Blog Archives

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistleblower

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower who has exposed Larry Mizel in violations of 18-USC-1010-1015.

Was that the guy in the Whte House? Is that BiBi?

Larry Mizel AIPAC Director

Israel Prime Minister BiBi and Larry Mizel

HSBC Run by Larry Mizel

Stew Webb Contributor Silverado Saving owned by MDC Holding, Inc.

Larry Mizel and B.C.C.I Jackson Stevens ran off with Charles Keating Money

IRS Charges filed by Stew Webb 1990 against MDC Holding, Inc Run by Larry Mizel

 

 

Stew Webb Current Grand Jury Demand against Larry Mizel

March 27, 2018

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

March 29, 2018

Evidence previous cyber attacked and posted on stewwebb.com

New evidence posted below implanting malicious code

Ten Cyber Terrorist Implanting Malicious Codes against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/26/ten-cyber-terrorist-implanting-malicious-codes-against-stew-webb-whistleblower/

Cyber Attackers Network planting malicious codes against Stew Webb Whistleblower 2018
http://www.stewwebb.com/2018/03/25/cyber-attackers-network-planting-malicious-codes-against-stew-webb-whistleblower-2018/

Cyber Terrorists planting malicious codes against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/16/cyber-terrorists-planting-malicious-codes-against-stew-webb-whistleblower/

March 28, 2018
Cyber Attackers exposed by Stew Webb Federal Whistle blower March 28 2018
http://www.stewwebb.com/2018/03/28/cyber-attackers-exposed-by-stew-webb-federal-whistle-blower-march-28-2018

New evidence posted below implanting malicious code

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence _syncAttackData= 1522350851.57

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522350851.57
3/29/2018 2:14:14 PM (11 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522350851.57
3/29/2018 2:14:14 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human
United States North Royalton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
3/29/2018 2:14:10 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human
United States North Royalton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
3/29/2018 2:14:10 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:41 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:38 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try  .wideopenwest.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:37 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100
Type: 404 Not Found
United States North Royalton, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
3/29/2018 2:13:35 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States North Royalton, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
3/29/2018 2:13:31 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Human
United States North Royalton, United States arrived from https://duckduckgo.com/ and visited http://www.stewwebb.com/
3/29/2018 2:13:17 PM (15 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try  .wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/60

# The following results may also be obtained via:
# https://whois.arin.net/rest/nets;q=NET-50-4-64-0-1?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
#

NetRange: 50.4.64.0 – 50.4.79.255
[4096 addresses in this network]
CIDR: 50.4.64.0/20 (50.4.64.0 – 50.4.95.255)
[8192 addresses in this network]
NetName: OH-CLEV
NetHandle: NET-50-4-64-0-1
Parent: WIDEOPENWEST (NET-50-4-0-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C02609448)
RegDate: 2010-10-15
Updated: 2014-10-28
Comment: Address complaints to abuse@  wideopenwest.com
Ref: https://whois.arin.net/rest/net/NET-50-4-64-0-1

CustName: Wide Open West
Address: 105 Blaze Industrial Pkwy
City: Berea
StateProv: OH
PostalCode: 44017
Country: US
RegDate: 2010-10-15
Updated: 2014-10-28
Ref: https://whois.arin.net/rest/customer/C02609448

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: ipadmin@  wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: abuse@  wideopenwest.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: ipadmin@  wideopenwest.com
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: kevin.baker@  wowinc.com
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

RTechHandle: LW463-ARIN
RTechName: WALDEN, LAWRENCE D
RTechPhone: +1-800-491-1436
RTechEmail: dwalden@  wideopenwest.com
RTechRef: https://whois.arin.net/rest/poc/LW463-ARIN

RNOCHandle: NMC5-ARIN
RNOCName: Network Management Center
RNOCPhone: +1-800-496-9669
RNOCEmail: nmc@  wideopenwest.com
RNOCRef: https://whois.arin.net/rest/poc/NMC5-ARIN

RAbuseHandle: ABUSE241-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-800-496-9669
RAbuseEmail: abuse@ wideopenwest.com
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE241-ARIN

Wide Open West Finance LLC cyber attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/23/wide-open-west-finance-llc-cyber-attacks-against-stew-webb-whistleblower/

Larry Mizel Wide Open West Financial cyber attacks against Stew Webb Whistle blower
March 3, 2018
http://www.stewwebb.com/2018/03/02/larry-mizel-wide-open-west-financial-cyber-attacks-against-stew-webb-whistleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

USAG Sessions Larry Mizel Cyber attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Insurance Co Cyber Attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/25/larry-mizel-insurance-co-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Cyber Attacks against Stew Webb Whistle blower 18-USC-1010-1015
http://www.stewwebb.com/2017/12/25/larry-mizel-cyber-attacks-stew-webb-whistle-blower-18-usc-1010-1015/

Larry Mizel Cyber attack against Stew Webb Whistle blower
http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/westminister-colorado-computercrews-cyber-attacks-against-stew-webb-whi-stleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan March 21 2018

Radio Stew Webb and Tom Heneghan March 21 2018

Intel Update – Tom Heneghan, Stew Webb (3-21-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




U.S. Countdown Starts

By Tom Heneghan, International Intelligence Expert

United States of America   –   It can now be reported that the U.S. Provost Marshall, along with the U.S. Military Joint Chiefs of Staff, has declared Executive Emergency Provost Protocol Override declaring that Albert Gore Jr. of Carthage, Tennessee is the non-inaugurated, natural born, year 2000 DULY ELECTED President of the United States of America.

Accordingly, all other elections from 2004 to 2016 are null and void.

The full implementation of the 28th Amendment will be executed with any attempt to interfere in the re-implementation of the Constitution of the United States of America being dealt with all appropriate measures, including brute force.

The order goes out : Obey the Constitution, the Supreme Law of the United States, or else!

What Taxpayers Get From the (pre 9/11 put options) Bear Stearns ‘Bailout’

https://money.usnews.com/money/blogs/flowchart/2008/03/25/what-taxpayers-get-from-the-bear-stearns-bailout

April of 2008   Tom Heneghan   

…The current AIPAC trial, which is being delayed in U.S. Federal Court in Virginia, deals with new evidence linking elements of the Israeli MOSSAD-run New Jersey-based Urban moving Systems to command and control in the 9/11 attack on America.

There is also evidence, which is financial in nature, tying both Viktor Bout and unelectable LOSER Hillary Clinton fundraiser and 9/11 co-conspirator, Mehmet Celebi, to PRE-9/11 put options and short positions placed on the New York Stock Exchange and the Chicago Board of Options in both airline and insurance stocks just prior to 9/11.  The brokerage firm fingered in orchestrating this financial TREASON is none other than Bear Stearns offices in Chicago, Illinois and Winter Springs, Florida.

Reference: The criminal Bush fraud Administration has just recently bailed out Bear Stearns with U.S. TAXPAYERS.

Wells Fargo gives its CEO a $4.6m raise on flat earnings and more scandals

Wells Fargo CEO Tim Sloan has only been on the job since October, but he’s earned a 35%, $4.6m raise, despite flat earnings and a series of scandals since Sloan took over from the cartoonishly villainous John Stumpf.

https://boingboing.net/2018/03/15/son-of-stumpf.html

Following The Bailout Money To Wells Fargo – CBS News

https://www.cbsnews.com/news/following-the-bailout-money-to-wells-fargo/

All the Ripoffs and Scams Wells Fargo Pulled on Customers …

Wells Fargo had to pay billions in fines for ripping off Americans … while Wells Fargo got a bailout. …

https://www.cheatsheet.com/money-career/wells-fargo-ripping-off-people.html/?a=viewall

Wells Fargo isn’t ready to repay federal bailout funds …

Jun 10, 2009 · Wells Fargo & Co. didn’t want a federal capital infusion last fall but got …

http://articles.latimes.com/2009/jun/10/business/fi-wells-fargo10

At this hour, U.S.-based Wells Fargo Bank and its branch out of Reno, Nevada is in total violation of the Commodity Exchange Act of 1936 as they are trying to bail out, along with Jefferies Inc out of Chicago, Illinois, the massive debits and margin calls of Bank of America tied to their naked short positions in the Swiss franc and the Japanese yen.

P.P.S. Wells Fargo is now putting in jeopardy all of its depositors and account holders by using Dodd-Frank legislation as a vehicle to use the deposits of their customers to meet the margin calls of Bank of America and other FX firms who were blindsided by the Swiss National Bank/

What is forthcoming is a massive ‘BAIL-IN’ by crooked U.S. banks STEALING AND LOOTING OF THEIR CUSTOMERS’ FUNDS to meet their massive margin calls tied to their naked short under margined positions in the Japanese yen.

October 7, 2008   Tom Heneghan

P.P.S. A massive ponzi scheme is now taking place inside the [privately owned] Federal Reserve linked to Wachovia, Wells Fargo and Citi Bank involving TRILLIONS of dollars of currency derivatives tied to Luxembourg and the Philippines.

A major Bush-Clinton Crime Family Syndicate brokerage firm called Alex Brown Securities, a division of none other than Deutsche Bank, is being used to launder Euro currency to various secret bank accounts in the nations of Luxembourg, Denmark and Sweden.

Alex Brown Securities is also the New York firm, which currently handles the account of both daddy Bush and his little bitch, Bill Clinton, involved in alleged hurricane relief, but is nothing more than a front for currency derivative fraud.

Note: It did not take daddy Bush’s little bitch, Bill Clinton, long to start once again doing business with his ‘handler’ daddy Bush, in fact only two months after his lesbian in-the-closet wife’s defeat sociopath Clinton was back doing business with sociopath daddy Bush.

P.P.P.S.  It was the FDIC that ruled Citi Bank has the legal authority to buy Wachovia.

It was only after Wells Fargo, an alleged solvent bank, received $30 BILLION in ‘bailout’ money from the U.S. Treasury, did Wells Fargo make a new bid for Wachovia at the expense of Citi Bank’s bid.

As we reported in a previous briefing, folks, Bushfraud and his criminal co-conspirators want to use Wells Fargo to hide and cover up the Deutsche Bank derivatives, which are linked to major alleged Al Qaeda terrorist cells operating in the German Republic who have major secret accounts at the Deutsche Bank.

The scam that Paulson, Bushfraud and Bernanke are trying to pull off, along with the compromised Internal Revenue Service, is to let Wells Fargo buy Wachovia Bank and then let Wachovia actually write off the outstanding fixed rate derivatives linked to Deutsche Bank.

October 25, 2009  Tom Heneghan

UNITED STATE of America   –   It can now be reported that both Wells Fargo Bank and Bank of America face total collapse within 24 hours.

Federal Reserve Chairman Bernard Bernanke has been told by the People’s Republic of China that he must re-pay a $1 TRILLION loan, which was given to him by the PRC, by Tuesday, October 27, 2009 at 9:00 a.m. EST.

Note: The $1 TRILLION loan was issued by China to the former Bush FRAUD Administration in September of 2008 and was designed to stabilize the U.S. equity market and basically help the Federal Reserve and the U.S. Treasury bail out the crooked banks and brokerage firms like Goldman Sachs and J.P. Morgan that have helped enable the LOOTING of the U.S. Treasury.

Item: Over this weekend Chinese officials became enraged when they became aware that the $1 TRILLION loan is gone and was wiped out in massive derivative aka toxic asset trading with the derivatives being compounded 100 times by the crooked Federal Reserve, which used these then worthless derivatives as collateral to create cash aka funny money that has been used to manipulate U.S. equity and bond markets and artificially manufacture a bogus yield curve designed to keep interest rates at zero.

Again, the low interest rates are only used by these crooked banks to exchange and mark up worthless derivatives aka credit default swaps.

Banks are not loaning money to the American People; they are engaged in a Ponzi Scheme between themselves.

Chinese officials also became enraged when they learned early last week that the noted Galleon Group India-based hedge fund was used by both Goldman Sachs and the Federal Reserve Bank of New York utilizing the Bernard Madoff Ponzi Scheme to LOOT the Chinese Sovereign Fund on behalf of the Bush-Clinton Crime Family Syndicate.

Note: Informed sources tell us that former BushFRAUD Treasury Secretary Henry ‘Hank’ Paulson has told his friends that he feels he is being tracked and monitored by members of Chinese Intelligence on a 24 hour basis.

It should also be noted that the Chinese want Paulson arrested for failure to allow Bank of America to implement the noted Wanta-Reagan-Mitterrand Protocols, which would allow TRILLIONS of dollars to return to the U.S. Treasury from offshore secret hedge funds and accounts tied to the members of the noted Bush-Clinton Crime Family Syndicate.

We can now also divulge that Bank of America CEO Kenneth Lewis is cooperating with current New York Attorney General Andrew Cuomo and his consultant, former New York Governor Eliot Spitzer, in their on-going criminal investigation in New York State that threatens to bring down the conspiratorial criminal Federal Reserve Bank.

HIGH Treason Conspirators Against the American People

George W. BushFRAUD, center, is flanked by U.S. Treasury Secretary Henry Paulson, right,

Federal Reserve Chairman Ben Bernanke, left. SEC Chairman Christopher Cox trails behind.

Lewis has testified that former Federal Reserve Chairman Alan Greenspan, former BushFRAUD Treasury Secretary Hank Paulson, along with current Obama Treasury Secretary Timothy Geithner and current Federal Reserve Chairman Bernard Bernanke, as well as former illegal White House occupant George W. Bush FRAUD, himself, coordinated a secret money laundry involving the Galleon Group hedge fund that allowed Wells Fargo Bank to wire BILLIONS of dollars of STOLEN U.S. Taxpayers’ funds to finance the Bank of America ‘bail out’ of Merrill Lynch that took place in December of 2008.

Note: These funds are also linked to the $1 TRILLION Chinese loan.

Wells Fargo moved most of the funds from an offshore hedge fund in the Philippines that, along with the India-Pakistan based Galleon Group hedge fund, was immune from any Congressional or SEC oversight based on national security consideration.

These alleged hedge funds supposedly had a role in identifying financial terrorist activity of alleged Al Qaeda.

Nothing could be further from the truth!

The Philippines based Wells Fargo funds and the aforementioned Galleon Group have now been fingered by New York investigators as a major financial supporter of the alleged Al Qaeda terrorist organization Jundallah.

BushFRAUD and his former Vice pResident Richard Cheney used this organization for various terrorist black ops in Afghanistan, Iraq and Iran.

Jundallah was used, and IS being used in the recent bombings in Pakistan as to prevent FBI investigators from looking into the Galleon Group hedge fund.

Jundallah has been directly linked to the assassination of former Pakistani Prime Minister Benazir Bhutto as well as the violent terrorist blacks ops staged in Iran and in Mumbai (Bombay), India.

Jundallah and its cells have recently splintered off because their cash flow has been cut off and are now being directed by the Sunni insurgency as well as British Intelligence in Iraq to stage false flag terrorist attacks and are being paid by none other than Blackwater Associates and STOLEN funds from the Central Bank of Iraq tied to none other than former British Prime Minister, Dunblaine pedophile and war criminal, Anthony Blair.

So you see, folks, this whole phony war on terror dating back to 9/11 is nothing more than a massive financial Ponzi Scheme involving crooked hedge funds and out-of-control nation states that want to set up a permanent anti-terrorist infrastructure that will destroy basic individual rights of citizens worldwide, including, of course, destroying the Constitution of the United States and the American Republic.

Rollback of Dodd-Frank Provisions Clears Senate On 10-Year Anniversary Of Bear Stearns Collapse

by Tyler Durden

Thu, 03/15/2018

A bipartisan bill which would relax restrictions placed on the financial industry during the credit-crisis has cleared the Senate with a vote of 67-31, on the 10-year anniversary of the collapse of Bear Stearns – but not before several changes to the original legislation were made, which would benefit big banks.

A bill that began as a well-intentioned effort to satisfy some perhaps legitimate community bank grievances has instead mushroomed, sparking fears that Washington is paving the way for the next financial meltdown,” writes David Dayen of The Intercept.

Key Provisions

​READ MUCH MORE

https://www.zerohedge.com/news/2018-03-15/rollback-dodd-frank-provisions-clears-senate-10-year-anniversary-bear-stearnsUpload Files

September 15, 2013   Tom Heneghan

Bill Clinton signs into law the Gramm-Leach-Bliley Financial Services Modernization Act, November 12, 1999

[…] The 1999 Financial Services Modernization Act (FSMA) was conducive to the the repeal of the Glass-Steagall Act of 1933. A pillar of President Roosevelt’s “New Deal”, the Glass-Steagall Act was put in place in response to the climate of corruption, financial manipulation and “insider trading” which resulted in more than 5,000 bank failures in the years following the 1929 Wall Street crash.

Under the 1999 Financial Services Modernization Act, effective control over the entire US financial services industry (including insurance companies, pension funds, securities companies, etc.) had been transferred to a handful of financial conglomerates and their associated hedge funds.

http://www.globalresearch.ca/who-are-the-architects-of-economic-collapse/

United STATES of America   –   Today we present clear cut evidence from awarding winning journalist Greg Palast that Clinton-Bush Crime Family Syndicate bank stooge Larry Summers should be blocked by Congress from ever being Federal Reserve Chairman.

Summers lobbied Congress, along with former Texas Republican Senator Phil Gramm and former Clinton era U.S. Treasury Secretary Robert Rubin, to have the depression era Glass-Steagall Act revoked.

It was former President Bill Clinton that signed legislation in 1999 that eliminated the Glass-Steagall Act.

The Glass-Steagall Act had protected Americans’ savings deposits for decades and had prevented banks from participating in proprietary trading aka casino gambling using U.S. savings deposits as collateral

P.S. At this hour Swedish banks face a major liquidity crisis involving ass backwards derivatives tied to their currency, the krona.

In closing, it is time to reinstate Glass-Steagall and prevent Larry Summers from cross-collateralizing any more derivatives, which represent U.S. Taxpayers’ funds.

$1 Trillion In US Bank Deposits Held Abroad Will No Longer Be Insured

http://www.zerohedge.com/news/2013-09-10/1-trillion-us-bank-deposits-held-abroad-will-no-longer-be-insured

April 3, 2013   Tom Heneghan

In closing it is important to remember who signed the 1999 legislation that got rid of the Glass-Steagall Act that protected the savings of average Americans since depression days.

It was Bush Crime Family crony Bill Clinton enabled by his crooked wife, Benghazi war criminal, Hillary Rodenhurst Clinton, then Treasury Secretary Robert Rubin and further enabled by Christopher Dodd, Barney Frank, Newt Gingrich and bald headed misfit, former Texas Senator Phil Gramm, whose wife Wendy (who was then head of the CFTC) lobbied for this legislation, which now threatens to wreck the entire world economy.

April 2, 2015   Tom Heneghan

It gets even worse!

We can now divulge that the privately owned U.S. Federal Reserve (controlled by the Bank of England) has been accommodating Bank of America, JPMorgan Chase and the New York Mellon Bank in disguising massive wrap around (non-collateralized without margin) derivative debt tied to Bank of America and the George W. Bush FRAUD – Henry Paulson mortgage-backed securities scam that helped wreck and destroy, along with Bear Stearns, the U.S. economy in 2007 and 2008.

April of 2008   Tom Heneghan

 …The current AIPAC trial, which is being delayed in U.S. Federal Court in Virginia, deals with new evidence linking elements of the Israeli MOSSAD-run New Jersey-based Urban moving Systems to command and control in the 9/11 attack on America.

There is also evidence, which is financial in nature, tying both Viktor Bout and unelectable LOSER Hillary Clinton fundraiser and 9/11 co-conspirator, Mehmet Celebi, to PRE-9/11 put options and short positions placed on the New York Stock Exchange and the Chicago Board of Options in both airline and insurance stocks just prior to 9/11.The brokerage firm fingered in orchestrating this financial TREASON is none other than Bear Stearns offices in Chicago, Illinois and Winter Springs, Florida.

Reference: The criminal Bush fraud Administration has just recently bailed out Bear Stearns with U.S. TAXPAYERS.

2008 by Tom Heneghan

BUSH-CLINTON 9/11 LINKED BEAR STEARNS, “RHINELAND FUNDING”,

the great misnomer THE FEDERAL RESERVE, (private bankers)

AND THE LOOTING OF THE U.S. TREASURY

Fed Bails Out Bear Stearns

Stocks Tumble After Bear Stearns Bailout

PREVIOUS INTELLIGENCE BRIEFINGS RELATED TO 9/11 TIED BEAR STEARNS HEDGE FUND:

September 4, 2007   Tom Heneghan

 …P.S. Newsweek Magazine is claiming that bin Laden is still alive. 

Reference: Bin Laden died of kidney failure six years ago.

Bin Laden actually went to a CIA hospital in Dubai, United Arab Emirates in July of 2001, just two months prior to 9/11, to receive dialysis treatment for his failing kidneys.

That is correct folks! Two months before 9/11 bin Laden, i.e. Tim Osman (bin Laden’s name within the CIA was Tim Osman), was a “Dead Man Walking”.

So the question in front of us is the following:

Why is Newsweek Magazine and its editor, homosexual in-the-closet Jon Meacham, and his buddy Mossad agent Michael Isikoff trying to keep bin Laden alive?

The answer folks is simple. Bin Laden’s holdings in the defunct Bear Stearns Hedge Fund are subject to an IRS tax levy at the time of his death.

Since Newsweek Magazine and the British Royal Family have major holdings in the Bear Stearns Hedge Fund and the Carlyle Group it is necessary to keep bin Laden alive.

September 8, 2007   Tom Heneghan 

…Notice to homosexuals in-the-closet Freddy Thompson and Jon Meacham:  I still have the America Global China documents that you covered up to protect both Bush and Clinton; and just a reminder that I still have the Red Mercury-Gary Best-FBI Division 5-Osama bin Laden-Al Qaeda financial contractual agreements.

Could this be the reason the Bear Stearns Hedge Fund collapsed.

And one last warning to the U.S. media filth:  We are monitoring you 24 hours a day and watching your lies and spin as you present this bogus bin Laden tape as something real.

September 15, 2007   Tom Heneghan  

…Reference: Informed sources familiar with Bank of America and Bear Stearns allege that the Federal Reserve is on orders from Bushfraud to bail out Bank of America and the Bear Stearns Hedge Fund.

Note: The Northern Rock Bank of the United Kingdom has already collapsed because of the criminal money laundering of both Bank of America and Bear Stearns Hedge Fund.

November 18, 2007   Tom Heneghan  

…It can now be reported that White House occupant George W. Bushfraud has nominated his enabler Judge Mark R. Filip for Deputy Attorney General of the United States, (312) 435-5667.

Filip, a former law clerk to grease ball fascist Justice Anthony Scalia, now sits as a Federal Judge on the U.S. Court of Appeals Court in Chicago.

Now let’s look at Filip’s jaded background.

Before his appointment to the Illinois bench, Filip worked at a noted law firm in Chicago called Skadden Arps.

Skadden Arps has been linked to the bribes of Florida election officials in the overthrow of the year 2000 presidential election, i.e. Albert Gore’s victory.

And, of course, it gets worse!

The funds for the fix derived from CIA stooge corporation Coca Cola, General Electric Accola and the Walt Disney ABC News organization.

The bagman and fixer was none other than 9/11 co-conspirator, former U.S. Solicitor General Ted Olson.

Upon further investigation, the Florida 2000 bribery funds have been traced to Winter Springs, Florida Bear Stearns Brokerage.

Bear Stearns Winter Springs, Florida actually facilitated an IPO on a noted software company called Choicepoint software.

Choicepoint software was used by the State of Florida in the year 2000 to ILLEGALLY purge over 50,000 African-Americans off the voter rolls and falsely classify them as convicted felons preventing them from voting.

The leadership team directing this TREASON project was none other than Florida Governor Jeb Bush, Ted Olson, Judge Mark Filip and Florida’s Secretary of State and noted slut Katherine Harris.

And, of course, it keeps getting worse!

Olson not only helped to facilitate bribes to the Gang of Five on the U.S. Supreme Court, which overthrew Albert Gore’s election as president, but also facilitated bribery for Chicago Judges Filip, Darrah and Wedoff who were hearing arguments on the Coca Cola copyright case tied to ABC Mickey Mouse Walt Disney, whose major stockholders included Floridagate 2000 fixer James Baker, current Supreme Court Justice John Roberts and none other than unelectable Hillary lesbian IN-THE-CLOSET Rodenhurst Clinton’s brother Hugh Rodham.

Rodham represented none other than Colombian Medellian drug cartel boss Carlos Lehdrer.

Lehdrer was later pardoned by Florida Governor Jeb Bush. Lehdrer has been linked to dirty Floridagate 2000 narcotics money, and the noted 9/11 SunCruz casino ships that Mohamed Atta allegedly gambled .. 9/11.

Lehdrer even had a trading account at Bear Stearns in Winter Springs, Florida.

The crime spree involving these conspirators continues.

November 20, 2007   Tom Heneghan

…It can now be reported that Bushfraud’s recently resigned Homeland Security Advisor, Frances Fragos Townsend, is under criminal investigation for perjury and obstruction of justice in regards to the warrant-less wiretapping that was ordered by occupunk George W. Bush against the American People PRE 9/11.

TOWNSEND, A LIFELONG STOOGE AND OPERATIVE OF THE BUSH-CLINTON CRIME FAMILY SYNDICATE ACTUALLY DESTROYED INCRIMINATING DOCUMENTS, EMAILS AND CABLES THAT HAVE A DIRECT LINK TO THE INFORMATION THAT FBI WHISTLEBLOWER SIBEL EDMONDS HAD DISCOVERED, WHICH WARNED THE U.S. GOVERNMENT OF THE PENDING 9/11 ATTACK.

Reference: Daniel Ellsberg, the individual who helped release the “Pentagon Papers” in the early 1970s, has been quoted saying that the Sibel Edmonds evidence directly involves criminal activity and impeachable offenses by the highest levels of the Bush Administration, including the alleged President and Vice President. 

The French PRE 9/11 WARNING to the U.S. government, i.e. the U.S. State Department, which was the intercepted Israeli Intelligence-MOSSAD cable containing the 9/11 command order “the time is now, the match is hot”, was withheld from the Patrick Fitzgerald investigation by none other than both Frances Fragos Townsend and current head of the Department of Homeland Security, MOSSAD agent, Michael Chertoff.

Remember folks, this 9/11 TREASON information and evidence was also available in advance to the New York State delegation including then New York Attorney General Eliot Spitzer, now New York governor, MOSSAD asset Charles Schumer, Democrat of New York, and of course, MOSSAD agent, unelectable CLOSET lesbian Hillary Rodenhurst Clinton.

NOTE: THE FRENCH INTERCEPTS OF ISRAELI CABLES FROM THE MOSSAD OUTPOST IN DUBAI, UNITED ARAB EMIRATES (UAE) DEALT DIRECTLY WITH ISRAELI INTELLIGENCE INTENTIONS TO MAKE THEIR MOSSAD-AL QAEDA CELLS IN THE UNITED STATES OPERATIONAL FOR THE PURPOSE OF A TERRORIST ATTACK.

SO THE COMMAND AND CONTROL FOR THE 9/11 BLACK OPS ATTACK ON THE UNITED STATES CAME FROM A DUBAI, UAE ISRAELI INTELLIGENCE OUTPOST.

Once again it was our great ally of 200 years, The Republic of France, that tried to save America from this TREASON conspiracy against the American People.

Do not be fooled by the controlled American media elite’s latest spin that Matt McClellan, former Bushfraud press secretary, was lied to by the Bush Administration in regards to the Valerie Plame case.

Both Patrick Fitzgerald and the Bush Administration knew all along that Richard Armitage was the leaker. So there never has, or never will be, a real case involving Valerie Plame’s status.

What Matt McClellan, the Bushfraud Administration and the media elite filth want to do is to spin and defer from the REAL question before us, which deals with the SEALED NATIONAL SECURITY FILINGS MADE BY FITZGERALD IN THE INDICTMENT OF SCOOTER LIBBY.

Remember, the indictment of Libby was for perjury and obstruction of justice, it had nothing to do with the question of Valerie Plame’s alleged “outing” as a CIA agent.

Fitzgerald continues to investigate the larger question dealing with 9/11 and the attempt to plant WMDs in Iraq utilizing Dubai, UAE.

That road of inquiry takes us right back to the American-Turkish Council and the TREASON evidence Sibel Edmonds is holding.

Item: So we now see why Bushfraud needs to appoint Judge Mark Filip of Chicago, Illinois as Deputy Attorney General of the United States.

Filip continues to engage in felony obstruction of justice in the matter of not only 9/11 and the ILLEGAL war in Iraq, but the bribery and criminal conspiracy that overlaps in the overthrow and coup d’ etat that took place in Florida, i.e. the year 2000 presidential election.

Remember the sealed National Security filings of Fitzgerald connect the dots from Floridagate 2000 to the 9/11 Mohamed Atta SunCruz Casinos and the role of both Valeria Plame and Scooter Libby in the Bush-Clinton “TRUE COLORS” assassination teams.

The financial records taken from the American-Turkish Council by Sibel Edmonds traced the financial funding for all of this TREASON to a Bear Stearns brokerage house in Winter Springs, Florida with a direct connection to the LaSalle Bank in Chicago.

Dec 21, 2007  Tom Heneghan

…P.S. We are now working on a story involving the Cayman Islands and secret offshore accounts tied to daddy Bush, Jeb Bush, noted 2000 election fixer Katherine Harris, along with Bill and Hillary Clinton, and current Republican presidential candidate Mitt Romney.

Some of the funds in the offshore accounts of these individuals were actually stolen and laundered utilizing the now bankrupt Bear Stearns Hedge Funds.

The Bear Stearns office in Chicago, Illinois is now the focus of U.S. Treasury investigators.

The Chicago Bear Stearns office has been tied to massive wire transfers of Euro currency through the Cayman Islands.

Also tied up in this fiasco is the Key Bank Utah, a known front for the Church of Latter Day Saints, i.e. the Mormon Church.

Reference: This investigation in Utah ties back to millions of dollars missing from the Utah Olympic project involving the Bushes, the Clintons, homosexual IN-THE-CLOSET Senator Orrin Hatch and current Republican presidential candidate Mitt Romney.

January 1, 2008   Tom Heneghan

  …Al Qaeda and the government of Pakistan have found their way into the campaign coffers of UNELECTABLE lesbian IN-THE-CLOSET Hillary Rodenhurst Clinton, Democrat of New York, “Barbie doll” and serial flip-flopper Mitt Romney, Republican of Massachusetts, as well as CLOSET homosexual and abortion lobbyist Fred Thompson, and pedophile Bill Richardson, Democrat of New Mexico.

Reference: Some of these funds are actually offshoots of the late Osama bin Laden’s construction company.

These funds were laundered through the now defunct Riggs Bank in Washington D.C. into offshore CIA proprietaries in the Cayman Islands and then actually placed in the accounts of these political New World Order stooges through on-shore firms, like General Electric NBC and Bear Stearns.

Note: Bear Stearns, which is now broke, was linked to American Insurance Group (AIG) and PRE 9/11 put options placed on the New York and Chicago financial exchanges 72 hours before the September 11th attacks.

POLITICAL WHORE ALERT

Do not be fooled by the potential presidential candidacy of Khazarian Jew and current New York Mayor Michael Bloomberg.

Bloomberg, a 9/11 co-conspirator, has covered up the American International Group (insurance/financial) Hank Greenberg’s PRE 9/11 put option scam run through Bear Stearns on major insurance companies like Swiss and German ReInsurance.

Bloomberg is also covering up, not only for Bear Stearns and American Insurance Group (AIG), but also for the activities PRE-9/11 at the American-Turkish Council and the secret correspondence between Hank Greenberg, the American-Turkish Council and noted Khazarian Jew and war criminal, Henry Kissinger.

Note: It was the unelected Bushfraud that wanted to place Kissinger as the chairman of the so-called 9/11 Commission.

February 14, 2008   Tom Heneghan

 …Celebi, a dual Turkish-U.S. citizen, was named as a MAJOR player in the MOSSAD-riddled 9/11 linked arms and narcotics counterfeiting racket run at the noted American-Turkish Council headquarters in Ankara, Turkey.

Celebi worked at the American-Turkish Cultural Alliance in Chicago, Illinois and also worked part-time at the Turkish Consulate in Chicago.

Sibel Edmonds, with the help of French Intelligence, intercepted conversations at the American-Turkish Council, which fingered Henry Kissinger and former British Prime Minister Tony Blair to known Al Qaeda cells in Hamburg, Germany.

Reference: This terrorist cell is operated by known UNELECTABLE Hillary stooge and business partner EVA TELEGE aka TELEKE aka TELEKI, who is a wanted suspect in the 7/7 London bombings.

Celebi’s name was mentioned in some of the conversations that originated from the American-Turkish Council and the Turkish Consulate in Chicago.

Celebi seems to have been a bagman for various financial trading schemes linked to “put options” placed at Bear Stearns in Chicago just prior to 9/11.

Note: Celebi had been identified in 1999 by then Vice President Albert Gore Jr., along with Gore’s national security adviser Leon Fuerth and Clinton Administration anti-terrorist point man Richard Clarke as being involved in Al Qaeda terrorist funding utilizing the American-Turkish Cultural Alliance and known Colombian cartel drug lord Carlos Lehder as co-conspirators (Hillary Clinton’s brother Hugh Rodham was attorney for drug lord Lehder – then Governor Jeb Bush ILLEGALLY pardoned his co-conspirator Lehder).

Also mentioned with Celebi in the criminal referral, which was given to Clinton’s Attorney General Janet Reno was East German DVD agent and UNELECTABLE Hillary Rodenhurst Clinton adviser EVA TELEGE aka TELEKE aka TELEKI.

Reference: TELEGE, an East German DVD agent, had infiltrated the Clinton White House and had become a major adviser to then First Lady Hillary Clinton on a project to build an Alabama toll bridge utilizing the funds of noted CIA proprietary account Marvelous Investments Ltd. in Andover, Massachusetts.

Thanks to the work of Gore, Fuerth and Clarke, and FBI investigation was initiated in regards to Celebi but later dropped as President Clinton, i.e. daddy Bush’s little bitch, claimed that Celebi had immunity from prosecution given his status as a Central Intelligence Agency (CIA) operative.

This was all happening at the time that SERIAL RAPIST Bill Clinton and his Secretary of State Madeleine Albright aka Half-bright, allowed Osama bin Laden to escape termination, i.e. assassination, because both Clinton and Albright were afraid that killing bin Laden would immediately trigger billions of dollars laundered through Kosovo and Eastern Europe to be identified as CIA proprietary funds due Ambassador Leo Wanta.

February 24, 2008   Tom Heneghan

 …Speaking of insider trading, it can now be reported that NEW SMOKING GUN 9/11 EVIDENCE is in possession of Justice Department officials loyal to former Deputy Attorney General James Comey.

The new evidence ties Bear Stearns hedge funds and a German bank IKB to PRE-9/11 put options, i.e. short sales, placed on the Chicago Board of Options.

The conduit for this ILLEGAL trading was an offshoot of the Bear Stearns Hedge Fund tied to Deutsche Bank called “Rhineland Funding”.

“Rhineland Funding” has links to the noted Bush-Clinton-Mitt Romney-CIA proprietary account in Andover, Massachusetts called Marvelous Investments Ltd.

Reference: Marvelous Investments Ltd. is headed by CEO and noted fugitive and wanted 7/7 London bombings TERRORIST suspect Eva TELEGE aka TELEKE aka TELEKI.

TELEGE aka TELEKE aka TELEKI has also been linked to the Al Qaeda 9/11 cell in Hamburg, Germany, with direct ties to the East German DVD-MOSSAD money laundering “Rhineland Funding”.

AND NOW IT REALLY GETS WORSE!

“RHINELAND FUNDING” HAS BEEN FINGERED BY FBI WHISTLEBLOWER SYBIL EDMONDS AS HAVING DIRECT LINKS TO THE AMERICAN-TURKISH COUNCIL AND THE BUSH-CLINTON 9/11 TIED BEAR STEARNS HEDGE FUND THAT, ALONG WITH THE U.S. FEDERAL RESERVE, HAS LOOTED THE U.S. TREASURY.

 May God save the United States of America and

 the Constitution of the United States

EXPECT THE UNEXPECTED!

EXECUTIVE EMERGENCY

 PROVOST PROTOCOL OVERRIDE

IS FULLY OPERATIONAL AND

WILL BE FULLY IMPLEMENTED

Al Gore on Restoring the Rule of Law

http://www.acslaw.org/acsblog/al-gore-on-restoring-the-rule-of-law

VITAL FACTS

Prescott Bush aided Hitler’s Nazis – charged with Trading With the Enemy Act

Prescott Bush reportedly adopted Nazi SS Officer Scherff’s son who was renamed George Herbert Walker Bush (Scherff)

Over 100 NAZI scientists were covertly imported into the United States wherein secret experiments were surreptitiously conducted in numerous cities on the American People

George H.W. Bush-Scherff was involved with the assassination of President John F. Kennedy and the attempted assassination of President Ronald Reagan

In 1989 George H.W. Bush-Scherff STOLE $27.5 TRILLION from the American and French People’s Treasuries known as the Wanta-Reagan-Mitterrand Protocols; 29 years later $433 TRILLION is now waiting to be returned to the American and French People — these Treasury funds will pay off national debt, employ millions on restoring America’s infrastructure, lower taxes, eradicate illegal federal income tax, etc.

Bush-Scherff family and CIA assets Bill and Hillary Clinton et al have been the MAJOR drug traffickers into the United States

George H.W. Bush-Scherff and son junior George W. Bush-Scherff aka BushFRAUD used BRITISH and ISRAELI satellites at 7:58 p.m. Central Standard Time on year 2000 presidential election night to flip the American People’s votes in five (5) states and STOLE the year 2000 presidential election from DULY ELECTED President Albert Gore Jr.

Following the ‘Rule of Law’ it has been categorically confirmed by a massive audit of material evidence that Albert Gore Jr. won the year 2000 presidential election by over four (4) million votes and 324 Electoral College votes and Albert Gore Jr. is the DULY ELECTED non-inaugurated President of the United States.

9/11 was a FALSE FLAG Black Op attack on the United States using U.S.-Canadian red/blue war games as a disguise – “Deep State” aka BushScherff-Cheney-Israelis-Saudis — ISRAELIS planted bombs in the WTC Towers, SAUDIS assisted in the funding of the 9/11 attack — many made millions off the near 3,000 murders using put options PRIOR to 9/11

Un-Constitutional “Patriot Act” aka Hitler’s Nazi “Enabling Act” was actually written PRIOR to 9/11 placing the American People into an Orwellian Nazi gestapo spy state

Bush-Scherff Nazi Paperclip CIA asset Tim Osman aka Osama bin Laden was used for ILLEGAL war on innocent Afghanistan People who NEVER attacked the United States used to stop the Taliban nearly eradicating the $1 TRILLION a year poppy opium fields

Phony, fabricated BRITISH “yellow cake” dossier used for ILLEGAL preemptive war on innocent Iraqi People who NEVER attacked the United States.

MILLIONS of unarmed, innocent Iraqi and Afghani People murdered, maimed or displaced

Bush-Scherff’s Nazi Paperclip CIA + BRITISH MI-6 + ISRAELI Mossad + Saudis + Qatar created, train, fund and arm their private terror mercenaries ISIS, Al Nusra, Al Qadea, et al

United States was prosperous for over 60 years until 1913 when the BRITISH Monarchy+Rothschild Bank of England et al private banking/bankster cartel created the (great misnomer) Federal Reserve manipulating the American People’s treasury and economy

Our Founding Father’s NEVER created tax on our labor but funded the federal government via import duties and excise tax

1913 illegal Federal Income tax was for forced on the American People

 

Once over 50 now down to just 6 who control most of the media in the United States

Orwellian cointelpro disinfo propaganda media used to cover up HIGH TREASON of the BushSherff-Clinton-Cheney-Obama Crime Cartel and foment phony fabricated FALSE FLAG wars and shooting massacres

BRITISH intelligence linked to massive U.S. government contracts aka SERCO

BRITISH intelligence linked to numerous False Flag massacres aka G4S employees/former employees

BRITISH intelligence linked G4S handles security at 90% of the American People’s nuclear sites

BRITISH intelligence linked United Arab Emirates (UAE) allowed by Cons r us gress, WITHOUT NOTICE TO THE AMERICAN PEOPLE, to control the American People’s HIGH SECURITY deep water port at Canaveral

BRITISH Monarchy was handed by Cons r us gress our Native Americans’ sacred land of 2,000 years to be desecrated by their Rio Tinto mining company

BRITISH Monarchy’s BP (British Petroleum) was allowed by FOREIGN born in Kenya, illegal White House resident Obama and

Cons r us gress to spray the American People’s gulf waters, shores, sea life with DEADLY COREXIT — it is so deadly it is totally banned in England

 

ISRAELIS are contracted to monitor the American People’s borders aka Elbit

A Great percent of Cons r us gress are bribed and/or blackmailed acting on behalf of foreign ISRAEL and “Deep State” aka

Nazi Paperclip Bush-Scherff, Clinton Crime Cartel

IRREFUTABLE : Nazi Bush(Scherff)-Clinton Crime Family Cartel’s stooge, lying and deceiving the American People, Constitutionally INELIGIBLE illegal White House occupant Barack Hussein Obama-Soetoro was FOREIGN born in Kenya, his father a British Intelligence agent.

HIGH Treason in September of 2009 WITHOUT NOTICE TO THE AMERICAN PEOPLE, then FBI Director Robert Mueller flew to Russia to hand deliver a uranium sample of behalf of Hillary Clinton’s orchestrated Uranium One treason via secret CFIUS – without notice to the American People selling 20% of U.S. uranium to Russia resulting in $145 million in donations to the Clinton Foundation

In 2014 Nazi Bush-Scherff controlled CIA+Hillary Clinton+Victoria Nuland+George Soros used $5 BILLION of AMERICAN PEOPLE’S TAX DOLLARS in the criminal, illegal orchestrated coup d’etat illegal overthrow of the duly elected Ukraine president resulting in neo-Nazis merging into the Ukraine national guard, more Soros control of Urkaine banks and Vice President Joe Biden’s son sudden appointment to the board of Burisma Holdings, Ukraine’s largest gas producer

HIGH Treason espionage ISRAELI Mossad agent Hillary Clinton knowingly allowed highly classified, top-secret and above and beyond top-secret Special Access Programs (SAP) national security intelligence on her personal unsecured home computer endangering the American People’s national security.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan March 19 2018

5’4″ Larry Mizel and Larry Mizell

aka Napolitano complex Larry Mizel

aka Larry Mizel Larry Mizzell aka Karl ?   Carl?? Ownes Westport Square Parking Lot. (Hot Spot 20/s Kansas City, Missouri.

By Stew Webb United States Federal Whistle blower 34 Years and still breathing

Radio Stew Webb and Tom Heneghan March 19 2018

more to come stay tuned!

 

Intel Update – Tom Heneghan Stew Webb (3-19-18) from Truth Warriors on Vimeo.

Your kind Contributions are very much appreciated thank you, I have not thank you by email who have contributed to keep you from been identified. – Stew Webb

 




Denver level3 cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Houston, United States visited http://www.stewwebb.com/
3/16/2018 8:59:47 AM (11 minutes ago)
IP: 74.203.161.189 Hostname: vpn.puffer.com
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
NetRange: 74.202.0.0 – 74.203.255.255
[131072 addresses in this network]
CIDR: 74.202.0.0/15 (74.202.0.0 – 74.203.255.255)
[131072 addresses in this network]
NetName: TWTC-NETBLK-9
NetHandle: NET-74-202-0-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: tw telecom holdings, inc. (TWTC)
RegDate: 2006-11-14
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-74-202-0-0-1
OrgName: tw telecom holdings, inc.
OrgId: TWTC
Address: 10475 Park Meadows Drive
City: Littleton
StateProv: CO
PostalCode: 80124
Country: US
RegDate: 1999-03-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/TWTC

ReferralServer: rwhois://rwhois.twtelecom.net:4321

OrgNOCHandle: TDN1-ARIN
OrgNOCName: TWTC Data NOC
OrgNOCPhone: +1-800-829-0420
OrgNOCEmail: noc.coreip@level3.com
OrgNOCRef: https://whois.arin.net/rest/poc/TDN1-ARIN

OrgTechHandle: NST12-ARIN
OrgTechName: NOC SWIP Team
OrgTechPhone: +1-800-829-0420
OrgTechEmail: ipaddressing@level3.com
OrgTechRef: https://whois.arin.net/rest/poc/NST12-ARIN

OrgAbuseHandle: TWTAD-ARIN
OrgAbuseName: tw telecom Abuse Desk
OrgAbusePhone: +1-800-829-0420
OrgAbuseEmail: security@level3.com
OrgAbuseRef: https://whois.arin.net/rest/poc/TWTAD-ARIN

RAbuseHandle: TWTAD-ARIN
RAbuseName: tw telecom Abuse Desk
RAbusePhone: +1-800-829-0420
RAbuseEmail: security@level3.com
RAbuseRef: https://whois.arin.net/rest/poc/TWTAD-ARIN

RTechHandle: ZT87-ARIN
RTechName: IP Manager
RTechPhone: +1-800-829-0420
RTechEmail: ipmanager@level3.net
RTechRef: https://whois.arin.net/rest/poc/ZT87-ARIN

RNOCHandle: TDN1-ARIN
RNOCName: TWTC Data NOC
RNOCPhone: +1-800-829-0420
RNOCEmail: noc.coreip@level3.com
RNOCRef: https://whois.arin.net/rest/poc/TDN1-ARIN
74.203.161.189
P address 74.203.161.189
Location Richmond, Texas, United States (US
IP address 74.203.161.189
Reverse DNS (PTR record) vpn.puffer.com
DNS server (NS record) ns3.level3.net (216.136.95.12)
ns4.level3.net (64.132.94.251)
ASN number 3549
ASN name (ISP) Level 3 Parent, LLC
IP-range/subnet 74.202.0.0/15
74.202.0.0 – 74.203.255.255
74.203.161.189
Number of SPAM hosts on 74.202.0.0/15 1
NetRange: 74.202.0.0 – 74.203.255.255
CIDR: 74.202.0.0/15
NetName: TWTC-NETBLK-9
NetHandle: NET-74-202-0-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: tw telecom holdings, inc. (TWTC)
RegDate: 2006-11-14
Updated: 2012-02-24
OrgName: tw telecom holdings, inc.
OrgId: TWTC
Address: 10475 Park Meadows Drive
City: Littleton
StateProv: CO
PostalCode: 80124
Country: US
RegDate: 1999-03-17
Updated: 2017-01-28
800-829-0420
vpn.puffer.com
This domain is hosted by Google LLC (AS15169). The first DNS server is ns3.level3.net. The current IPv4 address is 35.185.199.214. The mail server with the highest priority is puffer-com.mail.protection.outlook.com.
v=spf1 include:spf.protection.outlook.com -all
DNS server (NS records) ns3.level3.net (216.136.95.12)
ns4.level3.net (64.132.94.251)
Mail server (MX records) puffer-com.mail.protection.outlook.com (216.32.180.106)
IP address (IPv4) 35.185.199.214
IP address (IPv6)
ASN number 15169
ASN name (ISP) Google LLC
IP-range/subnet 35.185.192.0/19
35.185.192.0 – 35.185.223.255
Domain Name: PUFFER.COM
Registry Domain ID: 514963_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-11-07T23:28:29Z
Creation Date: 1993-08-30T04:00:00Z
Registrar Registration Expiration Date: 2018-08-29T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registry Registrant ID:
Registrant Name: Puffer-Sweiven, Inc
Registrant Organization: Puffer-Sweiven, Inc
Registrant Street: 4230 GREENBRIAR DR
Registrant City: STAFFORD
Registrant State/Province: TX
Registrant Postal Code: 77477-3917
Registrant Country: US
281-240-2000
puffer.com
Tech Name: Jean-baptiste, Francis
Tech Organization: Puffer-Sweiven
Tech Street: 4230 GREENBRIAR DR
Tech City: STAFFORD
Tech State/Province: TX
Tech Postal Code: 77477-3917
Tech Country: US
281-274-8709

Are you looking for IPv4 address 74.203.161.189?

Domain IPv4 address Ranking Alexa Pagerank
puffer.at 184.168.221.20
puffer.biz 107.180.0.221
puffer.ca 158.85.87.76
puffer.ch 23.227.38.32
puffer.club 5.35.241.113
left off
just puffer.com

puffer.cn 222.171.249.218
puffer.co 54.72.9.51
puffer.co.uk 87.106.142.81
puffer.com 35.185.199.214 2
puffer.com.au 141.8.224.183
puffer.com.br 65.111.191.133
puffer.com.cn 14.1.96.44
puffer.com.co 163.172.120.66 3
puffer.com.pl 85.128.134.232
puffer.com.ve 192.185.154.70
puffer.cz
puffer.de 134.119.86.62
puffer.dk
puffer.eu 72.52.10.14
puffer.fish
puffer.fun
puffer.gr.jp 218.228.195.172
puffer.group 192.64.119.57
puffer.hu 87.229.65.42
puffer.idv.tw 220.134.31.101 0
puffer.info 185.53.178.9
puffer.ir 104.237.240.22
puffer.it 92.51.165.88
puffer.link
puffer.ltd
puffer.me 220.135.46.193
puffer.net 1
puffer.nl 37.97.135.129
puffer.no 217.170.198.100 0
puffer.one 46.30.215.110
puffer.online 210.172.183.49
puffer.org 76.19.52.96
puffer.pl 85.128.134.226
puffer.ro 89.42.13.17
puffer.ru 31.31.205.163
puffer.shop 150.95.255.38
puffer.site
puffer.solutions 99.45.96.209
puffer.store
puffer.tech
puffer.top 23.234.27.209
puffer.vip 72.52.4.119
puffer.wang
puffer.xin
puffer.xyz
IPv4 routes
Startip Endip Description Country #domains #spamhosts
192.188.110.0 192.188.110.255 Puffer Sweiven US 0 0
192.190.98.0 192.190.98.255 Puffer Sweiven US 0 0
192.190.99.0 192.190.99.255 Puffer Sweiven US 0 0
192.190.100.0 192.190.100.255 Puffer Sweiven US 0 0
192.190.101.0 192.190.101.255 Puffer Sweiven US 0 0
192.190.102.0 192.190.102.255 Puffer Sweiven US 0 0
192.190.103.0 192.190.103.255 Puffer Sweiven US 0 0
198.207.162.0 198.207.162.255 Puffer Sweiven Inc. US 0 0
198.207.190.0 198.207.190.255 Puffer Sweiven Inc. US 0 0
31.28.96.0 31.28.127.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 14 0
31.47.112.0 31.47.119.255 vpn dynamic pool RU 0 0
31.47.120.0 31.47.123.255 vpn dynamic pool RU 0 0
31.47.124.0 31.47.127.255 vpn dynamic pool RU 0 0
37.1.128.0 37.1.143.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 2 3
37.8.144.0 37.8.159.255 L2TP VPN broadband connections RU 15 0
37.123.216.0 37.123.223.255 WellComm VPN Pool 2 RU 0 0
37.131.192.0 37.131.223.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 13 1
37.152.56.0 37.152.63.255 Customer VPN services located in Falkenberg SE 197 0
37.205.56.0 37.205.63.255 Convergence Group Assigned to Origin Andoversford – Aryzta VPN GB 148 0
41.138.88.0 41.138.91.255 Sous classe utilisée par les équipements du réseau local et les accès VPN BJ 1 1
45.212.0.0 45.215.255.255 -Internet provision for VPN clients. ZM 0 21
45.220.64.0 45.220.127.255 low budget VPN service SC 0 0
46.23.144.0 46.23.159.255 Dianet for VPN and PPPoE dynamic users (pool #13) RU 8 0
46.37.128.0 46.37.159.255 L2TP VPN broadband connections RU 13 0
46.167.64.0 46.167.127.255 vpn dynamic pool RU 3 2
77.247.80.0 77.247.87.255 Sys11 VPN Services UG (haftungsbeschraenkt) DE 32 0
77.247.160.0 77.247.175.255 Credolink ISP VPN pool RU 7 0
81.94.16.0 81.94.31.255 Credolink ISP VPN pool RU 10 1
85.195.128.0 85.195.191.255 Satgate VPN for Sirius3 B16 Nordic RU 3 0
89.40.92.0 89.40.92.255 VPN Services NL 0 0
89.47.15.0 89.47.15.255 VPN Services NL 0 0
92.39.224.0 92.39.239.255 Credolink ISP VPN pool RU 5 0
93.94.200.0 93.94.207.255 Railway VPN NL 0 0
94.125.80.0 94.125.87.255 NAT/PAT space, VPN access, Internet Services IT 0 0
94.190.0.0 94.190.127.255 Non-VPN customers Pervouralsk Sverdlovsk reg. “Interra” Ltd. RU 116 7
94.230.112.0 94.230.127.255 Dianet for VPN and PPPoE dynamic users (pool #02) RU 20 1
95.141.0.0 95.141.15.255 PPTP,PPPOE, VPN and Dial-UP dynamic IP for customers RU 0 0
102.144.0.0 102.151.255.255 -Internet provision for VPN clients. ZM 1 0
103.1.216.0 103.1.219.255 VPN Secure Networks AU 50 0
109.68.136.0 109.68.143.255 Credolink ISP VPN pool RU 2 0
109.105.160.0 109.105.191.255 Comtel vpn client access RU 0 0
109.201.192.0 109.201.223.255 vpn dynamic pool RU 1 1
115.124.32.0 115.124.35.255 Tesonet VPN Retail Internal AU 2 AU 0 0
157.97.120.0 157.97.127.255 VPN Consumer Network NL 1 0
159.180.0.0 159.180.63.255 Tesonet Internal VPN GB 0 0
169.239.152.0 169.239.155.255 VPN Company SC 0 0
169.239.224.0 169.239.227.255 Retail VPN Infrastructure ZA1 ZA 0 0
178.18.96.0 178.18.111.255 vpn dynamic pool RU 0 1
178.211.160.0 178.211.191.255 VPN (PPPoE) customers Sverdlovsk reg. “Interra” Ltd. RU 5 1
185.3.16.0 185.3.19.255 Dianet for VPN and PPPoE dynamic users (pool #20) RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:67c:2a0c:: 2001:67c:2a0c:ffff:ffff:ffff:ffff:ffff ITENOS Protect VPN Service DE 0 0
2a00:8ec0:: 2a00:8ec0:ffff:ffff:ffff:ffff:ffff:ffff Sys11 VPN Services UG (haftungsbeschraenkt) DE 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
38814 Asiamax Technology Limited VPN Service Provider Hong Kong HK 1 0 0 2

Are you looking for domain puffer.com?
level3.net
DMOZ directory. This domain is hosted by Level 3 Communications, Inc. (AS3356). The first DNS server is ns1.level3.net. The current IPv4 address is 4.68.80.110. The mail server with the highest priority is cluster5.us.messagelabs.com.
DNS server (NS records) ns1.level3.net (209.244.0.1)
ns2.level3.net (209.244.0.2)
Mail server (MX records) cluster5.us.messagelabs.com (216.82.251.35)
cluster5a.us.messagelabs.com (216.82.251.230)
IP address (IPv4) 4.68.80.110
IP address (IPv6)
ASN number 3356
ASN name (ISP) Level 3 Communications, Inc.
IP-range/subnet 4.0.0.0/9
4.0.0.0 – 4.127.255.255
Registry Registrant ID:
Registrant Name: Level 3 Communications, LLC
Registrant Organization: Level 3 Communications, LLC
Registrant Street: 1025 El Dorado Blvd.,
Registrant City: Broomfield
Registrant State/Province: CO
Registrant Postal Code: 80021
Registrant Country: US
720888-1000
720-888-5619

 




Longmont Colorado Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

March 15, 2018

cogentco, psi, gandi, Endurance
United States Longmont, United States visited http://www.stewwebb.com/
3/14/2018 10:26:43 PM (11 hours 11 mins ago)
IP: 161.97.228.132 Hostname: 161.97.228.132
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
NetRange: 161.97.192.0 – 161.97.255.255
[16384 addresses in this network]
CIDR: 161.97.192.0/18 (161.97.192.0 – 161.97.255.255)
[16384 addresses in this network]
NetName: COL-LPC
NetHandle: NET-161-97-192-0-1
Parent: NET161 (NET-161-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Longmont Power & Communications (CL-651)
RegDate: 2016-08-18
Updated: 2016-08-18
Ref: https://whois.arin.net/rest/net/NET-161-97-192-0-1

OrgName: Longmont Power & Communications
OrgId: CL-651
Address: 1100 S. Sherman St
City: Longmont
StateProv: CO
PostalCode: 80501
Country: US
RegDate: 2014-06-26
Updated: 2015-06-30
Ref: https://whois.arin.net/rest/org/CL-651

OrgTechHandle: GARCI445-ARIN
OrgTechName: Garcia, Juan
OrgTechPhone: +1-303-774-4359
OrgTechEmail: juan.garcia@longmontcolorado.gov
OrgTechRef: https://whois.arin.net/rest/poc/GARCI445-ARIN

OrgAbuseHandle: ADMIN5306-ARIN
OrgAbuseName: Administrator
OrgAbusePhone: +1-303-651-8796
OrgAbuseEmail: jeff.grant@longmontcolorado.gov
OrgAbuseRef: https://whois.arin.net/rest/poc/ADMIN5306-ARIN

OrgTechHandle: ADMIN5306-ARIN
OrgTechName: Administrator
OrgTechPhone: +1-303-651-8796
OrgTechEmail: jeff.grant@longmontcolorado.gov
OrgTechRef: https://whois.arin.net/rest/poc/ADMIN5306-ARIN

OrgNOCHandle: ADMIN5306-ARIN
OrgNOCName: Administrator
OrgNOCPhone: +1-303-651-8796
OrgNOCEmail: jeff.grant@longmontcolorado.gov
OrgNOCRef: https://whois.arin.net/rest/poc/ADMIN5306-ARIN
Domain longmontcolorado.gov is listed in the top million list of Alexa on number 126,858. The highest ranking ever is 119,851 and was reached on 2016-07-09. It is listed in the DMOZ directory. This domain is hosted by Cloudflare, Inc. (AS13335). The first DNS server is kate.ns.cloudflare.com. The current IPv4 address is 104.24.19.42. The mail server with the highest priority is longmontcolorado-gov.mail.protection.outlook.com.
v=spf1 ip4:69.87.213.124 ip4:69.87.213.187 ip4:69.87.213.43
ip4:69.87.213.25 ip4:1.2.3.4
@@@@@@@@@@@@@@@@@@@
???????????????????
include:enotify.visioninternet.com
IP address 38.106.5.33
Location United States (US) flag
Registry arin
IP address 38.106.5.33
Reverse DNS (PTR record) enotify.visioninternet.com
DNS server (NS record) ns1.visioninternet.com (205.251.192.192)
ns2.visioninternet.com (205.251.195.246)
ASN number 393929
ASN name (ISP) Simpatico Systems
IP-range/subnet 38.106.4.0/23
38.106.4.0 – 38.106.5.255
No domains found.
Domains around 38.106.5.33
IP address #domains
38.106.5.41 1
38.106.5.42 2
38.106.5.46 1
38.106.5.50 23
38.106.5.52 1
38.106.5.54 3
38.106.5.57 1
38.106.5.63 2
38.106.5.64 1
38.106.5.67 1
38.106.5.68 3
38.106.5.71 1
38.106.5.73 1
38.106.5.76 1
38.106.5.79 1
38.106.5.80 3
38.106.5.81 1
38.106.5.84 2
38.106.5.86 1
38.106.5.88 2
38.106.5.90 1
38.106.5.91 1
38.106.5.93 1
38.106.5.95 1
38.106.5.96 1
38.106.5.99 1
38.106.5.102 3
38.106.5.104 1
38.106.5.106 1
38.106.5.109 2
38.106.5.110 4
38.106.5.115 1
38.106.5.117 1
38.106.5.118 1
38.106.5.121 1
38.106.5.125 1
38.106.5.126 1
38.106.5.127 1
38.106.5.130 2
38.106.5.131 1
38.106.5.134 1
38.106.5.141 1
38.106.5.142 4
38.106.5.144 1
38.106.5.145 1
38.106.5.147 1
38.106.5.154 1
38.106.5.155 1
38.106.5.157 1
38.106.5.158 1
38.106.5.159 2
38.106.5.160 2
38.106.5.161 1
38.106.5.162 1
38.106.5.163 2
38.106.5.164 2
38.106.5.165 5
38.106.5.166 1
38.106.5.167 1
38.106.5.170 2
38.106.5.174 2
38.106.5.176 2
38.106.5.177 1
38.106.5.178 3
38.106.5.180 1
38.106.5.184 1
38.106.5.187 1
38.106.5.191 1
38.106.5.192 3
38.106.5.193 1
38.106.5.195 2
38.106.5.197 2
38.106.5.199 1
38.106.5.200 1
38.106.5.203 1
38.106.5.204 1
38.106.5.205 1
38.106.5.209 2
38.106.5.210 1
38.106.5.213 2
38.106.5.214 1
38.106.5.215 1
38.106.5.216 3
38.106.5.219 3
38.106.5.229 1
38.106.5.236 3
38.106.5.246 3
38.106.5.247 1
38.106.5.248 1
NetRange: 38.0.0.0 – 38.255.255.255
CIDR: 38.0.0.0/8
NetName: COGENT-A
NetHandle: NET-38-0-0-0-1
Parent: ()
NetType: Direct Allocation
OriginAS: AS174
Organization: PSINet, Inc. (PSI)
RegDate: 1991-04-15
Updated: 2011-05-20
OrgName: PSINet, Inc.
OrgId: PSI
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate:
Updated: 2015-06-04
Comment: rwhois.cogentco.com
OrgNOCHandle: ZC108-ARIN
OrgNOCName: Cogent Communications
877-875-4311

Are you looking for IPv4 address 38.106.5.33?

Are you looking for domain visioninternet.com?
This domain is hosted by Simpatico Systems (AS393929). The first DNS server is ns-1037.awsdns-01.org. The current IPv4 address is 38.106.4.34. The mail server with the highest priority is west.smtp.mx.exch081.serverdata.net.
@@@@@@@@@@@@@@@@@@
???????????????????
v=spf1 mx a a:mail.visioninternet.com include:enotify.visioninternet.com include:spf.dynect.net include:spf.intermedia.net include:_spf.salesforce.com include:stspg-customer.com ~a
DNS server (NS records) ns-1037.awsdns-01.org (205.251.196.13)
ns-129.awsdns-16.com (205.251.192.129)
ns-1807.awsdns-33.co.uk (205.251.199.15)
ns-938.awsdns-53.net (205.251.195.170)
Mail server (MX records) west.smtp.mx.exch081.serverdata.net (199.193.206.100)
east.smtp.mx.exch081.serverdata.net (64.78.25.102)
IP address (IPv4) 38.106.4.34
IP address (IPv6)
ASN number 393929
ASN name (ISP) Simpatico Systems
IP-range/subnet 38.106.4.0/23
38.106.4.0 – 38.106.5.255
Domain Name: VISIONINTERNET.COM
Domain ID: 5582769_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registrar URL: www.domain.com
Updated Date: 2016-03-28T13:59:07Z
Creation Date: 1997-04-10T04:00:00Z
Registrar Registration Expiration Date: 2018-04-11T04:00:00Z
Registrar: Domain.com, LLC
Registrar IANA ID: 886
Registry Registrant ID:
Registrant Name: Kevin Chen
Registrant Organization: Vision Technology Solutions, LLC
Registrant Street: 2530 Wilshire Blvd., 2nd Floor
Registrant City: Santa Monica
Registrant State/Province: California
Registrant Postal Code: 90403
Registrant Country: US
310-656-3100
dotster-inc.com
This domain is hosted by The Endurance International Group, Inc. (AS29873). The first DNS server is ns2.yourhostingaccount.com. The current IPv4 address is 65.254.238.139. The mail server with the highest priority is mail.dotster-inc.com.
v=spf1 ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:12.45.243.128/26 ip4:65.254.224.0/19 ?al
DNS server (NS records) ns2.yourhostingaccount.com (65.254.254.155)
ns3.yourhostingaccount.com (50.201.183.103)
ns1.yourhostingaccount.com (65.254.254.102)
Mail server (MX records) mail.dotster-inc.com (65.254.254.52)
IP address (IPv4) 65.254.238.139
IP address (IPv6)
ASN number 29873
ASN name (ISP) The Endurance International Group, Inc.
IP-range/subnet 65.254.224.0/19
65.254.224.0 – 65.254.255.255
Domain Name: DOTSTER-INC.COM
Domain ID: 1482354788_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registrar URL: www.domain.com
Updated Date: 2017-04-30T03:47:26Z
Creation Date: 2008-05-29T03:11:10Z
Registrar Registration Expiration Date: 2018-05-29T03:11:10Z
Registrar: Domain.com, LLC
Registrar IANA ID: 886
Reseller: Domain Name Holding Company, Inc
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: Endurance International Group West, Inc
Registrant Street: 10 Corporate Drive, Suite 300 Suite 300
Registrant City: Burlington
Registrant State/Province: MA
Registrant Postal Code: 01803
Registrant Country: US
360-449-5900
endurance.com
This domain is hosted by Unified Layer (AS46606). The first DNS server is ns-1197.awsdns-21.org. The current IPv4 address is 69.195.126.144. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 mx ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19
ip4:66.96.184.0/21 ip4:50.201.183.56/29 ip4:63.149.124.56/29
ip4:65.98.162.72 ip4:65.123.29.213/28 ip4:108.179.194.145
include:_spf.google.com
include:mailgun.org –
DNS server (NS records) ns-1197.awsdns-21.org (205.251.196.173)
ns-1868.awsdns-41.co.uk (205.251.199.76)
ns-667.awsdns-19.net (205.251.194.155)
ns-81.awsdns-10.com (205.251.192.81)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
alt3.aspmx.l.google.com (74.125.23.27)
alt4.aspmx.l.google.com (74.125.135.27)
IP address (IPv4) 69.195.126.144
IP address (IPv6)
ASN number 46606
ASN name (ISP) Unified Layer
IP-range/subnet 69.195.64.0/18
69.195.64.0 – 69.195.127.255
Domain Name: ENDURANCE.COM
Domain ID: 388194_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registrar URL: www.domain.com
Updated Date: 2016-10-21T19:21:42Z
Creation Date: 1997-07-31T04:00:00Z
Registrar Registration Expiration Date: 2024-07-30T04:00:00Z
Registrar: Domain.com, LLC
Registrar IANA ID: 886
Reseller: Domain Name Holding Company, Inc
Registry Registrant ID:
Registrant Name: Domain Manager
Registrant Organization: The Endurance International Group, Inc.
Registrant Street: 10 Corporate Drive Suite 300
Registrant City: Burlington
Registrant State/Province: MA
Registrant Postal Code: 01803
Registrant Country: US

Domain IPv4 address Ranking Alexa Pagerank
visioninternet.ca 38.106.4.34
visioninternet.ch 80.74.142.110
visioninternet.co 38.106.4.34 7
visioninternet.co.uk 193.254.210.60
visioninternet.com 38.106.4.34 7
visioninternet.com.ar 64.76.121.130
visioninternet.com.au 208.109.181.75
visioninternet.com.br 191.252.51.57
visioninternet.de 176.9.83.229
visioninternet.hosting 199.192.184.57
visioninternet.net 38.106.4.34
visioninternet.nl 149.210.245.248
visioninternet.org 38.106.4.34
visioninternet.us 38.106.4.34
visioninternetmarketing.com 192.64.119.18
visioninternetonline.com 84.40.53.32
visioninternetserver.co.uk
visioninternetserver.com
visioninternetsystems.com 173.239.97.76
visioninternetsystems.net 50.63.202.39
IPv4 routes

No IPv4 ranges found
IPv6 routes

No IPv6 ranges found
Providers

No providers found
@@@@@@@@@@@@@@@
??????????????
include:spf.protection.outlook.com
@@@@@@@@
??????????????
include:xnspf.paymentus.com
IP address 2620:12a:8000::3
Location United States
IP address 2620:12a:8000::3
Reverse DNS (PTR record) not available
DNS server (NS record) r.arin.net (199.180.180.63)
u.arin.net (204.61.216.50)
x.arin.net (199.71.0.63)
y.arin.net (192.82.134.30)
z.arin.net (199.212.0.63)
arin.authdns.ripe.net (193.0.9.10)
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 2620:12a:8000::/44
2620:12a:8000:: – 2620:12a:800f:ffff:ffff:ffff:ffff:ffff
@@@@@@@@@@@@@@@@@@
????????????????
Domains on 2620:12a:8000::3
Domain Tools
cooperstownbeveragetrail.com
cncf.io
ifaw.org.cn
tm.edu
peakparent.org
outfront.org
vocecommunications.com
nvrpa.org
lawrencehallofscience.org
adcentre.com.au
Domains around 2620:12a:8000::3
IP address #domains
2620:12a:8000::1 3410
2620:12a:8000::2 3324
2620:12a:8000::3 3431
2620:12a:8000::4 3094
Name servers on 2620:12a:8000::3

Overview of name servers hosted on this IP address.
Name server First seen #domains
2017-05-02 1
comensure.com
live-anderson-law-firm.patheon.io
@@@@@@@@@@
????????????
Mail servers on 2620:12a:8000::3
Mail server First seen #domains
2014-08-12 1
aaanorthgate.com
Domain aaanorthgate.com is not listed in the top million list of Alexa. It is not listed in the DMOZ directory. The first DNS server is ns3093.hostgator.com.
DNS server (NS records) ns3093.hostgator.com (192.254.237.209)
ns3094.hostgator.com (192.254.237.21)
Mail server (MX records)
IP address (IPv4)
IP address (IPv6)
ASN number not available
Domain Name: AAANORTHGATE.COM
Registry Domain ID: 1777307759_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2018-01-31T16:40:54Z
Creation Date: 2013-01-30T17:00:38Z
Registrar Registration Expiration Date: 2021-01-30T17:00:38Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrant Organization: AAA Northgate
Registrant Street: 1937 North Sheridan
Registrant City: Peoria
Registrant State/Province: Illinois
Registrant Postal Code: 61604
Registrant Country: US
no phone number
no email

@@@@@@@@@@@@
???????????
2014-08-05 1
chimneysweepshop.com
This domain is hosted by Fastly (AS54113). The first DNS server is ns3qty.name.com. The current IPv4 address is 23.185.0.3. The mail server with the highest priority is chimneysweepshop.com.
v=spf1 +a +mx +ip4:66.198.240.4
+include:spf.supercp.com ~all
DNS server (NS records) ns3qty.name.com (162.88.61.49)
ns2clp.name.com (162.88.60.47)
ns4lpv.name.com (162.88.60.49)
ns1psw.name.com (162.88.61.47)
Mail server (MX records) chimneysweepshop.com (23.185.0.3)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8001::3
2620:12a:8000::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: CHIMNEYSWEEPSHOP.COM
Registry Domain ID: 1627001533_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.name.com
Registrar URL: http://www.name.com
Updated Date: 2018-01-30T22:19:09Z
Creation Date: 2010-11-23T22:10:32Z
Registry Expiry Date: 2026-11-23T22:10:32Z
Registrar: Name.com, Inc.
Registrar IANA ID: 625
name.com
It is not listed in the DMOZ directory. This domain is hosted by Rightside Group LTD (AS22557). The first DNS server is eur2.akam.net. The current IPv4 address is 69.64.159.21. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 a mx ptr ip4:69.64.159.23/32
include:aspmx.googlemail.com
include:servers.mcsv.net
include:mail.zendesk.com -al
DNS server (NS records) eur2.akam.net (95.100.173.64)
aus1.akam.net (184.85.248.65)
use4.akam.net (23.211.133.65)
asia3.akam.net (23.211.61.64)
ns1-242.akam.net (193.108.91.242)
usw5.akam.net (23.211.132.64)
usw1.akam.net (23.61.199.66)
ns1-35.akam.net (193.108.91.35)
eur4.akam.net (84.53.139.64)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
aspmx2.googlemail.com (108.177.14.27)
aspmx3.googlemail.com (74.125.200.27)
IP address (IPv4) 69.64.159.21
IP address (IPv6)
ASN number 22557
ASN name (ISP) Rightside Group LTD
IP-range/subnet 69.64.159.0/24
69.64.159.0 – 69.64.159.255
Registry Registrant ID: Not Available From Registry
Registrant Name: Whois Agent
Registrant Organization: Domain Protection Services, Inc.
Registrant Street: PO Box 1769
Registrant City: Denver
Registrant State/Province: CO
Registrant Postal Code: 80201
Registrant Country: US
720-800-9072
720-975-8725
protecteddomainservices.com

@@@@@@@@@@@@
????????????
2014-07-11 1
consciousnessitself.net
This domain is hosted by Fastly (AS54113). The first DNS server is ns1.zonomi.com. The current IPv4 address is 23.185.0.3. The mail server with the highest priority is consciousnessitself.net.
DNS server (NS records) ns1.zonomi.com (45.79.211.52)
ns2.zonomi.com (139.162.211.108)
Mail server (MX records) consciousnessitself.net (23.185.0.3)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8000::3
2620:12a:8001::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: CONSCIOUSNESSITSELF.NET
Registry Domain ID: 1757335153_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2017-10-23T23:34:48Z
Creation Date: 2012-11-06T02:22:27Z
Registrar Registration Expiration Date: 2018-11-06T02:22:27Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrant Organization: The Avataric Samrajya of Adidam Pty Ltd
Registrant Street: Level 1, 55 Whitehorse Road
Registrant City: Balwyn
Registrant State/Province: Victoria
Registrant Postal Code: 3103
Registrant Country: AU
no phone
no email

@@@@@@@@@@@@@@@@@@@@@@@
?????????????????
2014-04-19 1
healthrationing.org
This domain is hosted by Fastly (AS54113). The first DNS server is authns2.netgainhosting.com. The current IPv4 address is 23.185.0.3. The mail server with the highest priority is healthrationing.org.
DNS server (NS records) authns2.netgainhosting.com (38.65.216.12)
ns1.netgaintechnology.com (38.65.216.12)
ns1.netgainhosting.com (199.96.231.20)
Mail server (MX records) healthrationing.org (23.185.0.3)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8001::3
2620:12a:8000::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: HEALTHRATIONING.ORG
Registry Domain ID: D160852956-LROR
Registrar WHOIS Server:
Registrar URL: www.cscglobal.com/global/web/csc/digital-brand-services.html
Updated Date: 2016-12-02T07:15:46Z
Creation Date: 2010-12-06T17:33:46Z
Registry Expiry Date: 2018-12-06T17:33:46Z
Registrar Registration Expiration Date:
Registrar: CSC Corporate Domains, Inc.
Registrar IANA ID: 299
Registrar Abuse Contact Email:
Registrar Abuse Contact Phone:
Reseller:
Registry Registrant ID: C111139911-LROR
Registrant Name: Domain Administrator
Registrant Organization: Public Radio International
Registrant Street: 401 2nd Avenue North
Registrant Street: Suite 500
Registrant City: Minneapolis
Registrant State/Province: MN
Registrant Postal Code: 55401
Registrant Country: US
800-338-5000
612-330-9222
pri.org
v=spf1 mx include:spf.protection.outlook.com
include:sparkpostmail.com
include:_spf.createsend.com -al
DNS server (NS records)
ns-cloud-b1.googledomains.com (216.239.32.107)
ns-cloud-b2.googledomains.com (216.239.34.107)
ns-cloud-b3.googledomains.com (216.239.36.107)
ns-cloud-b4.googledomains.com (216.239.38.107)
Mail server (MX records) pri-org.mail.protection.outlook.com (216.32.181.170)
IP address (IPv4) 23.185.0.3
IP address (IPv6) 2620:12a:8000::3
2620:12a:8001::3
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: PRI.ORG
Registry Domain ID: D357903-LROR
Registrar WHOIS Server: whois.google.com
Registrar URL: http://domains.google.com
Updated Date: 2017-09-16T00:20:17Z
Creation Date: 1994-11-23T05:00:00Z
Registry Expiry Date: 2018-11-22T05:00:00Z
Registrar Registration Expiration Date:
Registrar: Google Inc.
Registrar IANA ID: 895
Registry Registrant ID: C195144724-LROR
Registrant Name: Contact Privacy Inc. Customer 1241538776
Registrant Organization: Contact Privacy Inc. Customer 1241538776
Registrant Street: 96 Mowat Ave
Registrant City: Toronto
Registrant State/Province: ON
Registrant Postal Code: M4K 3K1
Registrant Country: CA
416-538-5487
contactprivacy.email
contactprivacy.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
left off 1143am cst March 15 2018

???????????????
2014-08-18 1
hurleyschool.org
2014-06-17 1
irespectmyself.ca
2014-08-06 1
mail.realtree.tv
2014-07-05 1
poshfrenchcleaners.com
2014-08-19 1
supporthurley.org
2014-04-18 1
world-science.org

Note: maximum of 10 mail servers are shown.
Overview of mail servers hosted on this IP address.
2015-02-28 1

Are you looking for domain paymentus.com?

Are you looking for IPv6 address 2620:12a:8000::3?
Domain IPv4 address Ranking Alexa Pagerank
paymentus.ca
paymentus.cn
paymentus.com 23.185.0.3 22,526 4
paymentus.io 750,853
paymentus.ir
paymentus.net
paymentus.org 204.236.135.243
paymentusa.biz 63.249.143.95
paymentusa.club 63.249.250.49
paymentusa.co 64.182.198.65
paymentusa.com 104.25.207.26
paymentusa.info 63.249.161.65
paymentusa.mobi 63.249.250.49
paymentusa.net 64.182.198.65
paymentusa.org 64.182.198.65
paymentusa.us 104.18.46.158
paymentusaservices.com 184.168.221.53
paymentuserbill.com 207.178.153.151
paymentuspci.com 184.170.251.72
IPv4 routes

No IPv4 ranges found
IPv6 routes

No IPv6 ranges found
Providers

No providers found
NetRange: 2620:12A:8000:: – 2620:12A:800F:FFFF:FFFF:FFFF:FFFF:FFFF
CIDR: 2620:12A:8000::/44
NetName: PANTHEON-IP6
NetHandle: NET6-2620-12A-8000-1
Parent: ARIN-V6-ENDUSER-BLOCK (NET6-2620-1)
NetType: Direct Assignment
OriginAS: AS54113
Organization: Pantheon (PS-747)
RegDate: 2016-09-27
Updated: 2016-11-22
OrgName: Pantheon
OrgId: PS-747
Address: 717 California St Fl 3
City: San Francisco
StateProv: CA
PostalCode: 94108
Country: US
RegDate: 2016-07-21
Updated: 2017-08-09
OrgAbuseHandle: DTS41-ARIN
OrgAbuseName: Strauss, David Timothy
512-577-5827
davidstrauss.net
The first DNS server is ns3.p13.dynect.net. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com ~all
DNS server (NS records) ns3.p13.dynect.net (208.78.71.13)
ns4.p13.dynect.net (204.13.251.13)
ns2.p13.dynect.net (204.13.250.13)
ns1.p13.dynect.net (208.78.70.13)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
aspmx5.googlemail.com (74.125.28.27)
aspmx4.googlemail.com (108.177.125.26)
aspmx3.googlemail.com (74.125.200.27)
aspmx2.googlemail.com (108.177.14.27)
IP address (IPv4)
IP address (IPv6)
ASN number not available
Domain Name: davidstrauss.net
Registry Domain ID: 490783672_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.google.com
Registrar URL: https://domains.google.com
Updated Date: 2016-08-17T19:06:36Z
Creation Date: 2006-06-19T06:55:38Z
Registrar Registration Expiration Date: 2024-06-19T06:55:38Z
Registrar: Google Inc.
Registrar IANA ID: 895
877-237-6466
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Contact Privacy Inc. Customer 124755687
Registrant Organization: Contact Privacy Inc. Customer 124755687
Registrant Street: 96 Mowat Ave
Registrant City: Toronto
Registrant State/Province: ON
Registrant Postal Code: M4K 3K1
Registrant Country: CA

fastly
pantheon.io
It is listed in the DMOZ directory. This domain is hosted by Fastly (AS54113). The first DNS server is ns-1096.awsdns-09.org. The current IPv4 address is 23.185.0.2. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:_spf.google.com include:sendgrid.net include:mktomail.com include:spf.mtasv.net include:stspg-customer.com ~a
DNS server (NS records) ns-1096.awsdns-09.org (205.251.196.72)
ns-148.awsdns-18.com (205.251.192.148)
ns-1857.awsdns-40.co.uk (205.251.199.65)
ns-924.awsdns-51.net (205.251.195.156)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.68.26)
alt1.aspmx.l.google.com (108.177.14.26)
aspmx3.googlemail.com (74.125.200.27)
aspmx2.googlemail.com (108.177.14.27)
IP address (IPv4) 23.185.0.2
IP address (IPv6) 2620:12a:8001::2
2620:12a:8000::2
ASN number 54113
ASN name (ISP) Fastly
IP-range/subnet 23.185.0.0/24
23.185.0.0 – 23.185.0.255
Domain Name: PANTHEON.IO
Registry Domain ID: D503300000040572384-LRMS
Registrar WHOIS Server:
Registrar URL: https://www.gandi.net/whois
Updated Date:
Creation Date: 2012-04-12T23:50:18Z
Registry Expiry Date: 2020-04-12T23:50:18Z
Registrar Registration Expiration Date:
Registrar: Gandi SAS
Registrar IANA ID: 81
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Reseller:
Domain Status: ok https://icann.org/epp#ok
Registrant Name: David Strauss
Registrant Organization: Pantheon Systems
Name Server: NS-148.AWSDNS-18.COM
Name Server: NS-1096.AWSDNS-09.ORG
Name Server: NS-1857.AWSDNS-40.CO.UK
Name Server: NS-924.AWSDNS-51.NET
DNSSEC: unsigned
??????????
Israel
33.170377661
gandi.net
This domain is hosted by GANDI SAS (AS29169). The first DNS server is dns1.gandi.net. The current IPv4 address is 217.70.185.65. The mail server with the highest priority is mail10.gandi.net.
v=spf1 ip4:217.70.176.0/21 ip4:217.70.186.186/32 ip4:217.70.186.187/32
ip6:2001:4b98:c::/48 ip6:2001:4b98:dc2:43:216:3eff:fe69:f13/128
ip4:217.70.186.186/32 ip6:2001:4b98:dc2:90:217:70:186:186/128
ip6:2001:4b98:dc4:5::/64 -ip4:151.236.59.145/32 –
ip4:151.236.35.5/32 -ip4:151.80.105.4/32 ptr ?a
DNS server (NS records) dns1.gandi.net (217.70.177.45)
dns0.gandi.net (217.70.177.39)
dns2.gandi.net (217.70.183.211)
dns4.gandi.net (217.70.186.184)
dns6.gandi.net (162.159.25.213)
dns3.gandi.net (217.70.184.14)
Mail server (MX records) mail10.gandi.net (217.70.182.74)
mail8.gandi.net (217.70.186.186)
IP address (IPv4) 217.70.185.65
IP address (IPv6)
ASN number 29169
ASN name (ISP) GANDI SAS
IP-range/subnet 217.70.176.0/20
217.70.176.0 – 217.70.191.255
Registry Registrant ID:
Registrant Name: Stephan Ramoin
Registrant Organization: Gandi SAS
Registrant Street: 63-65 Boulevard Massena
Registrant City: Paris
Registrant State/Province:
Registrant Postal Code: 75013
Registrant Country: FR
33.143737851

@@@@@@@@@@@@@@@@
??????????????
include:spf.dynect.net ~al
DNS server (NS records) kate.ns.cloudflare.com (173.245.58.124)
paul.ns.cloudflare.com (173.245.59.135)
Mail server (MX records) longmontcolorado-gov.mail.protection.outlook.com (23.103.198.42)
IP address (IPv4) 104.24.19.42
104.24.18.42
IP address (IPv6) 2400:cb00:2048:1::6818:132a
2400:cb00:2048:1::6818:122a
ASN number 13335
ASN name (ISP) Cloudflare, Inc.
IP-range/subnet 104.24.16.0/20
104.24.16.0 – 104.24.31.255
% DOTGOV WHOIS Server ready
Domain Name: LONGMONTCOLORADO.GOV
Status: ACTIVE

>>> Last update of whois database: 2018-01-30T10:12:00Z <<<
Please be advised that this whois server only contains information pertaining
to the .GOV domain. For information for other domains please use the whois
server at RS.INTERNIC.NET.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower
Organization: COMPUTER CREWS (CC-1746)
United States Westminster, United States visited http://www.stewwebb.com/
3/1/2018 1:26:57 PM (26 minutes ago)
IP: 198.233.246.75 Hostname: 198.233.246.75
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Bot
United States Westminster, United States visited http://stewwebb.com/
3/1/2018 1:26:53 PM (26 minutes ago)
IP: 198.233.246.75 Hostname: 198.233.246.75
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

NetRange: 198.233.246.72 – 198.233.246.79
[8 addresses in this network]
CIDR: 198.233.246.72/29 (198.233.246.72 – 198.233.246.79)
[8 addresses in this network]
NetName: Q1209-198-233-246-72
NetHandle: NET-198-233-246-72-1
Parent: CENTURYLINK-LEGACY-QWEST-INET-30 (NET-198-233-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: COMPUTER CREWS (CC-1746)
RegDate: 2015-12-09
Updated: 2015-12-09
Ref: https://whois.arin.net/rest/net/NET-198-233-246-72-1

OrgName: COMPUTER CREWS
OrgId: CC-1746
Address: 9101 HARLAN ST UNIT 215
City: WESTMINSTER
StateProv: CO
PostalCode: 80031
Country: US
RegDate: 2015-12-04
Updated: 2015-12-04
Ref: https://whois.arin.net/rest/org/CC-1746

OrgAbuseHandle: CREWS27-ARIN
OrgAbuseName: Crews, Tom
OrgAbusePhone: +1-720-863-7841
OrgAbuseEmail: tcrews@computercrews.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CREWS27-ARIN

OrgTechHandle: CREWS27-ARIN
OrgTechName: Crews, Tom
OrgTechPhone: +1-720-863-7841
OrgTechEmail: tcrews@computercrews.com
OrgTechRef: https://whois.arin.net/rest/poc/CREWS27-ARIN
198.233.246.75
P address 198.233.246.75
Location United States (US
P address 198.233.246.75
Reverse DNS (PTR record) not available
DNS server (NS record) authns1.qwest.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 198.233.0.0/16
198.233.0.0 – 198.233.255.255
NetRange: 198.233.246.72 – 198.233.246.79
CIDR: 198.233.246.72/29
NetName: Q1209-198-233-246-72
NetHandle: NET-198-233-246-72-1
Parent: QWEST-INET-30 (NET-198-233-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: COMPUTER CREWS (CC-1746)
RegDate: 2015-12-09
Updated: 2015-12-09
OrgName: COMPUTER CREWS
OrgId: CC-1746
Address: 9101 HARLAN ST UNIT 215
City: WESTMINSTER
StateProv: CO
PostalCode: 80031
Country: US
RegDate: 2015-12-04
Updated: 2015-12-04
OrgAbuseHandle: CREWS27-ARIN
OrgAbuseName: Crews, Tom
720-863-7841
OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email

centurylinks.com

computercrews.com
This domain is hosted by Limestone Networks, Inc. (AS46475). The first DNS server is ns3.computercrews.com. The current IPv4 address is 74.63.246.116. The mail server with the highest priority is mx2-us1.ppe-hosted.com.
v=spf1 include:spf.protection.outlook.com
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns1a.o365filtering.com. The current IPv4 address is 40.97.116.82. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.
@@@@@@@@@@@@@@@@
??????????????????

v=spf1
include:spf-a.outlook.com
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns1a.o365filtering.com. The current IPv4 address is 40.97.116.82. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.

Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.116.82 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1

include:spf-b.outlook.com
Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.116.82 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1

ip4:157.55.9.128/25
include:spf.protection.outlook.com

include:spf-a.hotmail.com
include:_spf-ssg-b.microsoft.com
Domains
Domain IPv4 address Ranking Alexa Pagerank
microsoft.ac.cn 160.124.169.13
microsoft.ac.nz 191.237.78.58 -1
microsoft.accountant -1
microsoft.accountants
microsoft.actor -1
microsoft.adult 165.160.13.20 -1
microsoft.ae 2
microsoft.africa
microsoft.ai 52.164.206.56
microsoft.airforce
microsoft.al 31.171.152.42
microsoft.alsace
microsoft.am 52.164.206.56
microsoft.amsterdam
microsoft.apartments
microsoft.army
microsoft.art
microsoft.asia 52.164.206.56 -1
microsoft.associates -1
microsoft.at 137.117.225.87 6
microsoft.attorney -1
microsoft.auction
microsoft.audio
microsoft.auto
microsoft.az 104.43.195.251 6
microsoft.ba 138.197.16.119 1
microsoft.band 23.101.184.206
microsoft.bar -1
microsoft.barcelona
microsoft.bayern -1
microsoft.be 23.96.52.53 -1
microsoft.beer -1
microsoft.berlin 52.164.206.56
microsoft.best
microsoft.bet
microsoft.bi 52.164.206.56
microsoft.bid -1
microsoft.bingo
microsoft.bio -1
microsoft.biz 134.170.185.46
microsoft.biz.pk 104.215.95.187
microsoft.biz.pl 104.215.95.187
microsoft.biz.tr
microsoft.bl.it 213.186.33.5
microsoft.black -1
microsoft.blackfriday -1
microsoft.blog
microsoft.blue
microsoft.boston
microsoft.bot
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.224.168.0 103.224.171.255 SSG Corporation VN 1 0
90.154.254.0 90.154.254.255 BTC SSG Customers BG 0 1
103.224.170.0 103.224.171.255 SSG Corporation VN 1 0
203.177.219.0 203.177.219.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
203.177.224.0 203.177.224.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.225.0 203.177.225.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.229.0 203.177.229.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
13.64.0.0 13.95.255.255 Microsoft Corporation US 109,278 33
13.96.0.0 13.103.255.255 Microsoft Corporation US 4 0
13.104.0.0 13.107.255.255 Microsoft Corporation US 712 0
20.0.0.0 20.31.255.255 Microsoft Corporation US 64 0
20.33.0.0 20.33.255.255 Microsoft Corporation US 0 0
20.34.0.0 20.35.255.255 Microsoft Corporation US 0 0
20.36.0.0 20.39.255.255 Microsoft Corporation US 1 0
20.40.0.0 20.47.255.255 Microsoft Corporation US 2 0
20.48.0.0 20.63.255.255 Microsoft Corporation US 10 0
20.64.0.0 20.127.255.255 Microsoft Corporation US 25 0
20.128.0.0 20.128.255.255 Microsoft Corporation US 0 0
20.130.0.0 20.130.255.255 Microsoft Corporation US 0 0
20.135.0.0 20.135.255.255 Microsoft Corporation US 0 0
20.136.0.0 20.136.255.255 Microsoft Corporation US 0 0
20.140.0.0 20.141.255.255 Microsoft Corporation US 0 0
20.143.0.0 20.143.255.255 Microsoft Corporation US 0 0
20.144.0.0 20.147.255.255 Microsoft Corporation US 1 0
20.150.0.0 20.151.255.255 Microsoft Corporation US 0 0
20.152.0.0 20.153.255.255 Microsoft Corporation US 0 0
20.157.0.0 20.157.255.255 Microsoft Corporation US 0 0
20.158.0.0 20.159.255.255 Microsoft Corporation US 0 0
20.160.0.0 20.175.255.255 Microsoft Corporation US 1 0
20.176.0.0 20.179.255.255 Microsoft Corporation US 1 0
20.180.0.0 20.183.255.255 Microsoft Corporation US 0 0
20.184.0.0 20.191.255.255 Microsoft Corporation US 52 2
20.192.0.0 20.255.255.255 Microsoft Corporation US 11 0
23.96.0.0 23.103.255.255 Microsoft Corporation US 76,933 8
40.64.0.0 40.71.255.255 Microsoft Corporation US 11,553 4
40.74.0.0 40.75.255.255 Microsoft Corporation US 1,838 0
40.76.0.0 40.79.255.255 Microsoft Corporation US 12,194 1
40.80.0.0 40.95.255.255 Microsoft Corporation US 24,252 3
40.96.0.0 40.111.255.255 Microsoft Corporation US 7,415 0
40.112.0.0 40.119.255.255 Microsoft Corporation US 24,946 2
40.120.0.0 40.123.255.255 Microsoft Corporation US 4,932 1
40.124.0.0 40.124.255.255 Microsoft Corporation US 633 0
40.125.0.0 40.125.127.255 Microsoft Corporation US 0 0
40.126.0.0 40.126.63.255 Microsoft Corporation US 0 0
40.126.128.0 40.126.255.255 Microsoft Corporation US 2,409 0
40.127.0.0 40.127.255.255 Microsoft Corporation US 2,744 1
51.4.0.0 51.5.255.255 Microsoft Deutschland MCIO GmbH DE 446 1
51.8.0.0 51.8.255.255 Microsoft Deutschland MCIO GmbH DE 0 0
51.10.0.0 51.13.255.255 Microsoft Limited GB 2 0
51.18.0.0 51.18.255.255 Microsoft Deutschland MCIO GmbH GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:506:28:: 2001:506:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:67c:1020:: 2001:67c:1021:ffff:ffff:ffff:ffff:ffff Microsoft Limited AT 0 0
2001:df0:7:: 2001:df0:7:ffff:ffff:ffff:ffff:ffff Microsoft Corp SG 0 0
2001:df0:d7:: 2001:df0:d7:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. KR 0 0
2001:df0:d8:: 2001:df0:d8:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. AU 0 0
2001:df0:d9:: 2001:df0:d9:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. TW 0 0
2001:4898:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:489a:: 2001:489a:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2400:8980:: 2400:8980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. Shanghai Branch Office CN 0 0
2401:a980:: 2401:a980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Mobile Alliance Internet Services Co., Ltd CN 0 0
2404:f800:: 2404:f800:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. JP 0 0
2404:f801:: 2404:f801:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2406:e500:: 2406:e500:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. CN 0 0
2603:1000:: 2603:10ff:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2620:0:30:: 2620::37:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:b4:4000:: 2620:b4:4000:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:10c:5000:: 2620:10c:500f:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:: 2620:1ec:fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 65 0
2a00:1c68:: 2a00:1c68:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited GB 0 0
2a01:110:: 2a01:111:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited EU 23,189 0
2a01:4180:: 2a01:4180:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Deutschland MCIO GmbH DE 2 0
2001:4898:: 2001:4898:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:4898:e810:: 2001:4898:e810:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:4899:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:2000:: 2001:489a:3fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:4000:: 2001:489a:5fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2404:f801:8028:: 2404:f801:8028:ffff:ffff:ffff:ffff:ffff MSIT Edge HyderabadBuilding 1, Microsoft Campus SG 0 0
2404:f801:8030:: 2404:f801:8030:ffff:ffff:ffff:ffff:ffff Microsoft Edge Sydney SG 0 0
2404:f801:8050:: 2404:f801:8050:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2404:f801:a808:: 2404:f801:a808:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2603:1000:: 2603:107f:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2603:1061:6:: 2603:1061:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:4:: 2620:1ec:4:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 7 0
2620:1ec:5:: 2620:1ec:5:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:6:: 2620:1ec:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:7:: 2620:1ec:7:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:9:: 2620:1ec:9:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:a:: 2620:1ec:a:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:b:: 2620:1ec:b:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:c:: 2620:1ec:c:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 3 0
2620:1ec:d:: 2620:1ec:d:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:12:: 2620:1ec:12:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:13:: 2620:1ec:13:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:21:: 2620:1ec:21:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:22:: 2620:1ec:22:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:25:: 2620:1ec:25:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:28:: 2620:1ec:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:29:: 2620:1ec:29:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:34:: 2620:1ec:34:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2620:1ec:39:: 2620:1ec:39:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
131399 SSG Corporation VN 1 0 1 0
3598 Microsoft Corporation US 18 4 23,966 0
6584 Microsoft Corporation US 17 1 64 0
8068 Microsoft Corporation US 79 39 1,272 0
8070 Microsoft Corporation US 7 2 3 0
8071 Microsoft Corporation US 5 2 11,353 0
8075 Microsoft Corporation US 128 18 612,722 132
12076 Microsoft Corporation US 1 0 0 0
20046 Microsoft Corporation US 5 0 27 0
23468 Microsoft Corporation US 4 0 0 0
35106 Microsoft Limited GB 1 1 0 0
52985 Microsoft Informatica Ltda BR 2 1 0 0
58862 Microsoft (China) Co., Ltd. CN 1 0 0 0
59067 Microsoft Mobile Alliance Internet Services Co., Ltd CN 6 0 17 0
63314 Microsoft Corporation US 1 1 1 0
200517 Microsoft Deutschland MCIO GmbH DE 5 1 446 1
DNS server (NS records) ns4.msft.net (208.76.45.53)
ns1.msft.net (208.84.0.53)
ns2.msft.net (208.84.2.53)
ns3.msft.net (193.221.113.53)
Mail server (MX records) microsoft-com.mail.protection.outlook.com (23.103.156.74)
IP address (IPv4) 23.96.52.53
191.239.213.197
104.40.211.35
104.43.195.251
23.100.122.175
IP address (IPv6) 2a02:26f0:6c00:183::356e
2a02:26f0:6c00:187::356e
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 23.96.0.0/14
23.96.0.0 – 23.99.255.255
include:_spf-ssg-c.microsoft.com ~
Domain IPv4 address Ranking Alexa Pagerank
microsoft.ac.cn 160.124.169.13
microsoft.ac.nz 191.237.78.58 -1
microsoft.accountant -1
microsoft.accountants
microsoft.actor -1
microsoft.adult 165.160.13.20 -1
microsoft.ae 2
microsoft.africa
microsoft.ai 52.164.206.56
microsoft.airforce
microsoft.al 31.171.152.42
microsoft.alsace
microsoft.am 52.164.206.56
microsoft.amsterdam
microsoft.apartments
microsoft.army
microsoft.art
microsoft.asia 52.164.206.56 -1
microsoft.associates -1
microsoft.at 137.117.225.87 6
microsoft.attorney -1
microsoft.auction
microsoft.audio
microsoft.auto
microsoft.az 104.43.195.251 6
microsoft.ba 138.197.16.119 1
microsoft.band 23.101.184.206
microsoft.bar -1
microsoft.barcelona
microsoft.bayern -1
microsoft.be 23.96.52.53 -1
microsoft.beer -1
microsoft.berlin 52.164.206.56
microsoft.best
microsoft.bet
microsoft.bi 52.164.206.56
microsoft.bid -1
microsoft.bingo
microsoft.bio -1
microsoft.biz 134.170.185.46
microsoft.biz.pk 104.215.95.187
microsoft.biz.pl 104.215.95.187
microsoft.biz.tr
microsoft.bl.it 213.186.33.5
microsoft.black -1
microsoft.blackfriday -1
microsoft.blog
microsoft.blue
microsoft.boston
microsoft.bot
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.224.168.0 103.224.171.255 SSG Corporation VN 1 0
90.154.254.0 90.154.254.255 BTC SSG Customers BG 0 1
103.224.170.0 103.224.171.255 SSG Corporation VN 1 0
203.177.219.0 203.177.219.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
203.177.224.0 203.177.224.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.225.0 203.177.225.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.229.0 203.177.229.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
13.64.0.0 13.95.255.255 Microsoft Corporation US 109,278 33
13.96.0.0 13.103.255.255 Microsoft Corporation US 4 0
13.104.0.0 13.107.255.255 Microsoft Corporation US 712 0
20.0.0.0 20.31.255.255 Microsoft Corporation US 64 0
20.33.0.0 20.33.255.255 Microsoft Corporation US 0 0
20.34.0.0 20.35.255.255 Microsoft Corporation US 0 0
20.36.0.0 20.39.255.255 Microsoft Corporation US 1 0
20.40.0.0 20.47.255.255 Microsoft Corporation US 2 0
20.48.0.0 20.63.255.255 Microsoft Corporation US 10 0
20.64.0.0 20.127.255.255 Microsoft Corporation US 25 0
20.128.0.0 20.128.255.255 Microsoft Corporation US 0 0
20.130.0.0 20.130.255.255 Microsoft Corporation US 0 0
20.135.0.0 20.135.255.255 Microsoft Corporation US 0 0
20.136.0.0 20.136.255.255 Microsoft Corporation US 0 0
20.140.0.0 20.141.255.255 Microsoft Corporation US 0 0
20.143.0.0 20.143.255.255 Microsoft Corporation US 0 0
20.144.0.0 20.147.255.255 Microsoft Corporation US 1 0
20.150.0.0 20.151.255.255 Microsoft Corporation US 0 0
20.152.0.0 20.153.255.255 Microsoft Corporation US 0 0
20.157.0.0 20.157.255.255 Microsoft Corporation US 0 0
20.158.0.0 20.159.255.255 Microsoft Corporation US 0 0
20.160.0.0 20.175.255.255 Microsoft Corporation US 1 0
20.176.0.0 20.179.255.255 Microsoft Corporation US 1 0
20.180.0.0 20.183.255.255 Microsoft Corporation US 0 0
20.184.0.0 20.191.255.255 Microsoft Corporation US 52 2
20.192.0.0 20.255.255.255 Microsoft Corporation US 11 0
23.96.0.0 23.103.255.255 Microsoft Corporation US 76,933 8
40.64.0.0 40.71.255.255 Microsoft Corporation US 11,553 4
40.74.0.0 40.75.255.255 Microsoft Corporation US 1,838 0
40.76.0.0 40.79.255.255 Microsoft Corporation US 12,194 1
40.80.0.0 40.95.255.255 Microsoft Corporation US 24,252 3
40.96.0.0 40.111.255.255 Microsoft Corporation US 7,415 0
40.112.0.0 40.119.255.255 Microsoft Corporation US 24,946 2
40.120.0.0 40.123.255.255 Microsoft Corporation US 4,932 1
40.124.0.0 40.124.255.255 Microsoft Corporation US 633 0
40.125.0.0 40.125.127.255 Microsoft Corporation US 0 0
40.126.0.0 40.126.63.255 Microsoft Corporation US 0 0
40.126.128.0 40.126.255.255 Microsoft Corporation US 2,409 0
40.127.0.0 40.127.255.255 Microsoft Corporation US 2,744 1
51.4.0.0 51.5.255.255 Microsoft Deutschland MCIO GmbH DE 446 1
51.8.0.0 51.8.255.255 Microsoft Deutschland MCIO GmbH DE 0 0
51.10.0.0 51.13.255.255 Microsoft Limited GB 2 0
51.18.0.0 51.18.255.255 Microsoft Deutschland MCIO GmbH GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:506:28:: 2001:506:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:67c:1020:: 2001:67c:1021:ffff:ffff:ffff:ffff:ffff Microsoft Limited AT 0 0
2001:df0:7:: 2001:df0:7:ffff:ffff:ffff:ffff:ffff Microsoft Corp SG 0 0
2001:df0:d7:: 2001:df0:d7:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. KR 0 0
2001:df0:d8:: 2001:df0:d8:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. AU 0 0
2001:df0:d9:: 2001:df0:d9:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. TW 0 0
2001:4898:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:489a:: 2001:489a:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2400:8980:: 2400:8980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. Shanghai Branch Office CN 0 0
2401:a980:: 2401:a980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Mobile Alliance Internet Services Co., Ltd CN 0 0
2404:f800:: 2404:f800:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. JP 0 0
2404:f801:: 2404:f801:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2406:e500:: 2406:e500:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. CN 0 0
2603:1000:: 2603:10ff:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2620:0:30:: 2620::37:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:b4:4000:: 2620:b4:4000:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:10c:5000:: 2620:10c:500f:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:: 2620:1ec:fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 65 0
2a00:1c68:: 2a00:1c68:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited GB 0 0
2a01:110:: 2a01:111:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited EU 23,189 0
2a01:4180:: 2a01:4180:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Deutschland MCIO GmbH DE 2 0
2001:4898:: 2001:4898:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:4898:e810:: 2001:4898:e810:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:4899:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:2000:: 2001:489a:3fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:4000:: 2001:489a:5fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2404:f801:8028:: 2404:f801:8028:ffff:ffff:ffff:ffff:ffff MSIT Edge HyderabadBuilding 1, Microsoft Campus SG 0 0
2404:f801:8030:: 2404:f801:8030:ffff:ffff:ffff:ffff:ffff Microsoft Edge Sydney SG 0 0
2404:f801:8050:: 2404:f801:8050:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2404:f801:a808:: 2404:f801:a808:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2603:1000:: 2603:107f:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2603:1061:6:: 2603:1061:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:4:: 2620:1ec:4:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 7 0
2620:1ec:5:: 2620:1ec:5:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:6:: 2620:1ec:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:7:: 2620:1ec:7:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:9:: 2620:1ec:9:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:a:: 2620:1ec:a:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:b:: 2620:1ec:b:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:c:: 2620:1ec:c:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 3 0
2620:1ec:d:: 2620:1ec:d:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:12:: 2620:1ec:12:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:13:: 2620:1ec:13:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:21:: 2620:1ec:21:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:22:: 2620:1ec:22:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:25:: 2620:1ec:25:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:28:: 2620:1ec:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:29:: 2620:1ec:29:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:34:: 2620:1ec:34:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2620:1ec:39:: 2620:1ec:39:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
131399 SSG Corporation VN 1 0 1 0
3598 Microsoft Corporation US 18 4 23,966 0
6584 Microsoft Corporation US 17 1 64 0
8068 Microsoft Corporation US 79 39 1,272 0
8070 Microsoft Corporation US 7 2 3 0
8071 Microsoft Corporation US 5 2 11,353 0
8075 Microsoft Corporation US 128 18 612,722 132
12076 Microsoft Corporation US 1 0 0 0
20046 Microsoft Corporation US 5 0 27 0
23468 Microsoft Corporation US 4 0 0 0
35106 Microsoft Limited GB 1 1 0 0
52985 Microsoft Informatica Ltda BR 2 1 0 0
58862 Microsoft (China) Co., Ltd. CN 1 0 0 0
59067 Microsoft Mobile Alliance Internet Services Co., Ltd CN 6 0 17 0
63314 Microsoft Corporation US 1 1 1 0
200517 Microsoft Deutschland MCIO GmbH DE 5 1 446 1

DNS server (NS records) ns1a.o365filtering.com (157.56.110.11)
ns1.msft.net (208.84.0.53)
ns4.msft.net (208.76.45.53)
ns4a.o365filtering.com (157.55.133.11)
ns2.msft.net (208.84.2.53)
ns2a.o365filtering.com (157.56.116.52)
ns3.msft.net (193.221.113.53)
Mail server (MX records) outlook-com.olc.protection.outlook.com (104.47.36.33)
IP address (IPv4) 40.97.116.82
40.97.148.226
40.97.128.194
40.97.161.50
40.97.164.146
40.97.153.146
40.97.156.114
40.97.160.2
IP address (IPv6) 2603:1026:206:2::2
2603:1026:3:f6::2
2603:1026:7:28::2
2603:1026:3:cb::2
2603:1026:300:64::2
2603:1026:203::2
2603:1026:300:a1::2
2603:1026:206:1::2
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 40.64.0.0/10
40.64.0.0 – 40.127.255.255
Domain Name: outlook.com
Registry Domain ID: 2019401_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2017-07-16T02:21:48-0700
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.160.2 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
43.225.80.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.191.255 RMP Protection Limited HK 58 0
91.223.152.0 91.223.152.255 Protection and Security Plus LTD UA 7 0
103.68.188.0 103.68.191.255 JV Protection Services AU 27 0
103.241.52.0 103.241.55.255 Point Blank Protection Pvt Ltd IN 0 0
103.246.187.0 103.246.187.255 Crystal Crop Protection Private Limited IN 0 0
103.253.40.0 103.253.43.255 RMP Protection Limited. HK 227 0
103.254.164.0 103.254.164.255 Australian Customs and Border Protection Service AU 0 0
121.54.184.0 121.54.187.255 JV Protection Services AU 2 0
134.67.0.0 134.67.255.255 U.S. Environmental Protection Agency US 13 0
148.59.135.0 148.59.135.255 PROTECTION ONE US 1 0
158.45.0.0 158.45.255.255 STATE OF VICTORIA – ENVIRONMENT PROTECTION AUTHORITY AU 0 0
158.119.0.0 158.119.255.255 Health Protection Agency GB 0 0
161.80.0.0 161.80.255.255 U.S. Environmental Protection Agency US 0 0
162.145.0.0 162.145.255.255 Australian Customs and Border Protection Service AU 0 0
162.146.0.0 162.146.255.255 Australian Customs and Border Protection Service AU 1 0
162.147.0.0 162.147.255.255 Australian Customs and Border Protection Service AU 2 0
164.97.0.0 164.97.255.255 DEPARTMENT OF IMMIGRATION AND BORDER PROTECTION AU 12 0
165.105.0.0 165.105.255.255 State of California Department of Forestry and Fire Protection US 0 0
168.246.0.0 168.246.255.255 Syngenta Crop Protection, LLC US 0 0
192.58.247.0 192.58.247.255 Environmental Protection Agency US 0 0
192.70.118.0 192.70.118.255 Ministere de l’Environnement, Direction de la Protection de la Nature FR 0 0
192.81.166.0 192.81.166.255 U.S. Merit Systems Protection Board US 0 0
192.112.29.0 192.112.29.255 Ontario Agency for Health Protection and Promotion CA 1 0
192.124.164.0 192.124.164.255 State of California Department of Forestry and Fire Protection US 0 0
193.29.204.0 193.29.204.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 12 0
193.109.8.0 193.109.11.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0
195.211.220.0 195.211.223.255 DDoS Protection LTD. RU 531 0
198.180.201.0 198.180.201.255 Lightning Location and Protection, Inc. US 0 0
198.190.184.0 198.190.184.255 Consumers Power, System Protection Engineering US 0 0
198.202.131.0 198.202.131.255 Lightning Location and Protection, Inc. US 0 0
199.73.128.0 199.73.255.255 Florida Department of Environmental Protection US 1 0
202.14.101.0 202.14.101.255 Department for Child Protection and Family Support AU 7 0
203.12.67.0 203.12.67.255 Department of Environmental Protection – Waste Management AU 0 0
203.23.184.0 203.23.184.255 Public Service and Merit Protection Commisson (PSMPC) AU 0 0
204.8.235.0 204.8.235.255 PROTECTION ONE US 1 0
204.46.0.0 204.47.255.255 U.S. Environmental Protection Agency US 0 0
204.87.241.0 204.87.241.255 Ground Water Protection Council, Inc. US 0 0
206.197.209.0 206.197.209.255 Protection One Alarm Monitoring, INC. US 0 0
5.101.40.0 5.101.40.255 Cloud Hosting & DDoS Protection RU 1,268 1
12.29.157.0 12.29.157.255 PROTECTION ONE US 11 0
12.108.152.0 12.108.152.255 PROTECTION ONE US 0 0
12.147.152.0 12.147.152.255 PROTECTION ONE ALARM MONITORING US 0 0
43.225.80.0 43.225.80.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.82.0 43.225.82.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.83.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.188.255 RMP Protection Limited HK 0 0
45.123.189.0 45.123.189.255 RMP Protection Limited HK 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:564:: 2001:678:564:ffff:ffff:ffff:ffff:ffff Protection and Security Plus LTD UA 2 0
2001:df1:1800:: 2001:df1:1800:ffff:ffff:ffff:ffff:ffff Australian Customs and Border Protection Service AU 0 0
2001:df7:7000:: 2001:df7:7000:ffff:ffff:ffff:ffff:ffff RMP Protection Limited. HK 1 0
2403:5780:: 2403:5780:ffff:ffff:ffff:ffff:ffff:ffff Shanghai boci Environmental Protection Technology Co., Ltd. CN 0 0
2405:d100:: 2405:d100:ffff:ffff:ffff:ffff:ffff:ffff Australian Radiation Protection and Nuclear Safety Agency AU 0 0
2407:8480:: 2407:8480:ffff:ffff:ffff:ffff:ffff:ffff RMP Protection Limited HK 0 0
2620:0:b10:: 2620::b13:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 1 0
2620:2a:e000:: 2620:2a:e000:ffff:ffff:ffff:ffff:ffff Orland Fire Protection District US 0 0
2620:117:5000:: 2620:117:50ff:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 10 0
2620:166:: 2620:166:fff:ffff:ffff:ffff:ffff:ffff Syngenta Crop Protection, LLC US 0 0
2a03:6920:: 2a03:6927:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
2a04:ec0:: 2a04:ec7:ffff:ffff:ffff:ffff:ffff:ffff Health Protection Agency GB 0 0
2a03:6920:: 2a03:6920:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1
14298 Environmental Protection Agency US 63 0 0 0
21096 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0 14 0
23744 Department of Immigration and Border Protection AU 8 0 0 0
30087 Automobile Protection Corporation US 1 0 2 0
30509 PROTECTION ONE US 5 0 11 0
35169 EURO PROTECTION SURVEILLANCE SAS FR 1 0 0 0
40968 Professional Protection Electronic Ltd. GB 1 0 1 0
50098 DDoS Protection LTD. RU 4 0 531 0
55201 ShawCor Pipe Protection, LLC US 1 0 0 0
56439 Protection and Security Plus LTD UA 1 1 7 0
63327 Ontario Agency for Health Protection and Promotion CA 1 0 1 0
133178 Australian Customs and Border Protection Service AU 1 0 0 0
201092 FBU Central base of aviation forest protection ” Avialesookhrana ” RU 1 0 3 0
205280 United Protection (UK) Security LIMITED GB 1 0 0 10
@@@@@@@@@@@@@@@@@@@@@@@
??????????????
include:spf.myconnectwise.net
The highest ranking ever is 44,052 and was reached on 2018-02-24. It is not listed in the DMOZ directory. This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns-1207.awsdns-22.org. The current IPv4 address is 63.150.4.209.
v=spf1 include:spf.myconnectwise.net ~all
DNS server (NS records) ns-1207.awsdns-22.org (205.251.196.183)
ns-1902.awsdns-45.co.uk (205.251.199.110)
ns-3.awsdns-00.com (205.251.192.3)
ns-933.awsdns-52.net (205.251.195.165)
Mail server (MX records)
IP address (IPv4) 63.150.4.209
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.144.0.0/12
63.144.0.0 – 63.159.255.255
Domain Name: MYCONNECTWISE.NET
Registry Domain ID: 1516794366_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-03-05T17:36:10Z
Creation Date: 2008-08-28T14:05:15Z
Registrar Registration Expiration Date: 2018-08-28T14:05:15Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrant Name: ConnectWise
Registrant Organization: ConnectWise
Registrant Street: 4110 GEORGE RD STE 200
Registrant City: ROCKY POINT
Registrant State/Province: FL
Registrant Postal Code: 33634-7411
Registrant Country: US
813-397-4604

Domain IPv4 address Ranking Alexa Pagerank
myconnectwise.co.uk 77.246.173.206 -1
myconnectwise.com 63.150.4.200 0
myconnectwise.eu 77.246.173.202
myconnectwise.net 63.150.4.209 44,052 0
myconnectwise.co.uk 77.246.173.206 -1
myconnectwise.com 63.150.4.200 0
myconnectwise.eu 77.246.173.202
myconnectwise.net 63.150.4.209 44,052 0
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@@@@@@@@@@
????????????????????
a:dispatch-us.ppe-hosted.com ~al
Are you looking for IPv4 address 148.163.129.53?
IP address 148.163.129.53
Location Sunnyvale, California, United States
IP address 148.163.129.53
Reverse DNS (PTR record) dispatchb-us1.ppe-hosted.com
DNS server (NS record) ns1.proofpoint.us (208.84.67.208)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.biz (156.154.66.99)
ns3.proofpoint.us (208.84.66.208)
ns3.proofpoint.com (208.84.66.208)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.com (156.154.64.99)
ns1.proofpoint.com (208.84.67.208)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255
148.163.129.53
NetRange: 148.163.128.0 – 148.163.159.255
CIDR: 148.163.128.0/19
NetName: PROOFPOINT-NET-NORTH-AMERICA
NetHandle: NET-148-163-128-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22843, AS13916, AS26211
Organization: Proofpoint, Inc. (PROOF)
RegDate: 2014-06-13
Updated: 2017-06-15
OrgName: Proofpoint, Inc.
OrgId: PROOF
Address: 892 Ross Drive
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
RegDate: 2007-10-16
Updated: 2014-09-08
801-748-4494

@@@@@@@@@@@@@@@@
??????????
Domains around 148.163.129.53
IP address #domains
148.163.129.213 3
148.163.129.214 1
IP address 148.163.129.213
Reverse DNS (PTR record) not available
DNS server (NS record) ns3.proofpoint.us (208.84.66.208)
pdns99.ultradns.biz (156.154.66.99)
pdns99.ultradns.net (156.154.65.99)
ns1.proofpoint.us (208.84.67.208)
ns3.proofpoint.com (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.com (156.154.64.99)
pdns99.ultradns.org (156.154.67.99)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255
148.163.129.213
Number of SPAM hosts on 148.163.128.0/19 1
Domain Tools
so-ne.ne.jp
yamato-tanaka.jp
ilastmile.com
NetRange: 148.163.128.0 – 148.163.159.255
CIDR: 148.163.128.0/19
NetName: PROOFPOINT-NET-NORTH-AMERICA
NetHandle: NET-148-163-128-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22843, AS13916, AS26211
Organization: Proofpoint, Inc. (PROOF)
RegDate: 2014-06-13
Updated: 2017-06-15
Ref: https://whois.arin.net/rest/net/NET-148-163-128-0-1

OrgName: Proofpoint, Inc.
OrgId: PROOF
Address: 892 Ross Drive
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
RegDate: 2007-10-16
Updated: 2014-09-08
@@@@@@@@@@@@@@@@
??????????
Mail server Tools
mx7602.piscesdns.net
Are you looking for IPv4 address 148.163.129.213?

Are you looking for domain piscesdns.net?
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns20.domaincontrol.com. The current IPv4 address is 184.168.221.33.

DNS server (NS records) ns20.domaincontrol.com (208.109.255.10)
ns19.domaincontrol.com (216.69.185.10)
Mail server (MX records)
IP address (IPv4) 184.168.221.33
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 184.168.221.0/24
184.168.221.0 – 184.168.221.255
Domain Name: PISCESDNS.NET
Registry Domain ID: 1587139235_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2011-10-13T23:49:28Z
Creation Date: 2010-03-01T19:51:04Z
Registry Registrant ID: Not Available From Registry
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Registrant Street: DomainsByProxy.com
Registrant Street: 14455 N. Hayden Road
Registrant City: Scottsdale
Registrant State/Province: Arizona
Registrant Postal Code: 85260
Registrant Country: US
480-624-2599
@@@@@@@@@@@@@
???????????
domainsbyproxy.com

Domain IPv4 address Ranking Alexa Pagerank
piscesdns.net 184.168.221.33
piscesdns.net 184.168.221.33
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@@@@@@@@
Mail server Tools
mx7603.piscesdns.net
mx7603.piscesdns.net.tavaj.com.br
This domain is hosted by Proofpoint, Inc. (AS13916). The first DNS server is ns1.eurodns.com. The current IPv4 address is 148.163.129.214. The mail server with the highest priority is mx7603.piscesdns.net.tavaj.com.br.
DNS server (NS records) ns1.eurodns.com (156.154.64.105)
ns2.eurodns.com (156.154.65.105)
Mail server (MX records) mx7603.piscesdns.net.tavaj.com.br (148.163.129.214)
mx3002.piscesdns.net (208.84.66.213)
IP address (IPv4) 148.163.129.214
IP address (IPv6)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255

% whois.tcpiputils.com

% Whois information not available.
% The registry for this domain name does not
% publish whois records in the standard format.

% The following information is based on the Domain Name System (DNS)

Domain name: tavaj.com.br
Status: registered

Domain nameservers:
ns1.eurodns.com
ns2.eurodns.com
tavaj.com 52.19.197.101
tavaj.com.br 148.163.129.214
tavaj.cz
tavaj.ir
tavaj.com 52.19.197.101
tavaj.com.br 148.163.129.214
tavaj.cz
tavaj.ir
tavajam.ir
tavajgraphics.com 209.99.64.53
tavaji.men
tavajjoh.ir 51.254.56.97 1
tavajmusic.tk 195.20.45.31
tavajo.com 54.183.99.63
tavajo.ir
tavajobs.com 50.63.202.37
tavajobs.info 50.63.202.60
tavajobs.us 184.168.221.52
tavajoh.com 104.24.98.218
tavajohi.com 5.61.27.168
tavajoi.com 184.168.221.62
tavajprint.com 109.169.66.225
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@
Domain Tools
tavaj.com.br
address 148.163.129.214
Location Sunnyvale, California, United States (US) flag
Registry arin
IP address 148.163.129.214
Reverse DNS (PTR record) not available
DNS server (NS record) ns3.proofpoint.us (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.com (156.154.64.99)
ns1.proofpoint.us (208.84.67.208)
ns3.proofpoint.com (208.84.66.208)
pdns99.ultradns.biz (156.154.66.99)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255

@@@@@@@@@@@@@@@@@
??????????????
Are you looking for domain ppe-hosted.com?

Domain IPv4 address Ranking Alexa Pagerank
ppe-hosted.com 6
ppe-hosted.com 6
IPv4 routes
Startip Endip Description Country #domains #spamhosts
41.79.220.0 41.79.223.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 117 1
41.79.220.0 41.79.220.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 115 0
76.191.0.0 76.191.15.255 Metronet Fire Dispatch US 0 0
204.89.240.0 204.89.240.255 Tri-Community Dispatch Center US 0 0
208.81.208.0 208.81.211.255 Dispatch Printing Company US 70 0
209.251.232.0 209.251.232.255 Southwest Dispatch Center US 1 0
208.81.208.0 208.81.208.255 Dispatch Printing Company US 70 0
208.81.209.0 208.81.209.255 Dispatch Printing Company US 0 0
208.81.210.0 208.81.210.255 Dispatch Printing Company US 0 0
208.81.211.0 208.81.211.255 Dispatch Printing Company US 0 0
5.226.32.0 5.226.39.255 ADMINOR INFRA HOSTED IN VASTBERGA STOCKHOLM SE 1 0
41.79.180.0 41.79.183.255 The Packet Hub Hosted Services ZA 14 0
41.191.232.0 41.191.239.255 Telco Applications servers and hosted facilities ZW 82 0
41.222.228.0 41.222.231.255 Hosted ZA 34 0
45.118.180.0 45.118.183.255 HDDC-HOSTED SG 137 0
64.112.184.0 64.112.187.255 Hosted Backbone US 0 0
77.75.208.0 77.75.215.255 Services and servers only hosted by TV2 NO 31 0
77.240.48.0 77.240.63.255 Telappliant Hosted Services GB 9 0
87.236.128.0 87.236.135.255 Hosted Services GB 12 0
95.215.174.0 95.215.174.255 A4N Hosted Sites GB 33 0
103.7.192.0 103.7.195.255 Hosted Continuity Pty Ltd AU 4 0
103.40.109.0 103.40.109.255 Hosted Network Pty. Ltd. AU 87 0
103.70.136.0 103.70.137.255 THE VALUE HOSTED (PVT). LIMITED PK 226 14
103.80.20.0 103.80.21.255 Hosted Network Pty. Ltd. AU 4 0
103.243.110.0 103.243.110.255 Hosted Network Pty. Ltd. AU 217 0
103.244.128.0 103.244.131.255 W3 Hosted Servers AU 2 0
103.249.60.0 103.249.63.255 Managed Hosted Applications Limited NZ 26 0
148.59.134.0 148.59.134.255 Hosted SFY CA 4 0
169.255.36.0 169.255.39.255 123 Internetworks own hosted infrastructure ZA 4 1
169.255.252.0 169.255.255.255 Hosting Range (this includes VAS, Radius, Portal, Websites and other hosted Services and Gateway addresses) ZA 2 0
173.209.192.0 173.209.223.255 Hosted Data Solutions, LLC US 2 0
177.39.96.0 177.39.99.255 Websense Hosted Network Operations BR 0 0
178.20.168.0 178.20.175.255 Its Hosted NL 272 0
178.255.24.0 178.255.31.255 Interforce Hosted Solutions BV NL 1,185 0
182.161.64.0 182.161.65.255 Hosted Network Pty. Ltd. AU 0 0
185.63.48.0 185.63.51.255 Oceanet-Telecom – Hosted Services FR 48 0
185.94.204.0 185.94.207.255 Smart Hosted Solutions Ltd GB 0 0
185.167.36.0 185.167.39.255 GTI-Hosted-Service GB 1 0
185.178.224.0 185.178.227.255 VELCOM-HOSTED-1 SI 79 0
185.182.228.0 185.182.231.255 Hosted on RapidSwitch GB 4 0
185.189.76.0 185.189.79.255 Customers direct and Wholesale VM Hosted IT 0 0
185.245.96.0 185.245.99.255 IP hosted by Host-Unlimited.de DE 9 0
193.17.226.0 193.17.226.255 TeleWare Hosted Services Ltd. GB 6 0
193.30.142.0 193.30.142.255 Hosted By Infracom AB SE 0 0
193.164.252.0 193.164.253.255 TeleWare Hosted Services Ltd. GB 1 0
193.203.225.0 193.203.226.255 DLA Hosted ICT Diensten B.V. NL 458 0
194.8.29.0 194.8.29.255 Hosted by Infracom AB SE 23 0
197.149.180.0 197.149.183.255 Assignments to clients hosted in cloud environment ZA 25 0
202.174.4.0 202.174.4.255 Yahoo Taiwan Corporate Network hosted at Yahoo Taiwan Colo TW 0 0
203.12.234.0 203.12.234.255 Bluecentral Hosted Solutions AU 353 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df2:9c00:: 2001:df2:9c00:ffff:ffff:ffff:ffff:ffff CBL Group Hosted Services AU 0 0
2001:df3:b200:: 2001:df3:b200:ffff:ffff:ffff:ffff:ffff THE VALUE HOSTED (PVT.) LIMITED PK 0 0
2403:7d00:: 2403:7d00:ffff:ffff:ffff:ffff:ffff:ffff Hosted Continuity Pty Ltd AU 0 0
2404:bd80:: 2404:bd80:ffff:ffff:ffff:ffff:ffff:ffff MY HOSTED INTERNET LTD MM 3 0
2407:d00:: 2407:d00:ffff:ffff:ffff:ffff:ffff:ffff Managed Hosted Applications Limited NZ 0 0
2407:d080:: 2407:d080:ffff:ffff:ffff:ffff:ffff:ffff Hosted Network Pty. Ltd. AU 0 0
2607:5c80:: 2607:5c80:ffff:ffff:ffff:ffff:ffff:ffff Hosted Backbone US 0 0
2804:440:: 2804:440:ffff:ffff:ffff:ffff:ffff:ffff Websense Hosted Network Operations BR 0 0
2a00:1d38:: 2a00:1d38:ffff:ffff:ffff:ffff:ffff:ffff Its Hosted NL 1 0
2a04:e9c0:: 2a04:e9c7:ffff:ffff:ffff:ffff:ffff:ffff Smart Hosted Solutions Ltd GB 0 0
2a07:54c0:: 2a07:54c7:ffff:ffff:ffff:ffff:ffff:ffff MY HOSTED INTERNET LTD IM 0 0
2001:16c0:fefe:: 2001:16c0:fefe:ffff:ffff:ffff:ffff:ffff IPv6 assignment for hosted server in worldstream, customer Arash Naderpour IR 0 0
2a00:1d38:fa:: 2a00:1d38:fa:ffff:ffff:ffff:ffff:ffff Its Hosted NL 1 0
2a00:1d38:ef01:: 2a00:1d38:ef01:ffff:ffff:ffff:ffff:ffff Its Hosted NL 0 0
2a02:ce8:3:: 2a02:ce8:3:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a02:ce8:5:: 2a02:ce8:5:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a02:ce8:14:: 2a02:ce8:14:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a04:5340:1:: 2a04:5340:1:ffff:ffff:ffff:ffff:ffff SIM-Networks Hosted in Germany DE 1 0
2a04:5340:2:: 2a04:5340:2:ffff:ffff:ffff:ffff:ffff SIM-Networks Hosted in Germany DE 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12227 Dispatch Printing Company US 4 0 70 0
29755 Southwest Dispatch Center US 1 0 1 0
394772 The Columbus Dispatch US 1 0 2 0
10112 THE VALUE HOSTED (PVT.) LIMITED PK 2 0 226 14
14713 Hosted Backbone US 10 2 14 0
34745 TeleWare Hosted Services Ltd. GB 2 0 7 0
34768 Smart Hosted Solutions Ltd GB 1 1 0 0
50655 Its Hosted NL 3 3 272 0
58936 Managed Hosted Applications Limited NZ 3 0 26 0
132225 Hosted Continuity Pty Ltd AU 1 0 4 0
133120 Hosted Network Pty. Ltd. AU 4 0 308 0
135583 ip2me Hosted Services AU 1 0 2 0
203033 MY HOSTED INTERNET LTD IM 0 1 0 0
DNS server (NS records) ns3.computercrews.com (68.71.81.26)
ns1.computercrews.com (104.153.156.116)
ns2.computercrews.com (70.89.173.99)
Mail server (MX records) mx2-us1.ppe-hosted.com (148.163.129.51)
mx1-us1.ppe-hosted.com (67.231.154.162)
IP address (IPv4) 74.63.246.116
IP address (IPv6)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 74.63.192.0/18
74.63.192.0 – 74.63.255.255
Domain Name: COMPUTERCREWS.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Thomas Crews
Registrant Organization: Computer Crews
Name Server: NS1.COMPUTERCREWS.COM
Name Server: NS2.COMPUTERCREWS.COM
Name Server: NS3.COMPUTERCREWS.COM
DNSSEC: unsigned

 

 




Larry Mizel Wide Open West Financial cyber attacks against Stew Webb Whistleblower

(Left Cyber attacker Larry Mizel)

By Stew Webb Federal Whistleblower

This is one of many of Larry Mizel networks that have been blocked due to throttling stewwebb.com

this is direct retaliation against a Federal Whistle blower 18 USC-1010 1010-1015.

also:

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

You are being reported to the proper US Government Authority to Prosecute.

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Throttling StewWebb.com

Hundreds of times

Schaumburg, United States was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://www.stewwebb.com/
2/27/2018 7:05:34 AM (6 hours 21 mins ago)
IP: 64.53.148.58 Hostname: d53-64-58-148.nap.wideopenwest.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; Z987 Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36
NetRange: 64.53.148.0 – 64.53.149.255
[512 addresses in this network]
CIDR: 64.53.148.0/23 (64.53.148.0 – 64.53.151.255)
[1024 addresses in this network]
NetName: IL-NAPR
NetHandle: NET-64-53-148-0-1
Parent: WIDEOPENWEST-2BLK (NET-64-53-128-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C03130595)
RegDate: 2012-08-27
Updated: 2014-12-09
Comment: Address complaints to abuse@wideopenwest.com
Ref: https://whois.arin.net/rest/net/NET-64-53-148-0-1

CustName: Wide Open West
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2012-08-27
Updated: 2014-12-09
Ref: https://whois.arin.net/rest/customer/C03130595

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: abuse@wideopenwest.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: kevin.baker@wowinc.com
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: ipadmin@wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: ipadmin@wideopenwest.com
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

RTechHandle: IPADM669-ARIN
RTechName: IP Administrator
RTechPhone: +1-706-634-2898
RTechEmail: ipadmin@wideopenwest.com
RTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

64.53.148.58
IP address 64.53.148.58
Location Schaumburg, Illinois, United States
IP address 64.53.148.58
Reverse DNS (PTR record) d53-64-58-148.nap.wideopenwest.com
DNS server (NS record) dns1.wideopenwest.com (64.233.207.16)
dns2.wideopenwest.com (64.233.207.2)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.53.148.0/23
64.53.148.0 – 64.53.149.255
64.53.148.58

NetRange: 64.53.148.0 – 64.53.149.255
CIDR: 64.53.148.0/23
NetName: IL-NAPR
NetHandle: NET-64-53-148-0-1
Parent: WIDEOPENWEST-2BLK (NET-64-53-128-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C03130595)
RegDate: 2012-08-27
Updated: 2014-12-09
CustName: Wide Open West
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2012-08-27
Updated: 2014-12-09
706-634-2898
NetRange: 64.53.128.0 – 64.53.255.255
CIDR: 64.53.128.0/17
NetName: WIDEOPENWEST-2BLK
NetHandle: NET-64-53-128-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: WideOpenWest Finance LLC (WOPW)
RegDate: 2002-05-27
Updated: 2016-10-03
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
OrgName: WideOpenWest Finance LLC
OrgId: WOPW
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2002-04-09
Updated: 2017-05-16
@@@@@@@
wowinc.com
Domain wowinc.com is not listed in the top million list of Alexa. It is not listed in the DMOZ directory. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is dns2.wideopenwest.com. The current IPv4 address is 68.179.166.209. The mail server with the highest priority is us-smtp-inbound-2.mimecast.com.
v=spf1 mx ip4:64.233.207.78 include:mktomail.com include:mimecast.com ~al

DNS server (NS records) dns2.wideopenwest.com (64.233.207.2)
dns1.wideopenwest.com (64.233.207.16)
Mail server (MX records) us-smtp-inbound-2.mimecast.com (205.139.110.242)
us-smtp-inbound-1.mimecast.com (205.139.110.181)
IP address (IPv4) 68.179.166.209
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 68.179.128.0/18
68.179.128.0 – 68.179.191.255
Domain Name: wowinc.com
Registry Domain ID: 406318_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ascio.com
Registrar URL: http://www.ascio.com
Updated Date: 2017-09-19T21:58:06Z
Creation Date: 1996-10-17T00:00:00Z
Registrar Registration Expiration Date: 2018-10-16T04:00:00Z
Registrar: Ascio Technologies, Inc
Registrar IANA ID: 106
ascio.com

44.2070159370
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: WIDEOPENWEST LLC
Registrant Street: 7887 East Belleview Avenue
Registrant City: Englewood
Registrant State/Province: Colorado
Registrant Postal Code: 80111
Registrant Country: US
630-445-5040

@@@@@@@@@@@@
wideopenwest.com
Domain wideopenwest.com is not listed in the top million list of Alexa. It is not listed in the DMOZ directory. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is dns1.wideopenwest.com. The current IPv4 address is 64.233.207.78. The mail server with the highest priority is mx.wowway.com.
DNS server (NS records) dns1.wideopenwest.com (64.233.207.16)
dns2.wideopenwest.com (64.233.207.2)
Mail server (MX records) mx.wowway.com (64.8.71.111)
IP address (IPv4) 64.233.207.78
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.233.207.0/24
64.233.207.0 – 64.233.207.255
Domain Name: wideopenwest.com
Registry Domain ID: 11889612_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.ascio.com
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: WIDEOPENWEST LLC
Registrant Street: 7887 East Belleview Avenue
Registrant City: Englewood
Registrant State/Province: Colorado
Registrant Postal Code: 80111
Registrant Country: US

ascio.com

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




US CFTC to fine UBS, Deutsche Bank, HSBC for futures market spoofing

U.S. CFTC to fine UBS, Deutsche Bank, HSBC for futures market spoofing, manipulation

January 26, 2018, 06:35:00 PM EDT By Reuters

WASHINGTON, Jan 26 (Reuters) – The U.S. derivatives regulator is set to announce it has fined European lenders UBS, HSBC and Deutsche Bank millions of dollars each for so-called “spoofing” and manipulation in the U.S. futures market, three people with direct knowledge of the matter told Reuters.

The enforcement action by the Commodity Futures Trading Commission (CFTC) is the result of a multi-agency investigation that also involves the Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI), the people said.

Spokesmen for all three banks declined to comment.

https://www.reuters.com/article/us-usa-cftc-enforcement-exclusive/u-s-cftc-to-fine-ubs-deutsche-bank-hsbc-for-spoofing-manipulation-sources-idUSKBN1FF2YK

The enforcement action by the Commodity Futures Trading Commission (CFTC) is the result of a multi-agency investigation that also involves the Department of Justice (DoJ) and the Federal Bureau of Investigation (FBI) – the first of its kind for the CFTC, the people said.

The fines for UBS and Deutsche Bank will be upward of ten million, while the fine for HSBC will be slightly less than that, the people said, without providing exact figures.

Spokesmen for HSBC, Deutsche Bank and UBS declined to comment.

Spoofing involves placing bids to buy or offers to sell futures contracts with the intent to cancel them before execution. By creating an illusion of demand, spoofers can influence prices to benefit their market positions.

Spoofing is a criminal offense under a provision implemented as part of the 2010 Dodd-Frank financial reform.

Some of the manipulative behavior came to light as a result of the authorities’ previously-settled probes into forex market manipulation while UBS self-reported the wrong doing, according to two of the people with knowledge of the matter.

The bank investigations have been ongoing for more than a year, one of the people said.

The settlement is the most high-profile brought so far by the CFTC’s head of enforcement James McDonald who was appointed to the role in March 2017.

McDonald, who was previously a prosecutor in the Southern District of New York, said in September he plans to encourage companies and staff to report their own wrongdoing and cooperate with investigators, a strategy he hopes will make it easier to prosecute more individuals.

In August, a U.S. appeals court upheld the conviction of former New Jersey-based high-speed trader Michael Coscia who was the first individual was the first person to be criminally prosecuted for the manipulative trading practice.

A spokeswoman for the CBOE, one of the U.S.’s major futures exchanges, declined to comment. A spokeswoman for the CME Group, the other major futures bourse, did not immediately respond to a request for comment.

(This version of the story corrects to remove extraneous words from penultimate paragraph.)

Reporting by Michelle Price; additional reporting by Karen Freifeld in New York; editing by Clive McKeef.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan January 27 2018

Radio Stew Webb and Tom Heneghan Saturday January 27, 2018

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Tom Heneghan and Glenn Canady January 24 2017

Radio Tom Heneghan and Glenn Canady January 24 2017

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Radio Stew Webb and Tom Heneghan January 21 2017

Radio Stew Webb and Tom Heneghan January 21, 2017

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan January 19, 2018

Radio Stew Webb and Tom Heneghan January 19, 2018

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan December 31 2017

Radio Stew Webb and Tom Heneghan December 31 2017

Intel Briefing – Tom Heneghan Stew Webb 12-31-17

Intel Briefing – Tom Heneghan Stew Webb (12-31-17) from Truth Warriors on Vimeo.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan December 26 2017

Radio Stew Webb and Tom Heneghan December 26, 2017

Intel Briefing – Tom Heneghan, Stew Webb (12-28-17) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb Tom Heneghan December 18 2017

Radio Stew Webb and Tom Heneghan December 18, 2017

Intel Briefing – Stew Webb, Tom Heneghan (12-18-17) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Amber Alert Illuminati Human Sacrifice December 20-21 Denver Colorado

By Stew Webb

Wednesday December 20th 2017 George HW Bush, Larry Mizel, Henry Kissinger, and the 12

Disciples of Satan will perform their Human Infant sacrifice at the Old Nivare in Denver, Colorado beginning around 10-12pm.

Read and listen the the link below.

This needs to be stopped.

 

Illuminati Human Sacrifice June 20-21 Denver Colorado

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Redux Donald Rumsfeld Flips

By Tom Heneghan International Intel Expert

UNITED States of America   –   It can now be reported that former Secretary of Defense Donald Rumsfeld is cooperating with U.S. Military tribunals and the U.S. Military Grand Juries operating in Washington, D.C. and turning over evidence that will have former year 2000 illegal White House occupant, Nazi war criminal Jr. George W. Bush FRAUD and former Vice p Resident Nazi Richard Cheney arrested and charged with crimes of HIGH TREASON related to the 9/11 black op attack on the American People and war crimes.

We can also divulge that a Pentagon audit is now taking place linking $2.3 TRILLION U.S. tax dollars (that disappeared from the Pentagon the day before 9/11) to illegal use in the purchase of put options aka short positions that took place through the Chicago Board of Options and the Nazi German Deutsche Bank 24 hours before the 9/11 attack.

The put options aka short positions were placed on United Airlines stock and Swiss Del Rey insurance company, a corporation tied to none other than Bush – Clinton – Crime Family crooked banker, year 2000 election stealer and 9/11 co-conspirator, Nazi Jew Larry Mizel.

(Top Right) Criminal Larry Mizel

The clearing house for these illegal TREASONOUS transactions was the Bank of Israel, Eisley Brokerage and the Onyx Trust out of Reno, Nevada.

We can also report that the U.S. Military Grand Juries as well as the Military tribunals have fingered former illegal White House occupant, foreign born Barack Hussein Obama – Soetoro, former U.S. National Security Advisor Susan Rice, former U.S. CIA Director James Woolsey and former U.S. Vice President, Nazi Jew neocon stooge and fingered pedophile Joseph Biden in the attempted kidnapping of 9/11 American-Turkish Council whistle blower, Turkish cleric Gülen.

P.S. LATE BREAKING REPORT

FBI whistle blowers are reporting that Nazi neocon CIA agent and Bush CIA Crime Family enabler Hillary Rodham Clinton failed FIVE (5) lie detector tests in reference to her private email server and the HIGH TREASON she committed, along with current Special Counsel Robert Mueller, in the sale of Uranium One to the Russian Federation.

We can also reveal that the FBI has opened a criminal investigation of Jane Sanders, the wife of former year 2016 socialist candidate for president, Bernie Sanders.

The criminal investigation deals with massive bank fraud involving $10 million.

Sanders has also been fingered for trying to cover up the Israeli role in the 9/11 attack given the fact that Sanders is a Jew.

Related

Following Zakheim and Pentagon trillions to Israel and 9-11

Monday, July 31st, 2006

by Jerry Mazza

War mongering neocon PNAC Dick Cheney and Donald Rumsfeld

They formed the PNAC in 1997 And published “RAD” in September 2000. Determined to have their world empire, they offered an eerie prophecy on page 52 of that document about how it might be accomplished, “Further, the process of transformation, even if it brings revolutionary change, is likely to be a long one, absent some catastrophic and catalyzing event – like a new Pearl Harbor.”  Their dream of a catalyzing event could not have been better actualized than in the events of 9/11.

Rumsfeld was chairman of Gilead Sciences from 1997 to 2001.

It is Rumsfeld who was involved with Anthrax and vaccines …

and Rumsfeld who was profiting from them . . . see also Philip Zack went on to work for Gilead

THE REAL PERPETRATOR WHO

MAILED POST 9/11 ANTHRAX LETTERS

Reference: It is no coincidence that this Ft. Detrick lab is the same lab where Israeli Mossad agent Dr. Philip M. Zackerie aka Dr. Zack launched the post 9/11 anthrax attack against the American People.

Donald Rumsfeld as Searle Chairman reaped massive profits from cancer-causing Aspartame aka NutraSweet

How Aspartame Became Legal – The Timeline Legal – The Timeline

Rogue Israeli Mossad-British Intelligence Team

Behind French Students Assassination

Plus  SpyGate Update

July 6, 2008

by Tom Heneghan

Laurent Bonomo, left, and Gabriel Ferez, right, students who were

two French Intelligence officers, were brutally stabbed to death

in a London flat that was then set on fire  Photo: AP

It can now be reported that the murders of two French bio-chemical students, Laurent Bonomo and Gabriel Ferez, were carried out by Bush-Clinton “TRUE COLORS” rogue Israeli Mossad-British Intelligence assassination teams.

Both French students, Bonomo and Ferez, were studying at the prestigious London Imperial College researching the origins of bird flu and the link to the alleged vaccines.

The murders of the two students was first released by France’s Directorate for Internal Security, not by Britain’s Scotland Yard, making it almost a certainty that the two students were French Intelligence officers.

Reference: A joint French-U.S. Intelligence anti-terrorist task force in Paris, France, headed by former Secretary of State Colin Powell and former head of French Intelligence Jean Crouté, for years have monitored the activity of the out-of-control Bush-Clinton “TRUE COLORS” mercenary armies.

The patriotic American-French team has prevented various scripted terrorist attacks, i.e. false flags, on both the United States and Europe, with the planning of the attacks actually originating inside the compromised intelligence agencies of the United States, the United Kingdom, Israel and Germany.

Note: French Intelligence warned both British Intelligence MI5 and British Scotland Yard about the presence of the now wanted UK 7/7 London bombings terrorist suspect Eva Telege aka Teleke aka Teleki, i.e. Teleki’s presence in the United Kingdom two weeks before the subway attack.  (Teleki was Hillary Clinton’s confidant while she was White House First Lady, visiting Hillary in the White House on numerous occasions).

The warnings were ignored by the Tony Blair government, British Intelligence Services and Scotland Yard.

Reference: It is also important to remember that the outlaw Bush Administration ignored the French Intelligence warning of the impending 9/11 BLACK OP attack on the United States, i.e. the French intercepting the MOSSAD-United Arab Emirates cable containing the 9/11 command and control attack order “The time is now the match is hot”.

The origin of the cable was overheard in the old province of the Soviet Union called Uzbekistan.

A U.S. Intelligence officer by the name of Steven Chaplin was linked to the cable and the attack order.

Note: Chaplin was later arrested along with alleged 9/11 co-conspirator Khalid Sheikh Mohammed, but was later released by the Bush Justice Department BEFORE the FBI could interrogate him.  Khalid Sheikh Mohammed was eventually taken to Guantanamo Bay, Cuba.

The question remains:  Was Chaplin the REAL triggerman and Khalid Sheikh Mohammed, like Osama bin Laden, i.e. CIA asset Tim Osman, nothing but a patsy.

Item:  Bush Administration official Steven Cambone was aware of this 9/11 TREASON involving Steven Chaplin on the day of 9/11 itself.

Cambone worked directly with then U.S. Secretary of Defense Donald Rumsfeld.   In the notes of Steven Cambone, Secretary of Defense Rumsfeld is quoted as saying in response to 9/11 “go massive sweep it all, things related and not”.

Steven Cambone’s notes from meetings with Defense Secretary Donald Rumsfeld on the afternoon on 9/11/01

DOD Staff Notes tomflocco.com

Reference: U.S. Intelligence Officer Steven Cambone had DIRECT ties to the Office of Special Plans, i.e. the Iraq War Group.  This included Vice pResident Dick Cheney, Bush-Clinton whore Mary Matalin and the two Israeli MOSSAD assets Paul Wolfowitz and Michael Ledeen.

What is clear now is that the 9/11 BLACK OP was an inside job and was a pretense for what was to become the ILLEGAL UN-constitutional war in Iraq ordered by the UN-elected, sexual deviate, the AWOL White House resident commonly known as Bush fraud.

The question is now out there for the asking:  Did Rumsfeld want to sweep away Steven Chaplin who clearly knew too much about 9/11 on the day of 9/11 itself.

AND, OF COURSE, IT GETS WORSE!

The two French students, i.e. Intelligence Officers, had discovered that the alleged bird flu vaccine, H-7, which was designed to neutralize and stop the H5N1 avian flu virus, had been spliced using DNA to actually create a vaccine and a virus at the same time.

Dual ISRAELI-U.S. citizen

MOSSAD agent Dr. Philip M. Zackerie aka Dr. Zack

USAMRIID in Fort Detrick, Maryland is a

major US biodefense research facility

The French students had also discovered that the bird flu vaccine, i.e. a virus, had links to both U.S., British and Israeli laboratories with the noted post 9/11 anthrax MOSSAD agent Dr. Philip M. Zackerie as a subject of interest.

Israeli ZIONIST, microbiologist Zackerie, known as Dr. Zack, not only worked for the U.S. bio-weapons lab at Fort Detrick, Maryland, where he was photographed handling the stain of anthrax used in the post 9/11 attack, but was a consultant at the Boulder, Colorado FBI Division 5 linked company Gilead Sciences Inc.

Gilead Sciences of Boulder, Colorado has been linked to the 9/11 anthrax strain and to the bird flu vaccine.

And, if that is not bad enough folks, listen to this.

Almost 50% of the Gilead Sciences Inc. stock is owned by former U.S. Secretary of Defense and 9/11 co-conspirator Donald Rumsfeld, former British Prime Minister and Dunblaine pedophile Tony Blair, Cindy McCain, wife of presumptive Republican nominee John McCain, and none other than FBI Division 5 William Morris Agency and NBC anchor face, Bush-Clinton Crime Family Syndicate stooge Tom Brokaw.

Brokaw has replaced the late Tim Russert as host of NBC’s alleged interview show “Meet the Press”.

Retired Republican Senator William Frist of Tennessee has major investments in the bird flu vaccine, i.e. virus.

 

HIGH TREASON co-conspirators WAR CRIMINALS

Nazi Jr George W. Bush FRAUD and British Prime Minister Tony Blair

Tony Blair, Dunblaine pedophile, ordered the ASSASSINATION of

patriot weapons expert Dr. David Kelly

Reference: The British weapons expert Dr. David Kelly was assassinated on the orders of former British Prime Minister Tony Blair, after Dr. Kelly became aware of the corruption of the British laboratories and the existence of the classified WD199 document that connected the dots on Blair and Bush’s criminal conspiracy that would use 9/11 as the excuse to take the United States and the United Kingdom into the ILLEGAL war in Iraq based on a lie.

Now back to our French students.

These French Intelligence officers, who worked for both Colin Powell and Jean Crouté, were about to expose a plot by the Bush-Clinton “TRUE COLORS” intelligence rogues to use the H-7 flu vaccine, i.e. virus, as a way to poison the American People and create a flu pandemic, which would lead to a national emergency and give the outlaw Bush Administration an excuse to declare MARTIAL LAW and exercise emergency control over the U.S. Treasury and Federal Reserve.

This financial control would allow the outlaw Bush Administration the ability to block the G-7 ordered implementation of the noted Wanta-Reagan-Mitterrand Protocols, which are designed to return BILLIONS OF DOLLARS back to the U.S., French and Chinese Treasuries.

The two French students, who had their apartment broken into one week before their brutal assassination, also had their lap top computer stolen and their apartment fire bombed.

The operation has been traced to a team of ten (10) Israeli MOSSAD and British MI5 agents.

The individual currently under arrest in the United Kingdom is a witness to the murders whose life is in jeopardy at this time given he has been taken into custody by the Bush-Clinton “TRUE COLORS” compromised Scotland Yard.

How dare you, you conspiratorial

tyrants and kings and notable queens!

The two French students, along with former Secretary of State Colin Powell and former head of French Intelligence Jean Crouté, were also in possession of a SECRET U.S. government “Death List”, which targets various outspoken political opponents of the American ruling junta.

It is conceivable that these outspoken political opponents would become recipients of the bird flu vaccine aka virus after their incarceration at various concentration camps under MARTIAL LAW conditions.

These concentration camps are SECRETLY headquartered in Yuma, Arizona.

Former Republican Senator William Frist of Tennessee was given a copy of this “Death List”.

  1. S. The assassination of the French Intelligence Officers happened to coincide just after the recent meetings that took place in Northern Ireland between White House resident George W. Bushfraud, daddy Bush’s little bitch Bill Clinton and current British Prime Minister Gordon Brown.

The two murders also coincide with the recent assassination attempt in Israel targeting French President Nicolas Sarkozy and Israeli Prime Minister Ehud Olmert.

It should be noted that the alleged suicide victim, who allegedly shot himself during the departure of Sarkozy from the Tel Aviv airport was an Arab patsy-to-be before the assassination attempt was foiled.

Sarkozy was also aware of the bird flu TREASON and the plans to use it against France as well as the Israeli MOSSAD hacking of French INTERPOL internet portals using the American NSA and a headquarters in Amsterdam, Holland.

The NSA-MOSSAD spy nest in Amsterdam has also been used to disrupt and hack all U.S. computers and email communications originating in the United States.

So, in other words folks, if you are a patriotic whistle blower receiving communications from overseas sources about internal government-sponsored terrorist activities on your own soil, i.e. U.S. soil, YOU, the patriotic whistle blower, are subjected to being spied on by your own government, i.e. the REAL terrorists.

P.P.S. As of this hour, Chief U.S. District Judge Vaughn Walker’s order, that voids the entire Bush fraud spy program against the American People, REMAINS IN EFFECT!

So what are the whores in the U.S. Congress going to do now?

Violate the Judge’s order or rewrite a new law!

Remember, immunity for Verizon, AT&T, Bell South and the rest of the telecom companies is also immunity for Israeli Odigo, a communications firm that also participated in the ILLEGAL NSA spy program against the American People.

Verizon received a major merger deal from the outlaw Bush Administration in exchange for their cooperation in the ILLEGAL spy program, i.e. TREASON.

It is important to note that CBS Viacom is obstructing justice in their financial war versus Google knowing that CBS Viacom, with the help of the NSA, has also participated in spying on the American People and the internet company Google.

Item: The corporate U.S. media, which favors spying on the American People, is directly involved in the spying, i.e. their 10-second delay with the NSA and their corporate military contracts, which financially benefit them, i.e. an alleged war on terror.

Remember, there is NO war on terror.  It was created too:

– Financially block the Wanta-Reagan-Mitterrand Protocol funds,

– Legitimize Bush’s presidency after he stole the election from

  duly elected President Albert Gore Jr.,

– Enable the theft of the U.S. Treasury utilizing private offshore

  1241 corporations tied to foreign intelligence agencies and

  foreign financial interests, and

– Eventually destroy the Constitution of the United States and

  all of the freedoms that the American People cherish.

Call your Senator Monday at (202) 224-3121 and presumptive Democratic presidential nominee Senator Barack Obama of Illinois and tell them all to vote NO on the spy bill.

If they vote yes they have committed a federal crime called a “Misprision of Felony”, at which point the American People will have no choice but to use whatever measures necessary to return the United States to a constitutional rule of law.

One quick political whore alert before we end this briefing:

KHAZARIAN Jew and unelectable LOSER Hillary lesbian in-the-closet Rodenhurst Clinton aka “HildaBeast” stooge Wolf Blitzer of CNN, (202) 898-7900, was at it again today smearing duly elected President Albert Gore Jr. about his statement years ago, i.e. inventing the internet.

Let’s set the record straight once and for all Blitzer, and then shut up!

Al Gore, then Democratic Congressman of Tennessee, and Democratic Congressman Tom Downey of New York, sponsored the legislation that gave us the internet access and the REAL freedom of the press we have today.

In the year 2000 Albert Gore Jr., not only defeated Bush but also the two Clinton’s and the entire KHAZARIAN Jew oil-soaked, sexual deviate-laced corporate propaganda American media.

Message to Blitzer: Instead of worrying about nitpiking politicians, do your job!

Research the TREASONOUS theft of the year 2000 presidential election; research the TREASONOUS events surrounding 9/11; research the war in Iraq based on a lie; research the massive obstruction of justice committed by the outlaw Bush Administration, i.e. numerous U.S. Attorneys fired ILLEGALY by the Bush – Cheney- Rove junta;

Blitzer, research the massive theft of the U.S. Treasury committed by the Bush-Clinton Crime Family, i.e. the ILLEGAL money laundering of U.S. Taxpayer funds aka the Wanta-Reagan-Mitterrand Protocols;

and finally Blitzer, whoever invented the internet at this time is a mute point as soon duly elected President Albert Gore Jr. and millions of other Americans are going to invent the U.S. version of the guillotine for TRAITORS and TREASON.

Rumors have it there is a Federal Express on the way to CNN.

By the way CNN, we know about your Japanese Yen derivatives.

In closing, if Blitzer wants to do the research all he has to do is read these intelligence briefings. Don’t hold your breath, Blitzer is too busy with his Japanese Yen derivatives.

Stay tuned.

EXPECT THE UNEXPECTED!

DULY ELECTED President Albert Gore Jr.

awaits inauguration, the Supreme Law of the United States,

our U.S. Constitution, demands it!

 

As we live free or die, Lafayette remains at Brandywine and

Albert Gore Jr. remains the year 2000,

U.S. Constitution DULY ELECTED, non-inaugurated,

natural born REAL President of the United States.

 

Al Gore on Restoring the Rule of Law

A REMINDER:  Homosexual gays and lesbians who are  “IN-THE-CLOSET”  are  a MAJOR threat to National Security being vulnerable to blackmail and extortion by self-serving, hostile entities against the safety, security, sovereignty and best interests of the American People.

 

Al Qaeda is nothing more than an extension of the apparatus linked to U.S. intelligence that was allowed, by script, to remove itself as a rogue breakaway entity of the U.S. government; allowed to de-compartmentalize from oversight, and was run instead by Gary Best’s rogue black ops specialists for scripted activity outside the U.S. government, with its funding being orchestrated through the Pakistani secret police—an entity of the U.S. government. – Tom Heneghan

Your kind Contributions are very much appreciated thank you.  –  Stew Webb

 




Radio Stew Webb Tom Heneghan Glenn Canady December 10 2017

Radio Stew Webb, Tom Henghan and Glenn Canady December 10 2017

I want to let everyone know the sound is being fixed.

 

Intel Briefing – Tom Heneghan, Stew Webb (12-10-17) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you.  –  Stew Webb

 




Radio Stew Webb Tom Heneghan Glenn Canady Happy Thanksgiving 2017

Above Hillary Clinton aka HildaBeast

Radio Stew Webb, Tom Heneghan and Glenn Canady

Intel UPDates

Happy Thanksgiving

Larry Mizel’s MDC Holding, Inc. Marine Raid on CIA Headquarters reveals Larry Mizel and Partner running Child Prostitution Ring.

Top Right Larry Mizel Ban Bail Out Scamster and AIPAC Director

Intel Update – Stew Webb, Tom Heneghan (11-23-17) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Larry Mizel Cyber attack against Stew Webb Whistle blower

Larry A. Mizel Organized Crime Boss Hog upper right

BiBi and Larry

Larry Mizel Cyber Terrorist left and Norman Brownstein right

Larry Mizel Cyber attack against Stew Webb Whistle blower

By Stew Webb
This is evidence gathered October 22, 2017 from Stew Webb Federal Whistle

website stewwebb.com is being attacked by Cyber Terrorists in Violations of my 1st Amendment Right to freedom of speech and a form of RICO.
I have over three years of evidence.
I will be posting the entire report proving over 6 million felonies under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.
I am aware that this attack most likely by the same Cyber Terrorists and these are many Military Installations, Private and Public Corporations and FBI all tied to Larry Mizel and George HW Bush Organized Crime Ring.

Larry Mizel Wide open west financial Cyber attack against Stew Webb Whistle blower
United States Schaumburg, United States visited http://www.stewwebb.com/2017/10/18/bush-clinton-homosexual-pedophile-sex-ring-totally-unmasked/
10/22/2017 1:43:17 PM (2 hours 45 mins ago) IP: 64.53.196.97 [unblock] Hostname: d53-64-97-196.nap.wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_0_3 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A432 Safari/604.1
64.53.196.97

IP address 64.53.196.97
Location Schaumburg, Illinois, United States

IP address 64.53.196.97
Reverse DNS (PTR record) d53-64-97-196.nap.wideopenwest.com
DNS server (NS record) dns1.wideopenwest.com (64.233.207.16)
dns2.wideopenwest.com (64.233.207.2)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.53.196.0/22
64.53.196.0 – 64.53.199.255

Domains around
64.53.196.177
nofunberg.com
. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is ns1.hover.com. The current IPv4 address is 64.53.196.177. The mail server with the highest priority is mx.hover.com.cust.hostedemail.com.
DNS server (NS records) ns1.hover.com (216.40.47.26)
ns2.hover.com (64.98.148.13)
Mail server (MX records) mx.hover.com.cust.hostedemail.com (216.40.42.4)
IP address (IPv4) 64.53.196.177

ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.53.196.0/22
64.53.196.0 – 64.53.199.255
S server (NS records) dns2.wideopenwest.com (64.233.207.2)
dns1.wideopenwest.com (64.233.207.16)
Mail server (MX records) mx.wowway.com (64.8.71.111)
IP address (IPv4) 64.233.207.78

ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.233.207.0/24
64.233.207.0 – 64.233.207.255

 

Domain Name: NOFUNBERG.COM
Domain ID: 1906313907_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.tucows.com
Registrar URL: http://tucowsdomains.com
Updated Date: 2017-02-28T10:06:39Z
Creation Date: 2015-03-01T10:27:55Z
Registrar Registration Expiration Date: 2018-03-01T10:27:55Z
Registrar: TUCOWS, INC.
Registrar IANA ID: 69
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: +1.4165350123
Reseller: Hover
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registry Registrant ID:
Registrant Name: Contact Privacy Inc. Customer 0139498153
Registrant Organization: Contact Privacy Inc. Customer 0139498153
Registrant Street: 96 Mowat Ave
Registrant City: Toronto
Registrant State/Province: ON
Registrant Postal Code: M6K 3M1
Registrant Country: CA
Registrant Phone: +1.4165385457
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Contact Privacy Inc. Customer 0139498153
Admin Organization: Contact Privacy Inc. Customer 0139498153
Admin Street: 96 Mowat Ave
Admin City: Toronto
Admin State/Province: ON
Admin Postal Code: M6K 3M1
Admin Country: CA
Admin Phone: +1.4165385457
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: Contact Privacy Inc. Customer 0139498153
Tech Organization: Contact Privacy Inc. Customer 0139498153
Tech Street: 96 Mowat Ave
Tech City: Toronto
Tech State/Province: ON
Tech Postal Code: M6K 3M1
Tech Country: CA
Tech Phone: +1.4165385457
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: removed email address
Name Server: NS1.HOVER.COM
Name Server: NS2.HOVER.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2017-02-28T10:06:39Z <<<

“For more information on Whois status codes, please visit https://icann.org/epp”

Registration Service Provider:
Hover, removed email address
+1.8667316556
https://help.hover.com

hover.com
v=spf1 ip4:216.40.44.0/24 ip4:216.40.42.17/32 include:support.zendesk.com include:servers.mcsv.net ?

DNS server (NS records) ns2.hover.com (64.98.148.13)
ns1.hover.com (216.40.47.26)
Mail server (MX records) mx.hover.com.cust.hostedemail.com (216.40.42.4)
IP address (IPv4) 64.99.80.28
IP address (IPv6)
ASN number 15348
ASN name (ISP) Tucows.com Co.
IP-range/subnet 64.99.80.0/24
64.99.80.0-64.99.80.255

contactprivacy.com

 

4.53.196.0 – 64.53.199.255
CIDR: 64.53.196.0/22
NetName: IL-NAPR
NetHandle: NET-64-53-196-0-1
Parent: WIDEOPENWEST-2BLK (NET-64-53-128-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C02132434)
RegDate: 2009-01-14
Updated: 2014-12-16
Comment: Address complaints to removed email address
Ref: https://whois.arin.net/rest/net/NET-64-53-196-0-1

 

CustName: Wide Open West
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2009-01-14
Updated: 2014-12-16
Ref: https://whois.arin.net/rest/customer/C02132434

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: removed email address
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

RTechHandle: IPADM669-ARIN
RTechName: IP Administrator
RTechPhone: +1-706-634-2898
RTechEmail: removed email address
RTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




City and County of Denver Cyber Terrorism against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower

City and County of Denver Cyber Terrorism against Stew Webb Whistle blower

Note the evidence was taken from a special software on stewwebb.com that detects mass attacks

against the website.

Is this one of Larry Mizel’s Cyber Terrorists?

The following IP Throttled stew webb.com 46 times in one day.

Throttling Site 46
67.133.97.98 United States US 46
Address lookup
lookup failed 67.133.97.98
Could not find a domain name corresponding to this IP address.
Domain Whois record

Don’t have a domain name for which to get a record
Network Whois record

Queried whois.arin.net with “n ! NET-67-133-97-96-1″…

NetRange: 67.133.97.96 – 67.133.97.103
CIDR: 67.133.97.96/29
NetName: Q1113-67-133-97-96
NetHandle: NET-67-133-97-96-1
Parent: QWEST-INET-11 (NET-67-128-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: City and County of Denver – Denver International Airport (CCDDIA)
RegDate: 2015-11-13
Updated: 2015-11-13
Ref: https://whois.arin.net/rest/net/NET-67-133-97-96-1

 

OrgName: City and County of Denver – Denver International Airport
OrgId: CCDDIA
Address: 8500 Pena Blvd
Address: AOB – Telecommunications
City: Denver
StateProv: CO
PostalCode: 80249-6205
Country: US
RegDate: 1993-10-13
Updated: 2012-07-16
Ref: https://whois.arin.net/rest/org/CCDDIA

 

OrgNOCHandle: ALESS3-ARIN
OrgNOCName: Alessandri, Brett
OrgNOCPhone: +1-303-342-4920
OrgNOCEmail: Brett.Alessandri@FlyDenver.com
OrgNOCRef: https://whois.arin.net/rest/poc/ALESS3-ARIN

OrgAbuseHandle: ALESS3-ARIN
OrgAbuseName: Alessandri, Brett
OrgAbusePhone: +1-303-342-4920
OrgAbuseEmail: Brett.Alessandri@FlyDenver.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ALESS3-ARIN

OrgTechHandle: ALESS3-ARIN
OrgTechName: Alessandri, Brett
OrgTechPhone: +1-303-342-4920
OrgTechEmail: Brett.Alessandri@FlyDenver.com
OrgTechRef: https://whois.arin.net/rest/poc/ALESS3-ARIN

DNS records

DNS query for 98.97.133.67.in-addr.arpa returned an error from the server: NameError

No records to display
Traceroute

Tracing route to 67.133.97.98 [67.133.97.98]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 outbound.hexillion.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 1 0 157.238.224.229 ae-11.a00.dllstx04.us.bb.gin.ntt.net
5 0 0 1 129.250.4.201 ae-10.r11.dllstx09.us.bb.gin.ntt.net
6 24 4 3 129.250.66.74 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 20 19 19 65.158.179.190
9 * * *
10 * * *
11 * * *
12 * * *

Trace aborted

— end —
@@@@@@@
FlyDenver.com
Address lookup
canonical name flydenver.com.
aliases
addresses 64.15.186.157
Domain Whois record

Queried whois.internic.net with “dom FlyDenver.com”…

Domain Name: FLYDENVER.COM
Registry Domain ID: 1859304_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2015-03-13T03:08:39Z
Creation Date: 1998-08-27T04:00:00Z
Registry Expiry Date: 2019-08-26T04:00:00Z
Registrar: Network Solutions, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8003337680
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Name Server: A1.VERISIGNDNS.COM
Name Server: A2.VERISIGNDNS.COM
Name Server: A3.VERISIGNDNS.COM
Name Server: RESOLVER02.FLYDENVER.COM
DNSSEC: unsigned
URL of the ICANN Whois Inaccuracy Complaint Form: https://www.icann.org/wicf/
>>> Last update of whois database: 2017-09-16T23:18:34Z <<<

Queried whois.networksolutions.com with “FlyDenver.com”…

Domain Name: FLYDENVER.COM
Registry Domain ID: 1859304_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://www.networksolutions.com
Updated Date: 2017-03-05T15:59:58Z
Creation Date: 1998-08-27T04:00:00Z
Registrar Registration Expiration Date: 2019-08-26T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8003337680
Reseller:
Domain Status:
Registry Registrant ID:
Registrant Name: Denver International Airport
Registrant Organization: Denver International Airport
Registrant Street: 8500 PENA BLVD
Registrant City: DENVER
Registrant State/Province: CO
Registrant Postal Code: 80249-6205
Registrant Country: US
Registrant Phone: +1.3033422012
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: craig.curtis@flydenver.com
Registry Admin ID:
Admin Name: Curtis, Craig
Admin Organization: Denver International Airport, City of Denver
Admin Street: 8500 Pena Blvd
Admin City: Denver
Admin State/Province: CO
Admin Postal Code: 80249
Admin Country: US
Admin Phone: +1.3033422012
Admin Phone Ext:
Admin Fax: +1.3033422093
Admin Fax Ext:
Admin Email: craig.curtis@flydenver.com
Registry Tech ID:
Tech Name: Curtis, Craig
Tech Organization: Denver International Airport, City of Denver
Tech Street: 8500 Pena Blvd
Tech City: Denver
Tech State/Province: CO
Tech Postal Code: 80249
Tech Country: US
Tech Phone: +1.3033422012
Tech Phone Ext:
Tech Fax: +1.3033422093
Tech Fax Ext:
Tech Email: craig.curtis@flydenver.com
Name Server: A1.VERISIGNDNS.COM
Name Server: A2.VERISIGNDNS.COM
Name Server: A3.VERISIGNDNS.COM
Name Server: RESOLVER02.FLYDENVER.COM
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2017-09-16T23:18:40Z <<<

Network Whois record

Queried whois.arin.net with “n ! NET-64-15-184-0-1″…

NetRange: 64.15.184.0 – 64.15.191.255
CIDR: 64.15.184.0/21
NetName: SAVV-CTL-TIER3-CLOUD-3
NetHandle: NET-64-15-184-0-1
Parent: SAVVIS (NET-64-15-160-0-1)
NetType: Reallocated
OriginAS:
Organization: Centurylink Technology (CT-931)
RegDate: 2016-10-04
Updated: 2016-10-04
Ref: https://whois.arin.net/rest/net/NET-64-15-184-0-1

 

OrgName: Centurylink Technology
OrgId: CT-931
Address: 1 Solutions Pkwy
City: Town and Country
StateProv: MO
PostalCode: 63017
Country: US
RegDate: 2016-10-04
Updated: 2016-10-04
Ref: https://whois.arin.net/rest/org/CT-931

 

OrgTechHandle: CUSTO1453-ARIN
OrgTechName: Customer Care
OrgTechPhone: +1-314-786-3424
OrgTechEmail: noc@ctl.io
OrgTechRef: https://whois.arin.net/rest/poc/CUSTO1453-ARIN

OrgAbuseHandle: CUSTO1453-ARIN
OrgAbuseName: Customer Care
OrgAbusePhone: +1-314-786-3424
OrgAbuseEmail: noc@ctl.io
OrgAbuseRef: https://whois.arin.net/rest/poc/CUSTO1453-ARIN

DNS records

DNS query for 157.186.15.64.in-addr.arpa returned an error from the server: NameError
name class type data time to live
flydenver.com IN SOA
server: resolver02.flydenver.com
email: hostmaster@flydenver.com
serial: 2017091305
refresh: 3600
retry: 900
expire: 2419200
minimum ttl: 3600
3600s (01:00:00)
flydenver.com IN NS resolver02.flydenver.com 3600s (01:00:00)
flydenver.com IN NS a2.verisigndns.com 3600s (01:00:00)
flydenver.com IN NS a3.verisigndns.com 3600s (01:00:00)
flydenver.com IN NS a1.verisigndns.com 3600s (01:00:00)
flydenver.com IN A 64.15.186.157 3600s (01:00:00)
flydenver.com IN MX
preference: 10
exchange: mta01.flydenver.com
3600s (01:00:00)
flydenver.com IN MX
preference: 10
exchange: mta02.flydenver.com
3600s (01:00:00)
flydenver.com IN TXT MS=ms35977617 3600s (01:00:00)
flydenver.com IN TXT MS=ms19886839 3600s (01:00:00)
Traceroute

Tracing route to flydenver.com [64.15.186.157]…
hop rtt rtt rtt ip address fully qualified domain name
1 2 1 0 208.101.16.73 outbound.hexillion.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.212 ae6.bbr02.eq01.dal03.networklayer.com
4 0 1 0 157.238.224.229 ae-11.a00.dllstx04.us.bb.gin.ntt.net
5 0 0 1 129.250.4.201 ae-10.r11.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.74 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 0 0 0 63.235.40.202 63-235-40-202.dia.static.qwest.net
9 41 43 43 204.70.200.170 cr1-tengig0-7-5-0.dallas.savvis.net
10 45 43 44 204.70.192.86
11 43 44 49 204.70.197.30 cr1-bundle-pos-1.sanfrancisco.savvis.net
12 41 41 41 204.70.207.34 er1-te8-0-1.svl.savvis.net
13 40 40 40 204.70.207.29 hr2-xe-8-3-3.sc5.savvis.net
14 41 41 40 204.70.200.226 hr2-xe-8-0-0.santaclarasc8.savvis.net
15 41 41 41 205.140.209.254 das1-v3056.sc8.savvis.net
16 41 41 41 64.15.180.34
17 41 41 41 64.15.180.20
18 48 42 44 64.15.186.157

Trace complete

— end —

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Letter to Attorney General Jeff Sessions from Whistle blowers

Letter to Attorney General Jeff Sessions from Whistle blowers

Stew Webb and Tom Heneghan

Updated April 21, 2018

 

 

 

Letter-to-Attorney-General-Jeff-Session-From-Federal-Whistleblowers by stewwebb1 on Scribd

 

 

Letter to President Trump 2017-02-23 from Whistle blowers

Stew Webb and Tom Heneghan

 

Letter-to-President-Trump-2017-02-23-From-Whistleblowers by stewwebb1 on Scribd

 

 

Related:

Updated April 21, 2018

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism
http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-prosecute-cyber-terrorism/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018
http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

President Trump Stop NSA NAZI Espionage
http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

Letter to Attorney General Jeff Sessions from Whistle blowers
https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

Stew Webb Whistle blower sues US Government Assassins P1of2
http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/

Stew Webb Grand Jury Demands
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

 

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




George W Bush Fraud Dallas November 22 1963 Picture

By Tom Heneghan and Stew Webb

George W Bush Fraud Dallas November 22 1963 Picture

George W. Bush in Dealey Plaza November 22, 1963 minutes after the murder of President John F. Kennedy. George H W Bush in the picture below six minutes after President Kennedy was murdered standing in front of the Book Depository.

 

 

 

 

 

 

 

 

 

 

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 

 

 




Stew Webb Hit With Energy Weapon! Tom Heneghan Poisoned!

Friday Feb 17 2017 Two Federal Whistle blowers Stew Webb Hit With Energy Weapon! Tom Heneghan Poisoned!

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Spot Dog is Rabbit and Enraged

Spot Dog Spot Dog is Rabbit and Enraged, Drain the Swamp and Lock them Up.

President Donald Trump American Revolution Continues

 

Billy Joel’s official YouTube channel features music videos,
live performances, interviews, TV appearances and more.
Best known for his first hit song, ‘Piano Man’, in 1973,
Billy has written and recorded thirty-three Top 40 hits in the
United States. He is a six-time Grammy Award winner, a 23-time Grammy nominee and one of the world’s best-selling artists of all time, having sold over 150 million records worldwide. Billy Joel is the sixth-best-selling recording artist and the third-best-selling solo artist in the United States.

Lyrics:
You have to learn to pace yourself
Pressure
You’re just like everybody else
Pressure
You’ve only had to run so far
So good
But you will come to a place
Where the only thing you feel
Are loaded guns in your face
And you’ll have to deal with
Pressure

You used to call me paranoid
Pressure
But even you cannot avoid
Pressure
You turned the tap dance into your crusade
Now here you are with your faith
And your Peter Pan advice
You have no scars on your face
And you cannot handle
Pressure

Contributions are very much appreciated thank you-Stew Webb

 

 




Grand Orient Freemasons and Skull and Bones Head Toward Final Showdown

George HW Bush Dallas Texas November 22 1963

By Tom Heneghan, International Intelligence Expert

UNITED States of America   –   It can now be reported that the patriotic U.S. Military Flag Officers lead by General Michael Flynn and his Grand Orient Freemason allies are now in possession of the Dallas Police report that documents the arrest and interrogation of then U.S. CIA agent George Herbert Walker Bush aka daddy Bush on November 22, 1963, ten minutes after the assassination of President John F. Kennedy.

George Herbert Walker Bush was arrested after trying to flee the Texas School Book Depository immediately after the HIGH TREASON assassination of our 35th President.

This document has resurrected after being placed in a secret CIA-Washington Post safety deposit box by the U.S. Senator Frank Church (D-ID) administered intelligence committee that was investigating CIA crimes against the American People in the mid 1970s.

 

Hillary Clinton Watergate Lawyer Fired from Watergate Committee

We can now divulge that it was corrupt Watergate attorney and CIA asset Hillary Rodham Clinton that placed daddy Bush’s arrest record in the CIA-Washington Post safety deposit box for safe keeping and for future use in political blackmail to enhance Bill and Hillary’s political future

We can now report that it was Hillary Clinton that turned over her copy of George Herbert Walker Bush’s 1963 arrest record to the U.S. Military Flag Officers.

Hillary has also turned over decoded NSA and CIA electronic algorithms to former Vice President Albert Gore Jr. (now year 2000 DULY ELECTED President Albert Gore Jr. of Carthage, Tennessee) clearly proving that Gore won the 2000 presidential election with over six (6) million popular votes and 330 electoral college votes.

Reference: The ViaSat and CNN and CBS hacking of the Voters News Service in Hamilton County, Tennessee at 8:00 p.m. CST election night 2000.

The split and warfare between the Bushes and Clinton’s began on election night 2016 when daddy Bush and Larry Mizel of Denver, Colorado were unable to steal the year 2016 election for Hillary as they had done for junior Bush FRAUD (George W. Bush) in the year 2000.

Hillary flew into a rage election night 2016 and claimed daddy Bush had double-crossed her when, in truth, the CIA, NSA and ViaSat.com  could only steal five (5) states for Hillary as they had stolen five (5) states in 2000 for junior Bush FRAUD but were unable to steal ten (10) states which were required for Hillary to reach the magic number of 270 electoral college votes.

Note: The algorithms aka undefined variables went hybrid basically ending the attempt at a second U.S. election coup in 16 years.

P.S. The current CIA Russian hacking story is a total diversion by the corporate U.S. CIA controlled Cointelpro disinformation propaganda media filth as to cover up the intelligence and vital information we have just alerted you to above.

Current U.S. House Speaker Paul Ryan and Democratic minority leader Nancy Pelosi are covering up and trying to classify this intelligence but it won’t work.

Their attempt to hide the truth from the American People is, in itself, a crime of HIGH TREASON against the American People and their Constitution.

John Kennedy Jr Murdered by Hillary Clinton

New evidence has also surfaced tying junior George W. Bush FRAUD,

George W Bush Fraud

along with Bill and Hillary Clinton, to the assassination of John F. Kennedy Jr. on July 16, 1999 and within a short period of time after the assassination of John F. Kennedy Jr. the attempt to assassinate then Vice President Albert Gore Jr. of Carthage, Tennessee over the skies of Chicago in July of 1999 reference electronic vectoring of his Air Force Two aircraft.

Vice President Albert Gore Jr Airforce Two

The plot was simple: Kill John F. Kennedy Jr, kill Al Gore and clear the field for CIA asset Hillary’s New York U.S. Senatorial race in the year 2000 and clear the field for junior George W. Bush in the year 2000 presidential election.

In closing, we can now divulge that U.S. Treasury agents and the U.S. Military Flag Officers have absolute proof that current U.S. alleged p Resident, FOREIGN born, Barack Hussein Obama, Barry Satero, U.S. Vice President Joseph Biden, U.S. Secretary of State John ‘Skull and Bones’ Kerry, as well as the Bush – Mizel – Clinton Crime Family Syndicate have been receiving bribes and commissions from crooked CIA proprietary accounts that represent STOLEN U.S. Treasury funds tied to the Wanta – Reagan – Mitterrand Protocols in the amount of $15 TRILLION.

This involves Chinese based Hampton Lampoon and noted Bush-Clinton Crime Family Syndicate money laundry Black Eagle Trust.

These funds have now been frozen by the International Monetary Fund (IMF).

Again, folks, stay tuned.

End Game is Now!

President John F Kennedy, A Revolution is coming.

Expect the Unexpected.

JFK  Jr Unbelievable Cover-Up Documentary

John Fitzgerald Kennedy Jr. (November 25, 1960 – July 16, 1999), often referred to as JFK Jr. or John-John in the press, was an American lawyer, journalist.

 

Stew Webb

 




Stew Webb and Tom Heneghan January 2 2017 Radio

President Donald Trump Drain the Swamp

Hillary Clinton Lock Her Up

Keep Tweeting President Donald J. Trump

 




Who Controls Senator John McCain Larry Mizel Organized Crime Boss Hog

Senator John McCain Wife Hiding War Profits
http://www.stewwebb.com/2013/08/15/john-mccains-wife-hiding-war-profits-untaxed-off-shore-accounts

Larry Mizel Organized Crime Boss Hog and Illuminati Baby Killer

Senator Charles Schumer Blacmailed by Larry Mizel Organized Crime Boss Hog
Boulder Properties Blackmail of Congress and Senate reason for recall
http://www.stewwebb.com/2013/05/25/the-blackmail-of-us-congress-and-senate-reason-for-recall

Bush – Millman – Mizel – Clinton Zionist Organized Crime Family Flow Chart (1)

http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1/

Leonard Millman and George HW Bush Narcotics Money Laundering
http://www.stewwebb.com/2015/01/07/leonard-millman-and-george-hw-bush-narcotics-money-laundering/

Illuminati Human Sacrifice June 20-21 Denver Colorado
http://www.stewwebb.com/2015/06/21/illuminati-human-sacrifice-june-20-21-denver-colorado

Whistle blowers by Sarah McClendon 1991
http://www.stewwebb.com/Washington-Webb1_JPG.htm

Stew Webb Saving and Loan whistle blower faces federal charges (Illegal Charges dismissed with Prejudice)
http://www.stewwebb.com/2013/10/08/sl-whistleblower-faces-federal-charges

Stew Webb Whistle blower Grand Jury Demand against Larry Mizel Hillary Clinton and Jeb Bush
http://www.stewwebb.com/2015/01/05/stew-webb-grand-jury-demand-kerre-millman-attempted-murder

Kerre Millman Denver’s Illuminati Princess Manipulator Liar Attempted Murderer Stew Webb’s Ex-Witch-Doctor
http://www.stewwebb.com/2015/01/06/kerre-millman-denvers-illuminati-princess-manipulator-liar-attempted-murderer

Who is America’s Moriarity? The Illuminati Zionist Denver Connection
http://www.stewwebb.com/2013/08/15/who-is-americas-moriarity-the-illuminati-zionist-denver-connection

Stew Webb Whistle blower Complaint for Injunctive Relief
Obstructed without hearing
http://www.stewwebb.com/COMPLAINT_FOR_INJUNCTIVE_RELIEF_20120905.htm

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud
http://www.stewwebb.com/2013/10/07/stew-webb-official-sec-whistleblower-complaint-mortgage-backed-securities-fraud
Inside the Bush Crime Family PT-2
http://www.stewwebb.com/Inside_The_Bush_Crime_Family_Part2_07112011.htm

Inside the Bush Crime Family PT-1
http://www.stewwebb.com/Inside_The_Bush_Crime_Family_Part1_07112011.htm

FRAUDS ARE US AT MDC-NYSE
http://www.stewwebb.com/2013/08/17/frauds-are-us-at-mdc-nyse-the-denver-illuminati-zionist-connection

From Cradle to Cabal The Secret Life of Gale Norton
http://www.stewwebb.com/2013/08/12/from-cradle-to-cabal-the-secret-life-of-gale-norton-the-denver-illuminati-zionist-connection

How the West lands Was Won Larry Mizel and Norman Brownstein both AIPAC Directors California Water Frauds
http://www.stewwebb.com/2015/08/27/how-the-west-lands-was-won

BCCI Bank of Credit and Commerce International Frauds Timeline
http://www.stewwebb.com/2015/01/05/bcci-bank-of-credit-and-commerce-international-frauds-timeline

Illuminati Drug Smugglers Indicted by Costa Rica Government
http://www.stewwebb.com/2013/10/31/illuminati-drug-smugglers-indicted-by-costa-rica-government

Junk Bond Daisy Chain Frauds The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/11/junk-bond-daisy-chain-frauds-the-denver-illuminati-zionist-connection

George W. Bush AIG Harken Energy Winn Financial Denver
http://www.stewwebb.com/2016/02/11/george-w-bush-aig-harken-energy-winn-financial-denver

AIPAC Operated Congress Child Sex Blackmail Ring
http://www.stewwebb.com/2014/02/03/aipac-and-abramoff-operated-child-sex-blackmail-ring

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

Hillary Clinton Bush Assassination Teams Revealed
http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails

Jeb Bush Murders Securities Frauds Scams
http://www.stewwebb.com/2016/02/13/jeb-bush-frauds-and-scams

FBI Whistle blower Jeb Bush Drug Lord
http://www.stewwebb.com/2014/02/22/fbi-whistleblower-darlene-novenger-exposed-george-hw-bushs-drug-usage

US Attorneys Murders tied to Jeb Bush
http://www.stewwebb.com/2014/10/03/federal-judges-coverup-u-s-attorneys-deaths-tied-jeb-bush-part1

Bush Clinton Body Count from Iran Contra
http://www.stewwebb.com/2013/10/23/bush-clinton-body-count-from-iran-contra

Daddy Bush Illuminati Wizard of OZ
http://www.stewwebb.com/tag/daddy-bush-the-illuminati-wizard-of-oz

John Lear CIA PILOT Whistle blower UFO’s Aliens are Real
http://www.stewwebb.com/2013/06/09/john-lear-stew-webb-ufos-aliens-911-secret-space-program

FBI Raid Satanic Human Sacrifice Video
http://www.stewwebb.com/2013/09/01/satanic-human-sacrifice-video

American Christians duped by Political Zionism
http://www.stewwebb.com/2013/05/21/american-christians-duped-by-political-zionism

 

 




Larry Mizel Israel Cyber Terrorism against Stew Webb Whistle blower 18 USC 1010-1015

Larry Mizel owns the Federal Reserve and HSBC Bank and Director AIPAC and known Denver Illuminati Baby Killer.

Larry Mizel Israel Cyber Terrorism against Stew Webb Whistle blower 18 USC 1010-1015
and Various Cyber Terrorism US Laws.

Note: The Attempted login

Israel Israel visited http://www.stewwebb.com/2015/12/19/if-you-are-blocked-due-to-cyber-attacks/
12/27/2016 2:13:41 PM (22 minutes ago) IP: 79.182.189.80 [unblock] [unblock this range] Hostname: bzq -79-182-189-80.red.   bezeqint.    net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Unblock this IP Unblock this range Block this network Run WHOIS on 79.182.189.80 See recent traffic
Israel Israel was blocked access via country blocking and redirected to URL (http://www.stewwebb.com/2015/12/19/if-you-are-blocked-due-to-cyber-attacks/) at http://www.stewwebb.com/wp-login.php
12/27/2016 2:13:40 PM (22 minutes ago) IP: 79.182.189.80 [unblock] [unblock this range] Hostname: bzq –    79-182-189-80.red.     bezeqint.    net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Unblock this IP Unblock this range Block this network Run WHOIS on 79.182.189.80 See recent traffic
Israel Israel visited http://www.stewwebb.com/2015/12/19/if-you-are-blocked-due-to-cyber-attacks/
12/27/2016 2:13:36 PM (22 minutes ago) IP: 79.182.189.80 [unblock] [unblock this range] Hostname: bzq –      79-182-189-80.red.      bezeqint.       net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Unblock this IP Unblock this range Block this network Run WHOIS on 79.182.189.80 See recent traffic
Israel Israel was blocked access via country blocking and redirected to URL (http://www.stewwebb.com/2015/12/19/if-you-are-blocked-due-to-cyber-attacks/) at http://www.stewwebb.com/wp-login.php
12/27/2016 2:13:35 PM (22 minutes ago) IP: 79.182.189.80 [unblock] [unblock this range] Hostname: bzq –    79-182-189-80.red.      bezeqint.     net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Unblock this IP Unblock this range Block this network Run WHOIS on 79.182.189.80 See recent traffic
Ukraine Lviv, Ukraine was blocked by Wordfence Security Network at http://www.stewwebb.com/wp-login.php
12/27/2016 2:13:33 PM (22 minutes ago) IP: 178.137.83.84 [unblock] [unblock this range] Hostname: 178-137-83-84-broadband. kyivstar. net
Browser: undefined
Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0
Unblock this IP Unblock this range Block this network Run WHOIS on 178.137.83.84 See recent traffic
Ukraine Lviv, Ukraine was blocked by Wordfence Security Network at http://www.stewwebb.com/wp-login.php
12/27/2016 2:13:32 PM (22 minutes ago) IP: 178.137.83.84 [unblock] [unblock this range] Hostname:       178-137-83-84-broadband.     .      net
Browser: undefined
Mozilla/5.0 (Windows NT 5.1; rv:29.0) Gecko/20100101 Firefox/29.0
Unblock this IP Unblock this range Block this network Run WHOIS on 178.137.83.84 See recent traffic
Israel Israel visited http://www.stewwebb.com/2015/12/19/if-you-are-blocked-due-to-cyber-attacks/
12/27/2016 2:13:32 PM (22 minutes ago) IP: 79.182.189.80 [unblock] [unblock this range] Hostname: bzq –      79-182-189-80.red.        bezeqint.       net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Unblock this IP Unblock this range Block this network Run WHOIS on 79.182.189.80 See recent traffic
Israel Israel was blocked access via country blocking and redirected to URL (http://www.stewwebb.com/2015/12/19/if-you-are-blocked-due-to-cyber-attacks/) at http://www.stewwebb.com/xmlrpc.php
12/27/2016 2:13:31 PM (22 minutes ago) IP: 79.182.189.80 [unblock] [unblock this range] Hostname: bzq-        79-182-189-80.red      .bezeqint.      net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Unblock this IP Unblock this range Block this network Run WHOIS on 79.182.189.80 See recent traffic

 

Larry Mizel side kicks:

Obama admits US trains ISIS July 2015 and Israel is healing the ISIS and ISIL wounded in Israel Hospitals.

 

 




flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

FBI Raids Satanic Human Sacrifice Video

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism April 18 2010

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Please email or twitter to President Trump


Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton’s Assassins. There were two more crashes and attempts one year later.
Contributions are much appreciated Thank You.– Stew Webb

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.






Archives


Stew Webb 34 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”