Monthly Archives: March 2018

Easter Eve Human Sacrifice Pray

Easter Eve Human Sacrifice Pray

Radio Stew Webb and Joel March 30, 2018

26 minutes

Easter Eve Human Sacrifice! Pray! Stew Webb from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




DOJ Official Bruce Ohr Hid Wife’s Fusion GPS Payments

DOJ Official Bruce Ohr Hid Wife’s Fusion GPS Payments From Ethics Official

  • Justice Department official Bruce Ohr did not disclose Fusion GPS was paying his wife
  • Ohr was demoted from his post after the information emerged
  • Willfully falsifying government ethics documents can result in jail time

Bruce Ohr, the Department of Justice official who brought opposition research on President Donald Trump to the FBI, did not disclose that Fusion GPS, which performed that research at the Democratic National Committee’s behest, was paying his wife, and did not obtain a conflict of interest waiver from his superiors at the Justice Department, documents obtained by The Daily Caller News Foundation show.

The omission may explain why Ohr was demoted from his post as associate deputy attorney general after the relationship between Fusion GPS and his wife emerged and Fusion founder Glenn Simpson acknowledged meeting with Ohr. Willfully falsifying government ethics forms can carry a penalty of jail time, if convicted.

The Democratic National Committee (DNC) hired Fusion GPS to gather and disseminate damning info about Trump, and they in turn paid Nellie Ohr, a former CIA employee with expertise in Russia, for an unknown role related to the “dossier.” Bruce Ohr then brought the information to the FBI, kicking off a probe and a media firestorm.

The DOJ used it to obtain a warrant to wiretap a Trump adviser, but didn’t disclose to the judge that the DNC and former Secretary of State Hillary Clinton’s campaign had funded the research and that Ohr had a financial relationship with the firm that performed it — which could be, it turns out, because Ohr doesn’t appear to have told his supervisors. Some have suggested that the financial payments motivated Bruce Ohr to actively push the case.

For 2014 and 2015, Bruce Ohr disclosed on ethics forms that his wife was an “independent contractor” earning consulting fees. In 2016, she added a new employer who paid her a “salary,” but listed it vaguely as “cyberthreat analyst,” and did not say the name of the company.

The instructions require officials to “Provide the name of your spouse’s employer. In addition, if your spouse’s employer is a privately held business, provide the employer’s line of business.” As examples, it gives “Xylophone Technologies Corporation” and “DSLK Financial Techniques, Inc. (financial services).” The dollar amount does not need to be disclosed. “Report each source, whether a natural person or an organization or entity, that provided your spouse more than $1,000 of earned income during the reporting period,” they say.

The DOJ says, “Financial disclosure reports are used to identify potential or actual conflicts of interest. If the person charged with reviewing an employee’s report finds a conflict, he should impose a remedy immediately.” Its guidance says, “Employees should always seek the advice of an ethics official when contemplating any action that may be covered by the rules.”

Paul Kamenar, a Washington, D.C., public policy lawyer experienced in executive branch ethics and disclosure laws, said, “Based on my reading of the regulations and disclosure guide accompanying the form, he failed to disclose the source of his wife’s income on line 4 by not including the ‘name of the employer.’”

“The law provides that whoever ‘knowingly and willfully’ fails to file information required to be filed on this report faces civil penalties up to $50,000 and possible criminal penalties up to one year in prison under the disclosure law and possibly up to five years in prison under 18 USC 1001,” he said. “Since he lists her income type as ‘salary’ as opposed to line 1 where he describes her other income as ‘consulting fees’ as an ‘independent contractor’ it’s clear that she was employed by a company that should have been identified by name.”

“And even with respect to her ‘independent contractor’ listing, it appears incomplete by not describing what kind of services were provided. Both these omissions do not give the reviewing official sufficient information to determine whether there is a conflict,” Kamenar added.

Ohr also did not get a conflict of interest waiver from his supervisors, suggesting that he may not have explained to anyone the true source of the income and how it intersected with his official involvement in the case, nor did he have approval.

If a potential conflict is disclosed and explained to supervisors, a government agency can grant a conflict of interest waiver, known as a 208(b) waiver. In response to a records request, officials told The DCNF, “There are no … waivers for this filer.”

Scott Amey, general counsel of the Project on Government Oversight, said “he couldn’t get a waiver for that. That would have required outright recusal.” Making it potentially even worse than failing to recuse, Ohr’s pressing the Trump case appears to be something he decided to do on his own, rather than something assigned to him.

Bruce Ohr was demoted from his DOJ position shortly after the company’s founder acknowledged in a Nov. 14, 2017, interview with the House Intelligence Committee that he had met with him. Fox News reported in December that Ohr had concealed his meetings with the firm from his supervisors.

The form says, “Falsification of information required to be filed by section 102 of the Ethics in Government Act of 1978 may also subject you to criminal prosecution” as well as “civil monetary penalty and to disciplinary action by your employing agency.”

The lack of disclosure is the latest of several examples of people apparently trying to conceal the financial relationship that Fusion GPS, which was funded by the DNC, had with the family of the DOJ official.

In Fusion GPS founder Simpson’s November House interview, he conspicuously omitted his relationship with Nellie Ohr, painting Bruce Ohr as someone who he was connected to independently. Investigators said, “You’ve never heard from anyone in the U.S. Government in relation to those matters, either the FBI or the Department of Justice?”

“I was asked to provide some information … by a prosecutor named Bruce Ohr,” he said.

Investigators said, “Did Mr. Ohr reach out to you?”

“It was someone that Chris Steele knows … and I met Bruce too through organized crime conferences or something like that … Chris told me that he had been talking to Bruce … and that Bruce wanted more information, and suggested that I speak with Bruce,” Simpson said.

Simpson also said his firm was not affiliated with any Russian speakers, even though Nellie Ohr appears to speak the language.

In addition to meeting with Simpson, Ohr also met with Steele before the election.

In an earlier Aug. 22, 2017, interview with the Senate Judiciary Committee, Simpson didn’t mention either of the Ohrs by name. He said he had not met with any FBI officials about the matter, without noting his contact with the DOJ official.

Simpson suggested in court records on Dec. 12, 2017, that the only way government investigators could have found out about Nellie Ohr’s relationship with the company was through its bank records. “Bank records reflect that Fusion contracted with Nellie Ohr, a former government official expert in Russian matters, to help our company with its research and analysis of Mr. Trump. I am not aware of any other sources from which the committee or the media could have learned of this information,” he said.

Tom Fitton, president of Judicial Watch, a conservative legal group that has been critical of the department’s handling of the Trump investigation, said, “This document ought to trigger an immediate criminal investigation if one isn’t already ongoing.”

Kathleen Clark, an ethics expert and law professor at Washington University in St. Louis, said beyond the disclosure issue, as far as the legal definition of conflict of interest requiring a recusal, it could depend on whether Ohr’s actions would have had a “direct and predictable” effect on his wife’s income from Fusion GPS.

Kamenar said what is known as the frequently used “catch-all” provision clearly applies, saying “Circumstances… would cause a reasonable person with knowledge of the facts to question an employee’s impartiality” require recusal.

Amey said, “As a lawyer and a top Justice official, Ohr should know that he can’t participate in anything related to his wife’s work … Ohr should have been upfront about his wife’s employment and not touched anything related to Steele, the dossier, and Fusion GPS.” The DOJ’s judgment is only as good as the information volunteered to them by Ohr, he said, and because he didn’t list the name of his wife’s employer, they likely had no reason to suspect it might have impacted his work.

Walter Schaub, a former government ethics czar who is an expert on the forms and resigned after offering sharp criticisms of Trump, declined repeated requests to weigh in on Ohr.

Bruce Ohr did not return a request for comment, nor did the DOJ.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Radio Stew Webb, Tom Heneghan and Leo Wanta March 29 2018

Radio Stew Webb, Tom Heneghan and Leo Wanta March 29 2018

Intel Update – Lee Wanta, Tom Heneghan, Stew Webb (3-29-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistleblower

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower who has exposed Larry Mizel in violations of 18-USC-1010-1015.

Was that the guy in the Whte House? Is that BiBi?

Larry Mizel AIPAC Director

Israel Prime Minister BiBi and Larry Mizel

HSBC Run by Larry Mizel

Stew Webb Contributor Silverado Saving owned by MDC Holding, Inc.

Larry Mizel and B.C.C.I Jackson Stevens ran off with Charles Keating Money

IRS Charges filed by Stew Webb 1990 against MDC Holding, Inc Run by Larry Mizel

 

 

Stew Webb Current Grand Jury Demand against Larry Mizel

March 27, 2018

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

March 29, 2018

Evidence previous cyber attacked and posted on stewwebb.com

New evidence posted below implanting malicious code

Ten Cyber Terrorist Implanting Malicious Codes against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/26/ten-cyber-terrorist-implanting-malicious-codes-against-stew-webb-whistleblower/

Cyber Attackers Network planting malicious codes against Stew Webb Whistleblower 2018
http://www.stewwebb.com/2018/03/25/cyber-attackers-network-planting-malicious-codes-against-stew-webb-whistleblower-2018/

Cyber Terrorists planting malicious codes against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/16/cyber-terrorists-planting-malicious-codes-against-stew-webb-whistleblower/

March 28, 2018
Cyber Attackers exposed by Stew Webb Federal Whistle blower March 28 2018
http://www.stewwebb.com/2018/03/28/cyber-attackers-exposed-by-stew-webb-federal-whistle-blower-march-28-2018

New evidence posted below implanting malicious code

Larry Mizel Wide Open West Financial Cyber Attacks against Stew Webb Whistle blower

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence _syncAttackData= 1522350851.57

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522350851.57
3/29/2018 2:14:14 PM (11 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

United States North Royalton, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522350851.57
3/29/2018 2:14:14 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human
United States North Royalton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
3/29/2018 2:14:10 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human
United States North Royalton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
3/29/2018 2:14:10 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:41 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:38 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try  .wideopenwest.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States North Royalton, United States visited http://www.stewwebb.com/
3/29/2018 2:13:37 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100
Type: 404 Not Found
United States North Royalton, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
3/29/2018 2:13:35 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States North Royalton, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
3/29/2018 2:13:31 PM (14 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try.  wideopenwest.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Human
United States North Royalton, United States arrived from https://duckduckgo.com/ and visited http://www.stewwebb.com/
3/29/2018 2:13:17 PM (15 minutes ago)
IP: 50.4.72.39 Hostname: d4-50-39-72.try  .wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/60

# The following results may also be obtained via:
# https://whois.arin.net/rest/nets;q=NET-50-4-64-0-1?showDetails=true&showARIN=false&showNonArinTopLevelNet=false&ext=netref2
#

NetRange: 50.4.64.0 – 50.4.79.255
[4096 addresses in this network]
CIDR: 50.4.64.0/20 (50.4.64.0 – 50.4.95.255)
[8192 addresses in this network]
NetName: OH-CLEV
NetHandle: NET-50-4-64-0-1
Parent: WIDEOPENWEST (NET-50-4-0-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C02609448)
RegDate: 2010-10-15
Updated: 2014-10-28
Comment: Address complaints to abuse@  wideopenwest.com
Ref: https://whois.arin.net/rest/net/NET-50-4-64-0-1

CustName: Wide Open West
Address: 105 Blaze Industrial Pkwy
City: Berea
StateProv: OH
PostalCode: 44017
Country: US
RegDate: 2010-10-15
Updated: 2014-10-28
Ref: https://whois.arin.net/rest/customer/C02609448

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: ipadmin@  wideopenwest.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: abuse@  wideopenwest.com
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: ipadmin@  wideopenwest.com
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: kevin.baker@  wowinc.com
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

RTechHandle: LW463-ARIN
RTechName: WALDEN, LAWRENCE D
RTechPhone: +1-800-491-1436
RTechEmail: dwalden@  wideopenwest.com
RTechRef: https://whois.arin.net/rest/poc/LW463-ARIN

RNOCHandle: NMC5-ARIN
RNOCName: Network Management Center
RNOCPhone: +1-800-496-9669
RNOCEmail: nmc@  wideopenwest.com
RNOCRef: https://whois.arin.net/rest/poc/NMC5-ARIN

RAbuseHandle: ABUSE241-ARIN
RAbuseName: Abuse Department
RAbusePhone: +1-800-496-9669
RAbuseEmail: abuse@ wideopenwest.com
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE241-ARIN

Wide Open West Finance LLC cyber attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/23/wide-open-west-finance-llc-cyber-attacks-against-stew-webb-whistleblower/

Larry Mizel Wide Open West Financial cyber attacks against Stew Webb Whistle blower
March 3, 2018
http://www.stewwebb.com/2018/03/02/larry-mizel-wide-open-west-financial-cyber-attacks-against-stew-webb-whistleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

USAG Sessions Larry Mizel Cyber attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Insurance Co Cyber Attacks against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/25/larry-mizel-insurance-co-cyber-attacks-against-stew-webb-whistle-blower/

Larry Mizel Cyber Attacks against Stew Webb Whistle blower 18-USC-1010-1015
http://www.stewwebb.com/2017/12/25/larry-mizel-cyber-attacks-stew-webb-whistle-blower-18-usc-1010-1015/

Larry Mizel Cyber attack against Stew Webb Whistle blower
http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/westminister-colorado-computercrews-cyber-attacks-against-stew-webb-whi-stleblower/

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower
http://www.stewwebb.com/2018/03/03/fidelity-larry-mizel-denver-cyber-attacks-against-stew-webb-whistleblower/

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Hit And Run Of Controversial Seth Rich Investigator

Former Marine Charged In Shooting, Hit-And-Run Of Controversial Seth Rich Investigator

A former Marine, who claims to have worked as a special agent with the Department of Energy, has been charged with shooting and running over Republican lobbyist Jack Burkman, who conducted a controversial investigation of former DNC staffer Seth Rich’s murder.

Kevin Doherty, 46, was charged Monday with Use of a Firearm in the Commission of a Felony and two counts of Malicious Wounding, according to a press release from the Arlington, Va, Co. police department.

The Washington Post provided more details about the attack, which was the second to befall Burkman over the past several months. An unidentified assailant attacked Burkman with pepper spray at his home in January.

Burkman was shot and run over March 13 at a Rosslyn Marriott hotel’s parking garage. Burkman was there to retrieve what he thought were documents from an FBI whistleblower.

Doherty worked for Burkman on the Rich investigation until July 2017. Rich, a data analyst at the DNC, was murdered in Washington, D.C., on July 10, 2016, under mysterious circumstances. Doherty was an investigator on Burkman’s Profiling Project, the group he formed to solve the Rich case.

Rich’s death was initially described as a robbery gone wrong, but conspiracy theorists speculated he was killed due to involvement in stealing DNC emails eventually released through WikiLeaks. There is no evidence Rich was involved in handling DNC emails.

Burkman began working pro bono for Rich’s family in late 2016. He has come under heavy criticism for circulating unfounded theories about Rich’s death, including the Russian government was behind the killing. Burkman later claimed evidence suggested a serial killer murdered Rich.

Rich’s family members have since distanced themselves from Burkman.

Burkman fired Doherty and sent him a cease and desist letter, he told The Post.

“He became somewhat angry because he thought the Profiling Project belonged to him,” Burkman explained to The Post

“I just figured the matter was closed,” Burkman added. “But what happened is, I guess, he was simmering and simmering and simmering.”

Doherty’s LinkedIn page lists him as a former Marine and former special agent with the Department of Energy’s Office of Special Operations. Until recently, he operated Virginia-based maritime security company Nexus Consulting. Numerous press articles quoted him as an expert in the field. Burkman’s group touted Doherty’s credentials in press releases about its Rich investigation.

Burkman moved away from the Rich investigation in recent months. His latest project involved a $25,000 reward for information from FBI whistleblowers about bureau officials’ handling of the Clinton email and Russia investigations.

It was for that project Burkman was visiting the Virginia parking garage. He believed he would be retrieving a Justice Department inspector general’s report on former FBI Deputy Director Andrew McCabe, who was fired last Friday.

Burkman was told the papers were hidden under a cone in the garage, he said. But as The Post reports:

Instead, when Burkman bent over to pull the papers out from under the cone, he was shot in the buttocks and thigh. As he ran out of the garage with his dachshund in his arms, he was hit by an SUV.

The driver backed up and tried to hit him again, Burkman said to The Post.

“It looked like he was coming to kill me,” he told The Post.

Burkman did not learn Doherty was involved until he was in the hospital, when police identified his attacker.

Doherty is being held without bond.

The Department of Energy did not return a request for more information about Doherty’s work for the agency. The Arlington police department referred The Daily Caller News Foundation to the press release of Doherty’s arrest.

 




Colossal “Deep State” Blackmail War Against Russia

Colossal “Deep State” Blackmail War Against Russia Turns Deadly Sights On US Military Factions Supporting Trump

By: Sorcha Faal, and as reported to her Western Subscribers

Another ominous Security Council (SC) report circulating in the Kremlin today says that the “apologies being whispered into our ears” by Western diplomats who are expelling Russian diplomats in mass over a poisoning charade in the UK that no evidence exists for, proves that this invented crisis is “due to a colossal blackmail and pressure campaign” initiated by the American shadow government “Deep State”—and whose deadly sights have now turned on the US military and intelligence factions supporting President Donald Trump—as evidenced by the “false flag” terror attacks on Travis Air Force Base and, at least, 6 top American military and intelligence agencies over this past week.  [Note: Some words and/or phrases appearing in quotes in this report are English language approximations of Russian words/phrases having no exact counterpart.]

According to this report, ripping a page out of their “9/11 “False Flag” Playbook”, the “Deep State”, this past week, launched a terror attack against Travis Air Force Base, in California, using one of their deep cover Islamic operatives named Hafiz Kazi—the cousin of Seddique Mir Mateen, who is the father of Omar Mateen, the shooter of the 12 June 2016 Pulse Nightclub Massacre—with Seddique Mir Mateen shockingly just being revealed to have been a long time secret FBI informant—as Hafiz Kazi is now to believed to be one of too.

At the exact same time the “Deep State” was launching its “false flag” warning attack against Travis Air Force Base, this report continues, it also sent unmistakable terror warning packages to the CIA’s mail-sorting facility, a White House mail-sorting facility in suburban Washington, a US Navy facility in Dahlgren, Virginia, and two facilities at Fort Belvoir, Virginia — the National Geospatial-Intelligence Agency and another defense university—all being reminiscent of the 2001 anthrax attacks, that began one week after the 9/11 attacks on 18 September 2001, and whose intended effect stopped any serious investigation into 9/11 from occurring.

To most fully understand these “Deep State” machinations of today, this report explains, one must first go back to 5 June 1996 when the Khobar Towers Bombing attack occurred in Saudi Arabia—that was entirely a fundamentalist-Sunni operation, specifically perpetrated by Al Qaeda, which hates Shia and which also hates America’s military presence in the Middle East, and that its leader, Osama bin Laden stated his Al Qaeda had carried out—but whose Clinton regime era investigation of, led by US intelligence officials Robert Muller and James Comey, absurdly concluded Iran was responsible for.

With the Mueller-Comey investigation into the Khobar Towers Bombing deceitfully blaming Iran, this report notes, the Clinton regime was able to label Iran as the foremost state sponsor of terrorism—which drew attention away from Saudi Arabia, who then funded a “dry run” designed to test airline security in the United States in the years leading up to 9/11—and whose evidence of doing so Robert Mueller deliberately obstructed the US Congress from knowing the truth about.

In the immediate aftermath of 9/11, this report details, “Deep State” operative Robert Mueller was then given the assignment to cover up the truth of the deadly “false flag” terror warning anthrax attacks—and that he first tried to accomplish by destroying the life of American bioweapons expert Steven Hatfill—but that Mueller failed to do resulting in Hatfill receiving a settlement from the US government of $4.6 million for what Mueller had done to him.

In the United States, Robert Mueller is leading the “Deep State” coup against President Trump—In Russia

he would be in jail for the many crimes he’s committed.

 

The reason then FBI Director Robert Mueller targeted Steven Hatfill in the first place, this report reveals, was his knowing that he couldn’t blame the anthrax attacks on Al Qaeda as “Deep State” operatives within the Bush regime had ordered him to do, as it would then have to be explained how this Saudi-based terror group was able to get its hands on US military produced and weaponized anthrax spores—and with Hatfill now “out of the equation”, then saw Mueller turn his sights on senior US Army biodefense researcher Bruce Ivins

Unlike Steven Hatfill, though, this report explains, Bruce Ivins, on 29 July 2008, was suicided—with Mueller, a week later, declaring that Ivinswas the sole culprit” of the 2001 anthrax attacks and closing the case forever—but that the National Academy of Sciences, in their 2011 report titled “Review of the Scientific Approaches Used During the FBI’s Investigation of the 2001 Anthrax Letters”, called, in essence, absurd

With “Deep State” operative Robert Mueller being the spear point of the coup d’etat against President Trump, this report concludes, troubling new evidence has emerged that US military and intelligence factions loyal to this American shadow government have illegally seized Syria’s oil fields where they are now constructing a massive base to fund their efforts from—but that Russia, most certainly, will not allow to stand and has the first-strike capability to nullify one third of America’s nuclear triad when war starts—and who are being joined by China who has just sent its massive navy to sea vowing a “bloody battle—both of whom, also, have ready to use at a moments notice their fearsome hypersonic nuclear missiles that US Senator Jim Inhofe, just yesterday, warned his nation’s peoples of by stating “right now, we’re helpless”—and everyone of sane mind hoping that Trump, with the power of God behind him, can destroy this vile “Deep State” before it destroys him and the entire world.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




James Comey to speak at town hall after memoir release

James Comey to speak at town hall after memoir release

Former FBI Director James Comey will join CNN for a Town Hall next month – a week after his eagerly awaited memoir will hit bookshelves, the cable network announced on Wednesday.

The one-hour, prime-time Town Hall on April 25 will be moderated by CNN anchor Anderson Cooper and will air live from the Phi Beta Kappa Memorial Hall at Comey’s alma mater, College of William & Mary, in Williamsburg, Va., CNN said.

Comey was fired by President Trump in May 2017 while he was heading up the FBI’s investigation into Russian meddling in the 2016 election and any collusion on the part of Trump campaign associates.

His firing led the way for the appointment of special counsel Robert Mueller, who took over the Russia probe.

Comey’s appearance on CNN will happen a little more than a week after his tell-all, “A Higher Loyalty: Truth, Lies and Leadership,” will be published on April 17.

Cooper and members of the audience will discuss Comey’s FBI career, his ouster by Trump and his handling of the investigation into Hillary Clinton’s use of a private email server when she was secretary of state, CNN said.

Other television appearance in April for the former G-man include:

  • April 15: Prime-time special on ABC’s “20/20” with host George Stephanopoulos.
  • April 17: “The Late Show with Stephen Colbert.”
  • April 18: NBC’s “Today” show and ABC’s “The View.”
  • April 19: CNN’s “The Lead with Jake Tapper” and MSNBC’s “Rachel Maddow.”
  • April 2​6​:​ Fox News’ ​”Special Report with Bret Baier

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Minneapolis FBI agent charged with leaking classified information to reporter

Minneapolis FBI agent charged with leaking classified information to reporter

A Minneapolis FBI agent who started his career with the agency as an intern in 2000 has been charged with leaking classified information to the news website the Intercept. The Intercept

A Minneapolis FBI agent who started his career with the agency as an intern in 2000 has been charged with leaking classified information to the news website The Intercept.

Terry James Albury, who was assigned as Minneapolis-St. Paul International Airport liaison working on counterterrorism matters, was charged this week by the Justice Department’s National Security Division with one count of “knowingly and willfully” transmitting documents and information relating to national defense to a reporter for a national news organization. Albury was also charged with a second count of refusing to hand over documents to the government.

Albury is the second person charged with leaking secret documents to The Intercept. In June 2017, an intelligence contractor was charged with leaking a classified report about Russia’s interference in the 2016 election to The Intercept, the first criminal leak under President Trump.

The Justice Department has vowed to crack down on leaks that it contends undermine national security.

Albury’s attorneys, JaneAnne Murray and Joshua Dratel, said in a statement that their client, the only African-American FBI field agent in Minnesota, was “driven by a conscientious commitment to long-term national security and addressing the well-documented systemic biases within the FBI.”

“Terry Albury served the U.S. with distinction both here at home and abroad in Iraq,” the statement read. “He accepts full responsibility for the conduct set forth in the Information.”

The Intercept does not discuss anonymous sources, editor-in-chief Betsy Reed said in a statement posted on their website.

• Related: U.S. contractor arrested after leak of Russia hacking report

A request for a search warrant filed in Minneapolis federal court against Albury did not identify the news outlet, but a review by MPR News found the documents described in the search warrant that Albury leaked exactly match the trove of FBI documents posted by The Intercept.

In January 2017, The Intercept published a series titled “The FBI’s Secret Rules,” based on Albury’s leaked documents, which show the depth and broad powers of the FBI expansion since 9/11 and its recruitment efforts.

The Intercept made two Freedom of Information Act (FOIA) requests to the FBI in late March 2016. The requests contained specific information identifying the names of documents that were not available to the public. In addition, the FBI identified about 27 secret documents published by The Intercept between April 2016 and February 2017.

“The FBI believes that the classified and/or controlled nature of the documents indicates the News Outlet obtained these documents from someone with direct access to them,” according to the warrant. “Furthermore, reviews of the FBI internal records indicate ALBURY has electronically accessed over two thirds of the approximately 27 documents via trusted access granted to him on FBI information systems.”

One of The Intercept’s FOIA requests, dated March 29, 2016, asked for copies of a specific document classified as secret. The document, titled Confidential Human Source Assessing, gives tips for agents on how to cultivate informants.

Ten months later, the news outlet posted the same document it requested to its website and to DocumentCloud, a repository of public documents.

The FBI said it believes that The Intercept had a copy of the document and others before making the FOIA request. The Intercept then “used its knowledge of such documents to create the FOIA requests,” according to the warrant.

According to a review done by the FBI, Albury and 15 other individuals had also accessed the same document from an FBI classified network between August 2011 and March 29, 2016, the date of The Intercept’s FOIA request.

The search warrant said Albury took 11 screenshots of the document on Feb. 19, 2016, one month and 10 days before The Intercept’s FOIA request.

• 2017: Trump takes on entrenched practice of Washington leaks

“To date, a review of FBI records has revealed no indication that any individual other than ALBURY both accessed this document and conducted cut and paste action,” the warrant said.

An FBI audit found that Albury had accessed several documents from FBI systems classified as secret that were published by The Intercept, according to the warrant.

On three occasions in the summer of 2017, video surveillance captured Albury at his office at the airport, holding a digital camera and inserting what appears to be a memory card into the camera, according to the warrant. He then took photos of his computer screen which contained documents classified as secret.

Albury, who was hired by the FBI in 2001, a year after finishing his internship there, to conduct surveillance operations, became an agent in 2005 and was assigned to the FBI Minneapolis Field Office. The Justice Department has not yet responded to MPR News’ request for Albury’s employment history at the FBI.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Motion reveals Pulse gunman’s father was FBI informant

Omar Mateen shot, killed 49 inside Orlando nightclub in June 2016

By Mark Lehman – Reporter, Daniel Dahm – Digital Manager

Posted: 7:08 AM, March 26, 2018 Updated: 3:16 PM, March 26, 2018

ORLANDO, Fla. – Attorneys for Noor Salman called for a mistrial after they say new details from prosecutors reveal that Pulse gunman Omar Mateen’s father was an FBI source and is currently under a criminal investigation.

According to a motion filed by the defense, prosecutors sent an email on Saturday that stated Seddique Mateen was a confidential FBI source from 2005 through June 2016

The email also stated that Seddique Mateen is being investigated for money transfers to Turkey and Pakistan after documents were found in his home on the day of the Pulse attack.

Salman’s attorneys claim the late disclosure of the information prevented them from exploring whether or not Seddique Mateen knew of his son’s plans to attack the nightclub on June 12, 2016.

[RECOMMENDED: Meet key players in Stormy Daniels scandal | Fla. to have own time zone?]

Judge Paul Byron ruled Monday afternoon that the mistrial would not be granted because Salman’s attorneys were not harmed by the government’s failure to disclose that Seddique Mateen was a confidential informant.

The government email to Salman’s attorneys also states that in 2012, “An anonymous tip indicated that Seddique Mateen was seeking to raise $50,000-$100,000 via a donation drive to contribute toward an attack against the government of Pakistan.”

According to the motion, the defense states that the decision not to give Noor Salman a polygraph was possibly “based on the FBI’s desire to implicate Noor Salman, rather than Seddique Mateen in order to avoid scrutiny of its own ineptitude with the latter.”

The defense also said Seddique’s connection with the FBI played a role in a 2013 investigation into Omar Mateen for allegedly making threats against coworkers.

“Mateen’s father played a significant role in the FBI’s decision not to seek an indictment from the Justice Department for false statements to the FBI or obstruction of justice against Omar Mateen” during its 2013 investigation into his alleged threats,” the motion stated.

Seddique Mateen previously made headlines when he attended a rally for Democratic presidential candidate Hillary Clinton less than two months after the Pulse attack. He was positioned directly behind Clinton during her speech in Kissimmee.

“What went into your decision about going to this event right near Orlando, where this Pulse nightclub shooting happened?” Mateen was asked.

“I wish my son joined the Army and fought ISIS and destroyed ISIS,” he said. “That would be much better.”

A campaign official said Clinton did not know Mateen was at the rally.

Meanwhile, attorneys in federal court will try to convince jurors that Salman didn’t help her husband as he prepared for the attack on the Pulse nightclub in June 2016.

Salman is on trial, charged with providing material support to a foreign terror organization, the Islamic State group, and with obstructing justice.

Her attorneys will present their case on Monday.

[MORE PULSE COVERAGE: Monday court session | Remembering the 49 | Pulse page]

Federal prosecutors rested their case Thursday. Details about what the couple did and where they were in the days prior to the shooting was presented last week in court.

Her husband, Omar Mateen, killed 49 people and injured at least 68 others when he opened fire inside Pulse before he was shot to death by police.

If convicted, she faces life in prison.

https://media.clickorlando.com/document_dev/2018/03/26/047118559659_1522062632475_11841425_ver1.0.pdf

 




CIA Admit They Have Infiltrated Mainstream Media in America

CIA Admit They Have Infiltrated Mainstream Media in America

Declassified documents on the CIA website show that the intelligence agency has infiltrated every major news outlet in the America.

The documents state that a CIA task force “now has relationships with reporters from every major wire service, newspaper, news weekly, and television network in the nation,” and that “this has helped us turn some ‘intelligence failure’ stories into ‘intelligence success” stories,’ and has contributed to the accuracy of countless others.”

Collective-evolution.com reports: Furthermore, it explains how the agency has “persuaded reporters to postpone, change, hold, or even scrap stories that could have adversely affected national security interests or jeopardized sources and methods.”

Although it is a document outlining their desire to become more open and transparent, the deception outlined by various whistleblowers requires us to read between the lines and recognize that the relationships shared between intelligence agencies and our sources of information are not always warranted and pose inherent conflicts of interest.

Herein lies the problem: What is “national security,” and who determines that definition? JFK bravely told the world that the “dangers of excessive and unwarranted concealment of pertinent facts far outweigh the dangers which are cited to justify it.” He also said that “there is very grave danger that an announced need for increased security will be seized upon by those anxious to expand its meaning to the very limits of official censorship and concealment.”

“National security” is now an umbrella term used to justify concealing information, but who makes these decisions?

Not only are countless documents classified every single year in North America, but false information and “fake news” are routinely dispersed, mainly by mainstream media outlets — a reality that is clearly conveyed in this document and has been expressed by multiple mainstream media journalists themselves. And as with the NSA surveillance program that was exposed by Edward Snowden, it’s a global problem.

Internet censorship is on the rise, and platforms like Google and Facebook are now actually censoring information and deciding what is real and fake for the people, instead of letting people decide for themselves. For example, Google had to recently admit that their contractors suppress information, like the info provided by alternative media, not mainstream media.

“The problem of fake news isn’t solved by hoping for a referee, but rather because we as citizens, we as users of these services, help each other. We talk and we share and we point out what is fake. We point out what is true. The answer to bad speech is not censorship, the answer to bad speech is more speech. We have to exercise and spread the idea that critical thinking matters, now more than ever, given the fact that lies seem to be getting more popular.” –Edward Snowden (source)

Dr. Udo Ulfkotte, a prominent German journalist and editor for more than two decades, is one example. He blew the whistle on public television, stating that he was forced to publish the works of intelligence agencies under his own name and that noncompliance with these orders would result in him losing his job. (source)

Sharyl Attkisson and Amber Lyon, both well-known mainstream media reporters and journalists, have also exposed funded movements by political, corporate, and other special interests, and have revealed that they are routinely paid by the U.S. government as well as foreign governments to selectively report and distort information on certain events. (source)(source)

Let’s not forget about Operation Mockingbird, a CIA-based initiative to control mainstream media.

A document from 1984 shows how the agency had definite plans to infiltrate academia and change/influence the curriculum, specifically journalism.

As Emma Best from Muckrock reports, recently Tweeted by NSA whistleblower Edward Snowden, memos from the CIA Inspector General’s (IG) office reveal the agencies perspective on the press and how to handle them. It’s from 1984, approximately three decades prior to when the Agency declared Wikileaks a hostile non-state intelligence service. It shows how the CIA viewed the media the same way.

The document not only outlines the CIA’s role in media, but also the entire entertainment industry in general, lending further weight to revelations offered by celebrities like Jim Carrey. He appeared as a guest on Jimmy Kimmel Live, saying that, “For years now, talk show hosts, people on television, people in sitcoms have been, hired by the government to throw you off the tracks, to distract you, to make you laugh and stuff like that, make you happy and docile so you don’t know what’s really going on.”

While some question whether he was merely joking, the facts still remain. Another celebrity, who was clearly serious, is Roseanne Barr, who referenced the CIA’s MK Ultra mind control program — a previously classified research program through the CIA’s scientific intelligence division that tested behavioural modification and perception manipulation on human beings.

What we seem to have here is an attempt to manipulate public perception of global events through mainstream media and news publications. But what’s perhaps most interesting is the fact that a lot of people are now waking up and seeing through many of these lies and manipulation tactics. Instead of just blindly believing what we hear on television, more people are starting to think critically, do independent research, and examine a wide array of sources and information.

So many opportunities have emerged within the past few years allowing others to see this more clearly. One was the recent “fake news” epidemic, where evidence surfaced exposing information that threatened the global elite. Wikileaks is perhaps one of the greatest examples. For mainstream media to basically label everything else as “fake news” was quite ironic, given that it seems the majority of people consider mainstream media themselves to be the real  “fake news,” and this is now even more evident given the information presented above in this article.

The documents also touch upon the fact that they are constantly in touch with the entertainment industry, giving advice on scenes and direction, as well as how things happened in certain situations. Personally, I feel the industry is largely used to push propaganda, like patriotism. Patriotism is pumped into the population to support a large military in the name of “national security.” We are being fooled, wars are not waged for defence, but for offence and to push forth political agendas.

So you see, there are multiple reasons for these CIA connections to various industries.

Academia

From a young age we’re taught that getting an education is the key to living a good life. Getting a decent job, making good money, even finding the right partner — all depend on following a certain path. Yet many concepts and topics are, as previously illustrated, kept from public viewing, and this includes plenty of important science.

The U.S. intelligence community investigated parapsychology (ESP, remote viewing, telepathy, etc.) for more than two decades, for instance. Russell Targ, a physicist who has spent several decades working in a U.S. government program exploring these concepts, recently shared his experience doing so in a TED talk that is now approaching 1 million views.

Another great example of Black Budget science comes from Ben Rich, the second director of Lockheed Skunkworks, who worked there from 1975-1991. He’s been called the Father of Stealth, having overseen the development of the first stealth fighter, the F-117 Nighthawk. Before his death, Rich made several shocking open statements about the reality of UFOs and extraterrestrials.

“We already have the means to travel among the stars, but these technologies are locked up in black projects, and it would take an act of God to ever get them out to benefit humanity. Anything you can imagine, we already know how to do it.” 

“We now have technology to take ET home. No it won’t take someone’s lifetime to do it. There is an error in the equations. We know what it is. We now have the capability to travel to the stars.” 

“There are two types of UFOs — the ones we build and the ones ‘they’ build.” 

Information like this, including testimony from hundreds of others, suggests that the “classified world” is much more advanced than our mainstream one.

This particular document states that the agency exposes administrators of academic institutions to the agency on a regular basis.

Obviously, as with any other job, the CIA would be looking for what they consider to be qualified individuals. But the document does outline its close relationship with academia in general.

This is because certain developments and information that stem from academia could threaten national security and therefore must be kept out of the curriculum, and the public domain.

Take, for example, documents obtained via the Freedom of Information Act (FOIA) that reveal how the U.S. government has been using a secret system to withhold the approval of some applications.

This 50-page document was obtained by Kilpatrick Towsend & Stockton, LLP, who commonly represent major tech companies that include Apple, Google, and Twitter (to name a few).

The program delaying patent applications is called the Sensitive Application Warning System (SWAS). Usually when an application is submitted for a patent approval, it requires a couple of examiners who work with the Patent Office to go through their process of approval. This process usually takes one to two years, but  applications that are filed in SAWS must be approved from several people, and can be delayed for a number of years.

One great example (out of many) of delayed patent applications comes from Dr. Gerald F. Ross, who filed a patent application for a new invention he had devised to defeat the jamming of electromagnetic transmissions at specified frequencies. It was not until June 17, 2014 (almost 37 years later) that this patent was granted. (source)

It’s important to note (as reported by the Federation of American Scientists — see annotated bibliography) that there were over 5,000 inventions that were under secrecy orders at the end of fiscal year 2014, which marked the highest number of secrecy orders in effect since 1994. (source)

Steven Aftergood from the Federation of American Scientists reports:

The 1971 list indicates that patents for solar photovoltaic generators were subject to review and possible restriction if the photovoltaics were more than 20% efficient.  Energy conversion systems were likewise subject to review and possible restriction if they offered conversion efficiencies “in excess of 70-80%.” (source)

This is all thanks to an act many people are unaware of. It’s called the “Invention Secrecy Act,” and it was written in 1951. Under this act, patent applications on new inventions can be subject to secrecy orders, which can restrict their publication if government agencies believe that their disclosure would be harmful to national security. (source)(source)

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




FBI raids NXIVM President’s house as Raniere appears in Federal Court

https://www.timesunion.com/news/article/Feds-raid-home-of-NXIVM-co-founder-Nancy-Salzman-12784322.php

FBI raids NXIVM President’s house as Raniere appears in Federal Court

Keith Raniere, the co-founder and leader of NXIVM, will remain in federal custody and be returned to New York later this week to face federal charges of sex trafficking and conspiracy to commit forced labor.

Raniere was shackled and dressed in a T-shirt, athletic shorts and sneakers — similar to the clothes he was wearing as he was arrested Sunday near Puerto Vallarta, Mexico — when he was brought before a U.S. magistrate on Tuesday afternoon in Fort Worth, Texas. Raniere declined to speak with reporters and said only, “Yes, Your Honor,” when he was asked by the judge if he understood his rights.

Assistant U.S. Attorney Moira Penza, who is leading the investigation for the U.S. attorney’s office in Brooklyn, attended the brief proceeding but did not speak. Raniere was represented by a criminal defense attorney from Fort Worth, who told the judge that Raniere would waive his right to challenge his extradition from the Eastern District of New York.

Three people who appeared to be supporters of Raniere’s attended the brief proceeding but declined to speak to reporters. Another man, who said he is from Mexico and had driven to Texas to attend the proceeding, said he was “concerned but not worried” about Raniere’s arrest. He declined to give his name.

Raniere will remain in the custody of U.S. marshals without bond pending his return to New York. A warrant for his arrest was issued Feb. 14, after federal prosecutors filed a sealed complaint in Brooklyn charging Raniere with several felony counts.

The extraordinary arrest of Raniere marks the downfall of the leader of an international “self-help” organization that has been headquartered in the Capital Region for roughly two decades. Some experts have described NXIVM as a cult, and the criminal prosecution of Raniere has forced the secretive man who calls himself “Vanguard” out of the shadows and under the spotlight of an ongoing federal criminal investigation.

The federal criminal complaint accuses Raniere of forming a group within NXIVM in which women said they were coerced into joining a slave-master club. The women, some of whom said they were pressured to have sex with Raniere, told federal authorities that a female doctor associated with NXIVM used a cauterizing iron to brand them with a design on their lower abdomen that contained the initials of Raniere and Allison Mack, an actress and NXIVM associate who is listed in the complaint as an unnamed co-conspirator.

Raniere was taken into custody by Mexican federal police who tracked him to a $10,000-a-week villa near Puerto Vallarta, where he was staying with several women, federal officials said.

In court filings, U.S. Justice Department officials said that Raniere fled to Mexico last November when the federal investigation began. They have asked for him to be detained without bond while the case is pending, describing him as a flight risk and danger to the community.

Federal authorities said Raniere has access to millions of dollars and private jets, and that he stopped using his mobile phone and began using encrypted email after he arrived in Mexico, which made him difficult to locate.

Warning: The document below contains graphic depictions of alleged sexual activity.

https://www.documentcloud.org/documents/4421505-Complaint-and-affidavit-in-support-of-arrest.html#document/p1

In the hours preceding Raniere’s court appearance in Texas, FBI agents spent several hours combing through the Saratoga County residence of NXIVM’s co-founder and president, Nancy Salzman.

The FBI’s raid of Salzman’s residence signaled a wider criminal investigation of the secretive organization than just the sex-trafficking allegations that led to the arrest this week of its longtime leader

A former NXIVM associate, Kristen M. Keeffe, who defected from the organization several years ago, alleged in 2015 that large amounts of cash used to be stored in a safe at Salzman’s residence.

The allegations made by Keeffe were contained in a transcript of a telephone conversation that took place in March 2015 between Keeffe and Barbara J. Bouchey, a former NXIVM executive board member who was facing computer trespassing charges at the time. Bouchey and three others were accused by NXIVM of of improperly accessing the corporation’s website, but the charges against Bouchey and two others were dismissed.

While Bouchey’s case was pending, her attorneys filed a copy of the transcript to buttress their argument that top NXIVM officials have used litigation, as well as the criminal case, to attack her and other perceived adversaries. Keeffe described many of those tactics during the lengthy conversation, and also provided allegations about Salzman.

Keeffe, who was part of Raniere’s inner circle for many years, told Bouchey that money collected from people who took NXIVM training sessions in Mexico was funneled across the border into the United States. She claimed that Salzman, among others, would allegedly “bring the cash over the border.”

The money, which was allegedly funneled through the bank account of a Mexican associate, was “logged on the system as a scholarship and cash was kept in Nancy’s house,” Keeffe said.

“And the cash for a certain time period, I doubt it’s still there, was kept in a safe in Nancy’s house,” Keeffe added during the recorded conversation. “If Keith ever had to go into hiding it was Keith’s off-the-grid fund. And the last time I heard about it, there was two and a half million dollars in it.”

In a federal court filing this week, the Justice Department said that for the past 18 months Raniere had been using a credit card and bank account in the name of a former NXIVM associate and girlfriend, Pamela Cafritz, who died in November 2016. Federal prosecutors said the bank account holds about $8 million

Salzman has been an influential figure in the organization since it was set up more than two decades ago. She also was involved in some of the medical research studies that were performed by a doctor associated with NXIVM, Brandon B. Porter.

On Sunday, the Times Union reported that New York Attorney General Eric Schneiderman’s office is conducting a separate investigation of a nonprofit foundation associated with NXIVM that allegedly sponsored brain-activity and other human behavioral studies without any apparent oversight, according to court records.

The nonprofit Ethical Science Foundation was formed in 2007 by Clare E. Bronfman, who owns a horse farm in Delanson and is listed in public records as the trustee and donor of the foundation.

At the request of the attorney general’s office, a state Supreme Court justice recently signed an order directing Bronfman and Porter, who is involved with NXIVM and conducted the human studies, to turn over all documentation associated with the research, including any written communications, videos, conclusions, consent forms and the names and addresses of “individuals associated with Ethical Science Foundation who participated in any manner with the studies.”

A Vancouver woman, Jennifer Kobelt, said in a complaint filed with the state Health Department last year that a bizarre experiment she was subjected to by Porter took place in a small commercial building in Halfmoon that has been used for years by NXIVM for training and seminars.

Kobelt said she was recruited for the study by an assistant of Salzman and that she knew of at least four other women who took part.

Barry Shlachter contributed reporting from Fort Worth, Texas.

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




DNA GPS: What is the origin of Yiddish?

By Stew Webb Federal  Whistle blower

A wake up call for all Christians about Israel

DNA GPS: What is the origin of Yiddish?

The origin of Yiddish, the millennium old language of Ashkenazic Jews, is something which linguists have questioned for decades. Now, a pioneering tool – the Geographic Population Structure (GPS) – which converts DNA data into its ancestral coordinates, has helped scientists pinpoint that the DNA of Yiddish speakers could have originated from four ancient villages in north-eastern Turkey. http://www.sheffield.ac.uk/news/nr/dn

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Attackers exposed by Stew Webb Federal Whistle blower March 28 2018

By Stew Webb Federal Whistle blower

 

March 27, 2018

18-USC-4 Official Notice To President Trump

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence for Prosecution

cyber attacker
United States Plymouth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521958757.81
3/25/2018 1:19:22 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Plymouth, United States visited http://www.stewwebb.com/
3/25/2018 1:19:16 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

verizonbusiness.com
@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Palm Beach Gardens, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521977560.61
3/25/2018 6:32:42 AM (4 hours 18 mins ago)
IP: 73.244.9.70 Hostname: c-73-244-9-70.hsd1.fl.comcast.net
Browser: IE version 11.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko
cable.comcast.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States United States left http://www.stewwebb.com/tag/video/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522006183.19
3/25/2018 2:29:48 PM (2 minutes ago)
IP: 107.77.165.9 Hostname: mobile-107-77-165-9.mobile.att.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; XT1032 Build/KXB21.14-L1.61) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.114 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Fort Lauderdale, United States was blocked by firewall at http://stewwebb.com/wp-organizer.php
3/26/2018 12:59:17 AM (10 hours 42 mins ago)
IP: 204.10.105.9 Hostname: 204.10.105.9
Human/Bot: Bot
Browser: Chrome version 50.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36
NetRange: 204.10.104.0 – 204.10.111.255
[2048 addresses in this network]
CIDR: 204.10.104.0/21 (204.10.104.0 – 204.10.111.255)
[2048 addresses in this network]
NetName: ACCELERATEBIZ-1-21
NetHandle: NET-204-10-104-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AccelerateBiz Inc. (ACCEL-8)
RegDate: 2004-12-15
Updated: 2012-03-20
Ref: https://whois.arin.net/rest/net/NET-204-10-104-0-1

OrgName: AccelerateBiz Inc.
OrgId: ACCEL-8
Address: 800 W Cypress Creek Rd
Address: Suite 528
City: Fort Lauderdale
StateProv: FL
PostalCode: 33309
Country: US
RegDate: 2004-08-27
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/ACCEL-8

OrgAbuseHandle: ABUSE1442-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +1-305-675-6725
OrgAbuseEmail: abuse@acceleratebiz.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE1442-ARIN

OrgTechHandle: TECHN892-ARIN
OrgTechName: Technical Support
OrgTechPhone: +1-305-675-6725
OrgTechEmail: support@acceleratebiz.com
OrgTechRef: https://whois.arin.net/rest/poc/TECHN892-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Scottsdale, United States was blocked for Manual block by administrator at http://www.stewwebb.com/wp-json/wp/v2/users/
3/26/2018 6:34:29 AM (5 hours 15 mins ago)
IP: 132.148.137.76 Hostname: ip-132-148-137-76.ip.secureserver.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
NetRange: 132.148.0.0 – 132.148.255.255
[65536 addresses in this network]
CIDR: 132.148.0.0/16 (132.148.0.0 – 132.149.255.255)
[131072 addresses in this network]
NetName: GO-DADDY-COM-LLC
NetHandle: NET-132-148-0-0-1
Parent: NET132 (NET-132-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GoDaddy.com, LLC (GODAD)
RegDate: 2015-10-21
Updated: 2015-10-26
Ref: https://whois.arin.net/rest/net/NET-132-148-0-0-1
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
Comment: Please send abuse complaints to abuse@godaddy.com
Ref: https://whois.arin.net/rest/org/GODAD
OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-480-624-2505
OrgAbuseEmail: abuse@godaddy.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE51-ARIN

OrgNOCHandle: NOC124-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-480-505-8809
OrgNOCEmail: noc@godaddy.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC124-ARIN

OrgTechHandle: NOC124-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-480-505-8809
OrgTechEmail: noc@godaddy.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC124-ARIN
132.148.137.76
P address 132.148.137.76
Location Scottsdale, Arizona, United States (US) flag
Registry arin
Network information
IP address 132.148.137.76
Reverse DNS (PTR record) ip-132-148-137-76.ip.secureserver.net
DNS server (NS record) cns1.secureserver.net (208.109.255.100)
cns2.secureserver.net (216.69.185.100)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domains around 132.148.137.76
IP address #domains
132.148.137.3 1
132.148.137.4 52
132.148.137.5 7
132.148.137.6 1
132.148.137.8 4
132.148.137.9 8
132.148.137.11 1
132.148.137.12 15
132.148.137.13 2
132.148.137.14 3
132.148.137.15 1
132.148.137.16 1
132.148.137.19 2
132.148.137.22 1
132.148.137.23 7
132.148.137.24 1
132.148.137.25 1
132.148.137.26 1
132.148.137.27 2
132.148.137.28 1
132.148.137.29 1
132.148.137.31 1
132.148.137.32 1
132.148.137.34 1
132.148.137.35 1
132.148.137.36 2
132.148.137.37 1
132.148.137.38 2
132.148.137.39 1
132.148.137.40 24
132.148.137.42 4
132.148.137.43 1
132.148.137.48 4
132.148.137.49 1
132.148.137.50 4
132.148.137.52 1
132.148.137.54 1
132.148.137.56 2
132.148.137.59 2
132.148.137.60 4
132.148.137.61 24
132.148.137.64 2
132.148.137.65 5
132.148.137.66 7
132.148.137.67 1
132.148.137.68 2
132.148.137.69 66
132.148.137.71 1
132.148.137.73 6
132.148.137.76 2
132.148.137.79 2
132.148.137.81 1
132.148.137.85 1
132.148.137.86 1
132.148.137.90 1
132.148.137.91 3
132.148.137.94 1
132.148.137.96 4
132.148.137.98 5
132.148.137.99 1
132.148.137.102 1
132.148.137.103 1
132.148.137.104 1
132.148.137.105 1
132.148.137.106 1
132.148.137.108 1
132.148.137.109 1
132.148.137.112 3
132.148.137.113 1
132.148.137.115 1
132.148.137.117 2
132.148.137.118 3
132.148.137.119 5
132.148.137.121 1
132.148.137.122 1
132.148.137.124 1
132.148.137.129 1
132.148.137.130 1
132.148.137.131 1
132.148.137.132 17
132.148.137.133 1
132.148.137.134 1
132.148.137.135 1
132.148.137.136 2
132.148.137.142 33
132.148.137.144 4
132.148.137.145 3
132.148.137.147 2
132.148.137.148 1
132.148.137.150 4
132.148.137.151 14
132.148.137.153 58
132.148.137.155 3
132.148.137.157 2
132.148.137.159 1
132.148.137.160 2
132.148.137.161 5
132.148.137.167 2
132.148.137.173 1
132.148.137.175 2
Domains on 132.148.137.76
Domain Tools
dfwnewhomes.com
DNS server (NS records) ns68.domaincontrol.com (208.109.255.44)
ns67.domaincontrol.com (216.69.185.44)
Mail server (MX records) smtp.secureserver.net (72.167.238.29)
mailstore1.secureserver.net (72.167.238.32)
IP address (IPv4) 132.148.137.76
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domain Name: DFWNEWHOMES.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Whois Agent
Registrant Organization: Whois Privacy Protection Service, Inc.
Name Server: NS67.DOMAINCONTROL.COM
Name Server: NS68.DOMAINCONTROL.COM
DNSSEC: unsigned

qonnect.in
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker olatha, kansas
Olathe, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522012184.88
3/26/2018 11:13:44 AM (45 minutes ago)
IP: 73.185.228.112 Hostname: c-73-185-228-112.hsd1.ks.comcast.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

NetRange: 73.0.0.0 – 73.255.255.255
[16777216 addresses in this network]
CIDR: 73.0.0.0/8 (73.0.0.0 – 73.255.255.255)
[16777216 addresses in this network]
NetName: CABLE-1
NetHandle: NET-73-0-0-0-1
Parent: NET73 (NET-73-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7922
Organization: Comcast Cable Communications, LLC (CCCS)
RegDate: 2005-04-19
Updated: 2016-08-31
Ref: https://whois.arin.net/rest/net/NET-73-0-0-0-1

OrgName: Comcast Cable Communications, LLC
OrgId: CCCS
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2001-09-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/CCCS

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://whois.arin.net/rest/poc/NAPO-ARIN

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://whois.arin.net/rest/poc/IC161-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Mitchell, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064606.62
3/26/2018 6:43:36 AM (5 hours 34 mins ago)
IP: 172.78.225.94 Hostname: 172.78.225.94
Browser: Safari version 8.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 8_1_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4

Sorry, but no data for that IP or domain was found.

IP address 172.78.225.94
Location Butlerville, Indiana, United States

@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Canyon Country, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064610.01
3/26/2018 6:43:32 AM (5 hours 34 mins ago)
IP: 76.95.152.193 Hostname: cpe-76-95-152-193.socal.res.rr.com
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 76.80.0.0 – 76.95.255.255
[1048576 addresses in this network]
CIDR: 76.80.0.0/12 (76.80.0.0 – 76.95.255.255)
[1048576 addresses in this network]
NetName: RRWE
NetHandle: NET-76-80-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2006-12-22
Updated: 2007-12-18
Ref: https://whois.arin.net/rest/net/NET-76-80-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2000-10-04
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Lake Havasu City, United States left http://www.stewwebb.com/2018/03/23/ses-and-serco-the-big-secret-of-the-deep-state/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522044134.26
3/26/2018 1:02:16 AM (11 hours 25 mins ago)
IP: 47.216.40.139 Hostname: 47-216-40-139.lkhvcmtk02.res.dyn.suddenlink.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 47.208.0.0 – 47.223.255.255
[1048576 addresses in this network]
CIDR: 47.208.0.0/12 (47.208.0.0 – 47.223.255.255)
[1048576 addresses in this network]
NetName: SUDDE
NetHandle: NET-47-208-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Suddenlink Communications (SUDDE)
RegDate: 2015-09-08
Updated: 2015-09-08
Ref: https://whois.arin.net/rest/net/NET-47-208-0-0-1

OrgName: Suddenlink Communications
OrgId: SUDDE
Address: 311 NNW Loop 323
City: Tyler
StateProv: TX
PostalCode: 75701
Country: US
RegDate: 2006-05-25
Updated: 2018-02-14
Ref: https://whois.arin.net/rest/org/SUDDE

ReferralServer: rwhois://rwhois.suddenlink.net:4321

OrgNOCHandle: NOCSU37-ARIN
OrgNOCName: NOC Suddenlink
OrgNOCPhone: +1-866-232-5455
OrgNOCEmail: noc@suddenlink.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU37-ARIN

OrgTechHandle: AUIO-ARIN
OrgTechName: Altice USA Internet Operations
OrgTechPhone: +1-516-803-2300
OrgTechEmail: hostmaster@cv.net
OrgTechRef: https://whois.arin.net/rest/poc/AUIO-ARIN

OrgAbuseHandle: ABUSE6997-ARIN
OrgAbuseName: Abuse Suddenlink
OrgAbusePhone: +1-903-266-4800
OrgAbuseEmail: hostmaster@cv.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE6997-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
San Diego, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522095760.82
3/26/2018 3:22:44 PM (14 minutes ago)
IP: 66.75.249.174
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Atlanta, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522111331.4
3/26/2018 7:42:14 PM (26 minutes ago)
IP: 172.94.81.11 Hostname: 172.94.81.11
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:59.0) Gecko/20100101 Firefox/59.0
NetRange: 172.94.81.0 – 172.94.81.255
[256 addresses in this network]
CIDR: 172.94.81.0/24 (172.94.81.0 – 172.94.81.255)
[256 addresses in this network]
NetName: INTERNET-SHIELD-16-MICFO-US
NetHandle: NET-172-94-81-0-1
Parent: INTERNET-SHIELD-16 (NET-172-94-0-0-1)
NetType: Reassigned
OriginAS: AS53889
Organization: MICFO-US (MICFO-11)
RegDate: 2017-07-19
Updated: 2017-07-19
Ref: https://whois.arin.net/rest/net/NET-172-94-81-0-1

OrgName: MICFO-US
OrgId: MICFO-11
Address: 56 Marietta Street,
Address: Atlanta, GA 30339
City: Atlanta
StateProv: GA
PostalCode: 30339
Country: US
RegDate: 2017-07-19
Updated: 2017-07-19
Ref: https://whois.arin.net/rest/org/MICFO-11

OrgAbuseHandle: GADIT3-ARIN
OrgAbuseName: Gadit, Uzair
OrgAbusePhone: +1-217-651-4225
OrgAbuseEmail: admin@pointtoserver.com
OrgAbuseRef: https://whois.arin.net/rest/poc/GADIT3-ARIN

OrgTechHandle: GADIT3-ARIN
OrgTechName: Gadit, Uzair
OrgTechPhone: +1-217-651-4225
OrgTechEmail: admin@pointtoserver.com
OrgTechRef: https://whois.arin.net/rest/poc/GADIT3-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Trenton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/26/ten-cyber-terrorist-implanting-malicious-codes-against-stew-webb-whist…
3/27/2018 10:33:02 AM (2 hours 11 mins ago)
IP: 173.72.113.186 Hostname: pool-173-72-113-186.cmdnnj.fios.verizon.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Trenton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522164768.68
3/27/2018 10:32:51 AM (2 hours 11 mins ago)
IP: 173.72.113.186 Hostname: pool-173-72-113-186.cmdnnj.fios.verizon.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Pottstown, United States arrived from https://feedreader.com/observe/stewwebb.com/+view?from=5873225 and tried to access non-existent page https://www.stewwebb.com/+view?from=5873225
3/27/2018 10:17:36 AM (2 hours 27 mins ago)
IP: 98.114.100.42 Hostname: pool-98-114-100-42.phlapa.fios.verizon.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; XT1080 Build/SU6-7.7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Suwanee, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522116556.13
3/26/2018 9:09:19 PM (15 hours 48 mins ago)
IP: 104.57.142.176 Hostname: 104-57-142-176.lightspeed.tukrga.sbcglobal.net
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:59.0) Gecko/20100101 Firefox/59.0
Suwanee, United States visited http://www.stewwebb.com/
3/27/2018 6:39:29 AM (6 hours 9 mins ago)
IP: 104.57.142.176 Hostname: 104-57-142-176.lightspeed.tukrga.sbcglobal.net
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.9; rv:59.0) Gecko/20100101 Firefox/59.0
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Fagnieres, France arrived from http://members.iimetro.com.au/~hubbca/links.htm and tried to access non-existent page http://www.stewwebb.com/file_list.htm
3/27/2018 1:19:32 PM (13 minutes ago)
IP: 90.34.101.218
Human/Bot: Human
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

France Fagnieres, France left http://www.stewwebb.com/file_list.htm and visited http://www.stewwebb.com/
3/27/2018 1:19:43 PM (11 minutes ago)
IP: 90.34.101.218
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
% Information related to ‘90.34.101.0 – 90.34.101.255’
[256 addresses in this network]
% Abuse contact for ‘90.34.101.0 – 90.34.101.255’ is ‘gestionip.ft@orange.com’
[256 addresses in this network]
inetnum: 90.34.101.0 – 90.34.101.255
[256 addresses in this network]
netname: IP2000-ADSL-BAS
descr: BSREI553 Reims Bloc 1
country: FR
admin-c: WITR1-RIPE
tech-c: WITR1-RIPE
status: ASSIGNED PA
remarks: for hacking, spamming or security problems send mail to
remarks: abuse@orange.fr
mnt-by: FT-BRX
created: 2011-10-18T12:22:50Z
last-modified: 2011-10-18T12:22:50Z
source: RIPE

role: Wanadoo France Technical Role
address: FRANCE TELECOM/SCR
address: 48 rue Camille Desmoulins
address: 92791 ISSY LES MOULINEAUX CEDEX 9
address: FR
phone: +33 1 58 88 50 00
abuse-mailbox: abuse@orange.fr
admin-c: BRX1-RIPE
tech-c: BRX1-RIPE
nic-hdl: WITR1-RIPE
mnt-by: FT-BRX
created: 2001-12-04T17:57:08Z
last-modified: 2013-07-16T14:09:50Z
source: RIPE # Filtered

% Information related to ‘90.34.0.0/16AS3215′ (90.34.0.0 – 90.35.255.255)
[131072 addresses in this network]
route: 90.34.0.0/16 (90.34.0.0 – 90.35.255.255)
[131072 addresses in this network]
descr: France Telecom IP2000-ADSL-BAS
origin: AS3215
mnt-by: FT-BRX
created: 2012-12-11T10:07:44Z
last-modified: 2012-12-11T10:07:44Z
source: RIPE
http://members.iimetro.com.au/~hubbca/links.htm
Are you looking for IPv4 address 203.0.178.70?
P address 203.0.178.70
Location Australia (AU
IP address 203.0.178.70
Reverse DNS (PTR record) not available
DNS server (NS record) ns2.iinet.net.au (203.59.24.3)
ns1.iinet.net.au (203.14.168.3)
ASN number 4739
ASN name (ISP) Internode Pty Ltd
IP-range/subnet 203.0.178.0/24
203.0.178.0 – 203.0.178.255
Domains around 203.0.178.70
IP address #domains
203.0.178.29 1
203.0.178.36 2
203.0.178.40 1
203.0.178.48 19
203.0.178.83 1
203.0.178.91 1285
203.0.178.92 37
203.0.178.93 16
203.0.178.114 1
203.0.178.178 1
203.0.178.186 3
203.0.178.191 2
203.0.178.192 1
inetnum: 203.0.178.0 – 203.0.178.255
netname: IINET-TECH-AU
descr: iiNet Limited
descr: Level 6, Durack Centre
descr: 263 Adelaide Terrace
descr: Perth WA 6000
country: AU
org: ORG-IL1-AP
admin-c: NO20-AP
tech-c: NO20-AP
mnt-by: APNIC-HM
status: ALLOCATED PORTABLE
mnt-irt: IRT-IINET-AU
organisation: ORG-IL1-AP
org-name: iiNet Limited
country: AU
address: 502 Hay St
@@@@@@@@@
??????????
iinet.net.au
This domain is hosted by iiNet Limited (AS4802). The first DNS server is ns1.iinet.net.au. The current IPv4 address is 203.173.50.151. The mail server with the highest priority is asav.iinet.net.au.
v=spf1 redirect=spf.iinet.net.au
Domain IPv4 address Ranking Alexa Pagerank
iinet.asia -1
iinet.at 80.80.244.192 -1
iinet.biz 203.173.50.132
iinet.cn
iinet.co 69.172.201.153
iinet.co.jp 220.109.217.178
iinet.co.nz 203.173.50.132
iinet.com 64.255.238.206 5
iinet.com.au 203.173.50.151 6
iinet.com.mx 200.78.212.57
iinet.de 89.31.143.1
iinet.eu 88.99.116.178 0
iinet.in 162.144.44.158
iinet.info 203.173.50.132
iinet.ir
iinet.jp 173.254.209.7
iinet.mobi 203.0.178.29 4
iinet.mx
iinet.name 203.173.50.132 -1
iinet.ne.jp 119.245.141.21 3
iinet.net 203.173.50.151 6
iinet.net.au 203.173.50.151 17,298 6
iinet.org 144.194.18.31 -1
iinet.rs 66.96.147.137 -1
iinet.ru 31.31.205.163 0
iinet.sa 192.185.168.181
iinet.se 45.32.232.250
iinet.shop
iinet.support 203.26.24.82
iinet.top
iinet.tv 203.0.178.91
iinet.work
iinet.xn--vuq861b 45.120.243.27
iinet.xxx 199.253.28.249 -1
iinet-au.com
iinet-au.info 162.255.119.117
iinet-au.net
iinet-sale.com 27.124.118.252
iinet-service.de 80.80.244.192
iinet1.com 208.91.197.27
iinet1.org 208.91.197.27
iinet2.com 208.91.197.26
iinet2.org 208.91.197.26 0
iinet3.com 208.91.197.26
iinet3.org 208.91.197.26
iineta-matome.com 133.130.64.112
iineta.net 219.94.162.168 0
iineta123.info 160.16.215.15
iineta123.net 160.16.215.15
iinetalk.com 104.197.104.56
IPv4 routes
Startip Endip Description Country #domains #spamhosts
14.2.0.0 14.2.255.255 iiNet Limited AU 33 0
46.17.120.0 46.17.127.255 IINET Backa Palanka RS 20 0
58.6.0.0 58.6.127.255 iiNet Limited AU 198 0
58.6.128.0 58.6.255.255 iiNet Limited AU 73 0
58.7.0.0 58.7.255.255 iiNet Limited AU 65 0
59.167.0.0 59.167.127.255 iiNet Limited AU 723 1
59.167.128.0 59.167.255.255 iiNet Limited AU 1,160 0
106.68.0.0 106.69.255.255 iiNet Limited AU 71 4
114.30.96.0 114.30.127.255 iiNet Limited AU 0 0
114.198.0.0 114.198.63.255 iiNet Limited AU 11 0
114.198.64.0 114.198.127.255 iiNet Limited AU 14 0
115.166.0.0 115.166.63.255 iiNet Limited AU 12 0
115.178.28.0 115.178.31.255 iiNet Limited AU 10 0
118.208.0.0 118.208.255.255 iiNet Limited AU 54 3
118.209.0.0 118.209.255.255 iiNet Limited AU 73 1
118.210.0.0 118.210.255.255 iiNet Limited AU 39 0
118.211.0.0 118.211.255.255 iiNet Limited AU 64 0
121.44.0.0 121.44.255.255 iiNet Limited AU 74 0
121.45.0.0 121.45.255.255 iiNet Limited AU 74 2
121.127.192.0 121.127.223.255 iiNet Limited AU 179 0
122.49.128.0 122.49.191.255 iiNet Limited AU 2 0
122.99.64.0 122.99.95.255 iiNet Limited AU 513 0
124.148.0.0 124.149.255.255 iiNet Limited AU 217 2
124.150.0.0 124.150.127.255 iiNet Limited AU 172 0
124.168.0.0 124.168.255.255 iiNet Limited AU 53 0
124.169.0.0 124.169.255.255 iiNet Limited AU 59 2
124.170.0.0 124.171.255.255 iiNet Limited AU 182 3
125.209.128.0 125.209.191.255 iiNet Limited AU 12 0
180.200.128.0 180.200.191.255 iiNet Limited AU 42 0
180.200.192.0 180.200.223.255 iiNet Limited AU 0 0
180.222.0.0 180.222.31.255 iiNet Limited AU 16 0
180.235.192.0 180.235.223.255 iiNet Limited AU 7 0
182.239.128.0 182.239.255.255 iiNet Limited AU 34 0
192.83.231.0 192.83.231.255 iiNet Limited AU 0 0
202.0.154.0 202.0.154.255 iiNet Limited AU 0 0
202.6.128.0 202.6.143.255 iiNet Limited AU 795 0
202.6.144.0 202.6.159.255 iiNet Limited AU 74 0
202.45.96.0 202.45.127.255 iiNet Limited AU 3,578 0
202.55.144.0 202.55.159.255 iiNet Limited AU 249 0
202.59.96.0 202.59.111.255 iiNet Limited AU 8,488 0
202.72.128.0 202.72.159.255 iiNet Limited AU 311 0
202.72.160.0 202.72.191.255 iiNet Limited AU 3,670 0
202.129.64.0 202.129.79.255 iiNet Limited AU 7 0
202.129.80.0 202.129.95.255 iiNet Limited AU 72 0
202.129.96.0 202.129.99.255 iiNet Limited AU 1 0
202.129.100.0 202.129.103.255 iiNet Limited AU 1 0
202.129.104.0 202.129.111.255 iiNet Limited AU 0 0
202.129.112.0 202.129.127.255 iiNet Limited AU 25 0
202.136.96.0 202.136.111.255 iiNet Limited AU 44 0
202.159.128.0 202.159.191.255 iiNet Limited AU 14 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:4478:: 2001:4478:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 12 0
2001:4479:: 2001:4479:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 5 0
2001:447a:: 2001:447b:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:44b8:: 2001:44b8:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 185 0
2402:a400:: 2402:a400:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b800:: 2402:b800:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 1 0
2402:b801:: 2402:b801:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 6 0
2404:b800:: 2404:b800:ffff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:1300:: 2001:4478:13ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 12 0
2001:4478:1310:1000:: 2001:4478:1310:1fff:ffff:ffff:ffff:ffff iiNet Limited AU 12 0
2001:4478:1312:: 2001:4478:1312:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:1500:: 2001:4478:15ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:1800:: 2001:4478:18ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:1900:: 2001:4478:19ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:2200:: 2001:4478:22ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:2500:: 2001:4478:25ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:5800:: 2001:4478:59ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:4478:ff01:: 2001:4478:ff01:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:44b8:60:2300:: 2001:44b8:60:23ff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:44b8:30e9:: 2001:44b8:30e9:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2001:44b8:30ea:: 2001:44b8:30ea:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:100:: 2402:b801:1ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:200:: 2402:b801:2ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:300:: 2402:b801:3ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:1000:: 2402:b801:1fff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:2000:: 2402:b801:2fff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 6 0
2402:b801:2800:: 2402:b801:28ff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 2 0
2402:b801:2a00:: 2402:b801:2aff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:2c00:: 2402:b801:2cff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2402:b801:3000:: 2402:b801:3fff:ffff:ffff:ffff:ffff:ffff iiNet Limited AU 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:678:604:: 2001:678:604:ffff:ffff:ffff:ffff:ffff PC “Astra-net” UA 0 0
2001:678:608:: 2001:678:608:ffff:ffff:ffff:ffff:ffff QUICK-NET Mariusz Miska PL 0 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
4802 iiNet Limited AU 193 6 18,968 2
9556 iiNet Limited AU 11 1 1,244 0
12714 Net By Net Holding LLC RU 193 2 4,157 98
20911 Net-Surf.net Ltd. BG 28 0 71 2
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 246 2
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 8 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 4 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,532 12
3254 Lucky Net Ltd UA 4 0 2,214 2
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 0
3595 Global Net Access, LLC US 37 3 86,134 11
3931 Logical Net Corporation US 6 0 743 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,790 18
4776 A-Net Co., Ltd. TH 35 1 143 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 396 13 33,677 100
5405 CSO.net Internet Services GmbH AT 1 1 3,980 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 603 0
6364 Atlantic.net, Inc. US 47 5 18,981 1
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,775 0 10,986 7
6624 Gower.Net US 3 0 27 0
6735 sdt.net AG DE 6 1 299 0
6831 Net & Com s.r.l. IT 2 1 656 0
6911 Pro-Net Internet Services Limited GB 4 0 155 0
7106 Com Net, Inc. US 9 1 950 1
7146 Georgia Business Net, Inc US 2 0 43 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 277 0
7600 Escape.net AU 56 4 517 0
7641 China Broadcasting TV Net CN 7 0 53 0
7806 Binary Net, LLC US 13 0 1,276 0
7850 iHighway.net, Inc. US 28 1 36 0
7891 Bellsouth.Net US 1 0 0 0
8001 Net Access Corporation US 39 4 15,088 1
8057 Vision Net, Inc. US 47 1 303 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 293 7

DNS server (NS records) ns1.iinet.net.au (203.14.168.3)
ns3.iinet.net.au (203.14.169.3)
ns2.iinet.net.au (203.59.24.3)
Mail server (MX records) asav.iinet.net.au (203.59.218.120)
IP address (IPv4) 203.173.50.151
IP address (IPv6) 2001:4478:1310:1fff:203:173:50:151
ASN number 4802
ASN name (ISP) iiNet Limited
IP-range/subnet 203.173.50.0/24
203.173.50.0 – 203.173.50.255
Domain Name: iinet.net.au
Last Modified: 20-May-2016 00:51:35 UTC
Status: clientDeleteProhibited
Registrar Name: Connect West

Registrant: iiNet Limited
Registrant ID: ACN 068 628 937
Eligibility Type: Company

Registrant Contact ID: CW-C009153
Registrant Contact Name: iiNet Hostmaster

203.0.178.91 1285
Are you looking for domain iimetro.com.au?
This domain is hosted by iiNet Limited (AS4802). The first DNS server is ns1.iinet.net.au. The current IPv4 address is 203.173.50.132. The mail server with the highest priority is as-av.iinet.net.au.
DNS server (NS records) ns1.iinet.net.au (203.14.168.3)
ns2.iinet.net.au (203.59.24.3)
ns3.iinet.net.au (203.14.169.3)
Mail server (MX records) as-av.iinet.net.au (203.0.178.180)
IP address (IPv4) 203.173.50.132
IP address (IPv6)
ASN number 4802
ASN name (ISP) iiNet Limited
IP-range/subnet 203.173.50.0/24
203.173.50.0 – 203.173.50.255
Domain Name: iimetro.com.au
Last Modified: 07-Aug-2016 22:56:44 UTC
Status: ok
Registrar Name: Connect West

Registrant: CONNECT WEST PTY LTD
Registrant ID: ABN 40073156779
Eligibility Type: Company

Registrant Contact ID: CW-C009153
Registrant Contact Name: iiNet Hostmaster

Domain IPv4 address Ranking Alexa Pagerank
iimetro.com.au 203.173.50.132 -1
iimetro.net.au 203.173.50.132
IPv4 routes
Startip Endip Description Country #domains #spamhosts
193.177.180.0 193.177.181.255 HTM Personenvervoer N.V. NL 0 0
203.6.128.0 203.6.129.255 Wilson HTM Ltd AU 0 0
46.51.224.0 46.51.255.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,213 0
46.137.192.0 46.137.223.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,054 0
46.137.224.0 46.137.255.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,570 0
185.37.96.0 185.37.99.255 QNREN Members’ Peering LAN QA 2 0
192.171.14.0 192.171.15.255 Indiana Members Credit Union US 0 0
199.59.176.0 199.59.179.255 THE MEMBERS GROUP US 0 0
203.210.82.0 203.210.82.255 Members Equity Bank, Melbourne Australia AU 1 0
8.38.162.0 8.38.162.255 Members 1st Federal Credit Union US 0 0
8.38.163.0 8.38.163.255 Members 1st Federal Credit Union US 1 0
41.93.40.0 41.93.47.255 Assigned to Members TZ 3 1
185.95.218.0 185.95.218.255 CommunityRack.org Members CH 64 0
192.171.14.0 192.171.14.255 Indiana Members Credit Union US 0 0
192.171.15.0 192.171.15.255 Indiana Members Credit Union US 0 0
193.80.191.0 193.80.191.255 SPOe members AT 2 0
199.59.176.0 199.59.176.255 THE MEMBERS GROUP US 0 0
199.59.177.0 199.59.177.255 THE MEMBERS GROUP US 0 0
199.59.179.0 199.59.179.255 THE MEMBERS GROUP US 0 0
37.157.248.0 37.157.255.255 gameserver by http://www.gamed.de DE 653 0
46.150.160.0 46.150.191.255 Web Page: http://www.opticom.net RU 9 0
62.122.192.0 62.122.199.255 Web Page: http://www.opticom.net RU 10 0
91.216.185.0 91.216.185.255 http://www.networkimage.cz/ CZ 0 0
185.12.152.0 185.12.155.255 1C LLC, http://www.1c.ru RU 15 0
185.21.24.0 185.21.27.255 EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 1 0
185.33.116.0 185.33.119.255 http://www.csv-networks.nl NL 4,200 0
185.166.4.0 185.166.7.255 http.net Internet GmbH DE 0 0
185.187.40.0 185.187.43.255 EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 0 0
193.108.172.0 193.108.173.255 http://www.vmunix.org/ DE 5 0
193.169.234.0 193.169.235.255 openstat project http://openstat.com/ RU 0 0
194.50.75.0 194.50.75.255 http://pop.pl PL 0 0
194.110.69.0 194.110.69.255 http://www.geeknode.org/ FR 14 0
195.216.236.0 195.216.236.255 trouble: Information: http://www.inbox.lv LV 10 0
195.244.26.0 195.244.27.255 http://pop.pl PL 4 0
203.55.130.0 203.55.130.255 http://internetcity AU 0 0
213.160.64.0 213.160.95.255 http.net Internet GmbH DE 23,640 0
217.197.112.0 217.197.127.255 http://www.estt.ru RU 667 0
31.172.136.0 31.172.137.255 Home net project, http://domonet.ua/ UA 12 0
31.172.136.0 31.172.136.255 Home net project, http://domonet.ua/ UA 0 0
31.172.137.0 31.172.137.255 Home net project, http://domonet.ua/ UA 12 0
31.172.141.0 31.172.141.255 Home net project, http://domonet.ua/ UA 7 0
31.172.143.0 31.172.143.255 Unlimited project, http://unlimited.ua/ UA 5 0
46.150.180.0 46.150.183.255 Web Page: http://www.opticom.net RU 0 0
62.122.192.0 62.122.195.255 Web Page: http://www.opticom.net RU 3 0
62.122.197.0 62.122.197.255 Web Page: http://www.opticom.net RU 5 0
85.25.89.0 85.25.89.255 http://www.epharmexx.de DE 126 0
91.242.81.0 91.242.81.255 registered through http://www.itns.md/ip.html MD 0 0
92.61.60.0 92.61.63.255 http://www.makenewmedia.com AT 69 0
93.186.194.0 93.186.194.255 Gameservers by http://gamed.es DE 0 0
103.25.62.0 103.25.62.255 http://compevo.com HK 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df0:80:: 2001:df0:80:ffff:ffff:ffff:ffff:ffff Members Equity Bank, Melbourne Australia AU 0 0
2001:7f8:1d:: 2001:7f8:1d:ffff:ffff:ffff:ffff:ffff http://www.trex.fi/ FI 0 0
2620:126:1000:: 2620:126:100f:ffff:ffff:ffff:ffff:ffff Links Technology Solutions, Inc. US 0 0
2a00:17d8:: 2a00:17df:ffff:ffff:ffff:ffff:ffff:ffff http.net Internet GmbH DE 935 0
2a00:54e0:: 2a00:54e0:ffff:ffff:ffff:ffff:ffff:ffff EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 0 0
2a00:9960:: 2a00:9960:ffff:ffff:ffff:ffff:ffff:ffff HIGH SPEED PROFESSIONAL LINKS, SARL LB 0 0
2a00:f8c0:: 2a00:f8c0:ffff:ffff:ffff:ffff:ffff:ffff Newsnet AG backbone routers and links LI 1 0
2a05:50c0:: 2a05:50c7:ffff:ffff:ffff:ffff:ffff:ffff Golden Sky Links Company For Internet & Communication Ltd IQ 0 0
2a00:4b80:: 2a00:4b80::ffff:ffff:ffff:ffff:ffff OPEN CABLE LINKS ES 2 0
2a05:dfc7:5:: 2a05:dfc7:5:ffff:ffff:ffff:ffff:ffff FuslVZ OpenNIC Anycast DNS Resolver (IPv6-1) – http://dnsrec.meo.ws/ GB 2 0
2a05:dfc7:5353:: 2a05:dfc7:5353:ffff:ffff:ffff:ffff:ffff FuslVZ OpenNIC Anycast DNS Resolver (IPv6-5) – http://dnsrec.meo.ws/ GB 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12574 http.net Internet GmbH DE 1 1 23,640 0
58544 http://www.tvdirect.tv TH 2 0 4 0
17940 CYBER LINKS Co.,Ltd. JP 3 1 278 0
22179 Links Technology Solutions, Inc. US 1 0 0 0
29623 HIGH SPEED PROFESSIONAL LINKS, SARL LB 4 0 0 0
57727 QUICK-LINKS IL 7 0 0 0
201145 Golden Sky Links Company For Internet & Communication Ltd IQ 3 0 0 0
205166 Mobile Links Europe AB SE 1 0 2 0
394768 Links Technology Solutions, Inc. US 2 1 19 0
2554 for assignment to JPNIC members JP 50 0 35,806 6
2907 for assignment to JPNIC members JP 566 4 977 1
3488 for assignment to JPNIC members JP 8 0 2 0
20003 Members 1st Federal Credit Union US 2 0 1 0
24229 for assignment to JPNIC members JP 4 1 51 0
33277 THE MEMBERS GROUP US 4 0 11 0
45616 Members Equity Bank Ltd AU 1 0 1 0
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=35
3/27/2018 11:31:51 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=34
3/27/2018 11:31:49 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=33
3/27/2018 11:31:48 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=32
3/27/2018 11:31:47 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=31
3/27/2018 11:31:47 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=30
3/27/2018 11:31:46 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=29
3/27/2018 11:31:43 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=28
3/27/2018 11:31:36 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=27
3/27/2018 11:31:28 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=26
3/27/2018 11:31:26 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=25
3/27/2018 11:31:24 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=24
3/27/2018 11:31:18 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=23
3/27/2018 11:31:16 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=22
3/27/2018 11:31:13 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=21
3/27/2018 11:31:12 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=20
3/27/2018 11:31:08 AM (2 hours 23 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=19
3/27/2018 11:31:06 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=18
3/27/2018 11:31:03 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=17
3/27/2018 11:31:02 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=16
3/27/2018 11:30:57 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=15
3/27/2018 11:30:56 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=14
3/27/2018 11:30:56 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=13
3/27/2018 11:30:54 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=12
3/27/2018 11:30:52 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=11
3/27/2018 11:30:47 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=10
3/27/2018 11:30:45 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=9
3/27/2018 11:30:43 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=8
3/27/2018 11:30:41 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=7
3/27/2018 11:30:39 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
United States Cliffside, United States was blocked by firewall at http://stewwebb.com/?author=6
3/27/2018 11:30:37 AM (2 hours 24 mins ago)
IP: 24.181.242.250 Hostname: 24-181-242-250.static.snfr.nc.charter.com
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
San Angelo, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522190578.6
3/27/2018 5:43:00 PM (5 minutes ago)
IP: 216.228.76.143 Hostname: 216.228.76.143
Browser: Firefox version 47.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0
Type: Human
United States San Angelo, United States arrived from http://www.informamerica.net/assassination_murder/Obama_Opponents_Murdered.htm and visited http://www.stewwebb.com/
3/27/2018 5:42:57 PM (5 minutes ago)
IP: 216.228.76.143 Hostname: 216.228.76.143
Browser: Firefox version 47.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:47.0) Gecko/20100101 Firefox/47.0

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Uberlândia, Brazil was blocked access via country blocking at http://stewwebb.com/modules/columnadverts/config.xml
3/27/2018 5:41:19 PM (8 minutes ago)
IP: 187.32.93.225
Human/Bot: Bot
Browser: IE version 7.0 running on Win32
Mozilla/5.0 (compatible; MSIE 7.0; Windows 98; Trident/3.1)
inetnum: 187.32.0.0/16 (187.32.0.0 – 187.33.255.255)
[131072 addresses in this network]
aut-num: AS16735
abuse-c: CST87
owner: ALGAR TELECOM S/A
ownerid: 71.208.516/0001-74responsible: Cristiana Heluy de Castro
owner-c: ALTSA49
tech-c: CNI15
inetrev: 187.32.92.0/22 (187.32.92.0 – 187.32.95.255)
[1024 addresses in this network]
nserver: nspar.ctbc.com.br
nsstat: 20180327 AA
nslastaa: 20180327
nserver: nssar.ctbc.com.br
nsstat: 20180327 AA
nslastaa: 20180327
created: 20081218
changed: 20130307

nic-hdl-br: ALTSA49
person: ALGAR TELECOM S/A
created: 20140820
changed: 20170411

nic-hdl-br: CNI15
person: CTBC – Núcleo de Aministração de IPs
created: 20060417
changed: 20141103

nic-hdl-br: CST87
person: Computer Security Incident Response Team
created: 20051208
changed: 20141114
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Hampton, United States visited http://stewwebb.com/wp-content/plugins/showbiz/css/post_settings.css
3/27/2018 5:40:40 PM (11 minutes ago)
IP: 67.235.96.52
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 5.1; Trident/4.0)
NetRange: 67.232.0.0 – 67.239.255.255
[524288 addresses in this network]
CIDR: 67.232.0.0/13 (67.232.0.0 – 67.239.255.255)
[524288 addresses in this network]
NetName: CENTURYLINK-LEGACY-EMBARQ-BKL-4
NetHandle: NET-67-232-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2008-01-14
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-67-232-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Centurylink IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Columbia City, United States visited http://stewwebb.com/wp-content/plugins/php-event-calendar/js/file-uploader/app.js
3/27/2018 5:36:10 PM (19 minutes ago)
IP: 67.237.31.217
Browser: Safari version 0.0 running on Win8
Mozilla/5.0 (Windows; U; Windows NT 6.2) AppleWebKit/531.21.4 (KHTML, like Gecko) Version/4.0.1 Safari/531.21.4
NetRange: 67.232.0.0 – 67.239.255.255
[524288 addresses in this network]
CIDR: 67.232.0.0/13 (67.232.0.0 – 67.239.255.255)
[524288 addresses in this network]
NetName: CENTURYLINK-LEGACY-EMBARQ-BKL-4
NetHandle: NET-67-232-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2008-01-14
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-67-232-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Rome, Italy was blocked access via country blocking at http://stewwebb.com/modules/fieldvmegamenu/config.xml
3/27/2018 5:27:48 PM (28 minutes ago)
IP: 93.58.124.32
Human/Bot: Bot
Browser: Firefox version 37.0 running on Linux
Mozilla/5.0 (X11; Linux i686; rv:5.0) Gecko/20140505 Firefox/37.0
% Information related to ‘93.58.124.0 – 93.58.124.255’
[256 addresses in this network]
% Abuse contact for ‘93.58.124.0 – 93.58.124.255’ is ‘abuse@fastweb.it’
[256 addresses in this network]
inetnum: 93.58.124.0 – 93.58.124.255
[256 addresses in this network]
netname: FASTWEB-L3-PAT_NAT
descr: PAT/NAT IP addresses POP 2305 for
descr: Static allocation to Residential/SoHo customer with L3 devices
country: IT
admin-c: IRS2-RIPE
tech-c: IRS2-RIPE
status: ASSIGNED PA
mnt-by: FASTWEB-MNT
remarks: In case of improper use originating from our network,
remarks: please mail customer or abuse@fastweb.it
remarks: INFRA-AW
created: 2010-05-13T06:05:34Z
last-modified: 2010-05-13T06:05:34Z
source: RIPE

person: ip registration service
address: Via Caracciolo, 51
address: 20155 Milano MI
address: Italy
phone: +39 02 45451
fax-no: +39 02 45451
nic-hdl: IRS2-RIPE
mnt-by: FASTWEB-MNT
remarks:
remarks: In case of improper use originating from our network,
remarks: please mail customer or abuse@fastweb.it
remarks:
created: 2001-12-18T12:06:41Z
last-modified: 2008-02-29T14:09:58Z
source: RIPE # Filtered

% Information related to ‘93.56.0.0/14AS12874’ (93.56.0.0 – 93.63.255.255)
[524288 addresses in this network]
route: 93.56.0.0/14 (93.56.0.0 – 93.63.255.255)
[524288 addresses in this network]
descr: Fastweb Networks block
origin: AS12874
mnt-by: FASTWEB-MNT
created: 2009-06-24T20:25:56Z
last-modified: 2009-06-24T20:25:56Z
source: RIPE
@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker

Iran visited http://stewwebb.com/modules/fieldvmegamenu/config.xml
3/27/2018 5:26:53 PM (31 minutes ago)
IP: 2.180.30.169
Browser: Firefox version 37.0 running on Linux
Mozilla/5.0 (X11; Linux i686; rv:5.0) Gecko/20140505 Firefox/37.0

% Information related to ‘2.180.16.0 – 2.180.63.255’
[12288 addresses in this network]
% Abuse contact for ‘2.180.16.0 – 2.180.63.255’ is ‘abuse@ito.gov.ir’
[12288 addresses in this network]
inetnum: 2.180.16.0 – 2.180.63.255
[12288 addresses in this network]
netname: tckhr-DSL
descr: Telecommunication Company of Khorasan Razavi for ADSL users
country: IR
admin-c: JS10218-RIPE
tech-c: JS10218-RIPE
status: ASSIGNED PA
mnt-by: AS12880-MNT
created: 2011-09-20T09:32:06Z
last-modified: 2011-09-20T09:32:06Z
source: RIPE

person: Jamil Sabaghi
address: Khomeini ST Mashhad Iran
phone: +98 511 604 44 40
nic-hdl: JS10218-RIPE
mnt-by: AS12880-MNT
created: 2011-09-20T09:32:06Z
last-modified: 2011-09-20T09:32:06Z
source: RIPE # Filtered

% Information related to ‘2.180.16.0/20as12880’ (2.180.16.0 – 2.180.31.255)
[4096 addresses in this network]
route: 2.180.16.0/20 (2.180.16.0 – 2.180.31.255)
[4096 addresses in this network]
descr: mashhad
origin: as12880
mnt-by: as12880-MNT
mnt-routes: mohsenrahimimaintainer
created: 2012-09-02T12:03:15Z
last-modified: 2012-12-18T12:34:46Z
source: RIPE

% Information related to ‘2.180.16.0/20as48159’ (2.180.16.0 – 2.180.31.255)
[4096 addresses in this network]
route: 2.180.16.0/20 (2.180.16.0 – 2.180.31.255)
[4096 addresses in this network]
descr: Telecommunication Infrastructure Company
descr: Mashhad
origin: as48159
mnt-by: mohsenrahimimaintainer
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Lehigh Acres, United States visited http://stewwebb.com/components/com_foxcontact/js/jtext.js
3/27/2018 5:25:38 PM (33 minutes ago)
IP: 71.208.193.237 Hostname: 71-208-193-237.ftmy.qwest.net
Browser: Firefox version 37.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_7_6 rv:5.0) Gecko/20111129 Firefox/37.0
NetRange: 71.208.0.0 – 71.223.255.255
[1048576 addresses in this network]
CIDR: 71.208.0.0/12 (71.208.0.0 – 71.223.255.255)
[1048576 addresses in this network]
NetName: CENTURYLINK-LEGACY-QWEST-INET-118
NetHandle: NET-71-208-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 2005-05-06
Updated: 2018-02-21
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-71-208-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgTechHandle: QIA-ARIN
OrgTechName: Centurylink IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

RAbuseHandle: QIA2-ARIN
RAbuseName: Qwest Abuse
RAbusePhone: +1-877-886-6515
RAbuseEmail: abuse@qwest.net
RAbuseRef: https://whois.arin.net/rest/poc/QIA2-ARIN

RTechHandle: QIA-ARIN
RTechName: Centurylink IP Admin
RTechPhone: +1-877-886-6515
RTechEmail: ipadmin@centurylink.com
RTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

RNOCHandle: QIN-ARIN
RNOCName: Qwest IP NOC
RNOCPhone: +1-877-886-6515
RNOCEmail: support@qwestip.net
RNOCRef: https://whois.arin.net/rest/poc/QIN-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Kalispell, United States visited http://stewwebb.com/wp-content/plugins/accesspress-anonymous-post-pro/js/admin-extra.js
3/27/2018 5:21:51 PM (41 minutes ago)
IP: 72.160.48.244 Hostname: 72-160-48-244.dyn.centurytel.net
Browser: undefined
Opera/9.12 (Windows NT 6.2; en-US) Presto/2.9.331 Version/11.00
NetRange: 72.160.0.0 – 72.161.255.255
[131072 addresses in this network]
CIDR: 72.160.0.0/15 (72.160.0.0 – 72.163.255.255)
[262144 addresses in this network]
NetName: CENTURYLINK-LEGACY-CENTURYTEL-NETBLOCK10
NetHandle: NET-72-160-0-0-1
Parent: NET72 (NET-72-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2005-09-23
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-72-160-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Centurylink IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Enterprise, United States visited http://stewwebb.com/components/com_sexycontactform/assets/js/index.html
3/27/2018 5:20:40 PM (43 minutes ago)
IP: 75.121.78.79 Hostname: 75-121-78-79.dyn.centurytel.net
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 5.2; Trident/5.1)
NetRange: 75.120.0.0 – 75.121.255.255
[131072 addresses in this network]
CIDR: 75.120.0.0/15 (75.120.0.0 – 75.123.255.255)
[262144 addresses in this network]
NetName: CENTURYLINK-LEGACY-CENTURYTEL-NETBLOCK11
NetHandle: NET-75-120-0-0-1
Parent: NET75 (NET-75-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2006-10-05
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-75-120-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2018-03-13
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Catawba, United States visited http://stewwebb.com/modules/attributewizardpro/config.xml
3/27/2018 5:18:42 PM (46 minutes ago)
IP: 67.237.81.120 Hostname: nc-67-237-81-120.dyn.embarqhsd.net
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_7 rv:3.0) Gecko/20100912 Firefox/36.0
NetRange: 67.232.0.0 – 67.239.255.255
[524288 addresses in this network]
CIDR: 67.232.0.0/13 (67.232.0.0 – 67.239.255.255)
[524288 addresses in this network]
NetName: CENTURYLINK-LEGACY-EMBARQ-BKL-4
NetHandle: NET-67-232-0-0-1
Parent: NET67 (NET-67-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2008-01-14
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-67-232-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN

OrgTechHandle: QIA-ARIN
OrgTechName: Centurylink IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Athens, Greece visited http://stewwebb.com/modules/attributewizardpro/config.xml
3/27/2018 5:18:24 PM (47 minutes ago)
IP: 62.217.98.150 Hostname: elidek-1.eier.access-link.grnet.gr
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_6_7 rv:3.0) Gecko/20100912 Firefox/36.0

% Information related to ‘62.217.96.0 – 62.217.111.255’
[4096 addresses in this network]
% Abuse contact for ‘62.217.96.0 – 62.217.111.255’ is ‘abuse@grnet.gr’
[4096 addresses in this network]
inetnum: 62.217.96.0 – 62.217.111.255
[4096 addresses in this network]
netname: GRNET
descr: GRNET4 Core
descr: Greek Research and Technology Network S.A
descr: 56 Messogion Av.
descr: 11527 Athens
country: GR
org: ORG-GRaT1-RIPE
admin-c: GN1931-RIPE
tech-c: GN1931-RIPE
abuse-c: GN1931-RIPE
remarks: INFRA-AW
status: ASSIGNED PA
mnt-by: GRNET-NOC
mnt-domains: MNT-GRNET-DNS
created: 2012-04-03T08:11:34Z
last-modified: 2018-01-12T08:53:06Z
source: RIPE

organisation: ORG-GRaT1-RIPE
org-name: Greek Research and Technology Network S.A
org-type: LIR
address: 7 Kifisias Av.
address: 11523
address: Athens
address: GREECE
phone: +302107474274
fax-no: +302107474490
admin-c: PT1566-RIPE
admin-c: GN1931-RIPE
admin-c: AP3196-RIPE
admin-c: AL3706-RIPE
admin-c: YM1289-RIPE
tech-c: GN1931-RIPE
abuse-c: GN1931-RIPE
mnt-ref: RIPE-NCC-HM-MNT
mnt-ref: GRNET-NOC
mnt-by: RIPE-NCC-HM-MNT
mnt-by: GRNET-NOC
created: 2004-04-17T11:24:56Z
last-modified: 2017-10-30T14:40:07Z
source: RIPE # Filtered

role: GRNET NOC
org: ORG-GRaT1-RIPE
address: Greek Research and Technology Network (GRNET) S.A.
address: Messogeion 56
address: Athens 11527, GREECE
phone: +30 210 7474274
fax-no: +30 210 7474490
remarks: ————————————–
remarks: For complains about abuse, spam etc:
abuse-mailbox: abuse@grnet.gr
remarks: ————————————–
admin-c: PT1566-RIPE
tech-c: YM412-RIPE
tech-c: AP3196-RIPE
tech-c: AL3706-RIPE
mnt-by: GRNET-NOC
nic-hdl: GN1931-RIPE
created: 2007-06-12T14:21:14Z
last-modified: 2014-01-27T08:08:29Z
source: RIPE # Filtered

% Information related to ‘62.217.96.0/19AS5408’ (62.217.96.0 – 62.217.127.255)
[8192 addresses in this network]
route: 62.217.96.0/19 (62.217.96.0 – 62.217.127.255)
[8192 addresses in this network]
descr: GRNET
origin: AS5408
mnt-by: GRNET-NOC
created: 2012-02-09T11:48:00Z
last-modified: 2012-02-09T11:48:00Z
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Cyberjaya, Malaysia visited http://stewwebb.com/wp-content/plugins/website-contact-form-with-file-upload/js/nm-global.js
3/27/2018 5:14:57 PM (52 minutes ago)
IP: 61.6.27.30 Hostname: broadband.time.net.my
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_6_1) AppleWebKit/5330 (KHTML, like Gecko) Chrome/38.0.885.0 Mobile Safari/5330
% Information related to ‘61.6.0.0 – 61.6.191.255’
[49152 addresses in this network]
% Abuse contact for ‘61.6.0.0 – 61.6.191.255’ is ‘abuse@time.com.my’
[49152 addresses in this network]
inetnum: 61.6.0.0 – 61.6.191.255
[49152 addresses in this network]
netname: TTDOTCOM-MY
descr: TT DOTCOM SDN BHD
descr: LOT 14, JALAN U1/26
descr: SEKSYEN U1
descr: HICOM GLENMARIE INDUSTRIAL PARK
descr: SHAH ALAM, SELANGOR 40150
country: MY
org: ORG-TDSB1-AP
admin-c: TDSB3-AP
tech-c: TDSB3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-TTDOTCOM-MY
mnt-irt: IRT-TTDOTCOM-MY
status: ALLOCATED PORTABLE
last-modified: 2017-08-30T07:18:47Z
source: APNIC

irt: IRT-TTDOTCOM-MY
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
e-mail: abuse@time.com.my
abuse-mailbox: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
auth: # Filtered
mnt-by: MAINT-TTDOTCOM-MY
last-modified: 2016-01-25T03:32:51Z
source: APNIC

organisation: ORG-TDSB1-AP
org-name: TT DOTCOM SDN BHD
country: MY
address: LOT 14, JALAN U1/26
address: SEKSYEN U1
address: HICOM GLENMARIE INDUSTRIAL PARK
phone: +60-3-5032-6000
fax-no: +60-3-5032-6353
e-mail: abuse@time.com.my
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-10-11T01:29:52Z
source: APNIC

role: TT DOTCOM SDN BHD administrator
address: LOT 14, JALAN U1/26, SEKSYEN U1, HICOM GLENMARIE INDUSTRIAL PARK, SHAH ALAM SELANGOR 40150
country: MY
phone: +60-3-5032-6000
fax-no: +60-3-5032-6000
e-mail: abuse@time.com.my
admin-c: TDSB3-AP
tech-c: TDSB3-AP
nic-hdl: TDSB3-AP
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Lebanon, United States visited http://stewwebb.com/wp-content/plugins/website-contact-form-with-file-upload/js/nm-global.js
3/27/2018 5:14:34 PM (53 minutes ago)
IP: 207.118.43.43 Hostname: 207-118-43-43.dyn.centurytel.net
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; U; PPC Mac OS X 10_6_1) AppleWebKit/5330 (KHTML, like Gecko) Chrome/38.0.885.0 Mobile Safari/5330
NetRange: 207.118.0.0 – 207.119.255.255
[131072 addresses in this network]
CIDR: 207.118.0.0/15 (207.118.0.0 – 207.119.255.255)
[131072 addresses in this network]
NetName: CENTURYLINK-LEGACY-CENTURYTEL-NETBLOCK9
NetHandle: NET-207-118-0-0-1
Parent: NET207 (NET-207-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2004-06-18
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-207-118-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/CIH-12

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Turkey visited http://stewwebb.com/wp-content/plugins/woocommerce-product-addon/js/nm-global.js
3/27/2018 5:12:03 PM (57 minutes ago)
IP: 95.0.32.8 Hostname: 95.0.32.8.static.ttnet.com.tr
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows NT 5.2) AppleWebKit/5342 (KHTML, like Gecko) Chrome/39.0.872.0 Mobile Safari/5342
% Information related to ‘95.0.32.0 – 95.0.32.255’
[256 addresses in this network]
% Abuse contact for ‘95.0.32.0 – 95.0.32.255’ is ‘abuse@ttnet.com.tr’
[256 addresses in this network]
inetnum: 95.0.32.0 – 95.0.32.255
[256 addresses in this network]
netname: ILMET_Elektronik_Ltd
descr: Marmara Bolgesi 27.Sk No 19 Lefkosa KKTC via Mersin 10, Turkey
country: TR
admin-c: MT8671-RIPE
tech-c: MT8671-RIPE
status: ASSIGNED PA
mnt-by: AS9121-MNT
created: 2010-04-01T06:20:16Z
last-modified: 2010-04-01T06:20:16Z
source: RIPE

person: Mete Tosun
remarks: ILMET_Elektronik_Ltd
address: Marmara Bolgesi 27.Sk No 19 Lefkosa KKTC via Mersin 10, Turkey
phone: +903922278477
nic-hdl: MT8671-RIPE
created: 2010-04-01T06:20:16Z
last-modified: 2016-04-06T19:10:11Z
mnt-by: RIPE-NCC-LOCKED-MNT
source: RIPE # Filtered

% Information related to ‘95.0.0.0/17AS9121’ (95.0.0.0 – 95.0.255.255)
[65536 addresses in this network]
route: 95.0.0.0/17 (95.0.0.0 – 95.0.255.255)
[65536 addresses in this network]
descr: TurkTelecom
origin: AS9121
mnt-by: AS9121-MNT
created: 2009-09-28T12:08:52Z
last-modified: 2009-09-28T12:08:52Z
source: RIPE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Grove City, United States visited http://stewwebb.com/wp-content/plugins/jssor-slider/assets/css/system-message.css
3/27/2018 5:07:10 PM (1 hour 5 mins ago)
IP: 174.105.72.183 Hostname: cpe-174-105-72-183.columbus.res.rr.com
Browser: undefined
Opera/8.32 (X11; Linux x86_64; sl-SI) Presto/2.11.349 Version/11.00
NetRange: 174.96.0.0 – 174.111.255.255
[1048576 addresses in this network]
CIDR: 174.96.0.0/12 (174.96.0.0 – 174.127.255.255)
[2097152 addresses in this network]
NetName: RRMA
NetHandle: NET-174-96-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRMA)
RegDate: 2009-02-26
Updated: 2009-12-08
Ref: https://whois.arin.net/rest/net/NET-174-96-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRMA
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate:
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Columbus, OH, Herndon, VA and Raleigh, NC RDCs.
Ref: https://whois.arin.net/rest/org/RRMA

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Sparta, United States visited http://stewwebb.com/wp-content/plugins/jssor-slider/assets/css/system-message.css
3/27/2018 5:06:43 PM (1 hour 6 mins ago)
IP: 184.158.6.203 Hostname: 184-158-6-203.dyn.centurytel.net
Browser: undefined
Opera/8.32 (X11; Linux x86_64; sl-SI) Presto/2.11.349 Version/11.00
NetRange: 184.156.0.0 – 184.159.255.255
[262144 addresses in this network]
CIDR: 184.156.0.0/14 (184.156.0.0 – 184.159.255.255)
[262144 addresses in this network]
NetName: CENTURYLINK-LEGACY-CENTURYTEL-NETBLOCK16
NetHandle: NET-184-156-0-0-1
Parent: NET184 (NET-184-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2010-06-21
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-184-156-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States Marshfield, United States visited http://stewwebb.com/wp-content/plugins/dzs-videogallery/admin/admin_global.js
3/27/2018 5:02:26 PM (1 hour 11 mins ago)
IP: 174.125.61.75 Hostname: 174-125-61-75.dyn.centurytel.net
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5321 (KHTML, like Gecko) Chrome/36.0.896.0 Mobile Safari/5321
NetRange: 174.124.0.0 – 174.125.255.255
[131072 addresses in this network]
CIDR: 174.124.0.0/15 (174.124.0.0 – 174.127.255.255)
[262144 addresses in this network]
NetName: CENTURYLINK-LEGACY-CENTURYTEL-NETBLOCK14
NetHandle: NET-174-124-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2009-04-07
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-174-124-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Wake Forest, United States visited http://stewwebb.com/wp-content/plugins/font-uploader/fontFunctions/fu_script.js
3/27/2018 5:44:46 PM (32 minutes ago)
IP: 76.0.132.182 Hostname: nc-76-0-132-182.dhcp.embarqhsd.net
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows NT 4.0) AppleWebKit/5361 (KHTML, like Gecko) Chrome/39.0.805.0 Mobile Safari/5361
NetRange: 76.0.0.0 – 76.7.255.255
[524288 addresses in this network]
CIDR: 76.0.0.0/13 (76.0.0.0 – 76.15.255.255)
[1048576 addresses in this network]
NetName: CENTURYLINK-LEGACY-EMBARQ-BKL-10
NetHandle: NET-76-0-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2006-01-19
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-76-0-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/EMBAR

OrgTechHandle: QIA-ARIN
OrgTechName: Centurylink IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Gig Harbor, United States visited http://stewwebb.com/wp-content/plugins/advanced-ajax-page-loader/reload_code.js
3/27/2018 5:43:53 PM (34 minutes ago)
IP: 98.125.225.13 Hostname: 98-125-225-13.dyn.centurytel.net
Browser: undefined
Opera/9.62 (X11; Linux x86_64; en-US) Presto/2.10.288 Version/10.00
NetRange: 98.125.0.0 – 98.125.255.255
[65536 addresses in this network]
CIDR: 98.125.0.0/16 (98.125.0.0 – 98.125.255.255)
[65536 addresses in this network]
NetName: CENTURYLINK-LEGACY-CENTURYTEL-NETBLOCK12
NetHandle: NET-98-125-0-0-1
Parent: NET98 (NET-98-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS5668
Organization: CenturyTel Internet Holdings, Inc. (CIH-12)
RegDate: 2008-06-02
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-98-125-0-0-1

OrgName: CenturyTel Internet Holdings, Inc.
OrgId: CIH-12
Address: 100 CenturyTel Drive
City: Monroe
StateProv: LA
PostalCode: 71201
Country: US
RegDate: 2003-11-05
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Washington, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522192566.9
3/27/2018 6:16:11 PM (4 minutes ago)
IP: 98.214.189.234 Hostname: c-98-214-189-234.hsd1.il.comcast.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 98.192.0.0 – 98.255.255.255
[4194304 addresses in this network]
CIDR: 98.192.0.0/10 (98.192.0.0 – 98.255.255.255)
[4194304 addresses in this network]
NetName: JUMPSTART-5
NetHandle: NET-98-192-0-0-1
Parent: NET98 (NET-98-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7922
Organization: Comcast Cable Communications, LLC (CCCS)
RegDate: 2007-04-20
Updated: 2016-08-31
Ref: https://whois.arin.net/rest/net/NET-98-192-0-0-1

OrgName: Comcast Cable Communications, LLC
OrgId: CCCS
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2001-09-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/CCCS

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://whois.arin.net/rest/poc/NAPO-ARIN

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://whois.arin.net/rest/poc/IC161-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker trackback
Vologda, Russia tried to access non-existent page http://www.stewwebb.com/category/911/trackback/
3/27/2018 6:25:04 PM (2 minutes ago)
IP: 95.53.245.204 Hostname: shpd-95-53-245-204.vologda.ru
Human/Bot: Bot
Browser: Chrome version 56.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/56.0.2899.123 Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Goshen, United States visited http://www.stewwebb.com/wp-json/wp/v2/users
3/27/2018 6:36:52 PM (3 minutes ago)
IP: 24.142.150.166 Hostname: onlingguns.com
Browser: undefined
Mozilla/5.0 (Windows NT 5.1; rv:31.0) Gecko/20100101 Firefox/31.0

NetRange: 24.142.128.0 – 24.142.255.255
[32768 addresses in this network]
CIDR: 24.142.128.0/17 (24.142.128.0 – 24.142.255.255)
[32768 addresses in this network]
NetName: RCMS
NetHandle: NET-24-142-128-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS10796, AS7843, AS11426, AS7017, AS11060, AS12262, AS20231
Organization: Time Warner Cable Internet LLC (RCMS)
RegDate: 2011-03-23
Updated: 2011-03-23
Ref: https://whois.arin.net/rest/net/NET-24-142-128-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RCMS
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2001-09-25
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner commercial customers out of the Columbus, OH, Herndon, VA and Raleigh, NC RDCs.
Ref: https://whois.arin.net/rest/org/RCMS

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Blackwood, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522194779.89
3/27/2018 6:53:03 PM (10 minutes ago)
IP: 72.73.245.188 Hostname: pool-72-73-245-188.cmdnnj.east.verizon.net
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1
NetRange: 72.73.128.0 – 72.87.47.255
[897024 addresses in this network]
CIDR: 72.87.0.0/19, 72.84.0.0/15, 72.76.0.0/14, 72.73.128.0/17, 72.80.0.0/14, 72.87.32.0/20, 72.86.0.0/16, 72.74.0.0/15 (72.87.0.0 – 72.87.63.255)
[16384 addresses in this network]
NetName: VIS-72-64
NetHandle: NET-72-73-128-0-1
Parent: NET72 (NET-72-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: MCI Communications Services, Inc. d/b/a Verizon Business (MCICS)
RegDate: 2005-06-24
Updated: 2016-08-18
Ref: https://whois.arin.net/rest/net/NET-72-73-128-0-1

OrgName: MCI Communications Services, Inc. d/b/a Verizon Business
OrgId: MCICS
Address: 22001 Loudoun County Pkwy
City: Ashburn
StateProv: VA
PostalCode: 20147
Country: US
RegDate: 2006-05-30
Updated: 2018-01-17
Ref: https://whois.arin.net/rest/org/MCICS

OrgTechHandle: SWIPP9-ARIN
OrgTechName: SWIPPER
OrgTechPhone: +1-800-900-0241
OrgTechEmail: stephen.r.middleton@verizon.com
OrgTechRef: https://whois.arin.net/rest/poc/SWIPP9-ARIN

OrgTechHandle: SWIPP-ARIN
OrgTechName: swipper
OrgTechPhone: +1-800-900-0241
OrgTechEmail: swipper@verizonbusiness.com
OrgTechRef: https://whois.arin.net/rest/poc/SWIPP-ARIN

OrgAbuseHandle: ABUSE3-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-800-900-0241
OrgAbuseEmail: abuse-mail@verizonbusiness.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE3-ARIN

RAbuseHandle: ABUSE5603-ARIN
RAbuseName: Abuse
RAbusePhone: +1-800-900-0241
RAbuseEmail: abuse@verizon.net
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE5603-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Astor, United States visited http://www.stewwebb.com/
3/28/2018 12:37:20 PM (11 minutes ago)
IP: 71.55.161.15 Hostname: fl-71-55-161-15.dhcp.embarqhsd.net
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6
NetRange: 71.48.0.0 – 71.55.255.255
[524288 addresses in this network]
CIDR: 71.48.0.0/13 (71.48.0.0 – 71.63.255.255)
[1048576 addresses in this network]
NetName: CENTURYLINK-LEGACY-EMBARQ-BKL-8
NetHandle: NET-71-48-0-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Embarq Corporation (EMBAR)
RegDate: 2005-04-26
Updated: 2018-02-19
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-71-48-0-0-1

OrgName: Embarq Corporation
OrgId: EMBAR
Address: 500 N New York Ave
City: Winter Park
StateProv: FL
PostalCode: 32789
Country: US
RegDate: 2006-07-06
Updated: 2018-03-13
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Columbus, United States left http://www.stewwebb.com/category/jewish-mob/ and visited http://www.stewwebb.com/2013/08/15/who-is-americas-moriarity-the-illuminati-zionist-denver-connection/
3/28/2018 8:08:09 AM (4 hours 51 mins ago)
IP: 184.57.7.210 Hostname: cpe-184-57-7-210.columbus.res.rr.com
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6
Type: Human
United States Columbus, United States left http://www.stewwebb.com/2013/08/15/who-is-americas-moriarity-the-illuminati-zionist-denver-connectio… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522242167.6
3/28/2018 8:02:49 AM (4 hours 56 mins ago)
IP: 184.57.7.210 Hostname: cpe-184-57-7-210.columbus.res.rr.com
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Pocatello, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522216200.55
3/28/2018 12:50:04 AM (12 hours 14 mins ago)
IP: 216.201.69.155 Hostname: 216.201.69.155
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
NetRange: 216.201.64.0 – 216.201.79.255
[4096 addresses in this network]
CIDR: 216.201.64.0/20 (216.201.64.0 – 216.201.95.255)
[8192 addresses in this network]
NetName: 216-201-64-0-20
NetHandle: NET-216-201-64-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: SpeedConnect, LLC (SL-119)
RegDate: 2008-02-08
Updated: 2017-12-11
Ref: https://whois.arin.net/rest/net/NET-216-201-64-0-1

OrgName: SpeedConnect, LLC
OrgId: SL-119
Address: 455 Main St
City: Frankenmuth
StateProv: MI
PostalCode: 48734
Country: US
RegDate: 2012-05-11
Updated: 2017-12-11
Ref: https://whois.arin.net/rest/org/SL-119

OrgNOCHandle: COLLI316-ARIN
OrgNOCName: Collison, Tyler
OrgNOCPhone: +1-989-798-3660
OrgNOCEmail: tyler.collison@speedconnect.net
OrgNOCRef: https://whois.arin.net/rest/poc/COLLI316-ARIN

OrgTechHandle: COLLI316-ARIN
OrgTechName: Collison, Tyler
OrgTechPhone: +1-989-798-3660
OrgTechEmail: tyler.collison@speedconnect.net
OrgTechRef: https://whois.arin.net/rest/poc/COLLI316-ARIN

OrgNOCHandle: VALEN4-ARIN
OrgNOCName: Valentine, Randy
OrgNOCPhone: +1-989-480-0155
OrgNOCEmail: randy.valentine@speedconnect.net
OrgNOCRef: https://whois.arin.net/rest/poc/VALEN4-ARIN

OrgAbuseHandle: VALEN4-ARIN
OrgAbuseName: Valentine, Randy
OrgAbusePhone: +1-989-480-0155
OrgAbuseEmail: randy.valentine@speedconnect.net
OrgAbuseRef: https://whois.arin.net/rest/poc/VALEN4-ARIN

OrgTechHandle: VALEN4-ARIN
OrgTechName: Valentine, Randy
OrgTechPhone: +1-989-480-0155
OrgTechEmail: randy.valentine@speedconnect.net
OrgTechRef: https://whois.arin.net/rest/poc/VALEN4-ARIN

OrgAbuseHandle: COLLI316-ARIN
OrgAbuseName: Collison, Tyler
OrgAbusePhone: +1-989-798-3660
OrgAbuseEmail: tyler.collison@speedconnect.net
OrgAbuseRef: https://whois.arin.net/rest/poc/COLLI316-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Streetman, United States left http://www.stewwebb.com/2018/03/27/sercos-resilient-clinton-secret/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522209777.27
3/27/2018 11:02:59 PM (14 hours 3 mins ago)
IP: 209.40.146.111 Hostname: 209.40.146.111
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 209.40.128.0 – 209.40.191.255
[16384 addresses in this network]
CIDR: 209.40.128.0/18 (209.40.128.0 – 209.40.255.255)
[32768 addresses in this network]
NetName: NETWORK-OPERATIONS
NetHandle: NET-209-40-128-0-1
Parent: NET209 (NET-209-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS6620
Organization: AMA Communications, LLC (AMACO-1)
RegDate: 1999-04-06
Updated: 2012-03-02
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-209-40-128-0-1

OrgName: AMA Communications, LLC
OrgId: AMACO-1
Address: 7201 I-40 W
Address: Suite 200
City: Amarillo
StateProv: TX
PostalCode: 79110
Country: US
RegDate: 2008-09-11
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/AMACO-1

OrgTechHandle: NETWO2705-ARIN
OrgTechName: Network Operations
OrgTechPhone: +1-806-322-2222
OrgTechEmail: NetworkOperations@amatechtel.com
OrgTechRef: https://whois.arin.net/rest/poc/NETWO2705-ARIN

OrgAbuseHandle: NETWO2705-ARIN
OrgAbuseName: Network Operations
OrgAbusePhone: +1-806-322-2222
OrgAbuseEmail: NetworkOperations@amatechtel.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NETWO2705-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States Norwalk, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522206811.46
3/27/2018 10:13:33 PM (14 hours 55 mins ago)
IP: 75.141.100.90 Hostname: 75-141-100-90.dhcp.mtpk.ca.charter.com
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
charter.net

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Blackwood, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522194779.89
3/27/2018 6:53:03 PM (18 hours 21 mins ago)
IP: 72.73.245.188 Hostname: pool-72-73-245-188.cmdnnj.east.verizon.net
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States Columbus, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php
3/28/2018 12:19:15 PM (59 minutes ago)
IP: 18.217.77.67 Hostname: ec2-18-217-77-67.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Type: Blocked
United States Columbus, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php
3/28/2018 12:19:15 PM (59 minutes ago)
IP: 18.217.77.67 Hostname: ec2-18-217-77-67.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Type: Blocked
United States Columbus, United States was blocked by firewall at http://www.stewwebb.com/wp-json/wp/v2/users/
3/28/2018 12:19:14 PM (59 minutes ago)
IP: 18.217.77.67 Hostname: ec2-18-217-77-67.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
Type: Blocked
United States Columbus, United States was blocked by firewall at http://www.stewwebb.com/?author=1
3/28/2018 12:19:14 PM (59 minutes ago)
IP: 18.217.77.67 Hostname: ec2-18-217-77-67.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
NetRange: 18.215.0.0 – 18.217.255.255
[196608 addresses in this network]
CIDR: 18.216.0.0/15, 18.215.0.0/16 (18.216.0.0 – 18.219.255.255)
[262144 addresses in this network]
NetName: AT-88-Z
NetHandle: NET-18-215-0-0-1
Parent: NET18 (NET-18-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS16509
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2017-04-18
Updated: 2017-12-27
Ref: https://whois.arin.net/rest/net/NET-18-215-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Obama Opponents Murdered

Obama Opponents Murdered

OBAMA  OPPONENTS  MURDERED

UPDATE: EDITOR, CHRISTOPHER STORY WHO REPORTED ON THIS IS ALSO, ALREADY DECEASED, BELIEVED MURDERED

JOHN MARTIN HEMENWAY

UPDATE BELOW: MAY 12, 2010

Is reported to be the son of lawyer, John Hemenway, who filed the Quo Warranto action against Obama.  While this editor cannot confirm John Martin Hemenway was murdered, it has been reported that he was shot to death, but still no more confirmation has become available on the exact nature of the cause of death.
It was reported several days ago on Christopher Story’s WorldReports.org site that a ‘birther’ attorney’s son was shot to death near Bedford, Virginia on or about 4/30/2010,(1) and it was not immediately confirmed elsewhere, so this service, INFORMAMERICA.NET, had not posted this yet, but at least Ron Paul’s site is now showing the link,(2) also, and an ABC affiliate, ABC 13 http://www.wset.com/, Lynchburg, Va. is showing the obituary for John Martin Hemenway, 47, and listing the memorial service as:
“John Martin Hemenway, Died 4/30/2010
John Martin Hemenway, 47, of Bedford, died Friday, April 30, 2010.  A celebration of John’s life will be held at 4:30 p.m. Tuesday, May 4, 2010, at Otterville United Methodist Church.  In lieu of flowers, memorials may be made to the John M. Hemenway Camp CHILD Scholarship for special needs children c/o Bedford Primary School, 807 College St., Bedford, VA 24523.  Arrangements by Burch-Messier Funeral Home, 317 W. Main St., Bedford, (540) 586-7360.”

NOTE: Editor’s comments have been moved  to another analysis page out of consideration of family.
NOTE: John Martin Hemenway’s sister, Mary Joyce Hemenway Williams, died July 21st, 2008 at only 47 years of age as Obama rose to power.  She was an analyst in the office of Secretary of The Department of Homeland Security.  Buried at Arlington.

UPDATE:  MAY 12, 2010

BODY OF JOHN MARTIN HEMENWAY REPORTEDLY CREMATED SUDDENLY

Latest information from Christopher Story is:(3) the body of Mr. John Martin Hemenway was cremated the day after he was shot.
“After we had been informed that an autopsy was taking place, the body of John Hemenway Jr. was cremated the day after he was shot.”  The very person who brought us this important news is also already dead, himself, of what may have been poisoning.

UPDATE – 8-16-2010:  EDITOR CHRISTOPHER STORY IS ALSO DEAD NOW, BELIEVED TO HAVE BEEN MURDERED

Mr. Story also comments on the strange blanket of silence on this shooting death, and just as Informamericanet has noticed, Mr. Story, also, had not found anything in the mainstream media on it as his report went to press.

NOTE: Editor’s comparitive analysis to other events has been moved to another page out of consideration of family.

THIS ARTICLE HAS BEEN EXPANDED

References:

1.  http://www.worldreports.org/news/288_endemic_corruption_in_brussels_and_halliburton
2.  ‘Youngest Son Of Lawyer John Hemenway, Who Brought a Quo Warranto Action Against Obama, Shot Dead’
http://www.dailypaul.com/node/133579
3.  WorldReports.org report  ‘BIDEN, GEITHNER, EMANUEL TAKING BUSH SR’S BRIBES’  at:
http://www.worldreports.org/news/289_biden_geithner_emanuel_taking_bush_srs_bribes

  1. QUARLES HARRIS JR.

    ‘Key witness in passport fraud case fatally shot’  is at:
    http://www.washingtontimes.com/news/2008/apr/19/key-witness-in-passport-fraud-case-fatally-shot/

    This case involved the shooting to death of a key witness in a federal investigation into a passport fraud case.

    “The Washington Times reported April 5 that contractors for the State Department had improperly accessed passport information for presidential candidates Sens. Hillary Rodham Clinton, Barack Obama and John McCain, which resulted in a series of firings that reached into the agency’s top ranks.”

    You notice the names in this case?  Yeah, the same old suspects, Hillary Clinton, Obama, Juan McCain, etc., ad nauseum.  Let’s see, now…..information on passports and/or passport applications, etc., etc., could lead a paper trail to one’s identity and identity documents, right?  Gee, I wonder who has something to hide, something he’s passing laws-executive orders to have records sealed over.

    SEE: OBAMA labeled an acting President, an illegal immigrant, who carried a Foreign Student Visa and acquired his own American passport by a false declaration.

SENATOR NANCY SCHAEFER   ANOTHER OBAMA OPPONENT MURDERED

JUNE 9, 2010

Senator Nancy Schaefer, the President of Eagle Forum of Georgia, referred to the new healthcare plan as

“Obama’s trillion-dollar healthcare takeover”, and was directly opposed to the Great Mack-Daddy Usurper’s Marxist plans.  She is, therefore, another of Obama’s Opponents Murdered.

How would such an unjust piece of legislation have passed had Obama’s opponents like Senator Nancy Schaefer, a former lawmaker with such a solid track record of credentials, stood in the way?  Her post at: 7-24-2009 And Now… Nationalized Health Care Reform!, at The Eagle Forum, Nancy provided the sensible reasons the healthcare bill is a travesty.

Also, at 11-07-2009 – THE TIME IS NOW: PELOSI’S HEALTH CARE BILL UP FOR VOTE , one can see she felt so strongly that America is at a crisis stage she ended the post with the profound comment, “May God have mercy on America at this critical time in history”.

Consider just some of former Senator Nancy Schaefer’s integrity and history listed at:
http://www.informamerica.net/assassination_murder/Senator_Schaefer_and_Husband_Murdered.html

“What is the urgency which may have been behind the immediate ‘red listing’ of some recent victims such as Senator Nancy Schaefer?  It may be the risk of possible exposure of an entire criminal government operating as a de facto corporation instead of a de jure republic under the law, The Constitution.  Remember how Senator Schaefer was not only anti-abortion, but was a Constitutionalist.  It figures that she was for getting The U.S. back to Common Law under The Constitution at a time while our nation is under a desperate corporate-Marxist dictatorship regime which is suffering risk of exposure of election crimes and other criminal allegations.”

Consider the points listed:

3.  In the event she did intend to run for public office since learning of the CPS pedophile activity, the guilty parties knew they risked certain exposure, indictments, prosecutions, and penalties.

4.  Her violent murder after exposing pedophile information comes on the heels of the attempted child kidnapping event(s) in Haiti.

9.  Senator Nancy was for The Constitution and anti abortion, The Ten Commandments, “The daughter of a North Georgia Superior Court Judge and granddaughter of a state legislator, Nancy Schaefer became visible to the public in 1985, when she organized a constitutional liberties rally in Atlanta. In 1986, she founded Schaefer Family Concerns, Inc., a nonprofit foundation dedicated to issues such as display of the Ten Commandments in public buildings and opposition to abortion.”

The Ten Commandments, anti-abortion, The Constitution are like crucifixes to real Marxist vampires.

One can reliably say that Senator Nancy was not only directly opposed to Obama’s healthcare package, but opposed to the very principles and platform of Marxism which Obama stands upon.  She must be favorably remembered as a true opponent of the Great Usurper, Ohbummer, who unlawfully perches atop America like a filthy slug.

CHRISTOPHER STORY FRSA – 2010  – BELIEVED TO HAVE BEEN MURDERED

AUGUST 16, 2010

It is with sad and great displeasure and disappointment to report the recent death of the very loyal, dedicated, and courageous editor and author of WorldReports.org who brought us the news of the death of John Hemenway.  It seems surreal to have to put Mr. Story on this list of Obama Opponents Murdered, but he had received so many death threats, reportedly from The United States, that he had taken the extreme measure of disconnecting his landline telephones, and had issued a report that Cheney, CIA, MI6, etc., had attempted to assassinate him, and it must be true that he may have been murdered.

According to some accounts he is said to have possibly been poisoned while in the U.S.; this, after having counted Obama, aka Barry Soetoro, among the D.C. CONS in some of his latter reports.  Mr. Story finally came to the belief and opinion that Obama/Soetoro had become another employee of George H. W. Bush of the Nazi DVD, especially after Obama’s meeting with Bush Sr. in College Station, Bryan, Texas.

We have accordingly left a full page memorial of his last report which had been taken down before news of his death.

Mr. Story was of a very few reporters who had the fortitude to publish the truth on the high ‘CONS’, as we call the D.C. bums, and many persons are of the belief that it led to his assassination.

At any rate, Mr. Story is another of ‘OBAMA OPPONENTS MURDERED’, in the probable event he was assassinated.  We shall miss his very revealing and objective reports.

June 22, 2011

BEVERLY ECKERT, 911 WHISTLEBLOWER  BELIEVED TO HAVE BEEN MURDERED

Since Barack Obama, the Kenyan Criminal in the White-Red House, has apparently sided with Godfather Poppy George H. W. Bush & THE CABAL the assassination of 911 Whistleblower, Beverly Eckert, must now be categorized as another of Obama’s Opponents Murdered.

Obama has no choice but to suffer and accept the similar condemnation heaped against THE CABAL as long as evidence surfaces that he shows comfort and aid to THE BUSH-CLINTON OCTOPUS CABAL and its members.  “If you are joined unto a harlot you are no better than the harlot”, and, Obama certainly has suffered criticism on his Bush affiliations since his meeting in College Station, Texas with George H. W. Bush, the Nazi N.W.O. – D.V.D. leader.  (article continues below)

THE CABAL’S fingerprints are all over The 911 WTC-Pentagon Attacks, so there now appears motive and expediency for eliminating the life and testimony of 911 whistleblower, Beverly Eckert, an individual who, unfortunately, became at odds with the Kenyan Criminal Obama in the White-Red House.  The 911 Attacks tragedy coverup, which is still ongoing to this day, benefits THE CABAL which Obama evidently serves.

Therefore, we must now regard the late Beverly Eckert as another of Obama’s Opponents murdered.

OBAMA IS AKA SOETORO, EXECUTOR, OHBUMMER, DESTROYER, FINAL SOLUTION.

Please note that we cannot possibly list all the possible Obama &/or CABAL opponents murdered, since we have not the staff and logistics to investigate, analyze, file, and publish it all.

Please see the entire Tom Heneghan story at the link:

STORY DEVELOPING: We are now working on a story, which deals with the sabotage of Continental Express Flight 3407 from Newark, New Jersey to Buffalo, New York.

photo of crashed flight 3407

50 murdered on Continental Express Flight 3407  AP

Continental Express Flight 3407 was brought down by electromagnetic pulse.

In this Friday, May 24, 2002 file photo, Beverly Eckert, 50, of Stamford, Conn., holds a picture of her late husband Sean Rooney, 50, in Stamford, Ct. Eckert, one of the victims of Continental Flight 3407, was a Sept. 11 widow who lost her her husband Sean Rooney, her high school sweetheart, in the World Trade Center.   AP Photo/Douglas Healey

The target of this sabotage, which is now an assassination, was the late 9/11 Whistleblower Beverly Eckert.

photo of towers explosion, etc

9/11 Whistleblower ASSASSINATED on Continental Express Flight 3407

Beverly Eckert, who lost her husband in the 9/11 attack, as a member of the Family Steering Committee for the 9/11 Commission Eckert was to arrive in Buffalo, New York and then fly to Chicago, Illinois with major NEW 9/11 evidence, which was financial in nature, showing PRE 9/11 knowledge of the attacks and the involvement of the “black ops” unit of the U.S. Pentagon, along with the Israeli Mossad and the East German Stasi DVD.

Eckert was on the way to Chicago to meet with Special Counsel Patrick Fitzgerald with evidence showing that her phone was illegally wiretapped for five (5) years by the illegal Bushfraud NSA spy operation, “Stellar Wind”.

Eckert was also in possession of DNA samples and recent photographs showing the alleged 9/11 hijackers were still alive!

We can also reveal that Eckert had been in direct communication with then presidential candidate Barack Obama and Caroline Kennedy, daughter of assassinated President Kennedy, for the past two (2) years concerning this evidence.

The EMF electronic attack on Continental Express Flight 3407 was triggered from a site in Canada near the U.S. border at the time the aircraft turned on their de-icing machine and lowered their landing gear.

The plane was also on auto pilot at the time just as John F. Kennedy Jr.’s aircraft was when his private aircraft was brought down enroute to Hyannis Port, Massachusetts in 1999.

Final note: The corporate U.S. media filth continues to encourage this out-of-control crime spree against the American People.”

More at Tom Heneghan’s link:  http://www.myspace.com/tom_heneghan_intel/blog/470969568

InformAmerica.net:  As long as Obama blocks the refunding of the dollar programs, colludes with Bush Cabal, etc., he will suffer condemnation.

October 21, 2011
Muammar Gaddafi Killed – Former Libyan Leader Slaughtered

Gaddafi, also sometimes spelled Kadhafi, the former leader of Egypt may have been involved in developing new currencies which do not depend on the Federal Reserve System money, so it is reported at some sites that he was a threat to the U.S. fraudulent currency carousel of Obama’s and Geithner’s.

Much more analysis on this could be done, but this editor is not going to belabor this murder case.  Gaddafi had developed several things which helped his area, such as the hydroelectric power plant development(s), and was reportedly in the process of establishing a solvent currency which could free his people.  Another Federal Reserve opponent, Obama opponent is dead.

Major news networks are reporting Gaddafi was killed October 20, 2011.

And also of interest:  ‘Obama Associate Implicated in Murder Plot’ at:

Obama Associate Implicated in Murder Plot

 

Citizens must be starting to wonder if the U.S. is entering another type of ‘Clinton Body Count’ era where those who are considered liabilities to the Marxists are ‘eliminated’, as in the term of Christopher Story, ‘horizontalized’.

 

See: “Obama’s special ops murder teams”    Also SEE:  http://http://www.stewwebb.com for Obama Targets Patriots


RELATED ARTICLES

Ashley Turton & The Energy Deaths

GANGSTA OBAMA
DON’T MISS – YOUR SMART METER DRONE ATTACK FROM HELL
Your Smart Meter as a homing beacon transponder to attack you with.
REPORTED BOMBING ATTACKS ON U.S. CITIZENS & WHISTLEBLOWERS
THE ATTACK ON AMERICA ROLLS ON
THE MOSSAD IN THE CIA – MOSSAD MEANS MURDER
ASSASSINATION MURDER DIRECTORY
OBAMA/SOETORO DIRECTORY

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




CRIMES AGAINST HUMANITY PSYCHOPATH JOHN BOLTON

CRIMES AGAINST HUMANITY PSYCHOPATH JOHN BOLTON
CONSPIRATOR IN THE TREASONOUS THEFT
OF THE YEAR 2000 PRESIDENTIAL ELECTION

“WAR IS THE ANSWER”   ….DEMANDS WWIII FOR ISRAEL….

HONORED AND REWARDED BY TRUMP! ! !

John Nichols: Bolton worked to stop Florida recount

By John Nichols
April 18, 2005

“I’m with the Bush-Cheney team, and I’m here to stop the count.”

Those were the words John Bolton yelled as he burst into a Tallahassee library on Saturday, Dec. 9, 2000, where local election workers were recounting ballots cast in Florida ‘s disputed presidential race between George W. Bush and Al Gore.

Bolton was one of the pack of lawyers for the Republican presidential ticket who repeatedly sought to shut down recounts of the ballots from Florida counties before those counts revealed that Gore had actually won the state’s electoral votes and the presidency.

The Dec. 9 intervention was Bolton ‘s last and most significant blow against the democratic process.

The Florida Supreme Court had ordered a broad recount of ballots in order to finally resolve the question of who won the state. But Bolton and the Bush-Cheney team got their Republican allies on the U.S. Supreme Court to block the review. Fearing that each minute of additional counting would reveal the reality of voter sentiments in Florida , Bolton personally rushed into the library to stop the count.

Bolton was in South Korea when it became clear that the Nov. 7, 2000, election would be decided in Florida . At the behest of former Secretary of State James Baker, who fronted the Bush-Cheney team during the Florida fight, Bolton winged his way to Palm Beach , where he took the lead in challenging ballots during that county’s recount. Then, when the ballots from around the state were transported to Tallahassee for the recount ordered by the state Supreme Court, Bolton followed them.

It was there that he personally shut down the review of ballots from Miami-Dade County, a populous and particularly contested county where independent reviews would later reveal that hundreds of ballots that could reasonably have been counted for Gore were instead discarded.

Miami-Dade County Elections Supervisor David Leahy argued at the time that 2,257 voters had apparently attempted to mark ballot cards for Gore or Bush but had not had them recorded because they had been improperly inserted into the voting machines. A hand count of those ballots revealed that 302 more of

them would have gone for Gore than Bush. That shift in the numbers from just one of Florida ‘s 67

counties would have erased more than half of Bush’s 537-vote lead in the state.

But attempts to conduct a hand count were repeatedly blocked by the Bush-Cheney team, culminating with Bolton ‘s Dec. 9 announcement, “I’m here to stop the count.” A few days later, the U.S. Supreme Court would stop the count permanently, with a pro-Bush ruling in which five Republican-appointed justices, in the words of noted attorney Vincent Bugliosi, “committed the unpardonable sin of being a knowing surrogate for the Republican Party instead of being an impartial arbiter of the law.”

Bolton was a key player in the fight to delay the Florida count long enough to allow for the Supreme Court’s intervention, and he got his reward quickly. Despite his record of making controversial and sometimes bizarre statements regarding international affairs, he was selected by the Bush administration in 2001 to serve as undersecretary of state for arms control. And he is now in line to become the U.S. ambassador to the United Nations.

Before he is given that position, and charged with the job of promoting the spread of democracy around the world, however, senators would do well to consider the disregard John Bolton showed for democracy in Florida .

http://www.madison.com/tct/opinion/column/nichols//index.php?ntid=36007&ntpid=2

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Ambassador Leo Wanta Murder Plot on Tape

Ambassador Leo Wanta Murder Plot on Tape

via SatCom 7777

Whereas, The President of the United States of America, having signed H.R. 3723 on October 11, 1996, has protected this transaction by allowing Corporations the right to declare their Contracts, Clients, Internal Procedures and Information, and the transactions they engage in as a Corporate or Trade Secret fully protected under the Economic and Industrial Espionage Laws of the United States of America and the International Economic Community.

Inasmuch, the names, identities, bank coordinates and other identifying information of persons or entities that are party to this transaction, contained herein, or learned hereafter, shall be a Corporate Trade Secret that shall not be disseminated or other than as provided for herein, or as allowed under applicable law. Any unauthorized Disclosure of this Private Transaction, parties to, or other material fact of, shall subject the violators to Criminal Prosecution.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

SigInt Authority : Falconbird / Cumberland via Promis Software, Inslaw Inc. ( Washington, DC )

 

S-31-IANO / SA32NV / U.S. CUSTOMS SERVICE               INTERNAL AFFAIRS / NEW ORLEANS

 

SIMPLE QUESTION:  WILL OUR “FELLOW AMERICANS” SERVE AND PROTECT OUR UNITED STATES CONSTITUTIONAL REPUBLIC?

 

UNITED STATES SENATOR and FORMER STATE GOVERNOR, et al

PLOT THE MURDER OF AMBASSADOR LEO EMIL WANTA,

S.D.R. DIPLOMATIC PASSPORTS No. 04362, 12535

http://beforeitsnews.com/alternative/2018/03/senator-gov-plot-murder-on-tape-3601797.html

 

Senator, Gov Plot Murder On Tape! | Alternative

beforeitsnews.com

Join my Newsletter and get paid for sharing truth! You’ll get my free ebook with treatments for ALL diseases called Suppressed Health Secrets! Watch the Miracle …

 

USDollars 475 TRILLION – LESS THE  35% REPATRIATION CIVIL INCOME TAX PAYMENT [ U.S. DISTRICT COURT FOR THE EASTERN DISTRICT OF VIRGINIA – CASE No. 02-1363-A and Civil Action No. 1:07 cv 609 T3E/BRP ] WAS TO BE PAID TO AMBASSADOR LEE EMIL WANTA.

                                  ” PuppetMasters in Control ! ” 

 

” IN GOD WE TRUST ”

 

https://www.youtube.com/watch?v=mfcnyn-XHP0

Publisher – International Currency Review / London

https://mainerepublicemailalert.com/2016/05/30/high-speed-rail-american-jobs/

 

https://ameritrustusa.wordpress.com/2017/09/22/benjamin-fulford-9-19-17-urgent-questions-from-a-political-prisoner-re-leo-wanta-the-dc-clone-situation-preston-james-2/

 

https://www.youtube.com/watch?v=mH5feuHO000#action=share

[ THE STORY OF LEO WANTA AND THE MISSING $27 TRILLION THAT WOULD CHANGE THE WORLD ]

 

http://www.tomheneghanbriefings.com/Wanta-Reagan-Mitterrand-Protocols-Release-Are-Imminent_10-31-2017.html

 

http://eagleonetowanta.com/wp-content/uploads/2017/01/U.S.-President-R-W-Reagan_Totten-Doctrine_92-U.S.-105.pdf

 

https://nook.barnesandnoble.com/products/2940150998438/sample

 

https://www.youtube.com/watch?v=F_3jgv6fRzM

 

http://eagleonetowanta.com

 

https://vimeo.com/158213524

 

https://vimeo.com/user16311094/review/160965789/b57fb62f43

via SatCom 7777

Sent : Saturday, March 24, 2018 10:44 PM

Subject : Clinton Foundation – Open Records – Tax Return – 6% went to a Charity. Hillary  Clinton ( a.k.a.  Queen Melasina )  personally  kept a mere 94%.

Clinton Foundation Open Records Tax Return. 6% went to charity. Hillary kept 94%.

 

 

 




Serco’s Resilient Clinton Secret

StewWebb.com

Serco’s Resilient Clinton Secret

#2570: Serco’s Resilient Clinton Secret – Trump’s 8(a) Conair Shuttle – The Marcy Murrah Bomb

by 

United States Marine Field McConnell

Plum City Online – (AbelDanger.net)

January 20, 2016

  1. Abel Danger (AD) asserts that in 1994 Serco – a former RCA GB 1929 radio patent monopoly – set up a resilient backdoor into the Defense Red Switch Network to help Hillary Clinton and her female aides secretly override – stand down – the appropriate response of the National Command Authority to terrorist attacks both domestic and foreign.

    2. AD asserts that Trump Shuttle Inc. bankers led by Citibank hired Serco 8(a) agents to backdoor elite hotels and Boeing and Conair (‘JPATS’) planes to extort government employees in a global protection racket which is now run by hedge fund managers in the Clinton Foundation.

    3. AD asserts that Kristine Marcy, founder of Conair, secretly conspired with Hillary Clinton over the Red Switch Network to bomb the Alfred P. Murrah Federal Building, in Oklahoma City on April 19, 1995 and kill or intimidate employees of the Social Security Administration, the United States Secret Service, the Drug Enforcement Administration (D.E.A.), the Bureau of Alcohol, Tobacco, and Firearms (ATF) and the recruiting offices for both the Army and the Marine Corps.


    United States Marine Field McConnell (http://www.abeldanger.net/2010/01/field-mcconnell-bio.html) offers to show government employees how to win a Resilience war with Hillary Clinton and his sister Kristine Marcy, the founder of the Senior Executive Service in 1979, the founder of the Justice Prisoner and Alien Transportation System and the founder of the accelerated loan guarantee program for Serco’s 8(a) protégée companies on 9/11

 

@@@@@@@@@@@@@@@@@@@@@@@@@

 

“Now It Begins” – David Stockman Warns That America’s ‘State Wreck’ Is Gathering Steam

“…means the impending fiscal carnage is now beyond recall, and that the mother of all ‘yield shocks’ in the bond pits will soon shake Wall Street to the rafters.”

 

A Retrospective and Signature In Charts of the Crash of 1987

“Life is a school of probabilities.” Walter Bagehot And, now and again, gravity. After a long ramp higher, marked by a narrowing rally driven by the concept of portfolio insurance and program trading, the market began to correct … Read more

 

Trump Unable To Hire diGenova, Toensing Over Conflicts, Mueller Strategy In Limbo

“The president is disappointed that conflicts prevent Joe diGenova and Victoria Toensing from joining the president’s special counsel legal team”

 

A Great Example of Real ‘Fake News.’

A declassified document from the CIA archives in the form of a letter from a CIA task force addressed to the Director of the Central Intelligence Agency details the close relationship that exists between the CIA and mainstream media and academia. The document states that the CIA task force “now has relationships with reporters from every major wire service, newspaper, news weekly, and television network in the nation,” and that “this has helped us turn some ‘intelligence failure’ stories into ‘intelligence success” stories,’ and has contributed to the accuracy of countless others.” Furthermore, it explains how the agency has “persuaded reporters to postpone, change, hold, or even scrap stories that could have adversely affected national security interests or jeopardized sources and methods.”

 

 

“Dumb F–ks”: Julian Assange Reminds Us What Mark Zuckerberg Thinks Of Facebook Users

 

Zuck:Yeah so if you ever need info about anyone at Harvard…Just ask…I have over 4,000 emails, pictures, addresses, SNS”

[Redacted Friend’s Name]: “What? How’d you manage that one?” 

Zuck: “People just submitted it.”

 

 

Morgan Stanley: “We Can Already See The Writing On The Wall”

“We can already see the writing on the wall and are highly confident this becomes obvious to the masses by the end of 3Q, or 4Q at the latest. This suggests more tough times for equity investors, but we doubt it will be that easy as market tops tend to be particularly exhausting.”

  • 20156
  • Mar 25, 2018 4:30 PM
  • 11

“Tonight Is The Beginning”: Seven Things To Watch For In Stormy Daniels’ Interview

In advance of today’s highly anticipated 60 Minutes interview with Stormy Daniels, Avenatti built up the suspense, tweeting that, among other things, “tonight is not the end – it’s the beginning”…

 

March for Our Lives activists marched against our constitutional rights in planned psyop

“They are out there marching to have the government take away their rights”

 

Zuck Apology Tour Escalates: Full Page Ads In World Papers To Say “Sorry, Won’t Happen Again”

As George Bush once famously said, “fool me once, shame on – shame on you. Fool me – you can’t get fooled again,” and as billions of the world’s zombies realize they’ve been spied on – and had their information trafficked (what exactly did they think made Facebook’s market cap over half a trillion dollars anyway?)…

 

How the Military Controls America

Unlike corporations that sell to consumers, Lockheed Martin and the other top contractors to the U.S. Government are highly if not totally dependent upon sales to governments, for their profits, especially sales to their own government, which they control — they control their home market, which is the U.S. Government, and they use it to sell to its allied governments, all of which foreign governments constitute the export markets for their products and services. These corporations control the U.S. Government, and they control NATO. And, here is how they do it, which is essential to understand, in order to be able to make reliable sense of America’s foreign policies, such as which nations are ‘allies’ of the U.S. Government (such as Saudi Arabia and Israel), and which nations are its ‘enemies’ (such as Libya and Syria) — and are thus presumably suitable for America to invade, or else to overthrow by means of a coup. First, the nation’s head-of-state becomes demonized; then, the invasion or coup happens. And, that’s it. And here’s how.

 

Services that deliver the same functions as Facebook, for after you #DeleteFacebook

This week’s On the Media presents an excellent series on Facebook and the media coverage, and I was especially interested in Clay Shirky’s point that Facebook isn’t successful because it’s so good at hosting group message-boards; rather, its magic lies in finding people to form groups with. If you have a rare disease, Facebook can help you find people in the same situation to trade tips and support with.

 

London police finally admit they fed intel to UK construction cartel to build illegal blacklist of labour organisers

It’s been six years since investigative journalists published their exposeaccusing London’s Metropolitan Police of colluding with the UK’s construction cartel to blacklist workers who complained about unsafe working conditions, abusive bosses and wage-theft, as well as union organisers and other “troublemakers” — this week, the Met confirmed that its officers were an active part of the illegal blacklist.

 

Syria – The East-Ghouta-Afrin Exchange Is Complete – Where Will The SAA Go Next?

After the Syrian army had taken all rural parts of east-Ghouta three pockets of densely upbuild areas were left in terrorist hands. Negotiations had started about transfer of the armed men to Idleb governorate in the north. Some 100,000 people moved from the besieged areas to the Syrian government side. Surrounded by widely superior forces, devoid of human shields and without any chance of relief the terrorist groups are now giving up one by one.

 

Facebook has been collecting call history and SMS data from Android devices

Facebook has been collecting call records and SMS data from Android devices for years. Several Twitter users have reported finding months or years of call history data in their downloadable Facebook data file. A number of Facebook users have been spooked by the recent Cambridge Analytica privacy scandal, prompting them to download all the data that Facebook stores on their account. The results have been alarming for some.

 

China Launches Massive Military Drills “In Preparation For War”

Just days after the latest close military encounter between the US and China, when the US navy sailed a destroyer to within 12 nautical miles of the contested Spratly Islands in the South China Sea – a move that China condemned as a “severe provocation” just as the two countries launched an all-out trade war – the Chinese military began its spring combat readiness drills with an air force exercise in the West Pacific and a joint combat patrol mission in the South China Sea.

 

Israeli officials rejoice as Saudi Arabia opens airspace to Tel Aviv for first time ever

There will now be three flights weekly in each direction, ending a decades-long Saudi ban on the use of its airspace for commercial flights to Israel.

 

Bank of America Merrill Lynch agrees to pay N.Y. $42 million fine for fraud

Bank of America Merrill Lynch has agreed to pay a record $42 million fine to the state of New York for fraudulent activity related to its electronic trading services.

 

Trump Calls for Tougher Anti-Terror Measures After Attacks in France

UK Accused of Secretly Delivering Arms to Middle East – Reports

 

Wireless Technology: Understanding Its Effects

By Catherine J. Frompovich Wireless technology literally has overtaken our world!

There are more cell phones than there are humans on Planet Earth!  Humans are…

 

After Increasing Nat’l Debt a TRILLION in 6 Months, US Gov’t Just Gave Themselves a Massive Raise

By Matt Agorist This week, the US Congress passed the massive 1.3 trillion-dollar Omnibus spending bill.

Then, early Friday morning, the Senate did the same

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

 

Modern American women succeed under Republican economic policies

The Hill

“Evidence that policies focused on growth and economic mobility greatly improve the lives of women is everywhere,” fiscal policy expert Mattie Duppler writes in The Hill. Duppler highlights how the Tax Cuts and Jobs Act signed by President Donald J. Trump has improved the landscape for women, whether they are “workers, or bosses, or stay-at-home moms.”

————————-

Federal prosecutors told to seek death penalty in drug cases

Reuters

“U.S. Attorney General Jeff Sessions instructed federal prosecutors on Wednesday to seek the death penalty in drug-related cases whenever it is ‘appropriate,’ saying the Justice Department must boost efforts to counter America’s epidemic of opioid abuse,” Reuters reports. The Attorney General’s remarks came after President Trump announced a detailed plan on the opioid crisis earlier this week.

————————-

Daily Signal exclusive: Ivanka Trump on jobs, millennials, and #MeToo

– The Daily Signal

Senior leaders from across the Administration—including President Trump himself—fielded a range of questions Thursday at Generation Next, a White House forum for millennials. Senior Adviser Ivanka Trump sat down with The Daily Signal for a Q&A, explaining why she thinks “this is a moment of incredible opportunity” for women in America.

————————-

AIDS researcher Robert R. Redfield named to lead the C.D.C.

– The New York Times

On Wednesday, the Trump Administration tapped Dr. Robert R. Redfield, cofounder of the Institute for Human Virology, to lead the Centers for Disease Control and Prevention. Dr. Redfield has “decades of science and clinical work – especially in the field of H.I.V./AIDS.” Health and Human Services Secretary Alex Azar called Dr. Redfield “peerless” in his depth of experience.

————————-

Senators announce legislation to charge fentanyl pushers more harshly

The Washington Free Beacon

“Trump called for the use of the death penalty in certain drug-trafficking related cases as part of the announcement on Monday of his administration’s strategy for combatting the opioid epidemic,” Charles Fain Lehman reports. By Thursday, five Republican lawmakers had announced a new bill that would toughen the charges facing dealers who traffic in fentanyl, a deadly synthetic opioid.

————————-

House passes bill that would give patients access to experimental drugs

The New York Times

“The House, spurred on by President Trump, passed a bill on Wednesday that would give patients with terminal illnesses a right to try unproven experimental treatments,” Robert Pear reports. Proponents of the bill say it will “give dying patients a chance to obtain potentially helpful prescription drugs without waiting for the completion of clinical trials.”

————————-

Trump takes part in millennial forum

USA Today

On Thursday, President Trump participated in a Q&A with conservative advocate Charlie Kirk at the White House’s Generation Next forum. Their conversation covered taxes, trade policy, and what advice the President would give to a 25-year-old Donald Trump today.

————————-

5 principles for infrastructure success

The Washington Times

“Investment in infrastructure is coming at just the right time for America,” Gov. Pete Ricketts (R-NE) writes this week. “Over the past year, the Trump administration has listened to states while developing policy proposals.” Gov. Ricketts joined President Trump at the White House when the President unveiled his plan for rebuilding American infrastructure last month.

————————-

Obama EPA Administrators spent eight times more than Pruitt on international travel

The Washington Free Beacon

Travel for President Obama’s EPA Administrators cost taxpayers roughly $1 million, The Washington Free Beacon reports. “The double-standard couldn’t be more clear: Under Barack Obama’s EPA the media chose not to report on expenditures to protect the EPA administrator for international travel or the costs of their trips,” EPA Spokesman Jahan Wilcox said.

 

Sign up for emails at WhiteHouse.gov

 




President Trump Stop NSA NAZI Espionage

President Donald Trump

By Stew Webb Federal Whistle blower 34 years

President Trump Stop NSA NAZI Espionage

Updated April 18 2018

Evidence of Cyber Attacks against Stew Webb Federal Whistle blower April 18 2018

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusion Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12

Petition President Trump Online

Please email or send this link below to President Trump

President Trump Stop NSA NAZI Espionage

Email: President Donald Trump

Email: DonaldJTrump.com/contact

Tweet: realDonaldTrump

Facebook: Donald Trump

https://www.whitehouse.gov/get-involved/write-or-call/

Comments: 202-456-1111
Switchboard: 202-456-1414
The White House
1600 Pennsylvania Avenue NW
Washington, DC 20500

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

President Trump White House email from Stew Webb Whistle blower

March 26 2018 7:20pm cst

I contacted the White House by online message to President Trump with the 4 links below.

https://www.whitehouse.gov/contact/

Evidence

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

 

Evidence

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

Evidence:

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

Letter to Attorney General Jeff Sessions from Whistle blowers

https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

Evidence:

Stew Webb Grand Jury Demands

Please email or tweet this link to President Trump

President Trump Stop NSA NAZI Espionage

 

Created at: Mon, Mar 26, 2018 at 7:40 PM (Delivered after 0 seconds)
From: The White House <noreply @  whitehouse.  gov>
To: “federal whistleblower  @  gmail.   com” <federalwhistleblower @ gmail.  com>
Subject: Thank You For Your Message

Conversation opened. 1 unread message.

Please email or tweet this link to President Trump

President Trump Stop NSA NAZI Espionage

 

 

Stew Webb Whistle blower sues US Government Assassins P1of2

 

@@@@@@@@@@@@@@@@@@@@@@@@@@

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

Federal Charges are being filed by this Whistle blower with 4 years of evidence.

Lets see if the US Justice Department does their job!

Please email or send this link below to President Trump

President Trump Stop NSA NAZI Espionage

 




Ten Cyber Terrorist Implanting Malicious Codes against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence March 26, 2018

Cyber Attacker
United States Plymouth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521958757.81
3/25/2018 1:19:22 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Plymouth, United States visited http://www.stewwebb.com/
3/25/2018 1:19:16 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

verizonbusiness.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Palm Beach Gardens, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521977560.61
3/25/2018 6:32:42 AM (4 hours 18 mins ago)
IP: 73.244.9.70 Hostname: c-73-244-9-70.hsd1.fl.comcast.net
Browser: IE version 11.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko
cable.comcast.com

@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States United States left http://www.stewwebb.com/tag/video/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522006183.19
3/25/2018 2:29:48 PM (2 minutes ago)
IP: 107.77.165.9 Hostname: mobile-107-77-165-9.mobile.att.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; XT1032 Build/KXB21.14-L1.61) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.114 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Fort Lauderdale, United States was blocked by firewall at http://stewwebb.com/wp-organizer.php
3/26/2018 12:59:17 AM (10 hours 42 mins ago)
IP: 204.10.105.9 Hostname: 204.10.105.9
Human/Bot: Bot
Browser: Chrome version 50.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36
NetRange: 204.10.104.0 – 204.10.111.255
[2048 addresses in this network]
CIDR: 204.10.104.0/21 (204.10.104.0 – 204.10.111.255)
[2048 addresses in this network]
NetName: ACCELERATEBIZ-1-21
NetHandle: NET-204-10-104-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AccelerateBiz Inc. (ACCEL-8)
RegDate: 2004-12-15
Updated: 2012-03-20
Ref: https://whois.arin.net/rest/net/NET-204-10-104-0-1

OrgName: AccelerateBiz Inc.
OrgId: ACCEL-8
Address: 800 W Cypress Creek Rd
Address: Suite 528
City: Fort Lauderdale
StateProv: FL
PostalCode: 33309
Country: US
RegDate: 2004-08-27
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/ACCEL-8

OrgAbuseHandle: ABUSE1442-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +1-305-675-6725
OrgAbuseEmail: abuse@acceleratebiz.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE1442-ARIN

OrgTechHandle: TECHN892-ARIN
OrgTechName: Technical Support
OrgTechPhone: +1-305-675-6725
OrgTechEmail: support@acceleratebiz.com
OrgTechRef: https://whois.arin.net/rest/poc/TECHN892-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Scottsdale, United States was blocked for Manual block by administrator at http://www.stewwebb.com/wp-json/wp/v2/users/
3/26/2018 6:34:29 AM (5 hours 15 mins ago)
IP: 132.148.137.76 Hostname: ip-132-148-137-76.ip.secureserver.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
NetRange: 132.148.0.0 – 132.148.255.255
[65536 addresses in this network]
CIDR: 132.148.0.0/16 (132.148.0.0 – 132.149.255.255)
[131072 addresses in this network]
NetName: GO-DADDY-COM-LLC
NetHandle: NET-132-148-0-0-1
Parent: NET132 (NET-132-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GoDaddy.com, LLC (GODAD)
RegDate: 2015-10-21
Updated: 2015-10-26
Ref: https://whois.arin.net/rest/net/NET-132-148-0-0-1
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
Comment: Please send abuse complaints to abuse@godaddy.com
Ref: https://whois.arin.net/rest/org/GODAD
OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-480-624-2505
OrgAbuseEmail: abuse@godaddy.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE51-ARIN

OrgNOCHandle: NOC124-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-480-505-8809
OrgNOCEmail: noc@godaddy.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC124-ARIN

OrgTechHandle: NOC124-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-480-505-8809
OrgTechEmail: noc@godaddy.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC124-ARIN
132.148.137.76
P address 132.148.137.76
Location Scottsdale, Arizona, United States (US) flag
Registry arin
Network information
IP address 132.148.137.76
Reverse DNS (PTR record) ip-132-148-137-76.ip.secureserver.net
DNS server (NS record) cns1.secureserver.net (208.109.255.100)
cns2.secureserver.net (216.69.185.100)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domains around 132.148.137.76
IP address #domains
132.148.137.3 1
132.148.137.4 52
132.148.137.5 7
132.148.137.6 1
132.148.137.8 4
132.148.137.9 8
132.148.137.11 1
132.148.137.12 15
132.148.137.13 2
132.148.137.14 3
132.148.137.15 1
132.148.137.16 1
132.148.137.19 2
132.148.137.22 1
132.148.137.23 7
132.148.137.24 1
132.148.137.25 1
132.148.137.26 1
132.148.137.27 2
132.148.137.28 1
132.148.137.29 1
132.148.137.31 1
132.148.137.32 1
132.148.137.34 1
132.148.137.35 1
132.148.137.36 2
132.148.137.37 1
132.148.137.38 2
132.148.137.39 1
132.148.137.40 24
132.148.137.42 4
132.148.137.43 1
132.148.137.48 4
132.148.137.49 1
132.148.137.50 4
132.148.137.52 1
132.148.137.54 1
132.148.137.56 2
132.148.137.59 2
132.148.137.60 4
132.148.137.61 24
132.148.137.64 2
132.148.137.65 5
132.148.137.66 7
132.148.137.67 1
132.148.137.68 2
132.148.137.69 66
132.148.137.71 1
132.148.137.73 6
132.148.137.76 2
132.148.137.79 2
132.148.137.81 1
132.148.137.85 1
132.148.137.86 1
132.148.137.90 1
132.148.137.91 3
132.148.137.94 1
132.148.137.96 4
132.148.137.98 5
132.148.137.99 1
132.148.137.102 1
132.148.137.103 1
132.148.137.104 1
132.148.137.105 1
132.148.137.106 1
132.148.137.108 1
132.148.137.109 1
132.148.137.112 3
132.148.137.113 1
132.148.137.115 1
132.148.137.117 2
132.148.137.118 3
132.148.137.119 5
132.148.137.121 1
132.148.137.122 1
132.148.137.124 1
132.148.137.129 1
132.148.137.130 1
132.148.137.131 1
132.148.137.132 17
132.148.137.133 1
132.148.137.134 1
132.148.137.135 1
132.148.137.136 2
132.148.137.142 33
132.148.137.144 4
132.148.137.145 3
132.148.137.147 2
132.148.137.148 1
132.148.137.150 4
132.148.137.151 14
132.148.137.153 58
132.148.137.155 3
132.148.137.157 2
132.148.137.159 1
132.148.137.160 2
132.148.137.161 5
132.148.137.167 2
132.148.137.173 1
132.148.137.175 2
Domains on 132.148.137.76
Domain Tools
dfwnewhomes.com
DNS server (NS records) ns68.domaincontrol.com (208.109.255.44)
ns67.domaincontrol.com (216.69.185.44)
Mail server (MX records) smtp.secureserver.net (72.167.238.29)
mailstore1.secureserver.net (72.167.238.32)
IP address (IPv4) 132.148.137.76
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domain Name: DFWNEWHOMES.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Whois Agent
Registrant Organization: Whois Privacy Protection Service, Inc.
Name Server: NS67.DOMAINCONTROL.COM
Name Server: NS68.DOMAINCONTROL.COM
DNSSEC: unsigned

qonnect.in
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker olatha, kansas
Olathe, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522012184.88
3/26/2018 11:13:44 AM (45 minutes ago)
IP: 73.185.228.112 Hostname: c-73-185-228-112.hsd1.ks.comcast.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

NetRange: 73.0.0.0 – 73.255.255.255
[16777216 addresses in this network]
CIDR: 73.0.0.0/8 (73.0.0.0 – 73.255.255.255)
[16777216 addresses in this network]
NetName: CABLE-1
NetHandle: NET-73-0-0-0-1
Parent: NET73 (NET-73-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7922
Organization: Comcast Cable Communications, LLC (CCCS)
RegDate: 2005-04-19
Updated: 2016-08-31
Ref: https://whois.arin.net/rest/net/NET-73-0-0-0-1

OrgName: Comcast Cable Communications, LLC
OrgId: CCCS
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2001-09-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/CCCS

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://whois.arin.net/rest/poc/NAPO-ARIN

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://whois.arin.net/rest/poc/IC161-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Mitchell, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064606.62
3/26/2018 6:43:36 AM (5 hours 34 mins ago)
IP: 172.78.225.94 Hostname: 172.78.225.94
Browser: Safari version 8.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 8_1_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4

Sorry, but no data for that IP or domain was found.

IP address 172.78.225.94
Location Butlerville, Indiana, United States
@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Canyon Country, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064610.01
3/26/2018 6:43:32 AM (5 hours 34 mins ago)
IP: 76.95.152.193 Hostname: cpe-76-95-152-193.socal.res.rr.com
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 76.80.0.0 – 76.95.255.255
[1048576 addresses in this network]
CIDR: 76.80.0.0/12 (76.80.0.0 – 76.95.255.255)
[1048576 addresses in this network]
NetName: RRWE
NetHandle: NET-76-80-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2006-12-22
Updated: 2007-12-18
Ref: https://whois.arin.net/rest/net/NET-76-80-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2000-10-04
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Lake Havasu City, United States left http://www.stewwebb.com/2018/03/23/ses-and-serco-the-big-secret-of-the-deep-state/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522044134.26
3/26/2018 1:02:16 AM (11 hours 25 mins ago)
IP: 47.216.40.139 Hostname: 47-216-40-139.lkhvcmtk02.res.dyn.suddenlink.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 47.208.0.0 – 47.223.255.255
[1048576 addresses in this network]
CIDR: 47.208.0.0/12 (47.208.0.0 – 47.223.255.255)
[1048576 addresses in this network]
NetName: SUDDE
NetHandle: NET-47-208-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Suddenlink Communications (SUDDE)
RegDate: 2015-09-08
Updated: 2015-09-08
Ref: https://whois.arin.net/rest/net/NET-47-208-0-0-1

OrgName: Suddenlink Communications
OrgId: SUDDE
Address: 311 NNW Loop 323
City: Tyler
StateProv: TX
PostalCode: 75701
Country: US
RegDate: 2006-05-25
Updated: 2018-02-14
Ref: https://whois.arin.net/rest/org/SUDDE

ReferralServer: rwhois://rwhois.suddenlink.net:4321

OrgNOCHandle: NOCSU37-ARIN
OrgNOCName: NOC Suddenlink
OrgNOCPhone: +1-866-232-5455
OrgNOCEmail: noc@suddenlink.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU37-ARIN

OrgTechHandle: AUIO-ARIN
OrgTechName: Altice USA Internet Operations
OrgTechPhone: +1-516-803-2300
OrgTechEmail: hostmaster@cv.net
OrgTechRef: https://whois.arin.net/rest/poc/AUIO-ARIN

OrgAbuseHandle: ABUSE6997-ARIN
OrgAbuseName: Abuse Suddenlink
OrgAbusePhone: +1-903-266-4800
OrgAbuseEmail: hostmaster@cv.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE6997-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
San Diego, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522095760.82
3/26/2018 3:22:44 PM (14 minutes ago)
IP: 66.75.249.174
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb, Tom Heneghan and Leo Wanta March 26 2018

Radio Stew Webb, Tom Heneghan and Ambassador Leo Wanta March 26, 2018

 

Wanta-Heneghan-Webb-3-26-18 from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Attacker hits Stew Webb Whistleblower 912 hits in 12 hours

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence March 26, 2018

Top 5 IPs Blocked
IP Country Block Count
107.192.1.66 United States US 914 hits in 12 hours
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/amazon-cyber-attacks-stew-webb-whistleblower-hundreds-of-hits-24-hours…
3/25/2018 5:56:27 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/amazon-cyber-attacks-stew-webb-whistleblower-394-hits-24-hours/
3/25/2018 5:56:27 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/united-kingdom-cyber-attacks-stew-webb-whistleblower-157-hits-last-4-h…
3/25/2018 5:56:27 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/verizon-wireless-cyber-attacks-stew-webb-whistleblower-79-hits-last-4-…
3/25/2018 5:56:27 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/israel-mossad-cyber-attacks-against-stew-webb-whistleblower/
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/amazon-cyber-attacks-stew-webb-whistleblower-hundreds-24-hours/
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/march-3-2018-cyber-attackers-against-stew-webb-whistleblower-exposed/
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/united-kingdom-cyber-attacks-stew-webb-whistleblower-157-hits-last-4-h…
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/amazon-cyber-attacks-stew-webb-whistleblower-hundreds-24-hours/
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/march-3-2018-cyber-attackers-against-stew-webb-whistleblower-exposed/
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/us-gov-israel-psinet-washington-dc-cyber-attacks-against-stew-webb-whi…
3/25/2018 5:56:26 PM (17 hours 58 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/amazon-us-gov-israel-cyber-attacks-against-stew-webb-whistleblower/
3/25/2018 5:56:26 PM (17 hours 59 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/us-gov-israel-psinet-washington-dc-cyber-attacks-against-stew-webb-whi…
3/25/2018 5:56:25 PM (17 hours 59 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/amazon-cyber-attacks-stew-webb-whistleblower-394-hits-24-hours/
3/25/2018 5:56:25 PM (17 hours 59 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/02/amazon-cyber-attacks-stew-webb-whistleblower-hundreds-of-hits-24-hours…
3/25/2018 5:56:25 PM (17 hours 59 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36
Type: Blocked
United States Oakland, United States left http://www.stewwebb.com/category/whistleblower-2/page/3/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/amazon-us-gov-israel-cyber-attacks-against-stew-webb-whistleblower/
3/25/2018 5:56:25 PM (17 hours 59 mins ago)
IP: 107.192.1.66 Hostname: 107-192-1-66.lightspeed.sntcca.sbcglobal.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/43.0.2376.69 Safari/537.36

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Attackers Network planting malicious codes against Stew Webb Whistleblower 2018

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusion Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

March 25, 2018

United States Sitka, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521091573.92
3/15/2018 12:26:16 AM (8 hours 47 mins ago)
IP: 24.237.119.5 Hostname: 5-119-237-24.gci.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; XT1585 Build/NCK25.118-10.5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
Type: Human

Oklahoma City, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521193309.49
3/16/2018 4:41:53 AM (3 hours 18 mins ago)
IP: 70.182.76.176 Hostname: wsip-70-182-76-176.ok.ok.cox.net
Browser: Firefox version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0

Berwyn, United States left http://www.stewwebb.com/2016/06/09/hillary-clinton-whitewater-savings-and-loan-theft-pt1/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521161917.91
3/15/2018 8:43:32 PM (11 hours 28 mins ago)
IP: 72.78.74.136 Hostname: pool-72-78-74-136.phlapa.fios.verizon.net
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1
Type: Human

Alameda, United States left https://www.stewwebb.com/ and visited https://www.stewwebb.com/?wordfence_syncAttackData=1521160654.46
3/15/2018 7:37:36 PM (12 hours 37 mins ago)
IP: 107.213.154.42 Hostname: 107-213-154-42.lightspeed.sntcca.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

Austin, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521155784.67
3/15/2018 6:20:05 PM (13 hours 56 mins ago)
IP: 99.12.193.26 Hostname: 99-12-193-26.lightspeed.austtx.sbcglobal.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human

United States Haverhill, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521207282.82
3/16/2018 8:35:24 AM (17 minutes ago)
IP: 98.229.10.2 Hostname: c-98-229-10-2.hsd1.ma.comcast.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

Jarrettsville, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521210171.74
3/16/2018 9:22:53 AM (27 minutes ago)
IP: 96.244.98.52 Hostname: pool-96-244-98-52.bltmmd.fios.verizon.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human

West Des Moines, United States left http://www.stewwebb.com/2018/03/11/judge-jeanine-throws-george-bush-under-the-buss/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521222272.01
3/16/2018 12:44:34 PM (6 hours 9 mins ago)
IP: 173.23.252.8 Hostname: 173-23-252-8.client.mchsi.com
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
Sorry, but no data for that IP or domain was found.

Fort Smith, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521219742.68
3/16/2018 12:02:25 PM (6 hours 53 mins ago)
IP: 76.230.196.68 Hostname: 76-230-196-68.lightspeed.fyvlar.sbcglobal.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; NX16A8116KP Build/N9F27C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Safari/537.36

Traverse City, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521217196.61
3/16/2018 11:20:05 AM (7 hours 37 mins ago)
IP: 97.83.34.129 Hostname: 97-83-34-129.dhcp.trcy.mi.charter.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36

United States Plymouth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521958757.81
3/25/2018 1:19:22 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Plymouth, United States visited http://www.stewwebb.com/
3/25/2018 1:19:16 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

verizonbusiness.com

Palm Beach Gardens, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521977560.61
3/25/2018 6:32:42 AM (4 hours 18 mins ago)
IP: 73.244.9.70 Hostname: c-73-244-9-70.hsd1.fl.comcast.net
Browser: IE version 11.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko
cable.comcast.com

Fort Worth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521563219.38
3/20/2018 11:27:02 AM (4 hours 2 mins ago)
IP: 167.99.33.254 Hostname: 167.99.33.254
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:59.0) Gecko/20100101 Firefox/59.0

Colorado
ucdenver.edu
cyber attacker
Aurora, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521572221.24
3/20/2018 1:57:06 PM (31 minutes ago)
IP: 140.226.41.237 Hostname: 140.226.41.237
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Aurora, United States visited http://www.stewwebb.com/
3/20/2018 1:56:59 PM (32 minutes ago)
IP: 140.226.41.237 Hostname: 140.226.41.237
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
NetRange: 140.226.0.0 – 140.226.255.255
[65536 addresses in this network]
CIDR: 140.226.0.0/16 (140.226.0.0 – 140.227.255.255)
[131072 addresses in this network]
NetName: UCOLO-HEALTH
NetHandle: NET-140-226-0-0-1
Parent: NET140 (NET-140-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: University of Colorado (UNIVER-84)
RegDate: 1990-06-14
Updated: 2010-07-28
Ref: https://whois.arin.net/rest/net/NET-140-226-0-0-1

OrgName: University of Colorado
OrgId: UNIVER-84
Address: Denver Anchutz Medical Campus
Address: 13001 East 17th Place
Address: Room W4114
Address: PO Box 6508
City: Aurora
StateProv: CO
PostalCode: 80045
Country: US
RegDate: 1990-06-14
Updated: 2009-08-12
Ref: https://whois.arin.net/rest/org/UNIVER-84

OrgAbuseHandle: AIH3-ARIN
OrgAbuseName: Abuse Incident Handlers
OrgAbusePhone: +1-303-724-1550
OrgAbuseEmail: abuse@ucdenver.edu
OrgAbuseRef: https://whois.arin.net/rest/poc/AIH3-ARIN

OrgTechHandle: JC473-ARIN
OrgTechName: Carlson, J.D.
OrgTechPhone: +1-303-724-0482
OrgTechEmail: jd.carlson@ucdenver.edu
OrgTechRef: https://whois.arin.net/rest/poc/JC473-ARIN

RTechHandle: JC473-ARIN
RTechName: Carlson, J.D.
RTechPhone: +1-303-724-0482
RTechEmail: jd.carlson@ucdenver.edu
RTechRef: https://whois.arin.net/rest/poc/JC473-ARIN

RAbuseHandle: AIH3-ARIN
RAbuseName: Abuse Incident Handlers
RAbusePhone: +1-303-724-1550
RAbuseEmail: abuse@ucdenver.edu
RAbuseRef: https://whois.arin.net/rest/poc/AIH3-ARIN

United States Denver, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521550697.74
3/20/2018 7:58:27 AM (7 hours 42 mins ago)
IP: 216.138.185.50 Hostname: h50.185.138.216.ip.windstream.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_5 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D60 Safari/604.1
Denver, United States arrived from http://www.bing.com/search?q=stew+webb+tom+heneghan+report&FORM=QSRE1 and visited http://www.stewwebb.com/
3/20/2018 12:02:51 AM (15 hours 47 mins ago)
IP: 216.138.185.50 Hostname: h50.185.138.216.ip.windstream.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_5 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D60 Safari/604.1

NetRange: 216.138.128.0 – 216.138.191.255
[16384 addresses in this network]
CIDR: 216.138.128.0/18 (216.138.128.0 – 216.138.255.255)
[32768 addresses in this network]
NetName: NORLIGHT-CIDR5
NetHandle: NET-216-138-128-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7260, AS7029
Organization: Windstream Communications LLC (WINDS-6)
RegDate: 2000-10-26
Updated: 2017-03-17
Ref: https://whois.arin.net/rest/net/NET-216-138-128-0-1

OrgName: Windstream Communications LLC
OrgId: WINDS-6
Address: 4001 Rodney Parham Rd
City: Little Rock
StateProv: AR
PostalCode: 72212
Country: US
RegDate: 2006-08-10
Updated: 2017-02-01
Ref: https://whois.arin.net/rest/org/WINDS-6

OrgAbuseHandle: WINDS1-ARIN
OrgAbuseName: Windstream Abuse
OrgAbusePhone: +1-800-347-1991
OrgAbuseEmail: abuse@windstream.net
OrgAbuseRef: https://whois.arin.net/rest/poc/WINDS1-ARIN

OrgTechHandle: WINDS-ARIN
OrgTechName: Windstream Communications Inc
OrgTechPhone: +1-888-292-3827
OrgTechEmail: ipadmin@windstream.net
OrgTechRef: https://whois.arin.net/rest/poc/WINDS-ARIN

OrgTechHandle: GRADY2-ARIN
OrgTechName: Grady, Bill
OrgTechPhone: +1-866-445-5880
OrgTechEmail: ipswip@windstream.net
OrgTechRef: https://whois.arin.net/rest/poc/GRADY2-ARIN

OrgTechHandle: MCGUI37-ARIN
OrgTechName: McGuire, William
OrgTechPhone: +1-888-292-3827
OrgTechEmail: william.mcguire@windstream.com
OrgTechRef: https://whois.arin.net/rest/poc/MCGUI37-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at

cyber attacker Colorado
United States Southport, United States left
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-bl… and
visited http://www.stewwebb.com/? wordfence_syncAttackData=1520705554.6
3/10/2018 12:12:37 PM (2 hours 50 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
United States Walnut Creek, United States visited http://www.stewwebb.com/
3/10/2018 12:17:24 PM (2 hours 48 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Southport, United States left http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-bl… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520705554.6
3/10/2018 12:12:37 PM (2 hours 53 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
Type: Human
United States Southport, United States left http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-wh… and visited http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/
3/10/2018 12:12:33 PM (2 hours 53 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
Type: Human
United States Southport, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-whistle…
3/10/2018 12:11:48 PM (2 hours 53 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
Type: Human
United States Southport, United States visited http://www.stewwebb.com/
3/10/2018 12:10:49 PM (2 hours 54 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1

NetRange: 174.96.0.0 – 174.111.255.255
[1048576 addresses in this network]
CIDR: 174.96.0.0/12 (174.96.0.0 – 174.127.255.255)
[2097152 addresses in this network]
NetName: RRMA
NetHandle: NET-174-96-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRMA)
RegDate: 2009-02-26
Updated: 2009-12-08
Ref: https://whois.arin.net/rest/net/NET-174-96-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRMA
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate:
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Columbus, OH, Herndon, VA and Raleigh, NC RDCs.
Ref: https://whois.arin.net/rest/org/RRMA

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com

United States Murrieta, United States left http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520704268.07
3/10/2018 11:51:10 AM (3 hours 16 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails/
3/10/2018 11:51:06 AM (3 hours 16 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails
3/10/2018 11:51:04 AM (3 hours 16 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-whistle…
3/10/2018 11:47:52 AM (3 hours 19 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States arrived from https://www.google.com/ and visited http://www.stewwebb.com/
3/10/2018 11:47:06 AM (3 hours 20 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1

NetRange: 172.88.0.0 – 172.91.255.255
[262144 addresses in this network]
CIDR: 172.88.0.0/14 (172.88.0.0 – 172.95.255.255)
[524288 addresses in this network]
NetName: RRWE
NetHandle: NET-172-88-0-0-1
Parent: NET172 (NET-172-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS20001
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2015-05-15
Updated: 2015-05-15
Ref: https://whois.arin.net/rest/net/NET-172-88-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2000-10-04
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

Matthews, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520797497.05
3/11/2018 2:44:59 PM (35 minutes ago)
IP: 71.28.93.144 Hostname: h144.93.28.71.dynamic.ip.windstream.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36

cyber attacker Wisconsin
United States Fayetteville, United States left http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-wh… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520779548.33
3/11/2018 9:45:51 AM (5 hours 46 mins ago)
IP: 66.222.35.140 Hostname: h66-222-35-140.fyvloh.dsl.dynamic.tds.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
NetRange: 66.222.0.0 – 66.222.127.255
[32768 addresses in this network]
CIDR: 66.222.0.0/17 (66.222.0.0 – 66.222.255.255)
[65536 addresses in this network]
NetName: TDSNET-BLK
NetHandle: NET-66-222-0-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS4181
Organization: TDS TELECOM (TDST)
RegDate: 2002-01-17
Updated: 2014-12-17
Ref: https://whois.arin.net/rest/net/NET-66-222-0-0-1

OrgName: TDS TELECOM
OrgId: TDST
Address: 525 Junction Rd.
City: Madison
StateProv: WI
PostalCode: 53717
Country: US
RegDate: 1994-12-16
Updated: 2017-01-28
Comment: http://www.tdstelecom.com
Ref: https://whois.arin.net/rest/org/TDST

OrgAbuseHandle: ABUSE163-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-800-358-3648
OrgAbuseEmail: abuse@tds.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE163-ARIN

OrgTechHandle: INE14-ARIN
OrgTechName: IP Network Engineering
OrgTechPhone: +1-800-358-3648
OrgTechEmail: IPRequests@tdstelecom.com
OrgTechRef: https://whois.arin.net/rest/poc/INE14-ARIN

OrgTechHandle: INO44-ARIN
OrgTechName: IP Network Operations
OrgTechPhone: +1-800-358-3648
OrgTechEmail: ispadmin@tdstelecom.com
OrgTechRef: https://whois.arin.net/rest/poc/INO44-ARIN

OrgTechHandle: SERVI6-ARIN
OrgTechName: Service Activation
OrgTechPhone: +1-800-358-3648
OrgTechEmail: serviceactivation@tdstelecom.com
OrgTechRef: https://whois.arin.net/rest/poc/SERVI6-ARIN

RAbuseHandle: ABUSE163-ARIN
RAbuseName: abuse
RAbusePhone: +1-800-358-3648
RAbuseEmail: abuse@tds.net
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE163-ARIN

United States Walnut Creek, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520742578.89
3/10/2018 10:29:40 PM (16 hours 22 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Walnut Creek, United States visited http://www.stewwebb.com/
3/10/2018 10:29:37 PM (16 hours 22 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Walnut Creek, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-whistle…
3/10/2018 10:28:39 PM (16 hours 23 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
NetRange: 66.234.192.0 – 66.234.223.255
[8192 addresses in this network]
CIDR: 66.234.192.0/19 (66.234.192.0 – 66.234.255.255)
[16384 addresses in this network]
NetName: WAVE-ASTOUND-2
NetHandle: NET-66-234-192-0-2
Parent: ASTOUND-3BLK (NET-66-234-192-0-1)
NetType: Reassigned
OriginAS:
Customer: Astound Broadband (C01497747)
RegDate: 2006-11-16
Updated: 2006-11-16
Ref: https://whois.arin.net/rest/net/NET-66-234-192-0-2

CustName: Astound Broadband
Address: Private Residence
City: Concord
StateProv: CA
PostalCode: 94520
Country: US
RegDate: 2006-11-16
Updated: 2011-03-19
Ref: https://whois.arin.net/rest/customer/C01497747

OrgNOCHandle: WDHN-ARIN
OrgNOCName: Wave Division Holdings NOC
OrgNOCPhone: +1-888-317-0488
OrgNOCEmail: noc@wavebroadband.com
OrgNOCRef: https://whois.arin.net/rest/poc/WDHN-ARIN

OrgTechHandle: IAT18-ARIN
OrgTechName: IP admin team
OrgTechPhone: +1-866-928-3123
OrgTechEmail: arin@wavebroadband.com
OrgTechRef: https://whois.arin.net/rest/poc/IAT18-ARIN

OrgAbuseHandle: WDHN-ARIN
OrgAbuseName: Wave Division Holdings NOC
OrgAbusePhone: +1-888-317-0488
OrgAbuseEmail: noc@wavebroadband.com
OrgAbuseRef: https://whois.arin.net/rest/poc/WDHN-ARIN

cyber attacker
United States United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
3/11/2018 4:19:38 PM (14 minutes ago)
IP: 174.211.1.150 Hostname: 150.sub-174-211-1.myvzw.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 5.0.2; VS980 4G Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36
Type: Bot
United States United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520803153
3/11/2018 4:19:17 PM (14 minutes ago)
IP: 174.211.1.150 Hostname: 150.sub-174-211-1.myvzw.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 5.0.2; VS980 4G Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36
NetRange: 174.192.0.0 – 174.255.255.255
[4194304 addresses in this network]
CIDR: 174.192.0.0/10 (174.192.0.0 – 174.255.255.255)
[4194304 addresses in this network]
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cellco Partnership DBA Verizon Wireless (CLLC)
RegDate: 2008-12-16
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-192-0-0-1

OrgName: Cellco Partnership DBA Verizon Wireless
OrgId: CLLC
Address: 180 Washington Valley Road
City: Bedminster
StateProv: NJ
PostalCode: 07039
Country: US
RegDate: 2001-09-30
Updated: 2017-10-12
Ref: https://whois.arin.net/rest/org/CLLC

OrgAbuseHandle: ABUSE716-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-908-306-7000
OrgAbuseEmail: abuse@verizonwireless.com
OrgA

google crawler
cyber attacker wordfence
United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520713222.4
3/10/2018 2:20:27 PM (1 day 7 hours ago)
IP: 66.102.7.9 Hostname: google-proxy-66-102-7-9.google.com
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko; Google Web Preview) Chrome/41.0.2272.118 Safari/537.36
NetRange: 66.102.0.0 – 66.102.15.255
[4096 addresses in this network]
CIDR: 66.102.0.0/20 (66.102.0.0 – 66.102.31.255)
[8192 addresses in this network]
NetName: GOOGLE
NetHandle: NET-66-102-0-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOGL)
RegDate: 2002-07-02
Updated: 2012-06-19
Ref: https://whois.arin.net/rest/net/NET-66-102-0-0-1

OrgName: Google LLC
OrgId: GOGL
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2000-03-30
Updated: 2017-12-21
Ref: https://whois.arin.net/rest/org/GOGL

OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: network-abuse@google.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5250-ARIN

RTechHandle: ZG39-ARIN
RTechName: Google LLC
RTechPhone: +1-650-253-0000
RTechEmail: arin-contact@google.com
RTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521044742.49
3/14/2018 11:25:45 AM (1 hour 11 mins ago)
IP: 174.255.2.234 Hostname: 234.sub-174-255-2.myvzw.com
Browser: Chrome version 58.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; SM-S820L Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.83 Mobile Safari/537.36
NetRange: 174.192.0.0 – 174.255.255.255
[4194304 addresses in this network]
CIDR: 174.192.0.0/10 (174.192.0.0 – 174.255.255.255)
[4194304 addresses in this network]
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)

Albuquerque, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521015021.45
3/14/2018 3:10:24 AM (9 hours 41 mins ago)
IP: 168.103.102.54
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:57.0) Gecko/20100101 Firefox/57.0
Type: Human
United States Albuquerque, United States visited http://www.stewwebb.com/
3/14/2018 3:10:20 AM (9 hours 41 mins ago)
IP: 168.103.102.54
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:57.0) Gecko/20100101 Firefox/57.0
NetRange: 168.103.0.0 – 168.103.255.255
[65536 addresses in this network]
CIDR: 168.103.0.0/16 (168.103.0.0 – 168.103.255.255)
[65536 addresses in this network]
NetName: CENTURYLINK-LEGACY-QWEST-INET-120
NetHandle: NET-168-103-0-0-1
Parent: NET168 (NET-168-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 1994-03-15
Updated: 2018-02-21
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-168-103-0-0-1

Oceanside, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520966145.57
3/13/2018 1:35:47 PM (23 hours 41 mins ago)
IP: 108.95.112.225 Hostname: 108-95-112-225.lightspeed.sndgca.sbcglobal.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Oceanside, United States visited http://www.stewwebb.com/
3/13/2018 1:35:43 PM (23 hours 41 mins ago)
IP: 108.95.112.225 Hostname: 108-95-112-225.lightspeed.sndgca.sbcglobal.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

Canada Ottawa, Canada left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520962334.32
3/13/2018 12:32:16 PM (1 day ago)
IP: 173.33.98.180 Hostname: CPEac202ebdbea3-CMac202ebdbea0.cpe.net.cable.rogers.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
Canada Ottawa, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/
3/13/2018 12:32:13 PM (1 day ago)
IP: 173.33.98.180 Hostname: CPEac202ebdbea3-CMac202ebdbea0.cpe.net.cable.rogers.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
Canada Ottawa, Canada visited http://www.stewwebb.com/
3/13/2018 12:31:46 PM (1 day ago)
IP: 173.33.98.180 Hostname: CPEac202ebdbea3-CMac202ebdbea0.cpe.net.cable.rogers.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
NetRange: 173.33.98.0 – 173.33.99.255
[512 addresses in this network]
CIDR: 173.33.98.0/23 (173.33.98.0 – 173.33.99.255)
[512 addresses in this network]
NetName: HSI
NetHandle: NET-173-33-98-0-1
Parent: ROGERS-CAB-HSD (NET-173-32-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Rogers Cable Inc. MTNK (C02172450)
RegDate: 2009-03-03
Updated: 2009-03-03
Ref: https://whois.arin.net/rest/net/NET-173-33-98-0-1

United States Saint Paul, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520961147.18
3/13/2018 12:12:29 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
3/13/2018 12:12:25 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:24 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States left http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/ and visited http://www.stewwebb.com/advertise-here/
3/13/2018 12:12:21 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States left http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/ and visited http://www.stewwebb.com/advertise-here/
3/13/2018 12:12:20 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:09 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:09 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:09 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:08 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/resources-blogs/
3/13/2018 12:12:06 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1

cyber attacker
United States Wasilla, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521051452.21
3/14/2018 1:17:43 PM (8 minutes ago)
IP: 72.35.103.187 Hostname: 187-103-35-72.mtaonline.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Type: Human
United States Wasilla, United States visited http://www.stewwebb.com/
3/14/2018 1:17:30 PM (8 minutes ago)
IP: 72.35.103.187 Hostname: 187-103-35-72.mtaonline.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

cyber attacker
Bremen, Germany left http://www.stewwebb.com/VIDEOS%20by%20Stew%20Webb.html.html and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521049953.86
3/14/2018 12:52:35 PM (39 minutes ago)
IP: 134.102.172.130 Hostname: 134.102.172.130
Browser: Firefox version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
% Information related to ‘134.102.0.0 – 134.102.255.255’
[65536 addresses in this network]
% Abuse contact for ‘134.102.0.0 – 134.102.255.255’ is ‘abuse@dfn.de’
[65536 addresses in this network]
inetnum: 134.102.0.0 – 134.102.255.255
[65536 addresses in this network]
netname: BREMNET
org: ORG-UB34-RIPE
country: DE
admin-c: NP3779-RIPE
tech-c: UB169-RIPE
status: LEGACY
mnt-by: RIPE-NCC-LEGACY-MNT
mnt-by: DFN-LIR-MNT
mnt-lower: DFN-LIR-MNT
mnt-routes: DFN-MNT
mnt-irt: IRT-DFN-CERT
created: 1970-01-01T00:00:00Z
last-modified: 2016-04-14T09:56:45Z
source: RIPE
sponsoring-org: ORG-DV1-RIPE

organisation: ORG-UB34-RIPE
org-name: Universitaet Bremen
org-type: OTHER
address: Bibliothekstr. 1
address: 28359 Bremen
address: Germany
admin-c: NP3779-RIPE
tech-c: UB169-RIPE
abuse-c: DH5989-RIPE
mnt-ref: DFN-LIR-MNT
mnt-by: DFN-LIR-MNT
created: 2016-03-24T08:57:03Z
last-modified: 2016-03-24T08:57:03Z
source: RIPE # Filtered

person: Niels Pollem
address: Universitaet Bremen
address: Zentrum fuer Netze (ZfN)
address: Bibliothekstr. 1
address: 28359 Bremen
address: Germany
phone: +49 421 218 61340
fax-no: +49 421 218 9861340
nic-hdl: NP3779-RIPE
mnt-by: DFN-NTFY
created: 2015-03-27T13:16:03Z
last-modified: 2015-03-27T13:16:03Z
source: RIPE # Filtered

person: Ulrich Berkhan
address: Universitaet Bremen
address: Zentrum fuer Netze
address: Bibliothekstr. 1
address: 28359 Bremen
address: Postfach 330 440
address: 28334 Bremen
address: Germany
phone: +49 421 218 61341
fax-no: +49 421 218 9861341
nic-hdl: UB169-RIPE
mnt-by: DFN-NTFY
created: 2004-08-24T12:58:25Z
last-modified: 2015-03-27T13:16:03Z
source: RIPE # Filtered

% Information related to ‘134.102.0.0/16AS1275’ (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
route: 134.102.0.0/16 (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
descr: BREMNET
origin: AS1275
mnt-by: DFN-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2001-09-22T09:32:43Z
source: RIPE

% Information related to ‘134.102.0.0/16AS680’ (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
route: 134.102.0.0/16 (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
descr: BREMNET
origin: AS680
mnt-by: DFN-MNT
created: 1970-01-01T00:00:00Z
last-modified:

Cyber attacker
Indianapolis, United States visited https://www.stewwebb.com/
3/9/2018 7:25:46 AM (6 hours 52 mins ago)
IP: 72.1.87.209 Hostname: 209.87.1.72.host.smoothstone.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Type: Human
United States Indianapolis, United States left https://www.stewwebb.com/ and visited https://www.stewwebb.com/?wordfence_syncAttackData=1520601935.51
3/9/2018 7:25:38 AM (6 hours 52 mins ago)
IP: 72.1.87.209 Hostname: 209.87.1.72.host.smoothstone.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Type: Human
United States Indianapolis, United States visited https://www.stewwebb.com/
3/9/2018 7:25:34 AM (6 hours 52 mins ago)
IP: 72.1.87.209 Hostname: 209.87.1.72.host.smoothstone.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
NetRange: 72.1.64.0 – 72.1.95.255
[8192 addresses in this network]
CIDR: 72.1.64.0/19 (72.1.64.0 – 72.1.127.255)
[16384 addresses in this network]
NetName: WEST-IP-COMMUNICATIONS
NetHandle: NET-72-1-64-0-1
Parent: NET72 (NET-72-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS32880
Organization: West IP Communications (WIC-37)
RegDate: 2004-09-07
Updated: 2014-06-09
Ref: https://whois.arin.net/rest/net/NET-72-1-64-0-1

OrgName: West IP Communications
OrgId: WIC-37
Address: 401 South 4th Street
Address: Suite 200
City: Louisville
StateProv: KY
PostalCode: 40202
Country: US
RegDate: 2013-08-08
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/WIC-37

OrgTechHandle: SCHEL30-ARIN
OrgTechName: Schellin, Walt
OrgTechPhone: +1-502-618-5542
OrgTechEmail: wschellin@west.com
OrgTechRef: https://whois.arin.net/rest/poc/SCHEL30-ARIN

OrgTechHandle: VJR5-ARIN
OrgTechName: Rusilowicz, Vincent Joseph
OrgTechPhone: +1-502-315-5126
OrgTechEmail: vrusilowicz@westipc.com
OrgTechRef: https://whois.arin.net/rest/poc/VJR5-ARIN

OrgTechHandle: ACO78-ARIN
OrgTechName: Concepcion, Anthony
OrgTechPhone: +1-502-386-2512
OrgTechEmail: aconcepcion@west.com
OrgTechRef: https://whois.arin.net/rest/poc/ACO78-ARIN

OrgAbuseHandle: NOC31701-ARIN
OrgAbuseName: Network Operations Center
OrgAbusePhone: +1-502-315-5150
OrgAbuseEmail: abuse@westipc.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NOC31701-ARIN

OrgNOCHandle: VJR5-ARIN
OrgNOCName: Rusilowicz, Vincent Joseph
OrgNOCPhone: +1-502-315-5126
OrgNOCEmail: vrusilowicz@westipc.com
OrgNOCRef: https://whois.arin.net/rest/poc/VJR5-ARIN

cyber hacker
United States Tempe, United States left http://www.stewwebb.com/2018/03/04/radio-stew-webb-tom-heneghan-march-2-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520581188.09
3/9/2018 1:39:52 AM (12 hours 47 mins ago)
IP: 184.98.199.227 Hostname: 184-98-199-227.phnx.qwest.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100
Type: Human
United States Tempe, United States visited http://www.stewwebb.com/2018/03/04/radio-stew-webb-tom-heneghan-march-2-2018/
3/9/2018 1:39:46 AM (12 hours 47 mins ago)
IP: 184.98.199.227 Hostname: 184-98-199-227.phnx.qwest.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100

cyber hacker
Redondo Beach, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520572799.07
3/8/2018 11:20:01 PM (15 hours 8 mins ago)
IP: 76.91.66.176 Hostname: cpe-76-91-66-176.socal.res.rr.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; SM-T350 Build/NMF26X) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Safari/537.36

cyber attacker
Montpelier, United States left http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520539149.73
3/8/2018 1:59:12 PM (1 day ago)
IP: 71.169.129.158 Hostname: pool-71-169-129-158.burl.east.myfairpoint.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

NetRange: 71.169.128.0 – 71.169.191.255
[16384 addresses in this network]
CIDR: 71.169.128.0/18 (71.169.128.0 – 71.169.255.255)
[32768 addresses in this network]
NetName: VIS-BLOCK
NetHandle: NET-71-169-128-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: FAIRPOINT COMMUNICATIONS, INC. (FAIRPO-3)
RegDate: 2005-06-01
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-71-169-128-0-1

OrgName: FAIRPOINT COMMUNICATIONS, INC.
OrgId: FAIRPO-3
Address: 770 Elm St
City: Manchester
StateProv: NH
PostalCode: 03101
Country: US
RegDate: 2002-02-03
Updated: 2018-01-09
Ref: https://whois.arin.net/rest/org/FAIRPO-3

OrgTechHandle: PETER825-ARIN
OrgTechName: Peterson, Corey
OrgTechPhone: +1-603-528-7315
OrgTechEmail: corey.peterson@fairpoint.com
OrgTechRef: https://whois.arin.net/rest/poc/PETER825-ARIN

OrgAbuseHandle: FCA40-ARIN
OrgAbuseName: Fairpoint Communications Abuse
OrgAbusePhone: +1-620-227-4400
OrgAbuseEmail: abuse@fairpoint.com
OrgAbuseRef: https://whois.arin.net/rest/poc/FCA40-ARIN

RTechHandle: FAIRP-ARIN
RTechName: Fairpoint Hostmaster
RTechPhone: +1-620-339-4787
RTechEmail: hostmast@fairpoint.com
RTechRef: https://whois.arin.net/rest/poc/FAIRP-ARIN

cyber attacker
Pictou, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520629919.09
3/9/2018 3:12:03 PM (13 minutes ago)
IP: 24.89.218.107 Hostname: blk-89-218-107.eastlink.ca
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:58.0) Gecko/20100101 Firefox/58.0
Canada Pictou, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/9/2018 3:13:21 PM (9 minutes ago)
IP: 24.89.218.107 Hostname: blk-89-218-107.eastlink.ca
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:58.0) Gecko/20100101 Firefox/58.0
NetRange: 24.89.192.0 – 24.89.255.255
[16384 addresses in this network]
CIDR: 24.89.192.0/18 (24.89.192.0 – 24.89.255.255)
[16384 addresses in this network]
NetName: EASTLINK-BLK5
NetHandle: NET-24-89-192-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: EastLink (BRAGG)
RegDate: 2005-05-12
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-24-89-192-0-1

OrgName: EastLink
OrgId: BRAGG
Address: 6080 Young Street
Address: Suite 801, PO Box 8660, Station A
City: Halifax
StateProv: NS
PostalCode: B3K-5M3
Country: CA
RegDate: 2007-01-17
Updated: 2017-01-28
Comment: EastLink High Speed Internet
Ref: https://whois.arin.net/rest/org/BRAGG

OrgNOCHandle: ANS2-ARIN
OrgNOCName: ARIN NOC Support
OrgNOCPhone: +1-902-453-2800
OrgNOCEmail: arin-noc@eastlink.ca
OrgNOCRef: https://whois.arin.net/rest/poc/ANS2-ARIN

OrgTechHandle: ATS22-ARIN
OrgTechName: ARIN Technical Support
OrgTechPhone: +1-902-453-2800
OrgTechEmail: arin-tech@eastlink.ca
OrgTechRef: https://whois.arin.net/rest/poc/ATS22-ARIN

OrgAbuseHandle: AAS50-ARIN
OrgAbuseName: ARIN Abuse Support
OrgAbusePhone: +1-902-453-2800
OrgAbuseEmail: arin-abuse@eastlink.ca
OrgAbuseRef: https://whois.arin.net/rest/poc/AAS50-ARIN

cyber attacker
sprint 256 ips
Newark, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520646659.19
3/9/2018 7:51:05 PM (29 minutes ago)
IP: 66.87.30.79 Hostname: 66-87-30-79.pools.spcsdns.net
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1
NetRange: 66.87.30.0 – 66.87.30.255
[256 addresses in this network]
CIDR: 66.87.30.0/24 (66.87.30.0 – 66.87.31.255)
[512 addresses in this network]
NetName: SPRINT-66-87-30-0
NetHandle: NET-66-87-30-0-1
Parent: SPRINTBWG-2BL (NET-66-87-0-0-1)
NetType: Reassigned
OriginAS: AS3651, AS10507
Organization: Sprint Harrison POP (SHP-30)
RegDate: 2016-08-18
Updated: 2016-08-18
Ref: https://whois.arin.net/rest/net/NET-66-87-30-0-1

OrgName: Sprint Harrison POP
OrgId: SHP-30
Address: Sprint Harrison POP
City: Harrison
StateProv: NJ
PostalCode: 07029
Country: US
RegDate: 2013-12-06
Updated: 2013-12-06
Ref: https://whois.arin.net/rest/org/SHP-30

OrgTechHandle: SIE-ARIN
OrgTechName: Sprint IP Engineering
OrgTechPhone: +1-703-592-4850
OrgTechEmail: deipaddy@sprint.com
OrgTechRef: https://whois.arin.net/rest/poc/SIE-ARIN

OrgAbuseHandle: SIE-ARIN
OrgAbuseName: Sprint IP Engineering
OrgAbusePhone: +1-703-592-4850
OrgAbuseEmail: deipaddy@sprint.com
OrgAbuseRef: https://whois.arin.net/rest/poc/SIE-ARIN

cyber attacker
left off
Homestead, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520666504.39
3/10/2018 1:21:46 AM (10 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Homestead, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520666504.39
3/10/2018 1:21:46 AM (14 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Homestead, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
3/10/2018 1:21:43 AM (14 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Homestead, United States visited http://www.stewwebb.com/
3/10/2018 1:20:12 AM (16 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36




Intelliwave cyber attacks against Stew Webb Federal Whistle blower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Intelliwave cyber attacks against Stew Webb Federal Whistleblower

United States Washington Court House, United States arrived from https://www.google.com/ and visited http://www.stewwebb.com/
3/28/2016 1:51:20 PM (5 minutes ago) IP: 74.113.45.20 [block] Hostname: 74.113.45.20
Browser: Safari version 9.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_9_5) AppleWebKit/601.4.4 (KHTML, like Gecko) Version/9.0.3 Safari/537.86.4
Address lookup
lookup failed 74.113.45.20
A temporary error occurred during the lookup. Trying again may succeed.
Domain Whois record

Don’t have a domain name for which to get a record
Network Whois record

Queried whois.arin.net with “n 74.113.45.20″…

NetRange: 74.113.40.0 – 74.113.47.255
CIDR: 74.113.40.0/21
NetName: CC-NETWORK
NetHandle: NET-74-113-40-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Intelliwave, LLC (IL-291)
RegDate: 2009-05-01
Updated: 2015-10-30
Ref: https://whois.arin.net/rest/net/NET-74-113-40-0-1

OrgName: Intelliwave, LLC
OrgId: IL-291
Address: 145 Columbus Ave
Address: Suite 101
City: Athens
StateProv: OH
PostalCode: 45701
Country: US
RegDate: 2015-08-17
Updated: 2015-11-19
Ref: https://whois.arin.net/rest/org/IL-291

OrgNOCHandle: PISTO9-ARIN
OrgNOCName: Pistone, Mike
OrgNOCPhone: +1-937-660-4030
OrgNOCEmail: mike@pistonetech.com
OrgNOCRef: https://whois.arin.net/rest/poc/PISTO9-ARIN

OrgAbuseHandle: PISTO9-ARIN
OrgAbuseName: Pistone, Mike
OrgAbusePhone: +1-937-660-4030
OrgAbuseEmail: mike@pistonetech.com
OrgAbuseRef: https://whois.arin.net/rest/poc/PISTO9-ARIN

OrgTechHandle: PISTO9-ARIN
OrgTechName: Pistone, Mike
OrgTechPhone: +1-937-660-4030
OrgTechEmail: mike@pistonetech.com
OrgTechRef: https://whois.arin.net/rest/poc/PISTO9-ARIN

DNS records

DNS query for 20.45.113.74.in-addr.arpa returned an error from the server: ServerFailure

No records to display
Traceroute

Tracing route to 74.113.45.20 [74.113.45.20]…
hop rtt rtt rtt ip address fully qualified domain name
1 0 0 0 208.101.16.73 49.10.65d0.ip4.static.sl-reverse.com
2 0 0 0 66.228.118.153 ae11.dar01.sr01.dal01.networklayer.com
3 0 0 0 173.192.18.210 ae6.bbr01.eq01.dal03.networklayer.com
4 2 0 0 206.223.118.37 10gigabitethernet3-1.core1.dal1.he.net
5 33 21 24 184.105.213.118 10ge12-6.core1.chi1.he.net
6 44 30 30 184.105.222.166 10ge1-1.core1.cmh1.he.net
7 40 42 37 38.104.22.242
8 41 39 47 74.113.42.254
9 41 42 43 74.113.45.20

Trace complete

— end —

74.113.45.20
IP address 74.113.45.20
Location Canal Winchester, Ohio, United States
IP address 74.113.45.20
Reverse DNS (PTR record) 74-113-45-20.intelliwave.com
DNS server (NS record) ns02.intelliwave.com (74.113.40.3)
ns01.intelliwave.com (74.113.40.2)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.45.0/24
74.113.45.0 – 74.113.45.255
ping 74.113.45.20
Number of SPAM hosts on 74.113.45.0/24 0
Domains around 74.113.45.20
IP address #domains
74.113.45.75 1
IP address 74.113.45.75
Location Canal Winchester, Ohio, United States
Domains on 74.113.45.75
Domain Tools
shockwave1945.com
This domain is hosted by Intelliwave, LLC (AS25943). The first DNS server is ns-67-a.gandi.net. The current IPv4 address is 74.113.45.75. The mail server with the highest priority is spool.mail.gandi.net.
DNS server (NS records) ns-67-a.gandi.net (173.246.98.2)
ns-134-b.gandi.net (213.167.229.2)
ns-187-c.gandi.net (217.70.179.2)
Mail server (MX records) spool.mail.gandi.net (217.70.178.1)
fb.mail.gandi.net (217.70.178.216)
IP address (IPv4) 74.113.45.75
IP address (IPv6)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.45.0/24
74.113.45.0 – 74.113.45.255
Domain Name: shockwave1945.com
Registry Domain ID: 1800616408_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.gandi.net
Registrar URL: http://www.gandi.net
Updated Date: 2017-09-04T03:19:42Z
Creation Date: 2013-05-11T19:54:44Z
Registrar Registration Expiration Date: 2019-05-11T19:54:44Z
Registrar: GANDI SAS
Registrar IANA ID: 81
33.170377661
support.gandi.net
Registry Registrant ID:
Registrant Name: Andrew Leiterman
Registrant Organization:
Registrant Street: Obfuscated whois Gandi-63-65 boulevard Massena
Registrant City: Obfuscated whois Gandi-Paris
Registrant State/Province: Paris
Registrant Postal Code: 75013
Registrant Country: FR
33.143730576
33.170377666

NetRange: 74.113.40.0 – 74.113.47.255
CIDR: 74.113.40.0/21
NetName: CC-NETWORK
NetHandle: NET-74-113-40-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Intelliwave, LLC (IL-291)
RegDate: 2009-05-01
Updated: 2015-10-30
@@@@@@@@@@@@@@@@@@@
????????????????
gandi.net
This domain is hosted by GANDI SAS (AS29169). The first DNS server is dns2.gandi.net. The current IPv4 address is 217.70.185.65. The mail server with the highest priority is mail10.gandi.net.
v=spf1 ip4:217.70.176.0/21 ip4:217.70.186.186/32
ip4:217.70.186.187/32 ip6:2001:4b98:c::/48
ip6:2001:4b98:dc2:43:216:3eff:fe69:f13/128
ip4:217.70.186.186/32 ip6:2001:4b98:dc2:90:217:70:186:186/128
ip6:2001:4b98:dc4:5::/64 -ip4:151.236.59.145/32 –
ip4:151.236.35.5/32 -ip4:151.80.105.4/32 -ip4:89.46.69.46/32 ptr ?al
DNS server (NS records) dns2.gandi.net (217.70.183.211)
dns0.gandi.net (217.70.177.39)
dns4.gandi.net (217.70.186.184)
dns3.gandi.net (217.70.184.14)
dns6.gandi.net (162.159.25.213)
dns1.gandi.net (217.70.177.45)
Mail server (MX records) mail10.gandi.net (217.70.182.74)
mail8.gandi.net (217.70.186.186)
IP address (IPv4) 217.70.185.65
IP address (IPv6)
ASN number 29169
ASN name (ISP) GANDI SAS
IP-range/subnet 217.70.176.0/20
217.70.176.0 – 217.70.191.255
Registry Registrant ID:
Registrant Name: Stephan Ramoin
Registrant Organization: Gandi SAS
Registrant Street: 63-65 Boulevard Massena
Registrant City: Paris
Registrant State/Province:
Registrant Postal Code: 75013
Registrant Country: FR
33.143737851
Tech Name: NOC GANDI
Tech Organization: GANDI SAS
Tech Street: 63-65 Boulevard MASSENA
Tech City: Paris
Tech State/Province:
Tech Postal Code: 75013
Tech Country: FR

v=spf1 include:_mailcust.gandi.net?all
Domain IPv4 address Ranking Alexa Pagerank
gandi.academy 217.70.184.38
gandi.al 31.171.152.42
gandi.am 217.70.184.38 0
gandi.at 5.175.30.35 0
gandi.bar 217.70.184.38 -1
gandi.be 217.70.184.38
gandi.biz 151.101.1.103
gandi.blog 217.70.184.38
gandi.ca
gandi.capetown 217.70.184.38
gandi.careers 217.70.184.38 -1
gandi.casa 195.110.124.188
gandi.cat 217.70.184.38
gandi.cc 217.70.184.38
gandi.ch 193.246.38.195
gandi.cloud 217.70.184.38
gandi.club 217.70.184.38
gandi.cn
gandi.co 217.70.184.38
gandi.co.jp 219.94.129.47
gandi.co.nz
gandi.co.uk 217.70.184.38
gandi.codes 217.70.184.38 -1
gandi.com 107.182.172.122 3
gandi.com.ar 50.28.14.216
gandi.com.au 112.140.180.152
gandi.com.br 217.70.184.38
gandi.com.cn 47.89.58.32
gandi.com.mx 184.172.99.242 6
gandi.com.tw 217.70.184.38
gandi.community 217.70.184.38 -1
gandi.de 46.252.18.114 0
gandi.design 217.70.184.38
gandi.digital 192.185.138.114
gandi.dk
gandi.domains 217.70.184.38 -1
gandi.email 217.70.184.38
gandi.es 217.70.184.38
gandi.eu 217.70.184.50
gandi.fi 31.217.196.248 2
gandi.fm 217.70.184.38
gandi.fr 217.70.184.38 6
gandi.global 217.70.184.38 -1
gandi.gr
gandi.group 217.70.184.38
gandi.guide 217.70.184.38
gandi.guru 217.70.184.38 -1
gandi.help 217.70.184.38
gandi.hiv 217.70.184.38
gandi.host 217.70.184.38 -1
IPv4 routes
Startip Endip Description Country #domains #spamhosts
46.226.104.0 46.226.111.255 GANDI DEDICATED-HOSTING FR5 FR 1,869 0
92.243.0.0 92.243.31.255 GANDI DEDICATED HOSTING SERVERS FR 13,788 0
95.142.160.0 95.142.175.255 GANDI DEDICATED HOSTING SERVERS FR 6,417 0
155.133.128.0 155.133.191.255 GANDI SAS FR 3,556 1
168.205.128.0 168.205.131.255 GANDI MANOEL DO AMARAL BR 0 0
173.246.96.0 173.246.111.255 Gandi US Inc. US 694 0
185.26.124.0 185.26.127.255 Gandi IaaS Hosting Luxembourg FR 1,399 0
213.167.228.0 213.167.231.255 GANDI DEDICATED HOSTING SERVERS FR 137 0
213.167.240.0 213.167.255.255 GANDI SAS FR 2,178 3
217.70.176.0 217.70.191.255 GANDI INTERNATIONAL SERVICES AND INFRA FR 734,460 1
46.226.104.0 46.226.107.255 GANDI DEDICATED-HOSTING FR5 FR 255 0
46.226.108.0 46.226.111.255 GANDI DEDICATED-HOSTING LU1 FR 1,614 0
92.243.0.0 92.243.7.255 GANDI DEDICATED HOSTING SERVERS FR 3,921 0
92.243.8.0 92.243.15.255 GANDI DEDICATED HOSTING SERVERS FR 3,359 0
92.243.16.0 92.243.19.255 GANDI DEDICATED HOSTING SERVERS FR 1,985 0
92.243.20.0 92.243.23.255 GANDI DEDICATED HOSTING SERVERS FR 1,403 0
92.243.24.0 92.243.27.255 GANDI DEDICATED HOSTING SERVERS FR 1,465 0
92.243.28.0 92.243.31.255 GANDI DEDICATED HOSTING SERVERS FR 1,655 0
95.142.160.0 95.142.163.255 GANDI DEDICATED HOSTING SERVERS FR 1,620 0
95.142.164.0 95.142.167.255 GANDI DEDICATED HOSTING SERVERS FR 1,612 0
95.142.168.0 95.142.171.255 GANDI DEDICATED-HOSTING FR3 FR 1,852 0
95.142.172.0 95.142.175.255 GANDI DEDICATED-HOSTING-NET4 FR 1,333 0
155.133.128.0 155.133.135.255 GANDI SAS FR 2,564 0
155.133.129.0 155.133.129.255 GANDI SAS FR 336 0
155.133.130.0 155.133.130.255 GANDI SAS FR 274 0
155.133.131.0 155.133.131.255 GANDI SAS FR 603 0
155.133.136.0 155.133.139.255 GANDI SAS FR 278 1
155.133.138.0 155.133.138.255 GANDI SAS FR 278 1
155.133.140.0 155.133.143.255 GANDI SAS FR 714 0
173.246.96.0 173.246.96.255 Gandi US Inc. US 0 0
173.246.98.0 173.246.98.255 Gandi US Inc. US 0 0
173.246.100.0 173.246.100.255 Gandi US Inc. US 31 0
173.246.101.0 173.246.101.255 Gandi US Inc. US 17 0
173.246.104.0 173.246.105.255 Gandi US Inc. US 143 0
213.167.229.0 213.167.229.255 GANDI DEDICATED HOSTING SERVERS FR 1 0
213.167.230.0 213.167.230.255 GANDI DEDICATED HOSTING SERVERS FR 0 0
213.167.231.0 213.167.231.255 GANDI DEDICATED HOSTING SERVERS FR 136 0
213.167.240.0 213.167.241.255 Gandi IAAS Hosting Luxembourg FR 791 2
213.167.242.0 213.167.243.255 Gandi IAAS Hosting Luxembourg FR 429 1
217.70.179.0 217.70.179.255 GANDI INTERNATIONAL SERVICES AND INFRA FR 1 0
217.70.184.0 217.70.184.255 GANDI FRANCE L/B SERVICES FR 710,506 0
217.70.186.0 217.70.186.255 GANDI LUXEMBOURG INFRASTRUCTURE AND SERVICES FR 6,006 0
217.70.188.0 217.70.191.255 GANDI DEDICATED HOSTING SERVERS FR 891 1
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 10 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 1
41.221.128.0 41.221.143.255 Net@Net EG 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:4b98:: 2001:4b9f:ffff:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 56,767 0
2604:3400:: 2604:3400:ffff:ffff:ffff:ffff:ffff:ffff Gandi US Inc. US 761 0
2804:2ec4:: 2804:2ec4:ffff:ffff:ffff:ffff:ffff:ffff GANDI MANOEL DO AMARAL BR 0 0
2001:4b98:: 2001:4b98:ffff:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 53,668 0
2001:4b98:dc4:: 2001:4b98:dc4:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 0 0
2001:4b98:dc5:: 2001:4b98:dc5:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 605 0
2001:4b98:dc6:: 2001:4b98:dc6:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 1,146 0
2001:4b98:aaaa:: 2001:4b98:aaaa:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 0 0
2001:4b98:aaab:: 2001:4b98:aaab:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 0 0
2001:4b98:abcb:: 2001:4b98:abcb:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 0 0
2001:4b99:1:: 2001:4b99:1:ffff:ffff:ffff:ffff:ffff GANDI SAS FR 3,099 0
2604:3400:aaac:: 2604:3400:aaac:ffff:ffff:ffff:ffff:ffff Gandi US Inc. US 0 0
2604:3400:abca:: 2604:3400:abca:ffff:ffff:ffff:ffff:ffff Gandi US Inc. US 0 0
2604:3400:abcc:: 2604:3400:abcc:ffff:ffff:ffff:ffff:ffff Gandi US Inc. US 0 0
2604:3400:ca01:: 2604:3400:ca01:ffff:ffff:ffff:ffff:ffff Gandi US Inc. US 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:678:604:: 2001:678:604:ffff:ffff:ffff:ffff:ffff PC “Astra-net” UA 0 0
2001:678:608:: 2001:678:608:ffff:ffff:ffff:ffff:ffff QUICK-NET Mariusz Miska PL 0 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 209 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 155 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,417 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
29169 GANDI SAS FR 24 9 764,498 5
203476 GANDI SAS FR 19 4 25,050 2
265365 GANDI MANOEL DO AMARAL BR 1 1 0 0
12714 Net By Net Holding LLC RU 193 2 4,179 80
20911 Net-Surf.net Ltd. BG 28 0 70 4
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 164 1
1618 Daytona Net Works, Inc. US 2 0 250 2
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 8 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 4 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,558 16
3254 Lucky Net Ltd UA 4 0 2,287 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 86,925 8
3931 Logical Net Corporation US 6 0 744 1
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,787 18
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 394 13 33,747 118
5405 CSO.net Internet Services GmbH AT 1 1 3,978 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 598 2
6364 Atlantic.net, Inc. US 47 5 18,937 0
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,775 0 10,969 8
6624 Gower.Net US 3 0 27 0
6735 sdt.net AG DE 6 1 298 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 157 0
7106 Com Net, Inc. US 9 1 953 1
7146 Georgia Business Net, Inc US 2 0 43 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 283 0
7600 Escape.net AU 56 4 516 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 13 0 1,274 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
8001 Net Access Corporation US 39 4 15,157 2
8057 Vision Net, Inc. US 43 1 306 0
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
@@@@@@@@@@
Domains
74.113.45.183 1
IP address 74.113.45.183
Location Canal Winchester, Ohio, United States
IP address 74.113.45.183
Reverse DNS (PTR record) 74-113-45-183.intelliwave.com
DNS server (NS record) ns01.intelliwave.com (74.113.40.2)
ns02.intelliwave.com (74.113.40.3)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.45.0/24
74.113.45.0 – 74.113.45.255
Domain Tools
@@@@@@@@
???????????????
Domains on 74.113.45.183
vinehosting.org
This domain is hosted by Intelliwave, LLC (AS25943). The first DNS server is ns2.vinehosting.com. The current IPv4 address is 74.113.45.183. The mail server with the highest priority is tower1.babelguard.net.
DNS server (NS records) ns2.vinehosting.com (173.230.158.104)
ns3.vinehosting.com (173.230.158.104)
ns4.vinehosting.com (173.230.158.104)
ns.vinehosting.com (173.230.158.104)
Mail server (MX records) tower1.babelguard.net
babelguard.com 52.86.22.136
IP address 52.86.22.136
Location Ashburn, Virginia, United States (US) flag
Registry arin
IP address 52.86.22.136
Reverse DNS (PTR record) ec2-52-86-22-136.compute-1.amazonaws.com
DNS server (NS record) pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
x4.amazonaws.org (204.13.251.31)
x3.amazonaws.org (208.78.71.31)
x1.amazonaws.com (156.154.64.10)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 52.86.0.0/15
52.86.0.0 – 52.87.255.255
Domains around 52.86.22.136
IP address #domains
52.86.22.46 1
52.86.22.52 1
52.86.22.84 2
52.86.22.108 3
52.86.22.122 1
52.86.22.136 2004139
52.86.22.157 2
52.86.22.161 7
52.86.22.201 1
52.86.22.208 1
52.86.22.216 1
Domains on 52.86.22.136
Domain Tools
rustitalia.com
joanadias.com
pichnopop.com
vandidad.com
childrenspharmacy.com
bowlerhatproductions.com
jdrhost.com
guerraselectorales.com
penginjilan.com
ask-a-scientist.com
@@@@@@@@@@@@@@@@@@@@
Mail server First seen #domains
Mail servers on 52.86.22.136
arbexpert.com
This domain is hosted by Amazon.com, Inc. (AS14618). The first DNS server is ns1.namebrightdns.com. The current IPv4 address is 54.236.221.45.
DNS server (NS records) ns1.namebrightdns.com (34.197.156.224)
ns2.namebrightdns.com (34.197.49.47)
Mail server (MX records)
IP address (IPv4) 54.236.221.45
52.72.167.138
IP address (IPv6)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 54.236.128.0/17
54.236.128.0 – 54.236.255.255
Domain Name: ArbExpert.com
Registry Domain ID: 2225968071_DOMAIN_COM-VRSN
Registrar WHOIS server: whois.NameBright.com
Domain Status: clientTransferProhibited
Registry Registrant ID:
Registrant Name: Domain Admin / This Domain is For Sale
Registrant Organization: HugeDomains.com
Registrant Street: 2635 Walnut Street
Registrant City: Denver
Registrant State/Province: CO
Registrant Postal Code: 80205
Registrant Country: US
303-893-0552
namebright.com
The first DNS server is ns1.namebrightdns.com. The current IPv4 address is 216.87.78.127. The mail server with the highest priority is smtp.secureserver.net.
v=spf1 ip4:216.38.197.184/30 ip4:216.150.210.192/27 ip4:216.150.214.49
ip4:93.190.234.74/31 ip4:23.24.139.161
a mx include:secureserver.net include:namebrightmail.com -a
DNS server (NS records) ns1.namebrightdns.com (34.197.156.224)
ns2.namebrightdns.com (34.197.49.47)
Mail server (MX records) smtp.secureserver.net (72.167.238.29)
mailstore1.secureserver.net (68.178.213.243)
IP address (IPv4) 216.87.78.127
IP address (IPv6)
ASN number 13649
ASN name (ISP) ViaWest
IP-range/subnet 216.87.64.0/19
216.87.64.0 – 216.87.95.255
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: NameBright.com
Registrant Street: 2635 Walnut Street
Registrant City: Denver
Registrant State/Province: CO
Registrant Postal Code: 80205
Registrant Country: US
720-486-0020
hugedomains.com
The first DNS server is chuck.ns.cloudflare.com. The current IPv4 address is 216.38.197.185. The mail server with the highest priority is mailstore1.secureserver.net.
v=spf1 ip4:216.38.220.19 ip4:216.150.210.205
ip4:216.150.210.200 ip4:216.150.210.221 ip4:216.150.214.57
ip4:216.150.214.49 ip4:216.150.210.206
mx include:secureserver.net include:sendgrid.net ~a
DNS server (NS records) chuck.ns.cloudflare.com (173.245.59.86)
jasmine.ns.cloudflare.com (173.245.58.170)
Mail server (MX records) mailstore1.secureserver.net (68.178.213.243)
smtp.secureserver.net (72.167.238.29)
IP address (IPv4) 216.38.197.185
216.150.210.200
216.38.197.179
216.150.210.199
IP address (IPv6)
ASN number 13649
ASN name (ISP) ViaWest
IP-range/subnet 216.38.192.0/19
216.38.192.0 – 216.38.223.255
Domain Name: HUGEDOMAINS.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Domain Admin
Registrant Organization: HugeDomains.com
Name Server: CHUCK.NS.CLOUDFLARE.COM
Name Server: JASMINE.NS.CLOUDFLARE.COM
DNSSEC: unsigned
@@@@@@@@@@@@@@@@@@@@@@@@@@
edsdismx.edsdist.com
Are you looking for IPv4 address 52.72.167.138?
IP address 52.72.167.138
Location Ashburn, Virginia, United States (US) flag
Registry arin
IP address 52.72.167.138
Reverse DNS (PTR record) ec2-52-72-167-138.compute-1.amazonaws.com
DNS server (NS record) pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
x3.amazonaws.org (208.78.71.31)
x4.amazonaws.org (204.13.251.31)
x1.amazonaws.com (156.154.64.10)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 52.72.0.0/15
52.72.0.0 – 52.73.255.255
Domains on 52.72.167.138
@@@@@@@@@
Domain Tools
pleasandexcuses.com
siegeguild.com
mydigitaltext.com
lowpricewatch.com
magixpro.com
freedomcompanies.com
phoebesfriends.com
stephenringer.com
ippofaes.com
tabikita.com
Domains around 52.72.167.138
IP address #domains
52.72.167.4 1
52.72.167.23 1
52.72.167.27 1
52.72.167.33 1
52.72.167.57 1
52.72.167.108 1
52.72.167.117 2
52.72.167.133 1
52.72.167.138 745462
52.72.167.139 1
52.72.167.154 2
52.72.167.161 2
52.72.167.191 2
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????/
Mail servers on 52.72.167.138
Overview of mail servers hosted on this IP address.
@@@@@@@@@@
it.garage4x4.com
Are you looking for IPv4 address 54.236.221.45?
IP address 54.236.221.45
Location Ashburn, Virginia, United States (US) flag
Registry arin
IP address 54.236.221.45
Reverse DNS (PTR record) ec2-54-236-221-45.compute-1.amazonaws.com
DNS server (NS record) x3.amazonaws.org (208.78.71.31)
x1.amazonaws.com (156.154.64.10)
x2.amazonaws.com (156.154.65.10)
x4.amazonaws.org (204.13.251.31)
pdns1.ultradns.net (204.74.108.1)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 54.236.128.0/17
54.236.128.0 – 54.236.255.255
Number of SPAM hosts on 54.236.128.0/17
Domains around 54.236.221.45
IP address #domains
54.236.221.7 1
54.236.221.32 9
54.236.221.45 745394
54.236.221.53 1
54.236.221.124 1
54.236.221.126 1
54.236.221.129 1
54.236.221.145 1
54.236.221.169 1
54.236.221.212 1
54.236.221.216 2
Domains on 54.236.221.45
Domain Tools
libreriahosanna.com
redolives.com
apinaz.com
nascentarray.com
skyfallrpg.com
torrentita.com
baazza.com
lashalluremd.com
scoreur.com
marysblood.com
@@@@@@@@@@@@@@@@@@@@@@@
?????????????????????
left off
Mail servers on 54.236.221.45
b.mx

Are you looking for domain garage4x4.com?
Domain IPv4 address Ranking Alexa Pagerank
garage4x4.co.uk 94.136.40.82
garage4x4.com 54.174.212.152
garage4x4.com.mx 65.99.252.26
garage4x4.eu 213.246.58.24
garage4x4.fr 213.186.33.4
garage4x4.net 213.246.58.24
garage4x4.pl 79.96.176.215
garage4x4.ro
garage4x4.ru 89.108.124.16 2
garage4x4tyt.com 23.236.62.147

@@@@@@@@@@@@
mail.belvedereproperty.com

@@@@@@@@@@@@@@@@@@@@@@@@@@
mail.ceruscorp.com

@@@@@@@@@@@@@@@@@@@@@@
mail.emnetsolutions.com

@@@@@@@@@@@@@@@@@@@@@
mail.scatteredjoy.com

@@@@@@@@@@@@@@@@@
mx02.puttynuts.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
mxforward.networkmx.com

@@@@@@@@@@@@@@@@@@@@@
relay.wharftthk.com

@@@@@@@@@@@@@@@@@@@@
server95-1.mypasport.com

@@@@@@@@@@@@@@@@@@@@@
smtp.lumencapitalresources.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Name servers on 52.72.167.138
cdi.induniya.com
dns2.winteractive.com
ns1.bluezee.com
ns1.slnoc.com
ns16.servidorturbo.com
ns2.99vidas.com
ns2.isolservers.com
ns30.yakhost.com
ns37.servidoturbo.com

@@@@@@@@@@@@@@@@
IP address 52.72.167.138
Reverse DNS (PTR record) ec2-52-72-167-138.compute-1.amazonaws.com
DNS server (NS record) pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
x3.amazonaws.org (208.78.71.31)
x4.amazonaws.org (204.13.251.31)
x1.amazonaws.com (156.154.64.10)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 52.72.0.0/15
52.72.0.0 – 52.73.255.255
NetRange: 52.64.0.0 – 52.79.255.255
CIDR: 52.64.0.0/12
NetName: AT-88-Z
NetHandle: NET-52-64-0-0-1
Parent: NET52 (NET-52-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
Are you looking for domain edsdist.com?
Domain IPv4 address Ranking Alexa Pagerank
edsdist.com 54.174.212.152
edsdistribution.co.za 41.203.18.35
edsdistribution.com 45.40.183.129
edsdistribution.net 184.168.221.44

@@@@@@@@@@@@@@@@@@@@@@@@@
imss.itslot.com

@@@@@@@@@@@@@@@@@@
mail.digixinc.com

@@@@@@@@@@@@@@@@@@@@@
mail.stratusafrica.com

@@@@@@@@@@@@@@@@@@@@@@@
mxsec.networkmx.com

@@@@@@@@@@@@@@@@@@@@@@
relay01.atoseuronext.com

@@@@@@@@@@@@@@@@@@@@@@@
server94-2.mypasport.com

@@@@@@@@@@@@@@@@@@@@@@@@@

@@@@@@@@@@@@@@@@@@@@@@@@@
52.86.22.136
Name servers on 52.86.22.136
atlas.okmedya.com
dns1.eslisonhbet.com
europa.szerverek.com
ns-b.cosmorom.com
ns1.azartools.com
ns1.elecamp.com
ns1.netsoftonline.com
ns2.grhosts.com
ns2.kingdl.com
ns2.n-marketing.com

Note: maximum of 10 mail servers are shown.
NetRange: 52.84.0.0 – 52.95.255.255
CIDR: 52.88.0.0/13, 52.84.0.0/14
NetName: AT-88-Z
NetHandle: NET-52-84-0-0-1
Parent: NET52 (NET-52-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS16509, AS14618
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28

@@@@@@@@@@@@@@@@@@
left off
babelguard.org 144.217.237.245

IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.53.154.0 103.53.155.255 16th Floor Yechengco Tower1, RCBC Plaza PH 7 0
103.53.154.0 103.53.154.255 16th Floor Yechengco Tower1, RCBC Plaza PH 7 0
103.53.155.0 103.53.155.255 16th Floor Yechengco Tower1, RCBC Plaza PH 0 0
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 10 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 1
41.221.128.0 41.221.143.255 Net@Net EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 130 12
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 11 2
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 20 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 7 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 54 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 1
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 223 7
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 420 1
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 0
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 1
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 113 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 42 0
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 12 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 0 1
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
93.90.32.0 93.90.47.255 Net By Net Holding LLC RU 15 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 1 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 19 0
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 31 7
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 8 8
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 1
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 0
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 51 1
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 2 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 18 3
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 1 0
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 1
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 2 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:678:604:: 2001:678:604:ffff:ffff:ffff:ffff:ffff PC “Astra-net” UA 0 0
2001:678:608:: 2001:678:608:ffff:ffff:ffff:ffff:ffff QUICK-NET Mariusz Miska PL 0 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 209 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 155 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,417 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 940 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
63966 16th Floor Yechengco Tower1, RCBC Plaza PH 3 0 7 0
12714 Net By Net Holding LLC RU 193 2 4,179 80
20911 Net-Surf.net Ltd. BG 28 0 70 4
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 164 1
1618 Daytona Net Works, Inc. US 2 0 250 2
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 8 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 4 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,558 16
3254 Lucky Net Ltd UA 4 0 2,287 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 86,925 8
3931 Logical Net Corporation US 6 0 744 1
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,787 18
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 394 13 33,747 118
5405 CSO.net Internet Services GmbH AT 1 1 3,978 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 598 2
6364 Atlantic.net, Inc. US 47 5 18,937 0
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,775 0 10,969 8
6624 Gower.Net US 3 0 27 0
6735 sdt.net AG DE 6 1 298 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 157 0
7106 Com Net, Inc. US 9 1 953 1
7146 Georgia Business Net, Inc US 2 0 43 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 283 0
7600 Escape.net AU 56 4 516 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 13 0 1,274 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
8001 Net Access Corporation US 39 4 15,157 2
8057 Vision Net, Inc. US 43 1 306 0
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 292 4
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR

IP address (IPv4) 74.113.45.183
IP address (IPv6)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.45.0/24
74.113.45.0 – 74.113.45.255
Domain Name: VINEHOSTING.ORG
Registry Domain ID: D150923597-LROR
Registrar WHOIS Server: whois.enom.com
Registrar URL: http://www.enom.com
Updated Date: 2018-02-15T00:48:34Z
Creation Date: 2008-02-08T19:54:02Z
Registry Expiry Date: 2019-02-08T19:54:02Z
Registrar Registration Expiration Date:
Registrar: eNom, Inc.
Registrar IANA ID: 48
Registry Registrant ID: C142332180-LROR
Registrant Name: Greg Keller
Registrant Organization: Hop Off A Cloud Networks LLC dba Connectivity Engineer
Registrant Street: 119 East Memorial Drive
Registrant City: Pomeroy
Registrant State/Province: OH
Registrant Postal Code: 45769
Registrant Country: US
740-430-1060
info @ connectivity.engineer
This domain is hosted by Cloudflare, Inc. (AS13335). The first DNS server is brad.ns.cloudflare.com. The current IPv4 address is 104.18.47.135. The mail server with the highest priority is aspmx.l.google.com.
DNS server (NS records) brad.ns.cloudflare.com (173.245.59.105)
pat.ns.cloudflare.com (173.245.58.139)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
aspmx2.googlemail.com (108.177.14.27)
aspmx3.googlemail.com (74.125.130.27)
IP address (IPv4) 104.18.47.135
104.18.46.135
IP address (IPv6) 2400:cb00:2048:1::6812:2f87
2400:cb00:2048:1::6812:2e87
ASN number 13335
ASN name (ISP) Cloudflare, Inc.
IP-range/subnet 104.18.32.0/20
104.18.32.0 – 104.18.47.255
Domain name: connectivity.engineer
Status: registered

Domain nameservers:
brad.ns.cloudflare.com
pat.ns.cloudflare.com
NetRange: 74.113.40.0 – 74.113.47.255
CIDR: 74.113.40.0/21
NetName: CC-NETWORK
NetHandle: NET-74-113-40-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Intelliwave, LLC (IL-291)
RegDate: 2009-05-01
Updated: 2015-10-30
OrgName: Intelliwave, LLC
OrgId: IL-291
Address: 145 Columbus Ave
Address: Suite 101
City: Athens
StateProv: OH
PostalCode: 45701
Country: US
RegDate: 2015-08-17
Updated: 2018-01-04

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Domains around 74.113.45.183
IP address #domains
74.113.45.75 1
74.113.45.183 1
74.113.45.201 1
IP address 74.113.45.201
Location Canal Winchester, Ohio, United States
IP address 74.113.45.201
Reverse DNS (PTR record) 74-113-45-201.intelliwave.com
DNS server (NS record) ns02.intelliwave.com (74.113.40.3)
ns01.intelliwave.com (74.113.40.2)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.45.0/24
74.113.45.0 – 74.113.45.255
Domains on 74.113.45.201
Domain Tools
wcc-assembly.org
This domain is hosted by Intelliwave, LLC (AS25943). The first DNS server is wccb.wcc-coe.org. The current IPv4 address is 74.113.45.201.
Domain Name: WCC-ASSEMBLY.ORG
Registry Domain ID: D103715302-LROR
Registrar WHOIS Server: whois.gandi.net
Registrar Registration Expiration Date:
Registrar: Gandi SAS
Registrar IANA ID: 81
Registry Registrant ID: C155791081-LROR
Registrant Name: Julien Mabillard
Registrant Organization: World Council of Churches
Registrant Street: 7 route des morillons
Registrant City: Geneva
Registrant State/Province:
Registrant Postal Code: 1211
Registrant Country: CH
41.227916666
Registry Registrant ID: C155791081-LROR
Registrant Name: Julien Mabillard
Registrant Organization: World Council of Churches
Registrant Street: 7 route des morillons
Registrant City: Geneva
Registrant State/Province:
Registrant Postal Code: 1211
Registrant Country: CH
contact @ Gandi.net
DNS server (NS records) wccb.wcc-coe.org (194.6.182.164)
wccx.wcc-coe.org (193.73.242.100)
wcct.wcc-coe.org (193.73.242.144)
Mail server (MX records)
IP address (IPv4) 74.113.45.201
IP address (IPv6)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.45.0/24
74.113.45.0 – 74.113.45.255

NetRange: 74.113.40.0 – 74.113.47.255
CIDR: 74.113.40.0/21
NetName: CC-NETWORK
NetHandle: NET-74-113-40-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Intelliwave, LLC (IL-291)
RegDate: 2009-05-01
Updated: 2015-10-30
OrgName: Intelliwave, LLC
OrgId: IL-291
Address: 145 Columbus Ave
Address: Suite 101
City: Athens
StateProv: OH
PostalCode: 45701
Country: US
RegDate: 2015-08-17
Updated: 2018-01-04
OrgNOCHandle: BARNH30-ARIN
OrgNOCName: Barnhart, RC
OrgTechHandle: PISTO9-ARIN
OrgTechName: Pistone, Mike
74.113.45.201 1

NetRange: 74.113.40.0 – 74.113.47.255
CIDR: 74.113.40.0/21
NetName: CC-NETWORK
NetHandle: NET-74-113-40-0-1
Parent: NET74 (NET-74-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Intelliwave, LLC (IL-291)
RegDate: 2009-05-01
Updated: 2015-10-30
OrgName: Intelliwave, LLC
OrgId: IL-291
Address: 145 Columbus Ave
Address: Suite 101
City: Athens
StateProv: OH
PostalCode: 45701
Country: US
RegDate: 2015-08-17
Updated: 2018-01-04
OrgAbuseHandle: BARNH30-ARIN
OrgAbuseName: Barnhart, RC
740-592-0322
intelliwave.com
rbarnhart @ intelliwave.com
OrgTechHandle: PISTO9-ARIN
OrgTechName: Pistone, Mike
937-660-4030
@@@@@@@@@@@@@@@@@@
??????????????
intelliwave.com
This domain is hosted by Intelliwave, LLC (AS25943). The first DNS server is ns68.worldnic.com. The current IPv4 address is 74.113.40.2. The mail server with the highest priority is mx-intelliwave.userservices.net.
v=spf1 ip4:64.98.42.0/24 ip4:64.98.36.17/32
already blocked
include:_spf.hostedemail.com ~al
DNS server (NS records) ns68.worldnic.com (207.204.21.134)
ns67.worldnic.com (207.204.40.134)
Mail server (MX records) mx-intelliwave.userservices.net (64.98.36.4)
IP address (IPv4) 74.113.40.2
IP address (IPv6)
ASN number 25943
ASN name (ISP) Intelliwave, LLC
IP-range/subnet 74.113.40.0/24
74.113.40.0 – 74.113.40.255
Domain Name: INTELLIWAVE.COM
Registry Domain ID: 86032144_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-10-31T18:28:13Z
Creation Date: 2002-04-27T18:07:09Z
Registrar Registration Expiration Date: 2018-04-27T18:07:09Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
800-333-7680
web.com
Registry Registrant ID:
Registrant Name: PERFECT PRIVACY, LLC
Registrant Organization:
Registrant Street: 12808 Gran Bay Parkway West
Registrant City: Jacksonville
Registrant State/Province: FL
Registrant Postal Code: 32258
Registrant Country: US
570-708-8780
networksolutionsprivateregistyration.com

@@@@@@@@@@
pistontech.com
This domain is hosted by Gaslight Media (AS26981). The first DNS server is ns2.gaslightmedia.com. The current IPv4 address is 66.129.42.91. The mail server with the highest priority is mail.gaslightmedia.com.
DNS server (NS records) ns2.gaslightmedia.com (66.129.32.10)
harbor.gaslightmedia.com (66.129.32.1)
Mail server (MX records) mail.gaslightmedia.com (66.129.41.16)
IP address (IPv4) 66.129.42.91
IP address (IPv6)
ASN number 26981
ASN name (ISP) Gaslight Media
IP-range/subnet 66.129.42.0/24
66.129.42.0 – 66.129.42.255
Domain Name: PISTONTECH.COM
Registry Domain ID: 1277351_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-11-08T20:49:22Z
Creation Date: 1998-03-27T05:00:00Z
Registrar Registration Expiration Date: 2021-03-26T04:00:00Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registry Registrant ID:
Registrant Name: River City Enterprises
Registrant Organization: River City Enterprises
Registrant Street: P.O. Box 9365
Registrant City: Peoria
Registrant State/Province: IL
Registrant Postal Code: 61612
Registrant Country: US
309-688-3223
309-688-3258
pistontech.com
Registry Tech ID:
Tech Name: Gaslight Media
Tech Organization: Gaslight Media
Tech Street: 120 E. Lake St.
Tech City: Petoskey
Tech State/Province: MI
Tech Postal Code: 49770-2440
Tech Country: US
231-487-0313
231-487-0692
gaslightmedia.com
This domain is hosted by Gaslight Media (AS26981). The first DNS server is ns0.gaslightmedia.com. The current IPv4 address is 66.129.42.3. The mail server with the highest priority is mx.mailanyone.net.
DNS server (NS records) ns0.gaslightmedia.com (66.129.39.29)
ns2.gaslightmedia.com (66.129.32.10)
harbor.gaslightmedia.com (66.129.32.1)
Mail server (MX records) mx.mailanyone.net (72.35.23.4)
IP address (IPv4) 66.129.42.3
IP address (IPv6)
ASN number 26981
ASN name (ISP) Gaslight Media
IP-range/subnet 66.129.42.0/24
66.129.42.0 – 66.129.42.255
Registry Registrant ID:
Registrant Name: Gaslight Media
Registrant Organization: Gaslight Media
Registrant Street: 120 E. Lake Street
Registrant City: Petoskey
Registrant State/Province: MI
Registrant Postal Code: 49770
Registrant Country: US

@@@@@@@@@@@@@@@@
left off
@@@@@@@@@@@@@@@

v=spf1 ip4:66.129.41.0/24 ip4:72.19.197.39 ip4:66.129.32.0/20
a:gaslightmedia.com
include:spf.mailengine1.com
Domain IPv4 address Ranking Alexa Pagerank
mailengine1.com 66.59.14.78 -1
This domain is hosted by TPx Communications (AS14265). The first DNS server is ns3.ezpublishing.com. The current IPv4 address is 66.59.14.78. The mail server with the highest priority is mail.mailengine1.com.
DNS server (NS records) ns3.ezpublishing.com (72.19.192.30)
ns.ezpublishing.com (72.19.208.20)
ns2.ezpublishing.com (72.19.208.30)
Mail server (MX records) mail.mailengine1.com (66.59.14.78)
IP address (IPv4) 66.59.14.78
IP address (IPv6)
ASN number 14265
ASN name (ISP) TPx Communications
IP-range/subnet 66.59.0.0/19
66.59.0.0 – 66.59.31.255
Registry Registrant ID:
Registrant Name: Dan Forootan
Registrant Organization: EZ Publishing, Inc.
Registrant Street: 1215 21st Street #C
Registrant City: Sacramento
Registrant State/Province: CA
Registrant Postal Code: 95811
Registrant Country: US
530-297-7813
416-535-0123
ezpublishing.com
This domain is hosted by TPx Communications (AS14265). The first DNS server is ns2.ezpublishing.com. The current IPv4 address is 72.19.253.105. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 mx include:spf.ezpublishing.com include:aspmx.googlemail.com include:salesforce.com
ip4:207.126.144.0/20 ip4:64.18.0.0/20 ip4:74.125.148.0/22 include:_spf.google.com ~al
DNS server (NS records) ns2.ezpublishing.com (72.19.208.30)
ns4.ezpublishing.com (72.19.192.31)
ns.ezpublishing.com (72.19.208.20)
ns3.ezpublishing.com (72.19.192.30)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
alt3.aspmx.l.google.com (74.125.23.27)
alt4.aspmx.l.google.com (74.125.135.27)
IP address (IPv4) 72.19.253.105
IP address (IPv6)
ASN number 14265
ASN name (ISP) TPx Communications
IP-range/subnet 72.19.192.0/18
72.19.192.0 – 72.19.255.255

@@@@@@@@@@@@@@
mailengine10.com
. The first DNS server is ns3.ezpublishing.com.
DNS server (NS records) ns3.ezpublishing.com (72.19.192.30)
ns2.ezpublishing.com (72.19.208.30)
ns.ezpublishing.com (72.19.208.20)
ns4.ezpublishing.com (72.19.192.31)
Mail server (MX records)
IP address (IPv4)
IP address (IPv6)
ASN number not available
Registry Registrant ID:
Registrant Name: Dan Forootan
Registrant Organization: EZ Publishing, Inc.
Registrant Street: 1215 21st St #C
Registrant City: Sacramento
Registrant State/Province: CA
Registrant Postal Code: 95811
Registrant Country: US

@@@@@@@@@@@@@@
include:electric.net
This domain is hosted by Savvis (AS16941). The first DNS server is ns1.electric.net. The current IPv4 address is 72.35.12.212. The mail server with the highest priority is electric.net.mx1.electric.net.
v=spf1 redirect=spf.mailanyone.net
Domain IPv4 address Ranking Alexa Pagerank
mailanyone.biz
mailanyone.co.uk 72.249.107.237 0
mailanyone.com 208.73.211.177
mailanyone.net 72.35.23.196 132,058 4
mailanyone.nl 85.12.3.6
mailanyone.org 208.70.128.210
IPv4 routes
Startip Endip Description Country #domains #spamhosts
208.70.128.0 208.70.135.255 MailAnyone.net US 115 2
208.70.128.0 208.70.128.255 MailAnyone.net US 94 2
208.70.129.0 208.70.129.255 MailAnyone.net US 17 0
208.70.134.0 208.70.134.255 MailAnyone.net US 1 0
208.70.135.0 208.70.135.255 MailAnyone.net US 0 0
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 10 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 1
41.221.128.0 41.221.143.255 Net@Net EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 130 12
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 11 2
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 20 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 7 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 54 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 1
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 223 7
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 420 1
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 0
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 1
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 113 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 42 0
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 12 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 0 1
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
93.90.32.0 93.90.47.255 Net By Net Holding LLC RU 15 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 1 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 19 0
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 31 7
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 8 8
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 1
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 0
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 51 1
109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 2 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 18 3
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 1 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:678:604:: 2001:678:604:ffff:ffff:ffff:ffff:ffff PC “Astra-net” UA 0 0
2001:678:608:: 2001:678:608:ffff:ffff:ffff:ffff:ffff QUICK-NET Mariusz Miska PL 0 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 209 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 155 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,417 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 940 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
11236 MailAnyone.net US 2 0 1 0
12714 Net By Net Holding LLC RU 193 2 4,179 80
20911 Net-Surf.net Ltd. BG 28 0 70 4
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 164 1
1618 Daytona Net Works, Inc. US 2 0 250 2
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 8 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 4 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,558 16
3254 Lucky Net Ltd UA 4 0 2,287 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 86,925 8
3931 Logical Net Corporation US 6 0 744 1
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,787 18
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 394 13 33,747 118
5405 CSO.net Internet Services GmbH AT 1 1 3,978 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 598 2
6364 Atlantic.net, Inc. US 47 5 18,937 0
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,775 0 10,969 8
6624 Gower.Net US 3 0 27 0
6735 sdt.net AG DE 6 1 298 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 157 0
7106 Com Net, Inc. US 9 1 953 1
7146 Georgia Business Net, Inc US 2 0 43 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 283 0
7600 Escape.net AU 56 4 516 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 13 0 1,274 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
8001 Net Access Corporation US 39 4 15,157 2
8057 Vision Net, Inc. US 43 1 306 0
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 292 4
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 343 647
Are you looking for IPv4 address 208.70.134.166?

Are you looking for domain mailanyone.net?
DNS server (NS records) ns1.electric.net (192.162.217.3)
ns2.electric.net (72.35.23.2)
ns4.electric.net (192.162.216.2)
ns3.electric.net (72.35.12.2)
Mail server (MX records) electric.net.mx1.electric.net (72.35.12.4)
electric.net.mx2.electric.net (72.35.23.4)
IP address (IPv4) 72.35.12.212
IP address (IPv6)
ASN number 16941
ASN name (ISP) Savvis
IP-range/subnet 72.35.8.0/21
72.35.8.0 – 72.35.15.255
Registry Registrant ID:
Registrant Name: J2 Global Communications inc
Registrant Organization: J2 Global Communications inc
Registrant Street: 6922 HOLLYWOOD BLVD STE 500
Registrant City: HOLLYWOOD
Registrant State/Province: CA
Registrant Postal Code: 90028-6125
Registrant Country: US
323-860-9276
Registry Admin ID:
Admin Name: The Electric Mail Company
Admin Organization: The Electric Mail Company
Admin Street: 300-3999 Henning Drive
Admin City: Burnaby
Admin State/Province: BC
Admin Postal Code: V5C6P9
Admin Country: CA
866-950-5333
604-482-1110

@@@@@@@@@@@@
include:mailanyone.net
This domain is hosted by Savvis (AS16941). The first DNS server is ns3.electric.net. The current IPv4 address is 72.35.23.196. The mail server with the highest priority is mx.mailanyone.net.
v=spf1 redirect=spf.mailanyone.net
DNS server (NS records) ns3.electric.net (72.35.12.2)
ns2.electric.net (72.35.23.2)
ns4.electric.net (192.162.216.2)
ns1.electric.net (192.162.217.3)
Mail server (MX records) mx.mailanyone.net (72.35.23.4)
IP address (IPv4) 72.35.23.196
IP address (IPv6)
ASN number 16941
ASN name (ISP) Savvis
IP-range/subnet 72.35.16.0/21
72.35.16.0 – 72.35.23.255
Domain Name: MAILANYONE.NET
Registrar URL: http://www.godaddy.com
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Name Server: NS1.ELECTRIC.NET
Name Server: NS2.ELECTRIC.NET
Name Server: NS3.ELECTRIC.NET
Name Server: NS4.ELECTRIC.NET
DNSSEC: unsigned
@@@@@@@@@@@@@@@@@@@@@@@@@@
include:fusemail.net
The first DNS server is ns2.electric.net. The current IPv4 address is 208.70.132.198. The mail server with the highest priority is mx.fusemail.net.
v=spf1 redirect=spf.fusemail.net

DNS server (NS records) ns2.electric.net (72.35.23.2)
ns4.electric.net (192.162.216.2)
ns3.electric.net (72.35.12.2)
ns1.electric.net (192.162.217.3)
Mail server (MX records) mx.fusemail.net (72.35.23.4)
IP address (IPv4) 208.70.132.198
IP address (IPv6)
ASN number not available
Domain Name: FUSEMAIL.NET
Registry Domain ID: 99895467_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2015-08-19T18:44:21Z
Creation Date: 2003-06-30T18:41:53Z
Registrar Registration Expiration Date: 2020-10-02T03:59:59Z
Registrar: GoDaddy.com, LLC
Registrar IANA ID: 146
Registry Registrant ID: Not Available From Registry
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Registrant Street: DomainsByProxy.com
Registrant Street: 14455 N. Hayden Road
Registrant City: Scottsdale
Registrant State/Province: Arizona
Registrant Postal Code: 85260
Registrant Country: US
480-624-2598
Registry Admin ID: Not Available From Registry
Admin Name: Registration Private
Admin Organization: Domains By Proxy, LLC
Admin Street: DomainsByProxy.com
Admin Street: 14455 N. Hayden Road
Admin City: Scottsdale
Admin State/Province: Arizona
Admin Postal Code: 85260
Admin Country: US
domainsbyproxy.com
The first DNS server is cns3.secureserver.net. The current IPv4 address is 208.109.6.33. The mail server with the highest priority is smtp.domainsbyproxy.com.
v=spf1 ip4:207.200.21.144/28 ip4:12.151.77.31 ip4:69.64.33.132 ip4:68.233.77.16
ip4:184.168.131.0/24 ip4:173.201.192.0/24 ip4:182.50.132.0/24 ip4:170.146.0.0/16
ip4:174.128.1.0/24 ip4:173.201.193.0/24 include:spf-2.domaincontrol.com -all
DNS server (NS records) cns3.secureserver.net (97.74.97.102)
cns1.secureserver.net (208.109.255.100)
cns2.secureserver.net (216.69.185.100)
Mail server (MX records) smtp.domainsbyproxy.com (68.178.213.203)
IP address (IPv4) 208.109.6.33
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 208.109.6.0/23
208.109.6.0 – 208.109.7.255
Domain Name: DOMAINSBYPROXY.COM
Registrant Organization: Go Daddy Operating Company, LLC
Name Server: CNS1.SECURESERVER.NET
Name Server: CNS2.SECURESERVER.NET
Name Server: CNS3.SECURESERVER.NET
DNSSEC: unsigned

@@@@@@@@@@@@@@@@@@@@@@
re you looking for IPv4 address 205.201.133.57?

Are you looking for domain mcsv.net?
This domain is hosted by Voxel Dot Net, Inc. (AS29791). The first DNS server is pdns177.ultradns.com. The current IPv4 address is 173.231.138.192. The mail server with the highest priority is mail.mcsv.net.
DNS server (NS records) pdns177.ultradns.com (156.154.64.177)
pdns177.ultradns.net (156.154.65.177)
pdns177.ultradns.biz (156.154.66.177)
pdns177.ultradns.org (156.154.67.177)
Mail server (MX records) mail.mcsv.net (205.201.140.51)
IP address (IPv4) 173.231.138.192
173.192.104.145
IP address (IPv6)
ASN number 29791
ASN name (ISP) Voxel Dot Net, Inc.
IP-range/subnet 173.231.128.0/18
173.231.128.0 – 173.231.191.255
Domain Name: mcsv.net
Registry Domain ID: 241860562_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.gandi.net
Registry Registrant ID:
Registrant Name: Sharon Rosenbaum
Registrant Organization: THE ROCKET SCIENCE GROUP LLC
Registrant Street: 675 Ponce De Leon Ave
Suite 5000
Registrant City: Atlanta
Registrant State/Province: Georgia
Registrant Postal Code: 30308
Registrant Country: US
678-999-0141
678-999-0142
678-719-9297

contact. gandi. net
mailchimp.com
This domain is hosted by Akamai International B.V. (AS20940). The first DNS server is a6-66.akam.net. The current IPv4 address is 104.109.66.70. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 include:servers.mcsv.net
include:mail.zendesk.com
include:_spf.google.com
include:mailsenders.netsuite.com
ip4:199.33.145.1 ip4:199.33.145.32
ip4:148.105.0.14 ~all

DNS server (NS records) a6-66.akam.net (23.211.133.66)
a14-66.akam.net (184.26.161.66)
a5-65.akam.net (95.100.168.65)
a1-205.akam.net (193.108.91.205)
a7-66.akam.net (23.61.199.66)
a4-65.akam.net (72.246.46.65)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.68.26)
alt1.aspmx.l.google.com (108.177.14.26)
aspmx3.googlemail.com (74.125.130.27)
aspmx2.googlemail.com (108.177.14.27)
IP address (IPv4) 104.109.66.70
IP address (IPv6)
ASN number 20940
ASN name (ISP) Akamai International B.V.
IP-range/subnet 104.109.64.0/20
104.109.64.0 – 104.109.79.255
Registrant Name: ROCKET SCIENCE GROUP
Registrant Organization: ROCKET SCIENCE GROUP
Registrant Street: 675 PONCE DE LEON AVE NE STE 5000 STE 5000
Registrant City: ATLANTA
Registrant State/Province: GA
Registrant Postal Code: 30308-1884
Registrant Country: US
@@@@@@@@@@@@@@@@@@@@@@@
left off below 532pm
@@@@@@@@@@@@@@@@@@@@@@@
include:servers.mcsv.net ~a
Domain IPv4 address Ranking Alexa Pagerank
mcsv.bid 198.54.117.200
mcsv.ca 184.168.221.34
mcsv.cn 203.78.142.12
mcsv.co 1.1.1.1
mcsv.co.uk
mcsv.com 23.235.197.200
mcsv.com.au 43.241.54.230
mcsv.de 94.102.212.172
mcsv.eu
mcsv.ga 195.20.52.160
mcsv.in 108.48.39.60
mcsv.io 104.28.20.69 -1
mcsv.ir
mcsv.jp 27.94.44.118 -1
mcsv.kr
mcsv.me 184.168.221.59
mcsv.net 173.231.138.192 6
mcsv.nl 149.210.209.199
mcsv.org 34.226.77.200 3
mcsv.pw 220.95.214.254
mcsv.ru 188.225.12.192 1
mcsv.site
mcsv.tokyo 160.16.212.44
mcsv.us
mcsv-hamburg.de 217.160.233.162
mcsv-team.website 104.28.2.221
mcsv1.co.uk
mcsv1.net 69.20.10.84 -1
mcsv10.co.uk
mcsv10.net 207.97.240.174 -1
mcsv100.net 74.63.47.103
mcsv101.net 74.63.47.104
mcsv102.net 74.63.47.105
mcsv103.net 74.63.47.106
mcsv104.net 74.63.47.107
mcsv105.net 74.63.47.108
mcsv106.net 74.63.47.109
mcsv107.net 74.63.47.110 -1
mcsv108.net 74.63.47.111 -1
mcsv109.net 74.63.47.112
mcsv11.co.uk
mcsv11.net 69.20.41.72 -1
mcsv110.net 74.63.47.113
mcsv111.net 74.63.47.114
mcsv112.net 74.63.47.115
mcsv113.net 74.63.47.116 -1
mcsv114.net 74.63.47.117
mcsv115.net 74.63.47.118
mcsv116.net 74.63.47.119 -1
mcsv117.net 74.63.47.120 -1
IPv4 routes
Startip Endip Description Country #domains #spamhosts
41.79.220.0 41.79.223.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 118 1
89.28.160.0 89.28.167.255 KVS Ltd. Service network (Borders, Brases, Hosting servers, SIP servers, Routers e.t.c.) RU 45 1
168.253.216.0 168.253.223.255 Assigned to virtual machines(tenants) running a host of services, varying from mail servers, to media server, web servers, DNS and many other services that require to be available publicly. ZA 4 0
196.44.176.0 196.44.191.255 Assignment to YO!AFRICA Servers for Email, Web Hosting, Cloud Computing, DNS, File servers at the Headquarters Data Centre ZW 978 0
196.46.240.0 196.46.247.255 Published Content Servers i.e VAS Servers , Web, email, DNS, WAP Portal etc NG 27 0
41.79.220.0 41.79.220.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 116 0
89.28.160.0 89.28.163.255 KVS Ltd. Service network (Borders, Brases, Hosting servers, SIP servers, Routers e.t.c.) RU 11 1
94.190.68.0 94.190.71.255 Telematic servers, routers, switches, PPPoE network access servers Sverdlovsk reg. “Interra” Ltd. RU 0 0
94.190.112.0 94.190.127.255 Telematic servers, routers, switches, PPPoE network access servers Sverdlovsk reg. “Interra” Ltd. RU 2 1
168.253.216.0 168.253.219.255 Assigned to virtual machines(tenants) running a host of services, varying from mail servers, to media server, web servers, DNS and many other services that require to be available publicly. ZA 4 0
168.253.220.0 168.253.223.255 Assigned to virtual machines(tenants) running a host of services, varying from mail servers, to media server, web servers, DNS and many other services that require to be available publicly. ZA 0 0
196.44.176.0 196.44.183.255 Assignment to YO!AFRICA Servers for Email, Web Hosting, Cloud Computing, DNS, File servers at the Headquarters Data Centre ZW 912 0
196.44.176.0 196.44.179.255 Assignment to YO!AFRICA Servers for Email, Web Hosting, Cloud Computing, DNS, File servers at the Headquarters Data Centre ZW 881 0
196.44.176.0 196.44.177.255 Assignment to YO!AFRICA Servers for Email, Web Hosting, Cloud Computing, DNS, File servers at the Headquarters Data Centre ZW 874 0
196.46.240.0 196.46.240.255 Published Content Servers i.e VAS Servers , Web, email, DNS, WAP Portal etc NG 0 0
196.223.208.0 196.223.223.255 Assigned to virtual machines(tenants) running a host of services, varying from mail servers, to media server, web servers, DNS and many other services that require to be available publicly. ZA 12 0
103.39.238.0 103.39.239.255 Aus Net Servers Australia Pty Ltd AU 24 0
103.39.248.0 103.39.248.255 Aus Net Servers Australia Pty Ltd AU 0 0
103.243.239.0 103.243.239.255 Aus Net Servers Australia Pty Ltd AU 34 0
169.255.48.0 169.255.51.255 CSS-net Servers TZ 2 0
175.111.176.0 175.111.179.255 Aus Net Servers Australia Pty Ltd AU 0 0
178.157.8.0 178.157.15.255 Turhost.net Cloud Servers Network 8 TR 670 0
185.29.16.0 185.29.19.255 Zabec.net servers SI 1,817 0
185.120.180.0 185.120.183.255 DC-1 Servers NET RU 2 0
213.129.96.0 213.129.127.255 LAN Switch/Servers VORONEZH POP NET # 1 RU 62 0
46.161.10.0 46.161.11.255 business servers and services net RU 2 0
92.243.91.0 92.243.91.255 Net for Hosted exchange, crm, share point portals and OCS servers RU 16 0
103.39.238.0 103.39.238.255 Aus Net Servers Australia Pty Ltd AU 24 0
103.39.239.0 103.39.239.255 Aus Net Servers Australia Pty Ltd AU 0 0
175.111.176.0 175.111.176.255 Aus Net Servers Australia Pty Ltd AU 0 0
175.111.177.0 175.111.177.255 Aus Net Servers Australia Pty Ltd AU 0 0
175.111.178.0 175.111.179.255 Aus Net Servers Australia Pty Ltd AU 0 0
185.29.16.0 185.29.16.255 Zabec.net servers SI 1,538 0
185.120.180.0 185.120.180.255 DC-1 Servers NET RU 2 0
185.120.182.0 185.120.182.255 DC-2 Servers NET RU 0 0
192.36.148.0 192.36.149.255 Prefix reserved for DNS root name server i.root-servers.net. SE 2 0
192.36.148.0 192.36.148.255 Prefix reserved for DNS root name server i.root-servers.net. SE 2 0
193.0.14.0 193.0.15.255 Subnet for k.root-servers.net NL 1 0
193.0.14.0 193.0.14.255 Subnet for k.root-servers.net NL 1 0
194.176.45.0 194.176.45.255 Omnitel consolidation servers NET LT 13 0
213.129.96.0 213.129.103.255 LAN Switch/Servers VORONEZH POP NET # 1 RU 18 0
216.220.0.0 216.220.0.255 Vision Net Inc. – Servers US 0 0
5.45.176.0 5.45.183.255 IP Space for dedicated servers DE 966 0
5.101.152.0 5.101.159.255 Hosting servers RU 84,161 0
5.178.72.0 5.178.79.255 GleSYS Customer servers, Stockholm VBDC SE 815 0
5.199.160.0 5.199.175.255 UAB Cherry Servers LT 3,045 0
23.83.64.0 23.83.71.255 Servers.com B.V. NL 1 0
23.83.112.0 23.83.127.255 Servers.com B.V. NL 0 0
23.106.104.0 23.106.111.255 Servers.com B.V. NL 0 0
23.106.112.0 23.106.119.255 Servers.com B.V. NL 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:df6:9000:: 2001:df6:9000:ffff:ffff:ffff:ffff:ffff Aus Net Servers Australia Pty Ltd AU 0 0
2401:9cc0:: 2401:9cc0:ffff:ffff:ffff:ffff:ffff:ffff Aus Net Servers Australia Pty Ltd AU 0 0
2001:7fe:: 2001:7fe:7fff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2401:9cc0:300:: 2401:9cc0:3ff:ffff:ffff:ffff:ffff:ffff Aus Net Servers Australia Pty Ltd AU 0 0
2001:dc3:: 2001:dc3:ffff:ffff:ffff:ffff:ffff:ffff A Root DNS Servers JP 0 0
2001:4218:: 2001:4218:ffff:ffff:ffff:ffff:ffff:ffff comment = “MTN BS SA Servers” ZA 0 0
2400:8100:: 2400:8100:ffff:ffff:ffff:ffff:ffff:ffff Servers Australia Pty Ltd AU 0 0
2400:8a00:: 2400:8a00:ffff:ffff:ffff:ffff:ffff:ffff Emersion Network for application servers AU 0 0
2400:9c00:: 2400:9c00:ffff:ffff:ffff:ffff:ffff:ffff Co-Location Dedicated Servers Web Hosting AU 9 0
2400:b540:: 2400:b540:ffff:ffff:ffff:ffff:ffff:ffff Cloud Servers Pvt Ltd PK 0 0
2400:d400:: 2400:d400:ffff:ffff:ffff:ffff:ffff:ffff Servers Australia Pty. Ltd AU 53 0
2400:fa80:: 2400:fa80:ffff:ffff:ffff:ffff:ffff:ffff Wombat Servers Pty. Ltd. AU 4 0
2401:d80:: 2401:d80:ffff:ffff:ffff:ffff:ffff:ffff Unmetered Servers Pty Ltd AU 0 0
2401:1f00:: 2401:1f00:ffff:ffff:ffff:ffff:ffff:ffff Rack Servers Pty Ltd AU 25 0
2401:1f01:: 2401:1f01:ffff:ffff:ffff:ffff:ffff:ffff Rack Servers Pty Ltd AU 0 0
2401:f340:: 2401:f340:ffff:ffff:ffff:ffff:ffff:ffff CLOUD SERVERS AUSTRALIA PTY LTD AU 0 0
2402:fa00:: 2402:fa00:ffff:ffff:ffff:ffff:ffff:ffff Dedicated Servers Australia AU 0 0
2403:b800:: 2403:b800:ffff:ffff:ffff:ffff:ffff:ffff Servers Australia Pty Ltd AU 1 0
2404:5300:: 2404:5300:ffff:ffff:ffff:ffff:ffff:ffff Servers Australia Pty Ltd AU 0 0
2406:380:: 2406:380:ffff:ffff:ffff:ffff:ffff:ffff Servers.com Asia Limited HK 0 0
2406:381:: 2406:381:ffff:ffff:ffff:ffff:ffff:ffff Servers.com Asia Limited HK 0 0
2406:5800:: 2406:5800:ffff:ffff:ffff:ffff:ffff:ffff Australian Colocation, Dedicated Servers, Web Hosting AU 0 0
2407:500:: 2407:500:ffff:ffff:ffff:ffff:ffff:ffff Dedicated Servers Australia AU 78 0
2602:fedf:: 2602:fedf:fff:ffff:ffff:ffff:ffff:ffff RDO Servers US 0 0
2604:1740:: 2604:1740:ffff:ffff:ffff:ffff:ffff:ffff Heymman Servers US 0 0
2604:8240:: 2604:8240:ffff:ffff:ffff:ffff:ffff:ffff Servers.com, Inc. US 0 0
2604:84c0:: 2604:84c0:ffff:ffff:ffff:ffff:ffff:ffff Servers.com, Inc. US 0 0
2604:abc0:: 2604:abc0:ffff:ffff:ffff:ffff:ffff:ffff UnReal Servers, LLC US 0 0
2605:4280:: 2605:4280:ffff:ffff:ffff:ffff:ffff:ffff SECURED SERVERS LLC US 0 0
2605:cf80:: 2605:cf80:ffff:ffff:ffff:ffff:ffff:ffff Pacific Servers Inc. CA 230 0
2605:f480:: 2605:f481:ffff:ffff:ffff:ffff:ffff:ffff Servers.com, Inc. US 0 0
2606:1880:: 2606:1880:ffff:ffff:ffff:ffff:ffff:ffff Mean Servers US 70 0
2606:f280:: 2606:f280:ffff:ffff:ffff:ffff:ffff:ffff Heymman Servers US 0 0
2606:fe80:: 2606:fe80:ffff:ffff:ffff:ffff:ffff:ffff Supreme Servers US 0 0
2607:1680:: 2607:1680:ffff:ffff:ffff:ffff:ffff:ffff HA SERVERS, LLC US 0 0
2607:ff00:: 2607:ff00:ffff:ffff:ffff:ffff:ffff:ffff SECURED SERVERS LLC US 0 0
2620:95:8000:: 2620:95:8000:ffff:ffff:ffff:ffff:ffff auth-servers, LLC US 0 0
2a00:1260:: 2a00:1260:ffff:ffff:ffff:ffff:ffff:ffff Atlas Servers (Heron) 1 GB 84 0
2a01:8800:: 2a01:8807:ffff:ffff:ffff:ffff:ffff:ffff BUSINESSCONNECT-DEDICATED-SERVERS-NL NL 175 0
2a01:9400:: 2a01:9400:ffff:ffff:ffff:ffff:ffff:ffff Dediserv Dedicated Servers Sp. z o.o. NL 0 0
2a01:a500:: 2a01:a500:ffff:ffff:ffff:ffff:ffff:ffff UK Dedicated Servers Limited GB 200 0
2a02:b60:: 2a02:b60:ffff:ffff:ffff:ffff:ffff:ffff IQ networks IPv6 Range of Servers in Sulaymaniyah IQ 0 0
2a02:ae00:: 2a02:ae07:ffff:ffff:ffff:ffff:ffff:ffff UAB Cherry Servers LT 0 0
2a03:ca80:: 2a03:ca87:ffff:ffff:ffff:ffff:ffff:ffff OpenITC Infrastructure and servers GB 18 0
2a04:ce80:: 2a04:ce87:ffff:ffff:ffff:ffff:ffff:ffff Simple Servers Ltd GB 2 0
2a05:93c0:: 2a05:93c7:ffff:ffff:ffff:ffff:ffff:ffff Servers.com B.V. NL 21 0
2a05:bec0:: 2a05:bec7:ffff:ffff:ffff:ffff:ffff:ffff Dennis Rainer Warnholz trading as active-servers.com DE 176 0
2a05:c640:: 2a05:c647:ffff:ffff:ffff:ffff:ffff:ffff Nw_Hosting Servers TR 0 0
2a07:4dc0:: 2a07:4dc7:ffff:ffff:ffff:ffff:ffff:ffff King Servers B.V. NL 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
59256 Aus Net Servers Australia Pty Ltd AU 7 2 58 0
7979 Servers.com, Inc. US 79 7 37,871 1
16125 UAB Cherry Servers LT 22 0 19,568 4
19437 SECURED SERVERS LLC US 83 0 4,703 0
20454 SECURED SERVERS LLC US 101 0 288,451 9
23869 NZRS infrastructure for NZ TLD SRS and DNS servers NZ 3 3 0 0
29883 Internet Hosting Servers CA 15 0 572 0
32164 SECURED SERVERS LLC US 2 0 0 0
32413 Epic Servers, LLC US 10 0 143 1
32931 Mean Servers US 7 6 488 0
42831 UK Dedicated Servers Limited GB 121 10 33,901 24
45494 NREN ASN for Misc. Root Servers and Community NP 1 1 1 0
51198 Dream Servers Ltd GB 1 0 3 0
51609 CLICKCLOUD SERVERS LTD GB 18 0 69 0
51783 The Center of Dedicated Servers LLC RU 4 0 3,780 0
56225 Servers Australia Pty Ltd AU 2 0 113 0
58940 Dedicated Servers Australia AU 17 7 3,897 1
61336 Island Servers LTD UA 1 0 0 0
61653 Meta Servers Tecnologia e Telecomunicacaoes Ltda BR 1 0 2 0
63297 Pacific Servers Inc. CA 4 1 637 0
63934 Dedicated Servers Australia AU 1 0 1 0
133100 Dedicated Servers Australia AU 5 0 245 0
133521 Unmetered Servers Pty Ltd AU 1 0 0 0
135107 CLOUD SERVERS AUSTRALIA PTY LTD AU 4 0 169 0
136274 Cloud Servers Pvt Ltd PK 1 1 25 2
197071 Dennis Rainer Warnholz trading as active-servers.com DE 76 8 6,725 4
202905 SHINE SERVERS LLP NL 1 1 1,370 1
205239 Crypto Servers LTD CH 2 0 11 0
205763 Support Servers LLC GB 4 1 166 0
262267 American Servers and Networks, Inc PA 2 0 29 0
265664 KRM Servers SRL AR 4 0 1 0
395451 HostIT Servers US 1 0 3 0
12714 Net By Net Holding LLC RU 193 2 4,179 80
20911 Net-Surf.net Ltd. BG 28 0 70 4
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 164 1
1618 Daytona Net Works, Inc. US 2 0 250 2
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 8 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 4 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,558 16
3254 Lucky Net Ltd UA 4 0 2,287 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 86,925 8
3931 Logical Net Corporation US 6 0 744 1
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,787 18
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0

 




Radio Stew Webb and Tom Heneghan March 23 2018

 

Radio Stew Webb and Tom Heneghan March 23 2018

Intel Update – Tom Heneghan, Stew Webb (3-23-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




SES and SERCO – The Big Secret of the Deep State

Video

 

SES and SERCO – The Big Secret of the Deep State! from Truth Warriors on Vimeo.

 




Wide Open West Finance LLC cyber attacks against Stew Webb Whistleblower

Wide Open West Finance, LLC

By Stew Webb Federal Whistleblower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence implanting malicious codes:

Cyber Terrorism

and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521689567.3

United States Suwanee, United States left http://www.stewwebb.com/category/breaking-news/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521689567.3
3/21/2018 10:32:48 PM (11 hours 43 mins ago)
IP: 24.178.73.154 Hostname: mail.bgc-colsga.org
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; LG-K373 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human
United States Suwanee, United States left http://www.stewwebb.com/category/breaking-news/ and visited http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/…
3/21/2018 10:32:51 PM (11 hours 43 mins ago)
IP: 24.178.73.154 Hostname: mail.bgc-colsga.org
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; LG-K373 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human

United States Suwanee, United States visited http://www.stewwebb.com/category/breaking-news/
3/21/2018 10:32:46 PM (11 hours 43 mins ago)
IP: 24.178.73.154 Hostname: mail.bgc-colsga.org
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; LG-K373 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
IP address 24.178.73.154
Location Buford, Georgia, United States
IP address 24.178.73.154
Reverse DNS (PTR record) mail.bgc-colsga.org
DNS server (NS record) ns3.charter.com (24.176.92.3)
ns1.charter.com (24.217.29.6)
ns4.charter.com (24.176.92.4)
ns2.charter.com (24.217.29.7)
ASN number 20115
ASN name (ISP) Charter Communications
IP-range/subnet 24.178.64.0/20
24.178.64.0 – 24.178.79.255
@@@@@@@@@@@@@@
Domains around 24.178.73.154
IP address #domains
24.178.73.238 1
ddunawaylaw.com
This domain is hosted by Charter Communications (AS20115). The first DNS server is ns61.worldnic.com. The current IPv4 address is 24.178.73.238. The mail server with the highest priority is remote.ddunawaylaw.com.
DNS server (NS records) ns61.worldnic.com (207.204.40.131)
ns62.worldnic.com (207.204.21.131)
Mail server (MX records) remote.ddunawaylaw.com (24.178.73.238)
mail.ddunawaylaw.com (24.178.73.238)
IP address (IPv4) 24.178.73.238
IP address (IPv6)
ASN number 20115
ASN name (ISP) Charter Communications
IP-range/subnet 24.178.64.0/20
24.178.64.0 – 24.178.79.255
@@@@@@@@@@@@@@@@@@
Registry Registrant ID:
Registrant Name: David Dunaway Attorney
Registrant Organization: David Dunaway Attorney
Registrant Street: 212 W MAIN ST
Registrant City: THOMASTON
Registrant State/Province: GA
Registrant Postal Code: 30286-3557
Registrant Country: US
706-647-5466
designsoftinc.com
This domain is hosted by Public Service Data, Inc. (AS53959). The first DNS server is ns60.worldnic.com. The current IPv4 address is 64.178.249.191. The mail server with the highest priority is mail.designsoftinc.com.
DNS server (NS records) ns60.worldnic.com (207.204.21.130)
ns59.worldnic.com (207.204.40.130)
Mail server (MX records) mail.designsoftinc.com (64.178.249.191)
IP address (IPv4) 64.178.249.191
IP address (IPv6)
ASN number 53959
ASN name (ISP) Public Service Data, Inc.
IP-range/subnet 64.178.249.0/24
64.178.249.0 – 64.178.249.255
Registry Registrant ID:
Registrant Name: Camp, Morgan
Registrant Organization: Designsoft.com, Inc.
Registrant Street: 2 OLD MINOR RD
Registrant City: CULLODEN
Registrant State/Province: GA
Registrant Postal Code: 31016
Registrant Country: US
478-836-4796
Admin Name: Camp, Clare
Admin Organization: designsoftinc.com
Admin Street: 2 Old minor Rd.
Admin City: Culloden
Admin State/Province: GA
Admin Postal Code: 31016
Admin Country: US
Admin Phone: (912) 836-4796
Admin Phone Ext:
Admin Fax: 999 999 9999
Admin Fax Ext:
Registry Tech ID:
Tech Name: Website Hosting Provider
Tech Organization: Website Hosting Provider
Tech Street: Network Operations Center
Tech City: Kansas City
Tech State/Province: MO
Tech Postal Code: 64171
Tech Country: US
Tech Phone:
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
hosting4u.net
It is not listed in the DMOZ directory. This domain is hosted by Cogeco Peer 1 (AS13768). The first DNS server is ns.hosting4u.net. The current IPv4 address is 209.15.51.59. The mail server with the highest priority is mx-s.myregisteredsite.com.
DNS server (NS records) ns.hosting4u.net (207.204.40.38)
ns2.hosting4u.net (207.204.21.38)
ns3.hosting4u.net (207.204.21.38)
Mail server (MX records) mx-s.myregisteredsite.com (205.178.149.7)
IP address (IPv4) 209.15.51.59
IP address (IPv6)
ASN number 13768
ASN name (ISP) Cogeco Peer 1
IP-range/subnet 209.15.48.0/22
209.15.48.0 – 209.15.51.255
Domain Name: hosting4u.net
Registry Domain ID: 1224962_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.register.com
Registry Registrant ID:
Registrant Name: Domains Support
Registrant Organization: Web.com Group, Inc.
Registrant Street: 303 Peachtree Center Ave. Suite 500
Registrant City: Atlanta
Registrant State/Province: GA
Registrant Postal Code: 30303
Registrant Country: US
404-260-2477
Registry Tech ID:
Tech Name: Domain Manager
Tech Organization: Web.com Group, Inc.
Tech Street: 12808 Gran Bay Parkway West
Tech City: Jacksonville
Tech State/Province: FL
Tech Postal Code: 32258
Tech Country: US
904-680-6600
904-488-0350
interland.com
This domain is hosted by Cogeco Peer 1 (AS13768). The first DNS server is a.ns.interland.net. The current IPv4 address is 64.226.3.151. The mail server with the highest priority is mx.registeredsite.com.
DNS server (NS records) a.ns.interland.net (207.204.40.32)
b.ns.interland.net (207.204.21.32)
c.ns.interland.net (207.204.21.32)
Mail server (MX records) mx.registeredsite.com (209.17.115.10)
IP address (IPv4) 64.226.3.151
IP address (IPv6)
ASN number 13768
ASN name (ISP) Cogeco Peer 1
IP-range/subnet 64.226.0.0/16
64.226.0.0 – 64.226.255.255
Registry Registrant ID:
Registrant Name: Domain Manager
Registrant Organization: Web.com Group, Inc.
Registrant Street: 12808 Gran Bay Parkway West
Registrant City: Jacksonville
Registrant State/Province: FL
Registrant Postal Code: 32258
Registrant Country: US
Registry Tech ID:
Tech Name: Domain Manager
Tech Organization: Web.com Group, Inc.
Tech Street: 12808 Gran Bay Parkway West
Tech City: Jacksonville
Tech State/Province: FL
Tech Postal Code: 32258
Tech Country: US
CSR-CORP.COM
This domain is hosted by Tucows.com Co. (AS15348). The first DNS server is ns1.mdnsservice.com. The current IPv4 address is 216.40.47.17. The mail server with the highest priority is inbound.homesteadmail.co
DNS server (NS records) ns1.mdnsservice.com (216.40.47.18)
ns3.mdnsservice.com (64.99.96.34)
ns2.mdnsservice.com (64.98.148.11)
Mail server (MX records) inbound.homesteadmail.com (108.167.135.80)
IP address (IPv4) 216.40.47.17
IP address (IPv6)
ASN number 15348
ASN name (ISP) Tucows.com Co.
IP-range/subnet 216.40.47.0/24
216.40.47.0 – 216.40.47.255
Registry Registrant ID:
Registrant Name: Kimberly Fiato
Registrant Organization: null
Registrant Street: 401 Warren Road
Registrant City: Mohawk
Registrant State/Province: NY
Registrant Postal Code: 13407
Registrant Country: US
315-868-9811
Registry Tech ID:
Tech Name: Domain Admin
Tech Organization: Intuit Websites
Tech Street: 2632 Marine Way
Tech City: Mountain View
Tech State/Province: CA
Tech Postal Code: 94043
Tech Country: US
800-428-3170
homestead-inc.com
This domain is hosted by CyrusOne LLC (AS20013). The first DNS server is eeney.homestead.com. The current IPv4 address is 108.167.135.50. The mail server with the highest priority is mail.hs-support.homestead-inc.com.
v=spf1 a mx ip4:108.167.135.0/24 ip4:208.66.206.15
ip4:216.40.35.246 ip4:216.40.35.247 ip4:216.40.35.248
ip4:108.167.135.0/24 ip4:204.236.129.192 ip4:54.226.18.15
ip4:38.113.1.23 ip4:65.254.224.15 ip4:66.96.128.88/29 -al
DNS server (NS records) eeney.homestead.com (108.167.135.10)
meeney.homestead.com (108.167.135.137)
Mail server (MX records) mail.hs-support.homestead-inc.com (108.167.135.136)
IP address (IPv4) 108.167.135.50
IP address (IPv6)
ASN number 20013
ASN name (ISP) CyrusOne LLC
IP-range/subnet 108.167.132.0/22
108.167.132.0 – 108.167.135.255
Registry Registrant ID:
Registrant Name: Domain Admin
Registrant Organization: Homestead Technologies, Inc.
Registrant Street: 10 Corporate Drive Suite 300
Registrant City: Burlington
Registrant State/Province: MA
Registrant Postal Code: 01803
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
360-449-5900
endurance.com
This domain is hosted by CyrusOne LLC (AS20013). The first DNS server is ns-1197.awsdns-21.org. The current IPv4 address is 192.185.178.17. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 mx ip4:38.113.1.0/24 ip4:38.113.20.0/24 ip4:65.254.224.0/19
ip4:66.96.184.0/21 ip4:50.201.183.56/29 ip4:63.149.124.56/29
ip4:65.98.162.72 ip4:65.123.29.213/28 ip4:108.179.194.145
include:_spf.google.com include:mailgun.org -a
DNS server (NS records) ns-1197.awsdns-21.org (205.251.196.173)
ns-1868.awsdns-41.co.uk (205.251.199.76)
ns-667.awsdns-19.net (205.251.194.155)
ns-81.awsdns-10.com (205.251.192.81)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt1.aspmx.l.google.com (108.177.14.26)
alt2.aspmx.l.google.com (74.125.68.26)
alt3.aspmx.l.google.com (74.125.23.27)
alt4.aspmx.l.google.com (74.125.135.27)
IP address (IPv4) 192.185.178.17
IP address (IPv6)
ASN number 20013
ASN name (ISP) CyrusOne LLC
IP-range/subnet 192.185.128.0/18
192.185.128.0 – 192.185.191.255
Registry Registrant ID:
Registrant Name: Domain Manager
Registrant Organization: The Endurance International Group, Inc.
Registrant Street: 10 Corporate Drive Suite 300
Registrant City: Burlington
Registrant State/Province: MA
Registrant Postal Code: 01803
Registrant Country: US
mail.ddunawaylaw.com
Are you looking for IPv4 address 24.178.73.238?

Are you looking for domain ddunawaylaw.com?
Domains
Domain IPv4 address Ranking Alexa Pagerank
ddunawaylaw.com 24.178.73.238
IPv4 routes
Startip Endip Description Country #domains #spamhosts
5.61.232.0 5.61.239.255 Mail.Ru RU 26 0
31.217.232.0 31.217.239.255 Internet Subnet for IMS (DNS server, Mail server etc) FR 0 0
41.77.224.0 41.77.231.255 Assigned to mail /dns servers TZ 4 0
62.100.224.0 62.100.255.255 ISP Web/mail/ftp servers and core routers network HU 262 0
62.149.128.0 62.149.159.255 Aruba S.p.A. – Shared Hosting and Mail services IT 854,462 1
79.137.174.0 79.137.175.255 Mail.Ru RU 6 0
89.34.236.0 89.34.239.255 TARGET MAIL SRL-D RO 29 1
89.250.176.0 89.250.191.255 Routers, DNS,Mail NL 364 0
91.92.116.0 91.92.119.255 Mail-Maker Service Network BG 0 0
91.92.160.0 91.92.163.255 Mail-Maker Service Network BG 0 0
91.190.168.0 91.190.175.255 SPLIO-MAIL FR 141 0
91.220.26.0 91.220.26.255 MEDIAPOST HIT MAIL SA RO 52 0
94.100.176.0 94.100.191.255 Mail.Ru RU 114 0
94.126.48.0 94.126.55.255 Static IP from web-mail-servers Webservice.be BE 2,973 0
95.163.32.0 95.163.63.255 Limited liability company Mail.Ru RU 2 0
103.20.232.0 103.20.233.255 Private Mail Box 9103 VU 7 0
116.66.224.0 116.66.231.255 ISP Services, Monitoring, Web, Mail, FTP, DNS AU 76 0
128.140.168.0 128.140.175.255 Mail.Ru RU 32 0
141.105.16.0 141.105.23.255 Dreamlab.pl – Mail Service PL 6 0
144.87.0.0 144.87.255.255 Royal Mail Group Limited GB 7 0
147.77.0.0 147.77.255.255 Royal Mail Group Limited GB 0 0
147.119.0.0 147.119.255.255 Royal Mail Group Limited GB 0 0
163.169.0.0 163.169.255.255 Royal Mail Group Limited GB 0 0
168.253.216.0 168.253.223.255 Assigned to virtual machines(tenants) running a host of services, varying from mail servers, to media server, web servers, DNS and many other services that require to be available publicly. ZA 4 0
176.32.208.0 176.32.223.255 Public Services, Vps, SSL Cert., Mail, Routers, Domains DE 1 0
185.5.136.0 185.5.139.255 Mail.Ru RU 5 0
185.6.244.0 185.6.247.255 Mail.Ru RU 1 0
185.16.148.0 185.16.151.255 Mail.Ru LLC RU 2 0
185.52.148.0 185.52.151.255 Mail Minion Ltd US 0 0
188.94.32.0 188.94.39.255 First ISP infrastructure (dns, mail, ftp) domolan netblock RU 6 1
192.33.18.0 192.33.18.255 Mail America Communications, Inc US 2 0
192.108.1.0 192.108.1.255 Lotus/cc:Mail US 1 0
192.109.18.0 192.109.18.255 PFM News & Mail Mainz, Mainz DE 0 0
192.147.45.0 192.147.45.255 MCI Mail Operations US 0 0
193.28.204.0 193.28.204.255 # In caes of Mail-Abuse please contact AT 51 0
193.201.172.0 193.201.172.255 MAIL.BG Ssc BG 37 0
194.42.108.0 194.42.109.255 K – Mail Order GmbH & Co. KG DE 972 0
195.8.160.0 195.8.191.255 Your Communications Customer Mail Services GB 189 0
195.211.20.0 195.211.23.255 Limited liability company Mail.Ru RU 22 0
195.211.128.0 195.211.131.255 Mail.RU Games, LLC RU 203 0
196.192.64.0 196.192.71.255 Mail servers and IP address assigned to all equipment in Head Office MU 18 0
199.175.137.0 199.175.137.255 The Electric Mail Company CA 2 0
199.198.128.0 199.198.135.255 The Globe and Mail CA 1 0
199.198.136.0 199.198.139.255 The Globe and Mail CA 14 0
199.246.60.0 199.246.63.255 The Globe and Mail CA 36 0
199.246.64.0 199.246.71.255 The Globe and Mail CA 4 0
199.249.186.0 199.249.186.255 Print Mail Systems, Inc. US 0 0
202.53.8.0 202.53.15.255 Core Infra ���¢�������� DNS, Web, Mail, KVM, Database IN 53 3
202.74.240.0 202.74.247.255 DNS, Proxy, Mail, SMTP, WWW at Gulshan NOC BD 34 11
203.2.192.0 203.2.195.255 OZ-E-MAIL Pty Ltd AU 20 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:480:: 2001:678:480:ffff:ffff:ffff:ffff:ffff IPv6 range Erwin Mueller Mail Order Solutions GmbH DE 0 0
2001:678:498:: 2001:678:498:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:49c:: 2001:678:49c:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:4a0:: 2001:678:4a0:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:4a4:: 2001:678:4a4:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:67c:660:: 2001:67c:660:ffff:ffff:ffff:ffff:ffff K-Mail Order GmbH & Co.KG DE 0 0
2001:67c:16b8:: 2001:67c:16b8:ffff:ffff:ffff:ffff:ffff MAIL.BG Ssc BG 1 0
2001:67c:27c0:: 2001:67c:27c0:ffff:ffff:ffff:ffff:ffff Creator-Mail Limited GB 0 0
2001:df0:7e:: 2001:df0:7e:ffff:ffff:ffff:ffff:ffff Mail Marketing & Telemarketing Solutions Pty Ltd AU 0 0
2a00:1148:: 2a00:114f:ffff:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 7 0
2a00:1148:: 2a00:1148:ffff:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 7 0
2a00:1148:5:: 2a00:1148:5:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 0 0
2a02:120:2:: 2a02:120:2:ffff:ffff:ffff:ffff:ffff UNET Mail platform NL 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
10808 The Globe and Mail CA 6 0 51 0
21051 Limited liability company Mail.Ru RU 15 1 205 0
23322 Print Mail Systems, Inc. US 1 0 0 0
25166 MAIL.BG Ssc BG 1 1 37 0
36362 Mail America Communications, Inc US 1 0 2 0
47764 Limited liability company Mail.Ru RU 23 4 1,238 0
51286 Limited liability company Mail.Ru RU 1 0 0 0
51654 MEDIAPOST HIT MAIL SA RO 1 0 52 0
60863 Limited liability company Mail.Ru RU 2 0 1 0
205482 Direct Mail LLC RU 1 0 2 0

remote.ddunawaylaw.com
Domain IPv4 address Ranking Alexa Pagerank
ddunawaylaw.com 24.178.73.238
IPv4 routes
Startip Endip Description Country #domains #spamhosts
46.235.88.0 46.235.95.255 Remote Users OFFNET IPSec SA 10 1
79.171.32.0 79.171.39.255 Remote Management IPs GB 3,223 0
94.199.72.0 94.199.79.255 Remote unit in Mirnyi city CJSC “COMSTAR-Regiony” RU 5 0
109.71.184.0 109.71.191.255 satfa remote customers NL 0 0
176.126.195.0 176.126.195.255 Global Remote Services SRL RO 0 0
185.14.240.0 185.14.243.255 Network Remote 24 SE 68 0
192.75.212.0 192.75.212.255 Atlantic Center for Remote Sensing of Oceans CA 0 0
192.101.78.0 192.101.78.255 Remote Sensing Systems US 0 0
192.108.0.0 192.108.0.255 Arc Remote Communications US 3 0
192.156.151.0 192.156.151.255 EARTH REMOTE SENSING ANALYSIS CENTER (ERSDAC) JP 0 0
192.188.102.0 192.188.102.255 Remote Switch Systems US 0 0
198.176.181.0 198.176.181.255 Remote Access Systems US 0 0
202.173.24.0 202.173.31.255 Citrix Online, ASP for remote access services AU 0 0
203.134.250.0 203.134.251.255 KRYPTOS,Remote Infrastructure Management IN 11 0
12.204.66.0 12.204.67.255 AGNS – REMOTE ACCESS AKA ATT CORP. US 0 0
12.204.66.0 12.204.66.255 AGNS – REMOTE ACCESS AKA ATT CORP. US 0 0
12.204.67.0 12.204.67.255 AGNS – REMOTE ACCESS AKA ATT CORP. US 0 0
46.235.88.0 46.235.88.255 Remote Users OFFNET IPSec SA 0 0
62.117.33.0 62.117.33.255 AFMIC Remote sites VPN Connections EG 0 0
62.117.34.0 62.117.34.255 AFMIC Remote sites VPN Connections EG 0 0
62.117.35.0 62.117.35.255 AFMIC Remote sites VPN Connections EG 0 0
62.117.36.0 62.117.36.255 AFMIC Remote sites VPN Connections EG 0 0
62.117.37.0 62.117.37.255 AFMIC Remote sites VPN Connections EG 0 0
62.117.38.0 62.117.38.255 AFMIC Remote sites VPN Connections EG 0 0
62.117.39.0 62.117.39.255 AFMIC Remote sites VPN Connections EG 0 0
77.93.104.0 77.93.107.255 Remote unit in Mirnyi city of RU 0 0
77.93.108.0 77.93.109.255 Remote unit in Mirnyi city of RU 0 0
81.8.24.0 81.8.24.255 Koc.Net Remote Access Services TR 0 0
81.8.52.0 81.8.55.255 Koc.Net Remote Access Services (GPRS) TR 0 0
81.8.70.0 81.8.70.255 Koc.Net Remote Access Services TR 0 0
83.247.128.0 83.247.128.255 Remote Acces Presidential Department ES 20 0
83.247.129.0 83.247.129.255 Remote Acces Trade, Tourism and Consumer Affairs ES 163 0
83.247.130.0 83.247.130.255 Remote Access Education Ministrie ES 21 0
83.247.131.0 83.247.131.255 Remote Access Justice Ministrie ES 2 0
83.247.133.0 83.247.133.255 Remote Access Universities, Research and the Information Society Ministrie ES 0 0
83.247.134.0 83.247.134.255 Remote Access Agriculture, Livestock and Fisheries Ministrie ES 0 0
83.247.135.0 83.247.135.255 Remote Access Culture Ministrie ES 11 0
83.247.136.0 83.247.136.255 Remote Acces Governance and Public Administration Ministrie ES 0 0
83.247.137.0 83.247.137.255 Remote Access Environment and Housing Ministrie ES 6 0
83.247.138.0 83.247.138.255 Remote Access Health and Social Security Ministrie ES 17 0
83.247.139.0 83.247.139.255 Remote Access Social Welfare and Family Affairs Ministrie ES 0 0
83.247.141.0 83.247.141.255 Remote Access Home Affairs Ministrie ES 0 0
94.125.84.0 94.125.87.255 Summary (WiFi, Public Remote Services, Public Links) IT 0 0
94.199.72.0 94.199.73.255 Remote unit in Mirnyi city CJSC “COMSTAR-Regiony” RU 0 0
103.23.206.0 103.23.206.255 MAYA Remote District Client BD 0 0
103.225.38.0 103.225.38.255 BlackFiber customer Remote Staff PH 0 0
109.71.184.0 109.71.184.255 satfa remote customers NL 0 0
109.71.185.0 109.71.185.255 satfa remote customers NL 0 0
109.71.186.0 109.71.186.255 satfa remote customers NL 0 0
109.71.187.0 109.71.187.255 satfa remote customers NL 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
17830 Kryptos Networks , Remote Infrastructure Management Services IN 1 0 1 0
23703 RigNet, Communication to remote locations in Asia/Pacific. SG 1 1 0 0
59334 BlackFiber customer Remote Staff PH 1 0 0 0
62335 Global Remote Services S.R.L. RO 1 0 0 0
@@@@@@@@@@@
??????????
Domains around 24.178.73.238
IP address #domains
24.178.73.238 1
24.178.73.242 3
IP address 24.178.73.242
Location Buford, Georgia, United States

@@@@@@@@@@@@@@@
?????????????
Domains on 24.178.73.242
Domain Tools

usblindsupply.com
This domain is hosted by Charter Communications (AS20115). The first DNS server is ns44.domaincontrol.com. The current IPv4 address is 24.178.73.242. The mail server with the highest priority is usblindsupply-com.mail.protection.outlook.com.
v=spf1 include:spf.protection.outlook.com -all
DNS server (NS records) ns44.domaincontrol.com (208.109.255.22)
ns43.domaincontrol.com (216.69.185.22)
Mail server (MX records) usblindsupply-com.mail.protection.outlook.com (207.46.163.74)
IP address (IPv4) 24.178.73.242
IP address (IPv6)
ASN number 20115
ASN name (ISP) Charter Communications
IP-range/subnet 24.178.64.0/20
24.178.64.0 – 24.178.79.255
Registrant Organization:
Registrant Street: 764 Brogdon Rd
Registrant City: Suwanee
Registrant State/Province: Georgia
Registrant Postal Code: 30024
Registrant Country: US

cigmablinds.com
This domain is hosted by Charter Communications (AS20115). The first DNS server is ns16.domaincontrol.com. The current IPv4 address is 24.178.73.242. The mail server with the highest priority is cigmablinds-com.mail.protection.outlook.com.
DNS server (NS records) ns16.domaincontrol.com (208.109.255.8)
ns15.domaincontrol.com (216.69.185.8)
Mail server (MX records) cigmablinds-com.mail.protection.outlook.com (216.32.180.10)
IP address (IPv4) 24.178.73.242
IP address (IPv6)
ASN number 20115
ASN name (ISP) Charter Communications
IP-range/subnet 24.178.64.0/20
24.178.64.0 – 24.178.79.255
Registry Registrant ID:
Registrant Name: HOJIN KIM
Registrant Organization: BLUE COMPUTER & NETWORK SERVICES
Registrant Street: 2550 PLEASANT HILL RD SUITE 122
Registrant City: DULUTH
Registrant State/Province: GA
Registrant Postal Code: 30096
Registrant Country: US
770-418-2833
bluecomga.com
This domain is hosted by Unified Layer (AS46606). The first DNS server is ns34.domaincontrol.com. The current IPv4 address is 192.254.251.129. The mail server with the highest priority is bluecomga-com.mail.protection.outlook.com.
v=spf1 include:spf.protection.outlook.com -all
DNS server (NS records) ns34.domaincontrol.com (208.109.255.17)
ns33.domaincontrol.com (216.69.185.17)
Mail server (MX records) bluecomga-com.mail.protection.outlook.com (207.46.163.74)
IP address (IPv4) 192.254.251.129
IP address (IPv6)
ASN number 46606
ASN name (ISP) Unified Layer
IP-range/subnet 192.254.248.0/22
192.254.248.0 – 192.254.251.255
Registry Registrant ID:
Registrant Name: HOJIN KIM
Registrant Organization: NONSIL GROUP INC
Registrant Street: 2550 PLEASANT HILL RD SUITE 122
Registrant City: DULUTH
Registrant State/Province: GA
Registrant Postal Code: 30096
Registrant Country: US
Registrant Phone: removed phone number
Registrant Phone Ext.:
Registrant Fax:
Registrant Fax Ext.:
cigmablind.com

OrgName: Charter Communications
OrgId: CC04
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate:
Updated: 2018-03-07
720-699-4852
314-288-3111

mail.bgc-colsga.org
Are you looking for IPv4 address 24.214.101.216?
IP address 24.214.101.216
Location Columbus, Georgia, United States
IP address 24.214.101.216
Reverse DNS (PTR record) static-24-214-101-216.knology.net
DNS server (NS record) dns2.knology.net (24.214.63.67)
dns1.knology.net (24.214.63.66)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
Domains around 24.214.101.216
IP address #domains
24.214.101.63 1
IP address 24.214.101.63
Reverse DNS (PTR record) static-24-214-101-63.knology.net
DNS server (NS record) dns2.knology.net (24.214.63.67)
dns1.knology.net (24.214.63.66)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
@@@@@@@@@@
?????????????
Domains on 24.214.101.63
Domain Tools
brokenarrowland.net
Mail servers on 24.214.101.63
mail.brokenarrowland.net
Are you looking for IPv4 address 24.214.101.63?
left off

Are you looking for domain brokenarrowland.net?
It is not listed in the DMOZ directory. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is ns91.worldnic.com. The current IPv4 address is 24.214.101.63. The mail server with the highest priority is mail.brokenarrowland.net.
DNS server (NS records) ns91.worldnic.com (207.204.40.146)
ns92.worldnic.com (207.204.21.146)
Mail server (MX records) mail.brokenarrowland.net (24.214.101.63)
IP address (IPv4) 24.214.101.63
208.91.197.27
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
Domain Name: BROKENARROWLAND.NET
Registry Domain ID: 70494353_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registry Registrant ID:
Registrant Name: Street-Tek, INC
Registrant Organization: Street-Tek, INC
Registrant Street: 3409 IDLE HOUR DR
Registrant City: PHENIX CITY
Registrant State/Province: AL
Registrant Postal Code: 36867-2748
Registrant Country: US
706-718-3883
ed @ street-tek com
street-tek.com
This domain is hosted by Cyber Wurx LLC (AS22653). The first DNS server is ns2.simplyaquatics.com. The current IPv4 address is 69.61.29.250. The mail server with the highest priority is spanky.street-tek.com.
v=spf1 a mx ip4:69.61.29.250
mx:spanky.street-tek.com ~al
Domain IPv4 address Ranking Alexa Pagerank
street-tek.com 69.61.29.250
IPv4 routes
@@@@@@@@@@@@@@@
Left off these emails Friday march 23 2018
cloud below
Startip Endip Description Country #domains #spamhosts
185.77.32.0 185.77.35.255 Si.TEK Informatica Srl IT 1,114 4
185.160.52.0 185.160.55.255 SARL IT’TEK FR 4 0
195.66.71.0 195.66.71.255 Communication Technologies COM TEK LLC RU 0 0
199.79.201.0 199.79.201.255 Aule-Tek, Inc. US 0 0
204.77.185.0 204.77.185.255 Tek Industries, Inc. US 0 0
205.210.28.0 205.210.28.255 REZ-TEK CA 0 0
205.210.185.0 205.210.185.255 G-Tek Consulting CA 0 0
209.182.248.0 209.182.249.255 Fi-Tek LLC US 2 0
88.255.190.0 88.255.190.255 SAHIBINDEN BILGI TEK.PAZ. VE TIC. A.S. TR 0 0
176.53.42.0 176.53.42.255 Inveon Bilgi Tek. Dan. Ve Tic. As TR 174 0
184.175.149.0 184.175.149.255 J W TEK, LLC US 0 0
185.77.32.0 185.77.32.255 Si.TEK Informatica Srl IT 1,114 3
185.77.33.0 185.77.33.255 Si.TEK Informatica Srl IT 0 0
185.77.34.0 185.77.34.255 Si.TEK Informatica Srl IT 0 1
185.77.35.0 185.77.35.255 Si.TEK Informatica Srl IT 0 0
185.195.253.0 185.195.253.255 AY TELEKOMINIKASYONBILGISAYAR ILT.BILG.BIL.TEK.ITH.IH.LTD.STI TR 0 2
206.246.77.0 206.246.77.255 FIBERLINK TEK, LLC US 0 0
209.182.248.0 209.182.248.255 Fi-Tek LLC US 2 0
209.182.249.0 209.182.249.255 Fi-Tek LLC US 0 0
216.134.218.0 216.134.219.255 K.Tek Systems, Inc. US 396 0
103.28.73.0 103.28.73.255 Street Street Global Markets (Japan) JP 0 0
103.241.104.0 103.241.104.255 Street Street Global Markets (Japan) JP 0 0
23.155.64.0 23.155.64.255 Bruce Street Technologies Limited CA 0 0
27.54.120.0 27.54.123.255 House # 39 Street 38 F10 /4 PK 0 0
27.113.240.0 27.113.247.255 Shop 8-14 Middleton Street AU 15 0
27.123.228.0 27.123.231.255 flat B,6/F./ Teda Building,87 Wing Lok Street HK 0 0
41.79.192.0 41.79.195.255 Bree Street Server IP’s /28 ZA 17 0
42.83.84.0 42.83.87.255 Plot No 181-186 Street PK 3 0
43.224.28.0 43.224.31.255 FLAT E 3/F,.PO CHEONG BUILDING,148-154 NAM CHEONG STREET HK 29 0
43.225.84.0 43.225.87.255 12/F, Metropolis Tower, No.2, Haidian North 1st Street CN 0 0
43.229.120.0 43.229.123.255 Shenzhen Longhua District City Dalang Street 712 CN 2,547 0
43.229.152.0 43.229.155.255 Unit 3203-4, No.69 Jervois Street, Sheung Wan,Hong Kong HK 3,097 1
43.230.112.0 43.230.115.255 No.103 Sai Yeung Choi Street south,Monkok, Kowloon,HongKong HK 8,562 0
43.242.184.0 43.242.187.255 143, CECIL STREET #16-04 Singapore 069542 SG 0 0
43.243.188.0 43.243.191.255 5-18-34 No.66 Yuanshi Street Hightech District of Ningbo CN 1,692 2
43.245.8.0 43.245.11.255 Plot No 181-186 Street No. 2, I-9/2 Industrial Area PK 0 5
43.252.176.0 43.252.179.255 SunnyVision Limited Internet Service Provider, Hong Kong Room 604, WellTech Centre Pat Tat Street, San Po Kong HK 70 0
45.64.68.0 45.64.71.255 317 Edward Street AU 0 0
46.48.128.0 46.48.255.255 Sakhatelecom, Kurashova Street, 22 RU 15 8
49.0.28.0 49.0.31.255 501 Gloucester Street NZ 5 0
52.144.58.0 52.144.58.255 Second Street US 0 0
74.204.192.0 74.204.255.255 State Street Global Markets LLC. US 0 0
80.73.64.0 80.73.79.255 Sakhatelecom, Kurashova Street, 22 RU 182 2
80.73.80.0 80.73.95.255 Sakhatelecom, Kurashova Street, 22 RU 13 2
88.84.128.0 88.84.159.255 5 Wall Street DE 1,068 0
91.185.224.0 91.185.255.255 Sakhatelecom, Kurashova Street, 22 RU 27 2
91.194.42.0 91.194.43.255 Castlewood House, 77-91 New Oxford Street, GB 3 0
91.229.92.0 91.229.92.255 State Street Bank and Trust Company GB 0 0
91.230.38.0 91.230.39.255 Charless Street Communications Ltd. GB 17 0
91.237.74.0 91.237.75.255 Charles Street Solutions Ltd GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2620:14:6000:: 2620:14:6000:ffff:ffff:ffff:ffff:ffff Tek-IT CA 0 0
2a05:6080:: 2a05:6087:ffff:ffff:ffff:ffff:ffff:ffff Si.TEK Informatica Srl IT 0 0
2001:df0:94:: 2001:df0:94:ffff:ffff:ffff:ffff:ffff 1 Francis Street NZ 0 0
2001:df0:97:: 2001:df0:97:ffff:ffff:ffff:ffff:ffff 97 – 99 Goulburn Street AU 0 0
2001:df0:20e:: 2001:df0:20e:ffff:ffff:ffff:ffff:ffff 137 Adderley Street AU 0 0
2001:df0:228:: 2001:df0:228:ffff:ffff:ffff:ffff:ffff 2 Murray Street AU 0 0
2001:df0:233:: 2001:df0:233:ffff:ffff:ffff:ffff:ffff 55 Bourke Street AU 0 0
2001:df0:267:: 2001:df0:267:ffff:ffff:ffff:ffff:ffff 16 – 20 Claremont Street AU 0 0
2001:df0:27d:: 2001:df0:27d:ffff:ffff:ffff:ffff:ffff 4 Bay Street AU 0 0
2001:df0:2af:: 2001:df0:2af:ffff:ffff:ffff:ffff:ffff 12/F Trans Asia Centre, 18 Kin Hong Street HK 0 0
2001:df0:403:: 2001:df0:403:ffff:ffff:ffff:ffff:ffff 8/5 Colin Street AU 0 0
2001:df0:f00:: 2001:df0:f00:ffff:ffff:ffff:ffff:ffff 257 Gilbert Street AU 0 0
2001:df0:2300:: 2001:df0:2300:ffff:ffff:ffff:ffff:ffff Level 5, 19 Gouger Street AU 0 0
2001:df0:3600:: 2001:df0:3600:ffff:ffff:ffff:ffff:ffff 30 Cecil Street SG 0 0
2001:df0:6400:: 2001:df0:6400:ffff:ffff:ffff:ffff:ffff 143, CECIL STREET #16-04 Singapore 069542 SG 0 0
2001:df0:e600:: 2001:df0:e600:ffff:ffff:ffff:ffff:ffff 65 Chulia Street SG 0 0
2001:df1:4100:: 2001:df1:4100:ffff:ffff:ffff:ffff:ffff Hammond Street Developments PTY LTD AU 0 0
2001:df1:7e00:: 2001:df1:7e00:ffff:ffff:ffff:ffff:ffff FG08, Moe Oo Wah Soe Street, MM 0 0
2001:df1:a800:: 2001:df1:a800:ffff:ffff:ffff:ffff:ffff 292 Yishun Street 22 #04-281 SG 12 0
2001:df1:d600:: 2001:df1:d600:ffff:ffff:ffff:ffff:ffff 80 Pyrmont Street AU 0 0
2001:df3:4000:: 2001:df3:4000:ffff:ffff:ffff:ffff:ffff 113 Bank Street NZ 0 0
2001:df3:5900:: 2001:df3:5900:ffff:ffff:ffff:ffff:ffff No 99-100, Street Sothearos, Sangkat Tonle Bassac KH 0 0
2001:df3:d200:: 2001:df3:d200:ffff:ffff:ffff:ffff:ffff flat B,6/F./ Teda Building,87 Wing Lok Street HK 0 0
2001:df5:2e00:: 2001:df5:2e00:ffff:ffff:ffff:ffff:ffff Clyde Street NZ 0 0
2001:df7:d800:: 2001:df7:d800:ffff:ffff:ffff:ffff:ffff 15 Harbour Street AU 0 0
2400:3280:: 2400:3280:ffff:ffff:ffff:ffff:ffff:ffff china shandong yantai longkou NO.1 street CN 0 0
2400:4a40:: 2400:4a40:ffff:ffff:ffff:ffff:ffff:ffff 2 7/F TRANS ASIA CENTRE 18 KIN HONG STREET KWAI CHUNG N.T. HK 0 0
2400:7e80:: 2400:7e80:ffff:ffff:ffff:ffff:ffff:ffff 150 cecil street #14-03 SG 0 0
2400:8240:: 2400:8240:ffff:ffff:ffff:ffff:ffff:ffff 30 Cecil Street SG 0 0
2400:8640:: 2400:8640:ffff:ffff:ffff:ffff:ffff:ffff 7/F., NO.565 FUK WA STREET CHEUNG SHA WAN, KOWLOON HK 0 0
2400:a6c0:: 2400:a6c0:ffff:ffff:ffff:ffff:ffff:ffff No.11 jiangxi street.Wuhou district CN 0 0
2400:bbc0:: 2400:bbc0:ffff:ffff:ffff:ffff:ffff:ffff Room 2201 tower,times square,1 matheson street,causeway bay HK 0 0
2400:e040:: 2400:e040:ffff:ffff:ffff:ffff:ffff:ffff 3A-2 12F Kaiser Centre,18 CENTRE STREET, SAI YING PUN HK 0 0
2400:ec00:: 2400:ec00:ffff:ffff:ffff:ffff:ffff:ffff 200/4 Young Street AU 0 0
2401:1c80:: 2401:1c80:ffff:ffff:ffff:ffff:ffff:ffff 2-1602 No.19 beida street,qingyang district HK 0 0
2401:87c0:: 2401:87c0:ffff:ffff:ffff:ffff:ffff:ffff Room 1501, 15/F, Wai Wah Commercial Centre, 6 Wilmer Street, Sheung Wan HK 0 0
2401:a180:: 2401:a180:ffff:ffff:ffff:ffff:ffff:ffff Shandong Yantai city Zhifu District 11 South Main Street CN 0 0
2401:b3c0:: 2401:b3c0:ffff:ffff:ffff:ffff:ffff:ffff 9010 TAMPINES STREET 93 SG 0 0
2401:b480:: 2401:b480:ffff:ffff:ffff:ffff:ffff:ffff Longkou City East Street South Gate Village CN 0 0
2401:bc80:: 2401:bc80:ffff:ffff:ffff:ffff:ffff:ffff 2A, May Myo Street MM 0 0
2401:d180:: 2401:d180:ffff:ffff:ffff:ffff:ffff:ffff 12/F, Metropolis Tower, No.2, Haidian North 1st Street CN 0 0
2401:d8c0:: 2401:d8c0:ffff:ffff:ffff:ffff:ffff:ffff RM 2021 New Tech Plaza, 34 Tai Yau Street, San Po Kong, Kowl HK 0 0
2401:e780:: 2401:e780:ffff:ffff:ffff:ffff:ffff:ffff 192 WATERLOO STREET #05-01 SG 0 0
2401:e880:: 2401:e880:ffff:ffff:ffff:ffff:ffff:ffff 3 Jilloong Street AU 2 0
2401:eb00:: 2401:eb00:ffff:ffff:ffff:ffff:ffff:ffff 19th floor, 201 Miller street AU 0 0
2402:4740:: 2402:4740:ffff:ffff:ffff:ffff:ffff:ffff #114,Delano business center, Street 134, Phnom Penh KH 0 0
2402:4f40:: 2402:4f40:ffff:ffff:ffff:ffff:ffff:ffff 88 guanzon street PH 0 0
2402:52c0:: 2402:52c0:ffff:ffff:ffff:ffff:ffff:ffff room 1017 dongsitiao street NO.25 Kuancheng district CN 0 0
2402:62c0:: 2402:62c0:ffff:ffff:ffff:ffff:ffff:ffff NO.41, Xing Long Street CN 0 0
2402:65c0:: 2402:65c0:ffff:ffff:ffff:ffff:ffff:ffff Room 8311 Floor 3 No. 1 Street 13 Chaoyang Beijing CN 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
15077 MAG-TEK, INC. US 1 0 3 0
36700 Tek Channel Consulting LLC US 1 0 2 0
39161 Communication Technologies COM TEK LLC RU 1 0 0 0
44920 Si.TEK Informatica Srl IT 5 0 1,114 4
202582 SARL IT’TEK FR 1 0 4 0
262711 TEK TURBO PROVEDOR DE INTERNET LTDA BR 12 1 2 181
3738 State Street Bank and Trust Company US 50 0 130 0
4134 No.31,Jin-rong Street CN 794 26 1,463,370 33,317
12233 Water Street Solutions, Inc. US 1 0 0 0
14969 JANE STREET US 6 0 0 0
15174 Echo Street Capital Management, LLC US 1 0 0 0
16819 Hawaii Dental Service 2b. Street US 1 0 12 0
20598 12 Ologun Agbaje Street, IL 36 0 22 5
23029 E Street US 9 0 766 0
24069 163 O’Riordan Street Mascot AU 2 0 73 0
24500 110/330 Wattle Street AU 6 0 2 0
24545 8/F.,Sino Favour Centre ,1 OnYip Street , ChaiWan HK 1 0 3 0
32115 Water Street Capital, Inc US 1 0 0 0
32585 King Street Capital Management, L.P. US 2 0 0 0
38025 68 Bower Street, Napier NZ 1 0 8 0
38580 520 Broad Street HK 4 0 0 0
40687 State Street Investment Manager Solutions, LLC US 3 0 1 0
45178 Main Street, House No. 13 Wazir Akbar Khan AF 12 0 0 0
45198 Level 10, 25 grenfell Street AU 1 0 0 0
45207 30 Delhi Street AU 1 0 21 0
45460 Corrs Support Service Pty Ltd, 600 Bourke Street AU 1 0 0 0
45510 Level 10, 9 Hunter Street AU 183 0 279 7
45513 Plot # X-16 14TH Street MIDC IN 1 0 2 0
45583 35 Grafton Street AU 1 0 28 0
45871 200/4 Young Street AU 1 0 2 0
45872 Level 2, 133 Castlereagh Street AU 7 1 0 0
45892 L27 45 Clarence Street AU 1 0 2 0
45911 2-6 Dai King Street HK 1 0 3 0
45934 No 21B Temple Street Level 03-01 SG 1 0 8 0
53747 Wall Street Systems Delaware, Inc US 1 0 0 0
54105 Second Street US 2 0 75 0
55363 73 Miller Street AU 1 0 2 0
55453 House # 39 Street 38 F10 /4 PK 12 0 0 0
55478 Level 15, 100 arthur Street AU 12 0 62 0
55485 1 Francis Street NZ 1 0 3 0
55487 60 Woodlands Industrial Park D Street 2 SG 1 0 4 0
55702 501 Gloucester Street NZ 5 0 6 0
55715 113 Bank Street NZ 5 0 9 0
55773 87 Mckoy Street AU 1 0 8 0
55940 20 Stanwix Street HK 1 0 0 0
56035 74b Brown Street AU 12 0 369 0
56167 Plot No 181-186 Street PK 13 0 3 19
58437 658 Muralla Street, Intramuros PH 2 0 2 0
58465 25th Floor Canadia Tower N0. 315 Presh Ang Duong Street KH 1 0 2 0
58521 18 Murray Street SG 1 0 0 0

DNS server (NS records) ns2.simplyaquatics.com (69.61.29.250)
spanky.street-tek.com (69.61.29.250)
Mail server (MX records) spanky.street-tek.com (69.61.29.250)
IP address (IPv4) 69.61.29.250
IP address (IPv6)
ASN number 22653
ASN name (ISP) Cyber Wurx LLC
IP-range/subnet 69.61.0.0/17
69.61.0.0 – 69.61.127.255
Registry Registrant ID:
Registrant Name: Street-Tek, INC
Registrant Organization: Street-Tek, INC
Registrant Street: 3409 IDLE HOUR DR
Registrant City: PHENIX CITY
Registrant State/Province: AL
Registrant Postal Code: 36867-2748
Registrant Country: US

Found the following items -> domains: 4 – ipv4 routes: 50 – ipv6 routes: 50 – providers: 50

@@@@@@@@@@@@@@@@@@@@
????????????????????
left off
Domains
Domain IPv4 address Ranking Alexa Pagerank
brokenarrowland.net 208.91.197.27
brokenarrowlandscapecompanies.com 205.178.153.7
brokenarrowlandscaping.com 52.44.94.227
brokenarrowlandsurveying.com 184.168.221.70
IPv4 routes
Startip Endip Description Country #domains #spamhosts
195.87.201.0 195.87.201.255 Koc.Net Mail Server TR 0 0
5.61.232.0 5.61.239.255 Mail.Ru RU 26 0
31.217.232.0 31.217.239.255 Internet Subnet for IMS (DNS server, Mail server etc) FR 0 0
41.77.224.0 41.77.231.255 Assigned to mail /dns servers TZ 4 0
62.100.224.0 62.100.255.255 ISP Web/mail/ftp servers and core routers network HU 262 0
62.149.128.0 62.149.159.255 Aruba S.p.A. – Shared Hosting and Mail services IT 854,462 1
79.137.174.0 79.137.175.255 Mail.Ru RU 6 0
89.34.236.0 89.34.239.255 TARGET MAIL SRL-D RO 29 1
89.250.176.0 89.250.191.255 Routers, DNS,Mail NL 364 0
91.92.116.0 91.92.119.255 Mail-Maker Service Network BG 0 0
91.92.160.0 91.92.163.255 Mail-Maker Service Network BG 0 0
91.190.168.0 91.190.175.255 SPLIO-MAIL FR 141 0
91.220.26.0 91.220.26.255 MEDIAPOST HIT MAIL SA RO 52 0
94.100.176.0 94.100.191.255 Mail.Ru RU 114 0
94.126.48.0 94.126.55.255 Static IP from web-mail-servers Webservice.be BE 2,973 0
95.163.32.0 95.163.63.255 Limited liability company Mail.Ru RU 2 0
103.20.232.0 103.20.233.255 Private Mail Box 9103 VU 7 0
116.66.224.0 116.66.231.255 ISP Services, Monitoring, Web, Mail, FTP, DNS AU 76 0
128.140.168.0 128.140.175.255 Mail.Ru RU 32 0
141.105.16.0 141.105.23.255 Dreamlab.pl – Mail Service PL 6 0
144.87.0.0 144.87.255.255 Royal Mail Group Limited GB 7 0
147.77.0.0 147.77.255.255 Royal Mail Group Limited GB 0 0
147.119.0.0 147.119.255.255 Royal Mail Group Limited GB 0 0
163.169.0.0 163.169.255.255 Royal Mail Group Limited GB 0 0
168.253.216.0 168.253.223.255 Assigned to virtual machines(tenants) running a host of services, varying from mail servers, to media server, web servers, DNS and many other services that require to be available publicly. ZA 4 0
176.32.208.0 176.32.223.255 Public Services, Vps, SSL Cert., Mail, Routers, Domains DE 1 0
185.5.136.0 185.5.139.255 Mail.Ru RU 5 0
185.6.244.0 185.6.247.255 Mail.Ru RU 1 0
185.16.148.0 185.16.151.255 Mail.Ru LLC RU 2 0
185.52.148.0 185.52.151.255 Mail Minion Ltd US 0 0
188.94.32.0 188.94.39.255 First ISP infrastructure (dns, mail, ftp) domolan netblock RU 6 1
192.33.18.0 192.33.18.255 Mail America Communications, Inc US 2 0
192.108.1.0 192.108.1.255 Lotus/cc:Mail US 1 0
192.109.18.0 192.109.18.255 PFM News & Mail Mainz, Mainz DE 0 0
192.147.45.0 192.147.45.255 MCI Mail Operations US 0 0
193.28.204.0 193.28.204.255 # In caes of Mail-Abuse please contact AT 51 0
193.201.172.0 193.201.172.255 MAIL.BG Ssc BG 37 0
194.42.108.0 194.42.109.255 K – Mail Order GmbH & Co. KG DE 972 0
195.8.160.0 195.8.191.255 Your Communications Customer Mail Services GB 189 0
195.211.20.0 195.211.23.255 Limited liability company Mail.Ru RU 22 0
195.211.128.0 195.211.131.255 Mail.RU Games, LLC RU 203 0
196.192.64.0 196.192.71.255 Mail servers and IP address assigned to all equipment in Head Office MU 18 0
199.175.137.0 199.175.137.255 The Electric Mail Company CA 2 0
199.198.128.0 199.198.135.255 The Globe and Mail CA 1 0
199.198.136.0 199.198.139.255 The Globe and Mail CA 14 0
199.246.60.0 199.246.63.255 The Globe and Mail CA 36 0
199.246.64.0 199.246.71.255 The Globe and Mail CA 4 0
199.249.186.0 199.249.186.255 Print Mail Systems, Inc. US 0 0
202.53.8.0 202.53.15.255 Core Infra ���¢�������� DNS, Web, Mail, KVM, Database IN 53 3
202.74.240.0 202.74.247.255 DNS, Proxy, Mail, SMTP, WWW at Gulshan NOC BD 34 11
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:480:: 2001:678:480:ffff:ffff:ffff:ffff:ffff IPv6 range Erwin Mueller Mail Order Solutions GmbH DE 0 0
2001:678:498:: 2001:678:498:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:49c:: 2001:678:49c:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:4a0:: 2001:678:4a0:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:4a4:: 2001:678:4a4:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:67c:660:: 2001:67c:660:ffff:ffff:ffff:ffff:ffff K-Mail Order GmbH & Co.KG DE 0 0
2001:67c:16b8:: 2001:67c:16b8:ffff:ffff:ffff:ffff:ffff MAIL.BG Ssc BG 1 0
2001:67c:27c0:: 2001:67c:27c0:ffff:ffff:ffff:ffff:ffff Creator-Mail Limited GB 0 0
2001:df0:7e:: 2001:df0:7e:ffff:ffff:ffff:ffff:ffff Mail Marketing & Telemarketing Solutions Pty Ltd AU 0 0
2a00:1148:: 2a00:114f:ffff:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 7 0
2a00:1148:: 2a00:1148:ffff:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 7 0
2a00:1148:5:: 2a00:1148:5:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 0 0
2a02:120:2:: 2a02:120:2:ffff:ffff:ffff:ffff:ffff UNET Mail platform NL 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:678:604:: 2001:678:604:ffff:ffff:ffff:ffff:ffff PC “Astra-net” UA 0 0
2001:678:608:: 2001:678:608:ffff:ffff:ffff:ffff:ffff QUICK-NET Mariusz Miska PL 0 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 209 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 155 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,417 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
10808 The Globe and Mail CA 6 0 51 0
21051 Limited liability company Mail.Ru RU 15 1 205 0
23322 Print Mail Systems, Inc. US 1 0 0 0
25166 MAIL.BG Ssc BG 1 1 37 0
36362 Mail America Communications, Inc US 1 0 2 0
47764 Limited liability company Mail.Ru RU 23 4 1,238 0
51286 Limited liability company Mail.Ru RU 1 0 0 0
51654 MEDIAPOST HIT MAIL SA RO 1 0 52 0
60863 Limited liability company Mail.Ru RU 2 0 1 0
205482 Direct Mail LLC RU 1 0 2 0
12714 Net By Net Holding LLC RU 193 2 4,179 80
20911 Net-Surf.net Ltd. BG 28 0 70 4
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 164 1
1618 Daytona Net Works, Inc. US 2 0 250 2
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 8 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 4 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,558 16
3254 Lucky Net Ltd UA 4 0 2,287 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 86,925 8
3931 Logical Net Corporation US 6 0 744 1
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,787 18
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 394 13 33,747 118
5405 CSO.net Internet Services GmbH AT 1 1 3,978 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 598 2
6364 Atlantic.net, Inc. US 47 5 18,937 0
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,775 0 10,969 8
6624 Gower.Net US 3 0 27 0
6735 sdt.net AG DE 6 1 298 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 157 0
7106 Com Net, Inc. US 9 1 953 1
7146 Georgia Business Net, Inc US 2 0 43 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 283 0
7600 Escape.net AU 56 4 516 0
7641 China Broadcasting TV Net CN 7 0 55 0
@@@@@@@@@@@@@@@@@@@@

NetRange: 24.214.101.0 – 24.214.101.255
CIDR: 24.214.101.0/24
NetName: COLUMBUS-GA
NetHandle: NET-24-214-101-0-1
Parent: WIDEOPENWEST (NET-24-214-74-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: WideOpenWest Finance LLC (C00200226)
RegDate: 2001-07-16
Updated: 2015-04-17
CustName: WideOpenWest Finance LLC
Address: 1241 OG Skinner Drive
City: West Point
StateProv: GA
PostalCode: 31833
Country: US
RegDate: 2001-07-16
Updated: 2013-03-21
706-634-2898
kevin.baker @
wowinc.com
eric.bailey @ wideopenwest . com
706-645-8194
706-634-2898
NetRange: 24.214.74.0 – 24.214.147.255
CIDR: 24.214.144.0/22, 24.214.80.0/20, 24.214.96.0/19, 24.214.128.0/20, 24.214.76.0/22,
24.214.74.0/23
NetName: WIDEOPENWEST
NetHandle: NET-24-214-74-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS12083
Organization: WideOpenWest Finance LLC (WOPW)
RegDate: 1999-04-14
Updated: 2015-04-17
OrgName: WideOpenWest Finance LLC
OrgId: WOPW
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2002-04-09
Updated: 2017-05-16

wideopenwest.com

Are you looking for domain bgc-colsga.org?
This domain is hosted by zColo (AS13354). The first DNS server is ns10.domaincontrol.com. The current IPv4 address is 209.105.227.7. The mail server with the highest priority is bgccolsga-org0i.mail.protection.outlook.com.
v=spf1 include:spf.protection.outlook.com -all
DNS server (NS records) ns10.domaincontrol.com (208.109.255.5)
ns09.domaincontrol.com (216.69.185.5)
Mail server (MX records) bgccolsga-org0i.mail.protection.outlook.com (207.46.163.170)
IP address (IPv4) 209.105.227.7
IP address (IPv6)
ASN number 13354
ASN name (ISP) zColo
IP-range/subnet 209.105.224.0/19
209.105.224.0 – 209.105.255.255
Domain Name: BGC-COLSGA.ORG
Registry Domain ID: D9477373-LROR
Registrar WHOIS Server: whois.godaddy.com
Registry Registrant ID: C80906266-LROR
Registrant Name: Jason Brewer
Registrant Organization: SuperWebHost.com
Registrant Street: 5729 Whitesville Road
Registrant City: Columbus
Registrant State/Province: Georgia
Registrant Postal Code: 31904
Registrant Country: US
706-442-1956
baacs.com
his domain is hosted by Cloudflare, Inc. (AS13335). The first DNS server is amy.ns.cloudflare.com. The current IPv4 address is 104.28.17.178. The mail server with the highest priority is d57206a.ess.barracudanetworks.com.
DNS server (NS records) amy.ns.cloudflare.com (173.245.58.101)
bart.ns.cloudflare.com (173.245.59.71)
Mail server (MX records) d57206a.ess.barracudanetworks.com (64.235.154.109)
d57206b.ess.barracudanetworks.com (64.235.153.2)
IP address (IPv4) 104.28.17.178
104.28.16.178
IP address (IPv6) 2400:cb00:2048:1::681c:10b2
2400:cb00:2048:1::681c:11b2
ASN number 13335
ASN name (ISP) Cloudflare, Inc.
IP-range/subnet 104.28.16.0/20
104.28.16.0 – 104.28.31.255

bgc-colsga.org 209.105.227.7 2
IPv4 routes
Startip Endip Description Country #domains #spamhosts
194.242.108.0 194.242.111.255 Bankgirocentralen BGC AB SE 16 0
93.189.242.0 93.189.243.255 POP BGC SE 0 0
5.153.192.0 5.153.223.255 ORG-XA114-RIPE GB 5,880 0
37.252.32.0 37.252.63.255 ORG-XA114-RIPE GB 0 0
45.64.24.0 45.64.27.255 ORG-HA2-AP PK 0 0
45.221.48.0 45.221.63.255 ORG-UA6-AFRINIC ZA 0 0
77.72.8.0 77.72.15.255 ORG-SSZG1-RIPE DE 30 0
81.200.176.0 81.200.191.255 ORG-PA149-RIPE FR 438 0
89.46.94.0 89.46.95.255 ORG-DPCO1-RIPE IR 0 0
91.186.224.0 91.186.255.255 ORG-NETS1-RIPE JO 1 0
91.198.120.0 91.198.120.255 ORG-YA14-RIPE FI 7 0
91.217.88.0 91.217.89.255 ORG-FA356-RIPE IE 79 0
91.221.8.0 91.221.9.255 ORG-eA244-RIPE DE 0 0
91.225.68.0 91.225.71.255 ORG-KA241-RIPE FI 0 0
91.227.245.0 91.227.245.255 ORG-XA48-RIPE GB 0 0
91.234.203.0 91.234.203.255 ORG-KA280-RIPE BE 26 0
137.101.0.0 137.101.255.255 ORG-AMS1-RIPE GB 7 5
137.171.0.0 137.171.255.255 ORG-ZZ23-AFRINIC ZA 1,309 0
143.118.0.0 143.118.255.255 ORG-FA12-RIPE SE 0 0
154.72.16.0 154.72.19.255 ORG-CL10-AFRINIC UG 0 0
159.100.176.0 159.100.191.255 ORG-WWWH1-RIPE GB 6,337 0
164.160.32.0 164.160.35.255 ORG-VA68-AFRINIC CI 13 0
169.255.176.0 169.255.179.255 ORG-NA27-AFRINIC MA 0 0
178.20.64.0 178.20.71.255 ORG-OA272-RIPE FR 1,438 0
178.213.160.0 178.213.167.255 BORKOWSKI BARTLOMIEJ BORKOW.ORG PPHU PL 4 0
185.1.26.0 185.1.26.255 ORG-ILOT1-RIPE FR 0 0
185.1.105.0 185.1.105.255 CommunityRack.org Verein CH 0 0
185.22.52.0 185.22.55.255 FINK-ORG-CH-ROUTE CH 18 0
185.48.156.0 185.48.159.255 ROEDL-ORG-EMEA DE 45 0
185.87.108.0 185.87.111.255 Shellit.Org FI 331 0
185.93.20.0 185.93.23.255 ORG-IA1033-RIPE GL 3 0
185.95.216.0 185.95.219.255 CommunityRack.org Core CH 71 0
185.101.208.0 185.101.211.255 ORG-OA272-RIPE FR 0 0
185.104.120.0 185.104.123.255 /24 used for public and member sponsored Tor (torproject.org) relays GB 25 0
185.110.204.0 185.110.207.255 hkfree.org z.s. CZ 0 0
185.121.208.0 185.121.211.255 ORG-QA3-RIPE IT 0 0
185.141.148.0 185.141.151.255 ORG-DG121-RIPE DE 0 0
185.185.84.0 185.185.87.255 ORG-DS287-RIPE GB 98 0
192.67.58.0 192.67.58.255 ORG-FA12-RIPE SE 0 0
192.150.121.0 192.150.121.255 Voket Org. US 1 0
192.225.112.0 192.225.127.255 MyServer.org, Inc. US 91 0
193.30.42.0 193.30.42.255 fqdn.org DE 0 0
193.41.0.0 193.41.1.255 ORG-BA34-RIPE GB 0 0
193.108.172.0 193.108.173.255 http://www.vmunix.org/ DE 5 0
193.239.192.0 193.239.193.255 ORG-OA272-RIPE FR 51 0
194.11.0.0 194.11.15.255 ORG-SA1705-RIPE CH 0 0
194.11.112.0 194.11.127.255 ORG-SA1705-RIPE CH 0 0
194.28.252.0 194.28.255.255 ORG-FTF1-RIPE DK 53 0
194.110.69.0 194.110.69.255 http://www.geeknode.org/ FR 14 0
194.116.148.0 194.116.149.255 ipernity.org SA FR 1 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:480:: 2001:678:480:ffff:ffff:ffff:ffff:ffff IPv6 range Erwin Mueller Mail Order Solutions GmbH DE 0 0
2001:678:498:: 2001:678:498:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:49c:: 2001:678:49c:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:4a0:: 2001:678:4a0:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:678:4a4:: 2001:678:4a4:ffff:ffff:ffff:ffff:ffff Mail Guard Ltd. GB 0 0
2001:67c:660:: 2001:67c:660:ffff:ffff:ffff:ffff:ffff K-Mail Order GmbH & Co.KG DE 0 0
2001:67c:16b8:: 2001:67c:16b8:ffff:ffff:ffff:ffff:ffff MAIL.BG Ssc BG 1 0
2001:67c:27c0:: 2001:67c:27c0:ffff:ffff:ffff:ffff:ffff Creator-Mail Limited GB 0 0
2001:df0:7e:: 2001:df0:7e:ffff:ffff:ffff:ffff:ffff Mail Marketing & Telemarketing Solutions Pty Ltd AU 0 0
2a00:1148:: 2a00:114f:ffff:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 7 0
2a00:1148:: 2a00:1148:ffff:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 7 0
2a00:1148:5:: 2a00:1148:5:ffff:ffff:ffff:ffff:ffff Limited liability company Mail.Ru RU 0 0
2a02:120:2:: 2a02:120:2:ffff:ffff:ffff:ffff:ffff UNET Mail platform NL 0 0
2001:67c:17a0:: 2001:67c:17a0:ffff:ffff:ffff:ffff:ffff ORG-YA14-RIPE FI 6 0
2001:67c:20c0:: 2001:67c:20c0:ffff:ffff:ffff:ffff:ffff ORG-KA241-RIPE FI 0 0
2001:67c:2db0:: 2001:67c:2db0:ffff:ffff:ffff:ffff:ffff ORG-DA663-RIPE IT 0 0
2001:7f8:88:: 2001:7f8:88:ffff:ffff:ffff:ffff:ffff ORG-ILOT1-RIPE FR 0 0
2001:7f8:bf:: 2001:7f8:bf:ffff:ffff:ffff:ffff:ffff CommunityRack.org Verein CH 0 0
2001:4978:: 2001:4978:ffff:ffff:ffff:ffff:ffff:ffff YOUR.ORG, INC. US 33 0
2602:ffc2:: 2602:ffc2:fff:ffff:ffff:ffff:ffff:ffff MyServer.org, Inc. US 0 0
2a00:df0:: 2a00:df0:ffff:ffff:ffff:ffff:ffff:ffff ORG-FA257-RIPE DK 7 0
2a00:d080:: 2a00:d080:ffff:ffff:ffff:ffff:ffff:ffff ORG-RA7-RIPE ES 0 0
2a01:168:: 2a01:168:ffff:ffff:ffff:ffff:ffff:ffff hkfree.org z.s. CZ 4 0
2a01:40c0:: 2a01:40c0:ffff:ffff:ffff:ffff:ffff:ffff ORG-OA272-RIPE FR 0 0
2a02:2b8:: 2a02:2b8:ffff:ffff:ffff:ffff:ffff:ffff ORG-AA28-RIPE FR 28 0
2a02:2098:: 2a02:209f:ffff:ffff:ffff:ffff:ffff:ffff ORG-VA154-RIPE FR 26 0
2a02:2108:: 2a02:2108:ffff:ffff:ffff:ffff:ffff:ffff ORG-IA673-RIPE CH 0 0
2a02:2700:: 2a02:2700:ffff:ffff:ffff:ffff:ffff:ffff ORG-SA499-RIPE IQ 0 0
2a03:c780:: 2a03:c780:ffff:ffff:ffff:ffff:ffff:ffff ORG-SA56-RIPE SE 1 0
2a03:fc80:: 2a03:fc87:ffff:ffff:ffff:ffff:ffff:ffff ORG-cGi1-RIPE DE 0 0
2a05:9840:: 2a05:9847:ffff:ffff:ffff:ffff:ffff:ffff ORG-YA61-RIPE BE 0 0
2a05:fc80:: 2a05:fc87:ffff:ffff:ffff:ffff:ffff:ffff CommunityRack.org Core CH 39 0
2a07:2540:: 2a07:2547:ffff:ffff:ffff:ffff:ffff:ffff ORG-DG121-RIPE DE 0 0
2a07:42c0:: 2a07:42c7:ffff:ffff:ffff:ffff:ffff:ffff ORG-SA3656-RIPE DK 0 0
2a0a:1580:: 2a0a:1587:ffff:ffff:ffff:ffff:ffff:ffff ORG-AS66-RIPE FR 0 0
2a0b:4b80:: 2a0b:4b87:ffff:ffff:ffff:ffff:ffff:ffff ORG-DS287-RIPE GB 0 0
2c0f:f4b8:: 2c0f:f4b8:ffff:ffff:ffff:ffff:ffff:ffff ORG-WBAT1-AFRINIC ZA 0 0
2a02:e30:f00c:: 2a02:e30:f00c:ffff:ffff:ffff:ffff:ffff BORKOWSKI BART?OMIEJ BORKOW.ORG PPHU PL 0 0
2a06:e881:1700:: 2a06:e881:170f:ffff:ffff:ffff:ffff:ffff 4830.org CH 1 0
2a06:e881:1700:: 2a06:e881:1700:ffff:ffff:ffff:ffff:ffff 4830.org CH 1 0
2a06:e881:1703:: 2a06:e881:1703:ffff:ffff:ffff:ffff:ffff 4830.org CH 0 0
2a06:e881:1705:: 2a06:e881:1705:ffff:ffff:ffff:ffff:ffff 4830.org CH 0 0
2a06:e881:1706:: 2a06:e881:1706:ffff:ffff:ffff:ffff:ffff 4830.org CH 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
19178 BGC Partners EU 8 0 75 0
31574 Bankgirocentralen BGC AB SE 4 0 16 0
38870 BGC Partners – Hong Kong HK 9 0 0 0
136892 BGC Limited SG 1 0 0 0
6553 HTCNET.ORG US 8 0 2 0
19255 YOUR.ORG, INC. US 9 1 86 0
26943 YOUR.ORG, INC. US 1 0 0 0
40866 MyServer.org, Inc. US 17 0 195 0
41670 hkfree.org z.s. CZ 2 1 140 0
48292 CIKLET ILETISIM TASARIM VE ORG. TIC. LTD. STI. TR 6 0 498 0
51636 BORKOWSKI BARTLOMIEJ BORKOW.ORG PPHU PL 1 1 4 0
57118 CommunityRack.org Verein CH 3 3 73 0
262276 Terra Azul Org. Adm. S/C Ltda. BR 1 0 2 0
10808 The Globe and Mail CA 6 0 51 0
21051 Limited liability company Mail.Ru RU 15 1 205 0
23322 Print Mail Systems, Inc. US 1 0 0 0
25166 MAIL.BG Ssc BG 1 1 37 0
36362 Mail America Communications, Inc US 1 0 2 0
47764 Limited liability company Mail.Ru RU 23 4 1,238 0
51286 Limited liability company Mail.Ru RU 1 0 0 0
51654 MEDIAPOST HIT MAIL SA RO 1 0 52 0
60863 Limited liability company Mail.Ru RU 2 0 1 0
205482 Direct Mail LLC RU 1 0 2 0

Domains on
24.214.101.126 2
IP address 24.214.101.126
Location Columbus, Georgia, United States
IP address 24.214.101.126
Reverse DNS (PTR record) not available
DNS server (NS record) dns1.knology.net (24.214.63.66)
dns2.knology.net (24.214.63.67)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
24.214.101.126
Domains on 24.214.101.126
Domain Tools
lamplightlab.com
This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is altair.wcbradley.com. The current IPv4 address is 24.214.101.126. The mail server with the highest priority is lamplightlab-com.mail.protection.outlook.com.
v=spf1 include:spf.protection.outlook.com -al
DNS server (NS records) altair.wcbradley.com (64.128.140.200)
Mail server (MX records) lamplightlab-com.mail.protection.outlook.com
ms83510748.msv1.invalid.outlook.com
IP address (IPv4) 24.214.101.126
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
Registrant Organization: W.C. Bradley Co.
Registrant Street: P.O. Box 1240
Registrant City: Columbus
Registrant State/Province: Georgia
Registrant Postal Code: 31902
Registrant Country: US
@@@@@@@@
???????
wcbradleylab.net
This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is altair.wcbradley.com. The current IPv4 address is 24.214.101.126. The mail server with the highest priority is ms80102632.msv1.invalid.outlook.com.
v=spf1 include:spf.protection.outlook.com -all
DNS server (NS records) altair.wcbradley.com (64.128.140.200)
Mail server (MX records) ms80102632.msv1.invalid.outlook.com
wcbradleylab-net.mail.protection.outlook.com
IP address (IPv4) 24.214.101.126
IP address (IPv6)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
Tech Organization: W.C. Bradley Co.
Tech Street: P.O. Box 1240
Tech City: Columbus
Tech State/Province: Georgia
Tech Postal Code: 31902
Tech Country: US

Domains around 24.214.101.126
IP address #domains
24.214.101.63 1
IP address 24.214.101.63
Location Columbus, Georgia, United States
IP address 24.214.101.63
Reverse DNS (PTR record) static-24-214-101-63.knology.net
DNS server (NS record) dns2.knology.net (24.214.63.67)
dns1.knology.net (24.214.63.66)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 24.214.96.0/19
24.214.96.0 – 24.214.127.255
brokenarrowland.net

Domains around 24.214.101.126
IP address #domains
24.214.101.126 2
NetRange: 24.214.101.0 – 24.214.101.255
CIDR: 24.214.101.0/24
NetName: COLUMBUS-GA
NetHandle: NET-24-214-101-0-1
Parent: WIDEOPENWEST (NET-24-214-74-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: WideOpenWest Finance LLC (C00200226)
RegDate: 2001-07-16
Updated: 2015-04-17
CustName: WideOpenWest Finance LLC
Address: 1241 OG Skinner Drive
City: West Point
StateProv: GA
PostalCode: 31833
Country: US
RegDate: 2001-07-16
Updated: 2013-03-21
NetRange: 24.214.74.0 – 24.214.147.255
CIDR: 24.214.144.0/22, 24.214.80.0/20, 24.214.96.0/19, 24.214.128.0/20, 24.214.76.0/22,
24.214.74.0/23
NetName: WIDEOPENWEST
NetHandle: NET-24-214-74-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS12083
Organization: WideOpenWest Finance LLC (WOPW)
RegDate: 1999-04-14
Updated: 2015-04-17
OrgName: WideOpenWest Finance LLC
OrgId: WOPW
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2002-04-09
Updated: 2017-05-16
wow.com
This domain is hosted by AOL Transit Data Network (AS1668). The first DNS server is dns-06.ns.aol.com. The current IPv4 address is 149.174.107.97. The mail server with the highest priority is mx-aol.mail.gm0.yahoodns.net.
v=spf1 ip4:204.29.186.0/23 ?all
DNS server (NS records) dns-06.ns.aol.com (207.200.73.80)
dns-01.ns.aol.com (64.12.51.132)
dns-02.ns.aol.com (205.188.157.232)
dns-07.ns.aol.com (64.236.1.107)
Mail server (MX records) mx-aol.mail.gm0.yahoodns.net (74.6.141.40)
IP address (IPv4) 149.174.107.97
64.12.79.57
207.200.74.38
64.12.89.186
149.174.110.102
IP address (IPv6)
ASN number 1668
ASN name (ISP) AOL Transit Data Network
IP-range/subnet 149.174.0.0/16
149.174.0.0 – 149.174.255.255

Are you looking for domain outlook.com?
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns4a.o365filtering.com. The current IPv4 address is 40.97.164.146. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.
v=spf1 include:spf-a.outlook.com include:spf-b.outlook.com ip4:157.55.9.128/25 include:spf.protection.outlook.com include:spf-a.hotmail.com include:_spf-ssg-b.microsoft.com include:_spf-ssg-c.microsoft.com ~al
DNS server (NS records) ns4a.o365filtering.com (157.55.133.11)
ns2a.o365filtering.com (157.56.116.52)
ns3.msft.net (193.221.113.53)
ns1a.o365filtering.com (157.56.110.11)
ns1.msft.net (208.84.0.53)
ns4.msft.net (208.76.45.53)
ns2.msft.net (208.84.2.53)
Mail server (MX records) outlook-com.olc.protection.outlook.com (104.47.41.33)
IP address (IPv4) 40.97.164.146
40.97.153.146
40.97.156.114
40.97.160.2
40.97.116.82
40.97.148.226
40.97.128.194
40.97.161.50
IP address (IPv6) 2603:1026:c06:1d::2
2603:1026:500:3d::2
2603:1026:500:3c::2
2603:1026:500:3e::2
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 40.64.0.0/10
40.64.0.0 – 40.127.255.255

spf.protection.outlook.com
Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.13.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 104.215.95.187 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 6,655 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 933,281 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.164.146 3,242 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
43.225.80.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.191.255 RMP Protection Limited HK 50 0
91.223.152.0 91.223.152.255 Protection and Security Plus LTD UA 7 0
103.68.188.0 103.68.191.255 JV Protection Services AU 25 0
103.241.52.0 103.241.55.255 Point Blank Protection Pvt Ltd IN 0 0
103.246.187.0 103.246.187.255 Crystal Crop Protection Private Limited IN 0 0
103.253.40.0 103.253.43.255 RMP Protection Limited. HK 228 0
103.254.164.0 103.254.164.255 Australian Customs and Border Protection Service AU 0 0
121.54.184.0 121.54.187.255 JV Protection Services AU 2 0
134.67.0.0 134.67.255.255 U.S. Environmental Protection Agency US 13 0
148.59.135.0 148.59.135.255 PROTECTION ONE US 1 0
158.45.0.0 158.45.255.255 STATE OF VICTORIA – ENVIRONMENT PROTECTION AUTHORITY AU 0 0
158.119.0.0 158.119.255.255 Health Protection Agency GB 0 0
161.80.0.0 161.80.255.255 U.S. Environmental Protection Agency US 0 0
162.145.0.0 162.145.255.255 Australian Customs and Border Protection Service AU 0 0
162.146.0.0 162.146.255.255 Australian Customs and Border Protection Service AU 1 0
162.147.0.0 162.147.255.255 Australian Customs and Border Protection Service AU 2 0
164.97.0.0 164.97.255.255 DEPARTMENT OF IMMIGRATION AND BORDER PROTECTION AU 12 0
165.105.0.0 165.105.255.255 State of California Department of Forestry and Fire Protection US 0 0
168.246.0.0 168.246.255.255 Syngenta Crop Protection, LLC US 0 0
192.58.247.0 192.58.247.255 Environmental Protection Agency US 0 0
192.70.118.0 192.70.118.255 Ministere de l’Environnement, Direction de la Protection de la Nature FR 0 0
192.81.166.0 192.81.166.255 U.S. Merit Systems Protection Board US 0 0
192.112.29.0 192.112.29.255 Ontario Agency for Health Protection and Promotion CA 1 0
192.124.164.0 192.124.164.255 State of California Department of Forestry and Fire Protection US 0 0
193.29.204.0 193.29.204.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 14 0
193.109.8.0 193.109.11.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 0 0
195.211.220.0 195.211.223.255 DDoS Protection LTD. RU 559 0
198.180.201.0 198.180.201.255 Lightning Location and Protection, Inc. US 0 0
198.190.184.0 198.190.184.255 Consumers Power, System Protection Engineering US 0 0
198.202.131.0 198.202.131.255 Lightning Location and Protection, Inc. US 0 0
199.73.128.0 199.73.255.255 Florida Department of Environmental Protection US 1 0
202.14.101.0 202.14.101.255 Department for Child Protection and Family Support AU 7 0
203.12.67.0 203.12.67.255 Department of Environmental Protection – Waste Management AU 0 0
203.23.184.0 203.23.184.255 Public Service and Merit Protection Commisson (PSMPC) AU 0 0
204.8.235.0 204.8.235.255 PROTECTION ONE US 1 0
204.46.0.0 204.47.255.255 U.S. Environmental Protection Agency US 0 0
204.87.241.0 204.87.241.255 Ground Water Protection Council, Inc. US 0 0
206.197.209.0 206.197.209.255 Protection One Alarm Monitoring, INC. US 0 0
5.101.40.0 5.101.40.255 Cloud Hosting & DDoS Protection RU 1,688 1
12.29.157.0 12.29.157.255 PROTECTION ONE US 11 0
12.108.152.0 12.108.152.255 PROTECTION ONE US 0 0
12.147.152.0 12.147.152.255 PROTECTION ONE ALARM MONITORING US 0 0
43.225.80.0 43.225.80.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.82.0 43.225.82.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.83.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.188.255 RMP Protection Limited HK 0 0
45.123.189.0 45.123.189.255 RMP Protection Limited HK 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:564:: 2001:678:564:ffff:ffff:ffff:ffff:ffff Protection and Security Plus LTD UA 2 0
2001:df1:1800:: 2001:df1:1800:ffff:ffff:ffff:ffff:ffff Australian Customs and Border Protection Service AU 0 0
2001:df7:7000:: 2001:df7:7000:ffff:ffff:ffff:ffff:ffff RMP Protection Limited. HK 1 0
2403:5780:: 2403:5780:ffff:ffff:ffff:ffff:ffff:ffff Shanghai boci Environmental Protection Technology Co., Ltd. CN 0 0
2405:d100:: 2405:d100:ffff:ffff:ffff:ffff:ffff:ffff Australian Radiation Protection and Nuclear Safety Agency AU 0 0
2407:8480:: 2407:8480:ffff:ffff:ffff:ffff:ffff:ffff RMP Protection Limited HK 0 0
2620:0:b10:: 2620::b13:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 1 0
2620:2a:e000:: 2620:2a:e000:ffff:ffff:ffff:ffff:ffff Orland Fire Protection District US 0 0
2620:117:5000:: 2620:117:50ff:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 10 0
2620:166:: 2620:166:fff:ffff:ffff:ffff:ffff:ffff Syngenta Crop Protection, LLC US 0 0
2a03:6920:: 2a03:6927:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
2a04:ec0:: 2a04:ec7:ffff:ffff:ffff:ffff:ffff:ffff Health Protection Agency GB 0 0
2a03:6920:: 2a03:6920:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 0
14298 Environmental Protection Agency US 65 2 13 0
21096 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0 14 0
23744 Department of Immigration and Border Protection AU 8 0 0 0
30087 Automobile Protection Corporation US 1 0 2 0
30509 PROTECTION ONE US 5 0 11 0
35169 EURO PROTECTION SURVEILLANCE SAS FR 1 0 0 0
40968 Professional Protection Electronic Ltd. GB 1 0 1 0
50098 DDoS Protection LTD. RU 4 0 559 0
55201 ShawCor Pipe Protection, LLC US 1 0 0 0
56439 Protection and Security Plus LTD UA 1 1 7 0
63327 Ontario Agency for Health Protection and Promotion CA 1 0 1 0
133178 Australian Customs and Border Protection Service AU 1 0 0 0
201092 FBU Central base of aviation forest protection ” Avialesookhrana ” RU 1 0 4 0
205280 United Protection (UK) Security LIMITED GB 1 0 0 9

 




March 22 2018 Cyber Attacks against Stew Webb Federal Whistle blower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence March 22, 2018

United States Suwanee, United States left http://www.stewwebb.com/category/breaking-news/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521689567.3
3/21/2018 10:32:48 PM (11 hours 43 mins ago)
IP: 24.178.73.154 Hostname: mail.bgc-colsga.org
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; LG-K373 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human

Top 5 IPs Blocked
IP Country Block Count
Top 5 IPs Blocked
IP Country Block Count
62.31.6.155 United Kingdom GB 3112
Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:25 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:23 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks…
3/22/2018 9:52:22 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks…
3/22/2018 9:52:21 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:16 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:15 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks…
3/22/2018 9:52:13 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36

Type: Human
United Kingdom Hammersmith, United Kingdom left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?s=john+ramsey&submit=Go
3/22/2018 9:53:58 AM (5 minutes ago)
IP: 2.223.187.4 Hostname: 02dfbb04.bb.sky.com
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

IP address 62.31.6.155
Location Manchester, England, United Kingdom
IP address 62.31.6.155
Reverse DNS (PTR record) 62-31-6-155-bf.static.virginmedia.com
DNS server (NS record) ns4.virginmedia.net (194.168.4.33)
ns2.virginmedia.net (194.168.4.237)
ns.ripe.net (193.0.9.6)
ns1.virginmedia.net (62.253.162.237)
ns3.virginmedia.net (62.253.162.37)
ASN number 5089
ASN name (ISP) Virgin Media Limited
IP-range/subnet 62.31.0.0/16
62.31.0.0 – 62.31.255.255
Number of SPAM hosts on 62.31.0.0/16 1
Domains around 62.31.6.155
IP address #domains
62.31.6.54 1
62.31.6.92 1
62.31.6.93 1
62.31.6.131 1
inetnum: 62.31.6.152 – 62.31.6.159
netname: SONTAY-LIMITED
descr: SONTAY-LIMITED
country: GB
org: ORG-CIL2-RIPE
admin-c: DH687-RIPE
tech-c: NNMC1-RIPE
status: ASSIGNED PA
mnt-by: AS5089-MNT
remarks: Access Evolution Business Customer UK
created: 2017-05-30T20:06:29Z
last-modified: 2017-05-30T20:06:29Z
source: RIPE # Filtered

organisation: ORG-CIL2-RIPE
org-name: Virgin Media Limited
org-type: OTHER
address: Media House, Bartley Wood Business Park
address: RG27 9UP
address: Hook, Hampshire
address: UNITED KINGDOM
person: Duty Hostmaster
address: Fountain Court
address: Unit B
address: Fountain Lane
address: St Mellons
address: Cardiff
address: CF3 0FB
@@@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
69.139.118.63 United States US 88
IP address 69.139.118.63
Location Franklin, Tennessee, United States
comcast.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
63.228.78.18 United States US 42
IP address 63.228.78.18
Location Cortez, Colorado, United State
IP address 63.228.78.18
Reverse DNS (PTR record) 63-228-78-18.hlrn.qwest.net
DNS server (NS record) authns1.centurylink.net (63.150.72.4)
authns2.centurylink.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
Domains around 63.228.78.18
IP address #domains
63.228.78.148 1
IP address 63.228.78.148
Location Cortez, Colorado, United States
Domains on 63.228.78.148
Domain Tools
prinscentral.com
This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns3.zoneedit.com. The current IPv4 address is 75.166.178.66. The mail server with the highest priority is mx.mydomain.com.
DNS server (NS records) ns3.zoneedit.com (128.199.163.75)
ns5.zoneedit.com (159.203.1.67)
Mail server (MX records) mx.mydomain.com (66.96.140.64)
IP address (IPv4) 75.166.178.66
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 75.160.0.0/12
75.160.0.0 – 75.175.255.255
Domain Name: PRINSCENTRAL.COM
Domain ID: 58528142_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registry Registrant ID:
Registrant Name: Les Prins
Registrant Organization: Les Prins
Registrant Street: 6735 S. Pitkin St.
Registrant City: Foxfield
Registrant State/Province: CO
Registrant Postal Code: 80016
Registrant Country: US
303-766-1578
Registry Tech ID:
Tech Name: Les Prins
Tech Organization: Bazi4life
Tech Street: 6735 S. Pitkin St
Tech City: Foxfield
Tech State/Province: CO
Tech Postal Code: 80016
Tech Country: US
Bazi4life3.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
216.138.185.50 United States US 35
P address 216.138.185.50
Location Brookfield, Wisconsin, United States
IP address 216.138.185.50
Reverse DNS (PTR record) h50.185.138.216.ip.windstream.net
DNS server (NS record) ns4-auth.windstream.net (162.40.117.251)
ns1-auth.windstream.net (166.102.165.17)
ns3-auth.windstream.net (207.91.5.71)
ns2-auth.windstream.net (162.39.164.15)
ASN number 7029
ASN name (ISP) Windstream Communications LLC
IP-range/subnet 216.138.128.0/18
216.138.128.0 – 216.138.191.255
OrgName: Windstream Communications LLC
OrgId: WINDS-6
Address: 4001 Rodney Parham Rd
City: Little Rock
StateProv: AR
PostalCode: 72212
Country: US
RegDate: 2006-08-10
Updated: 2017-02-01

@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
71.209.177.224 United States US 26
IP address 71.209.177.224
Location Phoenix, Arizona, United States (
IP address 71.209.177.224
Reverse DNS (PTR record) 71-209-177-224.phnx.qwest.net
DNS server (NS record) authns1.mpls.qwest.net (63.150.72.4)
authns3.sttl.qwest.net (63.150.72.4)
authns2.dnvr.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 71.208.0.0/12
71.208.0.0 – 71.223.255.255
Number of SPAM hosts on 71.208.0.0/12 505
IP address 71.208.0.0
Location Fort Myers, Florida, United States

@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States left http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730607.14
3/22/2018 9:56:49 AM (1 minute ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

United States left http://www.stewwebb.com/2018/03/16/radio-stew-webb-tom-heneghan-and-leo-wanta-march-16-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730105.75
3/22/2018 9:48:27 AM (11 minutes ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Minneapolis, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521727906.04
3/22/2018 9:11:48 AM (49 minutes ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
United States Minneapolis, United States tried to access non-existent page http://www.stewwebb.com/http[s]:/rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:22 AM (1 hour 3 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
United States Minneapolis, United States tried to access non-existent page http://www.stewwebb.com/http[s]:/rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:22 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Type: Human
United States Minneapolis, United States visited http://www.stewwebb.com/http[s]://rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:19 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Type: 404 Not Found
United States Minneapolis, United States tried to access non-existent page http://www.stewwebb.com/http[s]:/rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:18 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Type: Human
United States Minneapolis, United States visited http://www.stewwebb.com/http[s]://rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:15 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36

@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States United States left http://www.stewwebb.com/2018/03/16/radio-stew-webb-tom-heneghan-and-leo-wanta-march-16-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521726859.53
3/22/2018 8:54:21 AM (1 hour 8 mins ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@
cyber attacker
Lindenhurst, United States left http://www.stewwebb.com/2018/03/20/u-s-countdown-starts/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521726371.37
3/22/2018 8:46:13 AM (1 hour 17 mins ago)
IP: 104.246.30.69 Hostname: ool-68f61e45.dyn.optonline.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
United States Lindenhurst, United States left http://www.stewwebb.com/2018/03/19/hillary-clinton-thinks-women-cant-see-shes-a-criminal-lesbian/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521726013.49
3/22/2018 8:40:15 AM (1 hour 25 mins ago)
IP: 104.246.30.69 Hostname: ool-68f61e45.dyn.optonline.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
@@@@@@@@@@@@@@@@@@@
Adelaide, Australia left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/
3/22/2018 7:29:27 AM (2 hours 37 mins ago)
IP: 202.161.14.82 Hostname: 202-161-14-82.dyn.iinet.net.au
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
% Information related to ‘202.161.0.0 – 202.161.31.255’
[8192 addresses in this network]
% Abuse contact for ‘202.161.0.0 – 202.161.31.255’ is ‘noc@staff.iinet.net.au’
[8192 addresses in this network]
inetnum: 202.161.0.0 – 202.161.31.255
[8192 addresses in this network]
netname: IINET-AU
descr: iiNet Limited
descr: Locked Bag 16
descr: Cloisters Square, WA, 6850
country: AU
org: ORG-IL1-AP
admin-c: NO20-AP
tech-c: NO20-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-IINET
mnt-irt: IRT-IINET-AU
last-modified: 2017-08-29T23:02:27Z
source: APNIC

irt: IRT-IINET-AU
address: iiNet Limited
address: Level 9, 250 St Georges Tce
address: Perth
address: WA 6000
e-mail: noc@staff.iinet.net.au
abuse-mailbox: noc@staff.iinet.net.au
admin-c: IH207-AP
tech-c: IH207-AP
auth: # Filtered
mnt-by: MAINT-AU-IH207-AP
last-modified: 2010-12-15T02:05:54Z
source: APNIC

organisation: ORG-IL1-AP
org-name: iiNet Limited
country: AU
address: 502 Hay St
phone: +61-8-9214-2222
fax-no: +61-8-9214-2211
e-mail: noc@iinet.net.au
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:16Z
source: APNIC

person: Network Operations
nic-hdl: NO20-AP
e-mail: apnic-admin@staff.iinet.net.au
address: iiNet Limited
address: Level 1
address: 502 Hay Street
address: Subiaco WA 6008
phone: +61 8 9214 2222
fax-no: +61 8 9214 2211
country: AU
mnt-by: MAINT-AU-IINET
last-modified: 2012-01-16T06:42:06Z

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Cedartown, United States arrived from https://feedreader.com/observe/stewwebb.com/+view and visited https://www.stewwebb.com/
3/22/2018 9:17:11 AM (43 minutes ago)
IP: 174.80.144.39 Hostname: 174-080-144-039.dhcp.chtrptr.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Phoenix, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521702913.3
3/22/2018 2:15:16 AM (7 hours 55 mins ago)
IP: 107.77.245.1 Hostname: 107.77.245.1
Browser: Firefox version 0.0 running on Android
Mozilla/5.0 (Android 5.0; Mobile; rv:59.0) Gecko/59.0 Firefox/59.0
Phoenix, United States left http://www.stewwebb.com/2013/12/19/illuminati-council-of-13-human-sacrifice-denver-colorado-dec-22/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521699404.09
3/22/2018 1:16:47 AM (8 hours 54 mins ago)
IP: 107.77.245.1 Hostname: 107.77.245.1
Browser: Firefox version 0.0 running on Android
Mozilla/5.0 (Android 5.0; Mobile; rv:59.0) Gecko/59.0 Firefox/59.0

@@@@@@@@@@@@@@@@@@@@@@@@
Blocked by firewall
cyber attacker
Kharkiv, Ukraine was blocked by firewall for SQL Injection in query string: fbuserid=1%20and%201%3D2%20union%20select%201%2C2%2C3%2C4%2C5%2Cconcat(user_login%2C0x3a%2Cuser_pass)%2C7%2C8… at http://stewwebb.com/?fbconnect_action=myhome&fbuserid=1+and+1%3D2+union+select+1%2C2%2C3%2C4%2C5%2Cconcat…
3/22/2018 7:21:15 AM (2 hours 35 mins ago)
IP: 109.86.210.25 Hostname: 25.210.86.109.triolan.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36
Type: Blocked
Ukraine Odesa, Ukraine was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 7:16:26 AM (2 hours 40 mins ago)
IP: 79.140.9.254 Hostname: 79-140-9-254.broadband.tenet.odessa.ua
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Perm, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 6:24:03 AM (3 hours 32 mins ago)
IP: 178.161.225.148 Hostname: 178.161.225.148.dyn.v4.saturn-internet.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Ukraine Kerch, Ukraine was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 2:51:23 AM (7 hours 5 mins ago)
IP: 5.101.213.253 Hostname: 253-213.plus.kerch.net
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Vyborg, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 12:30:11 AM (9 hours 26 mins ago)
IP: 178.67.84.167 Hostname: pppoe.178-67-84-167.avangarddsl.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Kazakhstan Kazakhstan was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/21/2018 10:42:24 AM (23 hours 13 mins ago)
IP: 95.58.158.196 Hostname: 95.58.158.196
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Romania Romania was blocked by firewall at http://www.stewwebb.com/
3/21/2018 10:29:30 AM (23 hours 26 mins ago)
IP: 188.240.208.26 Hostname: 188.240.208.26
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36
Type: Blocked
Romania Romania was blocked by firewall at http://www.stewwebb.com/
3/21/2018 10:29:28 AM (23 hours 26 mins ago)
IP: 188.240.208.26 Hostname: 188.240.208.26
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36
Type: Blocked
Russia Stavropol, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/21/2018 9:36:14 AM (1 day ago)
IP: 46.63.191.17 Hostname: 46.63.191.17
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/wp/
3/21/2018 7:17:41 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/wordpress/
3/21/2018 7:17:40 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/blog/
3/21/2018 7:17:39 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/21/2018 7:17:39 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/
3/21/2018 7:17:38 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/21/2018 7:17:37 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/robots.txt
3/21/2018 7:17:36 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
@@@@@@@@@@
??????????????
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/joomla/administrator/index.php
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/joomla/robots.txt
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/administrator/index.php
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/administrator/index.php
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/robots.txt
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wp/
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wordpress/
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/robots.txt
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wp/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wordpress/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/robots.txt
3/20/2018 9:32:10 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
Russia Stavropol, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/20/2018 7:20:38 PM (1 day 14 hours ago)
IP: 46.63.191.17 Hostname: 46.63.191.17
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Mitú, Colombia left http://www.stewwebb.com/2013/04/17/arkancide-is-the-unfortunate-habit-of-potential-witnesses-to-the-… and visited http://www.stewwebb.com/2013/04/17/arkancide-is-the-unfortunate-habit-of-potential-witnesses-to-the-clint…
3/22/2018 1:00:07 AM (9 hours 12 mins ago)
IP: 191.102.82.218 Hostname: azteca-comunicaciones.com
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
AZTECA-COMUNICACIONES.COM

@@@@@@@@@@@@@@@@@@@
cyber attacker
Canton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521692943.55
3/21/2018 11:29:06 PM (10 hours 44 mins ago)
IP: 174.232.138.201 Hostname: 201.sub-174-232-138.myvzw.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/23.1.148956103 Mobile/15C202 Safari/600.1.4

@@@@@@@@@@@@@@@@@@@@
cyber attacker
Clarkston, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521692627.22
3/21/2018 11:23:49 PM (10 hours 50 mins ago)
IP: 24.127.154.150 Hostname: c-24-127-154-150.hsd1.mi.comcast.net
Browser: Chrome version 55.0 running on Android
Mozilla/5.0 (Linux; Android 5.1.1; SM-G360V Build/LMY48B) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.91 Mobile Safari/537.36

@@@@@@@@@@@@@@@@@@@@
cyber attacker
Moreno Valley, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521692416.72
3/21/2018 11:20:23 PM (10 hours 54 mins ago)
IP: 47.153.237.142 Hostname: 47.153.237.142
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36

@@@@@@@@@@@@@@@@@@@
cyber attacker
Newport, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521688786.11
3/21/2018 10:19:48 PM (11 hours 57 mins ago)
IP: 68.188.174.246 Hostname: 68-188-174-246.dhcp.bycy.mi.charter.com
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1

@@@@@@@@@@@@@@@@@@@@@
United States left http://www.stewwebb.com/AIPAC_Officers_and_Board_members_20121127.htm and tried to access non-existent page http://www.stewwebb.com/aipac_mossad_espionage_inquiry_widens.htm
3/21/2018 8:10:52 PM (14 hours 7 mins ago)
IP: 216.160.191.240 Hostname: 216-160-191-240.hlrn.qwest.net
Human/Bot: Human
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@
United Kingdom Dursley, United Kingdom visited http://www.stewwebb.com/2018/03/20/u-s-countdown-starts/
3/21/2018 4:27:05 PM (17 hours 54 mins ago)
IP: 86.149.244.54 Hostname: host86-149-244-54.range86-149.btcentralplus.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; F3111 Build/33.2.A.4.70) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human
Canada Calgary, Canada visited http://www.stewwebb.com/
3/21/2018 4:25:54 PM (17 hours 55 mins ago)
IP: 70.75.60.119 Hostname: S0106789684bfb039.cg.shawcable.net

@@@@@@@@@@@@@@@@@@@
cyber attacker
Phoenix, United States left http://www.stewwebb.com/2016/12/09/george-w-bush-fraud-lock-him-up/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730766.07
3/22/2018 9:59:28 AM (23 minutes ago)
IP: 72.208.57.120 Hostname: ip72-208-57-120.ph.ph.cox.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.1.34 (KHTML, like Gecko) GSA/45.0.188348008 Mobile/15D100 Safari/604.1

@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Douglasville, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521732020.03
3/22/2018 10:20:22 AM (3 minutes ago)
IP: 73.237.241.240 Hostname: c-73-237-241-240.hsd1.ga.comcast.net
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States left http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/ and was blocked for Manual block by administrator at http://www.stewwebb.com/2018/03/16/radio-stew-webb-tom-heneghan-and-leo-wanta-march-16-2018/
3/22/2018 10:02:22 AM (21 minutes ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Human/Bot: Human
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
United States left http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730607.14
3/22/2018 9:56:49 AM (27 minutes ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

 

 




Radio Stew Webb and Tom Heneghan March 21 2018

Radio Stew Webb and Tom Heneghan March 21 2018

Intel Update – Tom Heneghan, Stew Webb (3-21-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Senior Executive Service (SES) IS the Deep State!

 

Senior Executive Service (SES) IS the Deep State!

Senior Executive Service (SES) IS the Deep State! from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Contributions are much appreciated

The below picture of the attempted murder of Stew Webb October 25, 2010 by two of Hillary Clinton’s Assassins. There were two more crashes and attempts one year later.
Contributions are much appreciated Thank You.– Stew Webb




Archives


Spot Dog is on the loose he loves to eat Illuminati, Zionist, Satanists and Lying Media Political Whores.
Stew Webb 32 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”