Blog Archives

Clinton Pedophile Scandal Exposed with the U S Republic on the Brink!

hillary-clinton-pedaphilia-scandal

By Tom Heneghan, International Intelligence Expert

It can now be reported that the patriotic U.S. Military Flag Officers have identified a plot by the state of Israel, the Department of Homeland Security (DHS), the U.S. CIA, as well as CNN cable news network and NBC General Electric, to attack the U.S. electronic grid reference U.S. internet services tomorrow, Monday, November 7th, in order to set the ground work for the THEFT of the U.S. 2016 presidential election with the benefactor being Nazi lesbian Bush – CIA Crime Family stooge Hillary Rodham Clinton.

The Israeli code for this operation is called “BISAT”.

At this hour, the U.S. Military Flag Officers and U.S. Treasury officials have absolute proof that over $100 TRILLION of U.S. Treasury funds were laundered aka STOLEN by secret illegal CIA offshore proprietary accounts tied to the Bush-Clinton Crime Family Syndicate with the assistance of none other than CNN cable news network and NBC General Electric.

We can also report that the U.S. Military Flag Officers are now in full possession of photographs, along with other ‘smoking gun’ evidence, detailing a massive Clinton Foundation financed pedophile ring, which involves both Clintons, current alleged U.S. President, FOREIGN BORN, closet Muslim Barack Hussein Obama-Soetoro, as well as former year 2000 illegal White House occupant junior George W. Bush FRAUD.

Note: Over half of the U.S. Congress as well as over 50% of the extortion-friendly, corporate U.S. media elite (modern day royal court messengers) have been linked to the John Podesta – Clinton pedophile ring, including current Daily Beast and former Newsweek magazine journalist Eleanor Clift.

Larry-Mizel-NYSE-MDC Larry Mizel HSBC Bank Dick

P.S. The patriotic U.S. Military Flag Officers have also fingered current alleged U.S. President Barack Obama as a major enabler of the Bush-Clinton-CIA crime spree, which has now lasted over 30 years, including Obama continuing the illegal, UN-Constitutional spying against the American People, along with illegal bribes for his future presidential library given to him by crooked bank Bush – Clinton financier Larry Mizel of Denver, Colorado.

We can also report that in the last twenty-four hours, with the help of the NYPD, the U.S. Military Flag Officers have financial evidence linking Hillary Rodham Clinton to paying a $20 million bribe to then president-elect Barack Obama in late 2008 to be appointed U.S. Secretary of State.

Note: Mexican financier and drug trafficker Carlos Slim and current NBC General Electric journalist Andrea Mitchell operated as bag man and bag lady.

P.P.S. The U.S. Military Flag Officers, along with U.S. Treasury officials, have evidence of financial TREASON linking junior George W. Bush FRAUD, along with Democratic Party minority leader Nancy Pelosi, to a fraudulent treasonous 2008 bank “BAIL OUT” using U.S. Taxpayers’ money as well as the Social Security Trust Fund with the major benefactors being crooked worldwide banks and specifically Larry Mizel of HSBC in Englewood, Colorado and Lloyd Blankfein of the then brokerage firm Goldman Sachs who benefited from his brokerage firm being turned into a bank by junior George W. BushFRAUD’s Treasury Secretary Henry (Hank) Paulson, which allowed Goldman Sachs to get a “BAIL OUT” from the U.S. Taxpayers.

The U.S. Military Flag Officers also have total proof that junior George W. Bush FRAUD’s war in Iraq was based on lies, illegal and UN-Constitutional, and that the 9/11 junior George W. Bush FRAUD’s 9/11 BLACK OP attack on the American People was an inside job and an extension of the year 2000 electoral coup d’état, which allowed George W. Bush FRAUD to illegally take power in the United States without the consent of the American People and then with the events of 9/11 declare “Martial Law” on American soil using the UN-Constitutional Patriot Act similar to Adolf Hitler’s Nazi German 1933 “Enabling Act”.

As reported in previous intelligence briefings:

EXPECT THE UNEXPECTED!

Related:

BREAKING! HILLARY CLINTON PEDOPHILE RING INVESTIGATION LATEST!

http://victuruslibertas.com

Obama is getting furious at Loretta Lynch, as the scandal threatens to drown his “legacy”!

Our FBI insider told us if the full scope of the horrors are exposed, the American and British Governments would “fold like cheap lawn-chairs.”

FBI Anon also told us “Hillary has lost all her power. Even if she wins, she will be indicted.” This is the final straw that broke the camel’s back. What comes next is a potent mixture of treason, espionage and pedophilia.

Cicada 3301 has a program called CAKES – it has a new name and the platform is being used by Intel and law enforcement to report their corrupt superiors. FBI is working with WikiLeaks, as is the NYPD.

We are all working together to free our nation from this stranglehold of sin, deception and oppression.

There is a lot to digest here, I know, but we are all one family now. WikiLeaks, FBI, decent police, and everyday Americans.

Let’s support the FBI agents, NYPD officers and other whistle blowers, who are heroes to bring this stuff out. They deserve our support. In 100 years, we may look back and build shrines and statues to these patriots.

Read more

http://victuruslibertas.com/2016/11/breaking-hillary-clinton-pedophile-ring-investigation-latest/

New Developments In Clinton Pedaphilia Scandal – New Players Involved

http://victuruslibertas.com

“FOR OUR STRUGGLE IS NOT AGAINST FLESH AND BLOOD, BUT AGAINST THE RULERS, AGAINST THE POWERS, AGAINST THE WORLD FORCES OF THIS DARKNESS, AGAINST THE SPIRITUAL FORCES OF WICKEDNESS IN THE HEAVENLY PLACES.”

The Weiner/Clinton scandal is growing to involve Dershowitz

The NYPD is now leaking information rapidly. We are learning that there is a strong possibility that Huma is a spy and was engaged in espionage for Saudi Arabia. And even bigger than that- Weiner may have been selling the same content to Israel, so they could blackmail Hillary, and many other Government officials in the State Department.

We are learning Hillary was an active participant in a pedophile ring that included Weiner, Bill Clinton, and Prince Andrew, as well as a ton of other deviants. One source tells us that Jeffery Epstein and Anthony Wiener were both leaking top secret information to Israeli spies, so Israel could dictate how much money they wanted to shake down America for!

The scandal is now pulling in powerful zionist lawyer, Alan Dershowitz. NYPD has found communication between Alan Dershowitz and Weiner. Newly obtained flight logs place Dershowitz on Epstein’s Lolita Express along with the Clintons going to Pedophile Island many times.

Epstein pleaded guilty in 2008, in Florida to one count of soliciting underage girls for sex (and one count of adult solicitation), for which he served just over a year in county jail. But sprawling local, state, and federal investigations into the eccentric investor’s habit of paying teen girls for “massages”—sessions during which he would allegedly penetrate girls with sex toys, demand to be masturbated, and have intercourse—turned up a massive network of victims, including 35 female minors whom federal prosecutors believed he’d sexually abused. He has reportedly settled lawsuits from more than 30 “Jane Doe” victims since 2008; the youngest alleged victim was 12 years old at the time of her abuse, according to Gawker.com.

Dershowitz told the American Lawyer, he is loyal to his wife, and she is always by his side: “I’ve been married to the same woman for 28 years. She goes with me everywhere. People know that I won’t argue a case or give a speech unless my wife travels with me. This is not the profile of someone who screws around.”

But according to the flight logs, Dershowitz accompanied Epstein on a flight from Palm Beach to New Jersey’s Teterboro Airport in December 1997. On that flight, the pair was accompanied by a number of people, including one unidentified “female,” someone referred to as “Hazel,” another female named “Claire,” and Maxwell.

The logs also show Dershowitz on a flight with Epstein from Bedford, Mass., to Teterboro in October 1998, and a flight from Teterboro to Martha’s Vineyard in 1999. And a 2005 trip from Massachusetts to Montreal shows him traveling with Epstein, someone listed as “Tatianna,” and others.

One things the logs don’t show is Dershowitz’s wife traveling with him. Dershowitz still emphatically denies all claims in spite of the flight logs.

Other Visitors To Epstein’s “Sex Slave Island”

The following, is information from our inside sources. The list below is a short list of high profile players who have reportedly visited “Sex Slave Island” with Epstein:

Ehud Barak, the former Prime Minister of Israel (1999-2001). Former Israeli Minister of Defense and also deputy Israeli prime minister under Binyamin Netanyahu from 2009 to 2013.

Prince Andrew– British royalty – Jeffrey Epstein and his girlfriend, Ghislaine Maxwell, pandered Epstein sex slave- Virginia Roberts, to Prince Andrew multiple times. The victim girls say Prince Andrew was very sexually sadistic; they despised this “sick, twisted creature”.

Kevin Spacey– actor in House of Cards. Spacey is very good friends with 2 big-time pedophiles: Jeffrey Epstein and Bill Clinton. And of course, as discussed above…

Alan Dershowitz– longtime friend of Epstein, as well as one of his defense lawyers. Dershowitz was the one who negociated that aburd plea bargain for Epstein that gave him a 13 months (served) sentence and a 16 hour/day day pass so he could spend most of his time in his mansion.  Epstein sex slave, Virginia Roberts, has said that Epstein made her have sex with Dershowitz numerous times.  Virginia Roberts also claims Dershowitz witnessed Epstein’s pedophilic activities.

Alan Dershowitz is a main focus. He is Epstein’s lawyer and there is currently a big movement to have him re-investigated, according to our inside sources.

RICO Investigation in Full Swing

Comey has a RICO investigation in full swing, and according to FBI insiders, the phones of Podesta, Mills, and many other politicians have been tapped since last Thursday. Even some State Department folks now have tapped electronics, as well as CNN/NBC reporters.

This all has to do with a massive RICO investigation into HRC, Clinton Foundation and collusion from media.

RICO, According to the Legal Encyclopedia: Passed in 1970, the Racketeer Influenced and Corrupt Organizations Act (RICO) is a federal law designed to combat organized crime in the United States. It allows prosecution and civil penalties for racketeering activity performed as part of an ongoing criminal enterprise. Such activity may include illegal gambling, bribery, kidnapping, murder, money laundering, counterfeiting, embezzlement, drug trafficking, slavery, and a host of other unsavory business practices.

The FBI consider co-conspirators in cases such as this, as “spokes” in a wheel. They have over 80 “spokes” under investigation, regarding this case- and that includes their emails, texts, phone calls, etc. Each reporter, DNC operator and supporter is a potential “spoke” in this wheel of conspiracy.

We are being told this investigation will result in many arrests of high profile individuals. Obama is trying to set up a pardon for Hillary, but that will not be possible with RICO act, and actually will include Obama, from what our insiders are telling us.

According to our inside sources, some of the people under investigation, and who’s communications are being tapped include:

Alan Dershowitz

Donna Brazile

Debbie Wasserman Schultz

John Podesta

Terry Mcauliffe

Gloria Borger

Wolf Blitzer

Chris Cuomo

Chuck Todd

5 reporters from the NY Times

Sally Kohn

George Soros

U.S. Senator John McCain

FBI Raided Democratic Headquarters

This further supports that the DNC is now involved in this investigation, as well:

Read More

http://victuruslibertas.com/2016/11/new-developments-in-clinton-pedaphilia-scandal-new-players-involved

Stay tuned

Expect the UnExpected

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com
Radio Archives

Stew Webb Radio Archives




Larry Mizel’s Power Financial Reports 2016 Second Quarter

All figures are in Canadian dollars unless otherwise noted. Readers are referred to the sections entitled “Non-IFRS Financial Measures” and “Forward-Looking Statements” at the end of this release.

TORONTO, Aug. 5, 2016 /CNW Telbec/ – Power Financial Corporation (TSX: PWF) today reported earnings results for the second quarter and six months ended June 30, 2016.

SECOND QUARTER RESULTS
Operating earnings attributable to common shareholders (a non-IFRS financial measure) for the quarter ended June 30, 2016 were $557 million or $0.78 per share, compared with $559 million or $0.79 per share in 2015.

Non-operating items, not included in operating earnings, were a charge of $52 million comprised of the Corporation’s share of Groupe Bruxelles Lambert’s (GBL) non-cash impairment charge as a result of a further decline in LafargeHolcim Ltd’s share price. In 2015, non-operating items represented a net contribution of $57 million.

Net earnings attributable to common shareholders were $505 million or $0.71 per share, compared with $616 million or $0.87 per share in 2015.

SIX-MONTH RESULTS
Operating earnings attributable to common shareholders for the six months ended June 30, 2016 were $1,033 million or $1.45 per share, compared with $1,124 million or $1.58 per share in 2015.

Non-operating items, not included in operating earnings, resulted in a net charge of $269 million, compared with a net contribution of $65 million in 2015.

Net earnings attributable to common shareholders were $764 million or $1.07 per share, compared with $1,189 million or $1.67 per share in 2015.

RESULTS OF GREAT-WEST LIFECO, IGM FINANCIAL AND PARGESA HOLDING

GREAT-WEST LIFECO INC.
For the quarter ended June 30, 2016, Great-West Lifeco Inc. (Lifeco) reported operating and net earnings attributable to common shareholders of $671 million or $0.675 per share, compared with $659 million or $0.661 per share in 2015.

For the six-month period ended June 30, 2016, Lifeco reported operating and net earnings attributable to common shareholders of $1,291 million or $1.300 per share, compared with $1,359 million or $1.363 per share in 2015.

As at June 30, 2016, Power Financial and IGM Financial Inc. (IGM) held 67.6% and 4.0%, respectively, of Lifeco’s common shares. Lifeco’s contribution to Power Financial’s operating earnings was $453 million for the quarter ended June 30, 2016, compared with $442 million in 2015. For the six months ended June 30, 2016, Lifeco’s contribution to Power Financial’s operating earnings was $872 million, compared with $915 million in 2015.

IGM FINANCIAL INC.
For the quarter ended June 30, 2016, IGM reported operating and net earnings available to common shareholders of $173 million or $0.72 per share, compared with $199 million or $0.80 per share in 2015.

For the six-month period ended June 30, 2016, IGM reported operating and net earnings available to common shareholders of $340 million or $1.40 per share, compared with $399 million or $1.59 per share in 2015.

As at June 30, 2016, Power Financial and The Great-West Life Assurance Company, a subsidiary of Lifeco, held 61.5% and 3.8%, respectively, of IGM’s common shares. IGM’s contribution to Power Financial’s operating earnings was $108 million for the quarter ended June 30, 2016, compared with $116 million in 2015. For the six months ended June 30, 2016, IGM’s contribution to Power Financial’s operating earnings was $208 million, compared with $235 million in 2015.

PARGESA HOLDING SA
For the quarter ended June 30, 2016, Pargesa Holding SA (Pargesa) reported operating earnings of SF151 million, compared with SF153 million in 2015.

For the six months ended June 30, 2016, Pargesa reported operating earnings of SF228 million, compared with SF207 million in 2015.

Non-operating items in the second quarter of 2016 were a charge of SF141 million representing Pargesa’s share of GBL’s non-operating items, as discussed above. Non-operating items in the six-month period of 2016 were a net charge of SF589 million.

Net earnings for the second quarter of 2016 were SF10 million, compared with SF312 million in 2015. For the six-month period ended June 30, 2016, there were net losses of SF361 million, compared with net earnings of SF399 million in 2015.

Power Financial holds a 50% interest in Parjointco N.V., which in turn held a 55.5% equity interest in Pargesa at June 30, 2016. Pargesa’s contribution to Power Financial’s operating earnings was $56 million for the three-month period ended June 30, 2016, compared with $55 million in 2015. For the six-month period ended June 30, 2016, Pargesa’s contribution to Power Financial’s operating earnings was $85 million, compared with $74 million in 2015.

DIVIDEND ON COMMON SHARES
The Board of Directors today declared a quarterly dividend of 39.25 cents per share on the Corporation’s common shares payable November 1, 2016 to shareholders of record September 30, 2016.

DIVIDENDS ON PREFERRED SHARES
The Board of Directors also declared quarterly dividends on the Corporation’s preferred shares, as follows:

 

SERIES – STOCK SYMBOL

RECORD DATE

PAYMENT DATE

AMOUNT

Series A – PWF.PR.A

October 25, 2016

November 15, 2016

At a floating rate equal to one quarter of 70% of the average prime rate of two major Canadian chartered banks [1]

Series D – PWF.PR.E

October 11, 2016

October 31, 2016

34.375¢

Series E – PWF.PR.F

October 11, 2016

October 31, 2016

32.8125¢

Series F – PWF.PR.G

October 11, 2016

October 31, 2016

36.875¢

Series H – PWF.PR.H

October 11, 2016

October 31, 2016

35.9375¢

Series I – PWF.PR.I

October 11, 2016

October 31, 2016

37.50¢

Series K – PWF.PR.K

October 11, 2016

October 31, 2016

30.9375¢

Series L – PWF.PR.L

October 11, 2016

October 31, 2016

31.875¢

Series O – PWF.PR.O

October 11, 2016

October 31, 2016

36.25¢

Series P – PWF.PR.P

October 11, 2016

October 31, 2016

14.4125¢

Series Q – PWF.PR.Q

October 11, 2016

October 31, 2016

13.1699¢

Series R – PWF.PR.R

October 11, 2016

October 31, 2016

34.375¢

Series S – PWF.PR.S

October 11, 2016

October 31, 2016

30¢

Series T – PWF.PR.T

October 11, 2016

October 31, 2016

26.25¢

[1] In accordance with the articles of the Corporation

 

ABOUT POWER FINANCIAL
Power Financial Corporation is a diversified management and holding company that has interests, directly or indirectly, in companies in the financial services sector in Canada, the United States and Europe. It also has diversified investments in industrial companies based in Europe. Power Financial Corporation is a member of the Power Corporation Group of Companies. To learn more, visit www.powerfinancial.com.

 

EARNINGS SUMMARY

(unaudited)
(in millions of Canadian dollars, except per share amounts)

Three months ended

Six months ended

June 30,

2016

June 30, 2015

June 30,

2016

June 30, 2015

Operating earnings

Lifeco

453

442

872

915

IGM

108

116

208

235

Pargesa

56

55

85

74

617

613

1,165

1,224

Corporate operations [1]

(29)

(22)

(70)

(35)

Dividends on perpetual preferred shares

(31)

(32)

(62)

(65)

Operating earnings (attributable to common shareholders)

557

559

1,033

1,124

Other items (non-operating earnings) – see below

(52)

57

(269)

65

Net earnings (attributable to common shareholders)

505

616

764

1,189

Earnings per share (attributable to common shareholders)

Operating earnings

0.78

0.79

1.45

1.58

Non-operating earnings

(0.07)

0.08

(0.38)

0.09

Net earnings

0.71

0.87

1.07

1.67

[1] Includes foreign exchange gains (losses) and losses on investments.

OTHER ITEMS (NON-OPERATING EARNINGS)

(unaudited)

(in millions of Canadian dollars)

Three months ended

Six months ended

June 30,

2016

June 30,

2015

June 30,

2016

June 30,

2015

Share of Pargesa’s other items:

Total SA – Gain on partial disposal

101

9

LafargeHolcim Ltd – Impairment charges

(52)

(360)

Lafarge SA – Mark-to-market gain representing a reversal of impairment charges

80

80

Lafarge SA – Impairment and restructuring charges

(23)

(23)

Engie – Impairment charge

(9)

Suez Environnement Company – Gain on exchange

2

4

Other (charge) income

(2)

(1)

(5)

(52)

57

(269)

65

 

Eligible Dividends

For purposes of the Income Tax Act (Canada) and any similar provincial legislation, all of the above dividends on the Corporation’s preferred and common shares are eligible dividends.

Non-IFRS Financial Measures and Presentation

In analyzing the financial results of the Corporation and consistent with the presentation in previous periods, net earnings attributable to common shareholders are comprised of:

  • operating earnings attributable to common shareholders; and
  • other items or non-operating earnings, which include the after-tax impact of any item that in management’s judgment would make the period-over-period comparison of results from operations less meaningful. Other items include the Corporation’s share of items presented as other items or non-operating earnings by a subsidiary or a jointly controlled corporation or associate.

Management uses these financial measures in its presentation and analysis of the financial performance of Power Financial, and believes that they provide additional meaningful information to readers in their analysis of the results of the Corporation. Operating earnings, as defined by the Corporation, assist the reader in comparing the current period’s results to those of previous periods as items that are not considered to be ongoing operating activities are excluded from this non-IFRS measure.

Operating earnings attributable to common shareholders and operating earnings per share are non-IFRS financial measures that do not have a standard meaning and may not be comparable to similar measures used by other entities.

The Corporation also uses a non-consolidated basis of presentation to present and analyze its results, financial position and cash flows. In this basis of presentation, Power Financial’s interests in Lifeco and IGM are accounted for using the equity method. Presentation on a non-consolidated basis is a non-IFRS presentation. However, it is useful to the reader as it presents the holding company’s (parent) results separately from the results of its operating subsidiaries.

Forward-Looking Statements

Certain statements in this news release, other than statements of historical fact, are forward-looking statements based on certain assumptions and reflect the Corporation’s current expectations, or with respect to disclosure regarding the Corporation’s public subsidiaries, reflect such subsidiaries’ disclosed current expectations. Forward-looking statements are provided for the purposes of assisting the reader in understanding the Corporation’s financial performance, financial position and cash flows as at and for the periods ended on certain dates and to present information about management’s current expectations and plans relating to the future and the reader is cautioned that such statements may not be appropriate for other purposes. These statements may include, without limitation, statements regarding the operations, business, financial condition, expected financial results, performance, prospects, opportunities, priorities, targets, goals, ongoing objectives, strategies and outlook of the Corporation and its subsidiaries, as well as the outlook for North American and international economies for the current fiscal year and subsequent periods. Forward-looking statements include statements that are predictive in nature, depend upon or refer to future events or conditions, or include words such as “expects”, “anticipates”, “plans”, “believes”, “estimates”, “seeks”, “intends”, “targets”, “projects”, “forecasts” or negative versions thereof and other similar expressions, or future or conditional verbs such as “may”, “will”, “should”, “would” and “could”.

By its nature, this information is subject to inherent risks and uncertainties that may be general or specific and which give rise to the possibility that expectations, forecasts, predictions, projections or conclusions will not prove to be accurate, that assumptions may not be correct and that objectives, strategic goals and priorities will not be achieved. A variety of factors, many of which are beyond the Corporation’s and its subsidiaries’ control, affect the operations, performance and results of the Corporation and its subsidiaries and their businesses, and could cause actual results to differ materially from current expectations of estimated or anticipated events or results. These factors include, but are not limited to: the impact or unanticipated impact of general economic, political and market factors in North America and internationally, interest and foreign exchange rates, global equity and capital markets, management of market liquidity and funding risks, changes in accounting policies and methods used to report financial condition (including uncertainties associated with critical accounting assumptions and estimates), the effect of applying future accounting changes, business competition, operational and reputational risks, technological change, changes in government regulation and legislation, changes in tax laws, unexpected judicial or regulatory proceedings, catastrophic events, the Corporation’s and its subsidiaries’ ability to complete strategic transactions, integrate acquisitions and implement other growth strategies, and the Corporation’s and its subsidiaries’ success in anticipating and managing the foregoing factors.

The reader is cautioned to consider these and other factors, uncertainties and potential events carefully and not to put undue reliance on forward-looking statements. Information contained in forward-looking statements is based upon certain material assumptions that were applied in drawing a conclusion or making a forecast or projection, including management’s perceptions of historical trends, current conditions and expected future developments, as well as other considerations that are believed to be appropriate in the circumstances, including that the list of factors in the previous paragraph, collectively, are not expected to have a material impact on the Corporation and its subsidiaries. While the Corporation considers these assumptions to be reasonable based on information currently available to management, they may prove to be incorrect.

Other than as specifically required by applicable Canadian law, the Corporation undertakes no obligation to update any forward-looking statement to reflect events or circumstances after the date on which such statement is made, or to reflect the occurrence of unanticipated events, whether as a result of new information, future events or results, or otherwise.

Additional information about the risks and uncertainties of the Corporation’s business and material factors or assumptions on which information contained in forward-looking statements is based is provided in its disclosure materials, including its most recent Management’s Discussion and Analysis and Annual Information Form, filed with the securities regulatory authorities in Canada and available at www.sedar.com.

 

SOURCE Power Financial Corporation

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com




Larry Mizel’s HSBC Bank Faces More Currency Manipulation Charges

NormanBrownstein_LarryMizel_AIPAC_Directors (L) Norman Brownstein (R) Larry Mizel both Directors who run HSBC Bank a Division of Great West Life of Englewood, Colorado. Brownstein and Mizel are AIPAC Directors,  Brownstein is one of George HW Bush’s six CIA Council when Bush was DCI in the mid 1970s.

Mizel and Brownstein sold nearly $100 Trillion Dolllars of Illegal Mortgage Backed Securities that lead to Bank Bail Out in 2008. Larry Mizel’s MDC Holding, Inc. (NYSE-MDC) was the parent company of Silverado Savings and Loan that collapsed with Neil Bush as the Director laundering Narcotics Money during Iran Contra from Bill and Hillary Clinton’s Iran Contra Mena, Arkansas Narcotics for weapons with Ollie North. Clinton, Mizel and Brownstein and the others have never been  brought to Justice.

Stew Webb Whistle blower Federal Grand Jury Demand against Kerre Millman, Leonard Millman, Elaine Millman, Larry Mizel, Norman Brownstein, George HW Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton and others.

Stew Webb Savings and Loan Whistle blower Faces Illegal Charges

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud

Bush – Millman – Clinton Zionist Organized Crime Family Flow Chart (1)

FRAUDS ARE US AT MDC-NYSE The Denver Illuminati Zionist Connection

Illuminati Human Sacrifices June 21 and December 20-22 every year in Denver, Colorado
George HW Bush, Larry Mizel, Henry Kissinger, David Rockefeller, Rabbi Answar Bin Shari of Israel, Meyer Rothchild, and the other 12 Disciples of Satan are there Killing an Infant and drinking its blood as a Ritual to Satan.

From Cradle to Cabal The Secret Life of Gale Norton The Denver Illuminati Zionist Connection

 

HSBC

Big Banks Face More Charges of Ongoing Currency Manipulation

By Eric Sepanek

Executives in the massive banking firm HSBC were recently charged with more price and market manipulation accusations. Two senior executives are currently facing criminal charges alleging that they were involved in a currency manipulation scheme that illegally brought in $8 million. The allegation accuses them of conspiracy to commit wire fraud; unlike other insider trading schemes, this one allegedly hinged on trading in currency rather than stocks. The two men are accused of converting dollars into British pounds for a client, ramping up one currency for another.

Many long-term investors in gold and traders in all precious metals gave a knowing nod when this new was announced; HBSC has already been accused of manipulating the gold and silver markets.

“It’s Not Paranoia If You Are Actually Being Followed”

A number of cases over the past two decades have resulted in prosecution for market manipulation, and many more such situations have been alleged. Recently the markets have seen:

  • A five-year investigation into the question of manipulation in the silver markets was closed in 2013. At that time the Commodity Futures Trading Commission stated, there is not a viable basis to bring an enforcement action with respect to any firm or its employees related to investigation of silver price fixes.
  • In July of 2014, Deutsche Bank, Bank of Nova Scotia and HSBC – and eventually USB – were named in a lawsuit alleging such manipulation does occur. The suit has produced several large settlements from several of these banks, including Deutsche Bank.
  • Deutsche Bank has also paid huge fines for manipulation of LIBOR, precious metals, and currency trading markets. It is now under investigation for yet another case of manipulation of both LIBOR and precious metals markets.
  • FINMA, the Swiss Financial Market Supervisory Authority banned six traders and managers who worked for UBS for their misconduct in manipulating both foreign currency and precious metal prices.
  • Switzerland’s competition commission WEKO announced late in 2015 that is has launched an investigation into suspected manipulation of the precious metals markets. It is worth noting that this regulatory action involves a host of major banks, including “Deutsche Bank, UBS, Julius Baer, HSBC, Barclays, Morgan Stanley and Mitsui.”

In spite of these actions and settlements, many institutional brokers continue to dismiss allegations of manipulation as conspiracy theory. The CEO of a major London physical bullion broker, Ross Norman, stated, “It is a good, clean, efficient market,” Norman said, adding that certain banks have been investigated “dozens of times” and “nothing untoward has been found.”

These standard denials become less believable as yet more executives and trading firms are involved in such accusations and settlements.

Why It Matters

With a global economy based on fiat government currency, central banks and large global institutions are both incentivized and empowered to manipulate their trading markets. The role of physical bullion has both a real and psychological impact on the market and the ongoing acceptance of unsustainable government debts and deficit spending.

Professional trader and gold investors have earnestly tried to sort out inconsistencies in the way gold and silver react to normal market factors such as supply and demand over the recent decades. They have increasingly seen market manipulation as the only way to explain such anomalies as the Gold-Silver Ratio, falling prices with increasing demand and decreasing supply, and other central bank actions.

Markets depend on investor and participant confidence to function as intended. With global economic challenges pushing more investors to buy gold and silver as a safe haven, any manipulators will find it increasingly difficult to support paper currency at the cost of normal pricing in precious metals.

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

Radio Archives

 




Radio Stew Webb and Tom Heneghan June 21 2016

Gun_Dog

Radio Stew Webb and Tom Heneghan June 21 2016

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Panama Papers Could End Lesbian Demon Hillary Clinton’s Campaign

HillaryClinton-PanamaPapers

Stew Webb Editors Note: The articles original links had to be removed due to a massive attacks on websites who published these papers.

Yes, the Panama Papers Could Really End Hillary Clinton’s Campaign

Op-Ed by Jake Anderson
April 6, 2016

TheAntiMedia.org

 With Senator Bernie Sanders winning seven of the last eight delegate battles the most recent was Tuesday night’s Wisconsin victory there’s a feeling in the air that most progressives haven’t felt since the Iowa caucus. It speaks to a hard truth Hillary Clinton and her choleric campaign staffers will encounter when they wake up in the morning: Bernie really could still beat Clinton and become the Democratic nominee for president.

No way, some of you are saying. The television faces said the delegate math was too hard. The superdelegates make it impossible. Hillary wins the primaries, Bernie only wins caucuses;America won’t elect a socialist; the nation won’t rally behind free healthcare and college tuition.

Despite the supposedly ineluctable logic of Sanders’ unelectability, many pundits now believe there has been a seismic shift in the 2016 presidential race. It is becoming increasingly obvious that Americans are sick to death of the two corporatist political establishments and will do anything to send them a message. The evidence of this is that the two most popular candidates in the 2016 election are a Jewish democratic socialist and a reality TV star who referred to his penis during a nationally televised debate.

Then there’s the matter of the Panama Papers. In case you haven’t heard about them over the roar of mainstream media’s ‘round-the-clock anti-Trump coverage, it’s being referred to as the biggest data leak in history. For the last year, 400 journalists have been secretly decoding 11.5 million documents leaked from Panamanian law firm Mossack Fonseca. The 2.6 terabytes of data show billions of dollars worth of transactions dating back 40 years.

Acquired from an anonymous source by the German newspaper Süddeutsche Zeitung and then shared with the International Consortium of Investigative Journalists, the documents present a jaw-dropping paper trail of how the upper echelon of the 1 percent has used shell companies and offshore tax havens to avoid paying billions of dollars in taxes. In less than a week of exposure, the Panama Papers have already implicated 140 world leaders from 50 different countries. Top executives and celebrities who appear in the leaked emails, PDFs, and other documents may also be indicted in money laundering, tax evasion, and sanctions-busting activities.

Though the source of the leak opted not to do a Wikileaks style data dump and is instead allowing media outlets to curate the information, international tax reform could be imminent.

The revelations are relevant to the 2016 presidential election because they once again illustrate the stark contrast in judgement between Bernie Sanders and Hillary Clinton. The transgressions documented in the Panama Papers were directly facilitated by the Panama-United States Trade Promotion Agreement, which Congress ratified in 2012. In 2011, Sanders took to the floor of the senate to strongly denounce the trade deal:

“Panama is a world leader when it comes to allowing wealthy Americans and large corporations to evade US taxes by stashing their cash in offshore tax havens. The Panama free trade agreement will make this bad situation much worse. Each and every year, the wealthiest people in this country and the largest corporations evade about $100 billion in taxes through abusive and illegal offshore tax havens in Panama and in other countries.”

Clinton, on the other hand, completely ignored the tax haven issue, and instead, regurgitated the same job-creation platitude she used to peddle NAFTA, which has decimated American manufacturing jobs and led to an economic refugee crisis in Mexico.

Beyond just exposing her unwillingness to understand how modern free trade agreements benefit the rich and punish impoverished countries, Clinton may have a more nefarious connection to the Panama Papers.

In lobbying for the Panama-United States Trade Promotion Agreement, Clinton paved the way for major banks and corporations, most notably the Deutsche Bank, to skirt national laws and regulations. After she resigned as Secretary of State, the Deutsche Bank paid her $485,000.00 for a speech. While criminality can’t yet be definitively established, this may change when the “Süddeutsche Zeitung” publishes its comprehensive list at the end of the month. In addition to the aforementioned connection, Clinton’s name has already surfaced in connection to  billionaire and a Russian controlled bank named in the files.

 

The fallout from the Panama Papers is being felt around the world. On Tuesday, Iceland’s Prime Minister resigned after it was revealed his family had used a shell company to hold millions of dollars worth of bonds in a collapsed bank. After an interview in which Prime Minister Sigmundur Davíð Gunnlaugsson had a meltdown when asked about the company’s assets, over 20,000 citizens of Iceland protested.

How does this lead to Bernie Sanders defeating Hillary Clinton? The Sanders campaign has been run on the premise that Clinton is inextricably linked to political corruption, disastrous military interventions, and collusion with Wall Street. If it can be shown that Clinton was involved in criminal improprieties exposed by the Panama Papers, this will constitute yet another major line of attack for Sanders headed into theApril 14th debate in New York. If Sanders wins the New York primary a few days later and scoops up a proportion of its 247 delegates, the narrative of the election will dramatically shift.

 

When added to the myriad other Clinton scandals and political vulnerabilities, the Democratic party’s gatekeeper super delegates could decide that Clinton is too big of a liability going into the general election. It all comes down to New York, though Sanders must win New York. If he does, you will see historic chaos unleashed upon the American electorate. And if the Panama Papers leak sets off an unstoppable domino effect, the DNC may soon find its fractured party looking just as ghoulish as the clown’s autopsy being conducted on the Republican Party.

Yes, the Panama Papers Could Really End Hillary Clinton;s Campaign

TheAntiMedia.org

 

Gun_Dog

Spot Dog Loves to eat Illuminati – Zionist – Satanists.

Related:

By Stew Webb

Click on the link below to view the details of their full investigations.

The-Panama-Papers

panamapapers.icij.org

Stew Webb Whistleblower Grand Jury Demand against Hillary Clinton Jeb Bush and others
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason/

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Hillary Clinton email servers Israeli Espionage Exposed

Gun_Dog Spot Dog

Hillary Clinton email servers Israeli Espionage Exposed

By Stew Webb

If you have an internet site that exposes the Bush Millman Mizel Clinton Obama Satanic Organized Crime Syndicate you might want to block all these IP number related to Hillary Clinton’s  email servers located in Denver, Colorado which has turned out to be Israeli Espionage against the American People.

I have been a target of many of the IPs for over 2 years.

Denver is the Hub of the Criminal Illuminati Zionist Crime Syndicate both AIPAC Directors and Bank Bail out Scamsters Larry Mizel and Norman Brownstein operate from Denver, Colorado.

Hillary Clinton’s attorney James M. Lyons once served on the Board of Directors of Larry Mizel’s MDC Holdings, Inc. NYSE:MDC .

Hillary Clinton email network a private intelligence operation

http://www.stewwebb.com/2016/04/04/hillary-clinton-email-network-private-intelligence-operation

Stew Webb Whistleblower Grand Jury Demand against Hillary Clinton Jeb Bush and others
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton

FRAUDS ARE US AT MDC-NYSE The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/17/frauds-are-us-at-mdc-nyse-the-denver-illuminati-zionist-connection

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

Hillary Clinton email servers
http://platteriver.com/
http://platteriver.com/ is a URI.
Domain Dossier will continue with platteriver.com.
Address lookup
canonical name platteriver.com.
aliases
addresses 104.131.241.168
Domain Whois record

Queried whois.internic.net with “dom platteriver.com”…

Domain Name: PLATTERIVER.COM
Registrar: REGISTER.COM, INC.
Sponsoring Registrar IANA ID: 9
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: DNS010.D.REGISTER.COM
Name Server: DNS021.C.REGISTER.COM
Name Server: DNS072.B.REGISTER.COM
Name Server: DNS205.A.REGISTER.COM
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Updated Date: 20-oct-2013
Creation Date: 31-jul-2002
Expiration Date: 31-jul-2019

>>> Last update of whois database: Mon, 04 Apr 2016 16:27:09 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.register.com with “platteriver.com”…

Domain Name: platteriver.com
Registry Domain ID: 88918620_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: http://www.register.com
Updated Date: 2002-07-31T04:00:00Z
Creation Date: 2002-07-31T22:10:36Z
Registrar Registration Expiration Date: 2019-07-31T22:10:36Z
Registrar: Register.com, Inc.
Registrar IANA ID: 9
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8773812449
Reseller:
Domain Status: clientTransferProhibited http://icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: PERFECT PRIVACY, LLC
Registrant Organization:
Registrant Street: 12808 Gran Bay Pkwy West
Registrant City: Jacksonville
Registrant State/Province: FL
Registrant Postal Code: 32258
Registrant Country: US
Registrant Phone: +1.9027492701
Registrant Phone Ext.:
Registrant Fax:
Registrant Fax Ext.:
Registrant Email: c0c7d1bf0a28fd0a7e90203c92174749@domaindiscreet.com
Registry Admin ID:
Admin Name: PERFECT PRIVACY, LLC
Admin Organization:
Admin Street: 12808 Gran Bay Pkwy West
Admin City: Jacksonville
Admin State/Province: FL
Admin Postal Code: 32258
Admin Country: US
Admin Phone: +1.9027492701
Admin Phone Ext.:
Admin Fax:
Admin Fax Ext.:
Admin Email: c0c7d1bd0a28fd0a612f4ff2a32769de@domaindiscreet.com
Registry Tech ID:
Tech Name: PERFECT PRIVACY, LLC
Tech Organization:
Tech Street: 12808 Gran Bay Pkwy West
Tech City: Jacksonville
Tech State/Province: FL
Tech Postal Code: 32258
Tech Country: US
Tech Phone: +1.9027492701
Tech Phone Ext.:
Tech Fax:
Tech Fax Ext.:
Tech Email: c0c7d1c00a28fd0a08595800d630a308@domaindiscreet.com
Name Server: dns010.d.register.com
Name Server: dns072.b.register.com
Name Server: dns021.c.register.com
Name Server: dns205.a.register.com
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2002-07-31T04:00:00Z <<<

Network Whois record

Queried whois.arin.net with “n 104.131.241.168″…

NetRange: 104.131.0.0 – 104.131.255.255
CIDR: 104.131.0.0/16
NetName: DIGITALOCEAN-9
NetHandle: NET-104-131-0-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS46652, AS14061, AS393406, AS62567
Organization: Digital Ocean, Inc. (DO-13)
RegDate: 2014-06-02
Updated: 2014-06-02
Comment: http://www.digitalocean.com
Comment: Simple Cloud Hosting
Ref: https://whois.arin.net/rest/net/NET-104-131-0-0-1
OrgName: Digital Ocean, Inc.
OrgId: DO-13
Address: 101 Ave of the Americas
Address: 10th Floor
City: New York
StateProv: NY
PostalCode: 10013
Country: US
RegDate: 2012-05-14
Updated: 2016-01-26
Comment: http://www.digitalocean.com
Comment: Simple Cloud Hosting
Ref: https://whois.arin.net/rest/org/DO-13
OrgAbuseHandle: ABUSE5232-ARIN
OrgAbuseName: Abuse, DigitalOcean
OrgAbusePhone: +1-347-875-6044
OrgAbuseEmail: abuse@digitalocean.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5232-ARIN

OrgTechHandle: NOC32014-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-347-875-6044
OrgTechEmail: noc@digitalocean.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC32014-ARIN

OrgNOCHandle: NOC32014-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-347-875-6044
OrgNOCEmail: noc@digitalocean.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC32014-ARIN

DNS records

DNS query for 168.241.131.104.in-addr.arpa returned an error from the server: NameError
name class type data time to live
platteriver.com IN NS dns205.a.register.com 86400s (1.00:00:00)
platteriver.com IN TXT v=spf1 include:_netblocks.mimecast.com ~all 86400s (1.00:00:00)
platteriver.com IN NS dns021.c.register.com 86400s (1.00:00:00)
platteriver.com IN MX
preference: 0
exchange: us-smtp-inbound-1.mimecast.com
86400s (1.00:00:00)
platteriver.com IN TXT google-site-verification=Z3oQUsaTGtS6FMKIbGzEAg8p7MHL1cDtW6wc38_7f3Y 86400s (1.00:00:00)
platteriver.com IN A 104.131.241.168 86400s (1.00:00:00)
platteriver.com IN NS dns072.b.register.com 86400s (1.00:00:00)
platteriver.com IN NS dns010.d.register.com 86400s (1.00:00:00)
platteriver.com IN SOA
server: dns205.a.register.com
email: root@register.com
serial: 200207432
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 86400
86400s (1.00:00:00)
platteriver.com IN MX
preference: 0
exchange: us-smtp-inbound-2.mimecast.com
86400s (1.00:00:00)
Traceroute

Tracing route to platteriver.com [104.131.241.168]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 23 23 23 173.192.18.137 ae0.bbr01.eq01.chi01.networklayer.com
5 * * *
6 40 40 40 198.32.160.170 unassigned170.nyiix.net
7 40 41 40 192.241.164.254
8 44 44 44 104.131.241.168

Trace complete

— end —
log in | account info
CentralOps.net
Address lookup
canonical name dns010.d.register.com.
aliases
addresses 216.21.236.10
Domain Whois record

Queried whois.internic.net with “dom REGISTER.COM”…

Domain Name: REGISTER.COM
Registrar: REGISTER.COM, INC.
Sponsoring Registrar IANA ID: 9
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: NS1.REGISTER.COM
Name Server: NS2.REGISTER.COM
Name Server: NS3.REGISTER.COM
Name Server: NS4.REGISTER.COM
Status: clientDeleteProhibited https://www.icann.org/epp#clientDeleteProhibited
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 22-apr-2014
Creation Date: 01-nov-1994
Expiration Date: 04-aug-2019

>>> Last update of whois database: Mon, 04 Apr 2016 17:11:24 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.register.com with “REGISTER.COM”…

Domain Name: register.com
Registry Domain ID: 3441369_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: http://www.register.com
Updated Date: 2009-08-26T04:00:00Z
Creation Date: 1994-11-01T05:00:00Z
Registrar Registration Expiration Date: 2019-08-04T04:00:00Z
Registrar: Register.com, Inc.
Registrar IANA ID: 9
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8773812449
Reseller:
Domain Status: clientTransferProhibited http://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://icann.org/epp#clientDeleteProhibited
Registry Registrant ID:
Registrant Name: Domain Registrar
Registrant Organization: Register.Com, Inc.
Registrant Street: 575 8th Avenue
Registrant City: New York
Registrant State/Province: NY
Registrant Postal Code: 10018
Registrant Country: US
Registrant Phone: +1.9027492701
Registrant Phone Ext.:
Registrant Fax:
Registrant Fax Ext.:
Registrant Email: domainregistrar@register.com
Registry Admin ID:
Admin Name: Domain Registrar
Admin Organization: Register.Com, Inc.
Admin Street: 575 8th Avenue
Admin City: New York
Admin State/Province: NY
Admin Postal Code: 10018
Admin Country: US
Admin Phone: +1.9027492701
Admin Phone Ext.:
Admin Fax:
Admin Fax Ext.:
Admin Email: domainregistrar@register.com
Registry Tech ID:
Tech Name: Domain Registrar
Tech Organization: Register.Com, Inc.
Tech Street: 575 8th Avenue
Tech City: New York
Tech State/Province: NY
Tech Postal Code: 10018
Tech Country: US
Tech Phone: +1.9027492701
Tech Phone Ext.:
Tech Fax:
Tech Fax Ext.:
Tech Email: domainregistrar@register.com
Name Server: ns2.register.com
Name Server: ns3.register.com
Name Server: ns4.register.com
Name Server: ns1.register.com
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2009-08-26T04:00:00Z <<<

Network Whois record

Queried whois.arin.net with “n 216.21.236.10″…

NetRange: 216.21.224.0 – 216.21.239.255
CIDR: 216.21.224.0/20
NetName: RCOM-1BLK
NetHandle: NET-216-21-224-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Register.com, Inc (REG)
RegDate: 2000-06-28
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-216-21-224-0-1
OrgName: Register.com, Inc
OrgId: REG
Address: 12808 Gran Bay Parkway West
City: Jacksonville
StateProv: FL
PostalCode: 32258
Country: US
RegDate: 1999-09-08
Updated: 2014-07-01
Ref: https://whois.arin.net/rest/org/REG
OrgTechHandle: NETWO55-ARIN
OrgTechName: Network Engineering
OrgTechPhone: +1-904-680-6600
OrgTechEmail: neteng@web.com
OrgTechRef: https://whois.arin.net/rest/poc/NETWO55-ARIN

OrgAbuseHandle: CUSTO-ARIN
OrgAbuseName: Customer Service
OrgAbusePhone: +1-800-899-9724
OrgAbuseEmail: support@register.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CUSTO-ARIN

OrgNOCHandle: NOC207-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-904-680-6600
OrgNOCEmail: ops@register.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC207-ARIN

DNS records

DNS query for 10.236.21.216.in-addr.arpa returned an error from the server: NameError
name class type data time to live
dns010.d.register.com IN A 216.21.236.10 600s (00:10:00)
register.com IN TXT v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all 60s (00:01:00)
register.com IN A 216.21.238.29 60s (00:01:00)
register.com IN NS ns1.register.com 60s (00:01:00)
register.com IN MX
preference: 10
exchange: mx-s.myregisteredsite.com
60s (00:01:00)
register.com IN NS ns2.register.com 60s (00:01:00)
register.com IN NS ns3.register.com 60s (00:01:00)
register.com IN NS ns4.register.com 60s (00:01:00)
register.com IN SOA
server: ns1.register.com
email: root@register.com
serial: 2016032901
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 60
60s (00:01:00)
10.236.21.216.in-addr.arpa IN PTR dns010.d.register.com 600s (00:10:00)
236.21.216.in-addr.arpa IN NS ns3.register.com 600s (00:10:00)
236.21.216.in-addr.arpa IN NS ns1.register.com 600s (00:10:00)
236.21.216.in-addr.arpa IN SOA
server: dns1.register.com
email: root@register.com
serial: 2007082300
refresh: 10800
retry: 3600
expire: 10800
minimum ttl: 600
600s (00:10:00)
236.21.216.in-addr.arpa IN NS ns2.register.com 600s (00:10:00)
236.21.216.in-addr.arpa IN NS ns4.register.com 600s (00:10:00)
Traceroute

Tracing route to dns010.d.register.com [216.21.236.10]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 1 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 213.248.102.173 dls-bb1-link.telia.net
5 31 31 31 213.155.130.68 ash-bb4-link.telia.net
6 32 32 32 213.155.136.39 ash-b1-link.telia.net
7 32 32 32 62.115.32.2 defensenet-ic-302032-ash-b2.c.telia.net
8 * * *
9 32 32 32 107.162.0.123
10 * * *
11 51 51 51 64.69.216.26
12 * * *
13 * * *
14 * * *
15 * * *

Trace aborted

— end —
Address lookup
canonical name dns021.c.register.com.
aliases
addresses 216.21.235.21
Domain Whois record

Queried whois.internic.net with “dom REGISTER.COM”…

Domain Name: REGISTER.COM
Registrar: REGISTER.COM, INC.
Sponsoring Registrar IANA ID: 9
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: NS1.REGISTER.COM
Name Server: NS2.REGISTER.COM
Name Server: NS3.REGISTER.COM
Name Server: NS4.REGISTER.COM
Status: clientDeleteProhibited https://www.icann.org/epp#clientDeleteProhibited
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 22-apr-2014
Creation Date: 01-nov-1994
Expiration Date: 04-aug-2019

>>> Last update of whois database: Mon, 04 Apr 2016 17:11:24 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.register.com with “REGISTER.COM”…

Domain Name: register.com
Registry Domain ID: 3441369_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: http://www.register.com
Updated Date: 2009-08-26T04:00:00Z
Creation Date: 1994-11-01T05:00:00Z
Registrar Registration Expiration Date: 2019-08-04T04:00:00Z
Registrar: Register.com, Inc.
Registrar IANA ID: 9
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8773812449
Reseller:
Domain Status: clientTransferProhibited http://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://icann.org/epp#clientDeleteProhibited
Registry Registrant ID:
Registrant Name: Domain Registrar
Registrant Organization: Register.Com, Inc.
Registrant Street: 575 8th Avenue
Registrant City: New York
Registrant State/Province: NY
Registrant Postal Code: 10018
Registrant Country: US
Registrant Phone: +1.9027492701
Registrant Phone Ext.:
Registrant Fax:
Registrant Fax Ext.:
Registrant Email: domainregistrar@register.com
Registry Admin ID:
Admin Name: Domain Registrar
Admin Organization: Register.Com, Inc.
Admin Street: 575 8th Avenue
Admin City: New York
Admin State/Province: NY
Admin Postal Code: 10018
Admin Country: US
Admin Phone: +1.9027492701
Admin Phone Ext.:
Admin Fax:
Admin Fax Ext.:
Admin Email: domainregistrar@register.com
Registry Tech ID:
Tech Name: Domain Registrar
Tech Organization: Register.Com, Inc.
Tech Street: 575 8th Avenue
Tech City: New York
Tech State/Province: NY
Tech Postal Code: 10018
Tech Country: US
Tech Phone: +1.9027492701
Tech Phone Ext.:
Tech Fax:
Tech Fax Ext.:
Tech Email: domainregistrar@register.com
Name Server: ns2.register.com
Name Server: ns3.register.com
Name Server: ns4.register.com
Name Server: ns1.register.com
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2009-08-26T04:00:00Z <<<

Network Whois record

Queried whois.arin.net with “n 216.21.235.21″…

NetRange: 216.21.224.0 – 216.21.239.255
CIDR: 216.21.224.0/20
NetName: RCOM-1BLK
NetHandle: NET-216-21-224-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Register.com, Inc (REG)
RegDate: 2000-06-28
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-216-21-224-0-1
OrgName: Register.com, Inc
OrgId: REG
Address: 12808 Gran Bay Parkway West
City: Jacksonville
StateProv: FL
PostalCode: 32258
Country: US
RegDate: 1999-09-08
Updated: 2014-07-01
Ref: https://whois.arin.net/rest/org/REG
OrgAbuseHandle: CUSTO-ARIN
OrgAbuseName: Customer Service
OrgAbusePhone: +1-800-899-9724
OrgAbuseEmail: support@register.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CUSTO-ARIN

OrgNOCHandle: NOC207-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-904-680-6600
OrgNOCEmail: ops@register.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC207-ARIN

OrgTechHandle: NETWO55-ARIN
OrgTechName: Network Engineering
OrgTechPhone: +1-904-680-6600
OrgTechEmail: neteng@web.com
OrgTechRef: https://whois.arin.net/rest/poc/NETWO55-ARIN

DNS records

DNS query for 21.235.21.216.in-addr.arpa returned an error from the server: NameError
name class type data time to live
dns021.c.register.com IN A 216.21.235.21 600s (00:10:00)
register.com IN NS ns2.register.com 60s (00:01:00)
register.com IN SOA
server: ns1.register.com
email: root@register.com
serial: 2016032901
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 60
60s (00:01:00)
register.com IN NS ns4.register.com 60s (00:01:00)
register.com IN A 216.21.238.29 60s (00:01:00)
register.com IN NS ns1.register.com 60s (00:01:00)
register.com IN TXT v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all 60s (00:01:00)
register.com IN MX
preference: 10
exchange: mx-s.myregisteredsite.com
60s (00:01:00)
register.com IN NS ns3.register.com 60s (00:01:00)
21.235.21.216.in-addr.arpa IN PTR dns021.c.register.com 600s (00:10:00)
235.21.216.in-addr.arpa IN SOA
server: dns1.register.com
email: root@register.com
serial: 2006040600
refresh: 10800
retry: 3600
expire: 10800
minimum ttl: 600
600s (00:10:00)
235.21.216.in-addr.arpa IN NS ns1.register.com 600s (00:10:00)
235.21.216.in-addr.arpa IN NS ns2.register.com 600s (00:10:00)
235.21.216.in-addr.arpa IN NS ns4.register.com 600s (00:10:00)
235.21.216.in-addr.arpa IN NS ns3.register.com 600s (00:10:00)
Traceroute

Tracing route to dns021.c.register.com [216.21.235.21]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 1 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 1 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 213.248.102.173 dls-bb1-link.telia.net
5 33 33 33 62.115.137.44 ash-bb3-link.telia.net
6 32 32 32 62.115.113.211 ash-b1-link.telia.net
7 32 32 32 62.115.32.2 defensenet-ic-302032-ash-b2.c.telia.net
8 * * *
9 32 32 32 107.162.0.123
10 * * *
11 52 52 52 64.69.216.18
12 * * *
13 * * *
14 * * *
15 * * *

Trace aborted

— end —
Address lookup
canonical name defensenet-ic-302032-ash-b2.c.telia.net.
aliases
addresses 62.115.32.2
Domain Whois record

Queried whois.internic.net with “dom telia.net”…

Domain Name: TELIA.NET
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Whois Server: whois.corporatedomains.com
Referral URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Name Server: DNS1.TELIA.COM
Name Server: DNS2.TELIA.COM
Name Server: DNS49.DE.TELIA.NET
Name Server: NS04.SAVVIS.NET
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 05-aug-2015
Creation Date: 10-aug-1995
Expiration Date: 09-aug-2016

>>> Last update of whois database: Mon, 04 Apr 2016 20:40:02 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.corporatedomains.com with “telia.net”…

Domain Name: telia.net
Registry Domain ID: 1883420_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2015-08-05T05:10:02Z
Creation Date: 1995-08-10T04:00:00Z
Registrar Registration Expiration Date: 2016-08-09T04:00:00Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: serverTransferProhibited http://www.icann.org/epp#serverTransferProhibited
Domain Status: serverDeleteProhibited http://www.icann.org/epp#serverDeleteProhibited
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: serverUpdateProhibited http://www.icann.org/epp#serverUpdateProhibited
Registry Registrant ID:
Registrant Name: Domain Manager
Registrant Organization: TeliaSonera AB
Registrant Street: Sturegatan 1
Registrant City: Stockholm
Registrant State/Province: .
Registrant Postal Code: SE-106 63
Registrant Country: SE
Registrant Phone: +46.850455000
Registrant Phone Ext:
Registrant Fax: +46.86114642
Registrant Fax Ext:
Registrant Email: domain-manager@teliasonera.com
Registry Admin ID:
Admin Name: Domain Manager
Admin Organization: TeliaSonera AB
Admin Street: Sturegatan 1
Admin City: Stockholm
Admin State/Province: .
Admin Postal Code: SE-106 63
Admin Country: SE
Admin Phone: +46.850455000
Admin Phone Ext:
Admin Fax: +46.86114642
Admin Fax Ext:
Admin Email: domain-manager@teliasonera.com
Registry Tech ID:
Tech Name: Registry Net
Tech Organization: TeliaSonera AB
Tech Street: Marbackagatan 11
Tech City: Stockholm
Tech State/Province: .
Tech Postal Code: SE-123 86
Tech Country: SE
Tech Phone: +46.84568930
Tech Phone Ext:
Tech Fax: +46.84568935
Tech Fax Ext:
Tech Email: dns@telia.net
Name Server: ns04.savvis.net
Name Server: dns2.telia.com
Name Server: dns1.telia.com
Name Server: dns49.de.telia.net
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2015-08-05T05:10:02Z <<<

Network Whois record

Queried whois.ripe.net with “-B 62.115.32.2″…

% Information related to ‘62.115.32.0 – 62.115.32.255’

% Abuse contact for ‘62.115.32.0 – 62.115.32.255’ is ‘abuse@telia.com’

inetnum: 62.115.32.0 – 62.115.32.255
netname: TELIANET
descr: TeliaSonera International Carrier
descr: AS1299 Backbone
country: EU
admin-c: TR889-RIPE
tech-c: TR889-RIPE
status: ASSIGNED PA
notify: mntripe@telia.net
mnt-domains: TELIANET-LIR
mnt-by: TELIANET-LIR
mnt-lower: TELIANET-LIR
mnt-routes: TELIANET-RR
created: 2007-01-30T16:05:46Z
last-modified: 2007-01-30T16:05:46Z
source: RIPE

role: TeliaNet Registry
address: TeliaSonera AB
address: Marbackagatan 11
address: SE-123 86 Farsta
address: Sweden
address: ********************************
address: Abuse and intrusion reports should
address: be sent to: abuse@telia.com
address: ********************************
abuse-mailbox: abuse@telia.com
fax-no: +46 8 6047006
e-mail: registry@telia.net
e-mail: dns@telia.net
e-mail: backbone@telia.net
admin-c: EVAO
tech-c: IC106-RIPE
tech-c: ACA-RIPE
tech-c: JS7984-RIPE
tech-c: EVAO
tech-c: PJ2540-RIPE
tech-c: LS483-RIPE
tech-c: PB8229-RIPE
tech-c: AS32219-RIPE
nic-hdl: TR889-RIPE
notify: mntripe@telia.net
mnt-by: TELIANET-LIR
created: 2002-08-21T12:58:15Z
last-modified: 2014-03-28T08:27:38Z
source: RIPE

% Information related to ‘62.115.0.0/16AS1299’

route: 62.115.0.0/16
descr: TELIANET-BLK
origin: AS1299
mnt-by: TELIANET-RR
created: 2003-09-23T07:53:02Z
last-modified: 2003-09-23T07:53:02Z
source: RIPE

% This query was served by the RIPE Database Query Service version 1.86 (DB-3)

DNS records
name class type data time to live
defensenet-ic-302032-ash-b2.c.telia.net IN A 62.115.32.2 3600s (01:00:00)
defensenet-ic-302032-ash-b2.c.telia.net IN AAAA 2001:2000:3080:784::2 3600s (01:00:00)
c.telia.net IN SOA
server: dns1.telia.com
email: backbone@telia.net
serial: 2016040403
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 3600
3600s (01:00:00)
c.telia.net IN NS dns1.telia.com 3600s (01:00:00)
c.telia.net IN NS dns2.telia.com 3600s (01:00:00)
c.telia.net IN NS dns49.de.telia.net 3600s (01:00:00)
telia.net IN SOA
server: dns1.telia.com
email: backbone@telia.net
serial: 2016040402
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 3600
300s (00:05:00)
telia.net IN TXT v=spf1 ip4:194.237.170.0/24 ip4:195.198.164.0/24 ip4:62.20.126.0/24 include:_spf-a.telia.net include:_spf-b.telia.net ~all 300s (00:05:00)
telia.net IN MX
preference: 10
exchange: mail.telia.net
300s (00:05:00)
telia.net IN NS dns49.de.telia.net 300s (00:05:00)
telia.net IN NS ns04.savvis.net 300s (00:05:00)
telia.net IN NS dns1.telia.com 300s (00:05:00)
telia.net IN NS dns2.telia.com 300s (00:05:00)
telia.net IN NAPTR
order: 50
preference: 50
flags: s
flags: SIP+D2T
flags:
replacement: _sip._tcp.telia.net
300s (00:05:00)
telia.net IN NAPTR
order: 90
preference: 50
flags: s
flags: SIP+D2U
flags:
replacement: _sip._udp.telia.net
300s (00:05:00)
2.32.115.62.in-addr.arpa IN PTR defensenet-ic-302032-ash-b2.c.telia.net 3600s (01:00:00)
32.115.62.in-addr.arpa IN NS dns2.telia.com 3600s (01:00:00)
32.115.62.in-addr.arpa IN NS dns1.telia.com 3600s (01:00:00)
32.115.62.in-addr.arpa IN SOA
server: dns1.telia.com
email: dns@telia.net
serial: 2015122800
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 3600
3600s (01:00:00)
Traceroute

Tracing route to defensenet-ic-302032-ash-b2.c.telia.net [62.115.32.2]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 213.248.102.173 dls-bb1-link.telia.net
5 32 32 32 62.115.137.46 ash-bb4-link.telia.net
6 32 32 32 62.115.113.217 ash-b1-link.telia.net
7 32 32 32 62.115.32.2 defensenet-ic-302032-ash-b2.c.telia.net

Trace complete

— end —
Address lookup
canonical name mail.telia.net.
aliases
addresses 81.236.57.10
Domain Whois record

Queried whois.internic.net with “dom telia.net”…

Domain Name: TELIA.NET
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Whois Server: whois.corporatedomains.com
Referral URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Name Server: DNS1.TELIA.COM
Name Server: DNS2.TELIA.COM
Name Server: DNS49.DE.TELIA.NET
Name Server: NS04.SAVVIS.NET
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 05-aug-2015
Creation Date: 10-aug-1995
Expiration Date: 09-aug-2016

>>> Last update of whois database: Mon, 04 Apr 2016 20:40:02 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.corporatedomains.com with “telia.net”…

Domain Name: telia.net
Registry Domain ID: 1883420_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2015-08-05T05:10:02Z
Creation Date: 1995-08-10T04:00:00Z
Registrar Registration Expiration Date: 2016-08-09T04:00:00Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: serverTransferProhibited http://www.icann.org/epp#serverTransferProhibited
Domain Status: serverDeleteProhibited http://www.icann.org/epp#serverDeleteProhibited
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: serverUpdateProhibited http://www.icann.org/epp#serverUpdateProhibited
Registry Registrant ID:
Registrant Name: Domain Manager
Registrant Organization: TeliaSonera AB
Registrant Street: Sturegatan 1
Registrant City: Stockholm
Registrant State/Province: .
Registrant Postal Code: SE-106 63
Registrant Country: SE
Registrant Phone: +46.850455000
Registrant Phone Ext:
Registrant Fax: +46.86114642
Registrant Fax Ext:
Registrant Email: domain-manager@teliasonera.com
Registry Admin ID:
Admin Name: Domain Manager
Admin Organization: TeliaSonera AB
Admin Street: Sturegatan 1
Admin City: Stockholm
Admin State/Province: .
Admin Postal Code: SE-106 63
Admin Country: SE
Admin Phone: +46.850455000
Admin Phone Ext:
Admin Fax: +46.86114642
Admin Fax Ext:
Admin Email: domain-manager@teliasonera.com
Registry Tech ID:
Tech Name: Registry Net
Tech Organization: TeliaSonera AB
Tech Street: Marbackagatan 11
Tech City: Stockholm
Tech State/Province: .
Tech Postal Code: SE-123 86
Tech Country: SE
Tech Phone: +46.84568930
Tech Phone Ext:
Tech Fax: +46.84568935
Tech Fax Ext:
Tech Email: dns@telia.net
Name Server: ns04.savvis.net
Name Server: dns2.telia.com
Name Server: dns1.telia.com
Name Server: dns49.de.telia.net
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2015-08-05T05:10:02Z <<<

Network Whois record

Queried whois.ripe.net with “-B 81.236.57.10″…

% Information related to ‘81.224.0.0 – 81.236.255.255’

% Abuse contact for ‘81.224.0.0 – 81.236.255.255’ is ‘abuse@telia.com’

inetnum: 81.224.0.0 – 81.236.255.255
netname: TELIANET
descr: Telia Network Services
descr: ISP
country: SE
admin-c: TR889-RIPE
tech-c: TR889-RIPE
remarks: ********************************
remarks: Abuse and intrusion reports should
remarks: be sent to: abuse@skanova.net
remarks: ********************************
status: ASSIGNED PA
notify: backbone@telia.net
mnt-domains: TELIANET-LIR
mnt-by: TELIANET-LIR
mnt-lower: TELIANET-LIR
mnt-routes: TELIANET-RR
created: 2005-04-18T14:43:34Z
last-modified: 2011-02-08T15:17:35Z
source: RIPE

role: TeliaNet Registry
address: TeliaSonera AB
address: Marbackagatan 11
address: SE-123 86 Farsta
address: Sweden
address: ********************************
address: Abuse and intrusion reports should
address: be sent to: abuse@telia.com
address: ********************************
abuse-mailbox: abuse@telia.com
fax-no: +46 8 6047006
e-mail: registry@telia.net
e-mail: dns@telia.net
e-mail: backbone@telia.net
admin-c: EVAO
tech-c: IC106-RIPE
tech-c: ACA-RIPE
tech-c: JS7984-RIPE
tech-c: EVAO
tech-c: PJ2540-RIPE
tech-c: LS483-RIPE
tech-c: PB8229-RIPE
tech-c: AS32219-RIPE
nic-hdl: TR889-RIPE
notify: mntripe@telia.net
mnt-by: TELIANET-LIR
created: 2002-08-21T12:58:15Z
last-modified: 2014-03-28T08:27:38Z
source: RIPE

% Information related to ‘81.224.0.0/12AS3301’

route: 81.224.0.0/12
descr: TELIANET-BLK
origin: AS3301
mnt-by: TELIANET-RR
created: 2002-10-09T08:17:11Z
last-modified: 2003-06-26T07:56:58Z
source: RIPE

% This query was served by the RIPE Database Query Service version 1.86 (DB-3)

DNS records
name class type data time to live
mail.telia.net IN A 81.236.57.10 300s (00:05:00)
telia.net IN SOA
server: dns1.telia.com
email: backbone@telia.net
serial: 2016040402
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 3600
300s (00:05:00)
telia.net IN TXT v=spf1 ip4:194.237.170.0/24 ip4:195.198.164.0/24 ip4:62.20.126.0/24 include:_spf-a.telia.net include:_spf-b.telia.net ~all 300s (00:05:00)
telia.net IN MX
preference: 10
exchange: mail.telia.net
300s (00:05:00)
telia.net IN NS dns49.de.telia.net 300s (00:05:00)
telia.net IN NS dns1.telia.com 300s (00:05:00)
telia.net IN NS ns04.savvis.net 300s (00:05:00)
telia.net IN NS dns2.telia.com 300s (00:05:00)
telia.net IN NAPTR
order: 90
preference: 50
flags: s
flags: SIP+D2U
flags:
replacement: _sip._udp.telia.net
300s (00:05:00)
telia.net IN NAPTR
order: 50
preference: 50
flags: s
flags: SIP+D2T
flags:
replacement: _sip._tcp.telia.net
300s (00:05:00)
10.57.236.81.in-addr.arpa IN PTR maila.telia.net 86400s (1.00:00:00)
57.236.81.in-addr.arpa IN SOA
server: dns.ddc.teliasonera.net
email: hostmaster@sonera.fi
serial: 2016040415
refresh: 28800
retry: 7200
expire: 604800
minimum ttl: 86400
86400s (1.00:00:00)
57.236.81.in-addr.arpa IN NS ns1-swe.global.sonera.se 86400s (1.00:00:00)
57.236.81.in-addr.arpa IN NS ns2-usa.global.sonera.net 86400s (1.00:00:00)
57.236.81.in-addr.arpa IN NS ns1-fin.global.sonera.fi 86400s (1.00:00:00)
57.236.81.in-addr.arpa IN NS ns2-fin.global.sonera.fi 86400s (1.00:00:00)
Traceroute

Tracing route to mail.telia.net [81.236.57.10]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 2 2 2 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 213.248.102.173 dls-bb1-link.telia.net
5 104 49 104 62.115.137.50 nyk-bb2-link.telia.net
6 133 133 133 80.91.249.28 kbn-bb4-link.telia.net
7 132 132 132 62.115.142.211 kbn-b3-link.telia.net
8 130 130 130 62.115.139.77 m-b-peer4-link.telia.net
9 131 131 131 81.228.85.68 ld-h-c3-link.se.telia.net
10 143 143 143 81.228.75.246 hy-c2-link.se.telia.net
11 139 139 139 81.228.73.136 hdn-r-d2-link.se.telia.net
12 140 139 139 81.228.93.183 hdn-r-a12-link.se.telia.net
13 139 139 139 90.228.166.164
14 143 142 142 81.224.167.228
15 * * *
16 * * *
17 * * *
18 * * *

Trace aborted

— end —
Address lookup
canonical name dns072.b.register.com.
aliases
addresses 216.21.232.72
Domain Whois record

Queried whois.internic.net with “dom REGISTER.COM”…

Domain Name: REGISTER.COM
Registrar: REGISTER.COM, INC.
Sponsoring Registrar IANA ID: 9
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: NS1.REGISTER.COM
Name Server: NS2.REGISTER.COM
Name Server: NS3.REGISTER.COM
Name Server: NS4.REGISTER.COM
Status: clientDeleteProhibited https://www.icann.org/epp#clientDeleteProhibited
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 22-apr-2014
Creation Date: 01-nov-1994
Expiration Date: 04-aug-2019

>>> Last update of whois database: Mon, 04 Apr 2016 17:11:24 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.register.com with “REGISTER.COM”…

Domain Name: register.com
Registry Domain ID: 3441369_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: http://www.register.com
Updated Date: 2009-08-26T04:00:00Z
Creation Date: 1994-11-01T05:00:00Z
Registrar Registration Expiration Date: 2019-08-04T04:00:00Z
Registrar: Register.com, Inc.
Registrar IANA ID: 9
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8773812449
Reseller:
Domain Status: clientTransferProhibited http://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://icann.org/epp#clientDeleteProhibited
Registry Registrant ID:
Registrant Name: Domain Registrar
Registrant Organization: Register.Com, Inc.
Registrant Street: 575 8th Avenue
Registrant City: New York
Registrant State/Province: NY
Registrant Postal Code: 10018
Registrant Country: US
Registrant Phone: +1.9027492701
Registrant Phone Ext.:
Registrant Fax:
Registrant Fax Ext.:
Registrant Email: domainregistrar@register.com
Registry Admin ID:
Admin Name: Domain Registrar
Admin Organization: Register.Com, Inc.
Admin Street: 575 8th Avenue
Admin City: New York
Admin State/Province: NY
Admin Postal Code: 10018
Admin Country: US
Admin Phone: +1.9027492701
Admin Phone Ext.:
Admin Fax:
Admin Fax Ext.:
Admin Email: domainregistrar@register.com
Registry Tech ID:
Tech Name: Domain Registrar
Tech Organization: Register.Com, Inc.
Tech Street: 575 8th Avenue
Tech City: New York
Tech State/Province: NY
Tech Postal Code: 10018
Tech Country: US
Tech Phone: +1.9027492701
Tech Phone Ext.:
Tech Fax:
Tech Fax Ext.:
Tech Email: domainregistrar@register.com
Name Server: ns2.register.com
Name Server: ns3.register.com
Name Server: ns4.register.com
Name Server: ns1.register.com
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2009-08-26T04:00:00Z <<<

Network Whois record

Queried whois.arin.net with “n 216.21.232.72″…

NetRange: 216.21.224.0 – 216.21.239.255
CIDR: 216.21.224.0/20
NetName: RCOM-1BLK
NetHandle: NET-216-21-224-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Register.com, Inc (REG)
RegDate: 2000-06-28
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-216-21-224-0-1
OrgName: Register.com, Inc
OrgId: REG
Address: 12808 Gran Bay Parkway West
City: Jacksonville
StateProv: FL
PostalCode: 32258
Country: US
RegDate: 1999-09-08
Updated: 2014-07-01
Ref: https://whois.arin.net/rest/org/REG
OrgTechHandle: NETWO55-ARIN
OrgTechName: Network Engineering
OrgTechPhone: +1-904-680-6600
OrgTechEmail: neteng@web.com
OrgTechRef: https://whois.arin.net/rest/poc/NETWO55-ARIN

OrgAbuseHandle: CUSTO-ARIN
OrgAbuseName: Customer Service
OrgAbusePhone: +1-800-899-9724
OrgAbuseEmail: support@register.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CUSTO-ARIN

OrgNOCHandle: NOC207-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-904-680-6600
OrgNOCEmail: ops@register.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC207-ARIN

DNS records

DNS query for 72.232.21.216.in-addr.arpa returned an error from the server: NameError
name class type data time to live
dns072.b.register.com IN A 216.21.232.72 600s (00:10:00)
register.com IN NS ns2.register.com 60s (00:01:00)
register.com IN NS ns4.register.com 60s (00:01:00)
register.com IN NS ns3.register.com 60s (00:01:00)
register.com IN A 216.21.238.29 60s (00:01:00)
register.com IN NS ns1.register.com 60s (00:01:00)
register.com IN MX
preference: 10
exchange: mx-s.myregisteredsite.com
60s (00:01:00)
register.com IN TXT v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all 60s (00:01:00)
register.com IN SOA
server: ns1.register.com
email: root@register.com
serial: 2016032901
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 60
60s (00:01:00)
72.232.21.216.in-addr.arpa IN PTR dns072.b.register.com 600s (00:10:00)
232.21.216.in-addr.arpa IN NS ns4.register.com 600s (00:10:00)
232.21.216.in-addr.arpa IN SOA
server: dns1.register.com
email: root@register.com
serial: 2006040600
refresh: 10800
retry: 3600
expire: 10800
minimum ttl: 600
600s (00:10:00)
232.21.216.in-addr.arpa IN NS ns2.register.com 600s (00:10:00)
232.21.216.in-addr.arpa IN NS ns3.register.com 600s (00:10:00)
232.21.216.in-addr.arpa IN NS ns1.register.com 600s (00:10:00)
Traceroute

Tracing route to dns072.b.register.com [216.21.232.72]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 0 0 0 80.239.195.177 dls-bb1-link.telia.net
5 34 34 34 80.91.252.121 ash-bb3-link.telia.net
6 32 32 32 213.155.130.86 ash-b1-link.telia.net
7 32 32 32 62.115.32.2 defensenet-ic-302032-ash-b2.c.telia.net
8 * * *
9 32 32 32 107.162.0.123
10 * * *
11 51 51 51 64.69.216.22
12 * * *
13 * * *
14 * * *
15 * * *

Trace aborted

— end —
Address lookup
canonical name dns205.a.register.com.
aliases
addresses 216.21.231.205
Domain Whois record

Queried whois.internic.net with “dom REGISTER.COM”…

Domain Name: REGISTER.COM
Registrar: REGISTER.COM, INC.
Sponsoring Registrar IANA ID: 9
Whois Server: whois.register.com
Referral URL: http://www.register.com
Name Server: NS1.REGISTER.COM
Name Server: NS2.REGISTER.COM
Name Server: NS3.REGISTER.COM
Name Server: NS4.REGISTER.COM
Status: clientDeleteProhibited https://www.icann.org/epp#clientDeleteProhibited
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 22-apr-2014
Creation Date: 01-nov-1994
Expiration Date: 04-aug-2019

>>> Last update of whois database: Mon, 04 Apr 2016 17:11:24 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.register.com with “REGISTER.COM”…

Domain Name: register.com
Registry Domain ID: 3441369_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.register.com
Registrar URL: http://www.register.com
Updated Date: 2009-08-26T04:00:00Z
Creation Date: 1994-11-01T05:00:00Z
Registrar Registration Expiration Date: 2019-08-04T04:00:00Z
Registrar: Register.com, Inc.
Registrar IANA ID: 9
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8773812449
Reseller:
Domain Status: clientTransferProhibited http://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://icann.org/epp#clientDeleteProhibited
Registry Registrant ID:
Registrant Name: Domain Registrar
Registrant Organization: Register.Com, Inc.
Registrant Street: 575 8th Avenue
Registrant City: New York
Registrant State/Province: NY
Registrant Postal Code: 10018
Registrant Country: US
Registrant Phone: +1.9027492701
Registrant Phone Ext.:
Registrant Fax:
Registrant Fax Ext.:
Registrant Email: domainregistrar@register.com
Registry Admin ID:
Admin Name: Domain Registrar
Admin Organization: Register.Com, Inc.
Admin Street: 575 8th Avenue
Admin City: New York
Admin State/Province: NY
Admin Postal Code: 10018
Admin Country: US
Admin Phone: +1.9027492701
Admin Phone Ext.:
Admin Fax:
Admin Fax Ext.:
Admin Email: domainregistrar@register.com
Registry Tech ID:
Tech Name: Domain Registrar
Tech Organization: Register.Com, Inc.
Tech Street: 575 8th Avenue
Tech City: New York
Tech State/Province: NY
Tech Postal Code: 10018
Tech Country: US
Tech Phone: +1.9027492701
Tech Phone Ext.:
Tech Fax:
Tech Fax Ext.:
Tech Email: domainregistrar@register.com
Name Server: ns2.register.com
Name Server: ns3.register.com
Name Server: ns4.register.com
Name Server: ns1.register.com
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2009-08-26T04:00:00Z <<<

Network Whois record

Queried whois.arin.net with “n 216.21.231.205″…

NetRange: 216.21.224.0 – 216.21.239.255
CIDR: 216.21.224.0/20
NetName: RCOM-1BLK
NetHandle: NET-216-21-224-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Register.com, Inc (REG)
RegDate: 2000-06-28
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-216-21-224-0-1
OrgName: Register.com, Inc
OrgId: REG
Address: 12808 Gran Bay Parkway West
City: Jacksonville
StateProv: FL
PostalCode: 32258
Country: US
RegDate: 1999-09-08
Updated: 2014-07-01
Ref: https://whois.arin.net/rest/org/REG
OrgTechHandle: NETWO55-ARIN
OrgTechName: Network Engineering
OrgTechPhone: +1-904-680-6600
OrgTechEmail: neteng@web.com
OrgTechRef: https://whois.arin.net/rest/poc/NETWO55-ARIN

OrgAbuseHandle: CUSTO-ARIN
OrgAbuseName: Customer Service
OrgAbusePhone: +1-800-899-9724
OrgAbuseEmail: support@register.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CUSTO-ARIN

OrgNOCHandle: NOC207-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-904-680-6600
OrgNOCEmail: ops@register.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC207-ARIN

DNS records

DNS query for 205.231.21.216.in-addr.arpa returned an error from the server: NameError
name class type data time to live
dns205.a.register.com IN A 216.21.231.205 600s (00:10:00)
register.com IN A 216.21.238.29 60s (00:01:00)
register.com IN TXT v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all 60s (00:01:00)
register.com IN NS ns1.register.com 60s (00:01:00)
register.com IN SOA
server: ns1.register.com
email: root@register.com
serial: 2016032901
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 60
60s (00:01:00)
register.com IN NS ns4.register.com 60s (00:01:00)
register.com IN NS ns3.register.com 60s (00:01:00)
register.com IN NS ns2.register.com 60s (00:01:00)
register.com IN MX
preference: 10
exchange: mx-s.myregisteredsite.com
60s (00:01:00)
205.231.21.216.in-addr.arpa IN PTR dns205.a.register.com 600s (00:10:00)
231.21.216.in-addr.arpa IN NS ns3.register.com 600s (00:10:00)
231.21.216.in-addr.arpa IN NS ns4.register.com 600s (00:10:00)
231.21.216.in-addr.arpa IN SOA
server: dns1.register.com
email: root@register.com
serial: 2006040600
refresh: 10800
retry: 3600
expire: 10800
minimum ttl: 600
600s (00:10:00)
231.21.216.in-addr.arpa IN NS ns2.register.com 600s (00:10:00)
231.21.216.in-addr.arpa IN NS ns1.register.com 600s (00:10:00)
Traceroute

Tracing route to dns205.a.register.com [216.21.231.205]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 1 2 2 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 0 1 0 80.239.195.177 dls-bb1-link.telia.net
5 32 32 32 213.155.137.52 ash-bb4-link.telia.net
6 34 32 32 62.115.113.217 ash-b1-link.telia.net
7 32 32 32 62.115.32.2 defensenet-ic-302032-ash-b2.c.telia.net
8 * * *
9 32 32 32 107.162.0.123
10 * * *
11 52 53 52 64.69.216.18
12 * * *
13 * * *
14 * * *
15 * * *

Trace aborted

— end —
log in | account info
CentralOps.net
Address lookup
lookup failed 107.162.0.123
Could not find a domain name corresponding to this IP address.
Domain Whois record

Don’t have a domain name for which to get a record
Network Whois record

Queried whois.arin.net with “n 107.162.0.123″…

NetRange: 107.162.0.0 – 107.162.255.255
CIDR: 107.162.0.0/16
NetName: DEFENSE-NET
NetHandle: NET-107-162-0-0-1
Parent: NET107 (NET-107-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS55002
Organization: Defense.Net, Inc (DEFEN-12)
RegDate: 2013-12-19
Updated: 2013-12-19
Comment: For more information about Defense.Net please visit our web site: www.defense.net
Ref: https://whois.arin.net/rest/net/NET-107-162-0-0-1
OrgName: Defense.Net, Inc
OrgId: DEFEN-12
Address: 1301 Shoreway Road Suite #380
City: Belmont
StateProv: CA
PostalCode: 94002
Country: US
RegDate: 2013-02-04
Updated: 2014-03-26
Comment: The Defense Network
Ref: https://whois.arin.net/rest/org/DEFEN-12
OrgAbuseHandle: NETOP225-ARIN
OrgAbuseName: netops
OrgAbusePhone: +1-866-329-4253
OrgAbuseEmail: netops@defense.net
OrgAbuseRef: https://whois.arin.net/rest/poc/NETOP225-ARIN

OrgNOCHandle: NETOP225-ARIN
OrgNOCName: netops
OrgNOCPhone: +1-866-329-4253
OrgNOCEmail: netops@defense.net
OrgNOCRef: https://whois.arin.net/rest/poc/NETOP225-ARIN

OrgTechHandle: NETOP225-ARIN
OrgTechName: netops
OrgTechPhone: +1-866-329-4253
OrgTechEmail: netops@defense.net
OrgTechRef: https://whois.arin.net/rest/poc/NETOP225-ARIN

DNS records

DNS query for 123.0.162.107.in-addr.arpa returned an error from the server: NameError

No records to display
Traceroute

Tracing route to 107.162.0.123 [107.162.0.123]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 0 0 0 213.248.102.173 dls-bb1-link.telia.net
5 32 32 32 62.115.137.46 ash-bb4-link.telia.net
6 33 33 33 62.115.117.188 rest-b1-link.telia.net
7 32 32 32 195.12.254.150 defensenet-ic-302030-ash-b1.c.telia.net
8 33 36 33 107.162.0.123

Trace complete

— end —
Address lookup
canonical name ghs.googlehosted.com.
aliases mail.defense.net
addresses 2607:f8b0:4003:c0a::79
64.233.160.121
Domain Whois record

Queried whois.internic.net with “dom defense.net”…

Domain Name: DEFENSE.NET
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Whois Server: whois.corporatedomains.com
Referral URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Name Server: NS1.DEFENSE.NET
Name Server: NS2.DEFENSE.NET
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Updated Date: 09-jul-2015
Creation Date: 07-dec-1999
Expiration Date: 07-dec-2021

>>> Last update of whois database: Mon, 04 Apr 2016 20:54:42 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.corporatedomains.com with “defense.net”…

Domain Name: defense.net
Registry Domain ID: 14763673_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2015-07-09T15:32:21Z
Creation Date: 1999-12-07T11:54:54Z
Registrar Registration Expiration Date: 2021-12-07T11:54:54Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: DNS Admin
Registrant Organization: F5 Networks, Inc.
Registrant Street: 401 Elliott Ave West
Registrant City: Seattle
Registrant State/Province: WA
Registrant Postal Code: 98119
Registrant Country: US
Registrant Phone: +1.2062725555
Registrant Phone Ext:
Registrant Fax: +1.2062725556
Registrant Fax Ext:
Registrant Email: dnsadmin@f5.com
Registry Admin ID:
Admin Name: DNS Admin
Admin Organization: F5 Networks, Inc.
Admin Street: 401 Elliott Ave West
Admin City: Seattle
Admin State/Province: WA
Admin Postal Code: 98119
Admin Country: US
Admin Phone: +1.2062725555
Admin Phone Ext:
Admin Fax: +1.2062725556
Admin Fax Ext:
Admin Email: dnsadmin@f5.com
Registry Tech ID:
Tech Name: Web Services Manager
Tech Organization: F5 Networks, Inc.
Tech Street: 401 Elliott Avenue West
Tech City: Seattle
Tech State/Province: WA
Tech Postal Code: 98119
Tech Country: US
Tech Phone: +1.2062725555
Tech Phone Ext:
Tech Fax: +1.2062725556
Tech Fax Ext:
Tech Email: dnsadmin@f5.com
Name Server: NS2.DEFENSE.NET
Name Server: NS1.DEFENSE.NET
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2015-07-09T15:32:21Z <<<

Network Whois record

Queried whois.arin.net with “n 64.233.160.121″…

NetRange: 64.233.160.0 – 64.233.191.255
CIDR: 64.233.160.0/19
NetName: GOOGLE
NetHandle: NET-64-233-160-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google Inc. (GOGL)
RegDate: 2003-08-18
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-64-233-160-0-1

OrgName: Google Inc.
OrgId: GOGL
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2000-03-30
Updated: 2015-11-06
Ref: https://whois.arin.net/rest/org/GOGL
OrgTechHandle: ZG39-ARIN
OrgTechName: Google Inc
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: network-abuse@google.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5250-ARIN

RTechHandle: ZG39-ARIN
RTechName: Google Inc
RTechPhone: +1-650-253-0000
RTechEmail: arin-contact@google.com
RTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

DNS records
name class type data time to live
mail.defense.net IN CNAME ghs.googlehosted.com 3599s (00:59:59)
ghs.googlehosted.com IN AAAA 2607:f8b0:4003:c03::79 300s (00:05:00)
ghs.googlehosted.com IN A 74.125.30.121 300s (00:05:00)
googlehosted.com IN SOA
server: ns2.google.com
email: dns-admin@google.com
serial: 118967755
refresh: 900
retry: 900
expire: 1800
minimum ttl: 60
60s (00:01:00)
googlehosted.com IN NS ns2.google.com 345600s (4.00:00:00)
googlehosted.com IN NS ns1.google.com 345600s (4.00:00:00)
googlehosted.com IN NS ns4.google.com 345600s (4.00:00:00)
googlehosted.com IN TXT v=spf1 -all 300s (00:05:00)
googlehosted.com IN NS ns3.google.com 345600s (4.00:00:00)
defense.net IN NS ns2.defense.net 3600s (01:00:00)
defense.net IN NS ns1.defense.net 3600s (01:00:00)
defense.net IN A 107.162.128.4 3600s (01:00:00)
defense.net IN MX
preference: 10
exchange: mail.f5.com
3600s (01:00:00)
defense.net IN MX
preference: 20
exchange: mail2.f5.com
3600s (01:00:00)
defense.net IN TXT v=spf1 ip4:172.17.2.145 ip4:173.205.61.130/32 ip4:173.205.61.50/32 ip4:46.33.92.26/32 ip4:183.182.80.186/32 ip4:107.162.0.0/16 include:mail.zendesk.com -all 60s (00:01:00)
defense.net IN SOA
server: madns1.sjc1.defense.net
email: hostmaster@defense.net
serial: 2016031604
refresh: 86400
retry: 7200
expire: 3600000
minimum ttl: 172800
60s (00:01:00)
121.160.233.64.in-addr.arpa IN PTR oi-in-f121.1e100.net 86400s (1.00:00:00)
160.233.64.in-addr.arpa IN NS ns1.google.com 345600s (4.00:00:00)
160.233.64.in-addr.arpa IN NS ns4.google.com 345600s (4.00:00:00)
160.233.64.in-addr.arpa IN SOA
server: ns1.google.com
email: dns-admin@google.com
serial: 118967755
refresh: 900
retry: 900
expire: 1800
minimum ttl: 60
60s (00:01:00)
160.233.64.in-addr.arpa IN NS ns3.google.com 345600s (4.00:00:00)
160.233.64.in-addr.arpa IN NS ns2.google.com 345600s (4.00:00:00)
9.7.0.0.0.0.0.0.0.0.0.0.0.0.0.0.a.0.c.0.3.0.0.4.0.b.8.f.7.0.6.2.ip6.arpa IN PTR ol-in-x79.1e100.net 86400s (1.00:00:00)
4.0.b.8.f.7.0.6.2.ip6.arpa IN NS ns2.google.com 345600s (4.00:00:00)
4.0.b.8.f.7.0.6.2.ip6.arpa IN NS ns3.google.com 345600s (4.00:00:00)
4.0.b.8.f.7.0.6.2.ip6.arpa IN NS ns4.google.com 345600s (4.00:00:00)
4.0.b.8.f.7.0.6.2.ip6.arpa IN SOA
server: ns2.google.com
email: dns-admin@google.com
serial: 118967755
refresh: 900
retry: 900
expire: 1800
minimum ttl: 60
60s (00:01:00)
4.0.b.8.f.7.0.6.2.ip6.arpa IN NS ns1.google.com 345600s (4.00:00:00)
Traceroute

Tracing route to mail.defense.net [64.233.160.121]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 0 0 0 50.97.16.37 25.10.6132.ip4.static.sl-reverse.com
5 0 0 0 66.249.95.164
6 0 0 0 72.14.237.219
7 7 7 8 209.85.251.99
8 7 7 7 209.85.255.95
9 * * *
10 7 7 7 64.233.160.121 oi-in-f121.1e100.net

Trace complete

— end —
Address lookup
canonical name f5.com.
aliases
addresses 2620:0:c14:f5f5:1::e8
104.219.106.168
Domain Whois record

Queried whois.internic.net with “dom f5.com”…

Domain Name: F5.COM
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Whois Server: whois.corporatedomains.com
Referral URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Name Server: PDNS130.F5.COM
Name Server: PDNS131.F5.COM
Name Server: PDNS150.F5.COM
Name Server: PDNS151.F5.COM
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 28-jul-2015
Creation Date: 31-may-1996
Expiration Date: 30-may-2016

>>> Last update of whois database: Mon, 04 Apr 2016 20:59:00 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.corporatedomains.com with “f5.com”…

Domain Name: f5.com
Registry Domain ID: 1267172_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2015-07-28T22:27:57Z
Creation Date: 1996-05-31T04:00:00Z
Registrar Registration Expiration Date: 2016-05-30T04:00:00Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: serverTransferProhibited http://www.icann.org/epp#serverTransferProhibited
Domain Status: serverDeleteProhibited http://www.icann.org/epp#serverDeleteProhibited
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: DNS Admin
Registrant Organization: F5 Networks, Inc.
Registrant Street: 401 Elliott Ave West
Registrant City: Seattle
Registrant State/Province: WA
Registrant Postal Code: 98119
Registrant Country: US
Registrant Phone: +1.2062725555
Registrant Phone Ext:
Registrant Fax: +1.2062725556
Registrant Fax Ext:
Registrant Email: dnsadmin@f5.com
Registry Admin ID:
Admin Name: DNS Admin
Admin Organization: F5 Networks, Inc.
Admin Street: 401 Elliott Ave West
Admin City: Seattle
Admin State/Province: WA
Admin Postal Code: 98119
Admin Country: US
Admin Phone: +1.2062725555
Admin Phone Ext:
Admin Fax: +1.2062725556
Admin Fax Ext:
Admin Email: dnsadmin@f5.com
Registry Tech ID:
Tech Name: Web Services Manager
Tech Organization: F5 Networks, Inc.
Tech Street: 401 Elliott Avenue West
Tech City: Seattle
Tech State/Province: WA
Tech Postal Code: 98119
Tech Country: US
Tech Phone: +1.2062725555
Tech Phone Ext:
Tech Fax: +1.2062725556
Tech Fax Ext:
Tech Email: d.botha@f5.com
Name Server: pdns131.f5.com
Name Server: pdns130.f5.com
Name Server: pdns151.f5.com
Name Server: pdns150.f5.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2015-07-28T22:27:57Z <<<

Network Whois record

Queried whois.arin.net with “n 104.219.106.168″…

NetRange: 104.219.104.0 – 104.219.111.255
CIDR: 104.219.104.0/21
NetName: F5COLO
NetHandle: NET-104-219-104-0-1
Parent: NET104 (NET-104-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22317
Organization: F5 Networks, Inc. (F5NETW)
RegDate: 2014-10-29
Updated: 2014-10-29
Ref: https://whois.arin.net/rest/net/NET-104-219-104-0-1
OrgName: F5 Networks, Inc.
OrgId: F5NETW
Address: 401 ELLIOTT AVE W
City: SEATTLE
StateProv: WA
PostalCode: 98119
Country: US
RegDate: 1999-09-24
Updated: 2011-09-24
Ref: https://whois.arin.net/rest/org/F5NETW
OrgAbuseHandle: IPADM382-ARIN
OrgAbuseName: IP ADMINSTRATOR
OrgAbusePhone: +1-206-272-5555
OrgAbuseEmail: IPADMIN@f5.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM382-ARIN

OrgTechHandle: IPADM382-ARIN
OrgTechName: IP ADMINSTRATOR
OrgTechPhone: +1-206-272-5555
OrgTechEmail: IPADMIN@f5.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM382-ARIN

DNS records

DNS query for 8.e.0.0.0.0.0.0.0.0.0.0.1.0.0.0.5.f.5.f.4.1.c.0.0.0.0.0.0.2.6.2.ip6.arpa failed: TimedOut
name class type data time to live
f5.com IN SOA
server: pdns130.f5.com
email: dnsadmin@f5.com
serial: 8237
refresh: 3600
retry: 900
expire: 1209600
minimum ttl: 3600
3600s (01:00:00)
f5.com IN A 104.219.106.168 30s (00:00:30)
f5.com IN MX
preference: 10
exchange: mail.f5.com
3600s (01:00:00)
f5.com IN MX
preference: 20
exchange: mail2.f5.com
3600s (01:00:00)
f5.com IN TXT MS=ms50853128 3600s (01:00:00)
f5.com IN TXT v=spf1 ip4:209.61.151.0/24 ip4:166.78.68.0/22 ip4:198.61.254.0/23 ip4:192.237.158.0/23 ip4:23.253.182.0/24 ip4:23.253.183.0/24 ip4:104.130.96.0/28 ip4:173.193.210.32/27 ip4:50.23.218.192/27 ip4:174.37.226.64/27 ip4:208.43.239.136/30
ip4:184.173.105.0/24 ip4:184.173.153.0/24 ip4:208.96.6.128/27 ip4:157.56.120.0/25 ip4:159.182.33.151/32 ip4:159.182.41.57/32 ip4:159.182.1.200/30 ip4:159.182.219.0/24 ip4:208.65.182.32/28
ip4:104.146.0.0/15 ip4:191.234.192.0/19 ip4:191.234.144.0/20 ip4:134.170.200.0/21 ip4:191.234.8.0/21 ip4:134.170.208.0/21 ip4:191.232.0.0/23 ip4:191.234.76.0/23 ip4:111.221.20.128/25 ip4:111.221.67.0/25 ip4:207.46.101.128/26 ip4:207.46.108.0/25
ip4:207.46.100.0/24 ip4:207.46.163.0/24 ip4:65.55.169.0/24 ip4:157.55.133.0/25 ip4:157.56.110.0/23 ip4:157.55.234.0/24 ip4:213.199.154.0/24 ip4:213.199.180.0/24 ip4:65.61.115.222/32 ip4:68.233.68.14/32 ip4:74.125.0.0/16 ip4:173.194.0.0/16
ip4:207.126.144.0/20 ip4:209.85.128.0/17 ip4:216.58.192.0/19 ip4:216.239.32.0/19 ip4:67.231.144.81/32 ip4:67.231.152.58/32 ip4:74.201.245.174/32 ip4:66.119.37.184/30 ip4:104.219.104.168/32 ip4:54.194.149.47/32 ip4:54.200.128.158/32
ip4:66.47.25.96/29 ip4:208.96.32.0/26 ip4:157.56.116.0/25 ip4:157.56.112.0/24 ip4:134.170.140.0/24 ip4:134.170.132.0/24 ip4:207.46.51.64/26 ip4:157.55.158.0/23 ip4:157.56.87.192/26 ip4:64.4.22.64/26 ip4:23.103.128.0/19 ip4:23.103.198.0/23
ip4:65.55.88.0/24 ip4:104.47.0.0/17 ip4:23.103.200.0/21 ip4:23.103.208.0/21 ip4:23.103.191.0/24 ip4:216.32.180.0/23 include:mktomail.com include:_spf.salesforce.com mx:f5.com mx:res.cisco.com -all 3600s (01:00:00)
f5.com IN NS pdns150.f5.com 3600s (01:00:00)
f5.com IN NS pdns151.f5.com 3600s (01:00:00)
f5.com IN NS pdns130.f5.com 3600s (01:00:00)
f5.com IN NS pdns131.f5.com 3600s (01:00:00)
168.106.219.104.in-addr.arpa IN PTR f5.com 86400s (1.00:00:00)
106.219.104.in-addr.arpa IN SOA
server: pdns130.f5.com
email: dnsadmin@f5.com
serial: 7844
refresh: 10800
retry: 3600
expire: 604800
minimum ttl: 86400
86400s (1.00:00:00)
106.219.104.in-addr.arpa IN NS pdns131.f5.com 86400s (1.00:00:00)
106.219.104.in-addr.arpa IN NS pdns150.f5.com 86400s (1.00:00:00)
106.219.104.in-addr.arpa IN NS pdns151.f5.com 86400s (1.00:00:00)
106.219.104.in-addr.arpa IN NS pdns130.f5.com 86400s (1.00:00:00)
Traceroute

Tracing route to f5.com [104.219.106.168]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.157 ae11.dar02.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.252 ae14.bbr01.eq01.dal03.networklayer.com
4 0 0 0 4.59.32.37
5 30 30 30 4.69.144.15 ae-1-60.edge2.losangeles9.level3.net
6 30 30 30 4.69.144.15 ae-1-60.edge2.losangeles9.level3.net
7 32 36 32 4.68.71.138
8 42 63 42 66.192.251.162 sfo1-ar1-xe-0-0-0-0.us.twtelecom.net
9 44 44 44 173.227.39.242
10 41 41 41 104.219.106.168 f5.com

Trace complete

— end —
mx:f5.com does not appear to be a valid domain name or IP address, or it contains extra characters.
Domain Dossier will continue with mx.
Address lookup
lookup failed mx
Could not find an IP address for this domain name.
Domain Whois record

Queried whois.iana.org with “mx”…

domain: MX

organisation: NIC-Mexico
organisation: ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico

contact: administrative
name: Oscar Alejandro Robles-Garay
organisation: NIC-Mexico, ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico
phone: +52 (81) 8864 2600
fax-no: +52 (81) 8864 2600
e-mail: orobles@nic.mx

contact: technical
name: POC TECH IANA
organisation: NIC-Mexico, ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico
phone: +52 (81) 8864 2600
fax-no: +52 (81) 8864 2600
e-mail: tech-iana@nic.mx

nserver: C.MX-NS.MX 192.100.224.1 2001:1258:0:0:0:0:0:1
nserver: E.MX-NS.MX 189.201.244.1
nserver: I.MX-NS.MX 207.248.68.1
nserver: M.MX-NS.MX 200.94.176.1 2001:13c7:7000:0:0:0:0:1
nserver: O.MX-NS.MX 200.23.1.1
nserver: X.MX-NS.MX 201.131.252.1
ds-rdata: 36752 8 2 97D2717943D0665FF814CF22596E8176BFCD1D656DE082B0D48F283BA4826B9F

whois: whois.mx

status: ACTIVE
remarks: Registration information: http://www.registry.mx/

created: 1989-02-01
changed: 2015-07-14
source: IANA

Network Whois record

Don’t have an IP address for which to get a record
DNS records
name class type data time to live
mx IN SOA
server: m.mx-ns.mx
email: hostmaster@nic.mx
serial: 1459804010
refresh: 900
retry: 900
expire: 604800
minimum ttl: 1800
86400s (1.00:00:00)
mx IN NS c.mx-ns.mx 86400s (1.00:00:00)
mx IN NS x.mx-ns.mx 86400s (1.00:00:00)
mx IN NS i.mx-ns.mx 86400s (1.00:00:00)
mx IN NS o.mx-ns.mx 86400s (1.00:00:00)
mx IN NS m.mx-ns.mx 86400s (1.00:00:00)
mx IN NS e.mx-ns.mx 86400s (1.00:00:00)
mx IN NSEC3PARAM
hash algorithm: SHA-1 (1)
flags: None (0)
iterations: 100
salt:
(64 bits)

EA9726F5B2DECC5E

86400s (1.00:00:00)
mx IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001C32D2D6FF163C3BCF2BA3EFA
B41AF24D9F1CEB4F09B4BF5D0DBF413E
07D88828893FD548FE0F7C73DA147597
0AF52DCE6FA7E73577E932269E6DA28F
62522D2D43979C7B4F1E41991CD2EC31
36A594057235C5A59C0FE624F99F8E93
CFEAC60F8D5B30BC610F48C742B519C4
1E7290FC40C10B7B594160853318AC58
3032D18917A09D4AC608032DC5C279E7
B6B8B6FDEB6545914F1185B9D863D8AA
E1807B14A60E8259DD6F0BF7DC9BE24A
C2416D910D347DF39D716E21958950E4
13D9398F8BB5D4202F2B52BA7DBD8714
3C19025067440C47A6A2E27E9677D3DF
FB2B29BED4832198797B4D4EEC0F86D9
A9E5C2787CC9D8A9CF19736384F7339D
9267F389

86400s (1.00:00:00)
mx IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001B44C657771A0B88768900D0D
AD0E013EC8B283134D90BCCC3C740E73
FE30DC881B7338500FCDF5A1C2769E80
0A97F89171E657C3B26F3A1F5CD2DBF5
2D945DBAFCE0061E37815A926CD78B95
55912E7806E7FE79359A7312C2844E3D
DE279D095C7ABDC7E43428C27F2EC922
EE3A455B9695B800F9FC62AE44364E5B
33C4E55D

86400s (1.00:00:00)
mx IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

3199B1B158E8ECD99A5BA795B7CE745A
F1513D61EC002B478C44DEEB7B5CA1AE
19A8EA0FD8AFEF6486DD2165245643D3
754A96E351EA099EC494AEB4821D9606
6DD4C7E59A1AD67D221566DF9830A353
CD48A30123CC53AA502AA9DD30DC225F
2EAD94DDFF6706706CA138ED9B3273B1
59E9E7D856770B90A0507F4D4378D412

86400s (1.00:00:00)
mx IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-06-01 14:00:00Z
signature inception: 2016-04-02 15:00:00Z
key tag: 36752
signer’s name: mx
signature:
(2048 bits)

0B0E4ABD239EE466C61CBDBF0561D3C8
76695312E752269B47AAA3E45B34BE16
BF5F28419C2142EC60D0ED024EA6DE04
D8F1B4A4F672620FB70A10149A2CA4E7
CBC32A09A9A2C633AE66D3B61D993B85
5AE35F246D1EBA1CC598B09181812D6D
203ABD2E0125BCF743CD51199B217DFC
DBD606B504D154F9A9A09583C5F12BFE
1DCB5AB188583839DB8B195645FCE275
053AF824C559DDE1DEC0DAC4FAD495B5
0EBB8DF2620AE62CFEA01FD7140EBB90
DC37E0870606E1711B5A302160DAD646
5AFFB3C22BA39A10228328E907C7BD1D
6B325BE7D816DC9EA0F8CB1F1C08530C
1232A7ADF2CFAF845CC141E551A3E39E
5115409263D180377503DC523FF75B5F

86400s (1.00:00:00)
mx IN RRSIG
type covered: NSEC3PARAM (51)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

234E4DDF5C0F632E1DDED3FDBD9E63BB
FEEF2BA8DA4926F3581643CBC590F739
20DF5965079F8D40D2DEB831107BFAE8
9E5D5DB088B58A6B09F04653AADAD9A3
7D1AA5A9EB4B930F8AE158A987718C5E
61F596F90C7220F4212F9EE002EFD87D
1FF375BAB4F1E89FE39BC0A15FF922AC
31FB7C53C08659689757C8D3D6BC7AFD

86400s (1.00:00:00)
mx IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

B3AFB1A0BE69576384E54058807C8B29
22AA8C3FE3D09E7538AB1ED95B9F04C4
7F00999858C4F411F86DBBDCB76FA7C3
20C298BAF04F2D4F0D6D8047F230D892
53B000FD9235D15451DFB974FAD277AA
4D7E5C6AAF442E1E87153D1C869A78B7
43DA3A8DE435ADF6114C167DB891BC26
DCD448FF9C0E694BC838060584CB997E

86400s (1.00:00:00)
mx IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

88E32961E8A84ECB68EECA0545C0AF00
6E8AC2914C87FA215E61A81ABF622E9B
E794AC298961E1C872956A618496013F
BB44279C9B32DCF2A29B5A15F1A0A773
3148773390E90C01159466005236E646
64649DDADE785B2E9248A2D6A4FDD1FA
516176385F0809D4F93511ADC915E40C
3678AA3A0AFE9A0FF2E51C5D53FDD08A

86400s (1.00:00:00)
Traceroute

Don’t have a destination IP address

— end —
mx:res.cisco.com does not appear to be a valid domain name or IP address, or it contains extra characters.
Domain Dossier will continue with mx.
Address lookup
lookup failed mx
Could not find an IP address for this domain name.
Domain Whois record

Queried whois.iana.org with “mx”…

domain: MX

organisation: NIC-Mexico
organisation: ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico

contact: administrative
name: Oscar Alejandro Robles-Garay
organisation: NIC-Mexico, ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico
phone: +52 (81) 8864 2600
fax-no: +52 (81) 8864 2600
e-mail: orobles@nic.mx

contact: technical
name: POC TECH IANA
organisation: NIC-Mexico, ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico
phone: +52 (81) 8864 2600
fax-no: +52 (81) 8864 2600
e-mail: tech-iana@nic.mx

nserver: C.MX-NS.MX 192.100.224.1 2001:1258:0:0:0:0:0:1
nserver: E.MX-NS.MX 189.201.244.1
nserver: I.MX-NS.MX 207.248.68.1
nserver: M.MX-NS.MX 200.94.176.1 2001:13c7:7000:0:0:0:0:1
nserver: O.MX-NS.MX 200.23.1.1
nserver: X.MX-NS.MX 201.131.252.1
ds-rdata: 36752 8 2 97D2717943D0665FF814CF22596E8176BFCD1D656DE082B0D48F283BA4826B9F

whois: whois.mx

status: ACTIVE
remarks: Registration information: http://www.registry.mx/

created: 1989-02-01
changed: 2015-07-14
source: IANA

Network Whois record

Don’t have an IP address for which to get a record
DNS records
name class type data time to live
mx IN NS i.mx-ns.mx 86400s (1.00:00:00)
mx IN NS x.mx-ns.mx 86400s (1.00:00:00)
mx IN NS o.mx-ns.mx 86400s (1.00:00:00)
mx IN NS c.mx-ns.mx 86400s (1.00:00:00)
mx IN NS e.mx-ns.mx 86400s (1.00:00:00)
mx IN NS m.mx-ns.mx 86400s (1.00:00:00)
mx IN NSEC3PARAM
hash algorithm: SHA-1 (1)
flags: None (0)
iterations: 100
salt:
(64 bits)

EA9726F5B2DECC5E

86400s (1.00:00:00)
mx IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001B44C657771A0B88768900D0D
AD0E013EC8B283134D90BCCC3C740E73
FE30DC881B7338500FCDF5A1C2769E80
0A97F89171E657C3B26F3A1F5CD2DBF5
2D945DBAFCE0061E37815A926CD78B95
55912E7806E7FE79359A7312C2844E3D
DE279D095C7ABDC7E43428C27F2EC922
EE3A455B9695B800F9FC62AE44364E5B
33C4E55D

86400s (1.00:00:00)
mx IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001C32D2D6FF163C3BCF2BA3EFA
B41AF24D9F1CEB4F09B4BF5D0DBF413E
07D88828893FD548FE0F7C73DA147597
0AF52DCE6FA7E73577E932269E6DA28F
62522D2D43979C7B4F1E41991CD2EC31
36A594057235C5A59C0FE624F99F8E93
CFEAC60F8D5B30BC610F48C742B519C4
1E7290FC40C10B7B594160853318AC58
3032D18917A09D4AC608032DC5C279E7
B6B8B6FDEB6545914F1185B9D863D8AA
E1807B14A60E8259DD6F0BF7DC9BE24A
C2416D910D347DF39D716E21958950E4
13D9398F8BB5D4202F2B52BA7DBD8714
3C19025067440C47A6A2E27E9677D3DF
FB2B29BED4832198797B4D4EEC0F86D9
A9E5C2787CC9D8A9CF19736384F7339D
9267F389

86400s (1.00:00:00)
mx IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

3199B1B158E8ECD99A5BA795B7CE745A
F1513D61EC002B478C44DEEB7B5CA1AE
19A8EA0FD8AFEF6486DD2165245643D3
754A96E351EA099EC494AEB4821D9606
6DD4C7E59A1AD67D221566DF9830A353
CD48A30123CC53AA502AA9DD30DC225F
2EAD94DDFF6706706CA138ED9B3273B1
59E9E7D856770B90A0507F4D4378D412

86400s (1.00:00:00)
mx IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-06-01 14:00:00Z
signature inception: 2016-04-02 15:00:00Z
key tag: 36752
signer’s name: mx
signature:
(2048 bits)

0B0E4ABD239EE466C61CBDBF0561D3C8
76695312E752269B47AAA3E45B34BE16
BF5F28419C2142EC60D0ED024EA6DE04
D8F1B4A4F672620FB70A10149A2CA4E7
CBC32A09A9A2C633AE66D3B61D993B85
5AE35F246D1EBA1CC598B09181812D6D
203ABD2E0125BCF743CD51199B217DFC
DBD606B504D154F9A9A09583C5F12BFE
1DCB5AB188583839DB8B195645FCE275
053AF824C559DDE1DEC0DAC4FAD495B5
0EBB8DF2620AE62CFEA01FD7140EBB90
DC37E0870606E1711B5A302160DAD646
5AFFB3C22BA39A10228328E907C7BD1D
6B325BE7D816DC9EA0F8CB1F1C08530C
1232A7ADF2CFAF845CC141E551A3E39E
5115409263D180377503DC523FF75B5F

86400s (1.00:00:00)
mx IN RRSIG
type covered: NSEC3PARAM (51)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

234E4DDF5C0F632E1DDED3FDBD9E63BB
FEEF2BA8DA4926F3581643CBC590F739
20DF5965079F8D40D2DEB831107BFAE8
9E5D5DB088B58A6B09F04653AADAD9A3
7D1AA5A9EB4B930F8AE158A987718C5E
61F596F90C7220F4212F9EE002EFD87D
1FF375BAB4F1E89FE39BC0A15FF922AC
31FB7C53C08659689757C8D3D6BC7AFD

86400s (1.00:00:00)
mx IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

B3AFB1A0BE69576384E54058807C8B29
22AA8C3FE3D09E7538AB1ED95B9F04C4
7F00999858C4F411F86DBBDCB76FA7C3
20C298BAF04F2D4F0D6D8047F230D892
53B000FD9235D15451DFB974FAD277AA
4D7E5C6AAF442E1E87153D1C869A78B7
43DA3A8DE435ADF6114C167DB891BC26
DCD448FF9C0E694BC838060584CB997E

86400s (1.00:00:00)
mx IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

88E32961E8A84ECB68EECA0545C0AF00
6E8AC2914C87FA215E61A81ABF622E9B
E794AC298961E1C872956A618496013F
BB44279C9B32DCF2A29B5A15F1A0A773
3148773390E90C01159466005236E646
64649DDADE785B2E9248A2D6A4FDD1FA
516176385F0809D4F93511ADC915E40C
3678AA3A0AFE9A0FF2E51C5D53FDD08A

86400s (1.00:00:00)
mx IN SOA
server: m.mx-ns.mx
email: hostmaster@nic.mx
serial: 1459804010
refresh: 900
retry: 900
expire: 604800
minimum ttl: 1800
86400s (1.00:00:00)
Traceroute

Don’t have a destination IP address

— end —
Address lookup
canonical name res.cisco.com.
aliases
addresses 184.94.241.74
Domain Whois record

Queried whois.internic.net with “dom cisco.com”…

Domain Name: CISCO.COM
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Whois Server: whois.corporatedomains.com
Referral URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Name Server: NS1.CISCO.COM
Name Server: NS2.CISCO.COM
Name Server: NS3.CISCO.COM
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 11-may-2015
Creation Date: 14-may-1987
Expiration Date: 15-may-2016

>>> Last update of whois database: Mon, 04 Apr 2016 11:40:45 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.corporatedomains.com with “cisco.com”…

Domain Name: cisco.com
Registry Domain ID: 4987030_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2015-05-11T05:16:27Z
Creation Date: 1987-05-14T04:00:00Z
Registrar Registration Expiration Date: 2016-05-15T04:00:00Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: serverTransferProhibited http://www.icann.org/epp#serverTransferProhibited
Domain Status: serverDeleteProhibited http://www.icann.org/epp#serverDeleteProhibited
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: serverUpdateProhibited http://www.icann.org/epp#serverUpdateProhibited
Registry Registrant ID:
Registrant Name: Info Sec
Registrant Organization: Cisco Technology Inc.
Registrant Street: 170 West Tasman Drive
Registrant City: San Jose
Registrant State/Province: CA
Registrant Postal Code: 95134
Registrant Country: US
Registrant Phone: +1.4085273842
Registrant Phone Ext:
Registrant Fax: +1.4085264575
Registrant Fax Ext:
Registrant Email: infosec@cisco.com
Registry Admin ID:
Admin Name: Info Sec
Admin Organization: Cisco Technology Inc.
Admin Street: 170 West Tasman Drive
Admin City: San Jose
Admin State/Province: CA
Admin Postal Code: 95134
Admin Country: US
Admin Phone: +1.4085273842
Admin Phone Ext:
Admin Fax: +1.4085264575
Admin Fax Ext:
Admin Email: infosec@cisco.com
Registry Tech ID:
Tech Name: Network Services
Tech Organization: Cisco Technology Inc.
Tech Street: 170 W. Tasman Drive
Tech City: San Jose
Tech State/Province: CA
Tech Postal Code: 95134
Tech Country: US
Tech Phone: +1.4085279223
Tech Phone Ext:
Tech Fax: +1.4085267373
Tech Fax Ext:
Tech Email: dns-info@CISCO.COM
Name Server: ns2.cisco.com
Name Server: ns1.cisco.com
Name Server: ns3.cisco.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2015-05-11T05:16:27Z <<<

Network Whois record

Queried whois.arin.net with “n 184.94.241.74″…

NetRange: 184.94.240.0 – 184.94.255.255
CIDR: 184.94.240.0/20
NetName: CISL-NET-4
NetHandle: NET-184-94-240-0-1
Parent: NET184 (NET-184-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Cisco Systems Ironport Division (CISL-7)
RegDate: 2011-05-05
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-184-94-240-0-1

OrgName: Cisco Systems Ironport Division
OrgId: CISL-7
Address: 170 West Tasman Drive
City: San Jose
StateProv: CA
PostalCode: 95134
Country: US
RegDate: 2010-11-09
Updated: 2014-11-13
Ref: https://whois.arin.net/rest/org/CISL-7
OrgAbuseHandle: INA15-ARIN
OrgAbuseName: Ironport Network Abuse
OrgAbusePhone: +1-650-898-1526
OrgAbuseEmail: netops-ironport@cisco.com
OrgAbuseRef: https://whois.arin.net/rest/poc/INA15-ARIN

OrgTechHandle: OD19-ARIN
OrgTechName: DeLong, Owen
OrgTechPhone: +1-408-890-7992
OrgTechEmail: owen@delong.com
OrgTechRef: https://whois.arin.net/rest/poc/OD19-ARIN

OrgTechHandle: ISO3-ARIN
OrgTechName: Ironport Network Operations
OrgTechPhone: +1-408-424-1164
OrgTechEmail: netops@ironport.com
OrgTechRef: https://whois.arin.net/rest/poc/ISO3-ARIN

OrgNOCHandle: ISO3-ARIN
OrgNOCName: Ironport Network Operations
OrgNOCPhone: +1-408-424-1164
OrgNOCEmail: netops@ironport.com
OrgNOCRef: https://whois.arin.net/rest/poc/ISO3-ARIN

DNS records
name class type data time to live
res.cisco.com IN SOA
server: adns1.ironport.com
email: stbu-hostmaster@cisco.com
serial: 1438879500
refresh: 1200
retry: 300
expire: 1209600
minimum ttl: 3600
300s (00:05:00)
res.cisco.com IN NS adns4.ironport.com 172800s (2.00:00:00)
res.cisco.com IN NS adns1.ironport.com 172800s (2.00:00:00)
res.cisco.com IN NS adns3.ironport.com 172800s (2.00:00:00)
res.cisco.com IN A 184.94.241.74 300s (00:05:00)
res.cisco.com IN MX
preference: 10
exchange: esa1.cres.iphmx.com
14400s (04:00:00)
res.cisco.com IN MX
preference: 10
exchange: esa2.cres.iphmx.com
14400s (04:00:00)
res.cisco.com IN MX
preference: 10
exchange: esa4.cres.iphmx.com
14400s (04:00:00)
res.cisco.com IN MX
preference: 10
exchange: esa3.cres.iphmx.com
14400s (04:00:00)
res.cisco.com IN TXT v=spf1 mx:res.cisco.com ~all 3600s (01:00:00)
cisco.com IN SOA
server: edns-aln1-1-l.cisco.com
email: postmaster@cisco.com
serial: 16067162
refresh: 7200
retry: 1800
expire: 864000
minimum ttl: 86400
86400s (1.00:00:00)
cisco.com IN NS ns1.cisco.com 86400s (1.00:00:00)
cisco.com IN NS ns2.cisco.com 86400s (1.00:00:00)
cisco.com IN NS ns3.cisco.com 86400s (1.00:00:00)
cisco.com IN MX
preference: 30
exchange: aer-mx-01.cisco.com
86400s (1.00:00:00)
cisco.com IN MX
preference: 10
exchange: alln-mx-01.cisco.com
86400s (1.00:00:00)
cisco.com IN MX
preference: 20
exchange: rcdn-mx-01.cisco.com
86400s (1.00:00:00)
cisco.com IN AAAA 2001:420:1101:1::a 86400s (1.00:00:00)
cisco.com IN A 72.163.4.161 86400s (1.00:00:00)
cisco.com IN TXT MS=ms65960035 86400s (1.00:00:00)
cisco.com IN TXT 926723159-3188410 86400s (1.00:00:00)
cisco.com IN TXT v=spf1 ip4:173.37.147.224/27 ip4:173.37.142.64/26 ip4:173.38.212.128/27 ip4:173.38.203.0/24 ip4:64.100.0.0/14 ip4:72.163.7.160/27 ip4:72.163.197.0/24 ip4:144.254.0.0/16 ip4:66.187.208.0/20 ip4:173.37.86.0/24
ip4:64.104.206.0/24 ip4:64.104.15.96/27 ip4:64.102.19.192/26 ip4:144.254.15.96/27 ip4:173.36.137.128/26 ip4:173.36.130.0/24 mx:res.cisco.com mx:sco.cisco.com ~all 86400s (1.00:00:00)
74.241.94.184.in-addr.arpa IN PTR sv4.res.cisco.com 3600s (01:00:00)
241.94.184.in-addr.arpa IN SOA
server: prod-ops-rdns-vip1.vega.ironport.com
email: stbu-hostmaster@cisco.com
serial: 1458202386
refresh: 14400
retry: 900
expire: 2419200
minimum ttl: 3600
3600s (01:00:00)
241.94.184.in-addr.arpa IN NS prod-ops-rdns-vip1.sv4.ironport.com 259200s (3.00:00:00)
241.94.184.in-addr.arpa IN NS prod-ops-rdns-vip2.sv4.ironport.com 259200s (3.00:00:00)
241.94.184.in-addr.arpa IN NS prod-ops-rdns-vip1.vega.ironport.com 259200s (3.00:00:00)
241.94.184.in-addr.arpa IN NS prod-ops-rdns-vip2.vega.ironport.com 259200s (3.00:00:00)
Traceroute

Tracing route to res.cisco.com [184.94.241.74]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 0 0 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 1 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 0 0 0 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 41 42 40 207.109.109.22
9 43 43 46 208.90.63.218
10 42 42 42 184.94.240.9
11 39 39 39 184.94.240.66
12 42 42 42 184.94.241.74 sv4.res.cisco.com

Trace complete

— end —
log in | account info
CentralOps.net

mx:sco.cisco.com does not appear to be a valid domain name or IP address, or it contains extra characters.
Domain Dossier will continue with mx.
Address lookup
lookup failed mx
Could not find an IP address for this domain name.
Domain Whois record

Queried whois.iana.org with “mx”…

domain: MX

organisation: NIC-Mexico
organisation: ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico

contact: administrative
name: Oscar Alejandro Robles-Garay
organisation: NIC-Mexico, ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico
phone: +52 (81) 8864 2600
fax-no: +52 (81) 8864 2600
e-mail: orobles@nic.mx

contact: technical
name: POC TECH IANA
organisation: NIC-Mexico, ITESM – Campus Monterrey
address: Av. Eugenio Garza Sada 427 Loc. 4, 5, 6
address: Monterrey Nuevo Leon 64840
address: Mexico
phone: +52 (81) 8864 2600
fax-no: +52 (81) 8864 2600
e-mail: tech-iana@nic.mx

nserver: C.MX-NS.MX 192.100.224.1 2001:1258:0:0:0:0:0:1
nserver: E.MX-NS.MX 189.201.244.1
nserver: I.MX-NS.MX 207.248.68.1
nserver: M.MX-NS.MX 200.94.176.1 2001:13c7:7000:0:0:0:0:1
nserver: O.MX-NS.MX 200.23.1.1
nserver: X.MX-NS.MX 201.131.252.1
ds-rdata: 36752 8 2 97D2717943D0665FF814CF22596E8176BFCD1D656DE082B0D48F283BA4826B9F

whois: whois.mx

status: ACTIVE
remarks: Registration information: http://www.registry.mx/

created: 1989-02-01
changed: 2015-07-14
source: IANA

Network Whois record

Don’t have an IP address for which to get a record
DNS records
name class type data time to live
mx IN SOA
server: m.mx-ns.mx
email: hostmaster@nic.mx
serial: 1459804910
refresh: 900
retry: 900
expire: 604800
minimum ttl: 1800
86400s (1.00:00:00)
mx IN NS x.mx-ns.mx 86400s (1.00:00:00)
mx IN NS e.mx-ns.mx 86400s (1.00:00:00)
mx IN NS m.mx-ns.mx 86400s (1.00:00:00)
mx IN NS c.mx-ns.mx 86400s (1.00:00:00)
mx IN NS i.mx-ns.mx 86400s (1.00:00:00)
mx IN NS o.mx-ns.mx 86400s (1.00:00:00)
mx IN NSEC3PARAM
hash algorithm: SHA-1 (1)
flags: None (0)
iterations: 100
salt:
(64 bits)

EA9726F5B2DECC5E

86400s (1.00:00:00)
mx IN DNSKEY
flags: SecureEntryPoint, ZoneKey (257)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(2080 bits)

03010001C32D2D6FF163C3BCF2BA3EFA
B41AF24D9F1CEB4F09B4BF5D0DBF413E
07D88828893FD548FE0F7C73DA147597
0AF52DCE6FA7E73577E932269E6DA28F
62522D2D43979C7B4F1E41991CD2EC31
36A594057235C5A59C0FE624F99F8E93
CFEAC60F8D5B30BC610F48C742B519C4
1E7290FC40C10B7B594160853318AC58
3032D18917A09D4AC608032DC5C279E7
B6B8B6FDEB6545914F1185B9D863D8AA
E1807B14A60E8259DD6F0BF7DC9BE24A
C2416D910D347DF39D716E21958950E4
13D9398F8BB5D4202F2B52BA7DBD8714
3C19025067440C47A6A2E27E9677D3DF
FB2B29BED4832198797B4D4EEC0F86D9
A9E5C2787CC9D8A9CF19736384F7339D
9267F389

86400s (1.00:00:00)
mx IN DNSKEY
flags: ZoneKey (256)
protocol: 3
algorithm: RSA/SHA-256 (8)
public key:
(1056 bits)

03010001B44C657771A0B88768900D0D
AD0E013EC8B283134D90BCCC3C740E73
FE30DC881B7338500FCDF5A1C2769E80
0A97F89171E657C3B26F3A1F5CD2DBF5
2D945DBAFCE0061E37815A926CD78B95
55912E7806E7FE79359A7312C2844E3D
DE279D095C7ABDC7E43428C27F2EC922
EE3A455B9695B800F9FC62AE44364E5B
33C4E55D

86400s (1.00:00:00)
mx IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

3199B1B158E8ECD99A5BA795B7CE745A
F1513D61EC002B478C44DEEB7B5CA1AE
19A8EA0FD8AFEF6486DD2165245643D3
754A96E351EA099EC494AEB4821D9606
6DD4C7E59A1AD67D221566DF9830A353
CD48A30123CC53AA502AA9DD30DC225F
2EAD94DDFF6706706CA138ED9B3273B1
59E9E7D856770B90A0507F4D4378D412

86400s (1.00:00:00)
mx IN RRSIG
type covered: DNSKEY (48)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-06-01 14:00:00Z
signature inception: 2016-04-02 15:00:00Z
key tag: 36752
signer’s name: mx
signature:
(2048 bits)

0B0E4ABD239EE466C61CBDBF0561D3C8
76695312E752269B47AAA3E45B34BE16
BF5F28419C2142EC60D0ED024EA6DE04
D8F1B4A4F672620FB70A10149A2CA4E7
CBC32A09A9A2C633AE66D3B61D993B85
5AE35F246D1EBA1CC598B09181812D6D
203ABD2E0125BCF743CD51199B217DFC
DBD606B504D154F9A9A09583C5F12BFE
1DCB5AB188583839DB8B195645FCE275
053AF824C559DDE1DEC0DAC4FAD495B5
0EBB8DF2620AE62CFEA01FD7140EBB90
DC37E0870606E1711B5A302160DAD646
5AFFB3C22BA39A10228328E907C7BD1D
6B325BE7D816DC9EA0F8CB1F1C08530C
1232A7ADF2CFAF845CC141E551A3E39E
5115409263D180377503DC523FF75B5F

86400s (1.00:00:00)
mx IN RRSIG
type covered: NSEC3PARAM (51)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

234E4DDF5C0F632E1DDED3FDBD9E63BB
FEEF2BA8DA4926F3581643CBC590F739
20DF5965079F8D40D2DEB831107BFAE8
9E5D5DB088B58A6B09F04653AADAD9A3
7D1AA5A9EB4B930F8AE158A987718C5E
61F596F90C7220F4212F9EE002EFD87D
1FF375BAB4F1E89FE39BC0A15FF922AC
31FB7C53C08659689757C8D3D6BC7AFD

86400s (1.00:00:00)
mx IN RRSIG
type covered: NS (2)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

B3AFB1A0BE69576384E54058807C8B29
22AA8C3FE3D09E7538AB1ED95B9F04C4
7F00999858C4F411F86DBBDCB76FA7C3
20C298BAF04F2D4F0D6D8047F230D892
53B000FD9235D15451DFB974FAD277AA
4D7E5C6AAF442E1E87153D1C869A78B7
43DA3A8DE435ADF6114C167DB891BC26
DCD448FF9C0E694BC838060584CB997E

86400s (1.00:00:00)
mx IN RRSIG
type covered: SOA (6)
algorithm: RSA/SHA-256 (8)
labels: 1
original ttl: 86400 (1.00:00:00)
signature expiration: 2016-05-04 00:00:00Z
signature inception: 2016-04-04 00:00:00Z
key tag: 26599
signer’s name: mx
signature:
(1024 bits)

0AB3E82CCFFD5091A7C357A290DFD9BC
EBF0780521DC6B0F781444FE42A56D55
FFC78794B247E3E50E4467D1BEC564C9
9DCE5DA43F23A5168E11AEC5C1ABA3D9
62DC98384AAADC1308B1631C6731BBB5
5321F3A163CA9D3770290BAA9126C287
27C856FE52E27FC349A74E20FBF39C64
BC6F4E3BDE1A9093CBEFFD1A835B3A20

86400s (1.00:00:00)
Traceroute

Don’t have a destination IP address

— end —
log in | account info
CentralOps.net
Address lookup
canonical name sco.cisco.com.
aliases
addresses 208.90.58.101
Domain Whois record

Queried whois.internic.net with “dom cisco.com”…

Domain Name: CISCO.COM
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Whois Server: whois.corporatedomains.com
Referral URL: http://www.cscglobal.com/global/web/csc/digital-brand-services.html
Name Server: NS1.CISCO.COM
Name Server: NS2.CISCO.COM
Name Server: NS3.CISCO.COM
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: serverDeleteProhibited https://www.icann.org/epp#serverDeleteProhibited
Status: serverTransferProhibited https://www.icann.org/epp#serverTransferProhibited
Status: serverUpdateProhibited https://www.icann.org/epp#serverUpdateProhibited
Updated Date: 11-may-2015
Creation Date: 14-may-1987
Expiration Date: 15-may-2016

>>> Last update of whois database: Mon, 04 Apr 2016 11:40:45 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.corporatedomains.com with “cisco.com”…

Domain Name: cisco.com
Registry Domain ID: 4987030_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.corporatedomains.com
Registrar URL: www.cscprotectsbrands.com
Updated Date: 2015-05-11T05:16:27Z
Creation Date: 1987-05-14T04:00:00Z
Registrar Registration Expiration Date: 2016-05-15T04:00:00Z
Registrar: CSC CORPORATE DOMAINS, INC.
Sponsoring Registrar IANA ID: 299
Registrar Abuse Contact Email: domainabuse@cscglobal.com
Registrar Abuse Contact Phone: +1.8887802723
Domain Status: serverTransferProhibited http://www.icann.org/epp#serverTransferProhibited
Domain Status: serverDeleteProhibited http://www.icann.org/epp#serverDeleteProhibited
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: serverUpdateProhibited http://www.icann.org/epp#serverUpdateProhibited
Registry Registrant ID:
Registrant Name: Info Sec
Registrant Organization: Cisco Technology Inc.
Registrant Street: 170 West Tasman Drive
Registrant City: San Jose
Registrant State/Province: CA
Registrant Postal Code: 95134
Registrant Country: US
Registrant Phone: +1.4085273842
Registrant Phone Ext:
Registrant Fax: +1.4085264575
Registrant Fax Ext:
Registrant Email: infosec@cisco.com
Registry Admin ID:
Admin Name: Info Sec
Admin Organization: Cisco Technology Inc.
Admin Street: 170 West Tasman Drive
Admin City: San Jose
Admin State/Province: CA
Admin Postal Code: 95134
Admin Country: US
Admin Phone: +1.4085273842
Admin Phone Ext:
Admin Fax: +1.4085264575
Admin Fax Ext:
Admin Email: infosec@cisco.com
Registry Tech ID:
Tech Name: Network Services
Tech Organization: Cisco Technology Inc.
Tech Street: 170 W. Tasman Drive
Tech City: San Jose
Tech State/Province: CA
Tech Postal Code: 95134
Tech Country: US
Tech Phone: +1.4085279223
Tech Phone Ext:
Tech Fax: +1.4085267373
Tech Fax Ext:
Tech Email: dns-info@CISCO.COM
Name Server: ns2.cisco.com
Name Server: ns1.cisco.com
Name Server: ns3.cisco.com
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2015-05-11T05:16:27Z <<<

Network Whois record

Queried whois.arin.net with “n 208.90.58.101″…

NetRange: 208.90.56.0 – 208.90.63.255
CIDR: 208.90.56.0/21
NetName: NETWORK-IRONPORT-SYSTEMS-2
NetHandle: NET-208-90-56-0-1
Parent: NET208 (NET-208-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Cisco Systems Ironport Division (CISL-7)
RegDate: 2008-05-02
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-208-90-56-0-1
OrgName: Cisco Systems Ironport Division
OrgId: CISL-7
Address: 170 West Tasman Drive
City: San Jose
StateProv: CA
PostalCode: 95134
Country: US
RegDate: 2010-11-09
Updated: 2014-11-13
Ref: https://whois.arin.net/rest/org/CISL-7
OrgAbuseHandle: INA15-ARIN
OrgAbuseName: Ironport Network Abuse
OrgAbusePhone: +1-408-424-1164
OrgAbuseEmail: network-abuse@ironport.com
OrgAbuseRef: https://whois.arin.net/rest/poc/INA15-ARIN

OrgTechHandle: ISO3-ARIN
OrgTechName: Ironport Network Operations
OrgTechPhone: +1-408-424-1164
OrgTechEmail: netops-ironport@cisco.com
OrgTechRef: https://whois.arin.net/rest/poc/ISO3-ARIN

OrgTechHandle: OD19-ARIN
OrgTechName: DeLong, Owen
OrgTechPhone: +1-408-890-7992
OrgTechEmail: owen@delong.com
OrgTechRef: https://whois.arin.net/rest/poc/OD19-ARIN

OrgNOCHandle: ISO3-ARIN
OrgNOCName: Ironport Network Operations
OrgNOCPhone: +1-408-424-1164
OrgNOCEmail: netops-ironport@cisco.com
OrgNOCRef: https://whois.arin.net/rest/poc/ISO3-ARIN

DNS records
name class type data time to live
sco.cisco.com IN A 208.90.58.101 300s (00:05:00)
sco.cisco.com IN NS asia3.akam.net 300s (00:05:00)
sco.cisco.com IN NS ns1-73.akam.net 300s (00:05:00)
sco.cisco.com IN NS use1.akam.net 300s (00:05:00)
sco.cisco.com IN NS ns1-109.akam.net 300s (00:05:00)
sco.cisco.com IN NS ns1-90.akam.net 300s (00:05:00)
sco.cisco.com IN NS ns1-117.akam.net 300s (00:05:00)
sco.cisco.com IN NS ns1-93.akam.net 300s (00:05:00)
sco.cisco.com IN NS ns1-11.akam.net 300s (00:05:00)
sco.cisco.com IN SOA
server: use1.akam.net
email: stbu-hostmaster@cisco.com
serial: 1459771784
refresh: 1200
retry: 300
expire: 1209600
minimum ttl: 3600
300s (00:05:00)
sco.cisco.com IN MX
preference: 10
exchange: jira.sco.cisco.com
300s (00:05:00)
sco.cisco.com IN TXT v=spf1 ip4:208.90.57.0/24 ip4:108.171.128.0/24 ip4:108.171.129.0/24 ip4:108.171.130.0/24 ip4:108.171.131.0/24 ip4:108.171.132.0/24 ip4:108.171.133.0/24 ip4:108.171.134.0/24 ip4:210.55.186.0/24 ip4:68.232.129.181 ip4:68.232.135.80 include:cisco.com ~all 300s (00:05:00)
cisco.com IN SOA
server: edns-aln1-1-l.cisco.com
email: postmaster@cisco.com
serial: 16067190
refresh: 7200
retry: 1800
expire: 864000
minimum ttl: 86400
86400s (1.00:00:00)
cisco.com IN NS ns2.cisco.com 86400s (1.00:00:00)
cisco.com IN NS ns1.cisco.com 86400s (1.00:00:00)
cisco.com IN NS ns3.cisco.com 86400s (1.00:00:00)
cisco.com IN MX
preference: 10
exchange: alln-mx-01.cisco.com
86400s (1.00:00:00)
cisco.com IN MX
preference: 30
exchange: aer-mx-01.cisco.com
86400s (1.00:00:00)
cisco.com IN MX
preference: 20
exchange: rcdn-mx-01.cisco.com
86400s (1.00:00:00)
cisco.com IN AAAA 2001:420:1101:1::a 86400s (1.00:00:00)
cisco.com IN A 72.163.4.161 86400s (1.00:00:00)
cisco.com IN TXT 926723159-3188410 86400s (1.00:00:00)
cisco.com IN TXT MS=ms65960035 86400s (1.00:00:00)
cisco.com IN TXT v=spf1 ip4:173.37.147.224/27 ip4:173.37.142.64/26 ip4:173.38.212.128/27 ip4:173.38.203.0/24 ip4:64.100.0.0/14 ip4:72.163.7.160/27 ip4:72.163.197.0/24 ip4:144.254.0.0/16 ip4:66.187.208.0/20 ip4:173.37.86.0/24
ip4:64.104.206.0/24 ip4:64.104.15.96/27 ip4:64.102.19.192/26 ip4:144.254.15.96/27 ip4:173.36.137.128/26 ip4:173.36.130.0/24 mx:res.cisco.com mx:sco.cisco.com ~all 86400s (1.00:00:00)
101.58.90.208.in-addr.arpa IN PTR jira.sco.cisco.com 3600s (01:00:00)
58.90.208.in-addr.arpa IN SOA
server: adns1.ironport.com
email: stbu-hostmaster@cisco.com
serial: 1458202386
refresh: 14400
retry: 900
expire: 2419200
minimum ttl: 3600
3600s (01:00:00)
58.90.208.in-addr.arpa IN NS adns4.ironport.com 172800s (2.00:00:00)
58.90.208.in-addr.arpa IN NS adns3.ironport.com 172800s (2.00:00:00)
58.90.208.in-addr.arpa IN NS adns1.ironport.com 172800s (2.00:00:00)
58.90.208.in-addr.arpa IN NS adns2.ironport.com 172800s (2.00:00:00)
Traceroute

Tracing route to sco.cisco.com [208.90.58.101]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 5 0 0 206.223.118.123 ge1-1.fr1.dal.llnw.net
5 42 24 25 68.142.64.25 tge1-8.fr4.phx7.llnw.net
6 34 40 34 68.142.64.30 tge26-2.fr4.lax.llnw.net
7 38 44 38 69.28.172.85 tge2-4.fr3.las.llnw.net
8 39 39 39 208.111.176.2 switch.ge3-1.fr3.las.llnw.net
9 43 42 42 199.189.116.242 cust-199.189.116.242.sinap-tix.com
10 44 43 43 64.79.157.66 demarc3.ironport.sinap-tix.com
11 42 42 42 208.90.56.105
12 41 41 41 208.90.58.101 jira.sco.cisco.com

Trace complete

— end —
Address lookup
lookup failed _netblocks.mimecast.com
Could not find an IP address for this domain name.
Domain Whois record

Queried whois.internic.net with “dom mimecast.com”…

Domain Name: MIMECAST.COM
Registrar: GODADDY.COM, LLC
Sponsoring Registrar IANA ID: 146
Whois Server: whois.godaddy.com
Referral URL: http://www.godaddy.com
Name Server: DNS01.MIMECAST.COM
Name Server: DNS02.MIMECAST.COM
Name Server: DNS03.MIMECAST.COM
Name Server: DNS04.MIMECAST.COM
Status: clientDeleteProhibited https://www.icann.org/epp#clientDeleteProhibited
Status: clientRenewProhibited https://www.icann.org/epp#clientRenewProhibited
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Status: clientUpdateProhibited https://www.icann.org/epp#clientUpdateProhibited
Updated Date: 14-apr-2015
Creation Date: 20-feb-2003
Expiration Date: 13-dec-2023

>>> Last update of whois database: Mon, 04 Apr 2016 12:39:37 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.godaddy.com with “mimecast.com”…

Domain Name: MIMECAST.COM
Registry Domain ID: 95127698_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Update Date: 2014-08-18T19:15:11Z
Creation Date: 2003-02-20T18:48:27Z
Registrar Registration Expiration Date: 2023-12-13T23:30:43Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registrar Abuse Contact Email: abuse@godaddy.com
Registrar Abuse Contact Phone: +1.4806242505
Domain Status: clientTransferProhibited http://www.icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited http://www.icann.org/epp#clientUpdateProhibited
Domain Status: clientRenewProhibited http://www.icann.org/epp#clientRenewProhibited
Domain Status: clientDeleteProhibited http://www.icann.org/epp#clientDeleteProhibited
Registry Registrant ID: Not Available From Registry
Registrant Name: Deepak Kumaraswamy
Registrant Organization: Mimecast Services Limited
Registrant Street: CityPoint, One Ropemaker Street
Registrant Street: Moorgate
Registrant City: London
Registrant State/Province:
Registrant Postal Code: EC2Y 9AW
Registrant Country: UK
Registrant Phone: +44.2078478700
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: deepak@mimecast.com
Registry Admin ID: Not Available From Registry
Admin Name: Deepak Kumaraswamy
Admin Organization: Mimecast Services Limited
Admin Street: CityPoint, One Ropemaker Street
Admin Street: Moorgate
Admin City: London
Admin State/Province:
Admin Postal Code: EC2Y 9AW
Admin Country: UK
Admin Phone: +44.2078478700
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: deepak@mimecast.com
Registry Tech ID: Not Available From Registry
Tech Name: Deepak Kumaraswamy
Tech Organization: Mimecast Services Limited
Tech Street: CityPoint, One Ropemaker Street
Tech Street: Moorgate
Tech City: London
Tech State/Province:
Tech Postal Code: EC2Y 9AW
Tech Country: UK
Tech Phone: +44.2078478700
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: deepak@mimecast.com
Name Server: DNS01.MIMECAST.COM
Name Server: DNS02.MIMECAST.COM
Name Server: DNS03.MIMECAST.COM
Name Server: DNS04.MIMECAST.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2016-04-04T12:00:00Z <<<

For more information on Whois status codes, please visit https://www.icann.org/resources/pages/epp-status-codes-2014-06-16-en

Network Whois record

Don’t have an IP address for which to get a record
DNS records
name class type data time to live
_netblocks.mimecast.com IN TXT v=spf1 include:eu._netblocks.mimecast.com include:us._netblocks.mimecast.com include:za._netblocks.mimecast.com include:au._netblocks.mimecast.com ~all 300s (00:05:00)
mimecast.com IN SOA
server: dns01.mimecast.com
email: root@mimecast.com
serial: 1095495
refresh: 900
retry: 900
expire: 604800
minimum ttl: 86400
86400s (1.00:00:00)
mimecast.com IN NS dns04.mimecast.com 86400s (1.00:00:00)
mimecast.com IN NS dns01.mimecast.com 86400s (1.00:00:00)
mimecast.com IN NS dns03.mimecast.com 86400s (1.00:00:00)
mimecast.com IN NS dns02.mimecast.com 86400s (1.00:00:00)
mimecast.com IN A 146.101.202.134 300s (00:05:00)
mimecast.com IN MX
preference: 10
exchange: service-alpha-inbound-b.mimecast.com
300s (00:05:00)
mimecast.com IN MX
preference: 10
exchange: service-alpha-inbound-a.mimecast.com
300s (00:05:00)
mimecast.com IN TXT v=spf1 include:_netblocks.mimecast.com ip4:146.101.202.128/27 ip4:62.6.159.224/27 ip4:196.35.12.112/29 ip4:66.8.44.192/29 ip4:209.202.154.96/27 ip4:50.200.237.160/27 include:mktomail.com -all 86400s (1.00:00:00)
Traceroute

Don’t have a destination IP address

— end —
Address lookup
canonical name mktomail.com.
aliases
addresses 72.47.231.49
Domain Whois record

Queried whois.internic.net with “dom mktomail.com”…

Domain Name: MKTOMAIL.COM
Registrar: NETWORK SOLUTIONS, LLC.
Sponsoring Registrar IANA ID: 2
Whois Server: whois.networksolutions.com
Referral URL: http://networksolutions.com
Name Server: NS1.MARKETO.COM
Name Server: NS2.MKTDNS.COM
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Updated Date: 27-nov-2014
Creation Date: 09-jul-2008
Expiration Date: 09-jul-2018

>>> Last update of whois database: Mon, 04 Apr 2016 19:58:28 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.networksolutions.com with “mktomail.com”…

Domain Name: MKTOMAIL.COM
Registry Domain ID: 1507141164_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2015-01-29T00:39:54Z
Creation Date: 2008-07-09T00:08:13Z
Registrar Registration Expiration Date: 2018-07-08T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8003337680
Reseller:
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: Marketo, Inc
Registrant Organization: Marketo, Inc
Registrant Street: 901 Mariners Island Blvd Suite 500
Registrant City: San Mateo
Registrant State/Province: CA
Registrant Postal Code: 94404
Registrant Country: US
Registrant Phone: +1.6503762300
Registrant Phone Ext:
Registrant Fax: +1.6503762331
Registrant Fax Ext:
Registrant Email: no.valid.email@worldnic.com
Registry Admin ID:
Admin Name: Morandi, David
Admin Organization: Marketo, Inc
Admin Street: 901 Mariners Island Blvd
Admin City: San Mateo
Admin State/Province: CA
Admin Postal Code: 94404
Admin Country: US
Admin Phone: +1.6503762316
Admin Phone Ext:
Admin Fax: +1.6502762331
Admin Fax Ext:
Admin Email: abuse@marketo.com
Registry Tech ID:
Tech Name: Rogozhkin, Alexey
Tech Organization: Marketo, Inc.
Tech Street: 901 Mariners Island Blvd.
Tech City: San Mateo
Tech State/Province: CA
Tech Postal Code: 94404
Tech Country: US
Tech Phone: +1.6502404617
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: abuse@marketo.com
Name Server: NS1.MARKETO.COM
Name Server: NS2.MKTDNS.COM
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of whois database: Mon, 04 Apr 2016 19:58:28 GMT <<<

Network Whois record

Queried whois.arin.net with “n 72.47.231.49″…

NetRange: 72.47.192.0 – 72.47.255.255
CIDR: 72.47.192.0/18
NetName: MEDIATEMPLE-105
NetHandle: NET-72-47-192-0-1
Parent: NET72 (NET-72-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Media Temple, Inc. (MEDIAT-10)
RegDate: 2007-05-30
Updated: 2012-03-20
Ref: https://whois.arin.net/rest/net/NET-72-47-192-0-1
OrgName: Media Temple, Inc.
OrgId: MEDIAT-10
Address: 8520 National Blvd.
Address: Building B
City: Culver City
StateProv: CA
PostalCode: 90232
Country: US
RegDate: 2001-05-15
Updated: 2015-08-24
Ref: https://whois.arin.net/rest/org/MEDIAT-10
OrgTechHandle: NA230-ARIN
OrgTechName: NOC Hosting Operations
OrgTechPhone: +1-877-578-4000
OrgTechEmail: dnsadmin@mediatemple.net
OrgTechRef: https://whois.arin.net/rest/poc/NA230-ARIN

OrgAbuseHandle: ABUSE418-ARIN
OrgAbuseName: Abuse Desk
OrgAbusePhone: +1-877-578-4000
OrgAbuseEmail: abuse@mediatemple.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE418-ARIN

RAbuseHandle: ABUSE418-ARIN
RAbuseName: Abuse Desk
RAbusePhone: +1-877-578-4000
RAbuseEmail: abuse@mediatemple.net
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE418-ARIN

RNOCHandle: NA230-ARIN
RNOCName: NOC Hosting Operations
RNOCPhone: +1-877-578-4000
RNOCEmail: dnsadmin@mediatemple.net
RNOCRef: https://whois.arin.net/rest/poc/NA230-ARIN

RTechHandle: NA230-ARIN
RTechName: NOC Hosting Operations
RTechPhone: +1-877-578-4000
RTechEmail: dnsadmin@mediatemple.net
RTechRef: https://whois.arin.net/rest/poc/NA230-ARIN

DNS records
name class type data time to live
mktomail.com IN SOA
server: ns1.marketo.com
email: ops@localhost
serial: 2015122300
refresh: 1800
retry: 1800
expire: 604800
minimum ttl: 1800
900s (00:15:00)
mktomail.com IN NS ns2.mktdns.com 900s (00:15:00)
mktomail.com IN NS ns1.marketo.com 900s (00:15:00)
mktomail.com IN A 72.47.231.49 86400s (1.00:00:00)
mktomail.com IN MX
preference: 0
exchange: mktomail-com.mail.protection.outlook.com
900s (00:15:00)
mktomail.com IN TXT MS=ms86038015 900s (00:15:00)
mktomail.com IN TXT v=spf1 ip4:199.15.212.0/22 ip4:72.3.185.0/24 ip4:72.32.154.0/24 ip4:72.32.217.0/24 ip4:72.32.243.0/24 ip4:94.236.119.0/26 ip4:37.188.97.188/32 ip4:185.28.196.0/22 ip4:192.28.128.0/18 ip4:103.237.104.0/22 ip6:2a04:35c0::/29 ~all 900s (00:15:00)
mktomail.com IN TXT google-site-verification=hlFqCorHDm61oaA9tEbxS2EoxvmpThp60Z3A8osUq5I 900s (00:15:00)
49.231.47.72.in-addr.arpa IN PTR agaacqsqgq.c04.gridserver.com 43200s (12:00:00)
231.47.72.in-addr.arpa IN NS ns1.mediatemple.net 86400s (1.00:00:00)
231.47.72.in-addr.arpa IN NS ns2.mediatemple.net 86400s (1.00:00:00)
231.47.72.in-addr.arpa IN SOA
server: ns1.mediatemple.net
email: dnsadmin@mediatemple.net
serial: 2016040407
refresh: 10800
retry: 3600
expire: 1209600
minimum ttl: 43200
86400s (1.00:00:00)
Traceroute

Tracing route to mktomail.com [72.47.231.49]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.254 ae14.bbr02.eq01.dal03.networklayer.com
4 0 2 0 157.238.224.229 ae-11.r01.dllstx04.us.bb.gin.ntt.net
5 0 0 0 129.250.3.232 ae-5.r08.dllstx09.us.bb.gin.ntt.net
6 4 8 8 129.250.66.78 ae-0.centurylink.dllstx09.us.bb.gin.ntt.net
7 * * *
8 31 31 31 63.158.61.114 63-158-61-114.dia.static.qwest.net
9 32 32 32 72.10.63.166 e2.2.cr02.lax01.mtsvc.net
10 38 34 40 72.10.63.198 e1.1.as02.lax01.mtsvc.net
11 43 34 39 72.10.63.250 e1.3.as06.lax02.mtsvc.net
12 34 34 34 72.47.231.49 agaacqsqgq.c04.gridserver.com

Trace complete

— end —
Address lookup
lookup failed unassigned170.nyiix.net
Could not find an IP address for this domain name.
Domain Whois record

Queried whois.internic.net with “dom nyiix.net”…

Domain Name: NYIIX.NET
Registrar: NETWORK SOLUTIONS, LLC.
Sponsoring Registrar IANA ID: 2
Whois Server: whois.networksolutions.com
Referral URL: http://networksolutions.com
Name Server: NS1.CDNETDNS.NET
Name Server: NS2.CDNETDNS.NET
Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Updated Date: 18-may-2015
Creation Date: 14-may-1996
Expiration Date: 15-may-2016

>>> Last update of whois database: Mon, 04 Apr 2016 20:06:18 GMT <<<

For more information on Whois status codes, please visit https://icann.org/epp

Queried whois.networksolutions.com with “nyiix.net”…

Domain Name: NYIIX.NET
Registry Domain ID: 3509316_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://www.networksolutions.com/en_US/
Updated Date: 2015-03-16T07:25:06Z
Creation Date: 1996-05-14T04:00:00Z
Registrar Registration Expiration Date: 2016-05-15T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrar Abuse Contact Email: abuse@web.com
Registrar Abuse Contact Phone: +1.8003337680
Reseller:
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: TELEHOUSE America
Registrant Organization: TELEHOUSE America
Registrant Street: 7 Teleport Drive
Registrant City: Staten Island
Registrant State/Province: NY
Registrant Postal Code: 10311
Registrant Country: US
Registrant Phone: +1.7183552509
Registrant Phone Ext:
Registrant Fax: +1.7183552517
Registrant Fax Ext:
Registrant Email: sugeno@TELEHOUSE.COM
Registry Admin ID:
Admin Name: SUGENO, Akio
Admin Organization: Telehouse International Corp of America
Admin Street: 7 TELEPORT DR
Admin City: STATEN ISLAND
Admin State/Province: NY
Admin Postal Code: 10311-1001
Admin Country: US
Admin Phone: +1.7183552509
Admin Phone Ext:
Admin Fax: +1.7183552517
Admin Fax Ext:
Admin Email: sugeno@TELEHOUSE.COM
Registry Tech ID:
Tech Name: SUGENO, Akio
Tech Organization: Telehouse International Corp of America
Tech Street: 7 TELEPORT DR
Tech City: STATEN ISLAND
Tech State/Province: NY
Tech Postal Code: 10311-1001
Tech Country: US
Tech Phone: +1.7183552509
Tech Phone Ext:
Tech Fax: +1.7183552517
Tech Fax Ext:
Tech Email: sugeno@TELEHOUSE.COM
Name Server: NS1.CDNETDNS.NET
Name Server: NS2.CDNETDNS.NET
DNSSEC: Unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of whois database: Mon, 04 Apr 2016 20:06:18 GMT <<<

Network Whois record

Don’t have an IP address for which to get a record
DNS records

DNS query for unassigned170.nyiix.net returned an error from the server: NameError
name class type data time to live
nyiix.net IN SOA
server: ns1-85t.telehouse.com
email: sugeno@telehouse.com
serial: 2015030502
refresh: 10800
retry: 3600
expire: 1209600
minimum ttl: 3600
3600s (01:00:00)
nyiix.net IN NS ns1.cdnetdns.net 3600s (01:00:00)
nyiix.net IN NS ns2.cdnetdns.net 3600s (01:00:00)
nyiix.net IN MX
preference: 10
exchange: ns1.nyiix.net
3600s (01:00:00)
nyiix.net IN A 67.214.159.212 3600s (01:00:00)
Traceroute

Don’t have a destination IP address

— end —
URL for this output | return to CentralOps.net, a service of Hexillion
@@@@@@@@@@@@@@@@@@@@@
v=spf1 include:_netblocks.mimecast.com
198.32.160.170
unassigned170.nyiix.net
ns1.cdnetdns.net >> 174.35.55.22

ns2.cdnetdns.net >> 66.114.55.22
67.214.159.212
192.241.164.254
104.131.241.168
Name Server: DNS010.D.REGISTER.COM
Name Server: DNS021.C.REGISTER.COM
Name Server: DNS072.B.REGISTER.COM
Name Server: DNS205.A.REGISTER.COM
ns3.register.com >> 64.69.208.143
ns1.register.com >> 64.69.208.141
ns4.register.com >> 209.17.114.135
ns2.register.com >> 209.17.114.135
v=spf1 include:_netblocks.mimecast.com ip4:146.101.202.128/27 ip4:62.6.159.224/27 ip4:196.35.12.112/29 ip4:66.8.44.192/29 ip4:209.202.154.96/27 ip4:50.200.237.160/27
include:mktomail.com -all
72.47.231.49
v=spf1 ip4:199.15.212.0/22 ip4:72.3.185.0/24 ip4:72.32.154.0/24 ip4:72.32.217.0/24 ip4:72.32.243.0/24 ip4:94.236.119.0/26 ip4:37.188.97.188/32 ip4:185.28.196.0/22
Name Server: DNS010.D.REGISTER.COM
216.21.236.10
216.21.224.0 – 216.21.239.255
CIDR: 216.21.224.0/20
v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all
Name Server: DNS021.C.REGISTER.COM
216.21.235.21
216.21.224.0 – 216.21.239.255
CIDR: 216.21.224.0/20
v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all
62.115.32.2 defensenet-ic-302032-ash-b2.c.telia.net
62.115.32.0 – 62.115.32.255
62.115.0.0/16
62.115.32.2
v=spf1 ip4:194.237.170.0/24 ip4:195.198.164.0/24 ip4:62.20.126.0/24 include:_spf-a.telia.net include:_spf-b.telia.net ~all
mail.telia.net
81.236.57.10
81.224.0.0 – 81.236.255.255
81.224.0.0/12
Name Server: DNS072.B.REGISTER.COM
216.21.232.72
v=spf1 ip4:209.17.115.0/24 ip4:209.237.134.0/24 ip4:64.69.208.0/24 ip4:64.69.212.0/24 ip4:64.69.218.0/24 ip4:74.200.28.190 ?all
Name Server: DNS205.A.REGISTER.COM
216.21.231.205
107.162.0.123
NetRange: 107.162.0.0 – 107.162.255.255
CIDR: 107.162.0.0/16
NetName: DEFENSE-NET
mail.defense.net
64.233.160.121
64.233.160.0 – 64.233.191.255
CIDR: 64.233.160.0/19

v=spf1 ip4:172.17.2.145 ip4:173.205.61.130/32 ip4:173.205.61.50/32 ip4:46.33.92.26/32 ip4:183.182.80.186/32 ip4:107.162.0.0/16 include:mail.zendesk.com -all
_netblocks.mimecast.com IN TXT v=spf1 include:eu._netblocks.mimecast.com include:us._netblocks.mimecast.com include:za._netblocks.mimecast.com include:au._netblocks.mimecast.com
f5.com
104.219.106.168
104.219.104.0 – 104.219.111.255
CIDR: 104.219.104.0/24
104.219.106.168
104.219.106.168
v=spf1 ip4:209.61.151.0/24 ip4:166.78.68.0/22 ip4:198.61.254.0/23 ip4:192.237.158.0/23 ip4:23.253.182.0/24 ip4:23.253.183.0/24 ip4:104.130.96.0/28 ip4:173.193.210.32/27 ip4:50.23.218.192/27 ip4:174.37.226.64/27 ip4:208.43.239.136/30
ip4:184.173.105.0/24 ip4:184.173.153.0/24 ip4:208.96.6.128/27 ip4:157.56.120.0/25 ip4:159.182.33.151/32 ip4:159.182.41.57/32 ip4:159.182.1.200/30 ip4:159.182.219.0/24 ip4:208.65.182.32/28
ip4:104.146.0.0/15 ip4:191.234.192.0/19 ip4:191.234.144.0/20 ip4:134.170.200.0/21 ip4:191.234.8.0/21 ip4:134.170.208.0/21 ip4:191.232.0.0/23 ip4:191.234.76.0/23 ip4:111.221.20.128/25 ip4:111.221.67.0/25 ip4:207.46.101.128/26 ip4:207.46.108.0/25
ip4:207.46.100.0/24 ip4:207.46.163.0/24 ip4:65.55.169.0/24 ip4:157.55.133.0/25 ip4:157.56.110.0/23 ip4:157.55.234.0/24 ip4:213.199.154.0/24 ip4:213.199.180.0/24 ip4:65.61.115.222/32 ip4:68.233.68.14/32 ip4:74.125.0.0/16 ip4:173.194.0.0/16
ip4:207.126.144.0/20 ip4:209.85.128.0/17 ip4:216.58.192.0/19 ip4:216.239.32.0/19 ip4:67.231.144.81/32 ip4:67.231.152.58/32 ip4:74.201.245.174/32 ip4:66.119.37.184/30 ip4:104.219.104.168/32 ip4:54.194.149.47/32 ip4:54.200.128.158/32
ip4:66.47.25.96/29 ip4:208.96.32.0/26 ip4:157.56.116.0/25 ip4:157.56.112.0/24 ip4:134.170.140.0/24 ip4:134.170.132.0/24 ip4:207.46.51.64/26 ip4:157.55.158.0/23 ip4:157.56.87.192/26 ip4:64.4.22.64/26 ip4:23.103.128.0/19 ip4:23.103.198.0/23
ip4:65.55.88.0/24 ip4:104.47.0.0/17 ip4:23.103.200.0/21 ip4:23.103.208.0/21 ip4:23.103.191.0/24 ip4:216.32.180.0/23 include:mktomail.com include:_spf.salesforce.com
mx:f5.com
nserver: C.MX-NS.MX 192.100.224.1 2001:1258:0:0:0:0:0:1
nserver: E.MX-NS.MX 189.201.244.1
nserver: I.MX-NS.MX 207.248.68.1
nserver: M.MX-NS.MX 200.94.176.1 2001:13c7:7000:0:0:0:0:1
nserver: O.MX-NS.MX 200.23.1.1
nserver: X.MX-NS.MX 201.131.252.1
mx:res.cisco.com -all
nserver: C.MX-NS.MX 192.100.224.1 2001:1258:0:0:0:0:0:1
nserver: E.MX-NS.MX 189.201.244.1
nserver: I.MX-NS.MX 207.248.68.1
nserver: M.MX-NS.MX 200.94.176.1 2001:13c7:7000:0:0:0:0:1
nserver: O.MX-NS.MX 200.23.1.1
nserver: X.MX-NS.MX 201.131.252.1
v=spf1 ip4:173.37.147.224/27 ip4:173.37.142.64/26 ip4:173.38.212.128/27 ip4:173.38.203.0/24 ip4:64.100.0.0/14 ip4:72.163.7.160/27 ip4:72.163.197.0/24 ip4:144.254.0.0/16 ip4:66.187.208.0/20 ip4:173.37.86.0/24
ip4:64.104.206.0/24 ip4:64.104.15.96/27 ip4:64.102.19.192/26 ip4:144.254.15.96/27 ip4:173.36.137.128/26 ip4:173.36.130.0/24 mx:res.cisco.com
mx:sco.cisco.com ~all
v=spf1 ip4:208.90.57.0/24 ip4:108.171.128.0/24 ip4:108.171.129.0/24 ip4:108.171.130.0/24 ip4:108.171.131.0/24 ip4:108.171.132.0/24 ip4:108.171.133.0/24 ip4:108.171.134.0/24 ip4:210.55.186.0/24 ip4:68.232.129.181 ip4:68.232.135.80
include:cisco.com ~all
v=spf1 ip4:173.37.147.224/27 ip4:173.37.142.64/26 ip4:173.38.212.128/27 ip4:173.38.203.0/24 ip4:64.100.0.0/14 ip4:72.163.7.160/27 ip4:72.163.197.0/24 ip4:144.254.0.0/16 ip4:66.187.208.0/20 ip4:173.37.86.0/24
ip4:64.104.206.0/24 ip4:64.104.15.96/27 ip4:64.102.19.192/26 ip4:144.254.15.96/27 ip4:173.36.137.128/26 ip4:173.36.130.0/24 mx:res.cisco.com mx:sco.cisco.com ~all
nserver: C.MX-NS.MX 192.100.224.1 2001:1258:0:0:0:0:0:1
nserver: E.MX-NS.MX 189.201.244.1
nserver: I.MX-NS.MX 207.248.68.1
nserver: M.MX-NS.MX 200.94.176.1 2001:13c7:7000:0:0:0:0:1
nserver: O.MX-NS.MX 200.23.1.1
nserver: X.MX-NS.MX 201.131.252.1
DNS01.MIMECAST.COM
dns02.mimecast.com >> 205.139.110.125
dns04.mimecast.com >> 207.211.41.115
dns03.mimecast.com >> 205.217.25.135
dns01.mimecast.com >> 193.118.78.141
dns072.b.register.com
216.21.232.72
ns3.register.com >> 64.69.208.143
ns2.register.com >> 209.17.114.135
ns1.register.com >> 64.69.208.141
ns4.register.com >> 209.17.114.135
dns205.a.register.com
216.21.231.205
Name Server: dns010.d.register.com
216.21.236.10
Name Server: dns072.b.register.com
216.21.232.72
Name Server: dns021.c.register.com
216.21.235.21
Name Server: DNS010.D.REGISTER.COM
216.21.236.10
Name Server: DNS021.C.REGISTER.COM
216.21.235.21
Name Server: DNS072.B.REGISTER.COM
216.21.232.72
Name Server: DNS205.A.REGISTER.COM
216.21.231.205

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




D.C. Madam’s Attorney Says Election Bombshell Already Online

Deborah-Jeane-Palfrey-DC-Madams

D.C. Madam’s Attorney Says Election Bombshell Already Online
Montgomery Blair Sibley says a timer controls release of a link to client records ‘relevant’ to presidential race.

By Steven Nelson

The colorful litigator who represented the late “D.C. madam” Deborah Palfrey and threatened this week to release call logs of his former client that he says are “very relevant” to the 2016 presidential election tells U.S. News those records already are digitized and posted online.

Montgomery Blair Sibley says the records will become public if he fails to reset a 72-hour countdown clock, which could cut short his soft two-week ultimatum for federal courts to consider lifting a 2007 gag order that covers the records, lest he deem that order void.

The countdown clock is a safeguard, Sibley says, that ensures that if he disappears the records will be published. Inevitable release, he says, may also disincentivize violent acts against him to prevent their disclosure.

The records are stored on four servers around the world, Sibley says, and dozens of reporters will receive a website link if the clock is not reset. He says he loaded the information online in January, when he decided to publicly claim the records are relevant to the presidential race.

“There’s a link right now, that if you had, you would have access to the records,” Sibley says about the website. “If I die, disappear, whatever, they will be out.”

A similar tactic was embraced by WikiLeaks founder Julian Assange in 2010 with release of an encrypted “insurance” file that could be unlocked with a password if the besieged transparency advocate chose to distribute it.

“If you’re asking if I’m partnering with WikiLeaks, the answer is I’m not answering that,” Sibley says without any prodding about the secrets-spilling site.

Sibley says his website hosts PDFs of Palfrey call logs that contain about 5,000 phone numbers, along with downloadable spreadsheets that contain the names and addresses of 815 Verizon Wireless customers from those logs, which he acquired with a subpoena ahead of Palfrey’s trial.

Sibley represented Palfrey after her 2006 arrest for running an escort service popular among Washington’s upper class. In 2007, he released call logs containing about 10,000 phone numbers, which resulted in the outing of prominent political leaders including Sen. David Vitter, R-La. He says he held back 5,000 numbers for leverage at trial – but Palfrey fired him before she was found guilty in April 2008 of money laundering and other crimes.

Two weeks after her conviction, Palfrey was found in her mother’s shed with a nylon rope around her neck, dead from apparent suicide.

A major hurdle for Sibley’s bid to modify the 2007 court order protecting the records is that Palfrey fired him.

[FLASHBACK: ‘Pro-Life’ Congressman Who Urged Abortions for Ex-Wife and Mistress Will Run Again]

Then-U.S. District Judge Richard Roberts in January instructed a clerk not to accept Sibley’s motion requesting reconsideration of the restraining order, writing: “Why Sibley would have possession of subpoenaed records in a case from which he has been terminated and why he would not instead have turned all copies of them over to the defendant’s continuing counsel of record is not set forth in the motion.“

Sibley says Roberts – who resigned earlier this month on the day he was sued for alleged sexual assault – wrongly assumed he had no right to the records. He says he was retained for Palfrey’s appeal, was her mother’s attorney at the time of Palfrey’s death and that he worked for a while on a civil lawsuit.

He also says he delivered original copies of all records to attorney Preston Burton, who represented Palfrey at trial and, Sibley says, later replaced him on the civil lawsuit.

Thus far, Sibley has not heard back from the D.C. Circuit federal appeals court or from the Supreme Court, which he asked on Monday to force the District Court to accept his motion about the records. He said Monday he would wait two weeks for courts to act, but now says the situation is so fluid the time frame may change.

[LISTEN: Sexual Audio Released After Alabama Governor Denies Affair]

Burton did not respond to an email seeking comment on the records. Sibley says he currently has no physical copies.

Matthew Green, a computer science professor at Johns Hopkins University, says it’s unclear to him how secure Sibley’s unadvertised website is from prying eyes.

“Wow, that sounds a little crazy,” Green says in an email. “I’m not sure if there are any services that do this reliably – you would have to cobble something together. Is the information safe sitting on four servers? I guess it depends on which four servers. Presumably Google is safer than some random server sitting in a closet somewhere. But it doesn’t sound very safe to me.”

Green says if Sibley is partnering with WikiLeaks, there would be a different set of considerations.

“Wikileaks does have some security expertise, so it’s probably more secure against random hackers,” he says. “On the other hand, Wikileaks has some fairly sophisticated adversaries, including nation states – so their server infrastructure has a much bigger target on it. But the real question is: if Wikileaks has the data, can you trust Wikileaks not to do anything with it?”

Sibley has refused to provide any clues about what information relevant to the presidential election he claims to have. He says he’s not concerned that some citizens are incorrectly guessing about one of the five remaining candidates in the Democratic and Republican primaries.

Sibley says he currently is not licensed to practice law – the result of a 2008 suspension in Florida for filing “vexatious and meritless” lawsuits against judges and for a child support payment dispute, for which he faced reciprocal discipline in D.C. – and has no plans to seek readmission to the D.C. Bar.

“I have no desire to be part of a profession I consider to be profoundly corrupt to its core,” he says. “I’m hacking at the roots of tyranny, not its branches.”

http://www.usnews.com/news/articles/2016-03-31/dc-madams-attorney-says-election-bombshell-already-online

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Larry Mizel HSBC comes up short in Money Laundering Vigilance

Larry-Mizel-NYSE-MDC

Illuminati Zionist Satanic Baby Killing Punk Larry A. Mizel of Denver, Colorado

By Stew Webb

Larry Mizel is one of the most Notorious Jewish Gangsters ever to live, following in the footsteps of Meyer Lansky and Leonard Millman, Larry Mizel has escaped Justice through pay offs and Bribes of Public Officials, Justice Department Employees, Congressman and Senators, FBI, DEA, and others agents and agency Chiefs and what is even more off the charts those Bribed got to keep their Bribes.

Larry Mizel paid a hefty fine in 1997 in a special Grand Jury and walked with out Jail.

Larry Mizel has been at the top and involved in every Major Financial Crime since 1968 and he is still walking and breathing at at the Helm of HSBC Bank a subsidiary of Great West Life Insurance Company of Englewood, Colorado. Larry Mizel also runs over 5,000 other companies including M.D.C. Holding, Inc. of Denver aka Richmond American Homes NYSE: MDC.

Larry Mizel is a Director of the American Israel Political Action Committee “AIPAC” which is nothing more than Israeli Espionage against the United States of America and has bought most of the US Congress and Senate with Political Campaign Contributions.

Gun_Dog Spot Dog

Stew Webb Whistle blower Federal Grand Jury Demand against Kerre Millman, Leonard Millman, Elaine Millman, Larry Mizel, Norman Brownstein, George HW Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton and others.
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton

Stew Webb Savings and Loan Whistle blower Faces Illegal Charges
http://www.stewwebb.com/2013/10/08/sl-whistleblower-faces-federal-charges

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud
http://www.stewwebb.com/2013/10/07/stew-webb-official-sec-whistleblower-complaint-mortgage-backed-securities-fraud

Bush – Millman – Clinton Zionist Organized Crime Family Flow Chart (1)
http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1

FRAUDS ARE US AT MDC – NYSE The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/17/frauds-are-us-at-mdc-nyse-the-denver-illuminati-zionist-connection

Illuminati Human Sacrifices June 21 and December 20-22 every year in Denver, Colorado
George HW Bush, Larry Mizel, Henry Kissinger, David Rockefeller, Rabbi Answar Bin Shari of Israel, Meyer Rothchild, and the other 12 Diciples of Satan are there Killing an Infant and drinking its blood as a Ritual to Satan.
http://www.stewwebb.com/?s=Illuminati+Human+Sacrifice&submit=Go

From Cradle to Cabal The Secret Life of Gale Norton The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/12/from-cradle-to-cabal-the-secret-life-of-gale-norton-the-denver-illuminati-zionist-connection

John McCain wife hiding war profits untaxed off shore accounts
Note: Larry Mizel’s Real Corp Realty
http://www.stewwebb.com/2013/08/15/john-mccains-wife-hiding-war-profits-untaxed-off-shore-accounts

Donald Trump Vs US Senator John McCain
http://www.stewwebb.com/2016/03/06/donald-trump-vs-us-senator-john-mccain

Larry Mizel go to Jews for Republicans Who Want to Be President
http://www.stewwebb.com/2015/08/30/larry-mizel-go-to-jews-for-republicans-who-want-to-be-president

Larry Mizel HSBC Bank Moody’s Prophecy Coming True
http://www.stewwebb.com/2016/04/03/larry-mizel-hsbc-bank-moodys-prophecy-coming-true
Larry Mizel another of his HSBC Bank Scandals
http://www.stewwebb.com/2016/04/03/larry-mizel-another-hsbc-bank-scandals

AIPAC Directors Larry Mizel, Norman Brownstein Campaign Contributions
http://www.stewwebb.com/2016/04/03/aipac-directors-larry-mizel-norman-brownstein-campaign-contributions

HSBC comes up short in Money Laundering Vigilance, U.S. says

By Jonathan Stempel

NEW YORK, April 1 (Reuters) – HSBC Holdings Plc has not done enough to thwart money laundering, despite making significant progress since reaching a landmark 2012 anti-money-laundering settlement with U.S. prosecutors, a federal monitor has found.

The monitor “remains unable to certify that the bank’s compliance program is reasonably designed and implemented to detect and prevent violations of AML and sanctions laws,” U.S. Attorney Robert Capers in Brooklyn, New York said in a letter filed on Friday with the federal court there.

“Although HSBC made significant progress last year, the monitor believes that the bank continues to face significant challenges,” Capers added.

The London-based bank has spent three years upgrading its oversight of customer transactions, after reaching a $1.92 billion settlement of U.S. Department of Justice charges tied to money laundering.

Prosecutors said HSBC failed to spot suspicious activity related to Mexican and Colombian drug cartels, and handled transactions for customers in countries subject to U.S. sanctions, such as Myanmar, Cuba and Iran.

As part of the settlement, HSBC entered a five-year deferred prosecution agreement and agreed to monitoring by Michael Cherkasky, the executive chairman of compliance firm Exiger and a former prosecutor.

The Justice Department could prosecute HSBC or extend the monitoring if the bank fails to live up to its commitments.

“HSBC remains focused on fulfilling its obligations under the DPA and implementing the most effective standards globally to combat financial crime,” bank spokesman Rob Sherman said.

According to Capers, Cherkasky found that HSBC in 2015 made “commendable progress” toward improving oversight, spending more than $680 million and adding 2,584 compliance personnel, and was “especially complimentary of HSBC’s ‘tone at the top.'”

But Cherkasky also found that HSBC’s monitoring and testing capabilities suffer from “immaturity,” and affiliates in some countries have struggled to obtain information about customers when opening accounts or updating account profiles, Capers said.

The monitor also believes “a great deal of work remains to be done” in improving technology, Capers said, and flagged instances where computer deficiencies left HSBC short of data needed to help detect high-risk transactions.

Cherkasky declined to comment.

His reports have been filed under seal with the Brooklyn court. HSBC and the Justice Department have appealed an order by U.S. District Judge John Gleeson to make his work public.

Gleeson left the bench last month for private practice. U.S. District Judge Ann Donnelly now oversees the HSBC case.

The case is U.S. v. HSBC Bank USA NA et al, U.S. District Court, Eastern District of New York, No. 12-cr-00763. (Reporting by Jonathan Stempel in New York; Editing by Steve Orlofsky)

http://www.lse.co.uk/FinanceNews.asp?code=7k3gojj8&headline=HSBC_comes_up_short_in_money_laundering_vigilance_US_says

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Larry Mizel HSBC Bank Moody’s Prophecy Coming True

Larry-Mizel-HSBC-Moodys-Prophecy-Coming-True

HSBC Holdings plc (ADR): Saudi Setback, Moody’s Prophecy Coming True

Published by Mohammad Shehmir on April 1, 2016 at 3:33 pm EST

Larry-Mizel-NYSE-MDC

Illuminati Zionist Satanic Baby Killing punk Larry Mizel

By Stew Webb

Larry Mizel is one of the most Notorious Jewish Gangsters ever to live, following in the footsteps of Meyer Lansky and Leonard Millman, Larry Mizel has escaped Justice through pay offs and Bribes of Public Officials, Justice Department Employees, Congressman and Senators, FBI, DEA, and others agents and agency Chiefs and what is even more off the charts those Bribed got to keep their Bribes.

Larry Mizel paid a hefty fine in 1997 in a special Grand Jury and walked with out Jail.

Larry Mizel has been at the top and involved in every Major Financial Crime since 1968 and he is still walking and breathing at at the Helm of HSBC Bank a subsidiary of Great West Life Insurance Company of Englewood, Colorado. Larry Mizel also runs over 5,000 other companies including M.D.C. Holding, Inc. of Denver aka Richmond American Homes NYSE: MDC.

Larry Mizel is a Director of the American Israel Political Action Committee “AIPAC” which is nothing more than Israeli Espionage against the United States of America and has bought most of the US Congress and Senate with Political Campaign Contributions.

Gun_Dog Spot Dog

Stew Webb Whistle blower Federal Grand Jury Demand against Kerre Millman, Leonard Millman, Elaine Millman, Larry Mizel, Norman Brownstein, George HW Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton and others.
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton

Stew Webb Savings and Loan Whistle blower Faces Illegal Charges
http://www.stewwebb.com/2013/10/08/sl-whistleblower-faces-federal-charges

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud
http://www.stewwebb.com/2013/10/07/stew-webb-official-sec-whistleblower-complaint-mortgage-backed-securities-fraud

Bush – Millman – Clinton Zionist Organized Crime Family Flow Chart (1)
http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1

FRAUDS ARE US AT MDC – NYSE The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/17/frauds-are-us-at-mdc-nyse-the-denver-illuminati-zionist-connection

Illuminati Human Sacrifices June 21 and December 20-22 every year in Denver, Colorado
George HW Bush, Larry Mizel, Henry Kissinger, David Rockefeller, Rabbi Answar Bin Shari of Israel, Meyer Rothchild, and the other 12 Diciples of Satan are there Killing an Infant and drinking its blood as a Ritual to Satan.
http://www.stewwebb.com/?s=Illuminati+Human+Sacrifice&submit=Go

From Cradle to Cabal The Secret Life of Gale Norton The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/12/from-cradle-to-cabal-the-secret-life-of-gale-norton-the-denver-illuminati-zionist-connection

John McCain wife hiding war profits untaxed off shore accounts
Note: Larry Mizel’s Real Corp Realty
http://www.stewwebb.com/2013/08/15/john-mccains-wife-hiding-war-profits-untaxed-off-shore-accounts

Donald Trump Vs US Senator John McCain
http://www.stewwebb.com/2016/03/06/donald-trump-vs-us-senator-john-mccain

Larry Mizel go to Jews for Republicans Who Want to Be President
http://www.stewwebb.com/2015/08/30/larry-mizel-go-to-jews-for-republicans-who-want-to-be-president

Larry Mizel another of his HSBC Bank Scandals
http://www.stewwebb.com/2016/04/03/larry-mizel-another-hsbc-bank-scandals

AIPAC Directors Larry Mizel, Norman Brownstein Campaign Contributions
http://www.stewwebb.com/2016/04/03/aipac-directors-larry-mizel-norman-brownstein-campaign-contributions

HSBC’s Saudi wing recently revealed a large provision for lawsuits, just as Moody’s predicted in mid-March

HSBC Holdings plc’s (ADR) (NYSE:HSBC) new fund inflows were blocked by the Saudi regulator in 2014-15, and we now know the reason. Yesterday, the bank’s Saudi unit revealed lawsuit provisions worth $42 million for the past two years. We seek to highlight how the bank is moving in the direction Moody’s recently predicted.

The figure could be one of the reasons HSBC stock fell 3% yesterday, and opened down 1.29% today. The provisions were accumulated over the past two years, and will be utilized to pay fines on violated regulations, from 2002 to 2014, and cater to future fines. The bank said it would not reveal details of settlements reached in the past.

Larry-Mizel-HSBC-Price-Drop-2016

The company has been inspected by various capital market authorities during the 2002-2014 period. On its website, it said the provisions were for the settlement of past issues, and a part of the provisions was put aside owing to high risk attached to the terms on which the remaining issues will be solved. The bank is uncertain about how much time the remaining issues would take to be resolved.

The ban on HSBC Saudi Asset Management Company was imposed in 2014, and lifted last year. According to Bloomberg, regulators found the company had breached local laws, but details over which ones, are unknown.

The revelations are a cause of concern for investors, since the bank has been involved in a lot of litigation around the globe. The company paid $618 million fines in 2014, over rigging foreign exchange benchmarks. It settled a US money laundering case in 2012, with $1.9 billion.

Business Finance News believes the company needs to tackle its risk management and compliance issues urgently, to be able to dispose off recurrent litigation. The company has improved compliance measure at a commendable pace, but needs to fortify the measures to improve profitability.

In Saudi Arabia, the bank’s profits last year were recorded at 279 million riyals, while the figure had come in at 229 million riyals in 2014. But profitability elsewhere is not pleasing. It recorded a net loss of $1.325 billion in fourth-quarter fiscal 2015 (4QFY15), while in 3QFY15, it had recorded net income at $5.23 billion. As a high priority growth market, Saudi Arabia gets special attention in matters related to expansion, but the aforementioned ban made it harder to pursue plans.

Larry-Mizel-HSBC-Quartly-Net-Income-Billions

At the start of February, the Saudi unit was found to have hired two senior compliance employees, who held unaccredited business degrees. As such, they were ineligible even for an entry level position. This lifted the lid on the bank’s loopholes in checks and balances, which are bound to cause further issues in future.

Last Monday, a US federal judge rejected an appeal on the part of 14 large banks, to dismiss a private lawsuit, which accused them of rigging the interest rate benchmark, used in the derivative market, which happens to be worth $553 trillion. HSBC is one of those banks, which suggests we can reasonably expect it to incur further litigation expenses this quarter.

Moody’s Warning

On March 22, 2016, Moody’s warned that legal fees and remediation costs will continue to add downside risks for large British banks. It has also warned that charges are on the rise, and profitability is likely to be affected.

The combined litigation charges for Lloyds, HSBC, Barclays, RBS, and Santander UK, rose 40%, to 15 billion pounds in 2015. Laurie Mayers, an associate managing director at Moody’s said: “This significant increase in 2015, despite some decline in 2013 and 2014, demonstrates that these charges continue to present considerable tail risk.”

The aforementioned banks paid 7.6 billion pounds for payment protection insurance (PPI), which is a 51% year-over-year (YoY) increase. At the time, Moody’s had said that these banks will continue to increase provisions for litigation, and that prediction came true in the case of HSBC’s Saudi wing. The Financial Conduct Authority (FCA)’s deadline for the filing of relevant PPI claims is 2018.

Compliance lags

The bank has been reducing the size of its businesses around the world, to reduce financial-crime risk, having recently cut operations in 17 countries. It has also shut its branches in regions it is currently doing business in. The monitor looking after the settlement on HSBC’s money laundering case, has uncovered several potential lapses, from which we conclude that despite efforts to bring its compliance system up to US standards, it still struggles.

A five-year deferred prosecution agreement was part of the deal HSBC struck with the government in 2012. The government demanded that it improve compliance, and hire a monitor to keep an eye on progress. HSBC’s banking license in the US would be at risk if it fails to impress the US Department of Justice (DoJ). US authorities also found that HSBC was involved in the trafficking of $881 million worth of drugs, from Mexico to the US.

HSBC’s Measures

HSBC chief legal officer Stuart Levey said: “It’s as high a priority as anything in the bank, and we’re making the progress that we need to make.” He said he believed the bank would not be prosecuted after 2017.

Mr. Levey said the bank’s ability to detect fraud had increased manifold in the last few years. In 2015, the bank’s anti-financial crime program cost it $2.9 billion. He also said that the number of compliance officers at HSBC had been increased to three times as many as before, taking the current number to 9,000.

http://www.businessfinancenews.com/28441-hsbc-holdings-plc-adr-saudi-setback-moodys-prophecy-coming-true

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 

 




Larry Mizel another of his HSBC Bank Scandals

Larry-Mizel-NYSE-MDC Larry Mizel a known Satanist

By Stew Webb

Larry Mizel is one of the most Notorious Jewish Gangsters ever to live, following in the footsteps of Meyer Lansky and Leonard Millman, Larry Mizel has escaped Justice through pay offs and Bribes of Public Officials, Justice Department Employees, Congressman and Senators, FBI, DEA, and others agents and agency Chiefs and what is even more off the charts those Bribed got to keep their Bribes.

Larry Mizel paid a hefty fine in 1997 in a special Grand Jury and walked with out Jail.

Larry Mizel has been at the top and involved in every Major Financial Crime since 1968 and he is still walking and breathing at at the Helm of HSBC Bank a subsidiary of Great West Life Insurance Company of Englewood, Colorado. Larry Mizel also runs over 5,000 other companies including M.D.C. Holding, Inc. of Denver aka Richmond American Homes NYSE: MDC.

Larry Mizel is a Director of the American Israel Political Action Committee “AIPAC” which is nothing more than Israeli Espionage against the United States of America and has bought most of the US Congress and Senate with Political Campaign Contributions.

Gun_Dog Spot Dog

Stew Webb Whistle blower Federal Grand Jury Demand against Kerre Millman, Leonard Millman, Elaine Millman, Larry Mizel, Norman Brownstein, George HW Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton and others.
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton

Stew Webb Savings and Loan Whistle blower Faces Illegal Charges
http://www.stewwebb.com/2013/10/08/sl-whistleblower-faces-federal-charges

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud
http://www.stewwebb.com/2013/10/07/stew-webb-official-sec-whistleblower-complaint-mortgage-backed-securities-fraud

Bush – Millman – Clinton Zionist Organized Crime Family Flow Chart (1)
http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1

FRAUDS ARE US AT MDC – NYSE The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/17/frauds-are-us-at-mdc-nyse-the-denver-illuminati-zionist-connection

Illuminati Human Sacrifices June 21 and December 20-22 every year in Denver, Colorado
George HW Bush, Larry Mizel, Henry Kissinger, David Rockefeller, Rabbi Answar Bin Shari of Israel, Meyer Rothchild, and the other 12 Diciples of Satan are there Killing an Infant and drinking its blood as a Ritual to Satan.
http://www.stewwebb.com/?s=Illuminati+Human+Sacrifice&submit=Go

From Cradle to Cabal The Secret Life of Gale Norton The Denver Illuminati Zionist Connection
http://www.stewwebb.com/2013/08/12/from-cradle-to-cabal-the-secret-life-of-gale-norton-the-denver-illuminati-zionist-connection

John McCain wife hiding war profits untaxed off shore accounts
Note: Larry Mizel’s Real Corp Realty
http://www.stewwebb.com/2013/08/15/john-mccains-wife-hiding-war-profits-untaxed-off-shore-accounts

Donald Trump Vs US Senator John McCain
http://www.stewwebb.com/2016/03/06/donald-trump-vs-us-senator-john-mccain

Larry Mizel go to Jews for Republicans Who Want to Be President
http://www.stewwebb.com/2015/08/30/larry-mizel-go-to-jews-for-republicans-who-want-to-be-president

Big Banks Aided Firm At Center Of International Bribery Scandal

Unaoil relied on both banks as it cut deals with corrupt regimes.

Zach CarterSenior Political Economy Reporter

Citi-Bank-HSBC-Bank-GreatWestLife

PETER MACDIARMID/GETTY IMAGES
How much did the banks know or suspect about Unaoil’s shady practices?

No business can operate without bankers — not even the bribery business.

British financial giant HSBC and American bailout kingpin Citibank processed transactions, managed money and vouched for Unaoil, a once-obscure firm that is now at the center of a massive international corruption scandal. Police raided Unaoil’s Monaco offices and interviewed its executives on Thursday, a day after The Huffington Post and Fairfax Media first exposed the company’s practices. Law enforcement agencies in at least four nations are involved in a wide-ranging probe of the company and its partners.

Halliburton, KBR and other corporate conglomerates relied on Unaoil to deliver them lucrative contracts with corrupt regimes in oil-rich nations. But without the help of banks like HSBC and Citibank, none of Unaoil’s operations would have been possible.

Both Citibank and HSBC declined to comment on whether Unaoil or the Ahsani family, who own and operate the firm, remain their clients.

“As a matter of policy, we only maintain relationships with clients who have been vetted through our strict due diligence and compliance checks,” HSBC spokeswoman Sorrel Beynon told HuffPost in a written statement.

[soundcloud url=”https://api.soundcloud.com/tracks/256631400″ params=”auto_play=true&color=ff5500″ width=”100%” height=”166″ iframe=”true” /]

Two federal statutes, the Bank Secrecy Act of 1970 and the Patriot Act of 2001, make it a crime for banks to knowingly process transactions related to illegal activity or to ignore red flags that they may be allowing illegal cash to flow through the financial system. Whether Citibank or HSBC broke the law depends on whether investigators determine that Unaoil’s deals were illegal and whether the banks knew or should have known about that.

Thousands of internal Unaoil emails obtained by HuffPost and Fairfax Media make clear that both HSBC and Citibank were intimately involved in Unaoil’s complex finances.

In Kazakhstan, Unaoil helped U.S. energy conglomerate KBR and British oil company Petrofac secure millions of dollars of work on the Kashagan oil field, one of the biggest fossil fuel discoveries of the 21st century. The joint contract was facilitated by huge payments that Unaoil made to a consultant working for Kazakhstan’s state-owned oil company. That arrangement could potentially run afoul of the Foreign Corrupt Practices Act, which bars companies that do business in the United States from paying bribes to foreign government agents.

In a statement to HuffPost and Fairfax Media, Unaoil founder Ata Ahsani denied that his firm bribed public officials. “The answer is absolutely no,” Ahsani said.

The KBR money went through HSBC’s Private Bank subsidiary in Monaco, according to emails. The Petrofac funds went through Citibank’s affiliate in Geneva, Switzerland, until late 2008, when they began flowing through HSBC. HSBC also executed trades in shares of Petrofac stock on behalf of Unaoil. On the Kazakhstan deal alone, HSBC processed millions of dollars in payments to Unaoil from KBR.

Unaoil deliberately structured bank accounts to obscure its dealings from other companies and legal authorities. In September 2008, for instance, the firm was negotiating a contract with Weatherford, a U.S. chemical company that was paying Unaoil to help it get business with the Iraqi government. Unaoil finance manager Sandy Young sent an email to the firm’s leadership explaining why the firm wanted to shield as many bank accounts as possible from Weatherford, which was required to perform due diligence on Unaoil under the Foreign Corrupt Practices Act. Unaoil eventually secured a lucrative deal with the Iraqi government on behalf of Weatherford that involved paying kickbacks to senior Iraqi officials.

“Restricting the audit rights to the bank account where [Weatherford] monies have been transferred into is certainly preferred with advance warning and inspection during normal working hours,” Young wrote. “As it stands today we use such several sub-accounts only to collect money from principals (we do not make payments from these sub-accounts other than to transfer funds out to our main account from which all payments are made). So with such restrictions all Wfd. would be able to see will be their payments coming in and subsequent transfers of funds out of this account to our main account.”

In other words, money from major Western corporations went into one account, which was then transferred to other accounts, which in turn was used to pay various officials. This made it harder for outsiders to track Unaoil’s funds. It is not clear from the emails what the company’s bankers knew about the legality of Unaoil’s activities. But it is very clear that Unaoil trusted both HSBC and Citibank with the detailed orchestration of its accounts.

We value his advice and even more his ability to coordinate all our investment activities across all our banks/funds etc.Ata Ahsani writing about a former Citibank official

Valerie Kanat and Robert Troxler were in charge of Citibank’s Unaoil business. When Troxler left Citibank in early 2007 to start his own firm, Unaoil decided to keep him as an investment adviser, while continuing to work with Kanat at the bank. Ata Ahsani explained the decision in a March 14, 2007, email to Kanat that suggests Troxler had deep knowledge of the firm’s financial complexities.

“We value his advice and even more his ability to coordinate all our investment activities across all our banks/funds etc.,” Ahsani wrote.

Troxler and Kanat did not respond to requests for comment. Citibank said Kanat left the company in 2009.

HSBC and Citibank have histories of corruption. In 2012, HSBC was fined $1.9 billion for laundering drug money and violating U.S. sanctions against Iran. In 2015, it paid Swiss authorities $43 million to settle allegations that it helped the global elite illegally dodge taxes. Citibank was fined $140 million last year for violations of money laundering laws related to its work with an energy company involved in a bribery scandal with the Mexican government. The bank is currently being investigated for its role in the bribery scandal at FIFA, the international soccer organization.

In addition to managing Unaoil’s accounts, HSBC also vouched for the company, helped it win business and loaned money to members of the Ahsani family. In October 2004, Unaoil asked HSBC to send a letter to the Iraqi government vouching for the company as a legitimate business in sound enough financial shape to follow through on its bid for a government contract. In September 2007, HSBC helped Unaoil arrange for a bid bond from the Trade Bank of Iraq so that it could bid on a separate piece of business. And Cyrus Ahsani, a top official at Unaoil and son of its founder, took out a loan from HSBC in 2007 to help him buy Villa Beaulieu in Monaco, a lavish estate with marble-floored balconies and high-end furniture imported from Italy and Paris.

Unaoil was so close with HSBC that in November 2007, Saman Ahsani — another member of the family — sent an email to bank officials Keith Campbell and James Dodson asking if HSBC would be interested in financing a project with a host of oil companies in Kazakhstan.

“I feel I owed it to our long-standing relationship with HSBC Private Bank to give you first right of refusal – at any rate it doesn’t hurt us to inject some competition into the fee discussions!” Ahsani wrote. “But as we discussed, this is one of the more straight forward transactions we are involved in and, I feel, a good starting point for our relationship with the Corporate bank – after which hopefully you will have enough comfort to begin discussing our more exotic activities, such as our work with Rolls Royce in Iraq where we are just about to start trading, installing and commissioning (ie. technical trading) their turbines for the South Oil Company.”

“Exotic” is an apt descriptor of Unaoil’s activities with Rolls Royce in Iraq. According to emails, Unaoil paid thousands of dollars a day to stay in the good graces of a senior Iraqi oil official in order to help secure a pricey contract for Rolls Royce to make generators. Rolls Royce is currently cooperating with an investigation by the British Serious Fraud Office.

Unaoil also capitalized on its relationships with Citibank and HSBC to win business with new clients. As money laundering standards tightened after the passage of the Patriot Act, many companies began requesting more stringent details about Unaoil’s operations. When German manufacturer Man Turbo pressed the firm for credentials in the fall of 2007, Unaoil’s response included “bank recommendations” from both HSBC and Citibank.

Citibank also had a cozy relationship with the Ahsani family. In March 2007, Kanat secured VIP tickets for Ahsani brothers Saman and Cyrus to attend the elite Top Marques car show in Monaco. That summer, she got them in the room with members of the Chinese government.

“There will be interactions with senior government officials as well as the who’s who in the Chinese business community, providing deep investment insights into China,” Kanat wrote in an email.

Kanat booked the Ahsani clan for a 2007 conference in Dubai and offered to help them obtain discounts on luxury hotels. She got the family access to an exclusive dinner-and-drinks event in the south of France at the Grand Hotel du Cap Ferrat held in August 2008. When Cyrus couldn’t attend, his brother Sassan mocked him via email, “U is gay.”

The Ahsanis thanked Kanat for her efforts by sending her a gift in January 2009.

“Dear Ata, Samy and Cyrus,” she wrote. “I have received this morning at home a lovely gift! It was a very good surprise! I thank you very much for this kind thought.”

http://www.huffingtonpost.com/entry/unaoil-citibank-hsbc_us_56feba02e4b0daf53aefa1da

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Donald Trump Join US Sunday and Monday in Wisconsin

Trump-Make-America-Great-Again

April 3, 2016

JOIN US IN WISCONSIN TODAY AND TOMORROW!

Dear Stew,

Team Trump has many events scheduled in Wisconsin tonight and all day tomorrow to meet as many voters as possible and ensure a victory on Tuesday – we hope you can join us! Details about each event are below:

Sunday, April 3rd: West Allis, WI
Town Hall
Nathan Hale High School Gym
11601 W Lincoln Ave
Doors Open: 5:00 PM
Event Begins: 7:00 PM.
Register for tickets, here.

Monday, April 4th: La Crosse, WI
Town Hall
La Crosse Center
300 Harborview Plaza
Doors Open: 8:00 AM
Event Begins: 10:00 AM.
Register for tickets, here.

Monday, April 4th: Superior, WI
Campaign Rally
Richard I Bong Airport Hangar
4804 Hammond Avenue
Doors Open: 11:30 AM
Event Begins: 1:30 PM.
Register for tickets, here.

Monday, April 4th: Milwaukee, WI
Campaign Rally
Milwaukee Theatre
500 W Kilbourn Ave
Doors Open: 4:00 PM
Event Begins: 7:00 PM.
Register for tickets, here.

Please limit personal items and arrive early to expedite entrance into the venue – please note, NO homemade signs or banners will be permitted into the venues.

We look forward to these upcoming events in Wisconsin, and hope to see you there!

Sincerely,

Team Trump
TEXT TRUMP TO 88022 TO GET EXCLUSIVE UPDATES

***By participating, you consent to receiving automated text messages from the campaign. Standard messaging rates apply.***

P.S. If you would like to purchase official campaign gear, click here.

Related:

Gun_Dog Spot Dog

Bill Ayers and Communist Party USA Protesting Donald Trump
http://www.stewwebb.com/2016/03/21/bill-ayers-and-communist-party-usa-protesting-donald-trump

Ted Cruz Mother Eleanor Darragh Birth Certificate in Question
http://www.stewwebb.com/2016/03/30/ted-cruz-mother-eleanor-darragh-birth-certificate-question

Anonymous Threat Ted Cruz Alleged Prostitution Secret
http://www.stewwebb.com/2016/03/30/anonymous-threat-ted-cruz-alleged-prostitution-secret

Ted Cruz Caught Cheating with 5 Secret Mistresses!
http://www.stewwebb.com/2016/03/25/ted-cruz-caught-cheating-with-5-secret-mistresses

Skull and Bones man Bill Clinton Scott Walker Jeb Bush Ted Cruz Revealed
http://www.stewwebb.com/2016/03/30/skull-bones-man-bill-clinton-scott-walker-jeb-bush-ted-cruz-revealed

Lying John Kasich Violates Americans Second Amendment Rights
http://www.stewwebb.com/2016/03/25/lying-john-kasich-violates-americans-second-amendment-rights

Stew Webb Whistle blower Grand Jury Demand against Hillary Clinton, Jeb Bush and others
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

Hillary Clinton had several abortions kept Chelsea for political appearances

http://www.stewwebb.com/2016/03/29/hillary-clinton-several-abortions-kept-chelsea-political-appearances

HILLARY CLINTON THE CROOK!
http://www.stewwebb.com/2016/04/03/hillary-clinton-crook

Lesbian Jew Hillary Clinton her Devil Worshiping Emails

http://www.stewwebb.com/2016/04/01/lesbian-jew-hillary-clinton-devil-worshiping-emails

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com




Lesbian Jew Hillary Clinton her Devil Worshiping Emails

Israel-Star-of-David-Satan

Lesbian Jew Hillary Clinton her Devil Worshiping Emails

By Stew Webb

Read the bottom of this email:

With fingers crossed, the old rabbit’s foot out of the box in the attic, I will be sacrificing a chicken in the backyard to Moloch . . . Tri

Hillary Clinton is a known Lesbian, a Jew who is a known 5th Degree Witch.

The so called star of David is a Satanic Pentagram not the Star of David. King David had no Star this was made up in the 1600s by the Illuminati Jews.

The so called Star on the Israel flag is not a Star by the Satanic Pentagram. This is known as the Star of Remphan belonging to Moloch (Satan).

Hillary Clinton obviously liked to hire Lesbian’s like her Lesbian Lover Huma Abedim (Former Congressman Anthony Weiner’s wife) and Witch’s or practicing Satanist also known as Luciferians.

You need to know who these Evil Politicians really are.

Israel-Jews-Hebrews-Satan

https://wikileaks.org/clinton-emails/emailid/14333

 

From: Cheryl Mills

To: Hillary Clinton Date: 2009-08-28 08:30

Subject: HONDURAS: MAYBE, MAYBE

UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05764911 Date: 07/31/2015 RELEASE IN PART B6 From: Mills, Cheryl D <MillsCD@state.gov> Sent: Saturday, August 29, 2009 8:30PM To: Subject:

Fw: Honduras: Maybe, maybe Fyi From: Kelly, Craig A To: Mills, Cheryl D; Abedin, Huma; Sullivan, Jacob 3 Cc: Smith, Daniel B; Macmanus, Joseph E Sent: Sat Aug 29 16:53:56 2009

Subject: Fw: Honduras: Maybe, maybe Attached is from Lew Amselem, our rep to OAS.

He gives a readout of his conversation today with Arias Accord negotiator Jon Biehl. Some nice comments about S from Biehi and Arias. I will forward another note from Hugo Llorens with similar message.

Best, ck From: Amselem, W Lewis To: Task Force Honduras; Otero, Maria Sent: Sat Aug 29 13:54:22 2009 Subject: Honduras: Maybe, maybe From: amseleM To: Amselem, W Lewis Sent: Sat Aug 29 13:51:00 2009

Subject: Biehi called a little after 1:30 pm to say the meeting with the de facto envoys had been abruptly cancelled — but for perhaps a positive reason.

Micheletti has asked about half the team to return to Tegucigalpa (Corrales stayed, as “he seeks to confirm that he will not lose his visa”). In the phone call he got from the de facto envoys as they headed for the airport, Biehl said he detected a positive attitude.

The envoys seemed confident they would get M to sign the SJ Accord. The envoys prmoised to call Biehi late this afternoon with the news from Honduras. If, if, if, if, the news is positive, Biehl and OAS Political Director Victor Rico will leave for Tegucigalpa tomorrow morning to meet Micheletti, make sure this is not another time-wasting tactic, and get something in writing from him that he agrees to the Accord and will sign it. Just before speaking to me, Biehl had spoken with Arias who expressed cautious optimisim that we might have a break-through.

Arias told Biehl to tell us, that if that happens the United States gets the credit.

Arias said the US has played the game exactly right, with the appropriate mix of carrots, sticks, toughness, unified message, even-handedness and, above all, good timing.

Arias said the Europeans have been calling him over the past two days, and have fallen into line with the US; the Swedes, as head of the EU, and have told him that they will take their cue from the US and will support US actions.

Arias, Biehi said, was extremely complimentary of the “great political instincts shown by Secretary Clinton.” -1-4n

UNCLASSIFIED U.S. Department of State Case No. F-2014-20439 Doc No. C05764911 Date: 07/31/2015

With fingers crossed, the old rabbit’s foot out of the box in the attic, I will be sacrificing a chicken in the backyard to Moloch . . . Tri

See Also US Diplomatic Cable Search

Related links about your Presidential Candidates:

I support Donald Trump– Stew Webb

Illuminati Media Lies Know Truth Donald Trump Wife Pictures
http://www.stewwebb.com/2016/04/01/illuminati-media-lies-know-truth-donald-trump-wife-pictures

Bill Ayers and Communist Party USA Protesting Donald Trump
http://www.stewwebb.com/2016/03/21/bill-ayers-and-communist-party-usa-protesting-donald-trump

Skull and Bones man Bill Clinton Scott Walker Jeb Bush Ted Cruz Revealed

Note: Scott Walker and Jeb Bush are cousins
http://www.stewwebb.com/2016/03/30/skull-bones-man-bill-clinton-scott-walker-jeb-bush-ted-cruz-revealed

Mitt Romney and Jeb Bush Conspire to Murder Donald Trump
http://www.stewwebb.com/2016/03/03/mitt-romney-jeb-bush-conspire-murder-donald-trump

Mitt Romney Tax Cheat Exposed
http://www.stewwebb.com/2016/03/02/mitt-romney-tax-cheat-exposed

Jeb Bush Murders Securities Frauds Scams
http://www.stewwebb.com/2016/02/13/jeb-bush-frauds-and-scams

Barbra Bush offering $100 Million for Donald Trump Death
http://www.stewwebb.com/2016/02/28/barbra-bush-offering-100-million-for-donald-trump-death

Ted Cruz Deceiver Father of North American Union
http://www.stewwebb.com/2016/03/02/ted-cruz-deceiver-zion-father-north-american-union

Ted Cruz Wife Hedi Cruz Former George Bush NSA Stooge
http://www.stewwebb.com/2016/02/28/ted-cruz-wife-former-george-w-bush-nsa-stooge

Anonymous Threat Ted Cruz Alleged Prostitution Secret
http://www.stewwebb.com/2016/03/30/anonymous-threat-ted-cruz-alleged-prostitution-secret

Ted Cruz Caught Cheating with 5 Secret Mistresses!
http://www.stewwebb.com/2016/03/25/ted-cruz-caught-cheating-with-5-secret-mistresses
Ted Cruz Mother Eleanor Darragh Birth Certificate in Question
http://www.stewwebb.com/2016/03/30/ted-cruz-mother-eleanor-darragh-birth-certificate-question

Lying John Kasich Violates Americans Second Amendment Rights
http://www.stewwebb.com/2016/03/25/lying-john-kasich-violates-americans-second-amendment-rights

Stew Webb Whistleblower Grand Jury Demand against Hillary Clinton Jeb Bush and others
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton
Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

Hillary Clinton had several abortions kept Chelsea for political appearances
http://www.stewwebb.com/2016/03/29/hillary-clinton-several-abortions-kept-chelsea-political-appearances

Hillary Clinton Lesbian Lover HumaA bedin Indicted
http://www.stewwebb.com/2016/03/02/hillary-clinton-lesbian-lover-huma-abedin-indicted

Ashley Williams To #Hillary Clinton I Am Not A Super Predator
http://www.stewwebb.com/2016/02/28/ashley-williams-to-hillary-clinton-i-am-not-a-super-predator

Hillary Clinton Racist
http://www.stewwebb.com/2016/02/25/hillary-clinton-racist

BILL CLINTON NAMED AS LONGTIME SPOOK – CIA
http://www.stewwebb.com/2014/01/29/clinton-named-as-longtime-spook-cia

Bill Clinton grants pardon for his drug offending brother
http://www.stewwebb.com/2016/03/29/bill-clinton-grants-pardon-drug-offending-brother

Biblical Israelite’s are Hebrews which today are the Palestinians
http://www.stewwebb.com/2016/03/29/biblical-israelites-hebrews-today-palestinians

Hebrew vs Jew
http://www.stewwebb.com/2015/09/02/hebrew-vs-jew

AIPAC and Jack Abramoff Operated a Child Sex Blackmail Ring of the US Congress and Senate
http://www.stewwebb.com/2014/02/03/aipac-and-abramoff-operated-child-sex-blackmail-ring

US President Obama Admits US Trains ISIS
http://www.stewwebb.com/2015/09/02/obama-admits-us-trains-isis-july-2015

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Illuminati Media Lies Know Truth Donald Trump Wife Pictures

stewwebbradionetwork-com-2015-09-24

stewwebbradionetwork-com-2015-09-24

Illuminati Media Lies Know Truth Donald Trump Wife Pictures

Ted Cruz Sex Scandal

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




The Naked Truth Corrupt Blowhard Chris Matthews Plays Hardball

MSNBC-Chris-Mathews-HardBall-2016-03-31 Chris Mathews of MSNBC Hard Ball

Intro by Tom Heneghan

It is important to remember that Bitc_ Chris Mathews is a Total Corporate Stooge for General Electric Mathews drinks the unelectable looser Nazi Zionist Jews Hillary Clinton (Maiden Name Rodenhurst not Rodhan) cool aid and actually voted for election stealing Nation wrecking US Treasury Looter AWOL Cocaine Snorting War Criminal Fag George W. Bush Frad in the year 2000 election aka A Coup De Tat.

Gun_Dog Spot Dog: “Blood Lust is Now Blood Libel”

The Naked Truth-Corrupt Blowhard Chris Matthews Plays Hardball with Guests for Wife’s Campaign – See more at: http://stonezone.com/article.php?id=708#sthash.LgHwQBY9.dpuf

Tingly-legged windbag Chris Matthews got caught in a pay-to-play scandal involving his wife’s campaign and his TV show. The blond blowhard has been soliciting donations to his wife’s congressional campaign in exchange for appearances on his show, enabling the donors to be seen by Hardball’s dozens of viewers. MSNBC should can the tiresome phony right away.

Not even smart enough to time the donations to be less obvious, some donations were made within a few days of the appearances. Matthews’ guests had given Kathleen Matthews’ campaign nearly $80,000 as of December 31, 2015. http://nypost.com/2016/03/11/chris-matthews-at-center-of-nbcs-latest-news-scandal/

This is just the latest evidence of Matthews’ thinking that rules and standards don’t apply to him. Back in 2009, he and his wife went to a church to buy a Christmas without his wallet. They picked out a tree and had the young man working the tree lot load it into their car, before telling him that he forgot his wallet. Matthews asked the teen volunteer to let him take the tree without paying and come back and pay later. When the teen said he couldn’t allow that, Matthews had a fit and said, “I’m Chris Matthews!” When the church volunteer wasn’t impressed enough to break the rules, Matthews sat in the car while his wife walked back to the house to get his wallet. The fair-haired fop barked, “See what you made her do?” When Matthews’ wife returned with his wallet, they didn’t even leave the poor volunteer a tip. He could have at least booked him as a guest on his show.

Matthews, who has been known to fuss with his hair for hours and terrorize MSNBC staffers, has always tried to be thought of as a “regular guy” who just happens to be in with the Washington elite. But his failure to take a hiatus from the show for his own failed bid for Senate and his use of MSNBC as a cash machine for his wife’s campaignshow us that he’s just another elite deviant, with no regard for his own viewers. He promised full disclosure several times on air, but only said enough to let viewers know his wife was running. Not once did he mention the donations from his guests.

If MSNBC has any respect for their viewers or for journalism, they must dump Matthews immediately. SIGN THE PETITION TO DEMAND NBC FIRE CHRIS MATTHEWS NOW

https://www.change.org/p/phil-griffin-msnbc-stop-selling-guest-spots-fire-chris-matthews

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Canadian Leader Heading To Secret Meet With Trump-Sanders Reps Killed

Jean-Lapierre-Murdered

Canadian Media Personality and Politician Jean Lapierre Murdered.

Canadian Leader Heading To Secret Meet With Trump-Sanders Reps Killed

By: Sorcha Faal, and as reported to her Western Subscribers

A chilling new Foreign Intelligence Service (SVR) report circulating in the Kremlin today states that one of Canada’s most beloved television and radio personalities, Jean Lapierre, was killed yesterday in Quebec Province by “a deliberate terrorist act” when his aircraft was targeted just hours prior to his secretly meeting with top representatives from the American political campaigns of Donald Trump and Bernie Sanders

According to this report, SVR “assets” this past weekend were monitoring the “movement/actions” of a small contingent of Islamic State (ISIS/ISIL/Daesh) terror fighters that were secreted from the Levant War Zone territory of Syria into Turkey then flown out from Incirlik Air Base (IAB), landing first at Canadian Forces Base Greenwood, in Nova Scotia, then completing their flight at Edwards Air Force Base in California.

Upon these Islamic State terror fighters landing in California, this report continues, their US Central Intelligence Agency (CIA) and British Secret Intelligence Service (SIS/MI6) “handlers/instructors/protectors” transported them to a desert region outside the town of Apple Valley where, this past Sunday (27 March), they began firing their weapons at American citizens who had been hiking and camping in the area.

The SVR notes in this report that this “bizarre/strange” CIA-MI6 exercise involving these Islamic State fighters terrorizing American citizens was “more than likely” intended as a “simulated event” to test the reactions of local police forces who might in the future encounter these terrorists—and is a theory the SVR says is supported by the fact that as soon as local US police and Federal Bureau of Investigation (FBI) forces captured these terrorists, they were all let go “without charge.

Captured-ISIS-California-27-March-2016

Captured Islamic State Terrorists in California before being set free 27 March 2016

After their release by US police and FBI forces, this report continues, these Islamic State terror fighters were then transported back to Edwards Air Force Base where the SVR presumed they would begin their journey back to Turkey—but upon their plane landing for refueling in Nova Scotia Monday evening (28 March), 4 of these fighters departed their flight and boarded a smaller [красноломкий] that had filed a flight plan for the Îles-de-la-Madeleine Airport in Quebec, Canada.

In attempting to ascertain as to why these four Islamic State terrorists were being transported to this “small/tiny” Quebec island, this report says, the SVR was “enlightened/shocked” to discover that an Air Canada flight from Albany, New York, to Montreal, Quebec, had scheduled passengers belonging to both the Donald Trump and Bernie Sanders presidential campaigns aboard who all were then scheduled to continue flying on to Îles-de-la-Madeleine Airport.

A further “electronic countermeasure” investigation by the SVR of these Trump-Sanders “high level” representatives, as to why they were traveling to this island, this report continues, revealed a “significant” level of “contact/correspondence” with Jean Lapierre—who had, likewise, yesterday morning filed a flight plan to travel there too.

 

Upon compiling these “alarming/suspicious” “evidentiary facts”, this report notes, the SVR then sent to the Canadian Security Intelligence Service (CSIS) an urgent “investigate/inquire” request that was not responded to—and within three hours of this request being made, public reports began to state that Jean Lapierre’s plane had crashed while it was landing at this small islands airport killing him and 6 others aboard

Information-Alert

To why the representatives of Trump-Sanders would be meeting with Jean Lapierre, SVR analysts in this report state, is due to this Canadian politician being one of the most knowledgeable, and powerful, Western leaders who successfully established, across all party and ideological lines, a potent anti-establishment political party—called the Bloc Québécois.

Founded in June 1991, this report explains, the Bloc Québécois broke with Canada’s establishment and created a populist movement political party centered on the rights of French speaking Quebec peoples and bringing under its leadership former political enemies from both the left and right—a near mirror circumstance existing in the United States today should Trump and Sanders unite their populist movements. 

With populist sentiment fueling both Trump and Sanders, SVR political analysts in this report explain, their campaign rallies draw tens-of-thousands of disaffected American voters filled with anger against their nations elite rulers, and whose constituencies are now being observed to be merging—and which should they do, they would destroy both the Democratic and Republican parties

Trump-Bernie-2016

Unlike any other American Democratic Party politician too, this report continues, Sanders would, in fact, be acceptable to right-leaning Trump supporters due to his long support of gun rights—which were necessitated by his being a representative from the State of Vermont whose gun laws are nearly nonexistent.

And to the likelihood of a Trump-Sanders presidential ticket becoming a fact, this report concludes, it now appears a near certainty as both of these populist leaders, of both the left and the right, and no matter how many contests they win, are seeing the outright theft by their political parties of their nominations—Trump’s being done by the theft of the delegates he has won, and Sanders by a system that gives his opponent what are called “super delegates” the American people aren’t even allowed to vote for.

To if the American people will be allowed to know these facts, and though not mentioned in this SVR report, it is important to note that one of Germany’s top journalists recently admitted that the news is “completely fake” because “we all lie for the CIA”, a top US journalist admitted to fake news being told too, and other journalists have admitted that the US government actually pays to have lies disguised as news reported too—see them all below to know the truth:

http://www.whatdoesitmean.com/

Related

US President #Obama Admits US Trains ISIS
http://www.stewwebb.com/2015/09/02/obama-admits-us-trains-isis-july-2015

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com




Skull and Bones man Bill Clinton Scott Walker Jeb Bush Ted Cruz Revealed

Skull_&_Bones_Bush_&_Kerry

By Tom Heneghan and Stew Webb

Here is the latest on Bill Clinton, Scott Walker, Jeb Bush, Ted Cruz, Mitt Romney and George HW Bush.

Skull and Bones man Bill Clinton Scott Walker Jeb Bush Ted Cruz Revealed

We can report that George HW Bush Stooge CIA Bill Clinton as well as the Clinton Foundation are nowa target of the FBI Criminal investigation into the use of an illegal private server located at Bill Clinton and Lesbian Hillary Clinton private residence in New York State.

Note: its pay for play involving the Nations of Saudi Arabia, UAE, and the Nation of Switzerland.

We can also divulge that Republican Governor of Wisconsin Skull and Bonesman Scott Walker and his third cousin Jeb Bush are planning to steal the Republican nomination from Donald Trump and create a all Skull and Bones Republican ticket aka Scott Walker and Jeb Bush at a rigged Republican National Convention.

Note: Scott Walker along with former Massachusetts Governor Mitt Romney are Bag Men along with Micheal Contrell in the continued Money Laundering of Stolen U.S. Treasury Funds Re; The Wanta Reagan Mitterand Protocalls tied to HSBC Bank of Englewood, Colorado a subsidiary of Great West Life Assurance Company of Englewood and a Major Financial Foreign Currency Clearing Houses.

Note: The CME Group in Chicago, ILL.

At this hour the Legendary Michigan and Tennessee Flag Officers remain enraged Objective the destruction of the Bush Clinton Mizel totally compromised CIA and NSA.

Stay tuned for Emergency Updates at any moment we are currently working on a story involving a Jamaican Child Whore house attended by both Bill Clinton and Ted Cruz, in which Bill Clinton engaged in Sex with underage Black Hookers.

Skull_&_Bones_Bush_&_Kerry

Related Below:

APIAC_and_Abramoff_Operated

http://www.stewwebb.com/2014/02/03/aipac-and-abramoff-operated-child-sex-blackmail-ring

http://www.stewwebb.com/DynCorp_Disgrace_20020114.html

Skull and Bones

At Skull and Bones, Bush’s Secret Club Initiates Ream Gore

It’s the primal scene of American power, of Bush family values. For two centuries, the initiation rite of Skull and Bones has shaped the character of the men who have shaped the American character, including two Presidents named Bush.

And last Saturday, April 14–for the first time ever–that long-secret rite was witnessed by a team of outsiders, including this writer.

Using high-tech night-vision video equipment able to peer through the gloom into the inner courtyard of the Skull and Bones “Tomb” in New Haven, The Observer team witnessed:

The George W. effect: intoxicated by renewed proximity to Presidential power, a robed Bonesman posing as George W. harangued initiates in an eerily accurate Texas drawl: “I’m gonna ream you like I reamed Al Gore” and “I’m gonna kill you like I killed Al Gore.”
Privileged Skull and Bones members mocked the assault on Abner Louima by crying out repeatedly, “Take that plunger out of my ass!”
Skull and Bones members hurled obscene sexual insults (“lick my bumhole”) at initiates as they were forced to kneel and kiss a skull at the feet of the initiators.
Other members acted out the tableau of a throat-cutting ritual murder.
http://observer.com/index.php?s=At+Skull+and+Bones%2C+Bush%27s+Secret+Club+Initiates+Ream+Gore+&x=12&y=12
http://observer.com
The secret society that ties Bush and Kerry
01/02/2004)

Revelations that leading candidates for the US presidency were “Skull and Bones” members have provoked claims of elitism. Charles Laurence reports from New York.

The “tomb” stands dark and hulking at the heart of the Yale University campus, almost windowless, and shuttered and padlocked in the thick snow of winter storms.

Yale’s candidates for the White House pictured in their student days and the ‘Skull and Bones’ mascot Built to mimic a Greco-Egyptian temple, it is the headquarters of the Order of the Skull and Bones, America’s most elite and elusive secret society and it has become the unlikely focus of this year’s presidential election. It turns out that four leading contestants for the White House in November’s election were 1960s undergraduates at Yale: President Bush and Democratic rivals Governor Howard Dean, Sen John Kerry and Sen Joseph Lieberman.

What is more, two are “Bonesmen”. Both Sen Kerry, now the Democrat front runner, and President Bush belong to the 172-year-old society, which aims to get its members into positions of power. This presidential election seems destined to become the first in history to pit one Skull and Bones member against another.

The phenomenon of the “Yalies”, as Yale alumni are known, has provoked an intense debate over apparent elitism among Americans amazed that – in a democracy of almost 300 million people – the battle for power should be waged among candidates drawn from the 4,000 who graduated from Yale in four different years of the 1960s.

“To today’s Yale undergraduates it seems quite extraordinary,” said Jacob Leibenluft, a student and a reporter on the Yale Daily News, the campus newspaper. “For some it’s a source of pride, to others it’s a source of shame.”

In fact Yale, with annual tuition fees of $28,400 (£16,000), has long sent graduates to the top of all professions from the campus in New Haven, Connecticut, where it was founded in 1731.

The Skull and Bones is the most exclusive organisation on campus. Members have ranged from President William Taft to Henry Luce, the founder of the Time-Life magazine empire, and from Averill Harriman, the businessman and diplomat, to the first President George Bush.

Alexandra Robbins, a Yale graduate and author of a book on the Skull and Bones, Secrets of the Tomb, said: “It is staggering that so many of the candidates are from Yale, and even more so that we are looking at a presidential face-off between two members of the Skull and Bones. It is a tiny club with only 800 living members and 15 new members a year.

“But there has always been a sentiment at Yale to push students into public service, an ethos of the elite making their way through the corridors of power – and the sole purpose of the Bones is power.”

http://news.telegraph.co.uk/news/main.jhtml;$sessionid$IB4JLCGGOD4Z1QFIQMFCFGGAVCBQYIV0?xml=/news/2001/04/25/wclub25.xml

Ted-Cruz (2)

Anonymous Threat Ted Cruz Alleged Prostitution Secret
http://www.stewwebb.com/2016/03/30/anonymous-threat-ted-cruz-alleged-prostitution-secret

Ted Cruz Mother Eleanor Darragh Birth Certificate in Question
http://www.stewwebb.com/2016/03/30/ted-cruz-mother-eleanor-darragh-birth-certificate-question

Ted Cruz Caught Cheating with 5 Secret Mistresses!
http://www.stewwebb.com/2016/03/25/ted-cruz-caught-cheating-with-5-secret-mistresses

Bill-Clinton-Snorted-Cocaine-off-my-coffee-table

CLINTON NAMED AS LONGTIME SPOOK-CIA
http://www.stewwebb.com/2014/01/29/clinton-named-as-longtime-spook-cia

Bill Clinton snorted cocaine off my coffee table
http://www.stewwebb.com/2016/03/29/bill-clinton-snorted-cocaine-off-coffee-table

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

 

Satan_Dec_22

Stew Webb was right June 21, 2013

http://www.stewwebb.com/2014/12/21/illuminati-council-of-13-human-sacrifice-denver-colorado-dec-20-21

Suspect Mentioned Satanic Cult While Holding Toddler Hostage At MWC Walmart

http://www.news9.com/story/22633102/suspect-mentioned-satanic-cult-while-holding-toddler-hostage-at-mwc-walmart

jeb_bush_american_traitor

Jeb Bush Murders Securities Frauds Scams
http://www.stewwebb.com/2016/02/13/jeb-bush-frauds-and-scams

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Anonymous Threat Ted Cruz Alleged Prostitution Secret

Ted-Cruz-Exit-Race-Or-Else

We at StewWebb.com are beginning to sound like a typical Washington Soap Opera.

Put your seat belts on a lot more to come and we hope to wake up the younger Generation 18-40.

Ted Cruz Prostitution Secrets Reveled March 29, 2016

Ted Cruz thought Donald Trump was the biggest roadblock on his journey to the White House, but RadarOnline.com has learned he’s now facing an even more terrifying threat: This afternoon, an individual purporting to be a representative of the hacker group Anonymous posted a disturbing Twitter video that threatens to expose ‘very dirty secrets’ including information about Cruz ‘visiting prostitutes!’

“Your lying during this presidential campaign has gotten out of control,” the chilling video begins.

A voice alleges, “You have committed voter fraud to steal votes that do not belong to you … The fraud you have committed against Mr. [Ben] Carson will not be tolerated.”

“Anonymous will not let this go without repercussions or consequences,” the video states. “We will not sit and watch the citizens of America fall for it any longer.”

“Almost every word that comes out of your mouth is a complete lie … and you, Mr. Cruz, have been hiding behind some very dirty secrets that lie beneath the surface … secrets that you believed would never haunt you.”

As Radar reported, Cruz’s sister died of a drug overdose, and he was ticketed himself for possession of alcohol as a minor in 1987, a mistake he called “foolish.”

But the video claims he is hiding worse secrets.

“It’s time that we tell America what’s hiding behind the curtain,” the voice states, taunting, “… Do you recall visiting prostitutes?” (The clip offers no suggestion or proof that Cruz actually did consort with hookers, however.)

Finally, the video ends with an ultimatum: “Mr. Cruz, we are now demanding that you exit this race within 24 hours, or Anonymous will release all of the information we have found … Your so-called underground hacks that you think were done in the dark will be brought out for all the public to see …Your disgusting behavior … will go viral on every social media platform.”

Anonymous has not officially claimed authorship of the video.

http://www.nationalenquirer.com/politics/anonymous-threat-hackers-threaten-ted-cruz-with-alleged-prostitution-secret

The Website below triggered my virus protection it is wise to read below and not go there…

Source:
https://avengersocial.wordpress.com/2016/03/26/interview-with-a-candy-wrapper-the-lollipop-edition
Interview with a
Candy Wrapper, the
Lollipop Edition
Posted by AVENGERSOCIAL on MARCH 26, 2016
t’s not often, I do a story myself. I have a team writers so I
don’t have to. This leaves me the freedom to investigate and
track leads. But this story is so hot, I felt I should do this one.
If you have been on twitter #cruzsexscandal has been over
the top and widely circulated but let’s not forget the
anonymous video released that promised if Cruz did not drop
out his dirty secrets would come out. I can say this day has
come, given the release from the National Enquirer. But
Avenger has a leg up on everyone. Our anonymous source
found one of the alleged escorts who Ted Cruz frequented.
Her picture released in our previous story is not how she looks
today. Let’s call her Jane Doe.
We were given the exclusive interview done by the detective
that found her. We will not disclose her real identity nor her
location, since the initial leak she has gone off the radar. She
was found in a West Texas trailer park after a former escort
feared that she would too become part of this drama and gave
up her location. As promised, both identities are strictly
confidential and shall remain anonymous. For now, we are
just releasing some parts of this explosive transcript. An
excerpt of his interview with our Jane Doe is transcribed
below. Be forewarned it’s explosive. While we believe 100%
that is true, we’re are advised to refer to the statements below
as allegations. I do have the video of this conversation. Our
job is to shed light and not to master.
Detective: As agreed during our interview, your identity and
location will be kept secret, as sworn and recorded. When,
did you first meet Ted Cruz?
Jane Doe: 2004, I was 18 and my regular client in Dallas
gave him the contact. It is not unusual for this to happen,
many clients for the service I worked with are lobbyist,
donors, attorneys and politicians. That is why, I am scared
for my life that you found me.
Detective: I will not disclose any location or your true
identity, I found you because one of your former clients
gave me the information. That led me to one of your
associates that brought me here. I did this because if I can
find you, others can as well. This interview is only to
assure you are who they say you are. Your face will be not
shown, nothing will be asked to directly identify you.
Detective: Did Ted Cruz ever tell you he was married?
Jane Doe: Some clients do and some do not, he never
said anything about being married. He seemed to need
mothering of some sort, before we engaged in some of his
requested acts.
Detective: Requested acts?
Jane Doe: sometimes I would dress as a catholic school
girl for role play, that is popular with many clients though.
Other times he would request for me to dress like a judge.
Detective: I see, so would you say he is odd than other
clients?
Jane Doe: Who am I to judge my clients? I just do what, I
am paid for and go on my way.
Detective: What locations would you meet him?
Jane Doe: Houston/Dallas and I have been to Alexandria
as well.
Detective: Virginia?
Jane Doe: Yes
Detective: How many times would he visit you within a
week?
Jane Doe: In the beginning, it was every time he had
business in either of the locations. He would even pay for
my flights to Baltimore then rent a car for me to drive to
Alexandria.
Detective: Have you ever seen his wife?
Jane Doe: Yes, many times were close calls. I guess that
is why I am terrified how I was found.
Detective: I only found you because of your
friend/associate. I think she is about to leave as well.
Jane Doe: After this, I will have to move again. I am
leaving Texas and I wished I had never met him. I never
experienced this kind of problem as an escort. I knew,
when he said he was going to run for president that I would
be at risk. As a senator, I was not worried. I have met
many politicians doing this service but never had my life
been at risk.
Detective: You have my contact so you can reach me if
you need help. Let’s get back to talking about Ted more.
Did anyone give you a specific phone at any time for
contact?
Jane Doe: yes, until recently. I was getting weird calls with
no way to call it back. The number would be local and I
would answer to silence. None of the calls were of the
same number, so I threw away the phone.
Detective: So, you are saying this is why you feel
threatened?
Has he ever called you recently?
Jane Doe: Yes, it is why I feel threatened and No, he has
not called since January. This is when all the strange calls
started.
At this time, we are deciding to either pass this on to
syndicated publication or what are our legal options. We will
update once a decision is made.
Source:
Cruz’s Thot
Posted by JAYBYRDTOLDTWEETY on MARCH 16, 2016
With all of the massive buzz of #OPCruz video from the
hacktivist group anonymous warning Ted Cruz to drop out or
will be exposed for indulging with prostitutes. Out of the blue,
we were given the exclusive. Here is the actual tweet from
anonymous.
Anonymous Video
Avenger was given this complete story by submission and we
are the first to break this story. First we must break down how
this was found. An attorney from Texas, Mr. Hail relinquished
a phone to Ted Cruz which has direct contact with a prostitute
known as Felicia. As we were given this information, the story
is developing as this story is being published. We visited the
anonymous account that posted the video to compare
information if any released. We found only an image of Felicia
and where it was indicated she wore a locket with Cruz’s
image on it. Image is below.
We do have the actual image of Felicia below. By comparison
images are identical except for the locket.
We believe the Ted Cruz camp is well aware the allegations
caught fire on twitter over 24 hours ago. For those in the
media claiming Trump spokesperson Katrina Pierson is having
an affair with Ted Cruz should know, we do have all the
evidence that Katrina is free and clear of those allegations.
While we sort through this information, we will release the full
number that is tied between Cruz and Felicia. We have
intentionally redacted the number for now (5**) 23*-***8 given
this was handed late tonight. It will take sometime to
completely process this enormous amount of recorded
information given to Avenger. More to come!

Related Lying Ted Cruz:

Ted Cruz Mother Eleanor Darragh Birth Certificate in Question
http://www.stewwebb.com/2016/03/30/ted-cruz-mother-eleanor-darragh-birth-certificate-question

Ted Cruz Caught Cheating with 5 Secret Mistresses!
http://www.stewwebb.com/2016/03/25/ted-cruz-caught-cheating-with-5-secret-mistresses

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 

 

 

 




Ted Cruz Mother Eleanor Darragh Birth Certificate in Question

Ted-Cruz-Mothers-Birth-Certificate-In-Question

January 16, 2016

Cruz’s Mother Eleanor Darragh Birth Certificate in Question

Ted Cruz Mother Eleanor Darragh Birth Certificate in Question.

CNN interview with Candy Crowley, Ted Cruz himself says “My mother was born in Wilmington Delaware”.

We at Codefore were amused with the birth certificate posted by the  Breibart Blog.

Breibart  claims that the mother of Ted Cruz, Eleanor Darragh, was born in Wilmington Delaware and therefore Ted Cruz is a US Citizen.

Breibart says, (Darragh Ted Cruz’s mother) “ was born in Delaware on Nov. 23, 1934, establishing her citizenship by birth–and, according to U.S. law, that of her son, even though he was born in Calgary, Alberta, Canada, on Dec. 22, 1970.”

Not so Fast Breibart.

CNN interview with Candy Crowley, Cruz himself says “ My mother was born in Wilmington Delaware.”

 

The National  news media is assuming that since his mother was born in Delaware  and that makes her a US Citizen therefore Ted Cruz is a US Citizen. . No one that we could find  has checked out his mother, Mrs. Eleanor Darragh’s birth certificate in the State of Delaware. The claim is that on the Cruz birth certificate   Eleanor Wilson is named as his mother  and that she received the name Wilson due to a previous marriage.  Cruz claims  that his mother’s maiden name is Darragh.  For now we will assume that this is correct. But is the Darragh birth certificate credible?  The birth certificate posted by Breibart is the same as the one that Codefore received from the State of Delaware archives.

Ted-Cruz-Delaware-Public-Archives

We decided to take a look at the birth certificate. Briebart claims that Cruz’s birth certificate lists a woman named Eleanore Elizabeth Wilson (Cruz.s mother).  As you can see from the  birth document, the  name  of Cruz;s mother is Elizabeth Cekine and the father is Edward J Darragh.  They named their child Eleanor Darragh. For now Codefore will not take issue with the names on the Document. For PDF click HERE

Ted-Cruz-Mothers-Birth-Certificate-Maybe

As a disclaimer we remind the readers that the document we looked at was taken from the Breibart web site.  Breibart claims that it is a copy of an original document. Codefore verified Breibart’s claim and obtained this document from the State of Delaware. We at Codefore are not professional document examiners  and our opinions are based on visual computer inspection.  However JD Benish of Codeforeblog is a retired police  investigator and has had the opportunity to have seen many forged documents during his career.  Additionally we at Codefore have access to  people that know their way around Adobe Photo shop and other similar photo editing software. These people were invited to take a look at the document also.

We began by enhancing the photograph with filters to make the official looking stamps easier to read and to expose possible color difference.

Inhanced Eleanor Darragh Birth Cert. 4

There are several items on this document that indicate that the document has been created after the advent of photograph editing capabilities. There are also items on this document that indicate that one of the date stamps has been altered, and that both date stamps existed on the document before the document form was created  and the hand written information was added.

These items are as follows:

a.We will begin by assuming that the document form was pre-printed on or prior to November 23rd, 1934. We will also assume that some time after that the form was filled out and signed and the date stamps were put there to authenticate the date of birth. Based on these assumptions we assume that the vertical page border on the left side of the document was a part of the original pre-printed form.  A visual inspection indicates that there are several portions of the form wherein the form itself appears to overlap the date authentication stamps.

b.The words “PLACE OF BIRTH” slightly overlaps the stamp that says “Delaware, Jan 11 1935 Department” In particular the word “Department” is overlapped. We assume that the words “Place of Birth” were a part of the original printed document and if so, the date stamp should over lap the word “Department” not the opposite.

c.The same situation exists as indicated in the above “a”. The date stamp on the upper right corner of the document is clearly overlapped by the document heading word “BIRTH”.

d.On the upper left corner of the document you will see a stamp that says “STATE BOARD OF HEALTH”. The page border on the left side of the document clearly overlaps the word “STATE” and is visible to the naked eye.

e.About one third down the left side of the document you will see the hand written word “female in the box labeled “sex”. The “f” over laps the vertical page border. Ordinarily you would expect to see this type of overlapping on a pre-printed form, but it has already been established that this page border was added after the date stamps were applied to the document because the date stamp is overlapped by the page border. If this is accurate, the hand written word “female” was added after the Page border and therefore sometime after the date stamp.

There are other suspicious inconsistencies that we see on this document.

  1. On the box labeled “VERIFICATION OF NAME BY PARENT” the number 31 is inconsistent with all other numerical texts. The number 31 font is several sizes larger than all of the other numbers. It is highly unlikely that in 1934, the font size for this box would have been changed to a larger font than the others  The number 31 is the same font size as the words “Verification of name etc:” and it is noted that this font size is the only place it is found on this document. Remember that in 1934 typewriters font size and type were all unique to the typewriter and that is assuming that this document was created using a typewriter. If the document was created by a printer the change in font sizes, in particular the number would be highly unlikely. If the document was created later on a computer, the number font size consistency with the words Verification….;would be an easy error to make.
  2. As previously stated, filters were used to enhance the coloring of the document in particular the red date stamps. This filtering also revealed another inconsistency. You can see what, appears to be, words that are on the back side of this form. This is not uncommon on birth certificates.  On box 22. “Birth place.”  The color of the document has changed and is lighter and the visible wording on the back side of the document is not visible in this particular box.  In fact the wording on the back side of the document is only not visible in two boxes on this document. Box number 22 and box number 13, Both these boxes indicate place of birth of the parents.  The non existence of the visible wording on only these two boxes is highly suspicious and may be an indication that these boxes have been changed. When altering a document such as this, it is very difficult  to match exactly the background color and if the background color is to be identical it necessitates changing the background color of the whole document to make all portions appear identical.
  3. On the bottom right corner we noted that the signature of the physician is missing the top of the “J” and is not similar as the  “J” on Jr. . This may be the result of improper stamp application but this signature does not appear to have the characteristics of a “signature stamp” however it  does have the characteristics of an actual signature. If this opinion is accurate, the signature on this document may have been “cut and pasted” on the document and the top of the “J” in the name James was not properly cut.You can also see a possible cut error at the top of the letter “B” in the Doctors signature.. PDF HERE.

Ted-Cruz-Mothers-Maybe-Birth-Certificate

In the opinion of Codefore, this copy of a birth certificate is not a copy of an original unchanged 1934 document.  It is a copy of a document that has been changed using modern photograph editing software. Additionally it appears that the changes were not made by a professional photograph software editor.

There is more. When it became probable that the document was fraudulent, we made further inquiries into the information contained in the document. We accessed the 1940 US Census to see if the Darragh’s actually lived at the address they reported on the birth Certificate. PDF HERE

Ted-Cruz-Mother-Birth-Records

We specifically made an effort to validate the hand written addresses on the document indicated in boxes 10 and 19.  The addresses are different. Box 10 says 222 West 17th St. and Box 22 says 222 W. 7th St.  There are currently two such streets in Wilmington but 222 7th  St. did not  exist when the 1940 US Census was conducted.  This would be a possible assumption if and  when the original document was edited because today there is a 222 7th St. according to Google Maps. Codefore suggests that whoever made the changes to the document didn’t do enough 1934 research. An address that exists in 2015, didn’t necessarily exist in 1934.

The problem in verifying the residents in 1934 is that there was no  verification of residence for the particular year of 1934. However in  1940 when the  US Census was conducted the verification survey asks  the question of residence for the 5 previous years in the box labeled “Residence April 1st 1935.  This would be 97 days after Ted Cruz’s mother was born. It’s the closest date verification of the Darragh family we could get at this time to the exact birth date. (we are still working on this)

At  222 W. 17th St. Wilmington, the 1940 census indicates that  Mr. Edgar Welch, a fireman lived there. Welch told the census taker he had lived in this house on April 1st 1935 until present . The Census question as to the total length time  Mr. Welch lived there was not asked or required. He could have possibly lived there for 10 years or more. Mr. Welch reported the he, his wife, two children and a lodger who was a barbershop owner named “John”  age 32 lived there at the time the census was taken.

A 1940 name search on Darragh produced a Census document for the residence located at 1311 Loll or Toll Rd. unincorporated New Castle county known as Gordon Heights. The address could not be confirmed but the residents were Edward J. Darragh, his wife Elizabeth and children Eleanor and Caroline. Mr. Darragh claimed that all were US Citizens.  This research seems to validate, somewhat, the Eleanor birth certificate but does not explain the alterations.  At this time the only way to authenticate, or verify  the birth certificate of Eleanor Darragh is the St. Francis Hospital Archives or the Catholic Church birth records.

With all of this information taken into consideration, the question of birth certificates should be expanded to include Ted Cruz.s mother. If his mother’s birth certificate is fraudulent then she may not have been a US Citizen. If that is the case, Ted Cruz himself is not a US Citizen naturalized or not  and cannot posses a passport nor can he hold a seat in the Senate. We at Codefore are concerned that if Ted Cruz used the above Certificate of Birth to prove citizenship and or obtain a passport, who performed Cruz’s  background investigation??  Based on  our  opinion its apparent that whoever changed this document had co-operation from someone within the Delaware Government. Their Document   We also noted that included with the Birth Certificate obtained from the Delaware Archives was a transmittal sheet that indicated that it was for Eleanor E. Darragh.  Nowhere in any of the documents we researched was the middle initial “E.” used to support the birth of Eleanor.  This birth certificate states that Eleanor Darragh was born  1934. Was one of the changes made to the Birth Certificate erroneous?

Ted-Cruz-Mothers-Certified

Related:

Ted-Cruz (2)

Ted-Cruz-Birth-Certificate

Proof Ted Cruz Not Eligible for US President
http://www.stewwebb.com/2016/01/07/proof-ted-cruz-not-eligible-for-us-president

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Biblical Israelite’s are Hebrews which today are the Palestinians

Jew-vs-Hebrew

By Stew Webb

Federal Whistle blower

Biblical Israelites are Hebrews which today are the Palestinians.

Christ Killers were the Fake Jews the Canaanites

Read Genesis 3:23 and Genesis 6

Genesis 6: Humans mate with Fallen Angels and create Canaanites the blood line also known as the Jews not the Hebrew Biblical Israelite’s.

Also Read 3:23 Revelations

FOOD FOR THOUGH

John Hopkins University 5 year Genome Study you decide..

http://gbe.oxfordjournals.org/content/early/2012/12/14/gbe.evs119.full.pdf

http://pathology.jhu.edu/pancreas/PartAJA.php

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Bill Clinton grants pardon for his drug offending brother

RodgerClinton-BillClinton

Clinton grants pardon for his drug-offending brother

12:00AM GMT 21 Jan 2001

IN his final executive act as president, Bill Clinton yesterday dramatically pardoned more than 100 Americans including Susan McDougal, his former Whitewater business partner, and Patty Hearst, the former terrorist.

Miss Hearst, the granddaughter of the newspaper baron, William Randolph Hearst, had served three years in prison after joining the left-wing Symbionese Liberation Army that kidnapped her in 1974. Mr Clinton also pardoned his own brother, Roger, who was convicted for cocaine possession in Arkansas and who was among a number of drug offenders that Mr Clinton believed had been punished too harshly.

There was, however, no reprieve for Webster Hubbell, a former partner in Mrs Clinton’s Little Rock law firm who was convicted as a result of the Whitewater investigation. There was also no pardon for the former junk bond king Michael Milken who also served a prison sentence for fraud.

Mr Clinton had delayed announcing the pardons from Friday until yesterday morning. A row over Miss McDougal’s inclusion is thought to have caused the delay. Miss McDougal, a Clinton friend from Arkansas, spent 18 months in prison after refusing to give evidence that might implicate the President and First Lady in a bank fraud while he was the state’s governor.

No one expected Mr Clinton to go quietly, but the final hours of his presidency proved to be as full of drama as a Hollywood film script. The outgoing president’s longest day threatened to overshadow the inauguration ceremonies for George W Bush as arguments raged inside the White House over whether to pardon key figures in investigations into alleged corrupt financial dealings by the Clintons.

Long after Mr Clinton bade an emotional farewell to White House staff on Friday evening, a number of aids are understood to have cautioned Mr Clinton against including Miss McDougal on the list. Her lawyer, Mark Geragos, said he had been told that she was: “Front and centre the main reason,” for the delay in naming those pardoned. After hours of debate, a decision was postponed until yesterday morning, shortly before Mr Bush was due to take the oath of office in Washington.

The events of Mr Clinton’s last full day in office could not have been better staged to steal the headlines from his successor. What is normally a day of formality and farewells was transformed into a series of political dramas, which began with the breakfast dishes barely cleared from the President and First Lady’s table for the last time.

Rumours of the deal that would resolve the threat of criminal charges against Mr Clinton for lying under oath about his affair with Monica Lewinsky, began to sweep Washington. Behind the scenes, White House special counsel Robert Ray was concluding a deal with the president’s lawyer David Kendal that would lift the shadow that has hung over Mr Clinton for the last seven years.

The investigation, which began with the Whitewater land deal and Kenneth Starr, was concluded with the president admitting that he lied while giving evidence in a sexual harassment lawsuit brought by former Little Rock hotel receptionist Paula Jones.

Mr Clinton also agreed to pay a $25,000 fine, a five-year suspension of his licence to practice law in Arkansas, and not to seek the recovery of millions of dollars he has spent in legal fees fighting the investigation. Most significantly, he admitted to “testifying falsely” about his relationship with Miss Lewinsky while she was a White House intern.

Mr Clinton was said to be relieved to have the threat of charges removed after he left office, but upset that his final hours in the White House were once again dominated by the scandals that have dogged his presidency. For much of the rest of Friday, the President and First Lady packed the last of their personal belonging to be moved to their house outside New York.

The White House also released a list of gifts which Mr Clinton had decided to keep, including boxing gloves from the actor Sylvester Stallone, a kitchen table, two carpets and an oil painting of Buddy, his dog. Mr Clinton has not, however, forgiven everyone as it was revealed that Linda Tripp, whose secret recordings of her telephone conversations with Miss Lewinsky confirmed the relationship, has been sacked.

Miss Tripp, who worked at the Pentagon, was reclassified as a political employee after revealing the affair. White House rules require political staff to resign when a president leaves office. She was sacked for refusing to do so.

Even 90 minutes after President Bush had taken the oath of office, the now former president seemed reluctant to leave the Washington stage. Arriving at Andrews Air Force Base to board Air Force One for the flight to New York, Mr Clinton gave an unprecedented departure speech to members of his personal staff, revealing that he had toured the empty rooms of the White House that morning, but emphasising that the political baton had been passed to his wife Hillary in the Senate.

Mr Clinton joked that the loss of his presidential privileges meant: “For the first time in eight years I am in the driving seat.” He then issued what sounded like a warning to his opponents, saying: “I have left the White House, but I’m still here.” In a display of loyalty, Mrs Clinton agreed to accompany her husband on the short trip to their new house in Chappaqua rather than remain in Washington in her new role in the United States Senate.

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/1318811/Clinton-grants-pardon-for-his-drug-offending-brother.html

The Clintons’ headache is back: First brother Roger was paid $100,000 to influence Bill and ex-president bought him house despite IRS demand for his property

By FRANCESCA CHAMBERS, WHITE HOUSE CORRESPONDENT FOR DAILYMAIL.COM

Bill Clinton’s half brother Roger, nicknamed ‘headache’ by the Secret Service during Clinton’s presidency, has tried to keep a low-profile as his sister-in-law Hillary positions her family to move back into the White House.

But now it is revealed today that he used his brother-in-law’s name to win a $100,000 consulting contract with a company looking to build houses in Haiti.

And it is also disclosed that he is living in a home that was partly – if not fully – paid for by Bill through a limited liability company registered to the Clintons’ family home in Chappaqua, New York.

The use of such a device was described as having the potential to ‘raise eyebrows’ with the IRS. It was never disclosed by Hillary during her time in office that address was linked to the limited liability company.

Roger Clinton’s antics in the ’90s were a constant source of embarrassment for the first family, culminating in a 2001 congressional investigation over his attempts to ‘cash in’ on his connections to the White House.

The wannabee rock star, who went to prison in 1985 for cocaine abuse and for a time played in a band called Politics, was found to have engaged in ‘serious and reckless misconduct’ the review panel.

He has resurfaced just as Hillary tries to put a troubled start to her campaign for presidency behind her with her first television interview of her candidacy.

Roger currently lives in Los Angeles, California, on an $857,000 property he told the New York Times that he co-owns ’50-50′ with Bill, whom he calls ‘Big Brother.’Roger

‘I put 50 percent of the money into it,’ Roger, 58, told the publication during an interview, conducted at his home.

As the Times points out, if true, that could prove legally problematic for the younger Clinton because he owed the California and federal governments more than $100,000 in unpaid taxes and the IRS was to acquire any ‘property now owned or later acquired’ by him.

The house was purchased in 2009. It says the liens were removed in 2010 and 2011. If Roger did help purchase the property, that would constitute tax evasion.

‘If I was still working at the I.R.S. and someone came to me with this, it would raise eyebrows and trigger me to dig further to find out what exactly was going on,’ David Holtz, a former IRS litigator who lives in Los Angeles, told the Times.

A source familiar with the situation told the publication, however, that Bill Clinton purchased the property through a LLC so that his brother and his teenage nephew would have a place to live but he would not be personally responsible for the home as he would not be living in it.

It’s possible that Roger Clinton could have contributed to the purchase of the home but it is not clear how he would have done that given that the Times found no sustained record of income for him since, other than the $5,000-a-month deal with Living Modular, the company seeking to build low-cost homes in Haiti.

That deal itself raised questions as the man behind it suggested Roger Clinton promised to deliver a contract with his brother’s foundation.

‘I paid Roger $100,000,’ businessman Wayne Coleman said. ‘Basically, he promised to get us a contract through the Clinton Foundation for a project over there. What he was really trying to do was sell the influence of his brother.’

Roger was successful in getting the companies’ model included in an expo that Bill Clinton attended on behalf of The Clinton Foundation.

His brother did not choose to invest in the company’s product, though – a decision Roger talked up to ‘lawyers and advisers’ rather than his brother, whom he said ‘loved’ the effort.

‘You had all this government grant money, and all this money Bill was raising from around the world for reconstruction,’ he told the Times. ‘But we just couldn’t make it happen. It’s like, come on, man, can’t you just throw me a bone?’

Roger Clinton said that ‘seven out of 10 times’ being related to Bill and Hillary worked against him when trying to win major contracts because it would be interpreted as nepotism.

‘I don’t have a choice of being first brother,’ Clinton lamented. ‘It’s not like I’ve been given the option of doing it and I could turn it down. There are times when it’s hard.’

Sources who spoke to the Times said that Roger and his family have long benefited from his big brother’s monetary success in other ways, though.

Bill Clinton reportedly paid for Roger’s grown-up daughter to attend cosmetology school.

And, after leaving the White House, when he worked at investment firm Yucaipa, Bill Clinton is said by a former employee to have regularly written his brother checks.

On another occasion, Roger’s lawyer floated paying out a settlement over a domestic dispute involving two women on Clinton’s property with Bill’s money.

Bill and Hillary Clinton’s siblings have been accused on numerous occasions of trying to profit off of their relationships with the political power couple, and usually inappropriately.

Hillary’s older brother Hugh pocketed $400,000 from a Democratic Party donor – that he was later forced to give back – after he successfully lobbied Bill to commute the federal prison sentence of the donor’s drug-dealing son.

Her younger brother, Tony Rodham, also convinced Bill to grant a presidential pardon that he said he wasn’t paid to lobby for but a congressional investigation later found that he was.

He’s continued to ride the coattails of his brother-in-law, using the Clinton Foundation as a means to an ends of his own contracts in Haiti.

http://www.dailymail.co.uk/news/article-3152624/The-Clintons-headache-brother-Roger-paid-100-000-influence-Bill.html

Hillary-Clinton-Narcotics-Weapons-Frauds-Treason

Hillary-Clinton-Narcotics-Weapons-Frauds-Treason

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Hillary Clinton had several abortions kept Chelsea for political appearances

Hillary-Clinton-Abortion-Without-Limits

MARCH 29, 2016
BY KYLE OLSON

Hillary ‘had several abortions’, kept Chelsea for political appearances: Bill’s former lover

PART II of III — Even having a child was a political calculation for Hillary Clinton, one of Bill Clinton’s former lovers says — and it’s those types of actions that she believes should give every woman pause before making Hillary the first female president.

Miller, who had a three-month affair with then Gov. Bill Clinton in 1983, recently shared with The American Mirror some of the intimate secrets Bill told her, including that even having a child was a political calculation for the current Democratic front runner for president.


“She had several abortions before she had Chelsea and it was only because Bill convinced her that if they were ever going to move up in politics that they had to have a child because that is what the political analysts had said,” Miller says.

“They’ve gotta see her as a human. They have to see her — I think in society they always say, ‘If you were a mother, you can’t be half bad. There has to be some love or gentleness or compassion within in you birth a child,’ but that’s not true.

“There’s some pretty bad mothers. I had one,” Miller says. She said her mother had abused her for years.

Referring to Clinton again, Miller tells The American Mirror, “She is a Gloria Steinem kind of feminist. If you’ve ever seen picture or heard Gloria Steinem, just a cold, conniving bitch. That’s just it.

RELATED: Bill Clinton snorted cocaine off my coffee table, former lover says

“And they don’t care about anyone but themselves. That’s what most feminists are all about. It’s about themselves,” according to Miller.

“And most of them don’t link men, incidentally. They only use men for income (and) appearance.

“Hillary could never had made it to Washington, DC without Bill. He was the song and dance routine. He’s the one that played the sax and he could laugh and joke and talk and Hillary can’t do that.

“She can’t put on her black nightie and run around and she can’t play the sax,” Miller says, referring to her previous claim that, during their trysts, Bill Clinton would wear Miller’s nightie and play his instrument.

“I’m sure if she is a lesbian it’s not fun,” Miller says frankly.

When she was asked about where she heard Hillary Clinton was a lesbian, she responded, “Bill told me!

“Because I said why do you think she is so cold?” recalling her conversation with Bill. “Why do you think she is so uninterested in kissing and holding and just being close physically?

“He said that when she was in college that she and some girls experimented and she liked it. And that’s when the big feminist movement was moving forward and lesbianism was hot.

“It was more vogue for a woman to have a female partner than to have a male partner,” Miller says.

“She’s been an imposter all these years and yet even my own daughter said, ‘But mother, she deserves it. She’s worked for it.’

“I’ve worked for a lot of things in my life that I didn’t get. I worked to be Miss America,” the former Miss Arkansas says. “I wasn’t awarded Miss America. But did I want to go out and end other people’s lives and mistreat them because of it? No, you can’t do that.”

http://www.theamericanmirror.com/hillary-had-several-abortions-kept-chelsea-for-political-appearances-bills-former-lover-says

Coming soon: Sally Miller’s warning to women who get in Hillary Clinton’s way.

Hillary-Clinton-5thDegree-Witch

Hillary Clinton 5th Degree Witch giving Satanic Sign

Bill Clinton snorted cocaine off my coffee table
http://www.stewwebb.com/2016/03/29/bill-clinton-snorted-cocaine-off-coffee-table

Hillary-Clinton-Narcotics-Weapons-Frauds-Treason

Hillary-Clinton-Narcotics-Weapons-Frauds-Treason

Hillary Clinton Narcotics Weapons Frauds Treason
http://www.stewwebb.com/2016/02/25/hillary-clinton-narcotics-weapons-frauds-treason

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Bill Clinton snorted cocaine off my coffee table

Bill-Clinton-Snorted-Cocaine-off-my-coffee-table

Bill Clinton snorted cocaine off my coffee table former lover says

MARCH 28, 2016
BY KYLE OLSON

PART I of III — Sally Miller’s past makes her a danger to Hillary Clinton’s future.

As Bill Clinton’s former lover tells The American Mirror, Miller’s background in television and radio equips her to effectively critique the Democratic front runner for president — not to mention spill the secrets Bill told her during their three-month affair in 1983.

We recently spent several hours with Miller, where she talked about her time in Arkansas and she recounted the time she spent with Clinton when he was governor. Miller says Bill would come to the back door of her previous Little Rock home for their trysts, where he would wear her black nightie and play his saxophone while she played the piano.

And in the course of our discussion, she told us how the sitting governor would snort cocaine off her coffee table.

“I was the older woman,” she says. “I’m seven years older than Bill and I think that’s the reason he confided in me because, you see, his mother was the central part of his world, his life, and he didn’t ever really have a strong father figure.

“I think he felt like he could talk to me like he would talk to his mother.

“We laughed a lot and we had fun,” Miller recalls. “Of course, he didn’t need it, but I think it may have become a habit that he smoked marijuana and that he did coke,” Miller says, knocking on the coffee table sitting in front of her.

“I just realized this is the table. It’s funny just sitting here — all my furniture I’ve collected through the years, but this is the couch he sat on, and that’s the table.”

It was a stunning moment that flies in the face of what America knows about Bill Clinton’s drug use.

After all, much was made of Clinton’s admission in 1992 that he tried pot when he was studying at Oxford University and he didn’t like it — and “didn’t inhale.”

Miller proceeded to provide The American Mirror with a thorough account of the governor snorting cocaine off her furniture.

“When he did coke,” Miller says, “he brought a little — like a woman’s cosmetic case, that’s the only thing I can describe.

RELATED: Hillary ‘had several abortions’, kept Chelsea for political appearances: Bill’s former lover

“And he put it down here, pushed everything aside. And he rolled it out and there was this little mat and he sprinkled this white powder.

“I was sitting across the way and I was just fascinated because it had a little straw and he leaned over and — ” Miller says, bending over the table and pretending to injest, “you know, in each nostril.”

“He took a few big snorts and he felt better, I guess, because he had a big smile on his face.

“I asked him if he did coke because it was almost like a stimulant. He said it just made him feel better, gave him more power, made him feel courageous.

“I didn’t question it because everybody has different ways of getting high. I go running and I get a high,” Miller says, referring to her past days of regularly running to stay fit.

“If you ever saw pictures of Bill, he didn’t run much,” she says, smirking. “But he did do coke.”

A 1994 documentary titled, “The Clinton Chronicles,” deals extensively with allegations that Bill Clinton looked the other way as cocaine was trafficked through Mena, Arkansas.

“Dr. Suen, a doctor at the medical center here in Little Rock that’s taken care of Bill Clinton for his sinus problems, which may indeed be drug related to cocaine use, as they destroy the sinus passages,” Dr. Samuel Houston says in the film. “Gov. Bill Clinton was taken into the hospital, I believe it was the medical center, on at least one or two occasions, for cocaine abuse and overdosage, in which he actually had to be cared for at the hospital.”

A woman who said she provided cocaine for Clinton’s parties also appears in the film.

“I worked at a club called Le Bistro’s, and I met Roger Clinton there, Gov. Bill Clinton, a couple of his state troopers that went with him wherever he went,” Sharline Wilson says in “The Clinton Chronicles.”

“Roger Clinton had come up to me and he had asked me could I give him some coke, you know, and asked for my one-hitter, which a one-hitter is a very small silver device, O.K., that you stick up into your nose and you just squeeze it and a snort of cocaine will go up in there. And I watched Roger hand what I had given him to Governor Clinton, and he just kind of turned around and walked off. And that’s one specific.”

Coming soon: What does Miller think of Hillary Clinton as a woman and a mother?

http://www.theamericanmirror.com/shock-claim-bill-clinton-snorted-cocaine-off-my-coffee-table-former-lover-says

Clinton grants pardon for his drug-offending brother Rodger Clinton

 

http://www.telegraph.co.uk/news/worldnews/northamerica/usa/1318811/Clinton-grants-pardon-for-his-drug-offending-brother.html

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com




Corey Lewandowski Trump Campaign Manager charged with assault

Cory-Lewandowski-Donald-Trump

By Stew Webb Federal Whistleblower

I am in agreement with Donald Trump nothing there just some Bitc_ pissed off because she was ignored and stepped in Corey way as he tried to get by her.

Nothing there…

Click on link below to watch video

 

 

http://www.twitter.com/realDonaldTrump

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Satanic Worship Thursday-Friday Dec 24-25 2015

Hillary_Clinton_Blood_Thirsty Bill_Clinton

Satanic Worship Thursday-Friday Dec 24-25 2015

Christmas Eve is a Satanic Lucifer an Holiday.

Friday Christmas night is a Full Moon which is another Satanic Worship.

Pray against this Evil Filth.

Satanic Calendar
http://www.stewwebb.com/2015/12/21/satanic-calendar

stewwebbradionetwork-com-2015-09-24

 

Stew Webb Radio Network
Listen Live
http://www.stewwebb.com
http://192.240.102.131:9744/stream
listen live by phone
712-775-8269

StewWebbRadioNetwork-Calltolisten

 




FBI DHS Israeli Cyber Attacks against US Whistle blower

Israel-Cyber-Terrorism-and-espionage-is-DOD-a-Co-Conspirator

Israel-Cyber-Terrorism-and-espionage-is-DOD-a-Co-Conspirator

Hits
Humans
Registered Users
Crawlers
Google Crawlers
Pages Not Found
Logins and Logouts
Top Consumers
Top 404s
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
11/28/2015 3:47:10 AM (1 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:09 AM (3 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:07 AM (4 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:06 AM (5 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:05 AM (7 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:03 AM (8 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:02 AM (10 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:01 AM (11 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:59 AM (12 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:58 AM (14 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:57 AM (15 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:55 AM (16 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:54 AM (18 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:52 AM (19 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:51 AM (21 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:50 AM (22 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:48 AM (23 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:47 AM (25 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:46 AM (26 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:44 AM (27 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:43 AM (29 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:41 AM (30 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:40 AM (31 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:38 AM (34 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:36 AM (35 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:35 AM (37 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:33 AM (38 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:32 AM (40 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:30 AM (41 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:29 AM (43 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:27 AM (45 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:25 AM (46 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:24 AM (48 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:22 AM (49 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:21 AM (51 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:20 AM (52 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:18 AM (53 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:17 AM (55 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:15 AM (56 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:14 AM (58 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:12 AM (59 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:11 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:09 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:08 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:07 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:05 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:04 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:02 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:00 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:59 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:58 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:56 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:55 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:54 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:52 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:51 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:48 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:47 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:46 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:44 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:39 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:37 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:35 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:33 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:32 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:30 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:29 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:28 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:26 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:25 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:24 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:22 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:21 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:19 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:18 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:16 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:15 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:13 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:12 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:10 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:09 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:07 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:06 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:04 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:03 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:02 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:00 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:59 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:57 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:56 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:54 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:53 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:51 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:50 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:48 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:47 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:46 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:44 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:42 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:41 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:39 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:38 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:36 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:35 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:34 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:32 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:31 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:43 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:41 AM (1 minute ago)
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Japan Tokyo, Japan visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:44:24 AM (3 minutes ago) IP: 203.189.102.104 [unblock] Hostname: 203-189-102-104.user.win-rd.jp
Browser: IE version 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
[Unblock this IP] — [Block this network] — [Run WHOIS on 203.189.102.104] — [See recent traffic]
Japan Tokyo, Japan visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:44:21 AM (3 minutes ago) IP: 203.189.102.104 [unblock] Hostname: 203-189-102-104.user.win-rd.jp
Browser: IE version 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
[Unblock this IP] — [Block this network] — [Run WHOIS on 203.189.102.104] — [See recent traffic]
Japan Tokyo, Japan visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:44:19 AM (3 minutes ago) IP: 203.189.102.104 [unblock] Hostname: 203-189-102-104.user.win-rd.jp
Browser: IE version 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
[Unblock this IP] — [Block this network] — [Run WHOIS on 203.189.102.104] — [See recent traffic]
China Xiamen, China arrived from http://www.finewinegiftstore.com/product/38-stainless-steel-blow-off-tube-for-6-5-and-7-9-gallon-bucket-lids/ and visited http://www.stewwebb.com/2014/02/18/hillary-clinton-aipac-bush-organized-crime-figure/trackback/
11/28/2015 3:43:46 AM (4 minutes ago) IP: 58.23.62.37 [unblock this range] Hostname: 58.23.62.37
PHP/5.2.33
[Unblock this range] — [Block this network] — [Run WHOIS on 58.23.62.37] — [See recent traffic]
Brazil Boa Vista, Brazil visited http://www.stewwebb.com/
11/28/2015 3:43:44 AM (4 minutes ago) IP: 200.10.48.102 [unblock] Hostname: reverso-200-10-48-102.bakanas.net.br
Browser: Chrome version 35.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
[Unblock this IP] — [Block this network] — [Run WHOIS on 200.10.48.102] — [See recent traffic]
China Xiamen, China arrived from http://www.finewinegiftstore.com/product/38-stainless-steel-blow-off-tube-for-6-5-and-7-9-gallon-bucket-lids/ and visited http://www.stewwebb.com/2015/11/22/independence-day-july-4th/
11/28/2015 3:43:43 AM (4 minutes ago) IP: 58.23.62.37 [unblock this range] Hostname: 58.23.62.37
PHP/5.2.33
[Unblock this range] — [Block this network] — [Run WHOIS on 58.23.62.37] — [See recent traffic]
United States United States visited http://www.stewwebb.com/
11/28/2015 3:43:38 AM (4 minutes ago) IP: 176.61.140.111 [unblock] Hostname: 176.61.140.111
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this IP] — [Block this network] — [Run WHOIS on 176.61.140.111] — [See recent traffic]
China China arrived from http://www.finewinegiftstore.com/product/38-stainless-steel-blow-off-tube-for-6-5-and-7-9-gallon-bucket-lids/ and visited http://www.stewwebb.com/2015/11/22/independence-day-july-4th/
11/28/2015 3:43:35 AM (4 minutes ago) IP: 117.164.235.143 [unblock this range] Hostname: 117.164.235.143
PHP/5.2.33
China Hefei, China visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:46:08 AM (2 minutes ago) IP: 223.240.77.32 [unblock this range] Hostname: 223.240.77.32
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
China Beijing, China visited http://www.stewwebb.com/2015/10/
11/28/2015 3:46:41 AM (2 minutes ago) IP: 220.181.108.148 [unblock this range] Hostname: baiduspider-220-181-108-148.crawl.baidu.com
Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
[Unblock this range] — [Block this network] — [Run WHOIS on 220.181.108.148] — [See recent traffic]
China Beijing, China visited http://www.stewwebb.com/2013/07/25/gulf-of-mexico-gas-rig-explodes/
11/28/2015 3:46:29 AM (2 minutes ago) IP: 180.76.15.33 [unblock this range] Hostname: baiduspider-180-76-15-33.crawl.baidu.com
Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.zip
11/28/2015 1:52:35 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.rar
11/28/2015 1:52:33 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.com.zip
11/28/2015 1:52:32 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.com.rar
11/28/2015 1:52:30 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwstewwebbcom.zip
11/28/2015 1:52:29 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwstewwebbcom.rar
11/28/2015 1:52:27 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www_stewwebb_com.zip
11/28/2015 1:52:26 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www_stewwebb_com.rar
11/28/2015 1:52:25 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.stewwebb.com.zip
11/28/2015 1:52:23 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.stewwebb.com.rar
11/28/2015 1:52:22 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/web.zip
11/28/2015 1:52:20 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/web.rar
11/28/2015 1:52:19 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.zip
11/28/2015 1:52:17 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.rar
11/28/2015 1:52:16 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/?½??????.zip
11/28/2015 1:52:13 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/?½??????.rar
11/28/2015 1:52:10 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwroot.zip
11/28/2015 1:52:09 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwroot.rar
11/28/2015 1:52:08 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
Harlow, United Kingdom visited http://www.stewwebb.com/feed/
11/28/2015 3:37:43 AM (11 minutes ago) IP: 82.27.235.189 [unblock this range] Hostname: cpc12-bsfd7-2-0-cust188.5-3.cable.virginm.net
Aggregator/2.7.1 (MSM8974; 5.1.1),gzip
[Unblock this range] — [Block this network] — [Run WHOIS on 82.27.235.189] — [See recent traffic]
United States Kansas City, United States left http://www.stewwebb.com/stewart_webb_amended_complaint_20121121.pdf and tried to access non-existent page http://www.stewwebb.com/stewart_webb_amended_complaint_20121121.pdf
11/28/2015 3:37:09 AM (12 minutes ago) IP: 142.54.178.147 [unblock this range] Hostname: ns1.forhard.com
Mozilla/5.0 (Windows NT 5.1; rv:40.0) Gecko/20100101 Firefox/40.0
[Unblock this range] — [Block this network] — [Run WHOIS on 142.54.178.147] — [See recent traffic]
United States Seattle, United States visited http://www.stewwebb.com/robots.txt
11/28/2015 3:37:07 AM (12 minutes ago) IP: 52.23.156.32 [unblock this range] Hostname: ec2-52-23-156-32.compute-1.amazonaws.com
ltx71 – (http://ltx71.com/)
[Unblock this range] — [Block this network] — [Run WHOIS on 52.23.156.32] — [See recent traffic]
Australia Australia visited http://www.stewwebb.com/
11/28/2015 3:36:54 AM (12 minutes ago) IP: 123.211.87.200 [unblock] Hostname: CPE-123-211-87-200.lnse4.cha.bigpond.net.au
Apple-PubSub/65.23
Riga, Latvia arrived from https://www.google.lv/ and visited http://www.stewwebb.com/
11/28/2015 3:39:00 AM (11 minutes ago) IP: 80.232.243.112 [unblock] Hostname: 80.232.243.112
Browser: Opera version 33.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36 OPR/33.0.1990.115
[Unblock this IP] — [Block this network] — [Run WHOIS on 80.232.243.112] — [See recent traffic]
Hong Kong Tsimshatsui, Hong Kong tried to access non-existent page http://www.stewwebb.com/a.htm
11/28/2015 3:38:15 AM (11 minutes ago) IP: 202.69.240.125 [unblock] Hostname: 202.69.240.125
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31
United States San Francisco, United States visited http://www.stewwebb.com/feed/
11/28/2015 3:49:32 AM (1 minute ago) IP: 192.0.116.203 [unblock this range] Hostname: 192.0.116.203
Automattic Feed Fetcher 1.0
[Unblock this range] — [Block this network] — [Run WHOIS on 192.0.116.203] — [See recent traffic]
United States Buffalo, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/
11/28/2015 3:49:23 AM (1 minute ago) IP: 23.229.22.41 [unblock this range] Hostname: preqin-car-41.premiumecar.com
Browser: Chrome version 39.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36
United States Cheyenne, United States visited http://www.stewwebb.com/
11/28/2015 3:50:30 AM (1 minute ago) IP: 104.152.215.160 [unblock] Hostname: 160-215-152-104-static.reverse.queryfoundry.net
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this IP] — [Block this network] — [Run WHOIS on 104.152.215.160] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/
11/28/2015 3:50:29 AM (1 minute ago) IP: 89.39.173.49 [unblock this range] Hostname: 89.39.173.49
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this range] — [Block this network] — [Run WHOIS on 89.39.173.49] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/2015/11/28/us-government-and-israel-cyber-attack-against-stew-webb-whistle-blower/
11/28/2015 3:50:26 AM (1 minute ago) IP: 89.39.172.193 [unblock this range] Hostname: 89.39.172.193
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this range] — [Block this network] — [Run WHOIS on 89.39.172.193] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/2015/11/28/us-government-and-israel-cyber-attacks-us-whistle-blower/
11/28/2015 3:50:26 AM (1 minute ago) IP: 86.107.109.78 [unblock this range] Hostname: 86.107.109.78
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this range] — [Block this network] — [Run WHOIS on 86.107.109.78] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/feed/
11/28/2015 3:50:21 AM (1 minute ago) IP: 188.240.40.21 [unblock] Hostname: 188.240.40.21
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36

France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:32 AM (11 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:30 AM (13 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:28 AM (15 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:23 AM (21 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:21 AM (22 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:20 AM (24 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:18 AM (25 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:16 AM (27 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:15 AM (28 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:14 AM (30 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:12 AM (31 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:11 AM (33 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:09 AM (35 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:08 AM (36 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:06 AM (37 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:05 AM (39 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:03 AM (41 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:01 AM (42 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:00 AM (44 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:59 AM (45 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:57 AM (46 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:56 AM (48 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:54 AM (49 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:53 AM (50 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:52 AM (52 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:50 AM (54 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:47 AM (56 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:46 AM (58 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:44 AM (59 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:43 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:41 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:40 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:39 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:37 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:36 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:34 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:33 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:31 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:30 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:29 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:27 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:26 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:25 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:23 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:22 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:21 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:19 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:18 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:17 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:15 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:26 AM (17 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:24 AM (19 seconds ago)
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
ThrottlingNov272015
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
1145am cst
Israel left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2014/11/25/this-link-is-for-you-cyber-terrorism-felons/
11/27/2015 11:02:32 AM (4 minutes ago) IP: 213.184.113.29 [unblock this range] Hostname: 213.184.113.29
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
+++++++++++++++++++++++++++++++++
Buffalo, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/category/colorado-breaking-news/
11/27/2015 11:02:47 AM (4 minutes ago) IP: 192.3.253.213 [unblock this range] Hostname: 192-3-253-213-host.colocrossing.com
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0

++++++++++++++++++++++++++++++++++++
Zhoushan, China visited http://www.stewwebb.com/category/news/page/5/
11/27/2015 11:04:31 AM (3 minutes ago) IP: 123.96.138.148 [unblock] Hostname: 123.96.138.148
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)

+++++++++++++++++++++++++++++++++++++++
United States Durham, United States arrived from https://www.pinterest.com/ and visited http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1/
11/27/2015 11:01:34 AM (11 minutes ago) IP: 45.37.69.70 [unblock] Hostname: cpe-45-37-69-70.nc.res.rr.com
Browser: Chrome version 46.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36
++++++++++++++++++++++++++++++++
Fairfax, United States visited http://www.stewwebb.com/category/courts-2/
11/27/2015 11:01:58 AM (11 minutes ago) IP: 69.196.253.30 [unblock this range] Hostname: eth0-0-fw3-1-ap-r137-3-va3.blackboard.com
Blackboard Safeassign
++++++++++++++++++++++++++++++++++++++

Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 11:14:10 AM (1 minute ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 11:09:11 AM (6 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 11:04:20 AM (11 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:59:25 AM (16 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:54:30 AM (20 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:49:34 AM (25 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:44:46 AM (30 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:39:48 AM (35 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:34:37 AM (40 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:29:35 AM (45 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:24:25 AM (51 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:19:21 AM (56 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:14:15 AM (1 hour 1 min ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:09:08 AM (1 hour 6 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:04:01 AM (1 hour 11 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:58:58 AM (1 hour 16 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:54:03 AM (1 hour 21 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:47:00 AM (1 hour 28 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:41:46 AM (1 hour 33 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:34:26 AM (1 hour 40 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:28:40 AM (1 hour 46 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:21:22 AM (1 hour 54 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:16:07 AM (1 hour 59 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:08:27 AM (2 hours 6 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:03:14 AM (2 hours 12 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.IP: 178.137.95.130 [unblock]Hostname: 178-137-95-130-lvv.broadband.kyivstar.net11/27/2015 8:57:14 AM (2 hours 18 mins ago)
Whois IP 178.137.95.130
Updated 1 second ago

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
% To receive output for a database update, use the “-B” flag.

% Information related to ‘178.137.64.0 – 178.137.127.255’

% Abuse contact for ‘178.137.64.0 – 178.137.127.255′ is ’email@kyivstar.net’

inetnum: 178.137.64.0 – 178.137.127.255
netname: KYIVSTAR-NET-14
descr: Kyivstar GSM
descr: Ukrainian mobile phone operator
country: UA
admin-c: KSUA-RIPE
tech-c: KSUA-RIPE
status: ASSIGNED PA
mnt-by: KYIVSTAR-MNT
mnt-lower: KYIVSTAR-MNT
mnt-routes: KYIVSTAR-MNT
created: 2012-02-17T11:54:15Z
last-modified: 2012-02-17T11:54:15Z
source: RIPE # Filtered

role: Kyivstar GSM
address: Degtyarevskaya, 53
address: Kiev, Ukraine
admin-c: AEL17-RIPE
tech-c: JEDI-RIPE
tech-c: AEL17-RIPE
nic-hdl: KSUA-RIPE
remarks: Please send all abuse reports here:
abuse-mailbox: email@kyivstar.net
mnt-by: KYIVSTAR-MNT
created: 2003-05-19T14:48:31Z
last-modified: 2014-06-17T07:59:30Z
source: RIPE # Filtered

% Information related to ‘178.137.80.0/20AS15895’

route: 178.137.80.0/20
descr: Kyivstar GSM, Kiev, Ukraine
origin: AS15895
mnt-by: KYIVSTAR-MNT
created: 2010-04-14T13:34:01Z
last-modified: 2010-04-14T13:34:01Z
source: RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.83-JAVA8 (DB-1)

ht




AMERICAN BACK SWEEP WILL ESCALATE

War-Crime-No-Statue-of-Limitations

By Tom Heneghan, International Intelligence Expert

http://www.tomheneghanbriefings.com

UNITED States of America –

Ex-CIA Chief: Bush and Cheney Knew 9/11 Was Imminent, Concealed Intelligence

Jake Anderson

November 18, 2015

(ANTIMEDIA) A new report from POLITICO corroborates a suspicion long held by critics of George W. Bush and Dick Cheney. It affirms the former president and vice president not only had intelligence warning the terror attacks of 9/11 were imminent, but that they repeatedly ignored the CIA’s warnings. The most shocking assertion is that Bush and Cheney actively attempted to hide the paper trail documenting the fact that the evidence was presented to them.

The claim comes from none other than ex-CIA Chief George Tenet, who recounted with palpable frustration how Bush, Cheney, and National Security Advisor Condoleezza Rice ignored multiple warnings from both him and then-counterterrorism chief, Cofer Black, during the late spring and summer of 2001.

Previously, the most salient proof the Bush administration had advanced warning of 9/11 was the infamous August 6th edition of the CIA Presidential Daily Brief given to George W. Bush. Titled “Bin Laden Determined to Strike in U.S.,” the document has often been cited by journalists and whistleblowers making a case of willful negligence against Bush and Cheney. The new information from Tenet and Black presents a considerably deeper timeline, showing there was a consistent stream of intelligence warnings starting at least four months prior to September 11th.

According to Black, by May of 2001 “it was very evident that we were going to be struck, we were gonna be struck hard and lots of Americans were going to die.”

Reacting to the threat, Tenet and Black formulated a plan called “the Blue Sky paper,” which called for a comprehensive but covert CIA and military campaign to wipe out Al Qaeda before it could launch attacks. Specifically, Tenet wanted a paramilitary team deployed to the Afghan sanctuary with the goal of “creating a bridge with Uzbekistan.”

Tenet says the response to the “the Blue Sky paper” was stunning. The administration did not want to address the issue, and notably, “didn’t want the clock to start ticking.” In its report, POLITICO translates this to Tenet claiming Bush and Cheney didn’t want a paper trail of the warnings. It’s unclear whether Tenet directly asserted this sentiment or if reporter Chris Whipple inferred it.

What is clear is that for the entire summer preceding the 9/11 attacks, the administration ignored warnings about the threat of Al Qaeda and outright rejected a CIA plan to destroy the terrorist group.

Tenet gets more specific with the nature of the intelligence:

“The world felt like it was on the edge of eruption. In this time period of June and July, the threat continues to rise. Terrorists were disappearing [as if in hiding, in preparation for an attack]. Camps were closing. Threat reportings on the rise.”

On July 10th, Tenet met directly with Condoleezza Rice at the White House, where Richard Blee, head of the agency’s Al Qaeda division, told the national security advisor, “There will be significant terrorist attacks against the United States in the coming weeks or months. The attacks will be spectacular. They may be multiple. Al Qaeda’s intention is the destruction of the United States.”

Rice has consistently downplayed this meeting. In her memoir, she said her recollection of the July 10th warning is not “crisp” because she and Tenet had been regularly discussing the terrorist threat.

How the president’s national security advisor—and the president and vice president themselves—did not prioritize the urgency of new intelligence regarding a terrorist attack against the United States is still a matter of confusion and deep disappointment for Tenet.

“To me it remains incomprehensible still. I mean, how is it that you could warn senior people so many times and nothing actually happened? It’s kind of like The Twilight Zone,” says Tenet. “I still look at the ceiling at night about a lot of things. And I’ll keep them to myself forever. But we’re all human beings.”

http://theantimedia.org/ex-cia-chief-bush-and-cheney-knew-911-was-eminent-concealed-intelligence
P.S. We can now divulge that Senator Dianne Feinstein, Democrat of California, and then U.S. Senator Hillary Rodham Clinton, Democrat of New York, along with then Florida Governor Jeb Bush, and then U.S. Senate Majority Leader Mitch McConnell, Republican of Kentucky, were also aware of the pre-9/11 warnings and, accordingly, are guilty of HIGH Treason.

It is no coincidence that the paramilitary attacks on the nation of France began two days after the political publication “Politico” fingered Bush and Cheney for HIGH Treason in the above article.

LET THE SECOND AMERICAN REVOLUTION CONTINUE AS THE
AMERICAN BACK SWEEP
WILL BE RUTHLESS
DIRECTIVE TO ALL U.S. REVOLUTIONARY COUNCILS:

1. Immediately shut down the TREASONOUS, UN-Constitutional Department of Homeland Security (DHS)

2. Eliminate the politically corrupt and incompetent U.S. CIA and the NAZI Paperclip U.S. NSA

3. Arrest and prosecute for HIGH TREASON the entire NAZI German Bush Crime Family bloodline along with all of the Clinton white trash

4. Arrest and prosecute U.S. media filth aka modern day “royal court messengers”; example: David Ignatius and Bob Woodward of the Washington Post

5. Immediately arrest and prosecute the entire United States Supreme Court, which has no credibility with the American People since their involvement in the year 2000 coup d ‘etat versus the American People and their enabling of Bush-Clinton NAZI gestapo activity reference the criminal politics, which has wrecked the American Republic

6. Immediately close the U.S. borders to Canada and Mexico

7. Message to the Michigan Flag Officers: Immediately arrest all Republican Congressmen from the treasonous state of Texas; examples: Thornberry and Cotton.

These neo-NAZI Texas Congressmen are planning more illegal, un-Constitutional espionage against the American People including destroying our 1st, 2nd and 4th Amendments and replacing our Constitution and Thomas Jefferson’s Bill of Rights with the Old Testament.

Note: The state of Texas has already committed treason by removing Thomas Jefferson from history books in the state of Texas.

So in the words of the French national anthem: Let their impure blood flow in the fields.

8. In closing, we can divulge that the Republic of France has fingered Great West Life (Denver) Subsidiary company HSBC bank of Hong Kong as the major financier of the British Petroleum (BP) and British Intelligence crisis actors terrorist group known as ISIS.

france_flag flagus usmcflag  lafayette 
Finally, VIVA LA FRANCE !

Both the American and French People shall be victorious as our two nations together and in alliance engaged in mortal combat for freedom can never be defeated!

Abraham-Lincoln

Thomas-Jefferson-Banking-Insitutuions

Thomas-Jefferson-Greatest-Danger-2

 

“Al Qaeda is nothing more than an extension of the operatus linked to U.S. intelligence that was allowed, by script, to remove itself as a rogue break away entity of the U.S. government’

allowed to de-compartmentalize from oversight, and was run instead by Gary Best rogue ‘Black Ops’ specialists for scripted activity outside of the U.S. government, with its funding being orchestrated through the Pakistani secret police,

an entity of the U.S. government itself.” (2006)

~ Tom Heneghan, great American Patriot and International Intelligence Expert

War-Revolution

“Those who would give up essential Liberty, to purchase a little Temporary Safety, deserve neither Liberty nor Safety.” (1755)

IN CONGRESS, July 4, 1776

The unanimous Declaration of the thirteen united States of America, enhanced excerpt But when a long train of abuses and usurpations, pursing invariably the same Object evinces a design to reduce them under absolute Despotism, it is their right, it is their duty, to throw off such Government, and to prove new Guards for their future security. (1776)

~ Thomas Jefferson, Founding Father, great American Patriot, author of the Declaration of Independence and 3rd U.S. President

http://www.archives.gov/exhibits/charters/declaration_transcript.htm

John-Kennedy-Revolution-Coming

President John F. Kennedy Warned US about The Illuminati Zionists Secret Societies
Al_Gore_Winner_2000_Election_CNN

As we live free or die, Lafayette remains at Brandywine and
Albert Gore Jr. remains the year 2000
U.S. Constitution DULY ELECTED,
non-inaugurated, natural born
REAL President of the United States.

Al Gore on Restoring the Rule of Law
http://www.acslaw.org/acsblog/al-gore-on-restoring-the-rule-of-law

 

guillotine_head_cut_off

 

Pivot-Now

Statue-Of-Liberty

In its international aspect the statue, which was a gift from the people of France to the people of the United States, commemorates the long friendship between the peoples of the two Nations—a friendship that has continued since the American Revolution when, implemented by the French with sinews of war, it helped turn the tide of victory to the side of the Colonies.

By Benjamin Levine and Isabelle F. Story, National Park Service 1961
http://www.libertystatepark.org/statueofliberty/intro.shtml

We_The_People_Restore_our_Constitution

stewwebbradionetwork-com-2015-09-24

http://www.stewwebb.com

 

 




France Catches Terror Cell involved in Paris attack

Turkish-American-Council-JohnMcCain-2

Exclusive November 16, 2015 218pm cst
By Stew Webb and Tom Heneghan

Above US Senator John McCain speaking at the Terrorist Cell known as the Turkish American Council tied to the World Trade Center attacks on 09-11-2001. McCain takes orders from the head of the Jewish Mob world wide Bank Bail out Scamster Larry Mizel of Denver, Colorado.  Mizel runs MDC Holdings, Inc. MDC-NYSE the parent company of the defunct Silverado Savings and Loan were Neil Bush was a Director laundering Iran Contra Drug Money. Larry Mizel and Norman Brownstein control Great West Life the parent company of HSBC Bank who launders money for ISIS Financing. Both Larry Mizel and Norman Brownstein are AIPAC Directors and Directors of the Simon Wiesenthal Center. Norman Brownstein served as one of the six CIA Council to George HW Bush when he was CIA Director in the 1970s.  Bill Clinton and Hillary Clinton Attorney James M. Lyons served on the Board of Directors of MDC Holding, Inc. (MDC-NYSE) during the 1980-1990s time frame. Fidelity Insurance company of Denver Colorado paid Bill Clinton’s legal fees during Clinton’s Impeachment. AIPAC Director and Attorney Norman Brownstien served on the Board of Directors of Fidelity at the time.

S&L whistleblower faces federal charges
http://www.stewwebb.com/2013/10/08/sl-whistleblower-faces-federal-charges

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud

http://www.stewwebb.com/2013/10/07/stew-webb-official-sec-whistleblower-complaint-mortgage-backed-securities-fraud

Larry Mizel go to Jews for Republicans Who Want to Be President

http://www.stewwebb.com/2015/08/30/larry-mizel-go-to-jews-for-republicans-who-want-to-be-president

Bush-Millman-Clinton Zionist Organized Crime Family Flow Chart (1)

http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1

france_flag
I can now be reported that arrests have been made by French agents of an Cell in Istanbul, Turkey tied to ISIS and the U.S.-Israeli Mossad controlled American-Turkish Council headquartered in Istanbul, Turkey that were instrumental in the attacks in Paris on Friday.
Intelligence has further confirmed that the Turkish American Council has been involved in the sale of Black Market Passports along with Turkish Government Officials who are on the take.
We can now also report that command and control for the terrorist attacks in Paris, France last Friday was the U.S.-Israeli Mossad controlled American-Turkish Council headquartered in Istanbul, Turkey.

RE:
The Time Is Now the Match is Hot!
November 15, 2015
By Tom Heneghan
http://www.stewwebb.com/2015/11/16/the-time-is-now-the-match-is-hot
We can now also report that command and control for the terrorist attacks in Paris, France last Friday was the U.S.-Israeli Mossad controlled American-Turkish Council headquartered in Istanbul, Turkey.
Command and control was also headquartered in Hamburg, Germany, the headquarters for the NAZI German Bush P2 Adamus Group 9/11 Kurt Becker cell.
I have confirmed this with former FBI whistle blower Sibel Edmonds.
As of this hour the Republic of France has declared “Code Jena” target Hamburg, Germany.
We can also divulge that the FBI is sitting on new email evidence in which current Democratic presidential candidate Hillary Rodham Clinton corresponds with Dick Cheney’s daughter in regards to fundraising activity tied to the terrorist organization the Muslim Brotherhood, along with the Clinton Foundation, and the Cheney owned Halliburton Corporation.
Clinton appealing to US war hawks
http://www.stewwebb.com/2015/10/08/clinton-appealing-to-us-war-hawks
FBI whistle blower Sibel Edmonds has also revealed to me that then U.S. Senator Hillary Clinton of New York received the same 36 pre-9/11 warnings of a spectacular imminent attack on the United States that former year 2000 illegal White House occupant George W. Bush FRAUD and his Secretary of State Condoleezza Rice received pre-9/11.
Reference: The pre-9/11 French Intelligence warning “the time is now the match is hot”.
New email evidence has also surfaced in which Hillary discusses with Sydney Blumenthal how joyful she was after the 9/11 attack because it was beneficial to her political goals, which was:
1. Finally legitimize Bush FRAUD as president
2. Eliminate duly elected President Albert Gore Jr. from the political equation.
3. Open the door for Hillary and her future presidential runs post Bush FRAUD.
In closing, at this hour, let the word go out.

American Turkish Council Terrorists website:
http://www.the-atc.org

stewwebbradionetwork-com-2015-09-24

http://www.stewwebb.com

 




Seattle TV interviews Stew Webb Whistle blower 2015-11-10

Seattle_TV_Call_4_Investigations1.JPG

Seattle TV interviews Stew Webb Whistle blower 2015-11-10 Veterans Day

 

 

 




No Bitch, No Bush, No Bank

No-Bitch-No-Bush-No-Bank

 

Sunday October 25, 2015

By Tom Heneghan, International Intelligence Expert

UNITED States of America – It can now be reported that former U.S. Secretary of State Hillary Rodenhurst Clinton ran an Iran-Contra style covert operation in Benghazi, Libya (regime change) on behalf of the Saudi Royal Family and the oil giant, environmental assassin British Petroleum (BP).

The covert operation in Benghazi was funded by British owned HSBC of Hong Kong and its American branch HSBC of Englewood, Colorado.

The funding of the covert op was with the use of counterfeit Iraqi dinar, which the Inspector General of the United States claims was gathered by FBI investigators who searched the Benghazi unregistered diplomatic outpost after the assassination of Ambassador Christopher Stevens.

We can also divulge that the security for the outpost were private mercenaries tied to British owned Blackwater Associates. We now see why the British left Benghazi before the scripted al Qaeda attack.

Wash the dinar – Wash the yen: sounds like Iran-Contra and Mena, Arkansas (Deal Room).

No-Bitch-No-Bush-No-Bank-1

HIGH TREASON CONSPIRATORS
AGAINST THE AMERICAN PEOPLE
Bush-Clinton Crime Family Syndicate
Hillary Rodenhurst Clinton and Barbara Bush aka “the bookkeeper”

British owned HSBC and German NAZI Deutsche Bank, along with former U.S. Secretary of State Clinton, and Bush Crime Family accountant aka “the bookkeeper” Barbara Bush, recently engaged in an illegal $7 TRILLION stock swindle aka the manipulation of the S&P 500 using the open window at the corrupt privately owned Federal Reserve using 90% of the pension funds of American citizens at Great Western Life Insurance Company as collateral.

Note: HSBC still holds these illegal under margined positions in the market with the corrupt Securities Exchange Commission (SEC) and the Commodities Futures Trading Commission (CFTC).

Reference: Hillary claims she made a mistake in voting for the illegal Un-Constitutional war in Iraq (based on regime change). Given her activities in Libya she did not learn from that mistake.

Liaison to Saudi Intelligence, British Intelligence and U.S. Citibank was Nazi Jew Sidney Blumenthal (his code name in the Libyan operation was “the radical).

Blumenthal is now working directly with Clinton super pac director and major fundraiser, homosexual David Brock.

Listen to this, folks, Brock is a former employee of Clinton era independent counsel Kenneth Starr.

Blumenthal and Brock specialize in bribery of corrupt U.S. media journalists and blackmail versus Hillary’s political enemies.

Brock and Blumenthal are also tied to former Clinton-Bush-CIA Mena, Arkansas asset Larry Nichols. Larry Nichols is tied to FBI Division 5 bribery, the National Enquirer, and FBI Division 5 cointelpro disinfo.

Scumbag Nichols is currently doing radio shows on behalf of Bush and Clinton claiming he needs money because he has lung cancer. Nichols does not have lung cancer. Nichols has diarrhea of the mouth.

Nichols is a personal friend of FBI Division 5 assassin Tim White.

Direct message to Nichols: Kneel down, punk!

We can also divulge that Democratic Congressman, Nazi Jew Adam Schiff is sitting on personal emails aka communication between Hillary, Blumenthal, Brock and Democratic Party National Chairman Nazi Jew Debbie Wasserman Schulz along with Nazi Jew Fox News contributor David Zimmerman in which she makes racist comments concerning current U.S. President Barack Obama and also discusses the need to have year 2000 DULY ELECTED natural born U.S. President Albert Gore Jr. assassinated if he decides to run for the Democratic presidential nomination in 2016.

Note: Congressman Schiff alleges that he is against the NSA spying on the American People but in truth is also covering up, according to NSA whistleblower Scott Bennett who is a friend of Edward Snowden, the fact that NSA spying against the American People has now been outsourced to a command and control outpost at Hebrew University in Jerusalem, Israel with Nazi Jew Israeli Prime Minister Benjamin Netanyahu as a paid consultant.

P.S. We can now report that Adamus Group Director Gordon Duff’s real name is Bouch Foote.

The name Bouch Foote is total German Nazi bloodline not Scottish.

P.P.S. Identify the Enemy!

At this hour there is no free press in the United States. There is a corporate-controlled Goebells-style propaganda machine tied to criminal banks and mega national corporations that pay no taxes.

So, identify the enemy!

Naval Intelligence asset Bob Woodward of the Washington Post has resurfaced. Woodward is a dangerous scumbag and blackmailer tied to the assassination of 1990s Clinton-Bush-Mena, Arkansas whistleblower Neil Cooper Moody.

Woodward had daily conversations with then Clinton era independent counsel and cover up artists Kenneth W. Starr. Woodward alleges from his Watergate days that former President Richard Nixon manipulated the electoral process. Woodward, himself conspired with Kenneth Starr and then First Lady Hillary Rodenhurst Clinton as well as then Deputy Attorney General Eric Holder to try to frame then Vice President Al Gore Jr. for making alleged questionable fundraising calls in the 1990s from the wrong room.

The leaker on Gore to Woodward was Nazi Jew bitch Hillary (call Forest Lindlay (301) 565-0477). Woodward wanted to clear the field for Clinton Crime Family partner George W. Bush aka BushFRAUD. Woodward also participated in the blackmail of then New York Major and Republican candidate in the Senate in the year 2000 Rudy Giuliani.

Woodward needed to clear the field for Hillary and set her up for future presidential runs post BushFRAUD.

So, as we can see, folks, it is the little bitch Woodward and the Washington Post that is now caught in manipulating the electoral process.

Direct message to Bob Woodward from the American People: Kneel down, punk!

Next!

We once again deal with Nazi Jew bitch Gloria Borger of CNN whose husband is a bought and paid for lobbyist representing the Bush Crime Family in Washington, D.C.

Borger recently commented that U.S. Vice President Joseph Biden (also controlled by Nazi Jew fundraisers like Haim Saban and Irv Bass) could be an emergency candidate for the Democratic presidential nomination should Hillary be indicted by the FBI.

Bitch Borger said it is no problem because the fundraisers that support Hillary support Biden.

Message to Gloria Borger: Shut up and kneel down, bitch! Your comments wreak of a royal court messenger. You know what happens to royal court messengers once the American People get enraged!

Now we are going to deal with little punk Chris Matthews and little bitch Lawrence O’Donnell of MSNBC.

Both are extortionists and blackmailers who took bribe money from then General Electric CEO Jack Welch during the year 2000 presidential election cycle to smear then Vice President Albert Gore Jr. The two little bitches actually voted for BushFRAUD in 2000 an now currently are on Hillary’s payroll.

Reference: Little bitch O’Donnell was a frequent visitor to Barney Frank’s homosexual whorehouse in Washington D.C. during the 1990s.

In closing, a financial meltdown still beckons as the IMF will soon declare the Chinese yuan currency a reverse currency meaning that the Japanese yen currency will no longer be calculated in units per U.S. dollars but U.S. dollars per currency unit.

Translation: British-owned HSBC ass is grass!

Exclusive, explosive reports from the patriot
Joint U.S.-French Intelligence Task Force,
operating on American soil for over 200 years
TOM HENEGHAN INTELLIGENCE BRIEFINGS
ALL Patriot Americans MUST know with sources inside
American/European intelligence agencies and INTERPOL
reporting what is really going on behind the scenes of the
corporate-controlled, fascist, extortion-friendly
propaganda U.S. media’s massive deceptions

Protect and defend your Constitution Bill of Rights,
the Supreme Law of the United States
http://www.tomheneghanbriefings.com
https://twitter.com/Tom_Heneghan

stewwebbradionetwork-com-2015-09-24

 




Senator John McCain Posed with Known Terrorists in Syria

Republican presidential hopeful, Sen. John McCain, R-Ariz., talks with reporters on his charter plane as he travels from Phoenix to Washington, Wednesday, Feb. 6, 2008, the day after the Super Tuesday primary elections. (AP Photo/Charles Dharapak)

Republican presidential hopeful, Sen. John McCain, R-Ariz., talks with reporters on his charter plane as he travels from Phoenix to Washington, Wednesday, Feb. 6, 2008, the day after the Super Tuesday primary elections. (AP Photo/Charles Dharapak)

stewwebbradionetwork-com-2015-09-24

stewwebbradionetwork-com-2015-09-24

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 

 








Obama-admits-US-trains-ISIS-july-2015-stewwebb

HildaBeast-StewWebb
Stew Webb Whistle blower Grand Jury Demand against Hillary Clinton "Still Active" Where is the Justice Department, having Lesbo Demonic Sex with Hillary Clinton?

Stew Webb Radio Network

stewwebbradionetwork-com-2015-09-24
Stew Webb 32 Years a Federal Whistleblower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistleblower-Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebbradionetwork.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the "Illuminati Council of 13".

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Network Store

Stew Webb Breaking News

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton's Assassins. There were two more crashed and attempts one year later.
Contributions are much appreciated Thank You.-- Stew Webb





Archives

U.S. President Donald Trump


Donald J. Trump's Website

Donald Trump Full Speeches

Donald Trump Presidential Announcement Full Speech 6/16/15

TEXT TRUMP TO 88022 TO GET EXCLUSIVE UPDATES
***By participating, you consent to receiving automated text messages from the campaign. Standard messaging rates apply.***

To donate, go here: https://secure.donaldjtrump.com/donate/
Contributions are not tax deductible for federal income tax purposes.

P.S. If you would like to purchase official campaign gear, click here.

#NoHildaBeast #NoHildadike #NoHillaryClintonChildRapist

Gun_Dog
Spot Dog is on the loose he loves to eat Illuminati, Zionist, Satanists and Lying Media Political Whores.
flagususmcflag france_flag


Stew Webb Whistle blower Grand Jury Demand Still Active against Hillary Clinton aka "HildaBeast". Where is the Justice Department having Lesbo Demonic Sex with Hillary Clinton?
Obama-admits-US-trains-ISIS-july-2015-stewwebb
Hillary Clinton aka "HildaBeast"
 

Is this what we want for a President?Is this what we want for a President?
Posted by Donald J. Trump on Wednesday, March 16, 2016

 
Hillary Clinton above Barking Like A Female Dog now Spot Dog wants to have hot sex with Hildabeast and HikdaDikes Lesbo Lover Huma Abedine we told the Spot dog his private part will fall off because HildaBeast is a Walking STD
Gun_Dog

Hillary-Clinton-Child-Rapist
Hillary Clinton Child Rapist
Hillarys-America
Hillary's America The Movie

Buggles - Video killed the radio star
george_bush_dance