhistleblower@gmail.com

816-492-9809

http://www.stewwebb.com

Stewart A. Webb

_____________________________

S/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018
http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

President Trump Stop NSA NAZI Espionage
http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

Letter to Attorney General Jeff Sessions from Whistle blowers
https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

Stew Webb Whistle blower sues US Government Assassins P1of2
http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

Evidence:

Stew Webb Grand Jury Demands
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

 




Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower

Violations of 18 USC 1010-1015

RICO and the below Cyber laws

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence of Additional Cyber Terrorists Today April 15, 2018

Oldham, United Kingdom left http://www.stewwebb.com/2016/05/25/hillary-clinton-lesbian-demon-pedophile-child-rapist/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523829338.69
4/15/2018 4:55:41 PM (11 minutes ago)
IP: 86.168.182.228 Hostname: host86-168-182-228.range86-168.btcentralplus.com
Browser: Firefox version 59.0 running on Android
Mozilla/5.0 (Android 4.2.2; Tablet; rv:59.0) Gecko/59.0 Firefox/59.0

Oldham, United Kingdom arrived from https://t.co/N0UQ2ezwWp?amp=1 and visited http://www.stewwebb.com/2016/05/25/hillary-clinton-lesbian-demon-pedophile-child-rapist/
4/15/2018 4:55:37 PM (10 minutes ago)
IP: 86.168.182.228 Hostname: host86-168-182-228.range86-168.btcentralplus.com
Browser: Firefox version 59.0 running on Android
Mozilla/5.0 (Android 4.2.2; Tablet; rv:59.0) Gecko/59.0 Firefox/59.0

Hopkins, United States left https://www.stewwebb.com/2017/01/02/who-controls-senator-john-mccain-larry-mizel-organized-crime-bos… and visited https://www.stewwebb.com/?wordfence_syncAttackData=1523829053.26
4/15/2018 4:50:55 PM (18 minutes ago)
IP: 68.47.93.100 Hostname: c-68-47-93-100.hsd1.mn.comcast.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
Type: Human

United States Hopkins, United States arrived from http://r.search.yahoo.com/_ylt=AwrE1xvgxdNawecAe5tx.9w4;_ylu=X3oDMTEyZ2FpZGhmBGNvbG8DYmYxBHBvcwMxBHZ… and visited https://www.stewwebb.com/2017/01/02/who-controls-senator-john-mccain-larry-mizel-organized-crime-boss-hog…
4/15/2018 4:50:52 PM (18 minutes ago)
IP: 68.47.93.100 Hostname: c-68-47-93-100.hsd1.mn.comcast.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 S

Williamsport, United States left http://www.stewwebb.com/2018/04/15/hillary-clinton-huma-rape-tape-leaked-sources-report/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523823653.27
4/15/2018 3:20:55 PM (5 minutes ago)
IP: 73.130.62.154 Hostname: c-73-130-62-154.hsd1.pa.comcast.net
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523767034.66
4/14/2018 11:37:16 PM (13 hours 40 mins ago)
IP: 97.73.80.72 Hostname: host9773007280.direcway.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; XT1710-02 Build/NDSS26.118-23-19-3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523755586.26
4/14/2018 8:26:28 PM (17 hours ago)
IP: 97.73.80.72 Hostname: host9773007280.direcway.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; XT1710-02 Build/NDSS26.118-23-19-3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523767034.66
4/14/2018 11:37:16 PM (13 hours 40 mins ago)
IP: 97.73.80.72 Hostname: host9773007280.direcway.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; XT1710-02 Build/NDSS26.118-23-19-3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523755586.26
4/14/2018 8:26:28 PM (17 hours ago)
IP: 97.73.80.72 Hostname: host9773007280.direcway.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; XT1710-02 Build/NDSS26.118-23-19-3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

United States United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523818396.14
4/15/2018 1:53:18 PM (4 minutes ago)
IP: 75.52.166.106 Hostname: 75-52-166-106.lightspeed.moblal.sbcglobal.net
Browser: Firefox version 59.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0

Monterey Park, United States left http://www.stewwebb.com/?s=Trump&submit=Go and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523785790.98
4/15/2018 4:49:52 AM (8 hours 13 mins ago)
IP: 166.170.5.19 Hostname: mobile-166-170-005-019.mycingular.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

Delaware, United States left http://www.stewwebb.com/stew-webb-press-tv-interviews/ and visited http://www.stewwebb.com/2018/04/06/proof-sessions-corrupt-and-q-lies-cyber-warfare/
4/14/2018 8:10:43 PM (17 hours 19 mins ago)
IP: 75.76.129.33 Hostname: dynamic-75-76-129-33.knology.net
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-G920P Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
United States Delaware, United States left http://www.stewwebb.com/stew-webb-press-tv-interviews/ and visited http://www.stewwebb.com/2018/04/06/proof-sessions-corrupt-and-q-lies-cyber-warfare/
4/14/2018 8:10:43 PM (17 hours 21 mins ago)
IP: 75.76.129.33 Hostname: dynamic-75-76-129-33.knology.net
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-G920P Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human
United States Delaware, United States left http://www.stewwebb.com/2016/08/11/trump-obama-clinton-founders-of-isis-see-obama-video/ and visited http://www.stewwebb.com/stew-webb-press-tv-interviews/
4/14/2018 8:09:18 PM (17 hours 22 mins ago)
IP: 75.76.129.33 Hostname: dynamic-75-76-129-33.knology.net
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-G920P Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human
United States Delaware, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2016/08/11/trump-obama-clinton-founders-of-isis-see-obama-video/
4/14/2018 8:07:00 PM (17 hours 24 mins ago)
IP: 75.76.129.33 Hostname: dynamic-75-76-129-33.knology.net
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-G920P Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

NetRange: 75.76.48.0 – 75.76.129.255
[20992 addresses in this network]
CIDR: 75.76.128.0/23, 75.76.48.0/20, 75.76.64.0/18 (75.76.128.0 – 75.76.131.255)
[1024 addresses in this network]
NetName: WIDEOPENWEST
NetHandle: NET-75-76-48-0-1
Parent: NET75 (NET-75-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS12083
Organization: WideOpenWest Finance LLC (WOPW)
RegDate: 2008-02-13
Updated: 2015-01-30
Ref: https://whois.arin.net/rest/net/NET-75-76-48-0-1

OrgName: WideOpenWest Finance LLC
OrgId: WOPW
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2002-04-09
Updated: 2017-05-16
Ref: https://whois.arin.net/rest/org/WOPW

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: ipadmin@wideopenwest.com
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: ipadmin@wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: abuse@wideopenwest.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: eric.bailey@wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

See additional Links of Cyber Terrorism inside the link below:

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Related to Larry Mizel the Illuminati Baby Eater

USAG Sessions Larry Mizel Cyber attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blower/

USAG Sessions Larry Mizel Cyber attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blower/

US Attorney General Sessions Cyber attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2018/01/16/us-attorney-general-sessions-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/29/larry-mizel-wide-open-west-financial-cyber-attacks-against-stew-webb-whistleblower-2/

Wide Open West Finance LLC cyber attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/23/wide-open-west-finance-llc-cyber-attacks-against-stew-webb-whistleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

Larry Mizel Cyber Attacks against Stew Webb Whistle blower 18-USC-1010-1015
http://www.stewwebb.com/2017/12/25/larry-mizel-cyber-attacks-stew-webb-whistle-blower-18-usc-1010-1015/

Larry Mizel Cyber attack against Stew Webb Whistle blower
http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/

 




Google Cyber Attacks against Stew Webb Federal Whistle blower April 2018

By Stew Webb 34 years Federal Whistle blower

Google Cyber Attacks against Stew Webb Federal Whistle blower April 2018

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusion Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence April 14, 2028 Cyber Terrorism Attacks against StewWebb.com

Additions Cyber Attacker listed prior to Google listings

cyber attackers

Winchendon, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523739367.69
4/14/2018 3:56:09 PM (19 minutes ago)
IP: 24.63.118.119
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Nexus 6 Build/NGI77B) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
comcast.com

United States Washington, United States left http://www.stewwebb.com/2013/08/04/why-alex-jones-bashes-nazis/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523732128.51
4/14/2018 1:55:31 PM (29 seconds ago)
IP: 96.231.226.219 Hostname: pool-96-231-226-219.washdc.east.verizon.net
Browser: Chrome version 65.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36 OPR/52.0.2871.64

United States Seaford, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523723541.74
4/14/2018 11:32:23 AM (2 minutes ago)
IP: 98.252.13.205 Hostname: c-98-252-13-205.hsd1.de.comcast.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1

Seaford, United States visited http://www.stewwebb.com/tag/what-really-happened-to-hillary-clinton-and-us-navy-seal-commander-job-w-pric…
4/14/2018 11:51:15 AM (3 minutes ago)
IP: 98.192.219.251 Hostname: c-98-192-219-251.hsd1.de.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 10_2_1 like Mac OS X) AppleWebKit/602.4.6 (KHTML, like Gecko) Version/10.0 Mobile/14D27 Safari/602.1

 

Belding, United States visited http://www.stewwebb.com/wp-login.php
4/14/2018 11:06:14 AM (39 minutes ago)
IP: 24.236.194.186 Hostname: 24-236-194-186.dhcp.aldl.mi.charter.com
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1

Decatur, United States left http://www.stewwebb.com/2018/04/10/us-rebels-did-gas-attack-syria-girl/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523697412.09
4/14/2018 4:16:54 AM (4 hours 50 mins ago)
IP: 71.194.32.82 Hostname: c-71-194-32-82.hsd1.il.comcast.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299

Corpus Christi, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523712671.08
4/14/2018 8:31:13 AM (30 minutes ago)
IP: 173.175.81.28 Hostname: cpe-173-175-81-28.stx.res.rr.com
Browser: Firefox version 59.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0

Rochester, United States left https://www.stewwebb.com/2018/04/08/facebooks-zuckerberg-guilty-of-crimes-against-the-state/ and visited https://www.stewwebb.com/?wordfence_syncAttackData=1523712211.65
4/14/2018 8:23:36 AM (39 minutes ago)
IP: 98.243.14.89 Hostname: c-98-243-14-89.hsd1.mi.comcast.net
Browser: Edge version 41.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_1_2 like Mac OS X) AppleWebKit/604.3.5 (KHTML, like Gecko) Version/11.0 EdgiOS/41.13.0.0 Mobile/15B202 Safari/604.3.5

Columbia, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523670462.5
4/13/2018 8:47:44 PM (12 hours 31 mins ago)
IP: 75.183.154.232 Hostname: 075-183-154-232.res.spectrum.com
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

Brampton, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523662263.78
4/13/2018 6:31:06 PM (15 hours ago)
IP: 99.252.143.132 Hostname: CPEf0f24942b1f3-CMf0f24942b1f0.cpe.net.cable.rogers.com
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.1 Safari/605.1.15

United States Costa Mesa, United States left http://www.stewwebb.com/2018/03/20/u-s-countdown-starts/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523624353.32
4/13/2018 7:59:15 AM (1 day 2 hours ago)
IP: 64.145.76.21 Hostname: 64-145-76-21.ipvanish.com
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1

Charleston, United States left http://www.stewwebb.com/2017/10/04/george-bush-and-hillary-clinton-behind-las-vegas-terrorist-attack… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523602262
4/13/2018 1:51:04 AM (1 day 8 hours ago)
IP: 207.144.221.195 Hostname: 207.144.221.195
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (Linux; Android 5.1.1; KFAUWI Build/LVY48F) AppleWebKit/537.36 (KHTML, like Gecko) Silk/65.2.3 like Chrome/65.0.3325.144 Safari/537.36
sprintcom.com

@@@@@@@@@@@@@@@@@@@@@@
mass cyber attacker
United States Ann Arbor, United States was blocked by firewall for a Malicious File Upload in file: files=VkNgpjPt.php at http://www.stewwebb.com/wp-content/plugins/wp-symposium/server/php/index.php
4/14/2018 6:39:00 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for Directory Traversal in query string: filename=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd at http://www.stewwebb.com/wp-content/plugins/wp-ecommerce-shop-styling/includes/download.php?filename=..%2F…
4/14/2018 6:38:59 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for Directory Traversal in query string: fileName=..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2F..%2Fetc%2Fpasswd at http://www.stewwebb.com/wp-content/plugins/candidate-application-form/downloadpdffile.php?fileName=..%2F.…
4/14/2018 6:38:59 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for LFI: Local File Inclusion in query string: filepath=%2Fetc%2Fpasswd at http://www.stewwebb.com/wp-content/plugins/./simple-image-manipulator/controller/download.php?filepath=%2…
4/14/2018 6:38:58 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for LFI: Local File Inclusion in query string: url=%2Fetc%2Fpasswd at http://www.stewwebb.com/wp-content/plugins/wptf-image-gallery/lib-mbox/ajax_load.php?url=%2Fetc%2Fpasswd
4/14/2018 6:38:58 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for LFI: Local File Inclusion in query string: file_link=%2Fetc%2Fpasswd at http://www.stewwebb.com/wp-content/plugins/recent-backups/download-file.php?file_link=%2Fetc%2Fpasswd
4/14/2018 6:38:57 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for Directory Traversal – wp-config.php in query string: files=..%2F..%2F..%2F..%2Fwp-config.php at http://www.stewwebb.com/wp-content/themes/mTheme-Unus/css/css.php?files=..%2F..%2F..%2F..%2Fwp-config.php
4/14/2018 6:38:57 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for Slider Revolution: Local File Inclusion at http://www.stewwebb.com/wp-admin/admin-ajax.php?action=revslider_show_image&img=..%2Fwp-config.php
4/14/2018 6:38:57 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Ann Arbor, United States was blocked by firewall for WP Mobile Detector <= 3.5 – Arbitrary File Upload at http://www.stewwebb.com/wp-content/plugins/wp-mobile-detector/resize.php?src=http%3A%2F%2Fwww.relationshi…
4/14/2018 6:38:46 AM (2 hours 4 mins ago)
IP: 35.229.20.254 Hostname: 254.20.229.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
NetRange: 35.208.0.0 – 35.247.255.255
[2621440 addresses in this network]
CIDR: 35.240.0.0/13, 35.224.0.0/12, 35.208.0.0/12 (35.240.0.0 – 35.255.255.255)
[1048576 addresses in this network]
NetName: GOOGLE-CLOUD
NetHandle: NET-35-208-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOOGL-2)
RegDate: 2017-09-29
Updated: 2018-01-24
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Ref: https://whois.arin.net/rest/net/NET-35-208-0-0-1

OrgName: Google LLC
OrgId: GOOGL-2
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2006-09-29
Updated: 2017-12-21
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Comment:
Comment: Complaints sent to any other POC will be ignored.
Ref: https://whois.arin.net/rest/org/GOOGL-2

OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: GCABU-ARIN
OrgAbuseName: GC Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: google-cloud-compliance@google.com
OrgAbuseRef: https://whois.arin.net/rest/poc/GCABU-ARIN

OrgNOCHandle: GCABU-ARIN
OrgNOCName: GC Abuse
OrgNOCPhone: +1-650-253-0000
OrgNOCEmail: google-cloud-compliance@google.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
another google seperate ip
mass cyber attack
United States Mountain View, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com//wp-admin/admin-ajax.php
4/13/2018 8:27:05 PM (12 hours 21 mins ago)
IP: 35.196.185.81 Hostname: 81.185.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by firewall for UserPro – User Profiles with Social Login <= 4.9.17 – Authentication Bypass in query string: up_auto_log=true at http://www.stewwebb.com//?up_auto_log=true
4/13/2018 8:26:40 PM (12 hours 22 mins ago)
IP: 35.196.185.81 Hostname: 81.185.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Firefox version 36.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:36.0) Gecko/20100101 Firefox/36.0
Type: Blocked
United States Mountain View, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com//wp-content/plugins/cherry-plugin/admin/import-export/upload.php
4/13/2018 8:26:22 PM (12 hours 22 mins ago)
IP: 35.196.185.81 Hostname: 81.185.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com//wp-admin/admin-ajax.php?action=getcountryuser&cs=2
4/13/2018 8:26:14 PM (12 hours 22 mins ago)
IP: 35.196.185.81 Hostname: 81.185.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com//wp-admin/admin-post.php
4/13/2018 8:26:10 PM (12 hours 22 mins ago)
IP: 35.196.185.81 Hostname: 81.185.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0
Type: Blocked
United States Mountain View, United States was blocked by firewall for MailPoet <= 2.6.7 – Arbitrary File Upload at http://www.stewwebb.com//wp-admin/admin-post.php?page=wysija_campaigns&action=themes
4/13/2018 8:25:52 PM (12 hours 23 mins ago)
IP: 35.196.185.81 Hostname: 81.185.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:28.0) Gecko/20100101 Firefox/28.0
NetRange: 35.192.0.0 – 35.207.255.255
[1048576 addresses in this network]
CIDR: 35.192.0.0/12 (35.192.0.0 – 35.223.255.255)
[2097152 addresses in this network]
NetName: GOOGLE-CLOUD
NetHandle: NET-35-192-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOOGL-2)
RegDate: 2017-03-21
Updated: 2018-01-24
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Ref: https://whois.arin.net/rest/net/NET-35-192-0-0-1

OrgName: Google LLC
OrgId: GOOGL-2
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2006-09-29
Updated: 2017-12-21
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Comment:
Comment: Complaints sent to any other POC will be ignored.
Ref: https://whois.arin.net/rest/org/GOOGL-2

OrgNOCHandle: GCABU-ARIN
OrgNOCName: GC Abuse
OrgNOCPhone: +1-650-253-0000
OrgNOCEmail: google-cloud-compliance@google.com
OrgNOCRef: https://whois.arin.net/rest/poc/GCABU-ARIN

OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: GCABU-ARIN
OrgAbuseName: GC Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: google-cloud-compliance@google.com
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
another sperate ip
mass cyber attacker

Type: Blocked
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com//fckeditor/editor/filemanager/connectors/php/upload.php?Type=Media
4/13/2018 7:38:18 PM (13 hours 13 mins ago)
IP: 35.196.45.42 Hostname: 42.45.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com/
4/13/2018 7:38:17 PM (13 hours 13 mins ago)
IP: 35.196.45.42 Hostname: 42.45.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com//templates/system/css/system.css
4/13/2018 7:38:17 PM (13 hours 13 mins ago)
IP: 35.196.45.42 Hostname: 42.45.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com//admin/login.php
4/13/2018 7:38:17 PM (13 hours 14 mins ago)
IP: 35.196.45.42 Hostname: 42.45.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
Type: Blocked
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com//admin/images/cal_date_over.gif
4/13/2018 7:38:15 PM (13 hours 14 mins ago)
IP: 35.196.45.42 Hostname: 42.45.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.18.4
NetRange: 35.192.0.0 – 35.207.255.255
[1048576 addresses in this network]
CIDR: 35.192.0.0/12 (35.192.0.0 – 35.223.255.255)
[2097152 addresses in this network]
NetName: GOOGLE-CLOUD
NetHandle: NET-35-192-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOOGL-2)
RegDate: 2017-03-21
Updated: 2018-01-24
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Ref: https://whois.arin.net/rest/net/NET-35-192-0-0-1

OrgName: Google LLC
OrgId: GOOGL-2
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2006-09-29
Updated: 2017-12-21
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Comment:
Comment: Complaints sent to any other POC will be ignored.
Ref: https://whois.arin.net/rest/org/GOOGL-2

OrgAbuseHandle: GCABU-ARIN
OrgAbuseName: GC Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: google-cloud-compliance@google.com
OrgAbuseRef: https://whois.arin.net/rest/poc/GCABU-ARIN

OrgNOCHandle: GCABU-ARIN
OrgNOCName: GC Abuse
OrgNOCPhone: +1-650-253-0000
OrgNOCEmail: google-cloud-compliance@google.com
OrgNOCRef: https://whois.arin.net/rest/poc/GCABU-ARIN

OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com//wp-admin/admin-ajax.php
4/13/2018 12:25:34 PM (20 hours 31 mins ago)
IP: 35.196.46.35 Hostname: 35.46.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.9.1
Type: Blocked
United States Mountain View, United States was blocked by real-time IP blacklist at http://www.stewwebb.com//?gf_page=upload
4/13/2018 12:25:31 PM (20 hours 31 mins ago)
IP: 35.196.46.35 Hostname: 35.46.196.35.bc.googleusercontent.com
Human/Bot: Bot
Browser: undefined
python-requests/2.9.1
NetRange: 35.192.0.0 – 35.207.255.255
[1048576 addresses in this network]
CIDR: 35.192.0.0/12 (35.192.0.0 – 35.223.255.255)
[2097152 addresses in this network]
NetName: GOOGLE-CLOUD
NetHandle: NET-35-192-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOOGL-2)
RegDate: 2017-03-21
Updated: 2018-01-24
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers ***
Comment:
Comment: Direct all copyright and legal complaints to
Comment: https://support.google.com/legal/go/report
Comment:
Comment: Direct all spam and abuse complaints to
Comment: https://support.google.com/code/go/gce_abuse_report
Comment:
Comment: For fastest response, use the relevant forms above.
Comment:
Comment: Complaints can also be sent to the GC Abuse desk
Comment: (google-cloud-compliance@google.com)
Comment: but may have longer turnaround times.
Ref: https://whois.arin.net/rest/net/NET-35-192-0-0-1

OrgName: Google LLC
OrgId: GOOGL-2
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2006-09-29
Updated: 2017-12-21
Comment: *** The IP addresses under this Org-ID are in use by Google Cloud customers
650-253-0000
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Google Human
???????????

Type: Human
United States Mountain View, United States visited http://www.stewwebb.com/
4/13/2018 1:37:49 PM (20 hours 34 mins ago)
IP: 66.102.6.44 Hostname: google-proxy-66-102-6-44.google.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 5.1.1; SM-T537V Build/LMY47X) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Safari/537.36

NetRange: 66.102.0.0 – 66.102.15.255
[4096 addresses in this network]
CIDR: 66.102.0.0/20 (66.102.0.0 – 66.102.31.255)
[8192 addresses in this network]
NetName: GOOGLE
NetHandle: NET-66-102-0-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOGL)
RegDate: 2002-07-02
Updated: 2012-06-19
Ref: https://whois.arin.net/rest/net/NET-66-102-0-0-1

OrgName: Google LLC
OrgId: GOGL
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2000-03-30
Updated: 2017-12-21
Ref: https://whois.arin.net/rest/org/GOGL

OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: network-abuse@google.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5250-ARIN

RTechHandle: ZG39-ARIN
RTechName: Google LLC
RTechPhone: +1-650-253-0000
RTechEmail: arin-contact@google.com
RTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

 

 

 




Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistleblower

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower who has exposed Larry Mizel in violations of 18-USC-1010-1015.

Was that the guy in the Whte House? Is that BiBi?

Larry Mizel AIPAC Director

Israel Prime Minister BiBi and Larry Mizel

HSBC Run by Larry Mizel

Stew Webb Contributor Silverado Saving owned by MDC Holding, Inc.

Larry Mizel and B.C.C.I Jackson Stevens ran off with Charles Keating Money

IRS Charges filed by Stew Webb 1990 against MDC Holding, Inc Run by Larry Mizel

 

 

Stew Webb Current Grand Jury Demand against Larry Mizel

March 27, 2018

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

March 29, 2018

Evidence previous cyber attacked and posted on stewwebb.com

New evidence posted below implanting malicious code

Ten Cyber Terrorist Implanting Malicious Codes against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/26/ten-cyber-terrorist-implanting-malicious-codes-against-stew-webb-whistleblower/

Cyber Attackers Network planting malicious codes against Stew Webb Whistleblower 2018
http://www.stewwebb.com/2018/03/25/cyber-attackers-network-planting-malicious-codes-against-stew-webb-whistleblower-2018/

Cyber Terrorists planting malicious codes against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/16/cyber-terrorists-planting-malicious-codes-against-stew-webb-whistleblower/

March 28, 2018
Cyber Attackers exposed by Stew Webb Federal Whistle blower March 28 2018
http://www.stewwebb.com/2018/03/28/cyber-attackers-exposed-by-stew-webb-federal-whistle-blower-march-28-2018

New evidence posted below implanting malicious code

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence _syncAttackData= 1522350851.57

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522350851.57
3/29/2018 2:14:14 PM (11 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522350851.57
3/29/2018 2:14:14 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human
United States North Royalton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
3/29/2018 2:14:10 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human
United States North Royalton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
3/29/2018 2:14:10 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:41 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:38 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try  .wideopenwest.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:37 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100
Type: 404 Not Found
United States North Royalton, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
3/29/2018 2:13:35 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States North Royalton, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
3/29/2018 2:13:31 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Human
United States North Royalton, United States arrived from https://duckduckgo.com/ and visited http://www.stewwebb.com/
3/29/2018 2:13:17 PM (15 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try  .wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/60

# The following results may also be obtained via:
# https://whois.arin.net/rest/nets;q=NET-50-4-64-0-1?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
#

NetRange: 50.4.64.0 – 50.4.79.255
[4096 addresses in this network]
CIDR: 50.4.64.0/20 (50.4.64.0 – 50.4.95.255)
[8192 addresses in this network]
NetName: OH-CLEV
NetHandle: NET-50-4-64-0-1
Parent: WIDEOPENWEST (NET-50-4-0-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C02609448)
RegDate: 2010-10-15
Updated: 2014-10-28
Comment: Address complaints to abuse@  wideopenwest.com
Ref: https://whois.arin.net/rest/net/NET-50-4-64-0-1

CustName: Wide Open West
Address: 105 Blaze Industrial Pkwy
City: Berea
StateProv: OH
PostalCode: 44017
Country: US
RegDate: 2010-10-15
Updated: 2014-10-28
Ref: https://whois.arin.net/rest/customer/C02609448

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: ipadmin@  wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: abuse@  wideopenwest.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: ipadmin@  wideopenwest.com
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: kevin.baker@  wowinc.com
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

RTechHandle: LW463-ARIN
RTechName: WALDEN, LAWRENCE D
RTechPhone: +1-800-491-1436
RTechEmail: dwalden@  wideopenwest.com
RTechRef: https://whois.arin.net/rest/poc/LW463-ARIN

RNOCHandle: NMC5-ARIN
RNOCName: Network Management Center
RNOCPhone: +1-800-496-9669
RNOCEmail: nmc@  wideopenwest.com
RNOCRef: https://whois.arin.net/rest/poc/NMC5-ARIN

RAbuseHandle: ABUSE241-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-800-496-9669
RAbuseEmail: abuse@ wideopenwest.com
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE241-ARIN

Wide Open West Finance LLC cyber attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/23/wide-open-west-finance-llc-cyber-attacks-against-stew-webb-whistleblower/

Larry Mizel Wide Open West Financial cyber attacks against Stew Webb Whistle blower
March 3, 2018
http://www.stewwebb.com/2018/03/02/larry-mizel-wide-open-west-financial-cyber-attacks-against-stew-webb-whistleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

USAG Sessions Larry Mizel Cyber attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Insurance Co Cyber Attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/25/larry-mizel-insurance-co-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Cyber Attacks against Stew Webb Whistle blower 18-USC-1010-1015
http://www.stewwebb.com/2017/12/25/larry-mizel-cyber-attacks-stew-webb-whistle-blower-18-usc-1010-1015/

Larry Mizel Cyber attack against Stew Webb Whistle blower
http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/westminister-colorado-computercrews-cyber-attacks-against-stew-webb-whi-stleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan March 21 2018

Radio Stew Webb and Tom Heneghan March 21 2018

Intel Update – Tom Heneghan, Stew Webb (3-21-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




U.S. Countdown Starts

By Tom Heneghan, International Intelligence Expert

United States of America   –   It can now be reported that the U.S. Provost Marshall, along with the U.S. Military Joint Chiefs of Staff, has declared Executive Emergency Provost Protocol Override declaring that Albert Gore Jr. of Carthage, Tennessee is the non-inaugurated, natural born, year 2000 DULY ELECTED President of the United States of America.

Accordingly, all other elections from 2004 to 2016 are null and void.

The full implementation of the 28th Amendment will be executed with any attempt to interfere in the re-implementation of the Constitution of the United States of America being dealt with all appropriate measures, including brute force.

The order goes out : Obey the Constitution, the Supreme Law of the United States, or else!

What Taxpayers Get From the (pre 9/11 put options) Bear Stearns ‘Bailout’

https://money.usnews.com/money/blogs/flowchart/2008/03/25/what-taxpayers-get-from-the-bear-stearns-bailout

April of 2008   Tom Heneghan   

…The current AIPAC trial, which is being delayed in U.S. Federal Court in Virginia, deals with new evidence linking elements of the Israeli MOSSAD-run New Jersey-based Urban moving Systems to command and control in the 9/11 attack on America.

There is also evidence, which is financial in nature, tying both Viktor Bout and unelectable LOSER Hillary Clinton fundraiser and 9/11 co-conspirator, Mehmet Celebi, to PRE-9/11 put options and short positions placed on the New York Stock Exchange and the Chicago Board of Options in both airline and insurance stocks just prior to 9/11.  The brokerage firm fingered in orchestrating this financial TREASON is none other than Bear Stearns offices in Chicago, Illinois and Winter Springs, Florida.

Reference: The criminal Bush fraud Administration has just recently bailed out Bear Stearns with U.S. TAXPAYERS.

Wells Fargo gives its CEO a $4.6m raise on flat earnings and more scandals

Wells Fargo CEO Tim Sloan has only been on the job since October, but he’s earned a 35%, $4.6m raise, despite flat earnings and a series of scandals since Sloan took over from the cartoonishly villainous John Stumpf.

https://boingboing.net/2018/03/15/son-of-stumpf.html

Following The Bailout Money To Wells Fargo – CBS News

https://www.cbsnews.com/news/following-the-bailout-money-to-wells-fargo/

All the Ripoffs and Scams Wells Fargo Pulled on Customers …

Wells Fargo had to pay billions in fines for ripping off Americans … while Wells Fargo got a bailout. …

https://www.cheatsheet.com/money-career/wells-fargo-ripping-off-people.html/?a=viewall

Wells Fargo isn’t ready to repay federal bailout funds …

Jun 10, 2009 · Wells Fargo & Co. didn’t want a federal capital infusion last fall but got …

http://articles.latimes.com/2009/jun/10/business/fi-wells-fargo10

At this hour, U.S.-based Wells Fargo Bank and its branch out of Reno, Nevada is in total violation of the Commodity Exchange Act of 1936 as they are trying to bail out, along with Jefferies Inc out of Chicago, Illinois, the massive debits and margin calls of Bank of America tied to their naked short positions in the Swiss franc and the Japanese yen.

P.P.S. Wells Fargo is now putting in jeopardy all of its depositors and account holders by using Dodd-Frank legislation as a vehicle to use the deposits of their customers to meet the margin calls of Bank of America and other FX firms who were blindsided by the Swiss National Bank/

What is forthcoming is a massive ‘BAIL-IN’ by crooked U.S. banks STEALING AND LOOTING OF THEIR CUSTOMERS’ FUNDS to meet their massive margin calls tied to their naked short under margined positions in the Japanese yen.

October 7, 2008   Tom Heneghan

P.P.S. A massive ponzi scheme is now taking place inside the [privately owned] Federal Reserve linked to Wachovia, Wells Fargo and Citi Bank involving TRILLIONS of dollars of currency derivatives tied to Luxembourg and the Philippines.

A major Bush-Clinton Crime Family Syndicate brokerage firm called Alex Brown Securities, a division of none other than Deutsche Bank, is being used to launder Euro currency to various secret bank accounts in the nations of Luxembourg, Denmark and Sweden.

Alex Brown Securities is also the New York firm, which currently handles the account of both daddy Bush and his little bitch, Bill Clinton, involved in alleged hurricane relief, but is nothing more than a front for currency derivative fraud.

Note: It did not take daddy Bush’s little bitch, Bill Clinton, long to start once again doing business with his ‘handler’ daddy Bush, in fact only two months after his lesbian in-the-closet wife’s defeat sociopath Clinton was back doing business with sociopath daddy Bush.

P.P.P.S.  It was the FDIC that ruled Citi Bank has the legal authority to buy Wachovia.

It was only after Wells Fargo, an alleged solvent bank, received $30 BILLION in ‘bailout’ money from the U.S. Treasury, did Wells Fargo make a new bid for Wachovia at the expense of Citi Bank’s bid.

As we reported in a previous briefing, folks, Bushfraud and his criminal co-conspirators want to use Wells Fargo to hide and cover up the Deutsche Bank derivatives, which are linked to major alleged Al Qaeda terrorist cells operating in the German Republic who have major secret accounts at the Deutsche Bank.

The scam that Paulson, Bushfraud and Bernanke are trying to pull off, along with the compromised Internal Revenue Service, is to let Wells Fargo buy Wachovia Bank and then let Wachovia actually write off the outstanding fixed rate derivatives linked to Deutsche Bank.

October 25, 2009  Tom Heneghan

UNITED STATE of America   –   It can now be reported that both Wells Fargo Bank and Bank of America face total collapse within 24 hours.

Federal Reserve Chairman Bernard Bernanke has been told by the People’s Republic of China that he must re-pay a $1 TRILLION loan, which was given to him by the PRC, by Tuesday, October 27, 2009 at 9:00 a.m. EST.

Note: The $1 TRILLION loan was issued by China to the former Bush FRAUD Administration in September of 2008 and was designed to stabilize the U.S. equity market and basically help the Federal Reserve and the U.S. Treasury bail out the crooked banks and brokerage firms like Goldman Sachs and J.P. Morgan that have helped enable the LOOTING of the U.S. Treasury.

Item: Over this weekend Chinese officials became enraged when they became aware that the $1 TRILLION loan is gone and was wiped out in massive derivative aka toxic asset trading with the derivatives being compounded 100 times by the crooked Federal Reserve, which used these then worthless derivatives as collateral to create cash aka funny money that has been used to manipulate U.S. equity and bond markets and artificially manufacture a bogus yield curve designed to keep interest rates at zero.

Again, the low interest rates are only used by these crooked banks to exchange and mark up worthless derivatives aka credit default swaps.

Banks are not loaning money to the American People; they are engaged in a Ponzi Scheme between themselves.

Chinese officials also became enraged when they learned early last week that the noted Galleon Group India-based hedge fund was used by both Goldman Sachs and the Federal Reserve Bank of New York utilizing the Bernard Madoff Ponzi Scheme to LOOT the Chinese Sovereign Fund on behalf of the Bush-Clinton Crime Family Syndicate.

Note: Informed sources tell us that former BushFRAUD Treasury Secretary Henry ‘Hank’ Paulson has told his friends that he feels he is being tracked and monitored by members of Chinese Intelligence on a 24 hour basis.

It should also be noted that the Chinese want Paulson arrested for failure to allow Bank of America to implement the noted Wanta-Reagan-Mitterrand Protocols, which would allow TRILLIONS of dollars to return to the U.S. Treasury from offshore secret hedge funds and accounts tied to the members of the noted Bush-Clinton Crime Family Syndicate.

We can now also divulge that Bank of America CEO Kenneth Lewis is cooperating with current New York Attorney General Andrew Cuomo and his consultant, former New York Governor Eliot Spitzer, in their on-going criminal investigation in New York State that threatens to bring down the conspiratorial criminal Federal Reserve Bank.

HIGH Treason Conspirators Against the American People

George W. BushFRAUD, center, is flanked by U.S. Treasury Secretary Henry Paulson, right,

Federal Reserve Chairman Ben Bernanke, left. SEC Chairman Christopher Cox trails behind.

Lewis has testified that former Federal Reserve Chairman Alan Greenspan, former BushFRAUD Treasury Secretary Hank Paulson, along with current Obama Treasury Secretary Timothy Geithner and current Federal Reserve Chairman Bernard Bernanke, as well as former illegal White House occupant George W. Bush FRAUD, himself, coordinated a secret money laundry involving the Galleon Group hedge fund that allowed Wells Fargo Bank to wire BILLIONS of dollars of STOLEN U.S. Taxpayers’ funds to finance the Bank of America ‘bail out’ of Merrill Lynch that took place in December of 2008.

Note: These funds are also linked to the $1 TRILLION Chinese loan.

Wells Fargo moved most of the funds from an offshore hedge fund in the Philippines that, along with the India-Pakistan based Galleon Group hedge fund, was immune from any Congressional or SEC oversight based on national security consideration.

These alleged hedge funds supposedly had a role in identifying financial terrorist activity of alleged Al Qaeda.

Nothing could be further from the truth!

The Philippines based Wells Fargo funds and the aforementioned Galleon Group have now been fingered by New York investigators as a major financial supporter of the alleged Al Qaeda terrorist organization Jundallah.

BushFRAUD and his former Vice pResident Richard Cheney used this organization for various terrorist black ops in Afghanistan, Iraq and Iran.

Jundallah was used, and IS being used in the recent bombings in Pakistan as to prevent FBI investigators from looking into the Galleon Group hedge fund.

Jundallah has been directly linked to the assassination of former Pakistani Prime Minister Benazir Bhutto as well as the violent terrorist blacks ops staged in Iran and in Mumbai (Bombay), India.

Jundallah and its cells have recently splintered off because their cash flow has been cut off and are now being directed by the Sunni insurgency as well as British Intelligence in Iraq to stage false flag terrorist attacks and are being paid by none other than Blackwater Associates and STOLEN funds from the Central Bank of Iraq tied to none other than former British Prime Minister, Dunblaine pedophile and war criminal, Anthony Blair.

So you see, folks, this whole phony war on terror dating back to 9/11 is nothing more than a massive financial Ponzi Scheme involving crooked hedge funds and out-of-control nation states that want to set up a permanent anti-terrorist infrastructure that will destroy basic individual rights of citizens worldwide, including, of course, destroying the Constitution of the United States and the American Republic.

Rollback of Dodd-Frank Provisions Clears Senate On 10-Year Anniversary Of Bear Stearns Collapse

by Tyler Durden

Thu, 03/15/2018

A bipartisan bill which would relax restrictions placed on the financial industry during the credit-crisis has cleared the Senate with a vote of 67-31, on the 10-year anniversary of the collapse of Bear Stearns – but not before several changes to the original legislation were made, which would benefit big banks.

A bill that began as a well-intentioned effort to satisfy some perhaps legitimate community bank grievances has instead mushroomed, sparking fears that Washington is paving the way for the next financial meltdown,” writes David Dayen of The Intercept.

Key Provisions

​READ MUCH MORE

https://www.zerohedge.com/news/2018-03-15/rollback-dodd-frank-provisions-clears-senate-10-year-anniversary-bear-stearnsUpload Files

September 15, 2013   Tom Heneghan

Bill Clinton signs into law the Gramm-Leach-Bliley Financial Services Modernization Act, November 12, 1999

[…] The 1999 Financial Services Modernization Act (FSMA) was conducive to the the repeal of the Glass-Steagall Act of 1933. A pillar of President Roosevelt’s “New Deal”, the Glass-Steagall Act was put in place in response to the climate of corruption, financial manipulation and “insider trading” which resulted in more than 5,000 bank failures in the years following the 1929 Wall Street crash.

Under the 1999 Financial Services Modernization Act, effective control over the entire US financial services industry (including insurance companies, pension funds, securities companies, etc.) had been transferred to a handful of financial conglomerates and their associated hedge funds.

http://www.globalresearch.ca/who-are-the-architects-of-economic-collapse/

United STATES of America   –   Today we present clear cut evidence from awarding winning journalist Greg Palast that Clinton-Bush Crime Family Syndicate bank stooge Larry Summers should be blocked by Congress from ever being Federal Reserve Chairman.

Summers lobbied Congress, along with former Texas Republican Senator Phil Gramm and former Clinton era U.S. Treasury Secretary Robert Rubin, to have the depression era Glass-Steagall Act revoked.

It was former President Bill Clinton that signed legislation in 1999 that eliminated the Glass-Steagall Act.

The Glass-Steagall Act had protected Americans’ savings deposits for decades and had prevented banks from participating in proprietary trading aka casino gambling using U.S. savings deposits as collateral

P.S. At this hour Swedish banks face a major liquidity crisis involving ass backwards derivatives tied to their currency, the krona.

In closing, it is time to reinstate Glass-Steagall and prevent Larry Summers from cross-collateralizing any more derivatives, which represent U.S. Taxpayers’ funds.

$1 Trillion In US Bank Deposits Held Abroad Will No Longer Be Insured

http://www.zerohedge.com/news/2013-09-10/1-trillion-us-bank-deposits-held-abroad-will-no-longer-be-insured

April 3, 2013   Tom Heneghan

In closing it is important to remember who signed the 1999 legislation that got rid of the Glass-Steagall Act that protected the savings of average Americans since depression days.

It was Bush Crime Family crony Bill Clinton enabled by his crooked wife, Benghazi war criminal, Hillary Rodenhurst Clinton, then Treasury Secretary Robert Rubin and further enabled by Christopher Dodd, Barney Frank, Newt Gingrich and bald headed misfit, former Texas Senator Phil Gramm, whose wife Wendy (who was then head of the CFTC) lobbied for this legislation, which now threatens to wreck the entire world economy.

April 2, 2015   Tom Heneghan

It gets even worse!

We can now divulge that the privately owned U.S. Federal Reserve (controlled by the Bank of England) has been accommodating Bank of America, JPMorgan Chase and the New York Mellon Bank in disguising massive wrap around (non-collateralized without margin) derivative debt tied to Bank of America and the George W. Bush FRAUD – Henry Paulson mortgage-backed securities scam that helped wreck and destroy, along with Bear Stearns, the U.S. economy in 2007 and 2008.

April of 2008   Tom Heneghan

 …The current AIPAC trial, which is being delayed in U.S. Federal Court in Virginia, deals with new evidence linking elements of the Israeli MOSSAD-run New Jersey-based Urban moving Systems to command and control in the 9/11 attack on America.

There is also evidence, which is financial in nature, tying both Viktor Bout and unelectable LOSER Hillary Clinton fundraiser and 9/11 co-conspirator, Mehmet Celebi, to PRE-9/11 put options and short positions placed on the New York Stock Exchange and the Chicago Board of Options in both airline and insurance stocks just prior to 9/11.The brokerage firm fingered in orchestrating this financial TREASON is none other than Bear Stearns offices in Chicago, Illinois and Winter Springs, Florida.

Reference: The criminal Bush fraud Administration has just recently bailed out Bear Stearns with U.S. TAXPAYERS.

2008 by Tom Heneghan

BUSH-CLINTON 9/11 LINKED BEAR STEARNS, “RHINELAND FUNDING”,

the great misnomer THE FEDERAL RESERVE, (private bankers)

AND THE LOOTING OF THE U.S. TREASURY

Fed Bails Out Bear Stearns

Stocks Tumble After Bear Stearns Bailout

PREVIOUS INTELLIGENCE BRIEFINGS RELATED TO 9/11 TIED BEAR STEARNS HEDGE FUND:

September 4, 2007   Tom Heneghan

 …P.S. Newsweek Magazine is claiming that bin Laden is still alive. 

Reference: Bin Laden died of kidney failure six years ago.

Bin Laden actually went to a CIA hospital in Dubai, United Arab Emirates in July of 2001, just two months prior to 9/11, to receive dialysis treatment for his failing kidneys.

That is correct folks! Two months before 9/11 bin Laden, i.e. Tim Osman (bin Laden’s name within the CIA was Tim Osman), was a “Dead Man Walking”.

So the question in front of us is the following:

Why is Newsweek Magazine and its editor, homosexual in-the-closet Jon Meacham, and his buddy Mossad agent Michael Isikoff trying to keep bin Laden alive?

The answer folks is simple. Bin Laden’s holdings in the defunct Bear Stearns Hedge Fund are subject to an IRS tax levy at the time of his death.

Since Newsweek Magazine and the British Royal Family have major holdings in the Bear Stearns Hedge Fund and the Carlyle Group it is necessary to keep bin Laden alive.

September 8, 2007   Tom Heneghan 

…Notice to homosexuals in-the-closet Freddy Thompson and Jon Meacham:  I still have the America Global China documents that you covered up to protect both Bush and Clinton; and just a reminder that I still have the Red Mercury-Gary Best-FBI Division 5-Osama bin Laden-Al Qaeda financial contractual agreements.

Could this be the reason the Bear Stearns Hedge Fund collapsed.

And one last warning to the U.S. media filth:  We are monitoring you 24 hours a day and watching your lies and spin as you present this bogus bin Laden tape as something real.

September 15, 2007   Tom Heneghan  

…Reference: Informed sources familiar with Bank of America and Bear Stearns allege that the Federal Reserve is on orders from Bushfraud to bail out Bank of America and the Bear Stearns Hedge Fund.

Note: The Northern Rock Bank of the United Kingdom has already collapsed because of the criminal money laundering of both Bank of America and Bear Stearns Hedge Fund.

November 18, 2007   Tom Heneghan  

…It can now be reported that White House occupant George W. Bushfraud has nominated his enabler Judge Mark R. Filip for Deputy Attorney General of the United States, (312) 435-5667.

Filip, a former law clerk to grease ball fascist Justice Anthony Scalia, now sits as a Federal Judge on the U.S. Court of Appeals Court in Chicago.

Now let’s look at Filip’s jaded background.

Before his appointment to the Illinois bench, Filip worked at a noted law firm in Chicago called Skadden Arps.

Skadden Arps has been linked to the bribes of Florida election officials in the overthrow of the year 2000 presidential election, i.e. Albert Gore’s victory.

And, of course, it gets worse!

The funds for the fix derived from CIA stooge corporation Coca Cola, General Electric Accola and the Walt Disney ABC News organization.

The bagman and fixer was none other than 9/11 co-conspirator, former U.S. Solicitor General Ted Olson.

Upon further investigation, the Florida 2000 bribery funds have been traced to Winter Springs, Florida Bear Stearns Brokerage.

Bear Stearns Winter Springs, Florida actually facilitated an IPO on a noted software company called Choicepoint software.

Choicepoint software was used by the State of Florida in the year 2000 to ILLEGALLY purge over 50,000 African-Americans off the voter rolls and falsely classify them as convicted felons preventing them from voting.

The leadership team directing this TREASON project was none other than Florida Governor Jeb Bush, Ted Olson, Judge Mark Filip and Florida’s Secretary of State and noted slut Katherine Harris.

And, of course, it keeps getting worse!

Olson not only helped to facilitate bribes to the Gang of Five on the U.S. Supreme Court, which overthrew Albert Gore’s election as president, but also facilitated bribery for Chicago Judges Filip, Darrah and Wedoff who were hearing arguments on the Coca Cola copyright case tied to ABC Mickey Mouse Walt Disney, whose major stockholders included Floridagate 2000 fixer James Baker, current Supreme Court Justice John Roberts and none other than unelectable Hillary lesbian IN-THE-CLOSET Rodenhurst Clinton’s brother Hugh Rodham.

Rodham represented none other than Colombian Medellian drug cartel boss Carlos Lehdrer.

Lehdrer was later pardoned by Florida Governor Jeb Bush. Lehdrer has been linked to dirty Floridagate 2000 narcotics money, and the noted 9/11 SunCruz casino ships that Mohamed Atta allegedly gambled .. 9/11.

Lehdrer even had a trading account at Bear Stearns in Winter Springs, Florida.

The crime spree involving these conspirators continues.

November 20, 2007   Tom Heneghan

…It can now be reported that Bushfraud’s recently resigned Homeland Security Advisor, Frances Fragos Townsend, is under criminal investigation for perjury and obstruction of justice in regards to the warrant-less wiretapping that was ordered by occupunk George W. Bush against the American People PRE 9/11.

TOWNSEND, A LIFELONG STOOGE AND OPERATIVE OF THE BUSH-CLINTON CRIME FAMILY SYNDICATE ACTUALLY DESTROYED INCRIMINATING DOCUMENTS, EMAILS AND CABLES THAT HAVE A DIRECT LINK TO THE INFORMATION THAT FBI WHISTLEBLOWER SIBEL EDMONDS HAD DISCOVERED, WHICH WARNED THE U.S. GOVERNMENT OF THE PENDING 9/11 ATTACK.

Reference: Daniel Ellsberg, the individual who helped release the “Pentagon Papers” in the early 1970s, has been quoted saying that the Sibel Edmonds evidence directly involves criminal activity and impeachable offenses by the highest levels of the Bush Administration, including the alleged President and Vice President. 

The French PRE 9/11 WARNING to the U.S. government, i.e. the U.S. State Department, which was the intercepted Israeli Intelligence-MOSSAD cable containing the 9/11 command order “the time is now, the match is hot”, was withheld from the Patrick Fitzgerald investigation by none other than both Frances Fragos Townsend and current head of the Department of Homeland Security, MOSSAD agent, Michael Chertoff.

Remember folks, this 9/11 TREASON information and evidence was also available in advance to the New York State delegation including then New York Attorney General Eliot Spitzer, now New York governor, MOSSAD asset Charles Schumer, Democrat of New York, and of course, MOSSAD agent, unelectable CLOSET lesbian Hillary Rodenhurst Clinton.

NOTE: THE FRENCH INTERCEPTS OF ISRAELI CABLES FROM THE MOSSAD OUTPOST IN DUBAI, UNITED ARAB EMIRATES (UAE) DEALT DIRECTLY WITH ISRAELI INTELLIGENCE INTENTIONS TO MAKE THEIR MOSSAD-AL QAEDA CELLS IN THE UNITED STATES OPERATIONAL FOR THE PURPOSE OF A TERRORIST ATTACK.

SO THE COMMAND AND CONTROL FOR THE 9/11 BLACK OPS ATTACK ON THE UNITED STATES CAME FROM A DUBAI, UAE ISRAELI INTELLIGENCE OUTPOST.

Once again it was our great ally of 200 years, The Republic of France, that tried to save America from this TREASON conspiracy against the American People.

Do not be fooled by the controlled American media elite’s latest spin that Matt McClellan, former Bushfraud press secretary, was lied to by the Bush Administration in regards to the Valerie Plame case.

Both Patrick Fitzgerald and the Bush Administration knew all along that Richard Armitage was the leaker. So there never has, or never will be, a real case involving Valerie Plame’s status.

What Matt McClellan, the Bushfraud Administration and the media elite filth want to do is to spin and defer from the REAL question before us, which deals with the SEALED NATIONAL SECURITY FILINGS MADE BY FITZGERALD IN THE INDICTMENT OF SCOOTER LIBBY.

Remember, the indictment of Libby was for perjury and obstruction of justice, it had nothing to do with the question of Valerie Plame’s alleged “outing” as a CIA agent.

Fitzgerald continues to investigate the larger question dealing with 9/11 and the attempt to plant WMDs in Iraq utilizing Dubai, UAE.

That road of inquiry takes us right back to the American-Turkish Council and the TREASON evidence Sibel Edmonds is holding.

Item: So we now see why Bushfraud needs to appoint Judge Mark Filip of Chicago, Illinois as Deputy Attorney General of the United States.

Filip continues to engage in felony obstruction of justice in the matter of not only 9/11 and the ILLEGAL war in Iraq, but the bribery and criminal conspiracy that overlaps in the overthrow and coup d’ etat that took place in Florida, i.e. the year 2000 presidential election.

Remember the sealed National Security filings of Fitzgerald connect the dots from Floridagate 2000 to the 9/11 Mohamed Atta SunCruz Casinos and the role of both Valeria Plame and Scooter Libby in the Bush-Clinton “TRUE COLORS” assassination teams.

The financial records taken from the American-Turkish Council by Sibel Edmonds traced the financial funding for all of this TREASON to a Bear Stearns brokerage house in Winter Springs, Florida with a direct connection to the LaSalle Bank in Chicago.

Dec 21, 2007  Tom Heneghan

…P.S. We are now working on a story involving the Cayman Islands and secret offshore accounts tied to daddy Bush, Jeb Bush, noted 2000 election fixer Katherine Harris, along with Bill and Hillary Clinton, and current Republican presidential candidate Mitt Romney.

Some of the funds in the offshore accounts of these individuals were actually stolen and laundered utilizing the now bankrupt Bear Stearns Hedge Funds.

The Bear Stearns office in Chicago, Illinois is now the focus of U.S. Treasury investigators.

The Chicago Bear Stearns office has been tied to massive wire transfers of Euro currency through the Cayman Islands.

Also tied up in this fiasco is the Key Bank Utah, a known front for the Church of Latter Day Saints, i.e. the Mormon Church.

Reference: This investigation in Utah ties back to millions of dollars missing from the Utah Olympic project involving the Bushes, the Clintons, homosexual IN-THE-CLOSET Senator Orrin Hatch and current Republican presidential candidate Mitt Romney.

January 1, 2008   Tom Heneghan

  …Al Qaeda and the government of Pakistan have found their way into the campaign coffers of UNELECTABLE lesbian IN-THE-CLOSET Hillary Rodenhurst Clinton, Democrat of New York, “Barbie doll” and serial flip-flopper Mitt Romney, Republican of Massachusetts, as well as CLOSET homosexual and abortion lobbyist Fred Thompson, and pedophile Bill Richardson, Democrat of New Mexico.

Reference: Some of these funds are actually offshoots of the late Osama bin Laden’s construction company.

These funds were laundered through the now defunct Riggs Bank in Washington D.C. into offshore CIA proprietaries in the Cayman Islands and then actually placed in the accounts of these political New World Order stooges through on-shore firms, like General Electric NBC and Bear Stearns.

Note: Bear Stearns, which is now broke, was linked to American Insurance Group (AIG) and PRE 9/11 put options placed on the New York and Chicago financial exchanges 72 hours before the September 11th attacks.

POLITICAL WHORE ALERT

Do not be fooled by the potential presidential candidacy of Khazarian Jew and current New York Mayor Michael Bloomberg.

Bloomberg, a 9/11 co-conspirator, has covered up the American International Group (insurance/financial) Hank Greenberg’s PRE 9/11 put option scam run through Bear Stearns on major insurance companies like Swiss and German ReInsurance.

Bloomberg is also covering up, not only for Bear Stearns and American Insurance Group (AIG), but also for the activities PRE-9/11 at the American-Turkish Council and the secret correspondence between Hank Greenberg, the American-Turkish Council and noted Khazarian Jew and war criminal, Henry Kissinger.

Note: It was the unelected Bushfraud that wanted to place Kissinger as the chairman of the so-called 9/11 Commission.

February 14, 2008   Tom Heneghan

 …Celebi, a dual Turkish-U.S. citizen, was named as a MAJOR player in the MOSSAD-riddled 9/11 linked arms and narcotics counterfeiting racket run at the noted American-Turkish Council headquarters in Ankara, Turkey.

Celebi worked at the American-Turkish Cultural Alliance in Chicago, Illinois and also worked part-time at the Turkish Consulate in Chicago.

Sibel Edmonds, with the help of French Intelligence, intercepted conversations at the American-Turkish Council, which fingered Henry Kissinger and former British Prime Minister Tony Blair to known Al Qaeda cells in Hamburg, Germany.

Reference: This terrorist cell is operated by known UNELECTABLE Hillary stooge and business partner EVA TELEGE aka TELEKE aka TELEKI, who is a wanted suspect in the 7/7 London bombings.

Celebi’s name was mentioned in some of the conversations that originated from the American-Turkish Council and the Turkish Consulate in Chicago.

Celebi seems to have been a bagman for various financial trading schemes linked to “put options” placed at Bear Stearns in Chicago just prior to 9/11.

Note: Celebi had been identified in 1999 by then Vice President Albert Gore Jr., along with Gore’s national security adviser Leon Fuerth and Clinton Administration anti-terrorist point man Richard Clarke as being involved in Al Qaeda terrorist funding utilizing the American-Turkish Cultural Alliance and known Colombian cartel drug lord Carlos Lehder as co-conspirators (Hillary Clinton’s brother Hugh Rodham was attorney for drug lord Lehder – then Governor Jeb Bush ILLEGALLY pardoned his co-conspirator Lehder).

Also mentioned with Celebi in the criminal referral, which was given to Clinton’s Attorney General Janet Reno was East German DVD agent and UNELECTABLE Hillary Rodenhurst Clinton adviser EVA TELEGE aka TELEKE aka TELEKI.

Reference: TELEGE, an East German DVD agent, had infiltrated the Clinton White House and had become a major adviser to then First Lady Hillary Clinton on a project to build an Alabama toll bridge utilizing the funds of noted CIA proprietary account Marvelous Investments Ltd. in Andover, Massachusetts.

Thanks to the work of Gore, Fuerth and Clarke, and FBI investigation was initiated in regards to Celebi but later dropped as President Clinton, i.e. daddy Bush’s little bitch, claimed that Celebi had immunity from prosecution given his status as a Central Intelligence Agency (CIA) operative.

This was all happening at the time that SERIAL RAPIST Bill Clinton and his Secretary of State Madeleine Albright aka Half-bright, allowed Osama bin Laden to escape termination, i.e. assassination, because both Clinton and Albright were afraid that killing bin Laden would immediately trigger billions of dollars laundered through Kosovo and Eastern Europe to be identified as CIA proprietary funds due Ambassador Leo Wanta.

February 24, 2008   Tom Heneghan

 …Speaking of insider trading, it can now be reported that NEW SMOKING GUN 9/11 EVIDENCE is in possession of Justice Department officials loyal to former Deputy Attorney General James Comey.

The new evidence ties Bear Stearns hedge funds and a German bank IKB to PRE-9/11 put options, i.e. short sales, placed on the Chicago Board of Options.

The conduit for this ILLEGAL trading was an offshoot of the Bear Stearns Hedge Fund tied to Deutsche Bank called “Rhineland Funding”.

“Rhineland Funding” has links to the noted Bush-Clinton-Mitt Romney-CIA proprietary account in Andover, Massachusetts called Marvelous Investments Ltd.

Reference: Marvelous Investments Ltd. is headed by CEO and noted fugitive and wanted 7/7 London bombings TERRORIST suspect Eva TELEGE aka TELEKE aka TELEKI.

TELEGE aka TELEKE aka TELEKI has also been linked to the Al Qaeda 9/11 cell in Hamburg, Germany, with direct ties to the East German DVD-MOSSAD money laundering “Rhineland Funding”.

AND NOW IT REALLY GETS WORSE!

“RHINELAND FUNDING” HAS BEEN FINGERED BY FBI WHISTLEBLOWER SYBIL EDMONDS AS HAVING DIRECT LINKS TO THE AMERICAN-TURKISH COUNCIL AND THE BUSH-CLINTON 9/11 TIED BEAR STEARNS HEDGE FUND THAT, ALONG WITH THE U.S. FEDERAL RESERVE, HAS LOOTED THE U.S. TREASURY.

 May God save the United States of America and

 the Constitution of the United States

EXPECT THE UNEXPECTED!

EXECUTIVE EMERGENCY

 PROVOST PROTOCOL OVERRIDE

IS FULLY OPERATIONAL AND

WILL BE FULLY IMPLEMENTED

Al Gore on Restoring the Rule of Law

http://www.acslaw.org/acsblog/al-gore-on-restoring-the-rule-of-law

VITAL FACTS

Prescott Bush aided Hitler’s Nazis – charged with Trading With the Enemy Act

Prescott Bush reportedly adopted Nazi SS Officer Scherff’s son who was renamed George Herbert Walker Bush (Scherff)

Over 100 NAZI scientists were covertly imported into the United States wherein secret experiments were surreptitiously conducted in numerous cities on the American People

George H.W. Bush-Scherff was involved with the assassination of President John F. Kennedy and the attempted assassination of President Ronald Reagan

In 1989 George H.W. Bush-Scherff STOLE $27.5 TRILLION from the American and French People’s Treasuries known as the Wanta-Reagan-Mitterrand Protocols; 29 years later $433 TRILLION is now waiting to be returned to the American and French People — these Treasury funds will pay off national debt, employ millions on restoring America’s infrastructure, lower taxes, eradicate illegal federal income tax, etc.

Bush-Scherff family and CIA assets Bill and Hillary Clinton et al have been the MAJOR drug traffickers into the United States

George H.W. Bush-Scherff and son junior George W. Bush-Scherff aka BushFRAUD used BRITISH and ISRAELI satellites at 7:58 p.m. Central Standard Time on year 2000 presidential election night to flip the American People’s votes in five (5) states and STOLE the year 2000 presidential election from DULY ELECTED President Albert Gore Jr.

Following the ‘Rule of Law’ it has been categorically confirmed by a massive audit of material evidence that Albert Gore Jr. won the year 2000 presidential election by over four (4) million votes and 324 Electoral College votes and Albert Gore Jr. is the DULY ELECTED non-inaugurated President of the United States.

9/11 was a FALSE FLAG Black Op attack on the United States using U.S.-Canadian red/blue war games as a disguise – “Deep State” aka BushScherff-Cheney-Israelis-Saudis — ISRAELIS planted bombs in the WTC Towers, SAUDIS assisted in the funding of the 9/11 attack — many made millions off the near 3,000 murders using put options PRIOR to 9/11

Un-Constitutional “Patriot Act” aka Hitler’s Nazi “Enabling Act” was actually written PRIOR to 9/11 placing the American People into an Orwellian Nazi gestapo spy state

Bush-Scherff Nazi Paperclip CIA asset Tim Osman aka Osama bin Laden was used for ILLEGAL war on innocent Afghanistan People who NEVER attacked the United States used to stop the Taliban nearly eradicating the $1 TRILLION a year poppy opium fields

Phony, fabricated BRITISH “yellow cake” dossier used for ILLEGAL preemptive war on innocent Iraqi People who NEVER attacked the United States.

MILLIONS of unarmed, innocent Iraqi and Afghani People murdered, maimed or displaced

Bush-Scherff’s Nazi Paperclip CIA + BRITISH MI-6 + ISRAELI Mossad + Saudis + Qatar created, train, fund and arm their private terror mercenaries ISIS, Al Nusra, Al Qadea, et al

United States was prosperous for over 60 years until 1913 when the BRITISH Monarchy+Rothschild Bank of England et al private banking/bankster cartel created the (great misnomer) Federal Reserve manipulating the American People’s treasury and economy

Our Founding Father’s NEVER created tax on our labor but funded the federal government via import duties and excise tax

1913 illegal Federal Income tax was for forced on the American People

 

Once over 50 now down to just 6 who control most of the media in the United States

Orwellian cointelpro disinfo propaganda media used to cover up HIGH TREASON of the BushSherff-Clinton-Cheney-Obama Crime Cartel and foment phony fabricated FALSE FLAG wars and shooting massacres

BRITISH intelligence linked to massive U.S. government contracts aka SERCO

BRITISH intelligence linked to numerous False Flag massacres aka G4S employees/former employees

BRITISH intelligence linked G4S handles security at 90% of the American People’s nuclear sites

BRITISH intelligence linked United Arab Emirates (UAE) allowed by Cons r us gress, WITHOUT NOTICE TO THE AMERICAN PEOPLE, to control the American People’s HIGH SECURITY deep water port at Canaveral

BRITISH Monarchy was handed by Cons r us gress our Native Americans’ sacred land of 2,000 years to be desecrated by their Rio Tinto mining company

BRITISH Monarchy’s BP (British Petroleum) was allowed by FOREIGN born in Kenya, illegal White House resident Obama and

Cons r us gress to spray the American People’s gulf waters, shores, sea life with DEADLY COREXIT — it is so deadly it is totally banned in England

 

ISRAELIS are contracted to monitor the American People’s borders aka Elbit

A Great percent of Cons r us gress are bribed and/or blackmailed acting on behalf of foreign ISRAEL and “Deep State” aka

Nazi Paperclip Bush-Scherff, Clinton Crime Cartel

IRREFUTABLE : Nazi Bush(Scherff)-Clinton Crime Family Cartel’s stooge, lying and deceiving the American People, Constitutionally INELIGIBLE illegal White House occupant Barack Hussein Obama-Soetoro was FOREIGN born in Kenya, his father a British Intelligence agent.

HIGH Treason in September of 2009 WITHOUT NOTICE TO THE AMERICAN PEOPLE, then FBI Director Robert Mueller flew to Russia to hand deliver a uranium sample of behalf of Hillary Clinton’s orchestrated Uranium One treason via secret CFIUS – without notice to the American People selling 20% of U.S. uranium to Russia resulting in $145 million in donations to the Clinton Foundation

In 2014 Nazi Bush-Scherff controlled CIA+Hillary Clinton+Victoria Nuland+George Soros used $5 BILLION of AMERICAN PEOPLE’S TAX DOLLARS in the criminal, illegal orchestrated coup d’etat illegal overthrow of the duly elected Ukraine president resulting in neo-Nazis merging into the Ukraine national guard, more Soros control of Urkaine banks and Vice President Joe Biden’s son sudden appointment to the board of Burisma Holdings, Ukraine’s largest gas producer

HIGH Treason espionage ISRAELI Mossad agent Hillary Clinton knowingly allowed highly classified, top-secret and above and beyond top-secret Special Access Programs (SAP) national security intelligence on her personal unsecured home computer endangering the American People’s national security.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan March 19 2018

5’4″ Larry Mizel and Larry Mizell

aka Napolitano complex Larry Mizel

aka Larry Mizel Larry Mizzell aka Karl ?   Carl?? Ownes Westport Square Parking Lot. (Hot Spot 20/s Kansas City, Missouri.

By Stew Webb United States Federal Whistle blower 34 Years and still breathing

Radio Stew Webb and Tom Heneghan March 19 2018

more to come stay tuned!

 

Intel Update – Tom Heneghan Stew Webb (3-19-18) from Truth Warriors on Vimeo.

Your kind Contributions are very much appreciated thank you, I have not thank you by email who have contributed to keep you from been identified. – Stew Webb

 




Denver level3 cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Houston, United States visited http://www.stewwebb.com/
3/16/2018 8:59:47 AM (11 minutes ago)
IP: 74.203.161.189 Hostname: vpn.puffer.com
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
NetRange: 74.202.0.0 – 74.203.255.255
[131072 addresses in this network]
CIDR: 74.202.0.0/15 (74.202.0.0 – 74.203.255.255)
[131072 addresses in this network]
NetName: TWTC-NETBLK-9
NetHandle: NET-74-202-0-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: tw telecom holdings, inc. (TWTC)
RegDate: 2006-11-14
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-74-202-0-0-1
OrgName: tw telecom holdings, inc.
OrgId: TWTC
Address: 10475 Park Meadows Drive
City: Littleton
StateProv: CO
PostalCode: 80124
Country: US
RegDate: 1999-03-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/TWTC

ReferralServer: rwhois://rwhois.twtelecom.net:4321

OrgNOCHandle: TDN1-ARIN
OrgNOCName: TWTC Data NOC
OrgNOCPhone: +1-800-829-0420
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/TDN1-ARIN

OrgTechHandle: NST12-ARIN
OrgTechName: NOC SWIP Team
OrgTechPhone: +1-800-829-0420
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/NST12-ARIN

OrgAbuseHandle: TWTAD-ARIN
OrgAbuseName: tw telecom Abuse Desk
OrgAbusePhone: +1-800-829-0420
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/TWTAD-ARIN

RAbuseHandle: TWTAD-ARIN
RAbuseName: tw telecom Abuse Desk
RAbusePhone: +1-800-829-0420
RAbuseEmail: security@level3.com
RAbuseRef: https://whois.arin.net/rest/poc/TWTAD-ARIN

RTechHandle: ZT87-ARIN
RTechName: IP Manager
RTechPhone: +1-800-829-0420
RTechEmail: ipmanager@level3.net
RTechRef: https://whois.arin.net/rest/poc/ZT87-ARIN

RNOCHandle: TDN1-ARIN
RNOCName: TWTC Data NOC
RNOCPhone: +1-800-829-0420
RNOCEmail: noc.coreip@level3.com
RNOCRef: https://whois.arin.net/rest/poc/TDN1-ARIN
74.203.161.189
P address 74.203.161.189
Location Richmond, Texas, United States (US
IP address 74.203.161.189
Reverse DNS (PTR record) vpn.puffer.com
DNS server (NS record) ns3.level3.net (216.136.95.12)
ns4.level3.net (64.132.94.251)
ASN number 3549
ASN name (ISP) Level 3 Parent, LLC
IP-range/subnet 74.202.0.0/15
74.202.0.0 – 74.203.255.255
74.203.161.189
Number of SPAM hosts on 74.202.0.0/15 1
NetRange: 74.202.0.0 – 74.203.255.255
CIDR: 74.202.0.0/15
NetName: TWTC-NETBLK-9
NetHandle: NET-74-202-0-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: tw telecom holdings, inc. (TWTC)
RegDate: 2006-11-14
Updated: 2012-02-24
OrgName: tw telecom holdings, inc.
OrgId: TWTC
Address: 10475 Park Meadows Drive
City: Littleton
StateProv: CO
PostalCode: 80124
Country: US
RegDate: 1999-03-17
Updated: 2017-01-28
800-829-0420
vpn.puffer.com
This domain is hosted by Google LLC (AS15169). The first DNS server is ns3.level3.net. The current IPv4 address is 35.185.199.214. The mail server with the highest priority is puffer-com.mail.protection.outlook.com.
v=spf1 include:spf.protection.outlook.com -all
DNS server (NS records) ns3.level3.net (216.136.95.12)
ns4.level3.net (64.132.94.251)
Mail server (MX records) puffer-com.mail.protection.outlook.com (216.32.180.106)
IP address (IPv4) 35.185.199.214
IP address (IPv6)
ASN number 15169
ASN name (ISP) Google LLC
IP-range/subnet 35.185.192.0/19
35.185.192.0 – 35.185.223.255
Domain Name: PUFFER.COM
Registry Domain ID: 514963_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-11-07T23:28:29Z
Creation Date: 1993-08-30T04:00:00Z
Registrar Registration Expiration Date: 2018-08-29T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registry Registrant ID:
Registrant Name: Puffer-Sweiven, Inc
Registrant Organization: Puffer-Sweiven, Inc
Registrant Street: 4230 GREENBRIAR DR
Registrant City: STAFFORD
Registrant State/Province: TX
Registrant Postal Code: 77477-3917
Registrant Country: US
281-240-2000
puffer.com
Tech Name: Jean-baptiste, Francis
Tech Organization: Puffer-Sweiven
Tech Street: 4230 GREENBRIAR DR
Tech City: STAFFORD
Tech State/Province: TX
Tech Postal Code: 77477-3917
Tech Country: US
281-274-8709

Are you looking for IPv4 address 74.203.161.189?

Domain IPv4 address Ranking Alexa Pagerank
puffer.at 184.168.221.20
puffer.biz 107.180.0.221
puffer.ca 158.85.87.76
puffer.ch 23.227.38.32
puffer.club 5.35.241.113
left off
just puffer.com

puffer.cn 222.171.249.218
puffer.co 54.72.9.51
puffer.co.uk 87.106.142.81
puffer.com 35.185.199.214 2
puffer.com.au 141.8.224.183
puffer.com.br 65.111.191.133
puffer.com.cn 14.1.96.44
puffer.com.co 163.172.120.66 3
puffer.com.pl 85.128.134.232
puffer.com.ve 192.185.154.70
puffer.cz
puffer.de 134.119.86.62
puffer.dk
puffer.eu 72.52.10.14
puffer.fish
puffer.fun
puffer.gr.jp 218.228.195.172
puffer.group 192.64.119.57
puffer.hu 87.229.65.42
puffer.idv.tw 220.134.31.101 0
puffer.info 185.53.178.9
puffer.ir 104.237.240.22
puffer.it 92.51.165.88
puffer.link
puffer.ltd
puffer.me 220.135.46.193
puffer.net 1
puffer.nl 37.97.135.129
puffer.no 217.170.198.100 0
puffer.one 46.30.215.110
puffer.online 210.172.183.49
puffer.org 76.19.52.96
puffer.pl 85.128.134.226
puffer.ro 89.42.13.17
puffer.ru 31.31.205.163
puffer.shop 150.95.255.38
puffer.site
puffer.solutions 99.45.96.209
puffer.store
puffer.tech
puffer.top 23.234.27.209
puffer.vip 72.52.4.119
puffer.wang
puffer.xin
puffer.xyz
IPv4 routes
Startip Endip Description Country #domains #spamhosts
192.188.110.0 192.188.110.255 Puffer Sweiven US 0 0
192.190.98.0 192.190.98.255 Puffer Sweiven US 0 0
192.190.99.0 192.190.99.255 Puffer Sweiven US 0 0
192.190.100.0 192.190.100.255 Puffer Sweiven US 0 0
192.190.101.0 192.190.101.255 Puffer Sweiven US 0 0
192.190.102.0 192.190.102.255 Puffer Sweiven US 0 0
192.190.103.0 192.190.103.255 Puffer Sweiven US 0 0
198.207.162.0 198.207.162.255 Puffer Sweiven Inc. US 0 0
198.207.190.0 198.207.190.255 Puffer Sweiven Inc. US 0 0
31.28.96.0 31.28.127.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 14 0
31.47.112.0 31.47.119.255 vpn dynamic pool RU 0 0
31.47.120.0 31.47.123.255 vpn dynamic pool RU 0 0
31.47.124.0 31.47.127.255 vpn dynamic pool RU 0 0
37.1.128.0 37.1.143.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 2 3
37.8.144.0 37.8.159.255 L2TP VPN broadband connections RU 15 0
37.123.216.0 37.123.223.255 WellComm VPN Pool 2 RU 0 0
37.131.192.0 37.131.223.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 13 1
37.152.56.0 37.152.63.255 Customer VPN services located in Falkenberg SE 197 0
37.205.56.0 37.205.63.255 Convergence Group Assigned to Origin Andoversford – Aryzta VPN GB 148 0
41.138.88.0 41.138.91.255 Sous classe utilisée par les équipements du réseau local et les accès VPN BJ 1 1
45.212.0.0 45.215.255.255 -Internet provision for VPN clients. ZM 0 21
45.220.64.0 45.220.127.255 low budget VPN service SC 0 0
46.23.144.0 46.23.159.255 Dianet for VPN and PPPoE dynamic users (pool #13) RU 8 0
46.37.128.0 46.37.159.255 L2TP VPN broadband connections RU 13 0
46.167.64.0 46.167.127.255 vpn dynamic pool RU 3 2
77.247.80.0 77.247.87.255 Sys11 VPN Services UG (haftungsbeschraenkt) DE 32 0
77.247.160.0 77.247.175.255 Credolink ISP VPN pool RU 7 0
81.94.16.0 81.94.31.255 Credolink ISP VPN pool RU 10 1
85.195.128.0 85.195.191.255 Satgate VPN for Sirius3 B16 Nordic RU 3 0
89.40.92.0 89.40.92.255 VPN Services NL 0 0
89.47.15.0 89.47.15.255 VPN Services NL 0 0
92.39.224.0 92.39.239.255 Credolink ISP VPN pool RU 5 0
93.94.200.0 93.94.207.255 Railway VPN NL 0 0
94.125.80.0 94.125.87.255 NAT/PAT space, VPN access, Internet Services IT 0 0
94.190.0.0 94.190.127.255 Non-VPN customers Pervouralsk Sverdlovsk reg. “Interra” Ltd. RU 116 7
94.230.112.0 94.230.127.255 Dianet for VPN and PPPoE dynamic users (pool #02) RU 20 1
95.141.0.0 95.141.15.255 PPTP,PPPOE, VPN and Dial-UP dynamic IP for customers RU 0 0
102.144.0.0 102.151.255.255 -Internet provision for VPN clients. ZM 1 0
103.1.216.0 103.1.219.255 VPN Secure Networks AU 50 0
109.68.136.0 109.68.143.255 Credolink ISP VPN pool RU 2 0
109.105.160.0 109.105.191.255 Comtel vpn client access RU 0 0
109.201.192.0 109.201.223.255 vpn dynamic pool RU 1 1
115.124.32.0 115.124.35.255 Tesonet VPN Retail Internal AU 2 AU 0 0
157.97.120.0 157.97.127.255 VPN Consumer Network NL 1 0
159.180.0.0 159.180.63.255 Tesonet Internal VPN GB 0 0
169.239.152.0 169.239.155.255 VPN Company SC 0 0
169.239.224.0 169.239.227.255 Retail VPN Infrastructure ZA1 ZA 0 0
178.18.96.0 178.18.111.255 vpn dynamic pool RU 0 1
178.211.160.0 178.211.191.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 5 1
185.3.16.0 185.3.19.255 Dianet for VPN and PPPoE dynamic users (pool #20) RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:67c:2a0c:: 2001:67c:2a0c:ffff:ffff:ffff:ffff:ffff ITENOS Protect VPN Service DE 0 0
2a00:8ec0:: 2a00:8ec0:ffff:ffff:ffff:ffff:ffff:ffff Sys11 VPN Services UG (haftungsbeschraenkt) DE 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
38814 Asiamax Technology Limited VPN Service Provider Hong Kong HK 1 0 0 2

Are you looking for domain puffer.com?
level3.net
DMOZ directory. This domain is hosted by Level 3 Communications, Inc. (AS3356). The first DNS server is ns1.level3.net. The current IPv4 address is 4.68.80.110. The mail server with the highest priority is cluster5.us.messagelabs.com.
DNS server (NS records) ns1.level3.net (209.244.0.1)
ns2.level3.net (209.244.0.2)
Mail server (MX records) cluster5.us.messagelabs.com (216.82.251.35)
cluster5a.us.messagelabs.com (216.82.251.230)
IP address (IPv4) 4.68.80.110
IP address (IPv6)
ASN number 3356
ASN name (ISP) Level 3 Communications, Inc.
IP-range/subnet 4.0.0.0/9
4.0.0.0 – 4.127.255.255
Registry Registrant ID:
Registrant Name: Level 3 Communications, LLC
Registrant Organization: Level 3 Communications, LLC
Registrant Street: 1025 El Dorado Blvd.,
Registrant City: Broomfield
Registrant State/Province: CO
Registrant Postal Code: 80021
Registrant Country: US
720888-1000
720-888-5619

 




Longmont Colorado Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

March 15, 2018

cogentco, psi, gandi, Endurance
United States Longmont, United States visited http://www.stewwebb.com/
3/14/2018 10:26:43 PM (11 hours 11 mins ago)
IP: 161.97.228.132 Hostname: 161.97.228.132
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
NetRange: 161.97.192.0 – 161.97.255.255
[16384 addresses in this network]
CIDR: 161.97.192.0/18 (161.97.192.0 – 161.97.255.255)
[16384 addresses in this network]
NetName: COL-LPC
NetHandle: NET-161-97-192-0-1
Parent: NET161 (NET-161-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Longmont Power & Communications (CL-651)
RegDate: 2016-08-18
Updated: 2016-08-18
Ref: https://whois.arin.net/rest/net/NET-161-97-192-0-1

OrgName: Longmont Power & Communications
OrgId: CL-651
Address: 1100 S. Sherman St
City: Longmont
StateProv: CO
PostalCode: 80501
Country: US
RegDate: 2014-06-26
Updated: 2015-06-30
Ref: https://whois.arin.net/rest/org/CL-651

OrgTechHandle: GARCI445-ARIN
OrgTechName: Garcia, Juan
OrgTechPhone: +1-303-774-4359
OrgTechEmail: juan.garcia@longmontcolorado.gov
OrgTechRef: https://whois.arin.net/rest/poc/GARCI445-ARIN

OrgAbuseHandle: ADMIN5306-ARIN
OrgAbuseName: Administrator
OrgAbusePhone: +1-303-651-8796
OrgAbuseEmail: jeff.grant@longmontcolorado.gov
OrgAbuseRef: https://whois.arin.net/rest/poc/ADMIN5306-ARIN

OrgTechHandle: ADMIN5306-ARIN
OrgTechName: Administrator
OrgTechPhone: +1-303-651-8796
OrgTechEmail: jeff.grant@longmontcolorado.gov
OrgTechRef: https://whois.arin.net/rest/poc/ADMIN5306-ARIN

OrgNOCHandle: ADMIN5306-ARIN
OrgNOCName: Administrator
OrgNOCPhone: +1-303-651-8796
OrgNOCEmail: jeff.grant@longmontcolorado.gov
OrgNOCRef: https://whois.arin.net/rest/poc/ADMIN5306-ARIN
Domain longmontcolorado.gov is listed in the top million list of Alexa on number 126,858. The highest ranking ever is 119,851 and was reached on 2016-07-09. It is listed in the DMOZ directory. This domain is hosted by Cloudflare, Inc. (AS13335). The first DNS server is kate.ns.cloudflare.com. The current IPv4 address is 104.24.19.42. The mail server with the highest priority is longmontcolorado-gov.mail.protection.outlook.com.
v=spf1 ip4:69.87.213.124 ip4:69.87.213.187 ip4:69.87.213.43
ip4:69.87.213.25 ip4:1.2.3.4
@@@@@@@@@@@@@@@@@@@
???????????????????
include:enotify.visioninternet.com
IP address 38.106.5.33
Location United States (US) flag
Registry arin
IP address 38.106.5.33
Reverse DNS (PTR record) enotify.visioninternet.com
DNS server (NS record) ns1.visioninternet.com (205.251.192.192)
ns2.visioninternet.com (205.251.195.246)
ASN number 393929
ASN name (ISP) Simpatico Systems
IP-range/subnet 38.106.4.0/23
38.106.4.0 – 38.106.5.255
No domains found.
Domains around 38.106.5.33
IP address #domains
38.106.5.41 1
38.106.5.42 2
38.106.5.46 1
38.106.5.50 23
38.106.5.52 1
38.106.5.54 3
38.106.5.57 1
38.106.5.63 2
38.106.5.64 1
38.106.5.67 1
38.106.5.68 3
38.106.5.71 1
38.106.5.73 1
38.106.5.76 1
38.106.5.79 1
38.106.5.80 3
38.106.5.81 1
38.106.5.84 2
38.106.5.86 1
38.106.5.88 2
38.106.5.90 1
38.106.5.91 1
38.106.5.93 1
38.106.5.95 1
38.106.5.96 1
38.106.5.99 1
38.106.5.102 3
38.106.5.104 1
38.106.5.106 1
38.106.5.109 2
38.106.5.110 4
38.106.5.115 1
38.106.5.117 1
38.106.5.118 1
38.106.5.121 1
38.106.5.125 1
38.106.5.126 1
38.106.5.127 1
38.106.5.130 2
38.106.5.131 1
38.106.5.134 1
38.106.5.141 1
38.106.5.142 4
38.106.5.144 1
38.106.5.145 1
38.106.5.147 1
38.106.5.154 1
38.106.5.155 1
38.106.5.157 1
38.106.5.158 1
38.106.5.159 2
38.106.5.160 2
38.106.5.161 1
38.106.5.162 1
38.106.5.163 2
38.106.5.164 2
38.106.5.165 5
38.106.5.166 1
38.106.5.167 1
38.106.5.170 2
38.106.5.174 2
38.106.5.176 2
38.106.5.177 1
38.106.5.178 3
38.106.5.180 1
38.106.5.184 1
38.106.5.187 1
38.106.5.191 1
38.106.5.192 3
38.106.5.193 1
38.106.5.195 2
38.106.5.197 2
38.106.5.199 1
38.106.5.200 1
38.106.5.203 1
38.106.5.204 1
38.106.5.205 1
38.106.5.209 2
38.106.5.210 1
38.106.5.213 2
38.106.5.214 1
38.106.5.215 1
38.106.5.216 3
38.106.5.219 3
38.106.5.229 1
38.106.5.236 3
38.106.5.246 3
38.106.5.247 1
38.106.5.248 1
NetRange: 38.0.0.0 – 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS: AS174
Organization: PSINet, Inc. (PSI)
RegDate: 1991-04-15
Updated: 2011-05-20
OrgName: PSINet, Inc.
OrgId: PSI
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate:
Updated: 2015-06-04
Comment: rwhois.cogentco.com
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
877-875-4311

Are you looking for IPv4 address 38.106.5.33?

Are you looking for domain visioninternet.com?
This domain is hosted by Simpatico Systems (AS393929). The first DNS server is ns-1037.awsdns-01.org. The current IPv4 address is 38.106.4.34. The mail server with the highest priority is west.smtp.mx.exch081.serverdata.net.
@@@@@@@@@@@@@@@@@@
???????????????????
v=spf1 mx a a:mail.visioninternet.com include:enotify.visioninternet.com include:spf.dynect.net include:spf.intermedia.net include:_spf.salesforce.com include:stspg-customer.com ~a
DNS server (NS records) ns-1037.awsdns-01.org (205.251.196.13)
ns-129.awsdns-16.com (205.251.192.129)
ns-1807.awsdns-33.co.uk (205.251.199.15)
ns-938.awsdns-53.net (205.251.195.170)
Mail server (MX records) west.smtp.mx.exch081.serverdata.net (199.193.206.100)
east.smtp.mx.exch081.serverdata.net (64.78.25.102)
IP address (IPv4) 38.106.4.34
IP address (IPv6)
ASN number 393929
ASN name (ISP) Simpatico Systems
IP-range/subnet 38.106.4.0/23
38.106.4.0 – 38.106.5.255
Domain Name: VISIONINTERNET.COM
Domain ID: 5582769_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registrar URL: www.domain.com
Updated Date: 2016-03-28T13:59:07Z
Creation Date: 1997-04-10T04:00:00Z
Registrar Registration Expiration Date: 2018-04-11T04:00:00Z
Registrar: Domain.com, LLC
Registrar IANA ID: 886
Registry Registrant ID:
Registrant Name: Kevin Chen
Registrant Organization: Vision Technology Solutions, LLC
Registrant Street: 2530 Wilshire Blvd., 2nd Floor
Registrant City: Santa Monica
Registrant State/Province: California
Registrant Postal Code: 90403
Registrant Country: US
310-656-3100
dotster-inc.com
This domain is hosted by The Endurance International Group, Inc. (AS29873). The first DNS server is ns2.yourhostingaccount.com. The current IPv4 address is 65.254.238.139. The mail server with the highest priority is mail.dotster-inc.com.
v=spf1 ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:12.45.243.128/26 ip4:65.254.224.0/19 ?al
DNS server (NS records) ns2.yourhostingaccount.com (65.254.254.155)
ns3.yourhostingaccount.com (50.201.183.103)
ns1.yourhostingaccount.com (65.254.254.102)
Mail server (MX records) mail.dotster-inc.com (65.254.254.52)
IP address (IPv4) 65.254.238.139
IP address (IPv6)
ASN number 29873
ASN name (ISP) The Endurance International Group, Inc.
IP-range/subnet 65.254.224.0/19
65.254.224.0 – 65.254.255.255
Domain Name: DOTSTER-INC.COM
Domain ID: 1482354788_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registrar URL: www.domain.com
Updated Date: 2017-04-30T03:47:26Z
Creation Date: 2008-05-29T03:11:10Z
Registrar Registration Expiration Date: 2018-05-29T03:11:10Z
Registrar: Domain.com, LLC
Registrar IANA ID: 886
Reseller: Domain Name Holding Company, Inc
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: Endurance International Group West, Inc
Registrant Street: 10 Corporate Drive, Suite 300 Suite 300
Registrant City: Burlington
Registrant State/Province: MA
Registrant Postal Code: 01803
Registrant Country: US
360-449-5900
endurance.com
This domain is hosted by Unified Layer (AS46606). The first DNS server is ns-1197.awsdns-21.org. The current IPv4 address is 69.195.126.144. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 mx ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19
ip4:66.96.184.0/21 ip4:50.201.183.56/29 ip4:63.149.124.56/29
ip4:65.98.162.72 ip4:65.123.29.213/28 ip4:108.179.194.145
include:_spf.google.com
include:mailgun.org –
DNS server (NS records) ns-1197.awsdns-21.org (205.251.196.173)
ns-1868.awsdns-41.co.uk (205.251.199.76)
ns-667.awsdns-19.net (205.251.194.155)
ns-81.awsdns-10.com (205.251.192.81)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
alt3.aspmx.l.google.com (74.125.23.27)
alt4.aspmx.l.google.com (74.125.135.27)
IP address (IPv4) 69.195.126.144
IP address (IPv6)
ASN number 46606
ASN name (ISP) Unified Layer
IP-range/subnet 69.195.64.0/18
69.195.64.0 – 69.195.127.255
Domain Name: ENDURANCE.COM
Domain ID: 388194_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registrar URL: www.domain.com
Updated Date: 2016-10-21T19:21:42Z
Creation Date: 1997-07-31T04:00:00Z
Registrar Registration Expiration Date: 2024-07-30T04:00:00Z
Registrar: Domain.com, LLC
Registrar IANA ID: 886
Reseller: Domain Name Holding Company, Inc
Registry Registrant ID:
Registrant Name: Domain Manager
Registrant Organization: The Endurance International Group, Inc.
Registrant Street: 10 Corporate Drive Suite 300
Registrant City: Burlington
Registrant State/Province: MA
Registrant Postal Code: 01803
Registrant Country: US

Domain IPv4 address Ranking Alexa Pagerank
visioninternet.ca 38.106.4.34
visioninternet.ch 80.74.142.110
visioninternet.co 38.106.4.34 7
visioninternet.co.uk 193.254.210.60
visioninternet.com 38.106.4.34 7
visioninternet.com.ar 64.76.121.130
visioninternet.com.au 208.109.181.75
visioninternet.com.br 191.252.51.57
visioninternet.de 176.9.83.229
visioninternet.hosting 199.192.184.57
visioninternet.net 38.106.4.34
visioninternet.nl 149.210.245.248
visioninternet.org 38.106.4.34
visioninternet.us 38.106.4.34
visioninternetmarketing.com 192.64.119.18
visioninternetonline.com 84.40.53.32
visioninternetserver.co.uk
visioninternetserver.com
visioninternetsystems.com 173.239.97.76
visioninternetsystems.net 50.63.202.39
IPv4 routes

No IPv4 ranges found
IPv6 routes

No IPv6 ranges found
Providers

No providers found
@@@@@@@@@@@@@@@
??????????????
include:spf.protection.outlook.com
@@@@@@@@
??????????????
include:xnspf.paymentus.com
IP address 2620:12a:8000::3
Location United States
IP address 2620:12a:8000::3
Reverse DNS (PTR record) not available
DNS server (NS record) r.arin.net (199.180.180.63)
u.arin.net (204.61.216.50)
x.arin.net (199.71.0.63)
y.arin.net (192.82.134.30)
z.arin.net (199.212.0.63)
arin.authdns.ripe.net (193.0.9.10)
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 2620:12a:8000::/44
2620:12a:8000:: – 2620:12a:800f:ffff:ffff:ffff:ffff:ffff
@@@@@@@@@@@@@@@@@@
????????????????
Domains on 2620:12a:8000::3
Domain Tools
cooperstownbeveragetrail.com
cncf.io
ifaw.org.cn
tm.edu
peakparent.org
outfront.org
vocecommunications.com
nvrpa.org
lawrencehallofscience.org
adcentre.com.au
Domains around 2620:12a:8000::3
IP address #domains
2620:12a:8000::1 3410
2620:12a:8000::2 3324
2620:12a:8000::3 3431
2620:12a:8000::4 3094
Name servers on 2620:12a:8000::3

Overview of name servers hosted on this IP address.
Name server First seen #domains
2017-05-02 1
comensure.com
live-anderson-law-firm.patheon.io
@@@@@@@@@@
????????????
Mail servers on 2620:12a:8000::3
Mail server First seen #domains
2014-08-12 1
aaanorthgate.com
Domain aaanorthgate.com is not listed in the top million list of Alexa. It is not listed in the DMOZ directory. The first DNS server is ns3093.hostgator.com.
DNS server (NS records) ns3093.hostgator.com (192.254.237.209)
ns3094.hostgator.com (192.254.237.21)
Mail server (MX records)
IP address (IPv4)
IP address (IPv6)
ASN number not available
Domain Name: AAANORTHGATE.COM
Registry Domain ID: 1777307759_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2018-01-31T16:40:54Z
Creation Date: 2013-01-30T17:00:38Z
Registrar Registration Expiration Date: 2021-01-30T17:00:38Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrant Organization: AAA Northgate
Registrant Street: 1937 North Sheridan
Registrant City: Peoria
Registrant State/Province: Illinois
Registrant Postal Code: 61604
Registrant Country: US
no phone number
no email

@@@@@@@@@@@@
???????????
2014-08-05 1
chimneysweepshop.com
This domain is hosted by Fastly (AS54113). The first DNS server is ns3qty.name.com. The current IPv4 address is 23.185.0.3. The mail server with the highest priority is chimneysweepshop.com.
v=spf1 +a +mx +ip4:66.198.240.4
+include:spf.supercp.com ~all
DNS server (NS records) ns3qty.name.com (162.88.61.49)
ns2clp.name.com (162.88.60.47)
ns4lpv.name.com (162.88.60.49)
ns1psw.name.com (162.88.61.47)
Mail server (MX records) chimneysweepshop.com (23.185.0.3)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8001::3
2620:12a:8000::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: CHIMNEYSWEEPSHOP.COM
Registry Domain ID: 1627001533_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.name.com
Registrar URL: http://www.name.com
Updated Date: 2018-01-30T22:19:09Z
Creation Date: 2010-11-23T22:10:32Z
Registry Expiry Date: 2026-11-23T22:10:32Z
Registrar: Name.com, Inc.
Registrar IANA ID: 625
name.com
It is not listed in the DMOZ directory. This domain is hosted by Rightside Group LTD (AS22557). The first DNS server is eur2.akam.net. The current IPv4 address is 69.64.159.21. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 a mx ptr ip4:69.64.159.23/32
include:aspmx.googlemail.com
include:servers.mcsv.net
include:mail.zendesk.com -al
DNS server (NS records) eur2.akam.net (95.100.173.64)
aus1.akam.net (184.85.248.65)
use4.akam.net (23.211.133.65)
asia3.akam.net (23.211.61.64)
ns1-242.akam.net (193.108.91.242)
usw5.akam.net (23.211.132.64)
usw1.akam.net (23.61.199.66)
ns1-35.akam.net (193.108.91.35)
eur4.akam.net (84.53.139.64)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
aspmx2.googlemail.com (108.177.14.27)
aspmx3.googlemail.com (74.125.200.27)
IP address (IPv4) 69.64.159.21
IP address (IPv6)
ASN number 22557
ASN name (ISP) Rightside Group LTD
IP-range/subnet 69.64.159.0/24
69.64.159.0 – 69.64.159.255
Registry Registrant ID: Not Available From Registry
Registrant Name: Whois Agent
Registrant Organization: Domain Protection Services, Inc.
Registrant Street: PO Box 1769
Registrant City: Denver
Registrant State/Province: CO
Registrant Postal Code: 80201
Registrant Country: US
720-800-9072
720-975-8725
protecteddomainservices.com

@@@@@@@@@@@@
????????????
2014-07-11 1
consciousnessitself.net
This domain is hosted by Fastly (AS54113). The first DNS server is ns1.zonomi.com. The current IPv4 address is 23.185.0.3. The mail server with the highest priority is consciousnessitself.net.
DNS server (NS records) ns1.zonomi.com (45.79.211.52)
ns2.zonomi.com (139.162.211.108)
Mail server (MX records) consciousnessitself.net (23.185.0.3)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8000::3
2620:12a:8001::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: CONSCIOUSNESSITSELF.NET
Registry Domain ID: 1757335153_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2017-10-23T23:34:48Z
Creation Date: 2012-11-06T02:22:27Z
Registrar Registration Expiration Date: 2018-11-06T02:22:27Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrant Organization: The Avataric Samrajya of Adidam Pty Ltd
Registrant Street: Level 1, 55 Whitehorse Road
Registrant City: Balwyn
Registrant State/Province: Victoria
Registrant Postal Code: 3103
Registrant Country: AU
no phone
no email

@@@@@@@@@@@@@@@@@@@@@@@
?????????????????
2014-04-19 1
healthrationing.org
This domain is hosted by Fastly (AS54113). The first DNS server is authns2.netgainhosting.com. The current IPv4 address is 23.185.0.3. The mail server with the highest priority is healthrationing.org.
DNS server (NS records) authns2.netgainhosting.com (38.65.216.12)
ns1.netgaintechnology.com (38.65.216.12)
ns1.netgainhosting.com (199.96.231.20)
Mail server (MX records) healthrationing.org (23.185.0.3)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8001::3
2620:12a:8000::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: HEALTHRATIONING.ORG
Registry Domain ID: D160852956-LROR
Registrar WHOIS Server:
Registrar URL: www.cscglobal.com/global/web/csc/digital-brand-services.html
Updated Date: 2016-12-02T07:15:46Z
Creation Date: 2010-12-06T17:33:46Z
Registry Expiry Date: 2018-12-06T17:33:46Z
Registrar Registration Expiration Date:
Registrar: CSC Corporate Domains, Inc.
Registrar IANA ID: 299
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Reseller:
Registry Registrant ID: C111139911-LROR
Registrant Name: Domain Administrator
Registrant Organization: Public Radio International
Registrant Street: 401 2nd Avenue North
Registrant Street: Suite 500
Registrant City: Minneapolis
Registrant State/Province: MN
Registrant Postal Code: 55401
Registrant Country: US
800-338-5000
612-330-9222
pri.org
v=spf1 mx include:spf.protection.outlook.com
include:sparkpostmail.com
include:_spf.createsend.com -al
DNS server (NS records)
ns-cloud-b1.googledomains.com (216.239.32.107)
ns-cloud-b2.googledomains.com (216.239.34.107)
ns-cloud-b3.googledomains.com (216.239.36.107)
ns-cloud-b4.googledomains.com (216.239.38.107)
Mail server (MX records) pri-org.mail.protection.outlook.com (216.32.181.170)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8000::3
2620:12a:8001::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: PRI.ORG
Registry Domain ID: D357903-LROR
Registrar WHOIS Server: whois.google.com
Registrar URL: http://domains.google.com
Updated Date: 2017-09-16T00:20:17Z
Creation Date: 1994-11-23T05:00:00Z
Registry Expiry Date: 2018-11-22T05:00:00Z
Registrar Registration Expiration Date:
Registrar: Google Inc.
Registrar IANA ID: 895
Registry Registrant ID: C195144724-LROR
Registrant Name: Contact Privacy Inc. Customer 1241538776
Registrant Organization: Contact Privacy Inc. Customer 1241538776
Registrant Street: 96 Mowat Ave
Registrant City: Toronto
Registrant State/Province: ON
Registrant Postal Code: M4K 3K1
Registrant Country: CA
416-538-5487
contactprivacy.email
contactprivacy.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
left off 1143am cst March 15 2018

???????????????
2014-08-18 1
hurleyschool.org
2014-06-17 1
irespectmyself.ca
2014-08-06 1
mail.realtree.tv
2014-07-05 1
poshfrenchcleaners.com
2014-08-19 1
supporthurley.org
2014-04-18 1
world-science.org

Note: maximum of 10 mail servers are shown.
Overview of mail servers hosted on this IP address.
2015-02-28 1

Are you looking for domain paymentus.com?

Are you looking for IPv6 address 2620:12a:8000::3?
Domain IPv4 address Ranking Alexa Pagerank
paymentus.ca
paymentus.cn
paymentus.com 23.185.0.3 22,526 4
paymentus.io 750,853
paymentus.ir
paymentus.net
paymentus.org 204.236.135.243
paymentusa.biz 63.249.143.95
paymentusa.club 63.249.250.49
paymentusa.co 64.182.198.65
paymentusa.com 104.25.207.26
paymentusa.info 63.249.161.65
paymentusa.mobi 63.249.250.49
paymentusa.net 64.182.198.65
paymentusa.org 64.182.198.65
paymentusa.us 104.18.46.158
paymentusaservices.com 184.168.221.53
paymentuserbill.com 207.178.153.151
paymentuspci.com 184.170.251.72
IPv4 routes

No IPv4 ranges found
IPv6 routes

No IPv6 ranges found
Providers

No providers found
NetRange: 2620:12A:8000:: – 2620:12A:800F:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR: 2620:12A:8000::/44
NetName: PANTHEON-IP6
NetHandle: NET6-2620-12A-8000-1
Parent: ARIN-V6-ENDUSER-BLOCK (NET6-2620-1)
NetType: Direct Assignment
OriginAS: AS54113
Organization: Pantheon (PS-747)
RegDate: 2016-09-27
Updated: 2016-11-22
OrgName: Pantheon
OrgId: PS-747
Address: 717 California St Fl 3
City: San Francisco
StateProv: CA
PostalCode: 94108
Country: US
RegDate: 2016-07-21
Updated: 2017-08-09
OrgAbuseHandle: DTS41-ARIN
OrgAbuseName: Strauss, David Timothy
512-577-5827
davidstrauss.net
The first DNS server is ns3.p13.dynect.net. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com ~all
DNS server (NS records) ns3.p13.dynect.net (208.78.71.13)
ns4.p13.dynect.net (204.13.251.13)
ns2.p13.dynect.net (204.13.250.13)
ns1.p13.dynect.net (208.78.70.13)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
aspmx5.googlemail.com (74.125.28.27)
aspmx4.googlemail.com (108.177.125.26)
aspmx3.googlemail.com (74.125.200.27)
aspmx2.googlemail.com (108.177.14.27)
IP address (IPv4)
IP address (IPv6)
ASN number not available
Domain Name: davidstrauss.net
Registry Domain ID: 490783672_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.google.com
Registrar URL: https://domains.google.com
Updated Date: 2016-08-17T19:06:36Z
Creation Date: 2006-06-19T06:55:38Z
Registrar Registration Expiration Date: 2024-06-19T06:55:38Z
Registrar: Google Inc.
Registrar IANA ID: 895
877-237-6466
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Contact Privacy Inc. Customer 124755687
Registrant Organization: Contact Privacy Inc. Customer 124755687
Registrant Street: 96 Mowat Ave
Registrant City: Toronto
Registrant State/Province: ON
Registrant Postal Code: M4K 3K1
Registrant Country: CA

fastly
pantheon.io
It is listed in the DMOZ directory. This domain is hosted by Fastly (AS54113). The first DNS server is ns-1096.awsdns-09.org. The current IPv4 address is 23.185.0.2. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com include:sendgrid.net include:mktomail.com include:spf.mtasv.net include:stspg-customer.com ~a
DNS server (NS records) ns-1096.awsdns-09.org (205.251.196.72)
ns-148.awsdns-18.com (205.251.192.148)
ns-1857.awsdns-40.co.uk (205.251.199.65)
ns-924.awsdns-51.net (205.251.195.156)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.68.26)
alt1.aspmx.l.google.com (108.177.14.26)
aspmx3.googlemail.com (74.125.200.27)
aspmx2.googlemail.com (108.177.14.27)
IP address (IPv4) 23.185.0.2
IP address (IPv6) 2620:12a:8001::2
2620:12a:8000::2
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: PANTHEON.IO
Registry Domain ID: D503300000040572384-LRMS
Registrar WHOIS Server:
Registrar URL: https://www.gandi.net/whois
Updated Date:
Creation Date: 2012-04-12T23:50:18Z
Registry Expiry Date: 2020-04-12T23:50:18Z
Registrar Registration Expiration Date:
Registrar: Gandi SAS
Registrar IANA ID: 81
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Reseller:
Domain Status: ok https://icann.org/epp#ok
Registrant Name: David Strauss
Registrant Organization: Pantheon Systems
Name Server: NS-148.AWSDNS-18.COM
Name Server: NS-1096.AWSDNS-09.ORG
Name Server: NS-1857.AWSDNS-40.CO.UK
Name Server: NS-924.AWSDNS-51.NET
DNSSEC: unsigned
??????????
Israel
33.170377661
gandi.net
This domain is hosted by GANDI SAS (AS29169). The first DNS server is dns1.gandi.net. The current IPv4 address is 217.70.185.65. The mail server with the highest priority is mail10.gandi.net.
v=spf1 ip4:217.70.176.0/21 ip4:217.70.186.186/32 ip4:217.70.186.187/32
ip6:2001:4b98:c::/48 ip6:2001:4b98:dc2:43:216:3eff:fe69:f13/128
ip4:217.70.186.186/32 ip6:2001:4b98:dc2:90:217:70:186:186/128
ip6:2001:4b98:dc4:5::/64 -ip4:151.236.59.145/32 –
ip4:151.236.35.5/32 -ip4:151.80.105.4/32 ptr ?a
DNS server (NS records) dns1.gandi.net (217.70.177.45)
dns0.gandi.net (217.70.177.39)
dns2.gandi.net (217.70.183.211)
dns4.gandi.net (217.70.186.184)
dns6.gandi.net (162.159.25.213)
dns3.gandi.net (217.70.184.14)
Mail server (MX records) mail10.gandi.net (217.70.182.74)
mail8.gandi.net (217.70.186.186)
IP address (IPv4) 217.70.185.65
IP address (IPv6)
ASN number 29169
ASN name (ISP) GANDI SAS
IP-range/subnet 217.70.176.0/20
217.70.176.0 – 217.70.191.255
Registry Registrant ID:
Registrant Name: Stephan Ramoin
Registrant Organization: Gandi SAS
Registrant Street: 63-65 Boulevard Massena
Registrant City: Paris
Registrant State/Province:
Registrant Postal Code: 75013
Registrant Country: FR
33.143737851

@@@@@@@@@@@@@@@@
??????????????
include:spf.dynect.net ~al
DNS server (NS records) kate.ns.cloudflare.com (173.245.58.124)
paul.ns.cloudflare.com (173.245.59.135)
Mail server (MX records) longmontcolorado-gov.mail.protection.outlook.com (23.103.198.42)
IP address (IPv4) 104.24.19.42
104.24.18.42
IP address (IPv6) 2400:cb00:2048:1::6818:132a
2400:cb00:2048:1::6818:122a
ASN number 13335
ASN name (ISP) Cloudflare, Inc.
IP-range/subnet 104.24.16.0/20
104.24.16.0 – 104.24.31.255
% DOTGOV WHOIS Server ready
Domain Name: LONGMONTCOLORADO.GOV
Status: ACTIVE

>>> Last update of whois database: 2018-01-30T10:12:00Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower
Organization: COMPUTER CREWS (CC-1746)
United States Westminster, United States visited http://www.stewwebb.com/
3/1/2018 1:26:57 PM (26 minutes ago)
IP: 198.233.246.75 Hostname: 198.233.246.75
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Bot
United States Westminster, United States visited http://stewwebb.com/
3/1/2018 1:26:53 PM (26 minutes ago)
IP: 198.233.246.75 Hostname: 198.233.246.75
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

NetRange: 198.233.246.72 – 198.233.246.79
[8 addresses in this network]
CIDR: 198.233.246.72/29 (198.233.246.72 – 198.233.246.79)
[8 addresses in this network]
NetName: Q1209-198-233-246-72
NetHandle: NET-198-233-246-72-1
Parent: CENTURYLINK-LEGACY-QWEST-INET-30 (NET-198-233-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: COMPUTER CREWS (CC-1746)
RegDate: 2015-12-09
Updated: 2015-12-09
Ref: https://whois.arin.net/rest/net/NET-198-233-246-72-1

OrgName: COMPUTER CREWS
OrgId: CC-1746
Address: 9101 HARLAN ST UNIT 215
City: WESTMINSTER
StateProv: CO
PostalCode: 80031
Country: US
RegDate: 2015-12-04
Updated: 2015-12-04
Ref: https://whois.arin.net/rest/org/CC-1746

OrgAbuseHandle: CREWS27-ARIN
OrgAbuseName: Crews, Tom
OrgAbusePhone: +1-720-863-7841
OrgAbuseEmail: tcrews@computercrews.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CREWS27-ARIN

OrgTechHandle: CREWS27-ARIN
OrgTechName: Crews, Tom
OrgTechPhone: +1-720-863-7841
OrgTechEmail: tcrews@computercrews.com
OrgTechRef: https://whois.arin.net/rest/poc/CREWS27-ARIN
198.233.246.75
P address 198.233.246.75
Location United States (US
P address 198.233.246.75
Reverse DNS (PTR record) not available
DNS server (NS record) authns1.qwest.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 198.233.0.0/16
198.233.0.0 – 198.233.255.255
NetRange: 198.233.246.72 – 198.233.246.79
CIDR: 198.233.246.72/29
NetName: Q1209-198-233-246-72
NetHandle: NET-198-233-246-72-1
Parent: QWEST-INET-30 (NET-198-233-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: COMPUTER CREWS (CC-1746)
RegDate: 2015-12-09
Updated: 2015-12-09
OrgName: COMPUTER CREWS
OrgId: CC-1746
Address: 9101 HARLAN ST UNIT 215
City: WESTMINSTER
StateProv: CO
PostalCode: 80031
Country: US
RegDate: 2015-12-04
Updated: 2015-12-04
OrgAbuseHandle: CREWS27-ARIN
OrgAbuseName: Crews, Tom
720-863-7841
OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email

centurylinks.com

computercrews.com
This domain is hosted by Limestone Networks, Inc. (AS46475). The first DNS server is ns3.computercrews.com. The current IPv4 address is 74.63.246.116. The mail server with the highest priority is mx2-us1.ppe-hosted.com.
v=spf1 include:spf.protection.outlook.com
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns1a.o365filtering.com. The current IPv4 address is 40.97.116.82. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.
@@@@@@@@@@@@@@@@
??????????????????

v=spf1
include:spf-a.outlook.com
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns1a.o365filtering.com. The current IPv4 address is 40.97.116.82. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.

Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.116.82 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1

include:spf-b.outlook.com
Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.116.82 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1

ip4:157.55.9.128/25
include:spf.protection.outlook.com

include:spf-a.hotmail.com
include:_spf-ssg-b.microsoft.com
Domains
Domain IPv4 address Ranking Alexa Pagerank
microsoft.ac.cn 160.124.169.13
microsoft.ac.nz 191.237.78.58 -1
microsoft.accountant -1
microsoft.accountants
microsoft.actor -1
microsoft.adult 165.160.13.20 -1
microsoft.ae 2
microsoft.africa
microsoft.ai 52.164.206.56
microsoft.airforce
microsoft.al 31.171.152.42
microsoft.alsace
microsoft.am 52.164.206.56
microsoft.amsterdam
microsoft.apartments
microsoft.army
microsoft.art
microsoft.asia 52.164.206.56 -1
microsoft.associates -1
microsoft.at 137.117.225.87 6
microsoft.attorney -1
microsoft.auction
microsoft.audio
microsoft.auto
microsoft.az 104.43.195.251 6
microsoft.ba 138.197.16.119 1
microsoft.band 23.101.184.206
microsoft.bar -1
microsoft.barcelona
microsoft.bayern -1
microsoft.be 23.96.52.53 -1
microsoft.beer -1
microsoft.berlin 52.164.206.56
microsoft.best
microsoft.bet
microsoft.bi 52.164.206.56
microsoft.bid -1
microsoft.bingo
microsoft.bio -1
microsoft.biz 134.170.185.46
microsoft.biz.pk 104.215.95.187
microsoft.biz.pl 104.215.95.187
microsoft.biz.tr
microsoft.bl.it 213.186.33.5
microsoft.black -1
microsoft.blackfriday -1
microsoft.blog
microsoft.blue
microsoft.boston
microsoft.bot
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.224.168.0 103.224.171.255 SSG Corporation VN 1 0
90.154.254.0 90.154.254.255 BTC SSG Customers BG 0 1
103.224.170.0 103.224.171.255 SSG Corporation VN 1 0
203.177.219.0 203.177.219.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
203.177.224.0 203.177.224.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.225.0 203.177.225.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.229.0 203.177.229.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
13.64.0.0 13.95.255.255 Microsoft Corporation US 109,278 33
13.96.0.0 13.103.255.255 Microsoft Corporation US 4 0
13.104.0.0 13.107.255.255 Microsoft Corporation US 712 0
20.0.0.0 20.31.255.255 Microsoft Corporation US 64 0
20.33.0.0 20.33.255.255 Microsoft Corporation US 0 0
20.34.0.0 20.35.255.255 Microsoft Corporation US 0 0
20.36.0.0 20.39.255.255 Microsoft Corporation US 1 0
20.40.0.0 20.47.255.255 Microsoft Corporation US 2 0
20.48.0.0 20.63.255.255 Microsoft Corporation US 10 0
20.64.0.0 20.127.255.255 Microsoft Corporation US 25 0
20.128.0.0 20.128.255.255 Microsoft Corporation US 0 0
20.130.0.0 20.130.255.255 Microsoft Corporation US 0 0
20.135.0.0 20.135.255.255 Microsoft Corporation US 0 0
20.136.0.0 20.136.255.255 Microsoft Corporation US 0 0
20.140.0.0 20.141.255.255 Microsoft Corporation US 0 0
20.143.0.0 20.143.255.255 Microsoft Corporation US 0 0
20.144.0.0 20.147.255.255 Microsoft Corporation US 1 0
20.150.0.0 20.151.255.255 Microsoft Corporation US 0 0
20.152.0.0 20.153.255.255 Microsoft Corporation US 0 0
20.157.0.0 20.157.255.255 Microsoft Corporation US 0 0
20.158.0.0 20.159.255.255 Microsoft Corporation US 0 0
20.160.0.0 20.175.255.255 Microsoft Corporation US 1 0
20.176.0.0 20.179.255.255 Microsoft Corporation US 1 0
20.180.0.0 20.183.255.255 Microsoft Corporation US 0 0
20.184.0.0 20.191.255.255 Microsoft Corporation US 52 2
20.192.0.0 20.255.255.255 Microsoft Corporation US 11 0
23.96.0.0 23.103.255.255 Microsoft Corporation US 76,933 8
40.64.0.0 40.71.255.255 Microsoft Corporation US 11,553 4
40.74.0.0 40.75.255.255 Microsoft Corporation US 1,838 0
40.76.0.0 40.79.255.255 Microsoft Corporation US 12,194 1
40.80.0.0 40.95.255.255 Microsoft Corporation US 24,252 3
40.96.0.0 40.111.255.255 Microsoft Corporation US 7,415 0
40.112.0.0 40.119.255.255 Microsoft Corporation US 24,946 2
40.120.0.0 40.123.255.255 Microsoft Corporation US 4,932 1
40.124.0.0 40.124.255.255 Microsoft Corporation US 633 0
40.125.0.0 40.125.127.255 Microsoft Corporation US 0 0
40.126.0.0 40.126.63.255 Microsoft Corporation US 0 0
40.126.128.0 40.126.255.255 Microsoft Corporation US 2,409 0
40.127.0.0 40.127.255.255 Microsoft Corporation US 2,744 1
51.4.0.0 51.5.255.255 Microsoft Deutschland MCIO GmbH DE 446 1
51.8.0.0 51.8.255.255 Microsoft Deutschland MCIO GmbH DE 0 0
51.10.0.0 51.13.255.255 Microsoft Limited GB 2 0
51.18.0.0 51.18.255.255 Microsoft Deutschland MCIO GmbH GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:506:28:: 2001:506:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:67c:1020:: 2001:67c:1021:ffff:ffff:ffff:ffff:ffff Microsoft Limited AT 0 0
2001:df0:7:: 2001:df0:7:ffff:ffff:ffff:ffff:ffff Microsoft Corp SG 0 0
2001:df0:d7:: 2001:df0:d7:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. KR 0 0
2001:df0:d8:: 2001:df0:d8:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. AU 0 0
2001:df0:d9:: 2001:df0:d9:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. TW 0 0
2001:4898:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:489a:: 2001:489a:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2400:8980:: 2400:8980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. Shanghai Branch Office CN 0 0
2401:a980:: 2401:a980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Mobile Alliance Internet Services Co., Ltd CN 0 0
2404:f800:: 2404:f800:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. JP 0 0
2404:f801:: 2404:f801:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2406:e500:: 2406:e500:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. CN 0 0
2603:1000:: 2603:10ff:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2620:0:30:: 2620::37:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:b4:4000:: 2620:b4:4000:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:10c:5000:: 2620:10c:500f:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:: 2620:1ec:fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 65 0
2a00:1c68:: 2a00:1c68:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited GB 0 0
2a01:110:: 2a01:111:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited EU 23,189 0
2a01:4180:: 2a01:4180:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Deutschland MCIO GmbH DE 2 0
2001:4898:: 2001:4898:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:4898:e810:: 2001:4898:e810:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:4899:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:2000:: 2001:489a:3fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:4000:: 2001:489a:5fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2404:f801:8028:: 2404:f801:8028:ffff:ffff:ffff:ffff:ffff MSIT Edge HyderabadBuilding 1, Microsoft Campus SG 0 0
2404:f801:8030:: 2404:f801:8030:ffff:ffff:ffff:ffff:ffff Microsoft Edge Sydney SG 0 0
2404:f801:8050:: 2404:f801:8050:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2404:f801:a808:: 2404:f801:a808:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2603:1000:: 2603:107f:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2603:1061:6:: 2603:1061:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:4:: 2620:1ec:4:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 7 0
2620:1ec:5:: 2620:1ec:5:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:6:: 2620:1ec:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:7:: 2620:1ec:7:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:9:: 2620:1ec:9:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:a:: 2620:1ec:a:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:b:: 2620:1ec:b:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:c:: 2620:1ec:c:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 3 0
2620:1ec:d:: 2620:1ec:d:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:12:: 2620:1ec:12:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:13:: 2620:1ec:13:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:21:: 2620:1ec:21:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:22:: 2620:1ec:22:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:25:: 2620:1ec:25:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:28:: 2620:1ec:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:29:: 2620:1ec:29:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:34:: 2620:1ec:34:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2620:1ec:39:: 2620:1ec:39:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
131399 SSG Corporation VN 1 0 1 0
3598 Microsoft Corporation US 18 4 23,966 0
6584 Microsoft Corporation US 17 1 64 0
8068 Microsoft Corporation US 79 39 1,272 0
8070 Microsoft Corporation US 7 2 3 0
8071 Microsoft Corporation US 5 2 11,353 0
8075 Microsoft Corporation US 128 18 612,722 132
12076 Microsoft Corporation US 1 0 0 0
20046 Microsoft Corporation US 5 0 27 0
23468 Microsoft Corporation US 4 0 0 0
35106 Microsoft Limited GB 1 1 0 0
52985 Microsoft Informatica Ltda BR 2 1 0 0
58862 Microsoft (China) Co., Ltd. CN 1 0 0 0
59067 Microsoft Mobile Alliance Internet Services Co., Ltd CN 6 0 17 0
63314 Microsoft Corporation US 1 1 1 0
200517 Microsoft Deutschland MCIO GmbH DE 5 1 446 1
DNS server (NS records) ns4.msft.net (208.76.45.53)
ns1.msft.net (208.84.0.53)
ns2.msft.net (208.84.2.53)
ns3.msft.net (193.221.113.53)
Mail server (MX records) microsoft-com.mail.protection.outlook.com (23.103.156.74)
IP address (IPv4) 23.96.52.53
191.239.213.197
104.40.211.35
104.43.195.251
23.100.122.175
IP address (IPv6) 2a02:26f0:6c00:183::356e
2a02:26f0:6c00:187::356e
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 23.96.0.0/14
23.96.0.0 – 23.99.255.255
include:_spf-ssg-c.microsoft.com ~
Domain IPv4 address Ranking Alexa Pagerank
microsoft.ac.cn 160.124.169.13
microsoft.ac.nz 191.237.78.58 -1
microsoft.accountant -1
microsoft.accountants
microsoft.actor -1
microsoft.adult 165.160.13.20 -1
microsoft.ae 2
microsoft.africa
microsoft.ai 52.164.206.56
microsoft.airforce
microsoft.al 31.171.152.42
microsoft.alsace
microsoft.am 52.164.206.56
microsoft.amsterdam
microsoft.apartments
microsoft.army
microsoft.art
microsoft.asia 52.164.206.56 -1
microsoft.associates -1
microsoft.at 137.117.225.87 6
microsoft.attorney -1
microsoft.auction
microsoft.audio
microsoft.auto
microsoft.az 104.43.195.251 6
microsoft.ba 138.197.16.119 1
microsoft.band 23.101.184.206
microsoft.bar -1
microsoft.barcelona
microsoft.bayern -1
microsoft.be 23.96.52.53 -1
microsoft.beer -1
microsoft.berlin 52.164.206.56
microsoft.best
microsoft.bet
microsoft.bi 52.164.206.56
microsoft.bid -1
microsoft.bingo
microsoft.bio -1
microsoft.biz 134.170.185.46
microsoft.biz.pk 104.215.95.187
microsoft.biz.pl 104.215.95.187
microsoft.biz.tr
microsoft.bl.it 213.186.33.5
microsoft.black -1
microsoft.blackfriday -1
microsoft.blog
microsoft.blue
microsoft.boston
microsoft.bot
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.224.168.0 103.224.171.255 SSG Corporation VN 1 0
90.154.254.0 90.154.254.255 BTC SSG Customers BG 0 1
103.224.170.0 103.224.171.255 SSG Corporation VN 1 0
203.177.219.0 203.177.219.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
203.177.224.0 203.177.224.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.225.0 203.177.225.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.229.0 203.177.229.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
13.64.0.0 13.95.255.255 Microsoft Corporation US 109,278 33
13.96.0.0 13.103.255.255 Microsoft Corporation US 4 0
13.104.0.0 13.107.255.255 Microsoft Corporation US 712 0
20.0.0.0 20.31.255.255 Microsoft Corporation US 64 0
20.33.0.0 20.33.255.255 Microsoft Corporation US 0 0
20.34.0.0 20.35.255.255 Microsoft Corporation US 0 0
20.36.0.0 20.39.255.255 Microsoft Corporation US 1 0
20.40.0.0 20.47.255.255 Microsoft Corporation US 2 0
20.48.0.0 20.63.255.255 Microsoft Corporation US 10 0
20.64.0.0 20.127.255.255 Microsoft Corporation US 25 0
20.128.0.0 20.128.255.255 Microsoft Corporation US 0 0
20.130.0.0 20.130.255.255 Microsoft Corporation US 0 0
20.135.0.0 20.135.255.255 Microsoft Corporation US 0 0
20.136.0.0 20.136.255.255 Microsoft Corporation US 0 0
20.140.0.0 20.141.255.255 Microsoft Corporation US 0 0
20.143.0.0 20.143.255.255 Microsoft Corporation US 0 0
20.144.0.0 20.147.255.255 Microsoft Corporation US 1 0
20.150.0.0 20.151.255.255 Microsoft Corporation US 0 0
20.152.0.0 20.153.255.255 Microsoft Corporation US 0 0
20.157.0.0 20.157.255.255 Microsoft Corporation US 0 0
20.158.0.0 20.159.255.255 Microsoft Corporation US 0 0
20.160.0.0 20.175.255.255 Microsoft Corporation US 1 0
20.176.0.0 20.179.255.255 Microsoft Corporation US 1 0
20.180.0.0 20.183.255.255 Microsoft Corporation US 0 0
20.184.0.0 20.191.255.255 Microsoft Corporation US 52 2
20.192.0.0 20.255.255.255 Microsoft Corporation US 11 0
23.96.0.0 23.103.255.255 Microsoft Corporation US 76,933 8
40.64.0.0 40.71.255.255 Microsoft Corporation US 11,553 4
40.74.0.0 40.75.255.255 Microsoft Corporation US 1,838 0
40.76.0.0 40.79.255.255 Microsoft Corporation US 12,194 1
40.80.0.0 40.95.255.255 Microsoft Corporation US 24,252 3
40.96.0.0 40.111.255.255 Microsoft Corporation US 7,415 0
40.112.0.0 40.119.255.255 Microsoft Corporation US 24,946 2
40.120.0.0 40.123.255.255 Microsoft Corporation US 4,932 1
40.124.0.0 40.124.255.255 Microsoft Corporation US 633 0
40.125.0.0 40.125.127.255 Microsoft Corporation US 0 0
40.126.0.0 40.126.63.255 Microsoft Corporation US 0 0
40.126.128.0 40.126.255.255 Microsoft Corporation US 2,409 0
40.127.0.0 40.127.255.255 Microsoft Corporation US 2,744 1
51.4.0.0 51.5.255.255 Microsoft Deutschland MCIO GmbH DE 446 1
51.8.0.0 51.8.255.255 Microsoft Deutschland MCIO GmbH DE 0 0
51.10.0.0 51.13.255.255 Microsoft Limited GB 2 0
51.18.0.0 51.18.255.255 Microsoft Deutschland MCIO GmbH GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:506:28:: 2001:506:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:67c:1020:: 2001:67c:1021:ffff:ffff:ffff:ffff:ffff Microsoft Limited AT 0 0
2001:df0:7:: 2001:df0:7:ffff:ffff:ffff:ffff:ffff Microsoft Corp SG 0 0
2001:df0:d7:: 2001:df0:d7:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. KR 0 0
2001:df0:d8:: 2001:df0:d8:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. AU 0 0
2001:df0:d9:: 2001:df0:d9:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. TW 0 0
2001:4898:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:489a:: 2001:489a:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2400:8980:: 2400:8980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. Shanghai Branch Office CN 0 0
2401:a980:: 2401:a980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Mobile Alliance Internet Services Co., Ltd CN 0 0
2404:f800:: 2404:f800:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. JP 0 0
2404:f801:: 2404:f801:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2406:e500:: 2406:e500:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. CN 0 0
2603:1000:: 2603:10ff:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2620:0:30:: 2620::37:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:b4:4000:: 2620:b4:4000:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:10c:5000:: 2620:10c:500f:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:: 2620:1ec:fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 65 0
2a00:1c68:: 2a00:1c68:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited GB 0 0
2a01:110:: 2a01:111:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited EU 23,189 0
2a01:4180:: 2a01:4180:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Deutschland MCIO GmbH DE 2 0
2001:4898:: 2001:4898:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:4898:e810:: 2001:4898:e810:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:4899:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:2000:: 2001:489a:3fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:4000:: 2001:489a:5fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2404:f801:8028:: 2404:f801:8028:ffff:ffff:ffff:ffff:ffff MSIT Edge HyderabadBuilding 1, Microsoft Campus SG 0 0
2404:f801:8030:: 2404:f801:8030:ffff:ffff:ffff:ffff:ffff Microsoft Edge Sydney SG 0 0
2404:f801:8050:: 2404:f801:8050:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2404:f801:a808:: 2404:f801:a808:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2603:1000:: 2603:107f:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2603:1061:6:: 2603:1061:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:4:: 2620:1ec:4:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 7 0
2620:1ec:5:: 2620:1ec:5:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:6:: 2620:1ec:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:7:: 2620:1ec:7:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:9:: 2620:1ec:9:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:a:: 2620:1ec:a:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:b:: 2620:1ec:b:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:c:: 2620:1ec:c:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 3 0
2620:1ec:d:: 2620:1ec:d:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:12:: 2620:1ec:12:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:13:: 2620:1ec:13:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:21:: 2620:1ec:21:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:22:: 2620:1ec:22:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:25:: 2620:1ec:25:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:28:: 2620:1ec:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:29:: 2620:1ec:29:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:34:: 2620:1ec:34:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2620:1ec:39:: 2620:1ec:39:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
131399 SSG Corporation VN 1 0 1 0
3598 Microsoft Corporation US 18 4 23,966 0
6584 Microsoft Corporation US 17 1 64 0
8068 Microsoft Corporation US 79 39 1,272 0
8070 Microsoft Corporation US 7 2 3 0
8071 Microsoft Corporation US 5 2 11,353 0
8075 Microsoft Corporation US 128 18 612,722 132
12076 Microsoft Corporation US 1 0 0 0
20046 Microsoft Corporation US 5 0 27 0
23468 Microsoft Corporation US 4 0 0 0
35106 Microsoft Limited GB 1 1 0 0
52985 Microsoft Informatica Ltda BR 2 1 0 0
58862 Microsoft (China) Co., Ltd. CN 1 0 0 0
59067 Microsoft Mobile Alliance Internet Services Co., Ltd CN 6 0 17 0
63314 Microsoft Corporation US 1 1 1 0
200517 Microsoft Deutschland MCIO GmbH DE 5 1 446 1

DNS server (NS records) ns1a.o365filtering.com (157.56.110.11)
ns1.msft.net (208.84.0.53)
ns4.msft.net (208.76.45.53)
ns4a.o365filtering.com (157.55.133.11)
ns2.msft.net (208.84.2.53)
ns2a.o365filtering.com (157.56.116.52)
ns3.msft.net (193.221.113.53)
Mail server (MX records) outlook-com.olc.protection.outlook.com (104.47.36.33)
IP address (IPv4) 40.97.116.82
40.97.148.226
40.97.128.194
40.97.161.50
40.97.164.146
40.97.153.146
40.97.156.114
40.97.160.2
IP address (IPv6) 2603:1026:206:2::2
2603:1026:3:f6::2
2603:1026:7:28::2
2603:1026:3:cb::2
2603:1026:300:64::2
2603:1026:203::2
2603:1026:300:a1::2
2603:1026:206:1::2
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 40.64.0.0/10
40.64.0.0 – 40.127.255.255
Domain Name: outlook.com
Registry Domain ID: 2019401_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2017-07-16T02:21:48-0700
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.160.2 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
43.225.80.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.191.255 RMP Protection Limited HK 58 0
91.223.152.0 91.223.152.255 Protection and Security Plus LTD UA 7 0
103.68.188.0 103.68.191.255 JV Protection Services AU 27 0
103.241.52.0 103.241.55.255 Point Blank Protection Pvt Ltd IN 0 0
103.246.187.0 103.246.187.255 Crystal Crop Protection Private Limited IN 0 0
103.253.40.0 103.253.43.255 RMP Protection Limited. HK 227 0
103.254.164.0 103.254.164.255 Australian Customs and Border Protection Service AU 0 0
121.54.184.0 121.54.187.255 JV Protection Services AU 2 0
134.67.0.0 134.67.255.255 U.S. Environmental Protection Agency US 13 0
148.59.135.0 148.59.135.255 PROTECTION ONE US 1 0
158.45.0.0 158.45.255.255 STATE OF VICTORIA – ENVIRONMENT PROTECTION AUTHORITY AU 0 0
158.119.0.0 158.119.255.255 Health Protection Agency GB 0 0
161.80.0.0 161.80.255.255 U.S. Environmental Protection Agency US 0 0
162.145.0.0 162.145.255.255 Australian Customs and Border Protection Service AU 0 0
162.146.0.0 162.146.255.255 Australian Customs and Border Protection Service AU 1 0
162.147.0.0 162.147.255.255 Australian Customs and Border Protection Service AU 2 0
164.97.0.0 164.97.255.255 DEPARTMENT OF IMMIGRATION AND BORDER PROTECTION AU 12 0
165.105.0.0 165.105.255.255 State of California Department of Forestry and Fire Protection US 0 0
168.246.0.0 168.246.255.255 Syngenta Crop Protection, LLC US 0 0
192.58.247.0 192.58.247.255 Environmental Protection Agency US 0 0
192.70.118.0 192.70.118.255 Ministere de l’Environnement, Direction de la Protection de la Nature FR 0 0
192.81.166.0 192.81.166.255 U.S. Merit Systems Protection Board US 0 0
192.112.29.0 192.112.29.255 Ontario Agency for Health Protection and Promotion CA 1 0
192.124.164.0 192.124.164.255 State of California Department of Forestry and Fire Protection US 0 0
193.29.204.0 193.29.204.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 12 0
193.109.8.0 193.109.11.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0
195.211.220.0 195.211.223.255 DDoS Protection LTD. RU 531 0
198.180.201.0 198.180.201.255 Lightning Location and Protection, Inc. US 0 0
198.190.184.0 198.190.184.255 Consumers Power, System Protection Engineering US 0 0
198.202.131.0 198.202.131.255 Lightning Location and Protection, Inc. US 0 0
199.73.128.0 199.73.255.255 Florida Department of Environmental Protection US 1 0
202.14.101.0 202.14.101.255 Department for Child Protection and Family Support AU 7 0
203.12.67.0 203.12.67.255 Department of Environmental Protection – Waste Management AU 0 0
203.23.184.0 203.23.184.255 Public Service and Merit Protection Commisson (PSMPC) AU 0 0
204.8.235.0 204.8.235.255 PROTECTION ONE US 1 0
204.46.0.0 204.47.255.255 U.S. Environmental Protection Agency US 0 0
204.87.241.0 204.87.241.255 Ground Water Protection Council, Inc. US 0 0
206.197.209.0 206.197.209.255 Protection One Alarm Monitoring, INC. US 0 0
5.101.40.0 5.101.40.255 Cloud Hosting & DDoS Protection RU 1,268 1
12.29.157.0 12.29.157.255 PROTECTION ONE US 11 0
12.108.152.0 12.108.152.255 PROTECTION ONE US 0 0
12.147.152.0 12.147.152.255 PROTECTION ONE ALARM MONITORING US 0 0
43.225.80.0 43.225.80.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.82.0 43.225.82.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.83.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.188.255 RMP Protection Limited HK 0 0
45.123.189.0 45.123.189.255 RMP Protection Limited HK 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:564:: 2001:678:564:ffff:ffff:ffff:ffff:ffff Protection and Security Plus LTD UA 2 0
2001:df1:1800:: 2001:df1:1800:ffff:ffff:ffff:ffff:ffff Australian Customs and Border Protection Service AU 0 0
2001:df7:7000:: 2001:df7:7000:ffff:ffff:ffff:ffff:ffff RMP Protection Limited. HK 1 0
2403:5780:: 2403:5780:ffff:ffff:ffff:ffff:ffff:ffff Shanghai boci Environmental Protection Technology Co., Ltd. CN 0 0
2405:d100:: 2405:d100:ffff:ffff:ffff:ffff:ffff:ffff Australian Radiation Protection and Nuclear Safety Agency AU 0 0
2407:8480:: 2407:8480:ffff:ffff:ffff:ffff:ffff:ffff RMP Protection Limited HK 0 0
2620:0:b10:: 2620::b13:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 1 0
2620:2a:e000:: 2620:2a:e000:ffff:ffff:ffff:ffff:ffff Orland Fire Protection District US 0 0
2620:117:5000:: 2620:117:50ff:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 10 0
2620:166:: 2620:166:fff:ffff:ffff:ffff:ffff:ffff Syngenta Crop Protection, LLC US 0 0
2a03:6920:: 2a03:6927:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
2a04:ec0:: 2a04:ec7:ffff:ffff:ffff:ffff:ffff:ffff Health Protection Agency GB 0 0
2a03:6920:: 2a03:6920:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1
14298 Environmental Protection Agency US 63 0 0 0
21096 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0 14 0
23744 Department of Immigration and Border Protection AU 8 0 0 0
30087 Automobile Protection Corporation US 1 0 2 0
30509 PROTECTION ONE US 5 0 11 0
35169 EURO PROTECTION SURVEILLANCE SAS FR 1 0 0 0
40968 Professional Protection Electronic Ltd. GB 1 0 1 0
50098 DDoS Protection LTD. RU 4 0 531 0
55201 ShawCor Pipe Protection, LLC US 1 0 0 0
56439 Protection and Security Plus LTD UA 1 1 7 0
63327 Ontario Agency for Health Protection and Promotion CA 1 0 1 0
133178 Australian Customs and Border Protection Service AU 1 0 0 0
201092 FBU Central base of aviation forest protection ” Avialesookhrana ” RU 1 0 3 0
205280 United Protection (UK) Security LIMITED GB 1 0 0 10
@@@@@@@@@@@@@@@@@@@@@@@
??????????????
include:spf.myconnectwise.net
The highest ranking ever is 44,052 and was reached on 2018-02-24. It is not listed in the DMOZ directory. This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns-1207.awsdns-22.org. The current IPv4 address is 63.150.4.209.
v=spf1 include:spf.myconnectwise.net ~all
DNS server (NS records) ns-1207.awsdns-22.org (205.251.196.183)
ns-1902.awsdns-45.co.uk (205.251.199.110)
ns-3.awsdns-00.com (205.251.192.3)
ns-933.awsdns-52.net (205.251.195.165)
Mail server (MX records)
IP address (IPv4) 63.150.4.209
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.144.0.0/12
63.144.0.0 – 63.159.255.255
Domain Name: MYCONNECTWISE.NET
Registry Domain ID: 1516794366_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-03-05T17:36:10Z
Creation Date: 2008-08-28T14:05:15Z
Registrar Registration Expiration Date: 2018-08-28T14:05:15Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrant Name: ConnectWise
Registrant Organization: ConnectWise
Registrant Street: 4110 GEORGE RD STE 200
Registrant City: ROCKY POINT
Registrant State/Province: FL
Registrant Postal Code: 33634-7411
Registrant Country: US
813-397-4604

Domain IPv4 address Ranking Alexa Pagerank
myconnectwise.co.uk 77.246.173.206 -1
myconnectwise.com 63.150.4.200 0
myconnectwise.eu 77.246.173.202
myconnectwise.net 63.150.4.209 44,052 0
myconnectwise.co.uk 77.246.173.206 -1
myconnectwise.com 63.150.4.200 0
myconnectwise.eu 77.246.173.202
myconnectwise.net 63.150.4.209 44,052 0
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@@@@@@@@@@
????????????????????
a:dispatch-us.ppe-hosted.com ~al
Are you looking for IPv4 address 148.163.129.53?
IP address 148.163.129.53
Location Sunnyvale, California, United States
IP address 148.163.129.53
Reverse DNS (PTR record) dispatchb-us1.ppe-hosted.com
DNS server (NS record) ns1.proofpoint.us (208.84.67.208)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.biz (156.154.66.99)
ns3.proofpoint.us (208.84.66.208)
ns3.proofpoint.com (208.84.66.208)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.com (156.154.64.99)
ns1.proofpoint.com (208.84.67.208)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255
148.163.129.53
NetRange: 148.163.128.0 – 148.163.159.255
CIDR: 148.163.128.0/19
NetName: PROOFPOINT-NET-NORTH-AMERICA
NetHandle: NET-148-163-128-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22843, AS13916, AS26211
Organization: Proofpoint, Inc. (PROOF)
RegDate: 2014-06-13
Updated: 2017-06-15
OrgName: Proofpoint, Inc.
OrgId: PROOF
Address: 892 Ross Drive
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
RegDate: 2007-10-16
Updated: 2014-09-08
801-748-4494

@@@@@@@@@@@@@@@@
??????????
Domains around 148.163.129.53
IP address #domains
148.163.129.213 3
148.163.129.214 1
IP address 148.163.129.213
Reverse DNS (PTR record) not available
DNS server (NS record) ns3.proofpoint.us (208.84.66.208)
pdns99.ultradns.biz (156.154.66.99)
pdns99.ultradns.net (156.154.65.99)
ns1.proofpoint.us (208.84.67.208)
ns3.proofpoint.com (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.com (156.154.64.99)
pdns99.ultradns.org (156.154.67.99)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255
148.163.129.213
Number of SPAM hosts on 148.163.128.0/19 1
Domain Tools
so-ne.ne.jp
yamato-tanaka.jp
ilastmile.com
NetRange: 148.163.128.0 – 148.163.159.255
CIDR: 148.163.128.0/19
NetName: PROOFPOINT-NET-NORTH-AMERICA
NetHandle: NET-148-163-128-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22843, AS13916, AS26211
Organization: Proofpoint, Inc. (PROOF)
RegDate: 2014-06-13
Updated: 2017-06-15
Ref: https://whois.arin.net/rest/net/NET-148-163-128-0-1

OrgName: Proofpoint, Inc.
OrgId: PROOF
Address: 892 Ross Drive
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
RegDate: 2007-10-16
Updated: 2014-09-08
@@@@@@@@@@@@@@@@
??????????
Mail server Tools
mx7602.piscesdns.net
Are you looking for IPv4 address 148.163.129.213?

Are you looking for domain piscesdns.net?
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns20.domaincontrol.com. The current IPv4 address is 184.168.221.33.

DNS server (NS records) ns20.domaincontrol.com (208.109.255.10)
ns19.domaincontrol.com (216.69.185.10)
Mail server (MX records)
IP address (IPv4) 184.168.221.33
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 184.168.221.0/24
184.168.221.0 – 184.168.221.255
Domain Name: PISCESDNS.NET
Registry Domain ID: 1587139235_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2011-10-13T23:49:28Z
Creation Date: 2010-03-01T19:51:04Z
Registry Registrant ID: Not Available From Registry
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Registrant Street: DomainsByProxy.com
Registrant Street: 14455 N. Hayden Road
Registrant City: Scottsdale
Registrant State/Province: Arizona
Registrant Postal Code: 85260
Registrant Country: US
480-624-2599
@@@@@@@@@@@@@
???????????
domainsbyproxy.com

Domain IPv4 address Ranking Alexa Pagerank
piscesdns.net 184.168.221.33
piscesdns.net 184.168.221.33
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@@@@@@@@
Mail server Tools
mx7603.piscesdns.net
mx7603.piscesdns.net.tavaj.com.br
This domain is hosted by Proofpoint, Inc. (AS13916). The first DNS server is ns1.eurodns.com. The current IPv4 address is 148.163.129.214. The mail server with the highest priority is mx7603.piscesdns.net.tavaj.com.br.
DNS server (NS records) ns1.eurodns.com (156.154.64.105)
ns2.eurodns.com (156.154.65.105)
Mail server (MX records) mx7603.piscesdns.net.tavaj.com.br (148.163.129.214)
mx3002.piscesdns.net (208.84.66.213)
IP address (IPv4) 148.163.129.214
IP address (IPv6)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255

% whois.tcpiputils.com

% Whois information not available.
% The registry for this domain name does not
% publish whois records in the standard format.

% The following information is based on the Domain Name System (DNS)

Domain name: tavaj.com.br
Status: registered

Domain nameservers:
ns1.eurodns.com
ns2.eurodns.com
tavaj.com 52.19.197.101
tavaj.com.br 148.163.129.214
tavaj.cz
tavaj.ir
tavaj.com 52.19.197.101
tavaj.com.br 148.163.129.214
tavaj.cz
tavaj.ir
tavajam.ir
tavajgraphics.com 209.99.64.53
tavaji.men
tavajjoh.ir 51.254.56.97 1
tavajmusic.tk 195.20.45.31
tavajo.com 54.183.99.63
tavajo.ir
tavajobs.com 50.63.202.37
tavajobs.info 50.63.202.60
tavajobs.us 184.168.221.52
tavajoh.com 104.24.98.218
tavajohi.com 5.61.27.168
tavajoi.com 184.168.221.62
tavajprint.com 109.169.66.225
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@
Domain Tools
tavaj.com.br
address 148.163.129.214
Location Sunnyvale, California, United States (US) flag
Registry arin
IP address 148.163.129.214
Reverse DNS (PTR record) not available
DNS server (NS record) ns3.proofpoint.us (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.com (156.154.64.99)
ns1.proofpoint.us (208.84.67.208)
ns3.proofpoint.com (208.84.66.208)
pdns99.ultradns.biz (156.154.66.99)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255

@@@@@@@@@@@@@@@@@
??????????????
Are you looking for domain ppe-hosted.com?

Domain IPv4 address Ranking Alexa Pagerank
ppe-hosted.com 6
ppe-hosted.com 6
IPv4 routes
Startip Endip Description Country #domains #spamhosts
41.79.220.0 41.79.223.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 117 1
41.79.220.0 41.79.220.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 115 0
76.191.0.0 76.191.15.255 Metronet Fire Dispatch US 0 0
204.89.240.0 204.89.240.255 Tri-Community Dispatch Center US 0 0
208.81.208.0 208.81.211.255 Dispatch Printing Company US 70 0
209.251.232.0 209.251.232.255 Southwest Dispatch Center US 1 0
208.81.208.0 208.81.208.255 Dispatch Printing Company US 70 0
208.81.209.0 208.81.209.255 Dispatch Printing Company US 0 0
208.81.210.0 208.81.210.255 Dispatch Printing Company US 0 0
208.81.211.0 208.81.211.255 Dispatch Printing Company US 0 0
5.226.32.0 5.226.39.255 ADMINOR INFRA HOSTED IN VASTBERGA STOCKHOLM SE 1 0
41.79.180.0 41.79.183.255 The Packet Hub Hosted Services ZA 14 0
41.191.232.0 41.191.239.255 Telco Applications servers and hosted facilities ZW 82 0
41.222.228.0 41.222.231.255 Hosted ZA 34 0
45.118.180.0 45.118.183.255 HDDC-HOSTED SG 137 0
64.112.184.0 64.112.187.255 Hosted Backbone US 0 0
77.75.208.0 77.75.215.255 Services and servers only hosted by TV2 NO 31 0
77.240.48.0 77.240.63.255 Telappliant Hosted Services GB 9 0
87.236.128.0 87.236.135.255 Hosted Services GB 12 0
95.215.174.0 95.215.174.255 A4N Hosted Sites GB 33 0
103.7.192.0 103.7.195.255 Hosted Continuity Pty Ltd AU 4 0
103.40.109.0 103.40.109.255 Hosted Network Pty. Ltd. AU 87 0
103.70.136.0 103.70.137.255 THE VALUE HOSTED (PVT). LIMITED PK 226 14
103.80.20.0 103.80.21.255 Hosted Network Pty. Ltd. AU 4 0
103.243.110.0 103.243.110.255 Hosted Network Pty. Ltd. AU 217 0
103.244.128.0 103.244.131.255 W3 Hosted Servers AU 2 0
103.249.60.0 103.249.63.255 Managed Hosted Applications Limited NZ 26 0
148.59.134.0 148.59.134.255 Hosted SFY CA 4 0
169.255.36.0 169.255.39.255 123 Internetworks own hosted infrastructure ZA 4 1
169.255.252.0 169.255.255.255 Hosting Range (this includes VAS, Radius, Portal, Websites and other hosted Services and Gateway addresses) ZA 2 0
173.209.192.0 173.209.223.255 Hosted Data Solutions, LLC US 2 0
177.39.96.0 177.39.99.255 Websense Hosted Network Operations BR 0 0
178.20.168.0 178.20.175.255 Its Hosted NL 272 0
178.255.24.0 178.255.31.255 Interforce Hosted Solutions BV NL 1,185 0
182.161.64.0 182.161.65.255 Hosted Network Pty. Ltd. AU 0 0
185.63.48.0 185.63.51.255 Oceanet-Telecom – Hosted Services FR 48 0
185.94.204.0 185.94.207.255 Smart Hosted Solutions Ltd GB 0 0
185.167.36.0 185.167.39.255 GTI-Hosted-Service GB 1 0
185.178.224.0 185.178.227.255 VELCOM-HOSTED-1 SI 79 0
185.182.228.0 185.182.231.255 Hosted on RapidSwitch GB 4 0
185.189.76.0 185.189.79.255 Customers direct and Wholesale VM Hosted IT 0 0
185.245.96.0 185.245.99.255 IP hosted by Host-Unlimited.de DE 9 0
193.17.226.0 193.17.226.255 TeleWare Hosted Services Ltd. GB 6 0
193.30.142.0 193.30.142.255 Hosted By Infracom AB SE 0 0
193.164.252.0 193.164.253.255 TeleWare Hosted Services Ltd. GB 1 0
193.203.225.0 193.203.226.255 DLA Hosted ICT Diensten B.V. NL 458 0
194.8.29.0 194.8.29.255 Hosted by Infracom AB SE 23 0
197.149.180.0 197.149.183.255 Assignments to clients hosted in cloud environment ZA 25 0
202.174.4.0 202.174.4.255 Yahoo Taiwan Corporate Network hosted at Yahoo Taiwan Colo TW 0 0
203.12.234.0 203.12.234.255 Bluecentral Hosted Solutions AU 353 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df2:9c00:: 2001:df2:9c00:ffff:ffff:ffff:ffff:ffff CBL Group Hosted Services AU 0 0
2001:df3:b200:: 2001:df3:b200:ffff:ffff:ffff:ffff:ffff THE VALUE HOSTED (PVT.) LIMITED PK 0 0
2403:7d00:: 2403:7d00:ffff:ffff:ffff:ffff:ffff:ffff Hosted Continuity Pty Ltd AU 0 0
2404:bd80:: 2404:bd80:ffff:ffff:ffff:ffff:ffff:ffff MY HOSTED INTERNET LTD MM 3 0
2407:d00:: 2407:d00:ffff:ffff:ffff:ffff:ffff:ffff Managed Hosted Applications Limited NZ 0 0
2407:d080:: 2407:d080:ffff:ffff:ffff:ffff:ffff:ffff Hosted Network Pty. Ltd. AU 0 0
2607:5c80:: 2607:5c80:ffff:ffff:ffff:ffff:ffff:ffff Hosted Backbone US 0 0
2804:440:: 2804:440:ffff:ffff:ffff:ffff:ffff:ffff Websense Hosted Network Operations BR 0 0
2a00:1d38:: 2a00:1d38:ffff:ffff:ffff:ffff:ffff:ffff Its Hosted NL 1 0
2a04:e9c0:: 2a04:e9c7:ffff:ffff:ffff:ffff:ffff:ffff Smart Hosted Solutions Ltd GB 0 0
2a07:54c0:: 2a07:54c7:ffff:ffff:ffff:ffff:ffff:ffff MY HOSTED INTERNET LTD IM 0 0
2001:16c0:fefe:: 2001:16c0:fefe:ffff:ffff:ffff:ffff:ffff IPv6 assignment for hosted server in worldstream, customer Arash Naderpour IR 0 0
2a00:1d38:fa:: 2a00:1d38:fa:ffff:ffff:ffff:ffff:ffff Its Hosted NL 1 0
2a00:1d38:ef01:: 2a00:1d38:ef01:ffff:ffff:ffff:ffff:ffff Its Hosted NL 0 0
2a02:ce8:3:: 2a02:ce8:3:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a02:ce8:5:: 2a02:ce8:5:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a02:ce8:14:: 2a02:ce8:14:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a04:5340:1:: 2a04:5340:1:ffff:ffff:ffff:ffff:ffff SIM-Networks Hosted in Germany DE 1 0
2a04:5340:2:: 2a04:5340:2:ffff:ffff:ffff:ffff:ffff SIM-Networks Hosted in Germany DE 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12227 Dispatch Printing Company US 4 0 70 0
29755 Southwest Dispatch Center US 1 0 1 0
394772 The Columbus Dispatch US 1 0 2 0
10112 THE VALUE HOSTED (PVT.) LIMITED PK 2 0 226 14
14713 Hosted Backbone US 10 2 14 0
34745 TeleWare Hosted Services Ltd. GB 2 0 7 0
34768 Smart Hosted Solutions Ltd GB 1 1 0 0
50655 Its Hosted NL 3 3 272 0
58936 Managed Hosted Applications Limited NZ 3 0 26 0
132225 Hosted Continuity Pty Ltd AU 1 0 4 0
133120 Hosted Network Pty. Ltd. AU 4 0 308 0
135583 ip2me Hosted Services AU 1 0 2 0
203033 MY HOSTED INTERNET LTD IM 0 1 0 0
DNS server (NS records) ns3.computercrews.com (68.71.81.26)
ns1.computercrews.com (104.153.156.116)
ns2.computercrews.com (70.89.173.99)
Mail server (MX records) mx2-us1.ppe-hosted.com (148.163.129.51)
mx1-us1.ppe-hosted.com (67.231.154.162)
IP address (IPv4) 74.63.246.116
IP address (IPv6)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 74.63.192.0/18
74.63.192.0 – 74.63.255.255
Domain Name: COMPUTERCREWS.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Thomas Crews
Registrant Organization: Computer Crews
Name Server: NS1.COMPUTERCREWS.COM
Name Server: NS2.COMPUTERCREWS.COM
Name Server: NS3.COMPUTERCREWS.COM
DNSSEC: unsigned

 

 




Larry Mizel Wide Open West Financial cyber attacks against Stew Webb Whistleblower

(Left Cyber attacker Larry Mizel)

By Stew Webb Federal Whistleblower

This is one of many of Larry Mizel networks that have been blocked due to throttling stewwebb.com

this is direct retaliation against a Federal Whistle blower 18 USC-1010 1010-1015.

also:

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

You are being reported to the proper US Government Authority to Prosecute.

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Throttling StewWebb.com

Hundreds of times

Schaumburg, United States was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://www.stewwebb.com/
2/27/2018 7:05:34 AM (6 hours 21 mins ago)
IP: 64.53.148.58 Hostname: d53-64-58-148.nap.wideopenwest.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; Z987 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36
NetRange: 64.53.148.0 – 64.53.149.255
[512 addresses in this network]
CIDR: 64.53.148.0/23 (64.53.148.0 – 64.53.151.255)
[1024 addresses in this network]
NetName: IL-NAPR
NetHandle: NET-64-53-148-0-1
Parent: WIDEOPENWEST-2BLK (NET-64-53-128-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C03130595)
RegDate: 2012-08-27
Updated: 2014-12-09
Comment: Address complaints to abuse@wideopenwest.com
Ref: https://whois.arin.net/rest/net/NET-64-53-148-0-1

CustName: Wide Open West
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2012-08-27
Updated: 2014-12-09
Ref: https://whois.arin.net/rest/customer/C03130595

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: abuse@wideopenwest.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: kevin.baker@wowinc.com
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: ipadmin@wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: ipadmin@wideopenwest.com
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

RTechHandle: IPADM669-ARIN
RTechName: IP Administrator
RTechPhone: +1-706-634-2898
RTechEmail: ipadmin@wideopenwest.com
RTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

64.53.148.58
IP address 64.53.148.58
Location Schaumburg, Illinois, United States
IP address 64.53.148.58
Reverse DNS (PTR record) d53-64-58-148.nap.wideopenwest.com
DNS server (NS record) dns1.wideopenwest.com (64.233.207.16)
dns2.wideopenwest.com (64.233.207.2)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.53.148.0/23
64.53.148.0 – 64.53.149.255
64.53.148.58

NetRange: 64.53.148.0 – 64.53.149.255
CIDR: 64.53.148.0/23
NetName: IL-NAPR
NetHandle: NET-64-53-148-0-1
Parent: WIDEOPENWEST-2BLK (NET-64-53-128-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C03130595)
RegDate: 2012-08-27
Updated: 2014-12-09
CustName: Wide Open West
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2012-08-27
Updated: 2014-12-09
706-634-2898
NetRange: 64.53.128.0 – 64.53.255.255
CIDR: 64.53.128.0/17
NetName: WIDEOPENWEST-2BLK
NetHandle: NET-64-53-128-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: WideOpenWest Finance LLC (WOPW)
RegDate: 2002-05-27
Updated: 2016-10-03
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
OrgName: WideOpenWest Finance LLC
OrgId: WOPW
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2002-04-09
Updated: 2017-05-16
@@@@@@@
wowinc.com
Domain wowinc.com is not listed in the top million list of Alexa. It is not listed in the DMOZ directory. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is dns2.wideopenwest.com. The current IPv4 address is 68.179.166.209. The mail server with the highest priority is us-smtp-inbound-2.mimecast.com.
v=spf1 mx ip4:64.233.207.78 include:mktomail.com include:mimecast.com ~al

DNS server (NS records) dns2.wideopenwest.com (64.233.207.2)
dns1.wideopenwest.com (64.233.207.16)
Mail server (MX records) us-smtp-inbound-2.mimecast.com (205.139.110.242)
us-smtp-inbound-1.mimecast.com (205.139.110.181)
IP address (IPv4) 68.179.166.209
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 68.179.128.0/18
68.179.128.0 – 68.179.191.255
Domain Name: wowinc.com
Registry Domain ID: 406318_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ascio.com
Registrar URL: http://www.ascio.com
Updated Date: 2017-09-19T21:58:06Z
Creation Date: 1996-10-17T00:00:00Z
Registrar Registration Expiration Date: 2018-10-16T04:00:00Z
Registrar: Ascio Technologies, Inc
Registrar IANA ID: 106
ascio.com

44.2070159370
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: WIDEOPENWEST LLC
Registrant Street: 7887 East Belleview Avenue
Registrant City: Englewood
Registrant State/Province: Colorado
Registrant Postal Code: 80111
Registrant Country: US
630-445-5040

@@@@@@@@@@@@
wideopenwest.com
Domain wideopenwest.com is not listed in the top million list of Alexa. It is not listed in the DMOZ directory. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is dns1.wideopenwest.com. The current IPv4 address is 64.233.207.78. The mail server with the highest priority is mx.wowway.com.
DNS server (NS records) dns1.wideopenwest.com (64.233.207.16)
dns2.wideopenwest.com (64.233.207.2)
Mail server (MX records) mx.wowway.com (64.8.71.111)
IP address (IPv4) 64.233.207.78
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.233.207.0/24
64.233.207.0 – 64.233.207.255
Domain Name: wideopenwest.com
Registry Domain ID: 11889612_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ascio.com
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: WIDEOPENWEST LLC
Registrant Street: 7887 East Belleview Avenue
Registrant City: Englewood
Registrant State/Province: Colorado
Registrant Postal Code: 80111
Registrant Country: US

ascio.com

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Skype Cyber Attack against Stew Webb Whistle blower

By Stew Webb Federal Whistleblower

February 25, 2018 someone hacked my old skype account I have not used in over two years and

sent a link to a porno site it was not me see the massive cyber attacks against stewwebb.com by US Government and Larry Mizel and the Israeli Mossad.

Stew Webb

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Picture of Skype sent out someone sent me.

This might be the culprit and criminal?

skype
throttling stewwebb.com
microsoft
Singapore Singapore, Singapore was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2016/04/10/benjamin-netanyahu-fingered-9-11-threatening-bernie-sanders/
2/25/2018 7:07:03 PM (7 hours 35 mins ago)
IP: 13.76.241.210 Hostname: 13.76.241.210
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows NT 6.1; WOW64) SkypeUriPreview Preview/0.5
NetRange: 13.64.0.0 – 13.107.255.255
[2883584 addresses in this network]
CIDR: 13.64.0.0/11, 13.96.0.0/13, 13.104.0.0/14 (13.64.0.0 – 13.127.255.255)
[4194304 addresses in this network]
NetName: MSFT
NetHandle: NET-13-64-0-0-1
Parent: NET13 (NET-13-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Microsoft Corporation (MSFT)
RegDate: 2015-03-26
Updated: 2015-03-26
Ref: https://whois.arin.net/rest/net/NET-13-64-0-0-1

OrgName: Microsoft Corporation
OrgId: MSFT
Address: One Microsoft Way
City: Redmond
StateProv: WA
PostalCode: 98052
Country: US
RegDate: 1998-07-09
Updated: 2017-01-28
Comment: To report suspected security issues specific to traffic emanating from Microsoft online services, including the distribution of malicious content or other illicit or illegal material through a Microsoft online service, please submit reports to:
Comment: * https://cert.microsoft.com.
Comment:
Comment: For SPAM and other abuse issues, such as Microsoft Accounts, please contact:
Comment: * abuse@microsoft.com.
Comment:
Comment: To report security vulnerabilities in Microsoft products and services, please contact:
Comment: * secure@microsoft.com.
Comment:
Comment: For legal and law enforcement-related requests, please contact:
Comment: * msndcc@microsoft.com
Comment:
Comment: For routing, peering or DNS issues, please
Comment: contact:
Comment: * IOC@microsoft.com
Ref: https://whois.arin.net/rest/org/MSFT

OrgTechHandle: MRPD-ARIN
OrgTechName: Microsoft Routing, Peering, and DNS
OrgTechPhone: +1-425-882-8080
OrgTechEmail: IOC@microsoft.com
OrgTechRef: https://whois.arin.net/rest/poc/MRPD-ARIN

OrgAbuseHandle: MAC74-ARIN
OrgAbuseName: Microsoft Abuse Contact
OrgAbusePhone: +1-425-882-8080
OrgAbuseEmail: abuse@microsoft.com
OrgAbuseRef: https://whois.arin.net/rest/poc/MAC74-ARIN

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




US CFTC to fine UBS, Deutsche Bank, HSBC for futures market spoofing

U.S. CFTC to fine UBS, Deutsche Bank, HSBC for futures market spoofing, manipulation

January 26, 2018, 06:35:00 PM EDT By Reuters

WASHINGTON, Jan 26 (Reuters) – The U.S. derivatives regulator is set to announce it has fined European lenders UBS, HSBC and Deutsche Bank millions of dollars each for so-called “spoofing” and manipulation in the U.S. futures market, three people with direct knowledge of the matter told Reuters.

The enforcement action by the Commodity Futures Trading Commission (CFTC) is the result of a multi-agency investigation that also involves the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), the people said.

Spokesmen for all three banks declined to comment.

https://www.reuters.com/article/us-usa-cftc-enforcement-exclusive/u-s-cftc-to-fine-ubs-deutsche-bank-hsbc-for-spoofing-manipulation-sources-idUSKBN1FF2YK

The enforcement action by the Commodity Futures Trading Commission (CFTC) is the result of a multi-agency investigation that also involves the Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) – the first of its kind for the CFTC, the people said.

The fines for UBS and Deutsche Bank will be upward of ten million, while the fine for HSBC will be slightly less than that, the people said, without providing exact figures.

Spokesmen for HSBC, Deutsche Bank and UBS declined to comment.

Spoofing involves placing bids to buy or offers to sell futures contracts with the intent to cancel them before execution. By creating an illusion of demand, spoofers can influence prices to benefit their market positions.

Spoofing is a criminal offense under a provision implemented as part of the 2010 Dodd-Frank financial reform.

Some of the manipulative behavior came to light as a result of the authorities’ previously-settled probes into forex market manipulation while UBS self-reported the wrong doing, according to two of the people with knowledge of the matter.

The bank investigations have been ongoing for more than a year, one of the people said.

The settlement is the most high-profile brought so far by the CFTC’s head of enforcement James McDonald who was appointed to the role in March 2017.

McDonald, who was previously a prosecutor in the Southern District of New York, said in September he plans to encourage companies and staff to report their own wrongdoing and cooperate with investigators, a strategy he hopes will make it easier to prosecute more individuals.

In August, a U.S. appeals court upheld the conviction of former New Jersey-based high-speed trader Michael Coscia who was the first individual was the first person to be criminally prosecuted for the manipulative trading practice.

A spokeswoman for the CBOE, one of the U.S.’s major futures exchanges, declined to comment. A spokeswoman for the CME Group, the other major futures bourse, did not immediately respond to a request for comment.

(This version of the story corrects to remove extraneous words from penultimate paragraph.)

Reporting by Michelle Price; additional reporting by Karen Freifeld in New York; editing by Clive McKeef.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan January 27 2018

Radio Stew Webb and Tom Heneghan Saturday January 27, 2018

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Tom Heneghan and Glenn Canady January 24 2017

Radio Tom Heneghan and Glenn Canady January 24 2017

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Kris Thompson Cyber Attacks against Stew Webb Whistle blower

Kris Thompson Boulder Colorado

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Oriental KCMO number
Dec 20 2016 1031am cst
Registrant Name: KRIS THOMPSON
Registrant Organization: 303CYCLING LLC
Registrant Street: 4660 KIRKWOOD ST.
Registrant City: BOULDER
Registrant State/Province: CO
Registrant Postal Code: 80301
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: KRIS THOMPSON
Admin Organization: 303CYCLING LLC
Admin Street: 4660 KIRKWOOD ST.
Admin City: BOULDER
Admin State/Province: CO
Admin Postal Code: 80301
Admin Country: US
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
303-875-9042

pcthreatskiller.com/

how-to-remove-1-888-727-1127-popup-completely/
1-888-727-1127 popup is a malicious domain and it is usually show up as spam pop-ups.
With the tool of Blue Screen of Death background or a threatening notification,
it sends you a message that your computer is infected with adware or malware
and you would better call for the tech support. In the same time, 1-888-727-1127
popup freezes your windows so that you can start up and begins to believe that it
must be true and to follow its suggestions.
1-888-727-1127 popup is Endangering Your Comrededitputer:

It damages important files to trigger many security vulnerabilities
It installs web browser hijacker to replace your homepage
It transfers spyware or malware to further damage your PC
It can largely degrade computer performance
It may be used to steals confidential information for illegale purpose
It has ability to open backdoor access for remote attacker
regedit
HKEY_LOCAL_MACHINESOFTWAREsupWPM
HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesWpm
HKEY_CURRENT_USERSoftwareMicrosoftInternet ExplorerMain “Default_Page_URL”
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe
HKLM\SOFTWARE\Classes\AppID\<random>.exe
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\[virus name]
172.58.3_.__
Oklahoma
Are you looking for IPv4 address 198.71.233.7?
IP address 198.71.233.7
Location Scottsdale, Arizona, United States
IP address 198.71.233.7
Reverse DNS (PTR record) ip-198-71-233-7.ip.secureserver.net
DNS server (NS record) cns2.secureserver.net (216.69.185.100)
cns1.secureserver.net (208.109.255.100)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 198.71.232.0/21
198.71.232.0 – 198.71.239.255

Domains on 198.71.233.7
Domain Tools
leadingedgenovelty.com
mektebisuffa.com
cherrybomb.com
battlemug.com
hometownheroes.org
masepoxies.com
corchurch.com
dupagechildrens.org
desmarais-robitaille.com
hangwiththeband.com
cherrybomb.com
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns61.worldnic.com. The current IPv4 address is 198.71.233.7. The mail server with the highest priority is us-smtp-inbound-1.mimecast.com.
v=spf1 a mx ptr a:dispatch-us.ppe-hosted.com
include:spf.protection.outlook.com ~
DNS server (NS records) ns61.worldnic.com (207.204.40.131)
ns62.worldnic.com (207.204.21.131)
Mail server (MX records) us-smtp-inbound-1.mimecast.com (205.139.110.242)
us-smtp-inbound-2.mimecast.com (207.211.30.221)
IP address (IPv4) 198.71.233.7
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 198.71.232.0/21
198.71.232.0 – 198.71.239.255
Domain Name: CHERRYBOMB.COM
Registry Domain ID: 816647_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://www.networksolutions.com
Updated Date: 2017-03-05T17:36:10Z
Creation Date: 1996-04-17T04:00:00Z
Registrar Registration Expiration Date: 2022-04-18T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Reseller:
Domain Status:
Registry Registrant ID:
Registrant Name: AP Exhaust Technologies, Inc
Registrant Organization: AP Exhaust Technologies, Inc
Registrant Street: 300 DIXIE TRL
Registrant City: GOLDSBORO
Registrant State/Province: NC
Registrant Postal Code: 27530-7119
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: AP Exhaust Technologies, Inc
Admin Organization: AP Exhaust Technologies, Inc
Admin Street: 300 DIXIE TRL
Admin City: GOLDSBORO
Admin State/Province: NC
Admin Postal Code: 27530-7119
Admin Country: US
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: McGinty, David
Tech Organization: AP Exhaust Technologies
Tech Street: 300 DIXIE TRL
Tech City: Goldsboro
Tech State/Province: NC
Tech Postal Code: 27530-7119
Tech Country: US

apexhaust.com
his domain is hosted by Peak 10 (AS19271). The first DNS server is ns33.worldnic.com. The current IPv4 address is 209.34.253.2. The mail server with the highest priority is us-smtp-inbound-1.mimecast.com.
v=spf1 a mx ptr a:dispatch-us.ppe-hosted.com include:spf.protection.outlook.com ~al
DNS server (NS records) ns33.worldnic.com (207.204.40.117)
ns34.worldnic.com (207.204.21.117)
Mail server (MX records) us-smtp-inbound-1.mimecast.com (205.139.110.242)
us-smtp-inbound-2.mimecast.com (207.211.30.221)
IP address (IPv4) 209.34.253.2
IP address (IPv6)
ASN number 19271
ASN name (ISP) Peak 10
IP-range/subnet 209.34.253.0/24
209.34.253.0 – 209.34.253.255
omain Name: APEXHAUST.COM
Registry Domain ID: 479052835_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-03-05T15:25:22Z
Creation Date: 2006-06-09T14:02:11Z
Registrar Registration Expiration Date: 2019-06-09T14:02:11Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Reseller:
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: AP Exhaust Technologies, Inc
Registrant Organization: AP Exhaust Technologies, Inc
Registrant Street: 300 DIXIE TRL
Registrant City: GOLDSBORO
Registrant State/Province: NC
Registrant Postal Code: 27530-7119
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: McGinty, Dave
Admin Organization: AP Exhaust Technologies, Inc.
Admin Street: 300 DIXIE TRL
Admin City: Goldsboro
Admin State/Province: NC
Admin Postal Code: 27530-7119
Admin Country: US
Admin Phone: removed phone number

Domains around 198.71.233.7
IP address #domains
198.71.233.1 5727
198.71.233.2 4
198.71.233.3 4339
198.71.233.4 10
198.71.233.5 4326
198.71.233.6 4
198.71.233.7 4259
198.71.233.8 8
198.71.233.9 4360
198.71.233.10 3
See more items
Mail servers on 198.71.233.7

Overview of mail servers hosted on this IP address. You can use the Reverse MX tool to find domains using a mail server. Use the MX History tool to find domains using a mail server in the past.
Mail server Tools
303cycling.com
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns15.midphase.com. The current IPv4 address is 198.71.233.7. The mail server with the highest priority is aspmx.l.google.com.
DNS server (NS records) ns15.midphase.com (69.36.161.36)
ns16.midphase.com (69.36.161.37)
ns14.midphase.com (69.36.163.232)
Mail server (MX records) aspmx.l.google.com (74.125.206.27)
alt1.aspmx.l.google.com (173.194.73.26)
303cycling.com (198.71.233.7)
IP address (IPv4) 198.71.233.7
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 198.71.232.0/21
198.71.232.0 – 198.71.239.255
Domain Name: 303CYCLING.COM
Registry Domain ID: 1429952984_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.enom.com
Registrar URL: www.enom.com
Updated Date: 2017-03-08T05:30:40.00Z
Creation Date: 2008-03-22T14:00:38.00Z
Registrar Registration Expiration Date: 2018-03-22T14:00:38.00Z
Registrar: ENOM, INC.
Registrar IANA ID: 48
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: KRIS THOMPSON
Registrant Organization: 303CYCLING LLC
Registrant Street: 4660 KIRKWOOD ST.
Registrant City: BOULDER
Registrant State/Province: CO
Registrant Postal Code: 80301
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: KRIS THOMPSON
Admin Organization: 303CYCLING LLC
Admin Street: 4660 KIRKWOOD ST.
Admin City: BOULDER
Admin State/Province: CO
Admin Postal Code: 80301
Admin Country: US
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
303-875-9042

mail.gateperimeterexodus.com
mail.ncct.org
bobweir.net
cosmetic-dentistry.net
halfbakedbeverly.com
lisaabercrombie.com
ifihadawand.com
susankbaileymarketing.com
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns.osmhost.com. The current IPv4 address is 198.71.233.7. The mail server with the highest priority is susankbaileymarketing.com.
v=spf1 +a +mx +ip4:67.225.140.74 +ip4:67.225.140.185 ~a
NS server (NS records) ns.osmhost.com (50.28.34.41)
ns2.osmhost.com (50.28.102.97)
Mail server (MX records) susankbaileymarketing.com (198.71.233.7)
IP address (IPv4) 198.71.233.7
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 198.71.232.0/21
198.71.232.0 – 198.71.239.255

Domain Name: SUSANKBAILEYMARKETING.COM
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Susan K. Bailey Marketing & Design
Name Server: NS.OSMHOST.COM
Name Server: NS2.OSMHOST.COM
DNSSEC: unsigned

mx.pic-photo.com
Note: maximum of 10 mail servers are shown.

Tip: You can use the MX Neighbors tool with IP input to view all domains using this IP address as mail server.
Name servers on 198.71.233.7
No name servers found.
Whois information

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/public/whoisinaccuracy/index.xhtml
#

#
# The following results may also be obtained via:
# https://whois.arin.net/rest/nets;q=198.71.232.10?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
#

NetRange: 198.71.128.0 – 198.71.255.255
CIDR: 198.71.128.0/17
NetName: GO-DADDY-COM-LLC
NetHandle: NET-198-71-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS26496
Organization: GoDaddy.com, LLC (GODAD)
RegDate: 2012-08-06
Updated: 2014-02-25
Comment: Please send abuse complaints to removed email address
Ref: https://whois.arin.net/rest/net/NET-198-71-128-0-1

OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
Comment: Please send abuse complaints to removed email address
Ref: https://whois.arin.net/rest/org/GODAD

OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: removed phone number
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE51-ARIN

OrgTechHandle: NOC124-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/NOC124-ARIN

OrgNOCHandle: NOC124-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: removed phone number
OrgNOCEmail: removed email address
OrgNOCRef: https://whois.arin.net/rest/poc/NOC124-ARIN

Are you looking for domain pcthreatskiller.com?
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns54.domaincontrol.com. The current IPv4 address is 198.71.233.7. The mail server with the highest priority is mail.pcthreatskiller.com.
v=spf1 a mx ptr include:secureserver.net ~all

NS server (NS records) ns54.domaincontrol.com (208.109.255.27)
ns53.domaincontrol.com (216.69.185.27)
Mail server (MX records) mail.pcthreatskiller.com (198.71.233.7)
IP address (IPv4) 198.71.233.7
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 198.71.232.0/21
198.71.232.0 – 198.71.239.255
Domain Name: PCTHREATSKILLER.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Name Server: NS53.DOMAINCONTROL.COM
Name Server: NS54.DOMAINCONTROL.COM
DNSSEC: unsigned

@@@@@@@@@@@@@@@@@@@@@@@@@@

pcthreatskiller.com 198.71.233.7 581,511 -1
IPv4 routes
Startip Endip Description Country #domains #spamhosts
46.51.224.0 46.51.255.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,293 1
46.137.192.0 46.137.223.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,623 0
46.137.224.0 46.137.255.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 729 0
31.172.136.0 31.172.143.255 Home net project, http://domonet.ua/ UA 28 0
46.150.160.0 46.150.191.255 Web Page: http://www.opticom.net RU 9 0
62.122.192.0 62.122.199.255 Web Page: http://www.opticom.net RU 10 0
91.105.248.0 91.105.255.255 http://www.isolcom.fi/ FI 221 0
91.216.185.0 91.216.185.255 http://www.networkimage.cz/ CZ 0 0
93.183.192.0 93.183.255.255 Software company Lohika, http://lohika.com UA 251 17
178.19.80.0 178.19.95.255 http://estt.ru RU 0 0
185.12.152.0 185.12.155.255 1C LLC, http://www.1c.ru RU 14 0
185.21.24.0 185.21.27.255 EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 1 0
185.33.116.0 185.33.119.255 http://www.csv-networks.nl NL 4,174 0
185.40.196.0 185.40.199.255 eTOP http://www.etop.pl PL 426 0
185.166.4.0 185.166.7.255 http.net Internet GmbH DE 0 0
185.187.40.0 185.187.43.255 EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 0 0
193.108.172.0 193.108.173.255 http://www.vmunix.org/ DE 4 0
193.169.234.0 193.169.235.255 openstat project http://openstat.com/ RU 0 0
194.50.75.0 194.50.75.255 http://pop.pl PL 0 0
194.110.69.0 194.110.69.255 http://www.geeknode.org/ FR 14 0
194.152.32.0 194.152.33.255 trouble: Information: http://www.inbox.lv LV 11 0
195.85.192.0 195.85.192.255 http://www.pbs.si/ SI 1 0
195.216.236.0 195.216.236.255 trouble: Information: http://www.inbox.lv LV 10 0
195.244.26.0 195.244.27.255 http://pop.pl PL 3 0
203.55.130.0 203.55.130.255 http://internetcity AU 0 0
213.160.64.0 213.160.95.255 http.net Internet GmbH DE 22,388 0
217.197.112.0 217.197.127.255 http://www.estt.ru RU 648 2
31.172.136.0 31.172.137.255 Home net project, http://domonet.ua/ UA 7 0
31.172.136.0 31.172.136.255 Home net project, http://domonet.ua/ UA 0 0
31.172.137.0 31.172.137.255 Home net project, http://domonet.ua/ UA 7 0
31.172.141.0 31.172.141.255 Home net project, http://domonet.ua/ UA 7 0
31.172.143.0 31.172.143.255 Unlimited project, http://unlimited.ua/ UA 4 0
46.150.180.0 46.150.183.255 Web Page: http://www.opticom.net RU 0 0
62.122.192.0 62.122.195.255 Web Page: http://www.opticom.net RU 3 0
62.122.197.0 62.122.197.255 Web Page: http://www.opticom.net RU 5 0
85.25.89.0 85.25.89.255 http://www.epharmexx.de DE 126 0
91.242.81.0 91.242.81.255 registered through http://www.itns.md/ip.html MD 0 0
92.61.60.0 92.61.63.255 http://www.makenewmedia.com AT 69 0
93.183.192.0 93.183.223.255 Software company Lohika, http://lohika.com UA 151 16
93.183.192.0 93.183.192.255 Software company Lohika, http://lohika.com UA 0 0
93.186.194.0 93.186.194.255 Gameservers by http://gamed.es DE 0 0
103.25.62.0 103.25.62.255 http://compevo.com HK 0 0
134.255.229.0 134.255.229.255 Benhosting, http DE 279 0
158.140.128.0 158.140.128.255 MyRepublic Ltd http SG 11 0
158.140.129.0 158.140.129.255 MyRepublic Ltd http SG 6 0
158.140.130.0 158.140.130.255 MyRepublic Ltd http SG 7 2
158.140.131.0 158.140.131.255 MyRepublic Ltd http SG 0 0
158.140.132.0 158.140.132.255 MyRepublic Ltd http SG 1 0
158.140.133.0 158.140.133.255 MyRepublic Ltd http SG 13 0
158.140.134.0 158.140.134.255 MyRepublic Ltd http SG 1 1
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:7f8:1d:: 2001:7f8:1d:ffff:ffff:ffff:ffff:ffff http://www.trex.fi/ FI 0 0
2a00:17d8:: 2a00:17df:ffff:ffff:ffff:ffff:ffff:ffff http.net Internet GmbH DE 910 0
2a00:54e0:: 2a00:54e0:ffff:ffff:ffff:ffff:ffff:ffff EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 0 0
2a01:7bc0:: 2a01:7bc0:ffff:ffff:ffff:ffff:ffff:ffff http://www.isolcom.fi/ FI 0 0
2001:830:fc:: 2001:830:fc:ffff:ffff:ffff:ffff:ffff Mainlab GmbH – http://www.mainlab.de/ DE 0 0
2a05:dfc7:5:: 2a05:dfc7:5:ffff:ffff:ffff:ffff:ffff FuslVZ OpenNIC Anycast DNS Resolver (IPv6-1) – http://dnsrec.meo.ws/ GB 13 0
2a05:dfc7:5353:: 2a05:dfc7:5353:ffff:ffff:ffff:ffff:ffff FuslVZ OpenNIC Anycast DNS Resolver (IPv6-5) – http://dnsrec.meo.ws/ GB 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12574 http.net Internet GmbH DE 1 1 22,388 0
58544 http TH 2 0 3 0

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan January 21 2017

Radio Stew Webb and Tom Heneghan January 21, 2017

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan January 19, 2018

Radio Stew Webb and Tom Heneghan January 19, 2018

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan December 31 2017

Radio Stew Webb and Tom Heneghan December 31 2017

Intel Briefing – Tom Heneghan Stew Webb 12-31-17

Intel Briefing – Tom Heneghan Stew Webb (12-31-17) from Truth Warriors on Vimeo.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan December 26 2017

Radio Stew Webb and Tom Heneghan December 26, 2017

Intel Briefing – Tom Heneghan, Stew Webb (12-28-17) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb Tom Heneghan December 18 2017

Radio Stew Webb and Tom Heneghan December 18, 2017

Intel Briefing – Stew Webb, Tom Heneghan (12-18-17) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

Bush Illuminati Human Sacrifice Denver June 20-21 2018

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

FBI Raids Satanic Human Sacrifice Video

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism April 18 2010

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Please email or twitter to President Trump


Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Archives


Stew Webb 34 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”