Blog Archives

Cyber Terrorist 510 Landing Circle Hudson WI against Stew Webb

October 6, 2018

Another Cyber Terrorist Throttling StewWebb.com

Evidence herein:

Cyber Terrorist 510 Landing Circle Hudson WI against Stew Webb

United States Hudson, United States was blocked for Manual block by administrator at http://www.stewwebb.com/?s=larry+mizel&submit=Go
10/6/2018 2:48:30 PM (2 hours 3 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/melbourne-australia-synergy-wholesale-cyber-attacks-against-stew-webb-…
10/6/2018 2:45:47 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
10/6/2018 2:45:46 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2015/11/28/us-government-and-israel-cyber-attacks-us-whistle-blower/embed/
10/6/2018 2:45:46 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2016/04/06/us-nsa-cyber-attacks-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:46 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/08/27/cia-secret-spy-tool/embed/
10/6/2018 2:45:46 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/08/27/the-u-s-spy-hub-australia/embed/
10/6/2018 2:45:45 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/09/04/google-fbi-kansas-city-cyber-terrorism-against-whistle-blower/embed/
10/6/2018 2:45:45 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/09/16/city-and-county-of-denver-cyber-terrorism-against-stew-webb-whistle-bl…
10/6/2018 2:45:41 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/10/09/george-hw-bush-cyber-terrorism-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:41 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Blocked
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/10/19/british-cyber-terrorist-attack-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:41 PM (2 hours 6 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Human/Bot: Human
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:40 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2017/10/31/kansas-city-fbi-cyber-attack-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:40 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2017/11/22/joes-data-center-cyber-terrorist-attacks-against-stew-webb-whistle-blo…
10/6/2018 2:45:35 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2017/12/19/xfinity-comcast-cyber-attacks-against-stew-webb-whistleblower/embed/
10/6/2018 2:45:34 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/01/11/george-bush-cyber-attacks-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:34 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2017/12/25/larry-mizel-insurance-co-cyber-attacks-against-stew-webb-whistle-blowe…
10/6/2018 2:45:33 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blow…
10/6/2018 2:45:33 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/01/22/kris-thompson-cyber-attacks-stew-webb-whistle-blower/embed/
10/6/2018 2:45:33 PM (2 hours 7 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:27 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/03/02/skype-cyber-attack-against-stew-webb-whistle-blower/embed/
10/6/2018 2:45:26 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/03/03/melbourne-australia-synergy-wholesale-cyber-attacks-against-stew-webb-…
10/6/2018 2:45:26 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/03/23/wide-open-west-finance-llc-cyber-attacks-against-stew-webb-whistleblow…
10/6/2018 2:45:26 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2018/03/16/cyber-terrorists-planting-malicious-codes-against-stew-webb-whistleblo…
10/6/2018 2:45:25 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/?s=larry+mizel&submit=Go and visited http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1/embed…
10/6/2018 2:45:25 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?s=larry+mizel&submit=Go
10/6/2018 2:45:19 PM (2 hours 8 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/stew-webb-store/ and visited http://www.stewwebb.com/
10/6/2018 2:44:18 PM (2 hours 9 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-store/
10/6/2018 2:44:01 PM (2 hours 9 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36
Type: Human
United States Hudson, United States visited http://www.stewwebb.com/
10/6/2018 2:43:13 PM (2 hours 10 mins ago)
IP: 68.47.71.150 Hostname: c-68-47-71-150.hsd1.wi.comcast.net
Browser: Chrome version 69.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36 OPR/56.0.3051.36

https://www.google.com/maps?q=44.9822006,-92.6995010&z=6

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb 35 years a US Federal Whistle blower

 




Radio Stew Webb and Tom Heneghan August 7 2018

Radio Stew Webb and Tom Heneghan August 7 2018

Intel Briefing – Tom Heneghan, Stew Webb (8-7-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb

 

 




Radio Stew Webb and Tom Heneghan August 3 2018

Radio Stew Webb and Tom Heneghan August 3 2018

Intel Briefing – Tom Heneghan, Stew Webb (8-3-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb

Contact: Stew Webb Federal Whistle blower 35 years

816-492-9809

federalwhistleblower@gmail.com

10607 E. Sheley Road

Independence, Missouri 64052

 




Radio Stew Webb and Tom Heneghan June 15 2018

Radio Stew Webb and Tom Heneghan June 15 2018

 

Intel Briefing – Tom Heneghan Stew Webb (6-15-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan May 14 2018

Radio Stew Webb and Tom Heneghan May 14 2018

Intel Update – Tom Heneghan, Stew Webb (5-14-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Attackers Felonies against Stew Webb Whistle blower April 26 2018

  Timothy Garrison US Attorney Kansas City, Missouri

By Stew Webb Federal Whistle blower

Letter to Kansas City US Attorney Timothy  Garrison purpose to Prosecute Cyber Terrorism

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

Reference Prosecution of Cyber Terrorism here is the evidence:

Evidence of Cyber Attacks against Stew Webb US Federal Whistle blower April 18 2018

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

President Trump Stop NSA NAZI Espionage
http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence: Cyber Attackers Felonies against Stew Webb Whistle blower April 26 2018

San Diego, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524647129.89
4/25/2018 4:05:32 AM (5 hours 50 mins ago)
IP: 184.176.39.235 Hostname: wsip-184-176-39-235.ok.ok.cox.net
Browser: Firefox version 59.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Type: Human
United States San Diego, United States visited http://www.stewwebb.com/
4/25/2018 4:05:28 AM (5 hours 50 mins ago)
IP: 184.176.39.235 Hostname: wsip-184-176-39-235.ok.ok.cox.net
Browser: Firefox version 59.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0

Burnaby, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/04/21/i-saw-hillary-clinton-huma-abedin-snuff-film-they-deserve-execution/
4/25/2018 3:46:58 AM (6 hours 10 mins ago)
IP: 104.218.63.41 Hostname: 104.218.63.41
Browser: Chrome version 64.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.119 Safari/537.36

Finland left http://www.stewwebb.com/2018/04/21/fbi-raids-satanic-human-sacrifice-video/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524628945.56
4/24/2018 11:02:28 PM (11 hours 1 min ago)
IP: 83.245.237.186 Hostname: 83-245-237-186-nat-p.elisa-mobile.fi
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1

? was blocked by real-time IP blacklist at http://www.stewwebb.com/favicon.ico
4/25/2018 4:00:34 AM (6 hours 8 mins ago)
IP: 77.247.181.162 Hostname: chomsky.torservers.net
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
was blocked by real-time IP blacklist at http://www.stewwebb.com/2018/04/15/hillary-clinton-huma-rape-tape-leaked-sources-report/
4/25/2018 4:00:33 AM (6 hours 8 mins ago)
IP: 77.247.181.162 Hostname: chomsky.torservers.net
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
? was blocked by real-time IP blacklist at http://www.stewwebb.com/favicon.ico
4/25/2018 4:00:34 AM (6 hours 7 mins ago)
IP: 77.247.181.162 Hostname: chomsky.torservers.net
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0

Israel Tel Aviv, Israel was blocked access via country blocking at http://www.stewwebb.com/tag/us-national-news/page/6/
4/25/2018 12:31:18 AM (9 hours 40 mins ago)
IP: 79.179.102.50 Hostname: bzq-79-179-102-50.red.bezeqint.net
Human/Bot: Bot

Millet, Canada left http://www.stewwebb.com/category/breaking-news/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/melbourne-australia-synergy-wholesale-cyber-attacks-against-stew-webb-…
4/25/2018 11:00:40 AM (2 minutes ago)
IP: 204.237.80.192 Hostname: xplr-204-237-80-192.xplornet.com
Human/Bot: Human
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

? was blocked by real-time IP blacklist at http://www.stewwebb.com/favicon.ico
4/25/2018 4:00:34 AM (8 hours 50 mins ago)
IP: 77.247.181.162 Hostname: chomsky.torservers.net
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
Type: Blocked
was blocked by real-time IP blacklist at http://www.stewwebb.com/2018/04/15/hillary-clinton-huma-rape-tape-leaked-sources-report/
4/25/2018 4:00:33 AM (8 hours 50 mins ago)
IP: 77.247.181.162 Hostname: chomsky.torservers.net
Human/Bot: Bot
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0

Fremont, United States tried to access non-existent page http://www.stewwebb.com/Al%20Gore%20Criticizes%20Bush%20CIA%20director%20pic.html
4/25/2018 12:01:59 PM (4 minutes ago)
IP: 66.160.140.180 Hostname: 66.160.140.180
Human/Bot: Bot
Browser: undefined
The Knowledge AI
he.net

Type: Bot
United States United States visited http://www.stewwebb.com/
4/25/2018 2:08:45 PM (1 minute ago)
IP: 181.177.111.175 Hostname: 181.177.111.175
Browser: Firefox version 52.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; rv:52.0) Gecko/20100101 Firefox/52.0
% The data below is provided for information purposes
% and to assist persons in obtaining information about or
% related to AS and IP numbers registrations
% By submitting a whois query, you agree to use this data
% only for lawful purposes.
% 2018-04-25 16:09:09 (BRT -03:00)

inetnum: 181.177.96/19
status: reallocated
owner: My Tec BZ
ownerid: US-MTBZ-LACNIC
responsible: Rolando Ruiz
address: 61 Washington Ave, ,
address: 10901 – Suffern – NY
country: US
phone: +1 845 8457800
owner-c: MTB2
tech-c: MTB2
abuse-c: MTB2
created: 20180227
changed: 20180227
inetnum-up: 181.177.64/18

nic-hdl: MTB2
person: Rolando Ruiz
e-mail: admin1@MY-TEC.BZ
address: 61 Washington Ava, ,
address: – Suffern – NY
country: US
phone: +1 845 8457800
created: 20121120
changed: 2018022

Rio Rancho, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524736875.88
4/26/2018 5:01:19 AM (19 minutes ago)
IP: 168.103.126.229 Hostname: 168-103-126-229.albq.qwest.net
Browser: Firefox version 57.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:57.0) Gecko/20100101 Firefox/57.0

United States Thatcher, United States left http://www.stewwebb.com/2016/03/28/hillary-clinton-likes-killing-people-says-julian-assange/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524699045.07
4/25/2018 6:30:47 PM (11 hours 8 mins ago)
IP: 160.3.8.9 Hostname: 3-0-0-8-9.cpe.cableone.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
Sorry, but no data for that IP or domain was found.

Billings, United States left http://www.stewwebb.com/2018/04/21/congressional-criminal-referral-issued-for-comey-clinton-lynch-mc… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524697542.99
4/25/2018 6:05:45 PM (11 hours 37 mins ago)
IP: 98.127.229.93 Hostname: host-98-127-229-93.static.bresnan.net
Browser: Safari version 10.1 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/603.3.8 (KHTML, like Gecko) Version/10.1.2 Safari/603.3.8

Dallas, United States visited http://www.stewwebb.com/
4/26/2018 5:29:59 AM (28 minutes ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
Type: Bot

Fannie Mae
198.204.189.245 United States US 53 hits in last 24 hours
P address 198.204.189.245
Location Washington, District of Columbia, United States
IP address 198.204.189.245
Reverse DNS (PTR record) not available
DNS server (NS record) ns-b.pnap.net (64.94.123.36)
ns2.fanniemae.com (198.204.142.65)
ns1.fanniemae.com (198.204.134.65)
ns-d.pnap.net (64.95.61.36)
ns-c.pnap.net (64.95.61.4)
ns-a.pnap.net (64.94.123.4)
ASN number 11313
ASN name (ISP) Fannie Mae
IP-range/subnet 198.204.189.0/24
198.204.189.0 – 198.204.189.255
NetRange: 198.204.128.0 – 198.204.202.255
CIDR: 198.204.128.0/18, 198.204.192.0/21, 198.204.200.0/23, 198.204.202.0/24
NetName: FNMA-CNETS
NetHandle: NET-198-204-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: Fannie Mae (FANNIE)
RegDate: 1994-04-12
Updated: 2004-05-18
Ref: https://whois.arin.net/rest/net/NET-198-204-128-0-1
OrgName: Fannie Mae
OrgId: FANNIE
Address: 3900 Wisconsin Avenue, NW
City: Washington
StateProv: DC
PostalCode: 20016
Country: US
RegDate: 1992-03-06
Updated: 2011-09-24

162.247.96.227 United States US 250 hits in 24 hours
United States Wilmington, United States left http://www.stewwebb.com/admin.php/module/action/param1/${@eval($_POST[c])} and was blocked by real-time IP blacklist at http://www.stewwebb.com/admin.php/module/action/param1/$%7B@eval($_POST%5Bc%5D)%7D
4/26/2018 7:54:33 AM (4 hours 40 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/admin.php/module/action/param1/${@eval($_POST[c])} and was blocked by real-time IP blacklist at http://www.stewwebb.com/admin.php/module/action/param1/$%7B@eval($_POST%5Bc%5D)%7D
4/26/2018 7:54:32 AM (4 hours 40 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/admin.php/module/action/param1/${@eval($_POST[c])} and was blocked by real-time IP blacklist at http://www.stewwebb.com/admin.php/module/action/param1/$%7B@eval($_POST%5Bc%5D)%7D
4/26/2018 7:54:32 AM (4 hours 40 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/utility/convert/data/config.inc.php and was blocked by real-time IP blacklist at http://www.stewwebb.com/utility/convert/data/config.inc.php
4/26/2018 7:54:31 AM (4 hours 40 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/1.asp and was blocked by real-time IP blacklist at http://www.stewwebb.com/1.asp
4/26/2018 7:54:31 AM (4 hours 41 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/index.asp and was blocked by real-time IP blacklist at http://www.stewwebb.com/index.asp
4/26/2018 7:54:30 AM (4 hours 41 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/admin/index.asp and was blocked by real-time IP blacklist at http://www.stewwebb.com/admin/index.asp
4/26/2018 7:54:30 AM (4 hours 41 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1)
Type: Blocked
United States Wilmington, United States left http://www.stewwebb.com/plus/mybak.php and was blocked by real-time IP blacklist at http://www.stewwebb.com/plus/mybak.php
4/26/2018 7:54:29 AM (4 hours 41 mins ago)
IP: 162.247.96.227 Hostname: 162.247.96.227
Human/Bot: Bot
tisp.com

72.11.140.74 United States US 65 hits in 24 hours
Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/okolice-ilawa/chat/upload.php
4/26/2018 11:08:03 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Type: Blocked
United States Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/upload.php
4/26/2018 11:07:58 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Type: Blocked
United States Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/m/video/upload.php
4/26/2018 11:07:54 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Type: Blocked
United States Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/m/upload.php
4/26/2018 11:07:49 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Type: Blocked
United States Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/radiopoljubac/posts/upload.php
4/26/2018 11:07:45 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Type: Blocked
United States Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/exploits/28709/upload.php
4/26/2018 11:07:41 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Browser: IE version 9.0 running on Win7
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0)
Type: Blocked
United States Los Angeles, United States was blocked by firewall for Malicious File Upload (Patterns) at http://www.stewwebb.com/exploit/description/upload.php
4/26/2018 11:07:36 AM (1 hour 23 mins ago)
IP: 72.11.140.74 Hostname: 72.11.140.74.static.quadranet.com
Human/Bot: Bot
Domain Tools
supervaluestore.in
shopforpcmonitors.in
gioneephones.co.in
lavaphones.co.in
print-my-stuff.co.in
shopforbabyproducts.in
shopforchairs.in
lenovophones.co.in
shopfortshirts.in
shopforeyeglasses.in
Name servers on 72.11.140.200
ns1.rochaab.in
ns1rochab.co.in
ns2.rochaab.in
ns2.rochab.co.in
Mail servers on 72.11.140.200
Registrar: Go Daddy, LLC
Registry Registrant ID: C133704814-CNIC
Registrant Name: Vijaya J
Registrant Organization:
Registrant Street: tilak nagar
Registrant City: bangalore
Registrant State/Province: Karnataka
Registrant Postal Code: 560041
Registrant Country: IN
91.8618353461
wenxuece.com

Fort Lauderdale, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524759653.23
4/26/2018 11:20:55 AM (1 hour 19 mins ago)
IP: 12.150.206.162 Hostname: 12.150.206.162
Browser: Chrome version 65.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
att.com

Houston, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524759137.26
4/26/2018 11:12:19 AM (1 hour 29 mins ago)
IP: 70.139.120.85 Hostname: 70-139-120-85.lightspeed.hstntx.sbcglobal.net
Browser: Chrome version 0.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.137 YaBrowser/17.4.1.1026 Yowser/2.5 Safari/537.36

Houston, United States left http://www.stewwebb.com/2015/08/28/ted-gunderson-ex-wife-jocelyn-tells-all-about-fbi-troll/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524758671.6
4/26/2018 11:04:33 AM (1 hour 37 mins ago)
IP: 70.139.120.85 Hostname: 70-139-120-85.lightspeed.hstntx.sbcglobal.net
Browser: Chrome version 0.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.137 YaBrowser/17.4.1.1026 Yowser/2.5 Safari/537.36

Enfield, United States was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/04/03/hillary-clinton-link-sex-cult-nxivm-also-roger-stone/
4/26/2018 9:34:26 AM (3 hours 9 mins ago)
IP: 32.209.168.60 Hostname: 32.209.168.60
Human/Bot: Human
Browser: Firefox version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Sorry, but no data for that IP or domain was found.
32.209.168.60
Location Enfield, Connecticut, United States (U
IP address 32.209.168.60
Reverse DNS (PTR record) not available
DNS server (NS record) auth.roch.ny.frontiernet.net

 




FaceBook Cyber Attack against Stew Webb Whistle blower April 22 2018

FaceBook Cyber Attack against Stew Webb Whistle blower April 22 2018

By Stew Webb Federal Whistle blower

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusion Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism

http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-prosecute-cyber-terrorism/

 

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018

http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

 

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018

http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

 

President Trump Stop NSA NAZI Espionage

http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

 

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

 

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018

http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

 

Letter to President Trump 2017-02-23 from Whistle blowers

http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

 

Letter to Attorney General Jeff Sessions from Whistle blowers

https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

 

Stew Webb Whistle blower sues US Government Assassins P1of2

http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/

 

Stew Webb Grand Jury Demands

http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

FaceBook Cyber Attack against Stew Webb Whistle blower April 22 2018

Evidence:

United States United States visited http://www.stewwebb.  com/?  wordfence_syncAttackData=1524417409.55
4/22/2018 12:29:05 PM (1 minute ago)
IP: 173.252.95.10 Hostname: 173.252.95.10
Browser: undefined
Mozilla/5.0 (compatible; Facebot 1.0; https://developers.facebook.com/docs/sharing/webmasters/crawler)
NetRange: 173.252.64.0 – 173.252.127.255
[16384 addresses in this network]
CIDR: 173.252.64.0/18 (173.252.64.0 – 173.252.127.255)
[16384 addresses in this network]
NetName: FACEBOOK-INC
NetHandle: NET-173-252-64-0-1
Parent: NET173 (NET-173-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS32934
Organization: Facebook, Inc. (THEFA-3)
RegDate: 2011-02-28
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-173-252-64-0-1
OrgName: Facebook, Inc.
OrgId: THEFA-3
Address: 1601 Willow Rd.
City: Menlo Park
StateProv: CA
PostalCode: 94025
Country: US
RegDate: 2004-08-11
Updated: 2012-04-17
Ref: https://whois.arin.  net/rest/org/THEFA-3
OrgAbuseHandle: OPERA82-ARIN
OrgAbuseName: Operations
OrgAbusePhone: +1-650-543-4800
OrgAbuseEmail: noc  @  fb.com
OrgAbuseRef: https://whois.arin.  net/rest/poc/OPERA82-ARIN
OrgTechHandle: OPERA82-ARIN
OrgTechName: Operations
OrgTechPhone: +1-650-543-4800
OrgTechEmail: noc  @  fb.com

 




Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018

By Stew Webb US Federal Whistle blower

Evidence of Cyber Attacks against Stew Webb Federal Whistle blower April 21 2018

Related:

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism
http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-prosecute-cyber-terrorism/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018
http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

President Trump Stop NSA NAZI Espionage
http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

Letter to Attorney General Jeff Sessions from Whistle blowers
https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

Stew Webb Whistle blower sues US Government Assassins P1of2
http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/

Stew Webb Grand Jury Demands
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusion Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Total 534 Felonies Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018
http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

Evidence of Cyber Attacks against Stew Webb Federal Whistle blower April 21 2018

Begin Felony Number 535

535
cogentco Israel of US Gov
Naples, United States arrived from https://t.co/N0UQ2ezwWp?amp=1 and visited http://www.stewwebb.com/2016/05/25/hillary-clinton-lesbian-demon-pedophile-child-rapist/
4/15/2018 9:27:15 PM (14 hours 22 mins ago)
IP: 23.252.192.179 Hostname: 23.252.192.179
Browser: Chrome version 63.0 running on Android
Mozilla/5.0 (Linux; Android 8.0.0; SM-G955U Build/R16NW) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36

Sorry, but no data for that IP or domain was found.
Hotwire Communications

IP address 23.252.192.179
Location Naples, Florida, United States
IP address 23.252.192.179
Reverse DNS (PTR record) not available
DNS server (NS record) dns2.hwccustomers.com (23.252.205.5)
dns1.hwccustomers.com (23.252.205.4)
ASN number 23089
ASN name (ISP) Hotwire Communications
IP-range/subnet 23.252.192.0/20
23.252.192.0 – 23.252.207.255
536
Belchertown, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1523838427.18
4/15/2018 7:27:09 PM (16 hours 35 mins ago)
IP: 97.80.126.94 Hostname: 97-80-126-94.dhcp.oxfr.ma.charter.com
Browser: Firefox version 59.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
Type: Human
United States Belchertown, United States visited http://www.stewwebb.com/
4/15/2018 7:27:06 PM (16 hours 35 mins ago)
IP: 97.80.126.94 Hostname: 97-80-126-94.dhcp.oxfr.ma.charter.com
Browser: Firefox version 59.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
537
Czechia Jevisovka, Czechia left http://www.stewwebb.com/2013/09/16/daddy-bush-the-illuminati-wizard-of-oz/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524059377.41
4/18/2018 8:49:41 AM (13 minutes ago)
IP: 88.100.104.135 Hostname: 135.104.broadband5.iol.cz
Browser: Chromium version 48.0 running on Linux
Mozilla/5.0 (X11; Linux i686) AppleWebKit/537.36 (KHTML, like Gecko) Ubuntu Chromium/48.0.2564.82 Chrome/48.0.2564.82 Safari/537.36
Type: Human
528
cogentco
Secaucus, United States left http://www.stewwebb.com/tag/whistleblower/page/2/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/well-known-dnt-policy
4/18/2018 6:24:22 AM (2 hours 50 mins ago)
IP: 38.132.124.246 Hostname: 38.132.124.246
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows; U; MSIE 9.0; Windows NT 9.0; en-US)

Sorry, but no data for that IP or domain was found.

539
Indonesia was blocked by real-time IP blacklist at http://www.stewwebb.com/wp-login.php
4/18/2018 6:03:53 AM (3 hours 13 mins ago)
IP: 36.83.116.39 Hostname: 36.83.116.39
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
540
Boise, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524026316.17
4/17/2018 11:38:38 PM (10 hours 1 min ago)
IP: 65.129.113.149 Hostname: 65-129-113-149.bois.qwest.net
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
541
Type: Human
United States Dover, United States left http://www.stewwebb.com/2015/10/06/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524016385.35
4/17/2018 8:53:07 PM (12 hours 50 mins ago)
IP: 98.117.246.125 Hostname: pool-98-117-246-125.hrbgpa.east.verizon.net
Browser: Chrome version 0.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.112 Safari/537.36
542
United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/melbourne-australia-synergy-wholesale-cyber-attacks-against-stew-webb-…
4/18/2018 2:04:30 PM (9 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299

Phoenix, United States visited http://www.stewwebb.com/
4/18/2018 2:03:35 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299

Type: Blocked
United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2018/03/03/melbourne-australia-synergy-wholesale-cyber-attacks-against-stew-webb-…
4/18/2018 2:04:30 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
4/18/2018 2:04:30 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2015/11/28/us-government-and-israel-cyber-attacks-us-whistle-blower/embed/
4/18/2018 2:04:30 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2016/04/06/us-nsa-cyber-attacks-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:28 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/08/27/cia-secret-spy-tool/embed/
4/18/2018 2:04:28 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/08/27/the-u-s-spy-hub-australia/embed/
4/18/2018 2:04:28 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/09/04/google-fbi-kansas-city-cyber-terrorism-against-whistle-blower/embed/
4/18/2018 2:04:28 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/09/14/us-dod-cyber-terrorism-against-federal-whistle-blower/embed/
4/18/2018 2:04:28 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/09/16/city-and-county-of-denver-cyber-terrorism-against-stew-webb-whistle-bl…
4/18/2018 2:04:28 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2017/10/09/george-hw-bush-cyber-terrorism-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:27 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Blocked

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/10/19/british-cyber-terrorist-attack-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:26 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Human/Bot: Human
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:26 PM (11 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2017/10/31/kansas-city-fbi-cyber-attack-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:21 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2017/11/22/joes-data-center-cyber-terrorist-attacks-against-stew-webb-whistle-blo…
4/18/2018 2:04:21 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2017/12/19/xfinity-comcast-cyber-attacks-against-stew-webb-whistleblower/embed/
4/18/2018 2:04:20 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2017/12/25/larry-mizel-insurance-co-cyber-attacks-against-stew-webb-whistle-blowe…
4/18/2018 2:04:20 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/01/11/george-bush-cyber-attacks-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:20 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/01/22/kris-thompson-cyber-attacks-stew-webb-whistle-blower/embed/
4/18/2018 2:04:20 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/01/16/usag-sessions-larry-mizel-cyber-attacks-against-stew-webb-whistle-blow…
4/18/2018 2:04:20 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/03/02/skype-cyber-attack-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:19 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/embed/
4/18/2018 2:04:19 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/03/23/wide-open-west-finance-llc-cyber-attacks-against-stew-webb-whistleblow…
4/18/2018 2:04:19 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/03/03/melbourne-australia-synergy-wholesale-cyber-attacks-against-stew-webb-…
4/18/2018 2:04:18 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and visited http://www.stewwebb.com/2018/03/16/cyber-terrorists-planting-malicious-codes-against-stew-webb-whistleblo…
4/18/2018 2:04:18 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-apri…
4/18/2018 2:04:15 PM (12 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human

United States Phoenix, United States visited http://www.stewwebb.com/
4/18/2018 2:03:35 PM (13 minutes ago)
IP: 184.98.127.81 Hostname: 184-98-127-81.phnx.qwest.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299

543
Top 5 IPs in last 24 hours from server
38.132.124.246 United States US 853
64.187.204.209 United States US 35

544
Fremont, United States visited http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2018%2F03%2F29%2Frad…
4/18/2018 4:07:23 PM (39 seconds ago)
IP: 66.160.140.182 Hostname: 66.160.140.182
Browser: undefined
The Knowledge AI
Sorry, but no data for that IP or domain was found.
he.net

545
Fremont, United States was blocked for Manual block by administrator at http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2018%2F03%2F28%2Fjam…
4/18/2018 4:15:30 PM (2 minutes ago)
IP: 66.160.140.182 Hostname: 66.160.140.182
Human/Bot: Bot
Browser: undefined
The Knowledge AI
Sorry, but no data for that IP or domain was found.

546
United States left http://www.stewwebb.com/2015/10/06/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524081696.11
4/18/2018 4:03:03 PM (6 minutes ago)
IP: 199.30.24.66 Hostname: msnbot-199-30-24-66.search.msn.com
Browser: undefined
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/534+ (KHTML, like Gecko) BingPreview/1.0b

547
United States Royal Oak, United States left http://www.stewwebb.com/2018/04/18/barbara-bush-witch-married-to-satan-dead-now-in-hell/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524080149.94
4/18/2018 2:35:53 PM (1 hour 38 mins ago)
IP: 73.161.174.17 Hostname: c-73-161-174-17.hsd1.mi.comcast.net
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (Linux; Android 5.1.1; KFASWI Build/LVY48F) AppleWebKit/537.36 (KHTML, like Gecko) Silk/65.2.3 like Chrome/65.0.3325.144 Safari/537.36

548
United States Groves, United States left http://www.stewwebb.com/2016/04/23/hillary-clinton-cia-agent-fired-watergate-committee/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524087826.4
4/18/2018 4:43:48 PM (15 minutes ago)
IP: 23.113.120.101 Hostname: 23-113-120-101.lightspeed.hstntx.sbcglobal.net
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

549
Sorry, but no data for that IP or domain was found.
United States Fremont, United States was blocked for Manual block by administrator at http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2018%2F03%2F28%2Fcyb…
4/18/2018 4:27:47 PM (33 minutes ago)
IP: 66.160.140.182 Hostname: 66.160.140.182
Human/Bot: Bot
Browser: undefined
The Knowledge AI

Type: Blocked
United States Fremont, United States was blocked for Manual block by administrator at http://www.stewwebb.com/?p=7496
4/18/2018 4:29:29 PM (32 minutes ago)
IP: 66.160.140.182 Hostname: 66.160.140.182
Human/Bot: Bot
Browser: undefined
The Knowledge AI
Type: Bot
he.net

550
United Arab Emirates Abu Dhabi, United Arab Emirates visited http://www.stewwebb.com/
4/18/2018 4:23:37 PM (39 minutes ago)
IP: 86.97.147.111 Hostname: bba488553.alshamil.net.ae
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1
Type: Bot

United Arab Emirates Abu Dhabi, United Arab Emirates visited http://www.stewwebb.com/wp-login.php
4/18/2018 4:23:33 PM (39 minutes ago)
IP: 86.97.147.111 Hostname: bba488553.alshamil.net.ae
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:40.0) Gecko/20100101 Firefox/40.1

551
Irwin, United States left http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-pro… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524118488.78
4/19/2018 1:14:51 AM (4 hours 50 mins ago)
IP: 73.79.163.246 Hostname: c-73-79-163-246.hsd1.pa.comcast.net
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (Linux; Android 4.4.3; KFTHWI Build/KTU84M) AppleWebKit/537.36 (KHTML, like Gecko) Silk/65.2.3 like Chrome/65.0.3325.144 Safari/537.36

552
United States Bloomington, United States left http://www.stewwebb.com/2014/02/03/aipac-and-abramoff-operated-child-sex-blackmail-ring/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524118008.15
4/19/2018 1:06:50 AM (4 hours 59 mins ago)
IP: 50.44.168.18 Hostname: 50.44.168.18
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

Sorry, but no data for that IP or domain was found.

553
Spokane, United States left http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524117411.38
4/19/2018 12:56:53 AM (5 hours 10 mins ago)
IP: 76.104.238.224 Hostname: c-76-104-238-224.hsd1.wa.comcast.net
Browser: IE version 11.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; EIE10;ENUSWOL; rv:11.0) like Gecko

Spokane, United States arrived from https://l.facebook.com/l.php?u=https%3A%2F%2Fwww.stewwebb.com%2F&h=ATPWdd_Ch-l7CT7NaJi1Na8W1S1t7rhQh… and visited https://www.stewwebb.com/
4/19/2018 12:55:48 AM (5 hours 12 mins ago)
IP: 76.104.238.224 Hostname: c-76-104-238-224.hsd1.wa.comcast.net
Browser: IE version 11.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64; Trident/7.0; EIE10;ENUSWOL; rv:11.0) like Gecko
cable.comcast.com

554
Salt Lake City, United States left http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-pro… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524113605.78
4/18/2018 11:53:27 PM (6 hours 18 mins ago)
IP: 198.91.56.119 Hostname: pub-198-91-56-119.sumofiber.com
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

555
Clinton, Iowa United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524105967.5
4/18/2018 9:46:10 PM (8 hours 29 mins ago)
IP: 173.28.71.77 Hostname: 173-28-71-77.client.mchsi.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-J727V Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

Sorry, but no data for that IP or domain was found.

556
Atlanta, United States left http://www.stewwebb.com/2018/04/14/radio-stew-webb-john-lear-glenn-canady-secret-space-program-alien… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524104050.77
4/18/2018 9:14:12 PM (9 hours 6 mins ago)
IP: 24.99.188.244 Hostname: c-24-99-188-244.hsd1.ga.comcast.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

557
United States Indian Trail, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524101083.46
4/18/2018 8:24:46 PM (9 hours 57 mins ago)
IP: 67.141.252.103 Hostname: h103.252.141.67.dynamic.ip.windstream.net
Browser: Edge version 14.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.79 Safari/537.36 Edge/14.14393

558
United States Arvada, United States left http://www.stewwebb.com/2013/09/10/exclusive-illuminati-photo-never-seen-before-area-52-nevada-20000… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524098138.63
4/18/2018 7:35:40 PM (10 hours 47 mins ago)
IP: 24.8.190.121 Hostname: c-24-8-190-121.hsd1.co.comcast.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.117 Safari/537.36

559
Rotterdam, Netherlands was blocked by real-time IP blacklist at http://www.stewwebb.com/xmlrpc.php
4/18/2018 9:37:55 PM (8 hours 59 mins ago)
IP: 103.194.169.7 Hostname: hosted-by.host-palace.com
Human/Bot: Bot
Browser: Chrome version 63.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
Type: Blocked
Netherlands Rotterdam, Netherlands was blocked by real-time IP blacklist at http://www.stewwebb.com/xmlrpc.php
4/18/2018 9:37:54 PM (8 hours 59 mins ago)
IP: 103.194.169.7 Hostname: hosted-by.host-palace.com
Human/Bot: Bot
Browser: Chrome version 63.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
Type: Blocked
Netherlands Rotterdam, Netherlands was blocked by real-time IP blacklist at http://www.stewwebb.com/wp-json/wp/v2/users/
4/18/2018 9:37:54 PM (8 hours 59 mins ago)
IP: 103.194.169.7 Hostname: hosted-by.host-palace.com
Human/Bot: Bot
Browser: Chrome version 63.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
% Information related to ‘103.194.169.0 – 103.194.169.255’
[256 addresses in this network]

560
Dearborn Heights, United States arrived from http://www.accessify.com/visit?domain=stewwebb.com and visited http://www.stewwebb.com/
4/19/2018 6:34:27 AM (13 minutes ago)
IP: 99.203.0.201 Hostname: 99-203-0-201.pools.spcsdns.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_1_1 like Mac OS X) AppleWebKit/604.3.5 (KHTML, like Gecko) Version/11.0 Mobile/15B150 Safari/604.1
http://www.accessify.com
Are you looking for IPv4 address 52.23.116.153?
IP address 52.23.116.153
Location Ashburn, Virginia, United States
IP address 52.23.116.153
Reverse DNS (PTR record) ec2-52-23-116-153.compute-1.amazonaws.com
DNS server (NS record) x1.amazonaws.com (156.154.64.10)
pdns1.ultradns.net (204.74.108.1)
x4.amazonaws.org (204.13.251.31)
x2.amazonaws.com (156.154.65.10)
x3.amazonaws.org (208.78.71.31)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 52.20.0.0/14
52.20.0.0 – 52.23.255.255

561
United States Woburn, United States left http://www.stewwebb.com/2018/04/18/barbara-bush-witch-married-to-satan-dead-now-in-hell/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524129987.18
4/19/2018 4:26:29 AM (2 hours 22 mins ago)
IP: 174.192.12.199 Hostname: 199.sub-174-192-12.myvzw.com
Browser: Chrome version 65.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-J727V Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36

562
United States United States tried to access non-existent page http://www.stewwebb.com/ads.txt
4/19/2018 5:59:07 AM (1 hour 18 mins ago)
IP: 192.82.242.9 Hostname: 192.82.242.9

United States United States visited http://stewwebb.com/ads.txt
4/19/2018 5:59:03 AM (1 hour 18 mins ago)
IP: 192.82.242.9 Hostname: 192.82.242.9

563
Rochester, United States left http://www.stewwebb.com/ and was blocked: Manual block by administrator at http://www.stewwebb.com/?wordfence_lh=1&hid=649FBC2B0EFB8115BDAE6931CADF6751&r=0.9807235115872697
4/19/2018 7:39:24 AM (56 seconds ago)
IP: 71.169.133.46 Hostname: pool-71-169-133-46.burl.east.myfairpoint.net
Human/Bot: Human
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

United States Rochester, United States left http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-pro… and visited http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-prosecut…
4/19/2018 7:38:30 AM (4 seconds ago)
IP: 71.169.133.46 Hostname: pool-71-169-133-46.burl.east.myfairpoint.net
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
Type: Human

United States Rochester, United States left http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-pro… and visited http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-prosecut…
4/19/2018 7:38:27 AM (6 seconds ago)
IP: 71.169.133.46 Hostname: pool-71-169-133-46.burl.east.myfairpoint.net
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
Type: Human

United States Rochester, United States left http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-pro… and visited http://www.stewwebb.com/2018/04/18/letter-to-kansas-city-us-attorney-timothy-garrison-purpose-to-prosecut…
4/19/2018 7:38:25 AM (3 seconds ago)
IP: 71.169.133.46 Hostname: pool-71-169-133-46.burl.east.myfairpoint.net
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
fairpoint.com

Rochester, United States arrived from https://search.yahoo.com/ and was blocked for Manual block by administrator at http://www.stewwebb.com/
4/19/2018 7:48:48 AM (24 minutes ago)
IP: 71.169.133.46 Hostname: pool-71-169-133-46.burl.east.myfairpoint.net
Human/Bot: Human
Browser: Chrome version 65.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

564
Ashburn, United States visited https://www.stewwebb.com/tag/obama-opponents-murdered/
4/19/2018 8:12:54 AM (1 minute ago)
IP: 54.162.173.119 Hostname: ec2-54-162-173-119.compute-1.amazonaws.com
Browser: undefined
CCBot/2.0 (http://commoncrawl.org/faq/
Ashburn, United States visited https://www.stewwebb.com/tag/cedar-rapids-cogentco-peter-davis-cyber-attacks-stew-webb-whistleblower/
4/19/2018 8:18:30 AM (27 seconds ago)
IP: 54.162.173.119 Hostname: ec2-54-162-173-119.compute-1.amazonaws.com
Browser: undefined
CCBot/2.0 (http://commoncrawl.org/faq/)
Type: Bot
United States Ashburn, United States visited https://www.stewwebb.com/tag/us-government-or-israel-cyber-attacks-against-stew-webb-whistleblower/
4/19/2018 8:17:53 AM (1 minute ago)
IP: 54.162.173.119 Hostname: ec2-54-162-173-119.compute-1.amazonaws.com
Browser: undefined
CCBot/2.0 (http://commoncrawl.org/faq/)

565
United States left http://www.stewwebb.com/2018/04/18/barbara-bush-witch-married-to-satan-dead-now-in-hell/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524151146.65
4/19/2018 10:19:08 AM (28 minutes ago)
IP: 107.77.169.10 Hostname: mobile-107-77-169-10.mobile.att.net
Browser: Safari version 11.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_5 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D60 Safari/604.1

566
Athens, Greece left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524298517.07
4/21/2018 3:15:20 AM (2 hours 29 mins ago)
IP: 46.177.2.16 Hostname: ppp046177002016.access.hol.gr
Browser: Firefox version 59.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
throttling
Athens, Greece left http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower… and was blocked: Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
4/21/2018 3:14:08 AM (2 hours 30 mins ago)

557
Topeka, United States left http://www.stewwebb.com/2017/01/02/who-controls-senator-john-mccain-larry-mizel-organized-crime-boss… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524296421.08
4/21/2018 2:40:23 AM (3 hours 8 mins ago)
IP: 99.106.121.121 Hostname: 99-106-121-121.lightspeed.tpkaks.sbcglobal.net
Browser: Safari version 9.1 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7

throttling site
topeka kanasa
United States Topeka, United States left http://www.stewwebb.com/category/breaking-news/ and was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/2017/10/31/larry-mizel-cyber-attack-against-stew-webb-whistle-blower/embed/
4/21/2018 2:44:47 AM (3 hours 2 mins ago)
IP: 99.106.121.121 Hostname: 99-106-121-121.lightspeed.tpkaks.sbcglobal.net
Human/Bot: Human
Browser: Safari version 9.1 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7

558

I will be adding to this list of the evidence for the prosecution of these felonies.

New Rochelle, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1524340948.22
4/21/2018 3:02:31 PM (12 minutes ago)
IP: 68.132.189.83 Hostname: pool-68-132-189-83.nycmny.fios.verizon.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E216
Type: Human
United States New Rochelle, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-archives/
4/21/2018 3:02:27 PM (12 minutes ago)
IP: 68.132.189.83 Hostname: pool-68-132-189-83.nycmny.fios.verizon.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Mobile/15E216
Type: Human
United States New Rochelle, United States arrived from https://duckduckgo.com/ and visited http://www.stewwebb.com/
4/21/2018 3:01:36 PM (13 minutes ago)
IP: 68.132.189.83 Hostname: pool-68-132-189-83.nycmny.fios.verizon.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_3 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Felony Mobile/15E216

559

 

 




Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism

Today April 18, 2018

Timothy Garrison US Attorney Kansas City, Missouri Appointed by US Attorney General Jeff Sessions

By Stew Webb Federal Whistle blower now 34 years

Welcome to the Web site for the U.S. Attorney’s Office in the Western District of Missouri.

U.S. Attorney Timothy A. Garrison is the top-ranking federal law enforcement official in the Western District of Missouri, which includes Kansas City, St. Joseph, Columbia, Jefferson City, Springfield and Joplin.

The office is responsible for prosecuting federal crimes in the district, including crimes related to terrorism, public corruption, child exploitation, firearms, and narcotics. The office also defends the United States in civil cases and prosecutes civil claims for the United States.

Kansas City Main Phone: (816) 426-3122 or toll free at 1-800-733-6558

Kansas City Fax Line: (816) 426-4210

Springfield Main Phone: (417) 831-4406 or toll free at 1-800-347-4493

Springfield Fax Line: (417) 831-0078

Jefferson City Main Phone: (573) 634-8214 or toll free at 1-800-836-3518

Jefferson City Fax Line: (573) 634-8723

Correspondence to the Western District of Missouri, including the U.S. Attorney , may be sent to:

Charles Evans Whittaker Courthouse
U.S. Attorney’s Office
Room 5510
400 East 9th Street
Kansas City, MO 64106

In Springfield:

U.S. Attorney’s Office
Hammons Tower, Suite 500
901 St. Louis
Springfield, MO 65806-2511

In Jefferson City:

U.S. Attorney’s Office
80 Lafayette Street, Suite 2100
Jefferson City, MO 65101

Contact Don Ledford, Public Affairs Officer, at ( 816) 426-4220 or by e-mail at Don.Ledford@usdoj.gov (link sends e-mail)

Letter to Kansas City US Attorney Timothy  Garrison purpose to Prosecute Cyber Terrorism

Certified Mail Sent: Number: add later

Reference Prosecution of Cyber Terrorism here is the evidence:

I also have  3 ½ — 4 years of evidence…

I am writing to inform you of Cyber Attacks against my website stewebb.com, my former telephone – internet company Comcast.net had direct dos attacks killing over 12 modems in 14 months.

I lost 4 computer screens and 2 computers due to these attacks.

I have enclosed links to evidence posted today for your benefit to expedite your prosecutions regarding cyber attacks against me.

Reference Prosecution of Cyber Terrorism here is the evidence:

Evidence of Cyber Attacks against Stew Webb US Federal Whistle blower April 18 2018

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

Cyber Attackers Felonies against Stew Webb Whistle blower April 26 2018
http://www.stewwebb.com/2018/04/26/cyber-attackers-felonies-against-stew-webb-whistle-blower-april-26-2018/

Plus 3 ½ — 4 years of evidence.

Please Note the links below enclosed to President Donald Trump and Attorney General Jeff Sessions

Today April 18, 2018

When may I come to the Grand Jury the Judge Richard Matsch of Denver gave me a standing order in 1995.

Sincerely,

Stewart A. Webb

816-492-9809

Stewart A. Webb

federalwhistleblower@gmail.com

816-492-9809

http://www.stewwebb.com

Stewart A. Webb

_____________________________

S/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018
http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

President Trump Stop NSA NAZI Espionage
http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

Letter to Attorney General Jeff Sessions from Whistle blowers
https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

Stew Webb Whistle blower sues US Government Assassins P1of2
http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

Evidence:

Stew Webb Grand Jury Demands
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

 




Stew Webb Whistle blower sues US Government Assassins P1of2

Accident20101015_Helicopter

Stew Webb’s Van 2010-10-25

Accident_20101025-44

Accident_20101025-17

Accident_20101025_Stew_Webb

Stew Webb Federal Whistle blower October 30, 2010 a week after nearly killed by U.S. Government Assassins

Stew Webb spent nearly 3 day in Intensive Care with Medical expenses exceeding $150,000 Dollars and loses to Van and equipment destroyed in Van and lifetime wages due to a broken neck and massive back injuries.

The punk below only had $25,000 in Insurance the Insurance Company settled in 2016.

AGAKIAS SITAI Alias Nsy Ctai alias jctai cta

AGAKIAS SITAI, Attempted Murderer of Stew Webb Federal Whistle blower on 2010-10-25

Known Kenyan Assassin 

AGAKIAS SITAI

Alias Nsy Ctai alias jctai cta

DOB 11/07/1985 Mo License Number: W213145015 Issued: 2010 in MO

Home Address: County: Jackson, Missouri

14022 BALLANTRAE DR GRANDVIEW MO 64030-4027

10209 HILLCREST RD, KANSAS CITY, MO. 64134

10107 Central Street #306 Kansas City, Missouri 64114  –2012

Cell: (913) 620-5931 Landline: (816) 347-2443.

  Studied Masters in Management Information Systems at Avila University

  Lives in Kansas City, Missouri

  From Nairobi, Kenya

AGAKIAS Sitai was formerly employed at John Knox Village Now in the IT field

EVERLYNE A OMONDI, Attempted Murderer of Stew Webb Federal Whistle blower on 2010-10-25

and EVERLYNE A OMONDI alias EVERLYNE ANYANGO BUTLER

EVENYNE ANYANGO OMONDI alias EVERLYNE ANYANGO BUTLER

DOB 12/06/76 SSN ISSUED 06 STATE ISSUED MO

Home Address: County: Jackson, Missouri

14022 BALLANTRAE DR GRANDVIEW MO 64030-4027

3410 E 70TH ST KANSAS CITY MO 64132-3244

10209 HILLCREST RD, KANSAS CITY, MO. 64134

10107 Central Street #306 Kansas City, Missouri 64114

EVERLYNE CA OMONDI, P.O. BOX 9671, KANSAS CITY, MO, 64134

Employment: American Medical Transport Kansas City, Missouri

Walmart 40 Highway and Sterling Kansas City, Missouri

Note: The above two known Kenya Assassins committed Insurance Fraud and False Claims against Stew Webb’s Insurance Company by illegally collection $3,145.15 for damages to their vehicle and $11,867.25 combined in Illegal medical expenses and further causes an additional $25,000.00 to be paid to an innocent victim another vehicle when the tire assemble broke Stew Webb’s van from rolling on the wall and flipped into the air an hit an oncoming vehicle and driver who was injured.

Grandview Missouri Police cover up attempted Murder of Stew Webb Federal Whistle blower.  

Example the Plaintiff has hundreds of incidents of Stalking and attempts to crash the Plaintiff while driving some incidents are by the same who attempted to murder Plaintiff Stewart Webb on October 25, 2010 Driver Agakias Sital Missouri Vehicle License number SH6-C4P his passenger Evelyn Omondi has direct ties to Carol Davis Special Attorney Assistant Registered to FBI SAC Ron Stern at United States Department of Justice Houston, Texas wparkspring   2 aol .com 281- 350 2943.

Including a recent incident of stalking at the Plaintiffs residence on August 7, 2012 involving Missouri License number DH4-M3G a White Toyota with a White male in his 60s the Plaintiff call 911 Independence Missouri Police who responded to Plaintiffs resident 3 hours later by Sgt Lowe to inform Plaintiff Stewart Webb that the License number came up not registered.

The Plaintiff has taken pictures and keep detailed License Plate Logs of the Stalkers some through research of Plaintiff have been found in the Parking Lot of Orion Investigations of Overland Park, Kansas at 95th and Nall. The Plaintiff was stalked in 1990 by the same Orion Investigation hired by Leonard Millman see evidence June 29, 1990 Independence, Missouri Police Report Number 90 14500-s stalkers Charles Stevens and Rodger Kelty of Orion Invesitgations.

Grandview, Missouri Police cover up attempted Murder of Stew Webb Federal Whistle blower.
Law Suit coming against Grandview, Missouri, US Government and others involved under RICO.

Grandview, Missouri Police Report #10-5206 Accident October 25, 2010
Conspiracy to Cover-up of attempted Murder, Obstruction of Justice,
Perjured, Changed and falsified report for FBI Division # 5  7th floor FBI Washington, DC Operating Secret Assassination Teams.
Stew Webb
Federal Whistleblower
federalwhistleblower@gmail.com
816-492-9809
http://www.stewwebb.com

Us Gov Assassins Attempted Murder of Stew Webb 2010-10-25 by stewwebb1 on Scribd

SEE: PROOF (Exhibits 1-22 below) Attemped murder and Grandview, Missouri Police Covered the car crash up.

https://www.scribd.com/document/375725011/Us-Gov-Assassins-Attempted-Murder-of-Stew-Webb-2010-10-25

  1. Suite 2016 : Stew Webb attorney and others collected $25000.00 I got nothing.
  2. Grandview Police Report Cover up for FBI Assassins.
  3. Police supplemental report after Webb finally got Sgt Pruitt on the telephone and see his lies about drugs etc. The Police never took Webb’s report.
  4. : Attached Report by Stew Webb Whistle blower
  5. Stew Webb Telephone record calling police several times to give report of what happened each call the clerks and police told Webb that they were still developing the police report when in fact 2 days after the crash they had already created the fictitious report.
  6. Webb learned from his Insurance Company Progressive the report had been completed 2 days after the crash attempted murder and Webb obtain a faxed copy from them on November 19 2010 nearly a month after the crash.
  7. Private Investigator ex Hiway Patrol Expert Report recreation of Accident attempted murder.
  8. Stew Webb Grand Jury Demands against Stew Webb ex-wife Kerre Millman, Leonard and Elaine Millman, George HW Bush, Neil Bush, Jeb Bush, William J. Clinton, Hillary Clinton, Larry Mizel, Norman Brownstein, Justice Department Officials and other Government Official, Employees and Government Stooges and Trolls.
  9. IN THE UNITED STATES DISTRICT COURT
  10. FOR THE DISTRICT OF KANSAS

Case Number: 09-CV-2603 JTM/DJW and Case Number: 02-09-CV-02603-FJG DJW

Filed November 24, 2009

PETITION FOR INJUNCTIVE RELIEF AGAINST THE HON. KATHRYN H. VRATIL, AND THE U.S. DISTRICT COURT OF THE STATE OF KANSAS, et al.

  1. IN THE UNITED STATES DISTRICT COURT

FOR THE DISTRICT OF KANSAS

STEWART A. WEBB  Plaintiff,

  1. Case No: 12-CV-2588 EFM/GLR

Filed September 5, 2012

HON. JUDGE KATHRYN H. VRATIL, in her

Official capacity as Chief Judge

for the United States District Court for

the District of Kansas

UNITED STATES DISTRICT COURT

FOR THE DISTRICT OF KANSAS

Defendant,

AFFIDAVIT IN SUPPORT OF STEWART A. WEBB COMPAINT FOR

INJUNCTIVE RELIEF AGAINST THE HON. KATHRYN H. VRATIL, AND THE U.S. DISTRICT COURT OF THE STATE OF KANSAS, et al.

  1. Burning down Plaintiffs Customers house on October 8, 2011 at 3418 W 77th Terrace, Prairie Village, Kansas valued at $160,000.00 to interrupt Plaintiffs Business which the owner’s fire insurance had lapsed. The Plaintiff has a detailed log of the Vehicle License Plates who stalked the Plaintiff Stewart Webb a few consecutive days prior to the house being destroyed.
  2. Violations involving Viking Insurance Co. aka Sentry Insurance Co. aka Dairyland Insurance Co. involving a car accident on November 11, 2011 in which the Plaintiff was hit in the left side two times on I-470 in Lees Summit, Missouri at 60 mph and the Driver Jay D. Stevens was ticketed by the Missouri Hi-way Patrol.

Stevens had been stalking the Plaintiff for over one hour prior to the so-called accident with an additional vehicle following behind Stevens a Black Dodge Pickup. The Driver Jay D. Stevens may be the same Jay Stevens owner of Jays Truck Driving School of Kansas City-St. Joe, Missouri a know Iran-Contra Drugs Smuggler who was named in the Iran-Contra Mena, Arkansas Oilver North-Bill and Hillary Clinton-George H. W. Bush and Leonard Millman illegal drug for guns operations and investigations by Independent Prosecutor Judge Lawrence Walsh.

  1. Violations of Failure to Protect Laws in Missouri by the Raytown, Missouri Police Department after a Gun was pulled on the Plaintiff in rush hour traffic on June 1, 2012 at 5:45 pm Raytown Police Report number 12-1470 yet the Plaintiff provide Raytown Police with the License Number Missouri CG8-Z1Y a Black 2 door Honda which the Detective J.D. Lawrence has never returned the Plaintiffs telephone calls.
  2. Violation of Mail and wire Frauds Laws Illegally Blacklist my emails on the internet and hijacking email list by spamming repeat up to 9 times in one hour by FBI and DHS Department of Homeland security.
  3. Violations of retaliation against Whistleblowers, Informants, Witnesses 18 U.S.C. 1010-1015, and RICO 18 U.S.C. 1960,
  4. Slander, Defamation of Character by various actors on the internet acting in behalf and on the payroll of FBI #5 the DHS Department of Homeland Security including Ex FBI Agent Ted Gunderson who tried to extort Plaintiff Stewart Webb and had a Las Vegas Police Swat Team Destroy the House Plaintiff was living in after 5 hours of interrogation by Las Vegas Detectives the Police left with no further actions or charges against Plaintiff Stewart A. Webb.

After Plaintiff filed a Restraining order against Ted Gunderson and Gunderson’s side kick Murderer Tom Gaul of Las Vegas Gaul filed illegal assault charges against Plaintiff Stewart Webb that were dismissed 1 ½ years later by the Las Vegas District Attorney.

  1. Violations of Federal RICO laws and 18 U.S.C. 1981-1982 Civil Rights violations for Falsification of the National NCIC Computer information system used by law enforcement. Where the information on the Plaintiff Stewart A. Webb is falsified and perjured information reported in the National NCIC information base.
  2. Violations of Privacy Laws and Various Federal and State of Missouri Stalking Laws. Attempted Murder Charges car crash. Example the Plaintiff has hundreds of incidents of Stalking and attempts to crash the Plaintiff while driving some incidents are by the same who attempted to murder Plaintiff Stewart Webb on October 25, 2012 Driver Agakias Sital Missouri Vehicle License number SH6-C4P his passenger Evelyn Omondi has direct ties to Carol Davis Special Attorney Assistant Registered to FBI SAC Ron Stern at United States Department of Justice Houston, Texas wparkspring at com  281- 350 2943.
  3. IN THE UNITED STATES DISTRICT COURT

FOR THE DISTRICT OF COLORADO

September 5, 2012

RE: US Grand Jury Proceeding Webb v. Millman, et al. Cr. Div. Case No. 95Y107 active

http://www.stewwebb.com/Henry_Solano_Former_Denver_US_Attorney_Obstructed_Justice_20120414.htm

LISTEN TO 1995 RECORDINGS BELOW OF US ATTORNEY HENRY SOLANO, Federal Whistleblower Stew Webb and Iran Contra Federal Whistleblower Al Martin giving facts supporting Leonard Millman’s Blackmail of the U.S. Congress and Senate Members.

  1. Stew Webb additional Grand Jury Witnesses FBI Operative Darlene Novenger and NSA CIA Operative Gene Chip Tatum both Murdered and their Audio Affidavits and Statements of Fact regarding Leonard Millman and George H.W. Bush Organized Crime Syndicate theft of 79,000 HUD repossessed Houses, Narcotics Money Laundering into Millmans MDC NYSE a public Traded Company run by Organized Crime Figure Larry Mizel of Denver, Colorado and Narcotics importation into the United States of America and Leonard Millman’s money Laundering of the Narcotics money.

http://www.youtube.com/user/stewwebb1

22. This car crash attempted murder is one of three crashes in one year the third was a Major Iran Contra aka Enterprise Narcotics smuggler Jay Stephens who operated Jay’s Truck Driving School who was aired on KCTV 5 in Kansas City Missouri in 1990-1991. Jay Stephens is the Cousin to Jackson Stephens who ran B.C.C.I. Bank of Credit and Commerce International who Hillary Clinton and the Rose Law Firm Represented in 1978 when the SEC filed a suit. BCCI aka known as the Outlaw Bank written by Author Jonathan Beaty. This Whistle blower Stew Webb worked with the attorneys on the Saudi Arabian European Corp lawsuit that named B.C.C.I. and the money laundering from Charles Keating of Lincoln Savings and Loan that landed Charles Keating in Prison under a RICO Lawsuit. MDC Holding, Inc. owned by this Whistle blowers ex in law Leonard Millman was the parent company of Silverado Savings and Loan were Neil Bush was a Director Narcotics Money Laundering for Iran Contra. MDC fraudulently setting in the Saudia case for $800,000 which was Frauds upon the Courts. The same people named Leonard Millman, Larry Mizel and Norman Brownstein control Great West Life of Englewood, Colorado which is the parent company of HSBC Bank the current Narcotics Money Laundering for the Narcotics worldwide for the Bush Millman Mizel Clinton Organized Crime Syndicate. Bill and Hillary Clinton attorney served on the Board of MDC-NYSE.
https://www.scribd.com/document/375725011/Us-Gov-Assassins-Attempted-Murder-of-Stew-Webb-2010-10-25

Us Gov Assassins Attempted Murder of Stew Webb 2010-10-25 by stewwebb1 on Scribd

 

City-of-Grandview-Missouri

Larry-Dickey-Grandview-Missouri-Police-Chief

Grandview, Missouri Police Chief Larry D. Dickey (2007 – 2011)

Sgt. Gregory Pruitt Retired Grandview, Missouri Police.

Sgt. Gregory Pruitt Grandview Police Covered up Attempted Murder of Whistle blower, Grandview Missouri Police Report #10-5206 Accident October 25, 2010, Conspiracy to Cover-up of attempted Murder, Obstruction of Justice, Perjured, Changed and falsified report.  Violated Stew Webb’s Constitutional and Civil Rights.

 

Greg worked at the Grandview Police Department for over thirty years. His desire to become an instructor and teach motorcycle classes comes from some of the unpleasant sights that he has observed over the years.

He first taught the Basic Rider Motorcycle course at the Missouri Safety Center located on the campus of CMSU (now UCM). Several years ago he went through the Harley-Davidson Instructor Course to teach Riders Edge at Gail’s Harley Davidson.  “I enjoy teaching new riders who have never been on a motorcycle in their life, or have very little experience.”

Greg also teaches the Riders Edge Experienced Rider Course ERC (Riding Academy). He enjoys showing riders something new or just giving them the opportunity to smooth out their techniques during class.

http://www.gailsharleydavidson.com/ride

 

Stew Webb’s Van Attempted Murder 2010-10-25

There were 2 attempts in one year on Stew Webb’s life between 2010 and 2011.

There were attempts upon the lives of three other people below who we were all working together to try and bring Jeb Bush and Leonard Millman, Larry Mizel Organized Crime to Justice here in Kansas City between 2009 – Current.

 

In the above Novation case two US Attorney in Fort Worth Texas were Murdered after they filed Indictment against Novation LLC.

Illegally disbarred Attorney Bret Landrith http://www.bretlandrith.com who sued Novation LLC a Jeb Bush medical supply company for RICO in behalf of his client Sam Laperi http://www.medicalsupplychain.com and a Mortgage Banker turned attorney who was working with now Senator Elizabeth Warren regarding the information Stew Webb and other were providing regarding the Illegal Mortgage Backed Securities created by Stew Webb’s former in law Leonard Millman and his partners Larry Mizel and Norman Brownstein that lead to the illegal Bank Bail Out of September 2008 which has never been prosecuted and was intentional and illegally obstructed by then Attorney General Eric Holder who now is on the payroll of HSBC Bank owned by Deceased 2004 Leonard Millman and his partners Larry Mizel and Norman Brownstein.

FBI using Kenya Assassins below run by Overland Park, Kansas.

Kreg Stonestreet, Mitt Romney’s cousin.

FBI Divison Number Five (# 5) are the same scumbags who were fired recently involving President Donald Trump, McCabe and others in Division # 5 seventh floor FBI Washington, DC.

FBI Retired Kreg Stonestreet of Overland Park, Kansas

now works for Bank of the West.

Mitt Romney and Jeb Bush Conspire to Murder

Hillary Clinton Bush Assassination Teams Revealed in Hillary’s emails

Stew Webb’s Filing in US District Court Kansas City, Kansas and US District Court Kansas City Missouri between 2009 – 2012 and all filings were illegally  Obstructed and Judges and US Attorney did not follow the rule of Law and Violated Stew Webb’s Constitutional and Civil Rights as well as covered up an attempted murder of the below named two Kenya Assassins.

Stew Webb Injunctive Relief

Case No: 09-2603 JTM/DJW

Filed November 24, 2009 3:54pm

Motion for Criminal Referral

Stew Webb Suit for attempted murder filed pro se after two Attorneys’ were threatened by phone who agreed to take my case. US Federal Judge Gitain signed an order that I did not have the right to discovery subpoena power I shortly thereafter asked for dismissal without prejudice.

COMPLAINT_FOR_INJUNCTIVE_RELIEF

Stewart_Webb_Amended_Complaint

STEWART_WEBB_COMPLAINT_IN_KANSAS_COURT

MOTION_TO_WITHDRAW_WITHOUT_PREJUDICE_Part1

MOTION_TO_WITHDRAW_WITHOUT_PREJUDICE_Part2

Letter to FBI Director James Comney by Bret Landrith

Stew Webb Whistle blower Grand Jury Demand against Hillary Clinton Jeb Bush and others refilled in Kansas City Kansas Federal Clerk September 2009 and again with Injunctive Relief filing September 2010 over the Mortgage Bank Bailout Frauds as a Federal Whistle blower.

Saving and Loan whistle blower faces federal charges 1992

Stew Webb Official SEC Whistle blower Complaint Mortgage Backed Securities Fraud

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

 

Modern American women succeed under Republican economic policies

The Hill

“Evidence that policies focused on growth and economic mobility greatly improve the lives of women is everywhere,” fiscal policy expert Mattie Duppler writes in The Hill. Duppler highlights how the Tax Cuts and Jobs Act signed by President Donald J. Trump has improved the landscape for women, whether they are “workers, or bosses, or stay-at-home moms.”

————————-

Federal prosecutors told to seek death penalty in drug cases

Reuters

“U.S. Attorney General Jeff Sessions instructed federal prosecutors on Wednesday to seek the death penalty in drug-related cases whenever it is ‘appropriate,’ saying the Justice Department must boost efforts to counter America’s epidemic of opioid abuse,” Reuters reports. The Attorney General’s remarks came after President Trump announced a detailed plan on the opioid crisis earlier this week.

————————-

Daily Signal exclusive: Ivanka Trump on jobs, millennials, and #MeToo

– The Daily Signal

Senior leaders from across the Administration—including President Trump himself—fielded a range of questions Thursday at Generation Next, a White House forum for millennials. Senior Adviser Ivanka Trump sat down with The Daily Signal for a Q&A, explaining why she thinks “this is a moment of incredible opportunity” for women in America.

————————-

AIDS researcher Robert R. Redfield named to lead the C.D.C.

– The New York Times

On Wednesday, the Trump Administration tapped Dr. Robert R. Redfield, cofounder of the Institute for Human Virology, to lead the Centers for Disease Control and Prevention. Dr. Redfield has “decades of science and clinical work – especially in the field of H.I.V./AIDS.” Health and Human Services Secretary Alex Azar called Dr. Redfield “peerless” in his depth of experience.

————————-

Senators announce legislation to charge fentanyl pushers more harshly

The Washington Free Beacon

“Trump called for the use of the death penalty in certain drug-trafficking related cases as part of the announcement on Monday of his administration’s strategy for combatting the opioid epidemic,” Charles Fain Lehman reports. By Thursday, five Republican lawmakers had announced a new bill that would toughen the charges facing dealers who traffic in fentanyl, a deadly synthetic opioid.

————————-

House passes bill that would give patients access to experimental drugs

The New York Times

“The House, spurred on by President Trump, passed a bill on Wednesday that would give patients with terminal illnesses a right to try unproven experimental treatments,” Robert Pear reports. Proponents of the bill say it will “give dying patients a chance to obtain potentially helpful prescription drugs without waiting for the completion of clinical trials.”

————————-

Trump takes part in millennial forum

USA Today

On Thursday, President Trump participated in a Q&A with conservative advocate Charlie Kirk at the White House’s Generation Next forum. Their conversation covered taxes, trade policy, and what advice the President would give to a 25-year-old Donald Trump today.

————————-

5 principles for infrastructure success

The Washington Times

“Investment in infrastructure is coming at just the right time for America,” Gov. Pete Ricketts (R-NE) writes this week. “Over the past year, the Trump administration has listened to states while developing policy proposals.” Gov. Ricketts joined President Trump at the White House when the President unveiled his plan for rebuilding American infrastructure last month.

————————-

Obama EPA Administrators spent eight times more than Pruitt on international travel

The Washington Free Beacon

Travel for President Obama’s EPA Administrators cost taxpayers roughly $1 million, The Washington Free Beacon reports. “The double-standard couldn’t be more clear: Under Barack Obama’s EPA the media chose not to report on expenditures to protect the EPA administrator for international travel or the costs of their trips,” EPA Spokesman Jahan Wilcox said.

 

Sign up for emails at WhiteHouse.gov

 




Ten Cyber Terrorist Implanting Malicious Codes against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence March 26, 2018

Cyber Attacker
United States Plymouth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521958757.81
3/25/2018 1:19:22 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Plymouth, United States visited http://www.stewwebb.com/
3/25/2018 1:19:16 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

verizonbusiness.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Palm Beach Gardens, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521977560.61
3/25/2018 6:32:42 AM (4 hours 18 mins ago)
IP: 73.244.9.70 Hostname: c-73-244-9-70.hsd1.fl.comcast.net
Browser: IE version 11.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko
cable.comcast.com

@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States United States left http://www.stewwebb.com/tag/video/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522006183.19
3/25/2018 2:29:48 PM (2 minutes ago)
IP: 107.77.165.9 Hostname: mobile-107-77-165-9.mobile.att.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; XT1032 Build/KXB21.14-L1.61) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/34.0.1847.114 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Fort Lauderdale, United States was blocked by firewall at http://stewwebb.com/wp-organizer.php
3/26/2018 12:59:17 AM (10 hours 42 mins ago)
IP: 204.10.105.9 Hostname: 204.10.105.9
Human/Bot: Bot
Browser: Chrome version 50.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/50.0.2661.75 Safari/537.36
NetRange: 204.10.104.0 – 204.10.111.255
[2048 addresses in this network]
CIDR: 204.10.104.0/21 (204.10.104.0 – 204.10.111.255)
[2048 addresses in this network]
NetName: ACCELERATEBIZ-1-21
NetHandle: NET-204-10-104-0-1
Parent: NET204 (NET-204-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: AccelerateBiz Inc. (ACCEL-8)
RegDate: 2004-12-15
Updated: 2012-03-20
Ref: https://whois.arin.net/rest/net/NET-204-10-104-0-1

OrgName: AccelerateBiz Inc.
OrgId: ACCEL-8
Address: 800 W Cypress Creek Rd
Address: Suite 528
City: Fort Lauderdale
StateProv: FL
PostalCode: 33309
Country: US
RegDate: 2004-08-27
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/ACCEL-8

OrgAbuseHandle: ABUSE1442-ARIN
OrgAbuseName: Abuse Contact
OrgAbusePhone: +1-305-675-6725
OrgAbuseEmail: abuse@acceleratebiz.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE1442-ARIN

OrgTechHandle: TECHN892-ARIN
OrgTechName: Technical Support
OrgTechPhone: +1-305-675-6725
OrgTechEmail: support@acceleratebiz.com
OrgTechRef: https://whois.arin.net/rest/poc/TECHN892-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Scottsdale, United States was blocked for Manual block by administrator at http://www.stewwebb.com/wp-json/wp/v2/users/
3/26/2018 6:34:29 AM (5 hours 15 mins ago)
IP: 132.148.137.76 Hostname: ip-132-148-137-76.ip.secureserver.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
NetRange: 132.148.0.0 – 132.148.255.255
[65536 addresses in this network]
CIDR: 132.148.0.0/16 (132.148.0.0 – 132.149.255.255)
[131072 addresses in this network]
NetName: GO-DADDY-COM-LLC
NetHandle: NET-132-148-0-0-1
Parent: NET132 (NET-132-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: GoDaddy.com, LLC (GODAD)
RegDate: 2015-10-21
Updated: 2015-10-26
Ref: https://whois.arin.net/rest/net/NET-132-148-0-0-1
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
Comment: Please send abuse complaints to abuse@godaddy.com
Ref: https://whois.arin.net/rest/org/GODAD
OrgAbuseHandle: ABUSE51-ARIN
OrgAbuseName: Abuse Department
OrgAbusePhone: +1-480-624-2505
OrgAbuseEmail: abuse@godaddy.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE51-ARIN

OrgNOCHandle: NOC124-ARIN
OrgNOCName: Network Operations Center
OrgNOCPhone: +1-480-505-8809
OrgNOCEmail: noc@godaddy.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOC124-ARIN

OrgTechHandle: NOC124-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-480-505-8809
OrgTechEmail: noc@godaddy.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC124-ARIN
132.148.137.76
P address 132.148.137.76
Location Scottsdale, Arizona, United States (US) flag
Registry arin
Network information
IP address 132.148.137.76
Reverse DNS (PTR record) ip-132-148-137-76.ip.secureserver.net
DNS server (NS record) cns1.secureserver.net (208.109.255.100)
cns2.secureserver.net (216.69.185.100)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domains around 132.148.137.76
IP address #domains
132.148.137.3 1
132.148.137.4 52
132.148.137.5 7
132.148.137.6 1
132.148.137.8 4
132.148.137.9 8
132.148.137.11 1
132.148.137.12 15
132.148.137.13 2
132.148.137.14 3
132.148.137.15 1
132.148.137.16 1
132.148.137.19 2
132.148.137.22 1
132.148.137.23 7
132.148.137.24 1
132.148.137.25 1
132.148.137.26 1
132.148.137.27 2
132.148.137.28 1
132.148.137.29 1
132.148.137.31 1
132.148.137.32 1
132.148.137.34 1
132.148.137.35 1
132.148.137.36 2
132.148.137.37 1
132.148.137.38 2
132.148.137.39 1
132.148.137.40 24
132.148.137.42 4
132.148.137.43 1
132.148.137.48 4
132.148.137.49 1
132.148.137.50 4
132.148.137.52 1
132.148.137.54 1
132.148.137.56 2
132.148.137.59 2
132.148.137.60 4
132.148.137.61 24
132.148.137.64 2
132.148.137.65 5
132.148.137.66 7
132.148.137.67 1
132.148.137.68 2
132.148.137.69 66
132.148.137.71 1
132.148.137.73 6
132.148.137.76 2
132.148.137.79 2
132.148.137.81 1
132.148.137.85 1
132.148.137.86 1
132.148.137.90 1
132.148.137.91 3
132.148.137.94 1
132.148.137.96 4
132.148.137.98 5
132.148.137.99 1
132.148.137.102 1
132.148.137.103 1
132.148.137.104 1
132.148.137.105 1
132.148.137.106 1
132.148.137.108 1
132.148.137.109 1
132.148.137.112 3
132.148.137.113 1
132.148.137.115 1
132.148.137.117 2
132.148.137.118 3
132.148.137.119 5
132.148.137.121 1
132.148.137.122 1
132.148.137.124 1
132.148.137.129 1
132.148.137.130 1
132.148.137.131 1
132.148.137.132 17
132.148.137.133 1
132.148.137.134 1
132.148.137.135 1
132.148.137.136 2
132.148.137.142 33
132.148.137.144 4
132.148.137.145 3
132.148.137.147 2
132.148.137.148 1
132.148.137.150 4
132.148.137.151 14
132.148.137.153 58
132.148.137.155 3
132.148.137.157 2
132.148.137.159 1
132.148.137.160 2
132.148.137.161 5
132.148.137.167 2
132.148.137.173 1
132.148.137.175 2
Domains on 132.148.137.76
Domain Tools
dfwnewhomes.com
DNS server (NS records) ns68.domaincontrol.com (208.109.255.44)
ns67.domaincontrol.com (216.69.185.44)
Mail server (MX records) smtp.secureserver.net (72.167.238.29)
mailstore1.secureserver.net (72.167.238.32)
IP address (IPv4) 132.148.137.76
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 132.148.128.0/19
132.148.128.0 – 132.148.159.255
Domain Name: DFWNEWHOMES.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Whois Agent
Registrant Organization: Whois Privacy Protection Service, Inc.
Name Server: NS67.DOMAINCONTROL.COM
Name Server: NS68.DOMAINCONTROL.COM
DNSSEC: unsigned

qonnect.in
OrgName: GoDaddy.com, LLC
OrgId: GODAD
Address: 14455 N Hayden Road
Address: Suite 226
City: Scottsdale
StateProv: AZ
PostalCode: 85260
Country: US
RegDate: 2007-06-01
Updated: 2014-09-10
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker olatha, kansas
Olathe, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522012184.88
3/26/2018 11:13:44 AM (45 minutes ago)
IP: 73.185.228.112 Hostname: c-73-185-228-112.hsd1.ks.comcast.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

NetRange: 73.0.0.0 – 73.255.255.255
[16777216 addresses in this network]
CIDR: 73.0.0.0/8 (73.0.0.0 – 73.255.255.255)
[16777216 addresses in this network]
NetName: CABLE-1
NetHandle: NET-73-0-0-0-1
Parent: NET73 (NET-73-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7922
Organization: Comcast Cable Communications, LLC (CCCS)
RegDate: 2005-04-19
Updated: 2016-08-31
Ref: https://whois.arin.net/rest/net/NET-73-0-0-0-1

OrgName: Comcast Cable Communications, LLC
OrgId: CCCS
Address: 1800 Bishops Gate Blvd
City: Mt Laurel
StateProv: NJ
PostalCode: 08054
Country: US
RegDate: 2001-09-17
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/CCCS

OrgAbuseHandle: NAPO-ARIN
OrgAbuseName: Network Abuse and Policy Observance
OrgAbusePhone: +1-888-565-4329
OrgAbuseEmail: abuse@comcast.net
OrgAbuseRef: https://whois.arin.net/rest/poc/NAPO-ARIN

OrgTechHandle: IC161-ARIN
OrgTechName: Comcast Cable Communications Inc
OrgTechPhone: +1-856-317-7200
OrgTechEmail: CNIPEO-Ip-registration@cable.comcast.com
OrgTechRef: https://whois.arin.net/rest/poc/IC161-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Mitchell, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064606.62
3/26/2018 6:43:36 AM (5 hours 34 mins ago)
IP: 172.78.225.94 Hostname: 172.78.225.94
Browser: Safari version 8.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 8_1_1 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) Version/8.0 Mobile/12B435 Safari/600.1.4

Sorry, but no data for that IP or domain was found.

IP address 172.78.225.94
Location Butlerville, Indiana, United States
@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Canyon Country, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522064610.01
3/26/2018 6:43:32 AM (5 hours 34 mins ago)
IP: 76.95.152.193 Hostname: cpe-76-95-152-193.socal.res.rr.com
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 76.80.0.0 – 76.95.255.255
[1048576 addresses in this network]
CIDR: 76.80.0.0/12 (76.80.0.0 – 76.95.255.255)
[1048576 addresses in this network]
NetName: RRWE
NetHandle: NET-76-80-0-0-1
Parent: NET76 (NET-76-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2006-12-22
Updated: 2007-12-18
Ref: https://whois.arin.net/rest/net/NET-76-80-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2000-10-04
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Lake Havasu City, United States left http://www.stewwebb.com/2018/03/23/ses-and-serco-the-big-secret-of-the-deep-state/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522044134.26
3/26/2018 1:02:16 AM (11 hours 25 mins ago)
IP: 47.216.40.139 Hostname: 47-216-40-139.lkhvcmtk02.res.dyn.suddenlink.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36
NetRange: 47.208.0.0 – 47.223.255.255
[1048576 addresses in this network]
CIDR: 47.208.0.0/12 (47.208.0.0 – 47.223.255.255)
[1048576 addresses in this network]
NetName: SUDDE
NetHandle: NET-47-208-0-0-1
Parent: NET47 (NET-47-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Suddenlink Communications (SUDDE)
RegDate: 2015-09-08
Updated: 2015-09-08
Ref: https://whois.arin.net/rest/net/NET-47-208-0-0-1

OrgName: Suddenlink Communications
OrgId: SUDDE
Address: 311 NNW Loop 323
City: Tyler
StateProv: TX
PostalCode: 75701
Country: US
RegDate: 2006-05-25
Updated: 2018-02-14
Ref: https://whois.arin.net/rest/org/SUDDE

ReferralServer: rwhois://rwhois.suddenlink.net:4321

OrgNOCHandle: NOCSU37-ARIN
OrgNOCName: NOC Suddenlink
OrgNOCPhone: +1-866-232-5455
OrgNOCEmail: noc@suddenlink.com
OrgNOCRef: https://whois.arin.net/rest/poc/NOCSU37-ARIN

OrgTechHandle: AUIO-ARIN
OrgTechName: Altice USA Internet Operations
OrgTechPhone: +1-516-803-2300
OrgTechEmail: hostmaster@cv.net
OrgTechRef: https://whois.arin.net/rest/poc/AUIO-ARIN

OrgAbuseHandle: ABUSE6997-ARIN
OrgAbuseName: Abuse Suddenlink
OrgAbusePhone: +1-903-266-4800
OrgAbuseEmail: hostmaster@cv.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE6997-ARIN

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
San Diego, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1522095760.82
3/26/2018 3:22:44 PM (14 minutes ago)
IP: 66.75.249.174
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb, Tom Heneghan and Leo Wanta March 26 2018

Radio Stew Webb, Tom Heneghan and Ambassador Leo Wanta March 26, 2018

 

Wanta-Heneghan-Webb-3-26-18 from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Attackers Network planting malicious codes against Stew Webb Whistleblower 2018

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusion Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

March 25, 2018

United States Sitka, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521091573.92
3/15/2018 12:26:16 AM (8 hours 47 mins ago)
IP: 24.237.119.5 Hostname: 5-119-237-24.gci.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; XT1585 Build/NCK25.118-10.5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
Type: Human

Oklahoma City, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521193309.49
3/16/2018 4:41:53 AM (3 hours 18 mins ago)
IP: 70.182.76.176 Hostname: wsip-70-182-76-176.ok.ok.cox.net
Browser: Firefox version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0

Berwyn, United States left http://www.stewwebb.com/2016/06/09/hillary-clinton-whitewater-savings-and-loan-theft-pt1/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521161917.91
3/15/2018 8:43:32 PM (11 hours 28 mins ago)
IP: 72.78.74.136 Hostname: pool-72-78-74-136.phlapa.fios.verizon.net
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1
Type: Human

Alameda, United States left https://www.stewwebb.com/ and visited https://www.stewwebb.com/?wordfence_syncAttackData=1521160654.46
3/15/2018 7:37:36 PM (12 hours 37 mins ago)
IP: 107.213.154.42 Hostname: 107-213-154-42.lightspeed.sntcca.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

Austin, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521155784.67
3/15/2018 6:20:05 PM (13 hours 56 mins ago)
IP: 99.12.193.26 Hostname: 99-12-193-26.lightspeed.austtx.sbcglobal.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
Type: Human

United States Haverhill, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521207282.82
3/16/2018 8:35:24 AM (17 minutes ago)
IP: 98.229.10.2 Hostname: c-98-229-10-2.hsd1.ma.comcast.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1

Jarrettsville, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521210171.74
3/16/2018 9:22:53 AM (27 minutes ago)
IP: 96.244.98.52 Hostname: pool-96-244-98-52.bltmmd.fios.verizon.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human

West Des Moines, United States left http://www.stewwebb.com/2018/03/11/judge-jeanine-throws-george-bush-under-the-buss/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521222272.01
3/16/2018 12:44:34 PM (6 hours 9 mins ago)
IP: 173.23.252.8 Hostname: 173-23-252-8.client.mchsi.com
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
Sorry, but no data for that IP or domain was found.

Fort Smith, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521219742.68
3/16/2018 12:02:25 PM (6 hours 53 mins ago)
IP: 76.230.196.68 Hostname: 76-230-196-68.lightspeed.fyvlar.sbcglobal.net
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; NX16A8116KP Build/N9F27C) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Safari/537.36

Traverse City, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521217196.61
3/16/2018 11:20:05 AM (7 hours 37 mins ago)
IP: 97.83.34.129 Hostname: 97-83-34-129.dhcp.trcy.mi.charter.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36

United States Plymouth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521958757.81
3/25/2018 1:19:22 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Plymouth, United States visited http://www.stewwebb.com/
3/25/2018 1:19:16 AM (15 minutes ago)
IP: 71.102.102.88 Hostname: pool-71-102-102-88.sctnpa.east.verizon.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

verizonbusiness.com

Palm Beach Gardens, United States left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521977560.61
3/25/2018 6:32:42 AM (4 hours 18 mins ago)
IP: 73.244.9.70 Hostname: c-73-244-9-70.hsd1.fl.comcast.net
Browser: IE version 11.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64; Trident/7.0; Touch; rv:11.0) like Gecko
cable.comcast.com

Fort Worth, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521563219.38
3/20/2018 11:27:02 AM (4 hours 2 mins ago)
IP: 167.99.33.254 Hostname: 167.99.33.254
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:59.0) Gecko/20100101 Firefox/59.0

Colorado
ucdenver.edu
cyber attacker
Aurora, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521572221.24
3/20/2018 1:57:06 PM (31 minutes ago)
IP: 140.226.41.237 Hostname: 140.226.41.237
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Aurora, United States visited http://www.stewwebb.com/
3/20/2018 1:56:59 PM (32 minutes ago)
IP: 140.226.41.237 Hostname: 140.226.41.237
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
NetRange: 140.226.0.0 – 140.226.255.255
[65536 addresses in this network]
CIDR: 140.226.0.0/16 (140.226.0.0 – 140.227.255.255)
[131072 addresses in this network]
NetName: UCOLO-HEALTH
NetHandle: NET-140-226-0-0-1
Parent: NET140 (NET-140-0-0-0-0)
NetType: Direct Assignment
OriginAS:
Organization: University of Colorado (UNIVER-84)
RegDate: 1990-06-14
Updated: 2010-07-28
Ref: https://whois.arin.net/rest/net/NET-140-226-0-0-1

OrgName: University of Colorado
OrgId: UNIVER-84
Address: Denver Anchutz Medical Campus
Address: 13001 East 17th Place
Address: Room W4114
Address: PO Box 6508
City: Aurora
StateProv: CO
PostalCode: 80045
Country: US
RegDate: 1990-06-14
Updated: 2009-08-12
Ref: https://whois.arin.net/rest/org/UNIVER-84

OrgAbuseHandle: AIH3-ARIN
OrgAbuseName: Abuse Incident Handlers
OrgAbusePhone: +1-303-724-1550
OrgAbuseEmail: abuse@ucdenver.edu
OrgAbuseRef: https://whois.arin.net/rest/poc/AIH3-ARIN

OrgTechHandle: JC473-ARIN
OrgTechName: Carlson, J.D.
OrgTechPhone: +1-303-724-0482
OrgTechEmail: jd.carlson@ucdenver.edu
OrgTechRef: https://whois.arin.net/rest/poc/JC473-ARIN

RTechHandle: JC473-ARIN
RTechName: Carlson, J.D.
RTechPhone: +1-303-724-0482
RTechEmail: jd.carlson@ucdenver.edu
RTechRef: https://whois.arin.net/rest/poc/JC473-ARIN

RAbuseHandle: AIH3-ARIN
RAbuseName: Abuse Incident Handlers
RAbusePhone: +1-303-724-1550
RAbuseEmail: abuse@ucdenver.edu
RAbuseRef: https://whois.arin.net/rest/poc/AIH3-ARIN

United States Denver, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521550697.74
3/20/2018 7:58:27 AM (7 hours 42 mins ago)
IP: 216.138.185.50 Hostname: h50.185.138.216.ip.windstream.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_5 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D60 Safari/604.1
Denver, United States arrived from http://www.bing.com/search?q=stew+webb+tom+heneghan+report&FORM=QSRE1 and visited http://www.stewwebb.com/
3/20/2018 12:02:51 AM (15 hours 47 mins ago)
IP: 216.138.185.50 Hostname: h50.185.138.216.ip.windstream.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_5 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D60 Safari/604.1

NetRange: 216.138.128.0 – 216.138.191.255
[16384 addresses in this network]
CIDR: 216.138.128.0/18 (216.138.128.0 – 216.138.255.255)
[32768 addresses in this network]
NetName: NORLIGHT-CIDR5
NetHandle: NET-216-138-128-0-1
Parent: NET216 (NET-216-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS7260, AS7029
Organization: Windstream Communications LLC (WINDS-6)
RegDate: 2000-10-26
Updated: 2017-03-17
Ref: https://whois.arin.net/rest/net/NET-216-138-128-0-1

OrgName: Windstream Communications LLC
OrgId: WINDS-6
Address: 4001 Rodney Parham Rd
City: Little Rock
StateProv: AR
PostalCode: 72212
Country: US
RegDate: 2006-08-10
Updated: 2017-02-01
Ref: https://whois.arin.net/rest/org/WINDS-6

OrgAbuseHandle: WINDS1-ARIN
OrgAbuseName: Windstream Abuse
OrgAbusePhone: +1-800-347-1991
OrgAbuseEmail: abuse@windstream.net
OrgAbuseRef: https://whois.arin.net/rest/poc/WINDS1-ARIN

OrgTechHandle: WINDS-ARIN
OrgTechName: Windstream Communications Inc
OrgTechPhone: +1-888-292-3827
OrgTechEmail: ipadmin@windstream.net
OrgTechRef: https://whois.arin.net/rest/poc/WINDS-ARIN

OrgTechHandle: GRADY2-ARIN
OrgTechName: Grady, Bill
OrgTechPhone: +1-866-445-5880
OrgTechEmail: ipswip@windstream.net
OrgTechRef: https://whois.arin.net/rest/poc/GRADY2-ARIN

OrgTechHandle: MCGUI37-ARIN
OrgTechName: McGuire, William
OrgTechPhone: +1-888-292-3827
OrgTechEmail: william.mcguire@windstream.com
OrgTechRef: https://whois.arin.net/rest/poc/MCGUI37-ARIN

#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/whois_tou.html
#
# If you see inaccuracies in the results, please report at

cyber attacker Colorado
United States Southport, United States left
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-bl… and
visited http://www.stewwebb.com/? wordfence_syncAttackData=1520705554.6
3/10/2018 12:12:37 PM (2 hours 50 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
United States Walnut Creek, United States visited http://www.stewwebb.com/
3/10/2018 12:17:24 PM (2 hours 48 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Southport, United States left http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-bl… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520705554.6
3/10/2018 12:12:37 PM (2 hours 53 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
Type: Human
United States Southport, United States left http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-wh… and visited http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/
3/10/2018 12:12:33 PM (2 hours 53 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
Type: Human
United States Southport, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-whistle…
3/10/2018 12:11:48 PM (2 hours 53 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1
Type: Human
United States Southport, United States visited http://www.stewwebb.com/
3/10/2018 12:10:49 PM (2 hours 54 mins ago)
IP: 174.106.25.112 Hostname: cpe-174-106-25-112.ec.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_3_3 like Mac OS X) AppleWebKit/602.1.50 (KHTML, like Gecko) GSA/24.1.151204851 Mobile/14G60 Safari/602.1

NetRange: 174.96.0.0 – 174.111.255.255
[1048576 addresses in this network]
CIDR: 174.96.0.0/12 (174.96.0.0 – 174.127.255.255)
[2097152 addresses in this network]
NetName: RRMA
NetHandle: NET-174-96-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Time Warner Cable Internet LLC (RRMA)
RegDate: 2009-02-26
Updated: 2009-12-08
Ref: https://whois.arin.net/rest/net/NET-174-96-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRMA
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate:
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Columbus, OH, Herndon, VA and Raleigh, NC RDCs.
Ref: https://whois.arin.net/rest/org/RRMA

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com

United States Murrieta, United States left http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520704268.07
3/10/2018 11:51:10 AM (3 hours 16 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails/
3/10/2018 11:51:06 AM (3 hours 16 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2016/01/31/clinton-bush-assassination-teams-revealed-in-hillarys-emails
3/10/2018 11:51:04 AM (3 hours 16 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-whistle…
3/10/2018 11:47:52 AM (3 hours 19 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1
Type: Human
United States Murrieta, United States arrived from https://www.google.com/ and visited http://www.stewwebb.com/
3/10/2018 11:47:06 AM (3 hours 20 mins ago)
IP: 172.89.242.22 Hostname: cpe-172-89-242-22.socal.res.rr.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/604.4.7 (KHTML, like Gecko) Version/11.0 Mobile/15C202 Safari/604.1

NetRange: 172.88.0.0 – 172.91.255.255
[262144 addresses in this network]
CIDR: 172.88.0.0/14 (172.88.0.0 – 172.95.255.255)
[524288 addresses in this network]
NetName: RRWE
NetHandle: NET-172-88-0-0-1
Parent: NET172 (NET-172-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS20001
Organization: Time Warner Cable Internet LLC (RRWE)
RegDate: 2015-05-15
Updated: 2015-05-15
Ref: https://whois.arin.net/rest/net/NET-172-88-0-0-1

OrgName: Time Warner Cable Internet LLC
OrgId: RRWE
Address: 6399 S Fiddlers Green Circle
City: Greenwood Village
StateProv: CO
PostalCode: 80111
Country: US
RegDate: 2000-10-04
Updated: 2018-03-07
Comment: Allocations for this OrgID serve Road Runner residential customers out of the Honolulu, HI, Kansas City, KS, Orange, CA and San Diego, CA RDCs.
Ref: https://whois.arin.net/rest/org/RRWE

OrgTechHandle: IPADD1-ARIN
OrgTechName: IPAddressing
OrgTechPhone: +1-720-699-4582
OrgTechEmail: ipaddressing@chartercom.com
OrgTechRef: https://whois.arin.net/rest/poc/IPADD1-ARIN

OrgAbuseHandle: ABUSE10-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-703-345-3416
OrgAbuseEmail: abuse@rr.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE10-ARIN

Matthews, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520797497.05
3/11/2018 2:44:59 PM (35 minutes ago)
IP: 71.28.93.144 Hostname: h144.93.28.71.dynamic.ip.windstream.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36

cyber attacker Wisconsin
United States Fayetteville, United States left http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-wh… and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520779548.33
3/11/2018 9:45:51 AM (5 hours 46 mins ago)
IP: 66.222.35.140 Hostname: h66-222-35-140.fyvloh.dsl.dynamic.tds.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0 Mobile/15D100 Safari/604.1
NetRange: 66.222.0.0 – 66.222.127.255
[32768 addresses in this network]
CIDR: 66.222.0.0/17 (66.222.0.0 – 66.222.255.255)
[65536 addresses in this network]
NetName: TDSNET-BLK
NetHandle: NET-66-222-0-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS4181
Organization: TDS TELECOM (TDST)
RegDate: 2002-01-17
Updated: 2014-12-17
Ref: https://whois.arin.net/rest/net/NET-66-222-0-0-1

OrgName: TDS TELECOM
OrgId: TDST
Address: 525 Junction Rd.
City: Madison
StateProv: WI
PostalCode: 53717
Country: US
RegDate: 1994-12-16
Updated: 2017-01-28
Comment: http://www.tdstelecom.com
Ref: https://whois.arin.net/rest/org/TDST

OrgAbuseHandle: ABUSE163-ARIN
OrgAbuseName: abuse
OrgAbusePhone: +1-800-358-3648
OrgAbuseEmail: abuse@tds.net
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE163-ARIN

OrgTechHandle: INE14-ARIN
OrgTechName: IP Network Engineering
OrgTechPhone: +1-800-358-3648
OrgTechEmail: IPRequests@tdstelecom.com
OrgTechRef: https://whois.arin.net/rest/poc/INE14-ARIN

OrgTechHandle: INO44-ARIN
OrgTechName: IP Network Operations
OrgTechPhone: +1-800-358-3648
OrgTechEmail: ispadmin@tdstelecom.com
OrgTechRef: https://whois.arin.net/rest/poc/INO44-ARIN

OrgTechHandle: SERVI6-ARIN
OrgTechName: Service Activation
OrgTechPhone: +1-800-358-3648
OrgTechEmail: serviceactivation@tdstelecom.com
OrgTechRef: https://whois.arin.net/rest/poc/SERVI6-ARIN

RAbuseHandle: ABUSE163-ARIN
RAbuseName: abuse
RAbusePhone: +1-800-358-3648
RAbuseEmail: abuse@tds.net
RAbuseRef: https://whois.arin.net/rest/poc/ABUSE163-ARIN

United States Walnut Creek, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520742578.89
3/10/2018 10:29:40 PM (16 hours 22 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Walnut Creek, United States visited http://www.stewwebb.com/
3/10/2018 10:29:37 PM (16 hours 22 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
Type: Human
United States Walnut Creek, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/10/president-trump-todays-cyber-attacks-against-stew-webb-federal-whistle…
3/10/2018 10:28:39 PM (16 hours 23 mins ago)
IP: 66.234.202.72 Hostname: astound-66-234-202-72.ca.astound.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
NetRange: 66.234.192.0 – 66.234.223.255
[8192 addresses in this network]
CIDR: 66.234.192.0/19 (66.234.192.0 – 66.234.255.255)
[16384 addresses in this network]
NetName: WAVE-ASTOUND-2
NetHandle: NET-66-234-192-0-2
Parent: ASTOUND-3BLK (NET-66-234-192-0-1)
NetType: Reassigned
OriginAS:
Customer: Astound Broadband (C01497747)
RegDate: 2006-11-16
Updated: 2006-11-16
Ref: https://whois.arin.net/rest/net/NET-66-234-192-0-2

CustName: Astound Broadband
Address: Private Residence
City: Concord
StateProv: CA
PostalCode: 94520
Country: US
RegDate: 2006-11-16
Updated: 2011-03-19
Ref: https://whois.arin.net/rest/customer/C01497747

OrgNOCHandle: WDHN-ARIN
OrgNOCName: Wave Division Holdings NOC
OrgNOCPhone: +1-888-317-0488
OrgNOCEmail: noc@wavebroadband.com
OrgNOCRef: https://whois.arin.net/rest/poc/WDHN-ARIN

OrgTechHandle: IAT18-ARIN
OrgTechName: IP admin team
OrgTechPhone: +1-866-928-3123
OrgTechEmail: arin@wavebroadband.com
OrgTechRef: https://whois.arin.net/rest/poc/IAT18-ARIN

OrgAbuseHandle: WDHN-ARIN
OrgAbuseName: Wave Division Holdings NOC
OrgAbusePhone: +1-888-317-0488
OrgAbuseEmail: noc@wavebroadband.com
OrgAbuseRef: https://whois.arin.net/rest/poc/WDHN-ARIN

cyber attacker
United States United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
3/11/2018 4:19:38 PM (14 minutes ago)
IP: 174.211.1.150 Hostname: 150.sub-174-211-1.myvzw.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 5.0.2; VS980 4G Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36
Type: Bot
United States United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520803153
3/11/2018 4:19:17 PM (14 minutes ago)
IP: 174.211.1.150 Hostname: 150.sub-174-211-1.myvzw.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 5.0.2; VS980 4G Build/LRX22G) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.111 Mobile Safari/537.36
NetRange: 174.192.0.0 – 174.255.255.255
[4194304 addresses in this network]
CIDR: 174.192.0.0/10 (174.192.0.0 – 174.255.255.255)
[4194304 addresses in this network]
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cellco Partnership DBA Verizon Wireless (CLLC)
RegDate: 2008-12-16
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-192-0-0-1

OrgName: Cellco Partnership DBA Verizon Wireless
OrgId: CLLC
Address: 180 Washington Valley Road
City: Bedminster
StateProv: NJ
PostalCode: 07039
Country: US
RegDate: 2001-09-30
Updated: 2017-10-12
Ref: https://whois.arin.net/rest/org/CLLC

OrgAbuseHandle: ABUSE716-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-908-306-7000
OrgAbuseEmail: abuse@verizonwireless.com
OrgA

google crawler
cyber attacker wordfence
United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520713222.4
3/10/2018 2:20:27 PM (1 day 7 hours ago)
IP: 66.102.7.9 Hostname: google-proxy-66-102-7-9.google.com
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko; Google Web Preview) Chrome/41.0.2272.118 Safari/537.36
NetRange: 66.102.0.0 – 66.102.15.255
[4096 addresses in this network]
CIDR: 66.102.0.0/20 (66.102.0.0 – 66.102.31.255)
[8192 addresses in this network]
NetName: GOOGLE
NetHandle: NET-66-102-0-0-1
Parent: NET66 (NET-66-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Google LLC (GOGL)
RegDate: 2002-07-02
Updated: 2012-06-19
Ref: https://whois.arin.net/rest/net/NET-66-102-0-0-1

OrgName: Google LLC
OrgId: GOGL
Address: 1600 Amphitheatre Parkway
City: Mountain View
StateProv: CA
PostalCode: 94043
Country: US
RegDate: 2000-03-30
Updated: 2017-12-21
Ref: https://whois.arin.net/rest/org/GOGL

OrgTechHandle: ZG39-ARIN
OrgTechName: Google LLC
OrgTechPhone: +1-650-253-0000
OrgTechEmail: arin-contact@google.com
OrgTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

OrgAbuseHandle: ABUSE5250-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-650-253-0000
OrgAbuseEmail: network-abuse@google.com
OrgAbuseRef: https://whois.arin.net/rest/poc/ABUSE5250-ARIN

RTechHandle: ZG39-ARIN
RTechName: Google LLC
RTechPhone: +1-650-253-0000
RTechEmail: arin-contact@google.com
RTechRef: https://whois.arin.net/rest/poc/ZG39-ARIN

United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521044742.49
3/14/2018 11:25:45 AM (1 hour 11 mins ago)
IP: 174.255.2.234 Hostname: 234.sub-174-255-2.myvzw.com
Browser: Chrome version 58.0 running on Android
Mozilla/5.0 (Linux; Android 4.4.4; SM-S820L Build/KTU84P) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.83 Mobile Safari/537.36
NetRange: 174.192.0.0 – 174.255.255.255
[4194304 addresses in this network]
CIDR: 174.192.0.0/10 (174.192.0.0 – 174.255.255.255)
[4194304 addresses in this network]
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)

Albuquerque, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521015021.45
3/14/2018 3:10:24 AM (9 hours 41 mins ago)
IP: 168.103.102.54
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:57.0) Gecko/20100101 Firefox/57.0
Type: Human
United States Albuquerque, United States visited http://www.stewwebb.com/
3/14/2018 3:10:20 AM (9 hours 41 mins ago)
IP: 168.103.102.54
Browser: Firefox version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:57.0) Gecko/20100101 Firefox/57.0
NetRange: 168.103.0.0 – 168.103.255.255
[65536 addresses in this network]
CIDR: 168.103.0.0/16 (168.103.0.0 – 168.103.255.255)
[65536 addresses in this network]
NetName: CENTURYLINK-LEGACY-QWEST-INET-120
NetHandle: NET-168-103-0-0-1
Parent: NET168 (NET-168-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 1994-03-15
Updated: 2018-02-21
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-168-103-0-0-1

Oceanside, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520966145.57
3/13/2018 1:35:47 PM (23 hours 41 mins ago)
IP: 108.95.112.225 Hostname: 108-95-112-225.lightspeed.sndgca.sbcglobal.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Oceanside, United States visited http://www.stewwebb.com/
3/13/2018 1:35:43 PM (23 hours 41 mins ago)
IP: 108.95.112.225 Hostname: 108-95-112-225.lightspeed.sndgca.sbcglobal.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

Canada Ottawa, Canada left http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520962334.32
3/13/2018 12:32:16 PM (1 day ago)
IP: 173.33.98.180 Hostname: CPEac202ebdbea3-CMac202ebdbea0.cpe.net.cable.rogers.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
Canada Ottawa, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/11/radio-stew-webb-and-tom-heneghan-march-10-2018/
3/13/2018 12:32:13 PM (1 day ago)
IP: 173.33.98.180 Hostname: CPEac202ebdbea3-CMac202ebdbea0.cpe.net.cable.rogers.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
Canada Ottawa, Canada visited http://www.stewwebb.com/
3/13/2018 12:31:46 PM (1 day ago)
IP: 173.33.98.180 Hostname: CPEac202ebdbea3-CMac202ebdbea0.cpe.net.cable.rogers.com
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
NetRange: 173.33.98.0 – 173.33.99.255
[512 addresses in this network]
CIDR: 173.33.98.0/23 (173.33.98.0 – 173.33.99.255)
[512 addresses in this network]
NetName: HSI
NetHandle: NET-173-33-98-0-1
Parent: ROGERS-CAB-HSD (NET-173-32-0-0-1)
NetType: Reassigned
OriginAS:
Customer: Rogers Cable Inc. MTNK (C02172450)
RegDate: 2009-03-03
Updated: 2009-03-03
Ref: https://whois.arin.net/rest/net/NET-173-33-98-0-1

United States Saint Paul, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520961147.18
3/13/2018 12:12:29 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
3/13/2018 12:12:25 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:24 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States left http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/ and visited http://www.stewwebb.com/advertise-here/
3/13/2018 12:12:21 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States left http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/ and visited http://www.stewwebb.com/advertise-here/
3/13/2018 12:12:20 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:09 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:09 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:09 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/13/2018 12:12:08 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1
Type: Human
United States Saint Paul, United States visited http://www.stewwebb.com/resources-blogs/
3/13/2018 12:12:06 PM (1 day 1 hour ago)
IP: 24.7.218.45 Hostname: c-24-7-218-45.hsd1.mn.comcast.net
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 10_2 like Mac OS X) AppleWebKit/602.3.12 (KHTML, like Gecko) Version/10.0 Mobile/14C92 Safari/602.1

cyber attacker
United States Wasilla, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521051452.21
3/14/2018 1:17:43 PM (8 minutes ago)
IP: 72.35.103.187 Hostname: 187-103-35-72.mtaonline.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko
Type: Human
United States Wasilla, United States visited http://www.stewwebb.com/
3/14/2018 1:17:30 PM (8 minutes ago)
IP: 72.35.103.187 Hostname: 187-103-35-72.mtaonline.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; Trident/7.0; rv:11.0) like Gecko

cyber attacker
Bremen, Germany left http://www.stewwebb.com/VIDEOS%20by%20Stew%20Webb.html.html and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521049953.86
3/14/2018 12:52:35 PM (39 minutes ago)
IP: 134.102.172.130 Hostname: 134.102.172.130
Browser: Firefox version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64; rv:58.0) Gecko/20100101 Firefox/58.0
% Information related to ‘134.102.0.0 – 134.102.255.255’
[65536 addresses in this network]
% Abuse contact for ‘134.102.0.0 – 134.102.255.255’ is ‘abuse@dfn.de’
[65536 addresses in this network]
inetnum: 134.102.0.0 – 134.102.255.255
[65536 addresses in this network]
netname: BREMNET
org: ORG-UB34-RIPE
country: DE
admin-c: NP3779-RIPE
tech-c: UB169-RIPE
status: LEGACY
mnt-by: RIPE-NCC-LEGACY-MNT
mnt-by: DFN-LIR-MNT
mnt-lower: DFN-LIR-MNT
mnt-routes: DFN-MNT
mnt-irt: IRT-DFN-CERT
created: 1970-01-01T00:00:00Z
last-modified: 2016-04-14T09:56:45Z
source: RIPE
sponsoring-org: ORG-DV1-RIPE

organisation: ORG-UB34-RIPE
org-name: Universitaet Bremen
org-type: OTHER
address: Bibliothekstr. 1
address: 28359 Bremen
address: Germany
admin-c: NP3779-RIPE
tech-c: UB169-RIPE
abuse-c: DH5989-RIPE
mnt-ref: DFN-LIR-MNT
mnt-by: DFN-LIR-MNT
created: 2016-03-24T08:57:03Z
last-modified: 2016-03-24T08:57:03Z
source: RIPE # Filtered

person: Niels Pollem
address: Universitaet Bremen
address: Zentrum fuer Netze (ZfN)
address: Bibliothekstr. 1
address: 28359 Bremen
address: Germany
phone: +49 421 218 61340
fax-no: +49 421 218 9861340
nic-hdl: NP3779-RIPE
mnt-by: DFN-NTFY
created: 2015-03-27T13:16:03Z
last-modified: 2015-03-27T13:16:03Z
source: RIPE # Filtered

person: Ulrich Berkhan
address: Universitaet Bremen
address: Zentrum fuer Netze
address: Bibliothekstr. 1
address: 28359 Bremen
address: Postfach 330 440
address: 28334 Bremen
address: Germany
phone: +49 421 218 61341
fax-no: +49 421 218 9861341
nic-hdl: UB169-RIPE
mnt-by: DFN-NTFY
created: 2004-08-24T12:58:25Z
last-modified: 2015-03-27T13:16:03Z
source: RIPE # Filtered

% Information related to ‘134.102.0.0/16AS1275’ (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
route: 134.102.0.0/16 (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
descr: BREMNET
origin: AS1275
mnt-by: DFN-MNT
created: 1970-01-01T00:00:00Z
last-modified: 2001-09-22T09:32:43Z
source: RIPE

% Information related to ‘134.102.0.0/16AS680’ (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
route: 134.102.0.0/16 (134.102.0.0 – 134.103.255.255)
[131072 addresses in this network]
descr: BREMNET
origin: AS680
mnt-by: DFN-MNT
created: 1970-01-01T00:00:00Z
last-modified:

Cyber attacker
Indianapolis, United States visited https://www.stewwebb.com/
3/9/2018 7:25:46 AM (6 hours 52 mins ago)
IP: 72.1.87.209 Hostname: 209.87.1.72.host.smoothstone.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Type: Human
United States Indianapolis, United States left https://www.stewwebb.com/ and visited https://www.stewwebb.com/?wordfence_syncAttackData=1520601935.51
3/9/2018 7:25:38 AM (6 hours 52 mins ago)
IP: 72.1.87.209 Hostname: 209.87.1.72.host.smoothstone.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
Type: Human
United States Indianapolis, United States visited https://www.stewwebb.com/
3/9/2018 7:25:34 AM (6 hours 52 mins ago)
IP: 72.1.87.209 Hostname: 209.87.1.72.host.smoothstone.net
Browser: IE version 11.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Trident/7.0; rv:11.0) like Gecko
NetRange: 72.1.64.0 – 72.1.95.255
[8192 addresses in this network]
CIDR: 72.1.64.0/19 (72.1.64.0 – 72.1.127.255)
[16384 addresses in this network]
NetName: WEST-IP-COMMUNICATIONS
NetHandle: NET-72-1-64-0-1
Parent: NET72 (NET-72-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS32880
Organization: West IP Communications (WIC-37)
RegDate: 2004-09-07
Updated: 2014-06-09
Ref: https://whois.arin.net/rest/net/NET-72-1-64-0-1

OrgName: West IP Communications
OrgId: WIC-37
Address: 401 South 4th Street
Address: Suite 200
City: Louisville
StateProv: KY
PostalCode: 40202
Country: US
RegDate: 2013-08-08
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/WIC-37

OrgTechHandle: SCHEL30-ARIN
OrgTechName: Schellin, Walt
OrgTechPhone: +1-502-618-5542
OrgTechEmail: wschellin@west.com
OrgTechRef: https://whois.arin.net/rest/poc/SCHEL30-ARIN

OrgTechHandle: VJR5-ARIN
OrgTechName: Rusilowicz, Vincent Joseph
OrgTechPhone: +1-502-315-5126
OrgTechEmail: vrusilowicz@westipc.com
OrgTechRef: https://whois.arin.net/rest/poc/VJR5-ARIN

OrgTechHandle: ACO78-ARIN
OrgTechName: Concepcion, Anthony
OrgTechPhone: +1-502-386-2512
OrgTechEmail: aconcepcion@west.com
OrgTechRef: https://whois.arin.net/rest/poc/ACO78-ARIN

OrgAbuseHandle: NOC31701-ARIN
OrgAbuseName: Network Operations Center
OrgAbusePhone: +1-502-315-5150
OrgAbuseEmail: abuse@westipc.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NOC31701-ARIN

OrgNOCHandle: VJR5-ARIN
OrgNOCName: Rusilowicz, Vincent Joseph
OrgNOCPhone: +1-502-315-5126
OrgNOCEmail: vrusilowicz@westipc.com
OrgNOCRef: https://whois.arin.net/rest/poc/VJR5-ARIN

cyber hacker
United States Tempe, United States left http://www.stewwebb.com/2018/03/04/radio-stew-webb-tom-heneghan-march-2-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520581188.09
3/9/2018 1:39:52 AM (12 hours 47 mins ago)
IP: 184.98.199.227 Hostname: 184-98-199-227.phnx.qwest.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100
Type: Human
United States Tempe, United States visited http://www.stewwebb.com/2018/03/04/radio-stew-webb-tom-heneghan-march-2-2018/
3/9/2018 1:39:46 AM (12 hours 47 mins ago)
IP: 184.98.199.227 Hostname: 184-98-199-227.phnx.qwest.net
Browser: Mobile Safari UIWebView version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.5.6 (KHTML, like Gecko) Mobile/15D100

cyber hacker
Redondo Beach, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520572799.07
3/8/2018 11:20:01 PM (15 hours 8 mins ago)
IP: 76.91.66.176 Hostname: cpe-76-91-66-176.socal.res.rr.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; SM-T350 Build/NMF26X) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Safari/537.36

cyber attacker
Montpelier, United States left http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520539149.73
3/8/2018 1:59:12 PM (1 day ago)
IP: 71.169.129.158 Hostname: pool-71-169-129-158.burl.east.myfairpoint.net
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

NetRange: 71.169.128.0 – 71.169.191.255
[16384 addresses in this network]
CIDR: 71.169.128.0/18 (71.169.128.0 – 71.169.255.255)
[32768 addresses in this network]
NetName: VIS-BLOCK
NetHandle: NET-71-169-128-0-1
Parent: NET71 (NET-71-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: FAIRPOINT COMMUNICATIONS, INC. (FAIRPO-3)
RegDate: 2005-06-01
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-71-169-128-0-1

OrgName: FAIRPOINT COMMUNICATIONS, INC.
OrgId: FAIRPO-3
Address: 770 Elm St
City: Manchester
StateProv: NH
PostalCode: 03101
Country: US
RegDate: 2002-02-03
Updated: 2018-01-09
Ref: https://whois.arin.net/rest/org/FAIRPO-3

OrgTechHandle: PETER825-ARIN
OrgTechName: Peterson, Corey
OrgTechPhone: +1-603-528-7315
OrgTechEmail: corey.peterson@fairpoint.com
OrgTechRef: https://whois.arin.net/rest/poc/PETER825-ARIN

OrgAbuseHandle: FCA40-ARIN
OrgAbuseName: Fairpoint Communications Abuse
OrgAbusePhone: +1-620-227-4400
OrgAbuseEmail: abuse@fairpoint.com
OrgAbuseRef: https://whois.arin.net/rest/poc/FCA40-ARIN

RTechHandle: FAIRP-ARIN
RTechName: Fairpoint Hostmaster
RTechPhone: +1-620-339-4787
RTechEmail: hostmast@fairpoint.com
RTechRef: https://whois.arin.net/rest/poc/FAIRP-ARIN

cyber attacker
Pictou, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520629919.09
3/9/2018 3:12:03 PM (13 minutes ago)
IP: 24.89.218.107 Hostname: blk-89-218-107.eastlink.ca
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:58.0) Gecko/20100101 Firefox/58.0
Canada Pictou, Canada left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/
3/9/2018 3:13:21 PM (9 minutes ago)
IP: 24.89.218.107 Hostname: blk-89-218-107.eastlink.ca
Browser: Firefox version 0.0 running on Linux
Mozilla/5.0 (X11; Ubuntu; Linux i686; rv:58.0) Gecko/20100101 Firefox/58.0
NetRange: 24.89.192.0 – 24.89.255.255
[16384 addresses in this network]
CIDR: 24.89.192.0/18 (24.89.192.0 – 24.89.255.255)
[16384 addresses in this network]
NetName: EASTLINK-BLK5
NetHandle: NET-24-89-192-0-1
Parent: NET24 (NET-24-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: EastLink (BRAGG)
RegDate: 2005-05-12
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-24-89-192-0-1

OrgName: EastLink
OrgId: BRAGG
Address: 6080 Young Street
Address: Suite 801, PO Box 8660, Station A
City: Halifax
StateProv: NS
PostalCode: B3K-5M3
Country: CA
RegDate: 2007-01-17
Updated: 2017-01-28
Comment: EastLink High Speed Internet
Ref: https://whois.arin.net/rest/org/BRAGG

OrgNOCHandle: ANS2-ARIN
OrgNOCName: ARIN NOC Support
OrgNOCPhone: +1-902-453-2800
OrgNOCEmail: arin-noc@eastlink.ca
OrgNOCRef: https://whois.arin.net/rest/poc/ANS2-ARIN

OrgTechHandle: ATS22-ARIN
OrgTechName: ARIN Technical Support
OrgTechPhone: +1-902-453-2800
OrgTechEmail: arin-tech@eastlink.ca
OrgTechRef: https://whois.arin.net/rest/poc/ATS22-ARIN

OrgAbuseHandle: AAS50-ARIN
OrgAbuseName: ARIN Abuse Support
OrgAbusePhone: +1-902-453-2800
OrgAbuseEmail: arin-abuse@eastlink.ca
OrgAbuseRef: https://whois.arin.net/rest/poc/AAS50-ARIN

cyber attacker
sprint 256 ips
Newark, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520646659.19
3/9/2018 7:51:05 PM (29 minutes ago)
IP: 66.87.30.79 Hostname: 66-87-30-79.pools.spcsdns.net
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1
NetRange: 66.87.30.0 – 66.87.30.255
[256 addresses in this network]
CIDR: 66.87.30.0/24 (66.87.30.0 – 66.87.31.255)
[512 addresses in this network]
NetName: SPRINT-66-87-30-0
NetHandle: NET-66-87-30-0-1
Parent: SPRINTBWG-2BL (NET-66-87-0-0-1)
NetType: Reassigned
OriginAS: AS3651, AS10507
Organization: Sprint Harrison POP (SHP-30)
RegDate: 2016-08-18
Updated: 2016-08-18
Ref: https://whois.arin.net/rest/net/NET-66-87-30-0-1

OrgName: Sprint Harrison POP
OrgId: SHP-30
Address: Sprint Harrison POP
City: Harrison
StateProv: NJ
PostalCode: 07029
Country: US
RegDate: 2013-12-06
Updated: 2013-12-06
Ref: https://whois.arin.net/rest/org/SHP-30

OrgTechHandle: SIE-ARIN
OrgTechName: Sprint IP Engineering
OrgTechPhone: +1-703-592-4850
OrgTechEmail: deipaddy@sprint.com
OrgTechRef: https://whois.arin.net/rest/poc/SIE-ARIN

OrgAbuseHandle: SIE-ARIN
OrgAbuseName: Sprint IP Engineering
OrgAbusePhone: +1-703-592-4850
OrgAbuseEmail: deipaddy@sprint.com
OrgAbuseRef: https://whois.arin.net/rest/poc/SIE-ARIN

cyber attacker
left off
Homestead, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520666504.39
3/10/2018 1:21:46 AM (10 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Homestead, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1520666504.39
3/10/2018 1:21:46 AM (14 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Human
United States Homestead, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/
3/10/2018 1:21:43 AM (14 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Homestead, United States visited http://www.stewwebb.com/
3/10/2018 1:20:12 AM (16 minutes ago)
IP: 108.199.93.50 Hostname: 108-199-93-50.lightspeed.miamfl.sbcglobal.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36




March 22 2018 Cyber Attacks against Stew Webb Federal Whistle blower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence March 22, 2018

United States Suwanee, United States left http://www.stewwebb.com/category/breaking-news/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521689567.3
3/21/2018 10:32:48 PM (11 hours 43 mins ago)
IP: 24.178.73.154 Hostname: mail.bgc-colsga.org
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; LG-K373 Build/MRA58K) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human

Top 5 IPs Blocked
IP Country Block Count
Top 5 IPs Blocked
IP Country Block Count
62.31.6.155 United Kingdom GB 3112
Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:25 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:23 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks…
3/22/2018 9:52:22 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks…
3/22/2018 9:52:21 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:16 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks-stew-webb-whistleblower-2018-02-…
3/22/2018 9:52:15 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36
Type: Bot
United Kingdom Southend-on-Sea, United Kingdom visited http://www.stewwebb.com/2018/02/19/us-cia-or-israel-mossad-cyber-attacks…
3/22/2018 9:52:13 AM (1 minute ago)
IP: 62.31.6.155 Hostname: 62-31-6-155-bf.static.virginmedia.com
Browser: Chrome version 51.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/51.0.2704.106 Safari/537.36

Type: Human
United Kingdom Hammersmith, United Kingdom left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?s=john+ramsey&submit=Go
3/22/2018 9:53:58 AM (5 minutes ago)
IP: 2.223.187.4 Hostname: 02dfbb04.bb.sky.com
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.181 Safari/537.36

IP address 62.31.6.155
Location Manchester, England, United Kingdom
IP address 62.31.6.155
Reverse DNS (PTR record) 62-31-6-155-bf.static.virginmedia.com
DNS server (NS record) ns4.virginmedia.net (194.168.4.33)
ns2.virginmedia.net (194.168.4.237)
ns.ripe.net (193.0.9.6)
ns1.virginmedia.net (62.253.162.237)
ns3.virginmedia.net (62.253.162.37)
ASN number 5089
ASN name (ISP) Virgin Media Limited
IP-range/subnet 62.31.0.0/16
62.31.0.0 – 62.31.255.255
Number of SPAM hosts on 62.31.0.0/16 1
Domains around 62.31.6.155
IP address #domains
62.31.6.54 1
62.31.6.92 1
62.31.6.93 1
62.31.6.131 1
inetnum: 62.31.6.152 – 62.31.6.159
netname: SONTAY-LIMITED
descr: SONTAY-LIMITED
country: GB
org: ORG-CIL2-RIPE
admin-c: DH687-RIPE
tech-c: NNMC1-RIPE
status: ASSIGNED PA
mnt-by: AS5089-MNT
remarks: Access Evolution Business Customer UK
created: 2017-05-30T20:06:29Z
last-modified: 2017-05-30T20:06:29Z
source: RIPE # Filtered

organisation: ORG-CIL2-RIPE
org-name: Virgin Media Limited
org-type: OTHER
address: Media House, Bartley Wood Business Park
address: RG27 9UP
address: Hook, Hampshire
address: UNITED KINGDOM
person: Duty Hostmaster
address: Fountain Court
address: Unit B
address: Fountain Lane
address: St Mellons
address: Cardiff
address: CF3 0FB
@@@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
69.139.118.63 United States US 88
IP address 69.139.118.63
Location Franklin, Tennessee, United States
comcast.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
63.228.78.18 United States US 42
IP address 63.228.78.18
Location Cortez, Colorado, United State
IP address 63.228.78.18
Reverse DNS (PTR record) 63-228-78-18.hlrn.qwest.net
DNS server (NS record) authns1.centurylink.net (63.150.72.4)
authns2.centurylink.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
Domains around 63.228.78.18
IP address #domains
63.228.78.148 1
IP address 63.228.78.148
Location Cortez, Colorado, United States
Domains on 63.228.78.148
Domain Tools
prinscentral.com
This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns3.zoneedit.com. The current IPv4 address is 75.166.178.66. The mail server with the highest priority is mx.mydomain.com.
DNS server (NS records) ns3.zoneedit.com (128.199.163.75)
ns5.zoneedit.com (159.203.1.67)
Mail server (MX records) mx.mydomain.com (66.96.140.64)
IP address (IPv4) 75.166.178.66
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 75.160.0.0/12
75.160.0.0 – 75.175.255.255
Domain Name: PRINSCENTRAL.COM
Domain ID: 58528142_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.domain.com
Registry Registrant ID:
Registrant Name: Les Prins
Registrant Organization: Les Prins
Registrant Street: 6735 S. Pitkin St.
Registrant City: Foxfield
Registrant State/Province: CO
Registrant Postal Code: 80016
Registrant Country: US
303-766-1578
Registry Tech ID:
Tech Name: Les Prins
Tech Organization: Bazi4life
Tech Street: 6735 S. Pitkin St
Tech City: Foxfield
Tech State/Province: CO
Tech Postal Code: 80016
Tech Country: US
Bazi4life3.com

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
216.138.185.50 United States US 35
P address 216.138.185.50
Location Brookfield, Wisconsin, United States
IP address 216.138.185.50
Reverse DNS (PTR record) h50.185.138.216.ip.windstream.net
DNS server (NS record) ns4-auth.windstream.net (162.40.117.251)
ns1-auth.windstream.net (166.102.165.17)
ns3-auth.windstream.net (207.91.5.71)
ns2-auth.windstream.net (162.39.164.15)
ASN number 7029
ASN name (ISP) Windstream Communications LLC
IP-range/subnet 216.138.128.0/18
216.138.128.0 – 216.138.191.255
OrgName: Windstream Communications LLC
OrgId: WINDS-6
Address: 4001 Rodney Parham Rd
City: Little Rock
StateProv: AR
PostalCode: 72212
Country: US
RegDate: 2006-08-10
Updated: 2017-02-01

@@@@@@@@@@@@@@@@@@@@@@
Top 5 IPs Blocked
IP Country Block Count
71.209.177.224 United States US 26
IP address 71.209.177.224
Location Phoenix, Arizona, United States (
IP address 71.209.177.224
Reverse DNS (PTR record) 71-209-177-224.phnx.qwest.net
DNS server (NS record) authns1.mpls.qwest.net (63.150.72.4)
authns3.sttl.qwest.net (63.150.72.4)
authns2.dnvr.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 71.208.0.0/12
71.208.0.0 – 71.223.255.255
Number of SPAM hosts on 71.208.0.0/12 505
IP address 71.208.0.0
Location Fort Myers, Florida, United States

@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States left http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730607.14
3/22/2018 9:56:49 AM (1 minute ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

United States left http://www.stewwebb.com/2018/03/16/radio-stew-webb-tom-heneghan-and-leo-wanta-march-16-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730105.75
3/22/2018 9:48:27 AM (11 minutes ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Minneapolis, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521727906.04
3/22/2018 9:11:48 AM (49 minutes ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
United States Minneapolis, United States tried to access non-existent page http://www.stewwebb.com/http[s]:/rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:22 AM (1 hour 3 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
United States Minneapolis, United States tried to access non-existent page http://www.stewwebb.com/http[s]:/rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:22 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Type: Human
United States Minneapolis, United States visited http://www.stewwebb.com/http[s]://rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:19 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Type: 404 Not Found
United States Minneapolis, United States tried to access non-existent page http://www.stewwebb.com/http[s]:/rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:18 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Human/Bot: Human
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36
Type: Human
United States Minneapolis, United States visited http://www.stewwebb.com/http[s]://rtb-usync.com/opmt89.gif?puid=PLACE_USER_ID_HERE
3/22/2018 8:58:15 AM (1 hour 4 mins ago)
IP: 173.134.45.167 Hostname: 173-134-45-167.pools.spcsdns.net
Browser: Chrome version 0.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.162 Safari/537.36

@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States United States left http://www.stewwebb.com/2018/03/16/radio-stew-webb-tom-heneghan-and-leo-wanta-march-16-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521726859.53
3/22/2018 8:54:21 AM (1 hour 8 mins ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@
cyber attacker
Lindenhurst, United States left http://www.stewwebb.com/2018/03/20/u-s-countdown-starts/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521726371.37
3/22/2018 8:46:13 AM (1 hour 17 mins ago)
IP: 104.246.30.69 Hostname: ool-68f61e45.dyn.optonline.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
United States Lindenhurst, United States left http://www.stewwebb.com/2018/03/19/hillary-clinton-thinks-women-cant-see-shes-a-criminal-lesbian/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521726013.49
3/22/2018 8:40:15 AM (1 hour 25 mins ago)
IP: 104.246.30.69 Hostname: ool-68f61e45.dyn.optonline.net
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/61.0.3163.100 Safari/537.36
@@@@@@@@@@@@@@@@@@@
Adelaide, Australia left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/
3/22/2018 7:29:27 AM (2 hours 37 mins ago)
IP: 202.161.14.82 Hostname: 202-161-14-82.dyn.iinet.net.au
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
% Information related to ‘202.161.0.0 – 202.161.31.255’
[8192 addresses in this network]
% Abuse contact for ‘202.161.0.0 – 202.161.31.255’ is ‘noc@staff.iinet.net.au’
[8192 addresses in this network]
inetnum: 202.161.0.0 – 202.161.31.255
[8192 addresses in this network]
netname: IINET-AU
descr: iiNet Limited
descr: Locked Bag 16
descr: Cloisters Square, WA, 6850
country: AU
org: ORG-IL1-AP
admin-c: NO20-AP
tech-c: NO20-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-IINET
mnt-irt: IRT-IINET-AU
last-modified: 2017-08-29T23:02:27Z
source: APNIC

irt: IRT-IINET-AU
address: iiNet Limited
address: Level 9, 250 St Georges Tce
address: Perth
address: WA 6000
e-mail: noc@staff.iinet.net.au
abuse-mailbox: noc@staff.iinet.net.au
admin-c: IH207-AP
tech-c: IH207-AP
auth: # Filtered
mnt-by: MAINT-AU-IH207-AP
last-modified: 2010-12-15T02:05:54Z
source: APNIC

organisation: ORG-IL1-AP
org-name: iiNet Limited
country: AU
address: 502 Hay St
phone: +61-8-9214-2222
fax-no: +61-8-9214-2211
e-mail: noc@iinet.net.au
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:16Z
source: APNIC

person: Network Operations
nic-hdl: NO20-AP
e-mail: apnic-admin@staff.iinet.net.au
address: iiNet Limited
address: Level 1
address: 502 Hay Street
address: Subiaco WA 6008
phone: +61 8 9214 2222
fax-no: +61 8 9214 2211
country: AU
mnt-by: MAINT-AU-IINET
last-modified: 2012-01-16T06:42:06Z

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Cedartown, United States arrived from https://feedreader.com/observe/stewwebb.com/+view and visited https://www.stewwebb.com/
3/22/2018 9:17:11 AM (43 minutes ago)
IP: 174.80.144.39 Hostname: 174-080-144-039.dhcp.chtrptr.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Phoenix, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521702913.3
3/22/2018 2:15:16 AM (7 hours 55 mins ago)
IP: 107.77.245.1 Hostname: 107.77.245.1
Browser: Firefox version 0.0 running on Android
Mozilla/5.0 (Android 5.0; Mobile; rv:59.0) Gecko/59.0 Firefox/59.0
Phoenix, United States left http://www.stewwebb.com/2013/12/19/illuminati-council-of-13-human-sacrifice-denver-colorado-dec-22/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521699404.09
3/22/2018 1:16:47 AM (8 hours 54 mins ago)
IP: 107.77.245.1 Hostname: 107.77.245.1
Browser: Firefox version 0.0 running on Android
Mozilla/5.0 (Android 5.0; Mobile; rv:59.0) Gecko/59.0 Firefox/59.0

@@@@@@@@@@@@@@@@@@@@@@@@
Blocked by firewall
cyber attacker
Kharkiv, Ukraine was blocked by firewall for SQL Injection in query string: fbuserid=1%20and%201%3D2%20union%20select%201%2C2%2C3%2C4%2C5%2Cconcat(user_login%2C0x3a%2Cuser_pass)%2C7%2C8… at http://stewwebb.com/?fbconnect_action=myhome&fbuserid=1+and+1%3D2+union+select+1%2C2%2C3%2C4%2C5%2Cconcat…
3/22/2018 7:21:15 AM (2 hours 35 mins ago)
IP: 109.86.210.25 Hostname: 25.210.86.109.triolan.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/30.0.1599.17 Safari/537.36
Type: Blocked
Ukraine Odesa, Ukraine was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 7:16:26 AM (2 hours 40 mins ago)
IP: 79.140.9.254 Hostname: 79-140-9-254.broadband.tenet.odessa.ua
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Perm, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 6:24:03 AM (3 hours 32 mins ago)
IP: 178.161.225.148 Hostname: 178.161.225.148.dyn.v4.saturn-internet.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Ukraine Kerch, Ukraine was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 2:51:23 AM (7 hours 5 mins ago)
IP: 5.101.213.253 Hostname: 253-213.plus.kerch.net
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Vyborg, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/22/2018 12:30:11 AM (9 hours 26 mins ago)
IP: 178.67.84.167 Hostname: pppoe.178-67-84-167.avangarddsl.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Kazakhstan Kazakhstan was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/21/2018 10:42:24 AM (23 hours 13 mins ago)
IP: 95.58.158.196 Hostname: 95.58.158.196
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Romania Romania was blocked by firewall at http://www.stewwebb.com/
3/21/2018 10:29:30 AM (23 hours 26 mins ago)
IP: 188.240.208.26 Hostname: 188.240.208.26
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36
Type: Blocked
Romania Romania was blocked by firewall at http://www.stewwebb.com/
3/21/2018 10:29:28 AM (23 hours 26 mins ago)
IP: 188.240.208.26 Hostname: 188.240.208.26
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/62.0.3202.94 Safari/537.36
Type: Blocked
Russia Stavropol, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/21/2018 9:36:14 AM (1 day ago)
IP: 46.63.191.17 Hostname: 46.63.191.17
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/wp/
3/21/2018 7:17:41 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/wordpress/
3/21/2018 7:17:40 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/blog/
3/21/2018 7:17:39 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/21/2018 7:17:39 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/
3/21/2018 7:17:38 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/21/2018 7:17:37 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
South Africa Johannesburg, South Africa was blocked by firewall at http://www.stewwebb.com/robots.txt
3/21/2018 7:17:36 AM (1 day 2 hours ago)
IP: 41.79.77.19 Hostname: auth-0.us.ispafrica.net
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
@@@@@@@@@@
??????????????
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/joomla/administrator/index.php
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/joomla/robots.txt
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/administrator/index.php
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/administrator/index.php
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/robots.txt
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wp/
3/20/2018 9:33:49 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wordpress/
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/robots.txt
3/20/2018 9:33:48 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wp/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/wordpress/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/20/2018 9:32:12 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://www.stewwebb.com/robots.txt
3/20/2018 9:32:10 PM (1 day 12 hours ago)
IP: 47.254.22.84 Hostname: 47.254.22.84
Human/Bot: Bot
Browser: Firefox version 48.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:48.0) Gecko/20100101 Firefox/48.0
Type: Blocked
Russia Stavropol, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/20/2018 7:20:38 PM (1 day 14 hours ago)
IP: 46.63.191.17 Hostname: 46.63.191.17
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Mitú, Colombia left http://www.stewwebb.com/2013/04/17/arkancide-is-the-unfortunate-habit-of-potential-witnesses-to-the-… and visited http://www.stewwebb.com/2013/04/17/arkancide-is-the-unfortunate-habit-of-potential-witnesses-to-the-clint…
3/22/2018 1:00:07 AM (9 hours 12 mins ago)
IP: 191.102.82.218 Hostname: azteca-comunicaciones.com
Browser: Firefox version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:59.0) Gecko/20100101 Firefox/59.0
AZTECA-COMUNICACIONES.COM

@@@@@@@@@@@@@@@@@@@
cyber attacker
Canton, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521692943.55
3/21/2018 11:29:06 PM (10 hours 44 mins ago)
IP: 174.232.138.201 Hostname: 201.sub-174-232-138.myvzw.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_2 like Mac OS X) AppleWebKit/600.1.4 (KHTML, like Gecko) GSA/23.1.148956103 Mobile/15C202 Safari/600.1.4

@@@@@@@@@@@@@@@@@@@@
cyber attacker
Clarkston, United States left http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521692627.22
3/21/2018 11:23:49 PM (10 hours 50 mins ago)
IP: 24.127.154.150 Hostname: c-24-127-154-150.hsd1.mi.comcast.net
Browser: Chrome version 55.0 running on Android
Mozilla/5.0 (Linux; Android 5.1.1; SM-G360V Build/LMY48B) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/55.0.2883.91 Mobile Safari/537.36

@@@@@@@@@@@@@@@@@@@@
cyber attacker
Moreno Valley, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521692416.72
3/21/2018 11:20:23 PM (10 hours 54 mins ago)
IP: 47.153.237.142 Hostname: 47.153.237.142
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.146 Safari/537.36

@@@@@@@@@@@@@@@@@@@
cyber attacker
Newport, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521688786.11
3/21/2018 10:19:48 PM (11 hours 57 mins ago)
IP: 68.188.174.246 Hostname: 68-188-174-246.dhcp.bycy.mi.charter.com
Browser: Safari version 9.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 9_3_5 like Mac OS X) AppleWebKit/601.1.46 (KHTML, like Gecko) Version/9.0 Mobile/13G36 Safari/601.1

@@@@@@@@@@@@@@@@@@@@@
United States left http://www.stewwebb.com/AIPAC_Officers_and_Board_members_20121127.htm and tried to access non-existent page http://www.stewwebb.com/aipac_mossad_espionage_inquiry_widens.htm
3/21/2018 8:10:52 PM (14 hours 7 mins ago)
IP: 216.160.191.240 Hostname: 216-160-191-240.hlrn.qwest.net
Human/Bot: Human
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_3) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@
United Kingdom Dursley, United Kingdom visited http://www.stewwebb.com/2018/03/20/u-s-countdown-starts/
3/21/2018 4:27:05 PM (17 hours 54 mins ago)
IP: 86.149.244.54 Hostname: host86-149-244-54.range86-149.btcentralplus.com
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 6.0; F3111 Build/33.2.A.4.70) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/65.0.3325.109 Mobile Safari/537.36
Type: Human
Canada Calgary, Canada visited http://www.stewwebb.com/
3/21/2018 4:25:54 PM (17 hours 55 mins ago)
IP: 70.75.60.119 Hostname: S0106789684bfb039.cg.shawcable.net

@@@@@@@@@@@@@@@@@@@
cyber attacker
Phoenix, United States left http://www.stewwebb.com/2016/12/09/george-w-bush-fraud-lock-him-up/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730766.07
3/22/2018 9:59:28 AM (23 minutes ago)
IP: 72.208.57.120 Hostname: ip72-208-57-120.ph.ph.cox.net
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_2_6 like Mac OS X) AppleWebKit/604.1.34 (KHTML, like Gecko) GSA/45.0.188348008 Mobile/15D100 Safari/604.1

@@@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
Douglasville, United States left http://www.stewwebb.com/stew-webb-radio-archives/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521732020.03
3/22/2018 10:20:22 AM (3 minutes ago)
IP: 73.237.241.240 Hostname: c-73-237-241-240.hsd1.ga.comcast.net
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/604.5.6 (KHTML, like Gecko) Version/11.0.3 Safari/604.5.6

@@@@@@@@@@@@@@@@@@@@@@
cyber attacker
United States left http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/ and was blocked for Manual block by administrator at http://www.stewwebb.com/2018/03/16/radio-stew-webb-tom-heneghan-and-leo-wanta-march-16-2018/
3/22/2018 10:02:22 AM (21 minutes ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Human/Bot: Human
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
United States left http://www.stewwebb.com/2018/03/19/radio-stew-webb-and-tom-heneghan-march-19-2018/ and visited http://www.stewwebb.com/?wordfence_syncAttackData=1521730607.14
3/22/2018 9:56:49 AM (27 minutes ago)
IP: 107.77.68.78 Hostname: 107.77.68.78
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.1.1; Z971 Build/NMF26V) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

 

 




Radio Stew Webb and Tom Heneghan March 19 2018

5’4″ Larry Mizel and Larry Mizell

aka Napolitano complex Larry Mizel

aka Larry Mizel Larry Mizzell aka Karl ?   Carl?? Ownes Westport Square Parking Lot. (Hot Spot 20/s Kansas City, Missouri.

By Stew Webb United States Federal Whistle blower 34 Years and still breathing

Radio Stew Webb and Tom Heneghan March 19 2018

more to come stay tuned!

 

Intel Update – Tom Heneghan Stew Webb (3-19-18) from Truth Warriors on Vimeo.

Your kind Contributions are very much appreciated thank you, I have not thank you by email who have contributed to keep you from been identified. – Stew Webb

 




Robert Mueller involved in FBI Sarasota 9/11 probe cover up

Robert Mueller involved in FBI release of deceptive statements about Sarasota 9/11 probe

By Stew Webb Federal Whistle blower

January 18, 2018

By Dan Christensen, FloridaBulldog.org

A recent government court filing is raising questions about then-FBI Director Robert Mueller’s involvement in the public release of deceptive official statements about a secret FBI investigation of Sarasota Saudis with apparent ties to the 9/11 hijackers.

The misleading statements, issued by FBI officials in Miami and Tampa, were made within days of a September 2011 Florida Bulldog story disclosing the existence of the investigation and reporting that Congress had been kept in the dark about it.

The statements sought to discredit the story, asserting that agents had found no connection between the Sarasota Saudi family and the 9/11 plot. In fact, the FBI’s own files contained at least three reports that said the opposite: that agents found “many connections” between the family and “individuals associated with the terrorist attacks on 9/11/2001.” The FBI released those reports later amid continuing Freedom of Information (FOI) litigation brought by Florida Bulldog.

Mueller, now the special counsel overseeing the investigation into alleged Russian efforts to interfere in the 2016 presidential election, is referenced in a document index created in late November by the FBI at the direction of U.S. District Judge William J. Zloch of Fort Lauderdale. The index was compiled after Zloch asked the FBI to explain where in its complex file system it had located about 80 pages released earlier in the six-year-old FOI case.

The FBI has produced an additional 80,000 classified pages for Zloch’s private inspection. The judge recently indicated he’d completed his three-year review of those records, but has given no hint as to what they say.

Flurry of 9/11 related activities

News of Mueller’s involvement comes amid a flurry of 9/11 related activities, and not just in Fort Lauderdale. Today, January 18, lawyers for thousands of survivors, relatives and other victims of the 2001 al Qaeda terrorist attacks will appear in federal court in New York City to argue against Saudi Arabia’s renewed motion to dismiss their long-running lawsuit against it, and other matters.

Last week in Atlanta, attorneys for Florida Bulldog replied in a federal appeals court to government arguments that seek to block the further release of records of the 9/11 Review Commission. The filing also opposed the FBI’s effort to overturn rulings by Miami U.S. District Judge Cecilia Altonaga that would require the FBI to restore the names of agents and others whose names were redacted from documents released earlier on privacy grounds.

Abdulaziz al-Hijji, right, in Sarasota prior to 9/11 and leaving his London office in 2012 Photo in London by Warren Allot for The Telegraph

In Washington last month, three members of Congress, two Republicans and one Democrat, introduced House Resolution 663 that calls for the declassification of all 9/11 documents “to the greatest extent possible” to allow for a “full public understanding” of what happened.

The index reference to former FBI Director Mueller is contained in an item about a FBI white paper that was written one week after the Bulldog and the Miami Herald simultaneously published the Bulldog’s story about the abrupt departure of Saudis Abdulaziz and Anoud al-Hijji from their Sarasota area home about two weeks before 9/11. The couple left behind their cars, clothes, furniture, jewelry and other personal items.

“It was created to brief the FBI Director concerning the FBI’s investigation of 4224 Escondito Circle,” the al-Hijjis’ address, the index says.

The white paper, titled “Alleged Sarasota Link to 9/11 Hijackers,” is on stationery of the Counterterrorism Division Guantanamo Detainee Prosecution Section 9:11 Prosecution Unit. It was first released in March 2013 and erroneously begins: “The FBI found no evidence that connected the family members mentioned in the Miami Herald article to any of the 9/11 hijackers, nor was any connection found between the family and the 9/11 plot.”

Same day announcement

The same day the white paper was prepared for Director Mueller, Sept. 15, 2011, FBI Tampa Public Affairs Officer David Couvertier sent a similarly worded email to the Tampa Bay Times on behalf of Special Agent in Charge Steven E. Ibison: “At no time did the FBI develop evidence that connected the family members to any of the 9/11 hijackers as suggested in the article, and there was no connection found to the 9/11 plot.”

Florida Bulldog’s Miami attorney, Thomas Julin, filed court papers last week asserting a “red flag” has been raised in the case by disclosure of the FBI director’s involvement.

“That Mueller received a briefing about the Sarasota investigation suggests that the issues the Bulldog raised required the attention of the FBI’s highest authority,” Julin wrote.

The circumstances further suggest that Director Mueller approved the deception in which the FBI engaged.

Mueller did not respond to questions emailed to his office on Tuesday.

The two-page white paper, not attributed to any individual, is likewise interesting for what it did not tell Mueller. For example, it made no mention of the 2002 FBI reports stating that “many connections” were found between the al-Hijjis and the 9/11 hijackers. Nor did it discuss whether the FBI withheld the results of its Sarasota investigation from Congress, as former Florida Sen. Bob Graham, co-chair of Congress’ Joint Inquiry into 9/11, has said under oath.

The provenance of the “Guantanamo” white paper is also curious. While the source of the document is undoubtedly the FBI,  a second altered version was released to Florida Bulldog last year amid another FOI lawsuit seeking records of the 9/11 Review Commission that is now on appeal by both sides. The reference in the heading that indicates the document was generated by Guantanamo’s 9/11 prosecution unit is missing. No explanation for the differences was given.

The white paper appears to have been written in response to a Sept. 14, 2011 request for information about the Sarasota investigation made by Sen. Patrick Leahy, D-VT, then chairman of the Senate Judiciary Committee, to Mueller and then-Attorney General Eric Holder.

More than two months later, on Nov. 22, Assistant Attorney General Ronald Weich sent Leahy a response that perpetuated the FBI’s deception about its Sarasota findings:

“Contrary to suggestions in media reports, the FBI did not develop any evidence that connected the family members to any of the 9/11 hijackers or to the 9/11 plot.”

Related posts:

  1. FBI says again it found no ties between Sarasota Saudis and 9/11 hijackers; won’t release details
  2. Bob Graham: FBI hindered Congress’s 9/11 inquiry, withheld reports about Sarasota Saudis
  3. Graham: FBI’s public statements are in conflict with still secret records of Sarasota 9/11 probe
  4. U.S. judge asked to okay deposition of FBI agent in Sarasota Saudi probe
  5. FBI slams own 9/11 document; New report discounts Sarasota Saudis ties to hijackers

 

http://www.floridabulldog.org/911-articles/

Florida Bulldog

http://www.floridabulldog.org/

Dan Christensen

dchristensen@browardbulldog.org

Related

911 related lawsuit

Lawsuit #1 – On September 5, 2012, Broward Bulldog — now Florida Bulldog — filed a Freedom of Information Act lawsuit in federal court in Fort Lauderdale against the Department of Justice and the FBI. The 25-page FOIA complaint seeks records of an FBI investigation involving a Saudi family, former residents of Sarasota, who may have provided aid or assistance to the 9/11 hijackers.

Lawsuit #2 – On June 15, 2016, the Bulldog again sued the FBI and Justice Department – this time seeking records about the FBI 9/11 Review Commission. Those records include the commission’s efforts to discredit an April 2002 FBI report released under the Freedom of Information Act that corroborated earlier reporting about the Saudi family’s quick exit from their Sarasota home two weeks before the attacks and their apparent ties to the 9/11 hijackers.

Mandatory Declassification Review – Florida Bulldog Editor Dan Christensen and 9/11 authors Anthony Summers and Robbyn Swan are also pursuing what’s known as a Mandatory Declassification Review of 28 pages that were censored from the report to the nation by Congress’s Joint Inquiry into the terrorist attacks. Those pages involve “specific sources of foreign support” for the hijackers while they were in the U.S. The matter, filed in 2013, is before the Interagency Security Classification Appeals Panel. CASE CLOSED JANUARY 2017. Key documents from the Mandatory Declassification Review and FOIA cases are below.

FOIA LAWSUIT #2  (9/11 Review Commission):

**New**  6/2/17 – Joint Status Report Regarding the Conclusion of this Case

6/2/17 – Motion for Reconsideration of Court’s Order Denying Defendants’s Motion for Summary Judgement

6/2/17 – Exhibit 1 to Motion for Reconsideration

5/16/17 – Order Granting in Part and Denying in Part Motions for Summary Judgment

3/28/17 – Plaintiffs Opposition to Motion for Summary Judgment on Count 1

3/14/17 – Defendants Motion for Summary Judgment on Count I

2/27/17 – Order Granting in Part and Denying in Part Motion for Partial Summary Judgment

1/19/17 – Defendants’ Reply to Response to Motion for Summary Judgment on Counts 2 and 3

1/13/17 – Plaintiffs Memo in Opposition to Defendants Motion for Summary Judgment on Counts 2 and 3  Hearing set for Feb. 7,  8 a.m. before Miami U.S. District Court Judge Cecilia Altonaga

1/13/17 – Declaration of Dan Christensen Exhibits removed due to large file

1/13/17 – Declaration of Terry Strada

**New** – 12/31/16 – Defendants Motion for Summary Judgment on Counts 2 and 3

12/31/16 – DE-27-1 Second Declaration of David M. Hardy

12/20/16 – Government Motion to Continue Trial denied

8/10/16 – Order Cancelling Mediation

8/3/16 – Scheduling Order

7/25/16 – Answer and Affirmative Defenses

6/15/16 — Complaint

MANDATORY DECLASSIFICATION REVIEW (28 pages and underlying documents):

**New** 1/13/17  — ISCAP Release of the 28 Pages Part1  With asserted reasons for each redaction                               ISCAP Release of the 28 PagesPart2   ISCAP Release of the 28 PagesPart3

CASE CLOSED

7/15/16 – 28pages released by President Obama. ISCAP proceedings continue regarding underlying FBI, CIA documents

10/1/14 — Letter to ISCAP from Members of Congress

7/15/14 — Letter from John P. Fitzpatrick regarding ISCAP Appeal 

7/10/14 — Appeal to Interagency Classification Appeals Panel (ISCAP) regarding the 28 pages

7/3/14 — Letter from David M. Hardy (FBI) Denying Request for a Mandatory Declassification Review

3/17/14 — Review Committee will hear appeal

2/13/14 — Request for Declassification Review Committee Determination

12/3/13 — H. Res. 428 -Congressmen urge Obama to declassify 28 pages from censored 9/11 report

10/2/13 — 9/11 Families press release 

6/26/13 — DOJ Response to Request for Mandatory Declassification Review

6/20/13 — 9/11 Families Letter to President Obama

6/10/13 — Request to White House to release 28 censored page from Congress’s report on 9/11

6/10/13 — Request to Department of Justice for Mandatory Declassification Review of the 28 pages

FOIA LAWSUIT #1 (FBI’s Sarasota investigation):

**NEW** 3/31/17 – Order on Interim Motion for Attorneys Fees

8/8/16 – Defense Notice of Declassification

5/31/16 – Interim motion for attorney fees

5/31/16 – Declaration of Thomas R. Julin

3/22/16 – Paperless order by Judge William J. Zloch denying 4/24/15 motion for status conference and to depose FBI agent

5/11/15 – FBI response to request to depose FBI agent

4/24/15 — Request to depose FBI agent

7/1/14 —Document release #4. 11 pages.

6/6/14 — Fourth Hardy Declaration Document Release #3. 31 pages.

5/9/14 — Third Hardy Declaration   Document Release #2.  4 pages.

5/1/14 — Defendants Notice of In Camera Filing-boxes

4/18/14 — Order Denying Motion for Reconsideration and Defendants Notice of In Camera Filing

4/17/14 — Government’s Motion for Reconsideration and Second Hardy Declaration

4/6/14 — Further Order on Motion to Compel

4/4/14 Order Compelling Better Search

3/26/14 — Newspapers’ amicus brief

3/20/14 — Order granting leave to file amicus brief

10/9/13 — Government motion opposing the filing of an Amicus brief by The Miami Herald

9/27/13 — Miami Herald Motion for Leave to File Amicus Curiae Brief

9/13/13– Sarasota Herald Tribune Motion to Intervene

8/15/13 — Our Reply to Government’s Response to Motion to Compel

8/7/13 — Government’s Response to Motion to Compel

7/19/13 — Our Motion to Compel Additional Search

7/12/13 — Order from Pretrial Conference

6/28/13 — Order Denying Defendants Motion to Dismiss Complaint

6/19/13 — Defendants Motion for Protective Order

6/26/13 — Joint Pretrial Stipulation

7/6/13 — Plaintiffs Opposition to Motion for Protective Order

6/10/13 — Government’s Reply to Memorandum in Opposition

5/31/13 — Our Memorandum in Opposition to Summary Judgment

5/13/14 — The Government’s Motion for Summary Judgment   Government Exhibits

3/29/13 — FBI Document Release — #1. 35 pages.

12/13/12 — The Government’s Reply to our Memorandum in Opposition to Dismissal

12/3/12 — Our Response in Opposition to the Motion to Dismiss the Complaint

11/19/12 — The Government’s Motion to Dismiss 

9/5/12 Our FOIA complaint

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Radio Stew Webb and Tom Heneghan March 2 2018

Radio Stew Webb and Tom Heneghan March 2 2018

http://www.vimeo.com/truthwarriors

Intel Report – Tom Heneghan, Stew Webb (3-2-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan February 28, 2018

Radio Stew Webb and Tom Heneghan February 28, 2018

All programs will no longer be loaded on youtube go to the link below.

http://www.vimeo.com/truthwarriors

 

Intel Report – Tom Heneghan, Stew Webb (2-28-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower

Westminister Colorado computercrews Cyber Attacks against Stew Webb Whistleblower
Organization: COMPUTER CREWS (CC-1746)
United States Westminster, United States visited http://www.stewwebb.com/
3/1/2018 1:26:57 PM (26 minutes ago)
IP: 198.233.246.75 Hostname: 198.233.246.75
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36
Type: Bot
United States Westminster, United States visited http://stewwebb.com/
3/1/2018 1:26:53 PM (26 minutes ago)
IP: 198.233.246.75 Hostname: 198.233.246.75
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.186 Safari/537.36

NetRange: 198.233.246.72 – 198.233.246.79
[8 addresses in this network]
CIDR: 198.233.246.72/29 (198.233.246.72 – 198.233.246.79)
[8 addresses in this network]
NetName: Q1209-198-233-246-72
NetHandle: NET-198-233-246-72-1
Parent: CENTURYLINK-LEGACY-QWEST-INET-30 (NET-198-233-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: COMPUTER CREWS (CC-1746)
RegDate: 2015-12-09
Updated: 2015-12-09
Ref: https://whois.arin.net/rest/net/NET-198-233-246-72-1

OrgName: COMPUTER CREWS
OrgId: CC-1746
Address: 9101 HARLAN ST UNIT 215
City: WESTMINSTER
StateProv: CO
PostalCode: 80031
Country: US
RegDate: 2015-12-04
Updated: 2015-12-04
Ref: https://whois.arin.net/rest/org/CC-1746

OrgAbuseHandle: CREWS27-ARIN
OrgAbuseName: Crews, Tom
OrgAbusePhone: +1-720-863-7841
OrgAbuseEmail: tcrews@computercrews.com
OrgAbuseRef: https://whois.arin.net/rest/poc/CREWS27-ARIN

OrgTechHandle: CREWS27-ARIN
OrgTechName: Crews, Tom
OrgTechPhone: +1-720-863-7841
OrgTechEmail: tcrews@computercrews.com
OrgTechRef: https://whois.arin.net/rest/poc/CREWS27-ARIN
198.233.246.75
P address 198.233.246.75
Location United States (US
P address 198.233.246.75
Reverse DNS (PTR record) not available
DNS server (NS record) authns1.qwest.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 198.233.0.0/16
198.233.0.0 – 198.233.255.255
NetRange: 198.233.246.72 – 198.233.246.79
CIDR: 198.233.246.72/29
NetName: Q1209-198-233-246-72
NetHandle: NET-198-233-246-72-1
Parent: QWEST-INET-30 (NET-198-233-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: COMPUTER CREWS (CC-1746)
RegDate: 2015-12-09
Updated: 2015-12-09
OrgName: COMPUTER CREWS
OrgId: CC-1746
Address: 9101 HARLAN ST UNIT 215
City: WESTMINSTER
StateProv: CO
PostalCode: 80031
Country: US
RegDate: 2015-12-04
Updated: 2015-12-04
OrgAbuseHandle: CREWS27-ARIN
OrgAbuseName: Crews, Tom
720-863-7841
OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email

centurylinks.com

computercrews.com
This domain is hosted by Limestone Networks, Inc. (AS46475). The first DNS server is ns3.computercrews.com. The current IPv4 address is 74.63.246.116. The mail server with the highest priority is mx2-us1.ppe-hosted.com.
v=spf1 include:spf.protection.outlook.com
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns1a.o365filtering.com. The current IPv4 address is 40.97.116.82. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.
@@@@@@@@@@@@@@@@
??????????????????

v=spf1
include:spf-a.outlook.com
This domain is hosted by Microsoft Corporation (AS8075). The first DNS server is ns1a.o365filtering.com. The current IPv4 address is 40.97.116.82. The mail server with the highest priority is outlook-com.olc.protection.outlook.com.

Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.116.82 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1

include:spf-b.outlook.com
Domain IPv4 address Ranking Alexa Pagerank
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.116.82 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1

ip4:157.55.9.128/25
include:spf.protection.outlook.com

include:spf-a.hotmail.com
include:_spf-ssg-b.microsoft.com
Domains
Domain IPv4 address Ranking Alexa Pagerank
microsoft.ac.cn 160.124.169.13
microsoft.ac.nz 191.237.78.58 -1
microsoft.accountant -1
microsoft.accountants
microsoft.actor -1
microsoft.adult 165.160.13.20 -1
microsoft.ae 2
microsoft.africa
microsoft.ai 52.164.206.56
microsoft.airforce
microsoft.al 31.171.152.42
microsoft.alsace
microsoft.am 52.164.206.56
microsoft.amsterdam
microsoft.apartments
microsoft.army
microsoft.art
microsoft.asia 52.164.206.56 -1
microsoft.associates -1
microsoft.at 137.117.225.87 6
microsoft.attorney -1
microsoft.auction
microsoft.audio
microsoft.auto
microsoft.az 104.43.195.251 6
microsoft.ba 138.197.16.119 1
microsoft.band 23.101.184.206
microsoft.bar -1
microsoft.barcelona
microsoft.bayern -1
microsoft.be 23.96.52.53 -1
microsoft.beer -1
microsoft.berlin 52.164.206.56
microsoft.best
microsoft.bet
microsoft.bi 52.164.206.56
microsoft.bid -1
microsoft.bingo
microsoft.bio -1
microsoft.biz 134.170.185.46
microsoft.biz.pk 104.215.95.187
microsoft.biz.pl 104.215.95.187
microsoft.biz.tr
microsoft.bl.it 213.186.33.5
microsoft.black -1
microsoft.blackfriday -1
microsoft.blog
microsoft.blue
microsoft.boston
microsoft.bot
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.224.168.0 103.224.171.255 SSG Corporation VN 1 0
90.154.254.0 90.154.254.255 BTC SSG Customers BG 0 1
103.224.170.0 103.224.171.255 SSG Corporation VN 1 0
203.177.219.0 203.177.219.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
203.177.224.0 203.177.224.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.225.0 203.177.225.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.229.0 203.177.229.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
13.64.0.0 13.95.255.255 Microsoft Corporation US 109,278 33
13.96.0.0 13.103.255.255 Microsoft Corporation US 4 0
13.104.0.0 13.107.255.255 Microsoft Corporation US 712 0
20.0.0.0 20.31.255.255 Microsoft Corporation US 64 0
20.33.0.0 20.33.255.255 Microsoft Corporation US 0 0
20.34.0.0 20.35.255.255 Microsoft Corporation US 0 0
20.36.0.0 20.39.255.255 Microsoft Corporation US 1 0
20.40.0.0 20.47.255.255 Microsoft Corporation US 2 0
20.48.0.0 20.63.255.255 Microsoft Corporation US 10 0
20.64.0.0 20.127.255.255 Microsoft Corporation US 25 0
20.128.0.0 20.128.255.255 Microsoft Corporation US 0 0
20.130.0.0 20.130.255.255 Microsoft Corporation US 0 0
20.135.0.0 20.135.255.255 Microsoft Corporation US 0 0
20.136.0.0 20.136.255.255 Microsoft Corporation US 0 0
20.140.0.0 20.141.255.255 Microsoft Corporation US 0 0
20.143.0.0 20.143.255.255 Microsoft Corporation US 0 0
20.144.0.0 20.147.255.255 Microsoft Corporation US 1 0
20.150.0.0 20.151.255.255 Microsoft Corporation US 0 0
20.152.0.0 20.153.255.255 Microsoft Corporation US 0 0
20.157.0.0 20.157.255.255 Microsoft Corporation US 0 0
20.158.0.0 20.159.255.255 Microsoft Corporation US 0 0
20.160.0.0 20.175.255.255 Microsoft Corporation US 1 0
20.176.0.0 20.179.255.255 Microsoft Corporation US 1 0
20.180.0.0 20.183.255.255 Microsoft Corporation US 0 0
20.184.0.0 20.191.255.255 Microsoft Corporation US 52 2
20.192.0.0 20.255.255.255 Microsoft Corporation US 11 0
23.96.0.0 23.103.255.255 Microsoft Corporation US 76,933 8
40.64.0.0 40.71.255.255 Microsoft Corporation US 11,553 4
40.74.0.0 40.75.255.255 Microsoft Corporation US 1,838 0
40.76.0.0 40.79.255.255 Microsoft Corporation US 12,194 1
40.80.0.0 40.95.255.255 Microsoft Corporation US 24,252 3
40.96.0.0 40.111.255.255 Microsoft Corporation US 7,415 0
40.112.0.0 40.119.255.255 Microsoft Corporation US 24,946 2
40.120.0.0 40.123.255.255 Microsoft Corporation US 4,932 1
40.124.0.0 40.124.255.255 Microsoft Corporation US 633 0
40.125.0.0 40.125.127.255 Microsoft Corporation US 0 0
40.126.0.0 40.126.63.255 Microsoft Corporation US 0 0
40.126.128.0 40.126.255.255 Microsoft Corporation US 2,409 0
40.127.0.0 40.127.255.255 Microsoft Corporation US 2,744 1
51.4.0.0 51.5.255.255 Microsoft Deutschland MCIO GmbH DE 446 1
51.8.0.0 51.8.255.255 Microsoft Deutschland MCIO GmbH DE 0 0
51.10.0.0 51.13.255.255 Microsoft Limited GB 2 0
51.18.0.0 51.18.255.255 Microsoft Deutschland MCIO GmbH GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:506:28:: 2001:506:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:67c:1020:: 2001:67c:1021:ffff:ffff:ffff:ffff:ffff Microsoft Limited AT 0 0
2001:df0:7:: 2001:df0:7:ffff:ffff:ffff:ffff:ffff Microsoft Corp SG 0 0
2001:df0:d7:: 2001:df0:d7:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. KR 0 0
2001:df0:d8:: 2001:df0:d8:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. AU 0 0
2001:df0:d9:: 2001:df0:d9:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. TW 0 0
2001:4898:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:489a:: 2001:489a:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2400:8980:: 2400:8980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. Shanghai Branch Office CN 0 0
2401:a980:: 2401:a980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Mobile Alliance Internet Services Co., Ltd CN 0 0
2404:f800:: 2404:f800:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. JP 0 0
2404:f801:: 2404:f801:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2406:e500:: 2406:e500:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. CN 0 0
2603:1000:: 2603:10ff:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2620:0:30:: 2620::37:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:b4:4000:: 2620:b4:4000:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:10c:5000:: 2620:10c:500f:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:: 2620:1ec:fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 65 0
2a00:1c68:: 2a00:1c68:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited GB 0 0
2a01:110:: 2a01:111:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited EU 23,189 0
2a01:4180:: 2a01:4180:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Deutschland MCIO GmbH DE 2 0
2001:4898:: 2001:4898:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:4898:e810:: 2001:4898:e810:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:4899:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:2000:: 2001:489a:3fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:4000:: 2001:489a:5fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2404:f801:8028:: 2404:f801:8028:ffff:ffff:ffff:ffff:ffff MSIT Edge HyderabadBuilding 1, Microsoft Campus SG 0 0
2404:f801:8030:: 2404:f801:8030:ffff:ffff:ffff:ffff:ffff Microsoft Edge Sydney SG 0 0
2404:f801:8050:: 2404:f801:8050:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2404:f801:a808:: 2404:f801:a808:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2603:1000:: 2603:107f:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2603:1061:6:: 2603:1061:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:4:: 2620:1ec:4:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 7 0
2620:1ec:5:: 2620:1ec:5:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:6:: 2620:1ec:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:7:: 2620:1ec:7:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:9:: 2620:1ec:9:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:a:: 2620:1ec:a:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:b:: 2620:1ec:b:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:c:: 2620:1ec:c:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 3 0
2620:1ec:d:: 2620:1ec:d:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:12:: 2620:1ec:12:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:13:: 2620:1ec:13:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:21:: 2620:1ec:21:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:22:: 2620:1ec:22:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:25:: 2620:1ec:25:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:28:: 2620:1ec:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:29:: 2620:1ec:29:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:34:: 2620:1ec:34:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2620:1ec:39:: 2620:1ec:39:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
131399 SSG Corporation VN 1 0 1 0
3598 Microsoft Corporation US 18 4 23,966 0
6584 Microsoft Corporation US 17 1 64 0
8068 Microsoft Corporation US 79 39 1,272 0
8070 Microsoft Corporation US 7 2 3 0
8071 Microsoft Corporation US 5 2 11,353 0
8075 Microsoft Corporation US 128 18 612,722 132
12076 Microsoft Corporation US 1 0 0 0
20046 Microsoft Corporation US 5 0 27 0
23468 Microsoft Corporation US 4 0 0 0
35106 Microsoft Limited GB 1 1 0 0
52985 Microsoft Informatica Ltda BR 2 1 0 0
58862 Microsoft (China) Co., Ltd. CN 1 0 0 0
59067 Microsoft Mobile Alliance Internet Services Co., Ltd CN 6 0 17 0
63314 Microsoft Corporation US 1 1 1 0
200517 Microsoft Deutschland MCIO GmbH DE 5 1 446 1
DNS server (NS records) ns4.msft.net (208.76.45.53)
ns1.msft.net (208.84.0.53)
ns2.msft.net (208.84.2.53)
ns3.msft.net (193.221.113.53)
Mail server (MX records) microsoft-com.mail.protection.outlook.com (23.103.156.74)
IP address (IPv4) 23.96.52.53
191.239.213.197
104.40.211.35
104.43.195.251
23.100.122.175
IP address (IPv6) 2a02:26f0:6c00:183::356e
2a02:26f0:6c00:187::356e
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 23.96.0.0/14
23.96.0.0 – 23.99.255.255
include:_spf-ssg-c.microsoft.com ~
Domain IPv4 address Ranking Alexa Pagerank
microsoft.ac.cn 160.124.169.13
microsoft.ac.nz 191.237.78.58 -1
microsoft.accountant -1
microsoft.accountants
microsoft.actor -1
microsoft.adult 165.160.13.20 -1
microsoft.ae 2
microsoft.africa
microsoft.ai 52.164.206.56
microsoft.airforce
microsoft.al 31.171.152.42
microsoft.alsace
microsoft.am 52.164.206.56
microsoft.amsterdam
microsoft.apartments
microsoft.army
microsoft.art
microsoft.asia 52.164.206.56 -1
microsoft.associates -1
microsoft.at 137.117.225.87 6
microsoft.attorney -1
microsoft.auction
microsoft.audio
microsoft.auto
microsoft.az 104.43.195.251 6
microsoft.ba 138.197.16.119 1
microsoft.band 23.101.184.206
microsoft.bar -1
microsoft.barcelona
microsoft.bayern -1
microsoft.be 23.96.52.53 -1
microsoft.beer -1
microsoft.berlin 52.164.206.56
microsoft.best
microsoft.bet
microsoft.bi 52.164.206.56
microsoft.bid -1
microsoft.bingo
microsoft.bio -1
microsoft.biz 134.170.185.46
microsoft.biz.pk 104.215.95.187
microsoft.biz.pl 104.215.95.187
microsoft.biz.tr
microsoft.bl.it 213.186.33.5
microsoft.black -1
microsoft.blackfriday -1
microsoft.blog
microsoft.blue
microsoft.boston
microsoft.bot
IPv4 routes
Startip Endip Description Country #domains #spamhosts
103.224.168.0 103.224.171.255 SSG Corporation VN 1 0
90.154.254.0 90.154.254.255 BTC SSG Customers BG 0 1
103.224.170.0 103.224.171.255 SSG Corporation VN 1 0
203.177.219.0 203.177.219.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
203.177.224.0 203.177.224.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.225.0 203.177.225.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 0 0
203.177.229.0 203.177.229.255 NETWORK ASSIGNED DSL (SSG-REDBACK MAKATI) Ip pool PH 3 0
13.64.0.0 13.95.255.255 Microsoft Corporation US 109,278 33
13.96.0.0 13.103.255.255 Microsoft Corporation US 4 0
13.104.0.0 13.107.255.255 Microsoft Corporation US 712 0
20.0.0.0 20.31.255.255 Microsoft Corporation US 64 0
20.33.0.0 20.33.255.255 Microsoft Corporation US 0 0
20.34.0.0 20.35.255.255 Microsoft Corporation US 0 0
20.36.0.0 20.39.255.255 Microsoft Corporation US 1 0
20.40.0.0 20.47.255.255 Microsoft Corporation US 2 0
20.48.0.0 20.63.255.255 Microsoft Corporation US 10 0
20.64.0.0 20.127.255.255 Microsoft Corporation US 25 0
20.128.0.0 20.128.255.255 Microsoft Corporation US 0 0
20.130.0.0 20.130.255.255 Microsoft Corporation US 0 0
20.135.0.0 20.135.255.255 Microsoft Corporation US 0 0
20.136.0.0 20.136.255.255 Microsoft Corporation US 0 0
20.140.0.0 20.141.255.255 Microsoft Corporation US 0 0
20.143.0.0 20.143.255.255 Microsoft Corporation US 0 0
20.144.0.0 20.147.255.255 Microsoft Corporation US 1 0
20.150.0.0 20.151.255.255 Microsoft Corporation US 0 0
20.152.0.0 20.153.255.255 Microsoft Corporation US 0 0
20.157.0.0 20.157.255.255 Microsoft Corporation US 0 0
20.158.0.0 20.159.255.255 Microsoft Corporation US 0 0
20.160.0.0 20.175.255.255 Microsoft Corporation US 1 0
20.176.0.0 20.179.255.255 Microsoft Corporation US 1 0
20.180.0.0 20.183.255.255 Microsoft Corporation US 0 0
20.184.0.0 20.191.255.255 Microsoft Corporation US 52 2
20.192.0.0 20.255.255.255 Microsoft Corporation US 11 0
23.96.0.0 23.103.255.255 Microsoft Corporation US 76,933 8
40.64.0.0 40.71.255.255 Microsoft Corporation US 11,553 4
40.74.0.0 40.75.255.255 Microsoft Corporation US 1,838 0
40.76.0.0 40.79.255.255 Microsoft Corporation US 12,194 1
40.80.0.0 40.95.255.255 Microsoft Corporation US 24,252 3
40.96.0.0 40.111.255.255 Microsoft Corporation US 7,415 0
40.112.0.0 40.119.255.255 Microsoft Corporation US 24,946 2
40.120.0.0 40.123.255.255 Microsoft Corporation US 4,932 1
40.124.0.0 40.124.255.255 Microsoft Corporation US 633 0
40.125.0.0 40.125.127.255 Microsoft Corporation US 0 0
40.126.0.0 40.126.63.255 Microsoft Corporation US 0 0
40.126.128.0 40.126.255.255 Microsoft Corporation US 2,409 0
40.127.0.0 40.127.255.255 Microsoft Corporation US 2,744 1
51.4.0.0 51.5.255.255 Microsoft Deutschland MCIO GmbH DE 446 1
51.8.0.0 51.8.255.255 Microsoft Deutschland MCIO GmbH DE 0 0
51.10.0.0 51.13.255.255 Microsoft Limited GB 2 0
51.18.0.0 51.18.255.255 Microsoft Deutschland MCIO GmbH GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:506:28:: 2001:506:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:67c:1020:: 2001:67c:1021:ffff:ffff:ffff:ffff:ffff Microsoft Limited AT 0 0
2001:df0:7:: 2001:df0:7:ffff:ffff:ffff:ffff:ffff Microsoft Corp SG 0 0
2001:df0:d7:: 2001:df0:d7:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. KR 0 0
2001:df0:d8:: 2001:df0:d8:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. AU 0 0
2001:df0:d9:: 2001:df0:d9:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. TW 0 0
2001:4898:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:489a:: 2001:489a:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2400:8980:: 2400:8980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. Shanghai Branch Office CN 0 0
2401:a980:: 2401:a980:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Mobile Alliance Internet Services Co., Ltd CN 0 0
2404:f800:: 2404:f800:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. JP 0 0
2404:f801:: 2404:f801:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2406:e500:: 2406:e500:ffff:ffff:ffff:ffff:ffff:ffff Microsoft (China) Co., Ltd. CN 0 0
2603:1000:: 2603:10ff:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2620:0:30:: 2620::37:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:b4:4000:: 2620:b4:4000:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:10c:5000:: 2620:10c:500f:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:: 2620:1ec:fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 65 0
2a00:1c68:: 2a00:1c68:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited GB 0 0
2a01:110:: 2a01:111:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Limited EU 23,189 0
2a01:4180:: 2a01:4180:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Deutschland MCIO GmbH DE 2 0
2001:4898:: 2001:4898:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2001:4898:e810:: 2001:4898:e810:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:4899:: 2001:4899:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:2000:: 2001:489a:3fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2001:489a:4000:: 2001:489a:5fff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2404:f801:8028:: 2404:f801:8028:ffff:ffff:ffff:ffff:ffff MSIT Edge HyderabadBuilding 1, Microsoft Campus SG 0 0
2404:f801:8030:: 2404:f801:8030:ffff:ffff:ffff:ffff:ffff Microsoft Edge Sydney SG 0 0
2404:f801:8050:: 2404:f801:8050:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2404:f801:a808:: 2404:f801:a808:ffff:ffff:ffff:ffff:ffff Microsoft Singapore Pte. Ltd. SG 0 0
2603:1000:: 2603:107f:ffff:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1,156 0
2603:1061:6:: 2603:1061:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:4:: 2620:1ec:4:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 7 0
2620:1ec:5:: 2620:1ec:5:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:6:: 2620:1ec:6:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:7:: 2620:1ec:7:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:9:: 2620:1ec:9:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:a:: 2620:1ec:a:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:b:: 2620:1ec:b:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:c:: 2620:1ec:c:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 3 0
2620:1ec:d:: 2620:1ec:d:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:12:: 2620:1ec:12:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:13:: 2620:1ec:13:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:21:: 2620:1ec:21:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 1 0
2620:1ec:22:: 2620:1ec:22:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:25:: 2620:1ec:25:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:28:: 2620:1ec:28:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:29:: 2620:1ec:29:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
2620:1ec:34:: 2620:1ec:34:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 2 0
2620:1ec:39:: 2620:1ec:39:ffff:ffff:ffff:ffff:ffff Microsoft Corporation US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
131399 SSG Corporation VN 1 0 1 0
3598 Microsoft Corporation US 18 4 23,966 0
6584 Microsoft Corporation US 17 1 64 0
8068 Microsoft Corporation US 79 39 1,272 0
8070 Microsoft Corporation US 7 2 3 0
8071 Microsoft Corporation US 5 2 11,353 0
8075 Microsoft Corporation US 128 18 612,722 132
12076 Microsoft Corporation US 1 0 0 0
20046 Microsoft Corporation US 5 0 27 0
23468 Microsoft Corporation US 4 0 0 0
35106 Microsoft Limited GB 1 1 0 0
52985 Microsoft Informatica Ltda BR 2 1 0 0
58862 Microsoft (China) Co., Ltd. CN 1 0 0 0
59067 Microsoft Mobile Alliance Internet Services Co., Ltd CN 6 0 17 0
63314 Microsoft Corporation US 1 1 1 0
200517 Microsoft Deutschland MCIO GmbH DE 5 1 446 1

DNS server (NS records) ns1a.o365filtering.com (157.56.110.11)
ns1.msft.net (208.84.0.53)
ns4.msft.net (208.76.45.53)
ns4a.o365filtering.com (157.55.133.11)
ns2.msft.net (208.84.2.53)
ns2a.o365filtering.com (157.56.116.52)
ns3.msft.net (193.221.113.53)
Mail server (MX records) outlook-com.olc.protection.outlook.com (104.47.36.33)
IP address (IPv4) 40.97.116.82
40.97.148.226
40.97.128.194
40.97.161.50
40.97.164.146
40.97.153.146
40.97.156.114
40.97.160.2
IP address (IPv6) 2603:1026:206:2::2
2603:1026:3:f6::2
2603:1026:7:28::2
2603:1026:3:cb::2
2603:1026:300:64::2
2603:1026:203::2
2603:1026:300:a1::2
2603:1026:206:1::2
ASN number 8075
ASN name (ISP) Microsoft Corporation
IP-range/subnet 40.64.0.0/10
40.64.0.0 – 40.127.255.255
Domain Name: outlook.com
Registry Domain ID: 2019401_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2017-07-16T02:21:48-0700
outlook.adult 165.160.15.20 -1
outlook.ae 192.232.216.139 0
outlook.africa 45.35.13.15
outlook.am 37.252.68.170
outlook.amsterdam
outlook.asia 65.55.174.24 -1
outlook.at 204.79.197.210
outlook.be 204.79.197.210 0
outlook.berlin 52.164.206.56 -1
outlook.best
outlook.bg 204.79.197.210
outlook.biz
outlook.blog
outlook.blue
outlook.bm 199.73.55.35
outlook.br.com 216.58.202.14
outlook.build -1
outlook.by 185.66.68.16 4
outlook.bz 204.79.197.210 0
outlook.cam 199.59.243.120
outlook.cat 217.76.128.34 0
outlook.cc
outlook.ch 62.48.2.2 1
outlook.cl 204.79.197.210
outlook.click 89.31.143.1
outlook.cloud 50.63.202.19
outlook.cm 204.79.197.210 0
outlook.cn 12,552 -1
outlook.co 204.79.197.210 7
outlook.co.ao 169.239.77.250
outlook.co.at
outlook.co.id 204.79.197.210
outlook.co.il 204.79.197.210
outlook.co.in 216.239.38.21
outlook.co.jp 23.236.62.147 1
outlook.co.kr -1
outlook.co.nz 204.79.197.210
outlook.co.th 204.79.197.210
outlook.co.uk 77.72.4.226 3
outlook.co.za 208.91.199.94 3
outlook.com 40.97.160.2 2,642 8
outlook.com.ar 204.79.197.210 0
outlook.com.au 204.79.197.210
outlook.com.br 204.79.197.210 3
outlook.com.cn 0
outlook.com.de 45.32.111.200
outlook.com.es 204.79.197.210
outlook.com.fr
outlook.com.gr 204.79.197.210
outlook.com.jm
IPv4 routes
Startip Endip Description Country #domains #spamhosts
204.13.88.0 204.13.91.255 Elephant Outlook, LLC US 10 0
205.189.64.0 205.189.65.255 Outlook Systems CA 0 0
43.225.80.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.191.255 RMP Protection Limited HK 58 0
91.223.152.0 91.223.152.255 Protection and Security Plus LTD UA 7 0
103.68.188.0 103.68.191.255 JV Protection Services AU 27 0
103.241.52.0 103.241.55.255 Point Blank Protection Pvt Ltd IN 0 0
103.246.187.0 103.246.187.255 Crystal Crop Protection Private Limited IN 0 0
103.253.40.0 103.253.43.255 RMP Protection Limited. HK 227 0
103.254.164.0 103.254.164.255 Australian Customs and Border Protection Service AU 0 0
121.54.184.0 121.54.187.255 JV Protection Services AU 2 0
134.67.0.0 134.67.255.255 U.S. Environmental Protection Agency US 13 0
148.59.135.0 148.59.135.255 PROTECTION ONE US 1 0
158.45.0.0 158.45.255.255 STATE OF VICTORIA – ENVIRONMENT PROTECTION AUTHORITY AU 0 0
158.119.0.0 158.119.255.255 Health Protection Agency GB 0 0
161.80.0.0 161.80.255.255 U.S. Environmental Protection Agency US 0 0
162.145.0.0 162.145.255.255 Australian Customs and Border Protection Service AU 0 0
162.146.0.0 162.146.255.255 Australian Customs and Border Protection Service AU 1 0
162.147.0.0 162.147.255.255 Australian Customs and Border Protection Service AU 2 0
164.97.0.0 164.97.255.255 DEPARTMENT OF IMMIGRATION AND BORDER PROTECTION AU 12 0
165.105.0.0 165.105.255.255 State of California Department of Forestry and Fire Protection US 0 0
168.246.0.0 168.246.255.255 Syngenta Crop Protection, LLC US 0 0
192.58.247.0 192.58.247.255 Environmental Protection Agency US 0 0
192.70.118.0 192.70.118.255 Ministere de l’Environnement, Direction de la Protection de la Nature FR 0 0
192.81.166.0 192.81.166.255 U.S. Merit Systems Protection Board US 0 0
192.112.29.0 192.112.29.255 Ontario Agency for Health Protection and Promotion CA 1 0
192.124.164.0 192.124.164.255 State of California Department of Forestry and Fire Protection US 0 0
193.29.204.0 193.29.204.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 12 0
193.109.8.0 193.109.11.255 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0
195.211.220.0 195.211.223.255 DDoS Protection LTD. RU 531 0
198.180.201.0 198.180.201.255 Lightning Location and Protection, Inc. US 0 0
198.190.184.0 198.190.184.255 Consumers Power, System Protection Engineering US 0 0
198.202.131.0 198.202.131.255 Lightning Location and Protection, Inc. US 0 0
199.73.128.0 199.73.255.255 Florida Department of Environmental Protection US 1 0
202.14.101.0 202.14.101.255 Department for Child Protection and Family Support AU 7 0
203.12.67.0 203.12.67.255 Department of Environmental Protection – Waste Management AU 0 0
203.23.184.0 203.23.184.255 Public Service and Merit Protection Commisson (PSMPC) AU 0 0
204.8.235.0 204.8.235.255 PROTECTION ONE US 1 0
204.46.0.0 204.47.255.255 U.S. Environmental Protection Agency US 0 0
204.87.241.0 204.87.241.255 Ground Water Protection Council, Inc. US 0 0
206.197.209.0 206.197.209.255 Protection One Alarm Monitoring, INC. US 0 0
5.101.40.0 5.101.40.255 Cloud Hosting & DDoS Protection RU 1,268 1
12.29.157.0 12.29.157.255 PROTECTION ONE US 11 0
12.108.152.0 12.108.152.255 PROTECTION ONE US 0 0
12.147.152.0 12.147.152.255 PROTECTION ONE ALARM MONITORING US 0 0
43.225.80.0 43.225.80.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.82.0 43.225.82.255 Point Blank Protection Pvt Ltd IN 0 0
43.225.83.0 43.225.83.255 Point Blank Protection Pvt Ltd IN 0 0
45.123.188.0 45.123.188.255 RMP Protection Limited HK 0 0
45.123.189.0 45.123.189.255 RMP Protection Limited HK 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:678:564:: 2001:678:564:ffff:ffff:ffff:ffff:ffff Protection and Security Plus LTD UA 2 0
2001:df1:1800:: 2001:df1:1800:ffff:ffff:ffff:ffff:ffff Australian Customs and Border Protection Service AU 0 0
2001:df7:7000:: 2001:df7:7000:ffff:ffff:ffff:ffff:ffff RMP Protection Limited. HK 1 0
2403:5780:: 2403:5780:ffff:ffff:ffff:ffff:ffff:ffff Shanghai boci Environmental Protection Technology Co., Ltd. CN 0 0
2405:d100:: 2405:d100:ffff:ffff:ffff:ffff:ffff:ffff Australian Radiation Protection and Nuclear Safety Agency AU 0 0
2407:8480:: 2407:8480:ffff:ffff:ffff:ffff:ffff:ffff RMP Protection Limited HK 0 0
2620:0:b10:: 2620::b13:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 1 0
2620:2a:e000:: 2620:2a:e000:ffff:ffff:ffff:ffff:ffff Orland Fire Protection District US 0 0
2620:117:5000:: 2620:117:50ff:ffff:ffff:ffff:ffff:ffff Environmental Protection Agency US 10 0
2620:166:: 2620:166:fff:ffff:ffff:ffff:ffff:ffff Syngenta Crop Protection, LLC US 0 0
2a03:6920:: 2a03:6927:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
2a04:ec0:: 2a04:ec7:ffff:ffff:ffff:ffff:ffff:ffff Health Protection Agency GB 0 0
2a03:6920:: 2a03:6920:ffff:ffff:ffff:ffff:ffff:ffff Whois protection s.r.o. CZ 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
33648 Elephant Outlook, LLC US 2 0 15 1
14298 Environmental Protection Agency US 63 0 0 0
21096 Department of Support of State Service of Special Communication and Information Protection of Ukraine UA 2 0 14 0
23744 Department of Immigration and Border Protection AU 8 0 0 0
30087 Automobile Protection Corporation US 1 0 2 0
30509 PROTECTION ONE US 5 0 11 0
35169 EURO PROTECTION SURVEILLANCE SAS FR 1 0 0 0
40968 Professional Protection Electronic Ltd. GB 1 0 1 0
50098 DDoS Protection LTD. RU 4 0 531 0
55201 ShawCor Pipe Protection, LLC US 1 0 0 0
56439 Protection and Security Plus LTD UA 1 1 7 0
63327 Ontario Agency for Health Protection and Promotion CA 1 0 1 0
133178 Australian Customs and Border Protection Service AU 1 0 0 0
201092 FBU Central base of aviation forest protection ” Avialesookhrana ” RU 1 0 3 0
205280 United Protection (UK) Security LIMITED GB 1 0 0 10
@@@@@@@@@@@@@@@@@@@@@@@
??????????????
include:spf.myconnectwise.net
The highest ranking ever is 44,052 and was reached on 2018-02-24. It is not listed in the DMOZ directory. This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns-1207.awsdns-22.org. The current IPv4 address is 63.150.4.209.
v=spf1 include:spf.myconnectwise.net ~all
DNS server (NS records) ns-1207.awsdns-22.org (205.251.196.183)
ns-1902.awsdns-45.co.uk (205.251.199.110)
ns-3.awsdns-00.com (205.251.192.3)
ns-933.awsdns-52.net (205.251.195.165)
Mail server (MX records)
IP address (IPv4) 63.150.4.209
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.144.0.0/12
63.144.0.0 – 63.159.255.255
Domain Name: MYCONNECTWISE.NET
Registry Domain ID: 1516794366_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.networksolutions.com
Registrar URL: http://networksolutions.com
Updated Date: 2017-03-05T17:36:10Z
Creation Date: 2008-08-28T14:05:15Z
Registrar Registration Expiration Date: 2018-08-28T14:05:15Z
Registrar: NETWORK SOLUTIONS, LLC.
Registrar IANA ID: 2
Registrant Name: ConnectWise
Registrant Organization: ConnectWise
Registrant Street: 4110 GEORGE RD STE 200
Registrant City: ROCKY POINT
Registrant State/Province: FL
Registrant Postal Code: 33634-7411
Registrant Country: US
813-397-4604

Domain IPv4 address Ranking Alexa Pagerank
myconnectwise.co.uk 77.246.173.206 -1
myconnectwise.com 63.150.4.200 0
myconnectwise.eu 77.246.173.202
myconnectwise.net 63.150.4.209 44,052 0
myconnectwise.co.uk 77.246.173.206 -1
myconnectwise.com 63.150.4.200 0
myconnectwise.eu 77.246.173.202
myconnectwise.net 63.150.4.209 44,052 0
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@@@@@@@@@@
????????????????????
a:dispatch-us.ppe-hosted.com ~al
Are you looking for IPv4 address 148.163.129.53?
IP address 148.163.129.53
Location Sunnyvale, California, United States
IP address 148.163.129.53
Reverse DNS (PTR record) dispatchb-us1.ppe-hosted.com
DNS server (NS record) ns1.proofpoint.us (208.84.67.208)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.biz (156.154.66.99)
ns3.proofpoint.us (208.84.66.208)
ns3.proofpoint.com (208.84.66.208)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.com (156.154.64.99)
ns1.proofpoint.com (208.84.67.208)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255
148.163.129.53
NetRange: 148.163.128.0 – 148.163.159.255
CIDR: 148.163.128.0/19
NetName: PROOFPOINT-NET-NORTH-AMERICA
NetHandle: NET-148-163-128-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22843, AS13916, AS26211
Organization: Proofpoint, Inc. (PROOF)
RegDate: 2014-06-13
Updated: 2017-06-15
OrgName: Proofpoint, Inc.
OrgId: PROOF
Address: 892 Ross Drive
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
RegDate: 2007-10-16
Updated: 2014-09-08
801-748-4494

@@@@@@@@@@@@@@@@
??????????
Domains around 148.163.129.53
IP address #domains
148.163.129.213 3
148.163.129.214 1
IP address 148.163.129.213
Reverse DNS (PTR record) not available
DNS server (NS record) ns3.proofpoint.us (208.84.66.208)
pdns99.ultradns.biz (156.154.66.99)
pdns99.ultradns.net (156.154.65.99)
ns1.proofpoint.us (208.84.67.208)
ns3.proofpoint.com (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.com (156.154.64.99)
pdns99.ultradns.org (156.154.67.99)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255
148.163.129.213
Number of SPAM hosts on 148.163.128.0/19 1
Domain Tools
so-ne.ne.jp
yamato-tanaka.jp
ilastmile.com
NetRange: 148.163.128.0 – 148.163.159.255
CIDR: 148.163.128.0/19
NetName: PROOFPOINT-NET-NORTH-AMERICA
NetHandle: NET-148-163-128-0-1
Parent: NET148 (NET-148-0-0-0-0)
NetType: Direct Assignment
OriginAS: AS22843, AS13916, AS26211
Organization: Proofpoint, Inc. (PROOF)
RegDate: 2014-06-13
Updated: 2017-06-15
Ref: https://whois.arin.net/rest/net/NET-148-163-128-0-1

OrgName: Proofpoint, Inc.
OrgId: PROOF
Address: 892 Ross Drive
City: Sunnyvale
StateProv: CA
PostalCode: 94089
Country: US
RegDate: 2007-10-16
Updated: 2014-09-08
@@@@@@@@@@@@@@@@
??????????
Mail server Tools
mx7602.piscesdns.net
Are you looking for IPv4 address 148.163.129.213?

Are you looking for domain piscesdns.net?
This domain is hosted by GoDaddy.com, LLC (AS26496). The first DNS server is ns20.domaincontrol.com. The current IPv4 address is 184.168.221.33.

DNS server (NS records) ns20.domaincontrol.com (208.109.255.10)
ns19.domaincontrol.com (216.69.185.10)
Mail server (MX records)
IP address (IPv4) 184.168.221.33
IP address (IPv6)
ASN number 26496
ASN name (ISP) GoDaddy.com, LLC
IP-range/subnet 184.168.221.0/24
184.168.221.0 – 184.168.221.255
Domain Name: PISCESDNS.NET
Registry Domain ID: 1587139235_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.godaddy.com
Registrar URL: http://www.godaddy.com
Updated Date: 2011-10-13T23:49:28Z
Creation Date: 2010-03-01T19:51:04Z
Registry Registrant ID: Not Available From Registry
Registrant Name: Registration Private
Registrant Organization: Domains By Proxy, LLC
Registrant Street: DomainsByProxy.com
Registrant Street: 14455 N. Hayden Road
Registrant City: Scottsdale
Registrant State/Province: Arizona
Registrant Postal Code: 85260
Registrant Country: US
480-624-2599
@@@@@@@@@@@@@
???????????
domainsbyproxy.com

Domain IPv4 address Ranking Alexa Pagerank
piscesdns.net 184.168.221.33
piscesdns.net 184.168.221.33
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@@@@@@@@
Mail server Tools
mx7603.piscesdns.net
mx7603.piscesdns.net.tavaj.com.br
This domain is hosted by Proofpoint, Inc. (AS13916). The first DNS server is ns1.eurodns.com. The current IPv4 address is 148.163.129.214. The mail server with the highest priority is mx7603.piscesdns.net.tavaj.com.br.
DNS server (NS records) ns1.eurodns.com (156.154.64.105)
ns2.eurodns.com (156.154.65.105)
Mail server (MX records) mx7603.piscesdns.net.tavaj.com.br (148.163.129.214)
mx3002.piscesdns.net (208.84.66.213)
IP address (IPv4) 148.163.129.214
IP address (IPv6)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255

% whois.tcpiputils.com

% Whois information not available.
% The registry for this domain name does not
% publish whois records in the standard format.

% The following information is based on the Domain Name System (DNS)

Domain name: tavaj.com.br
Status: registered

Domain nameservers:
ns1.eurodns.com
ns2.eurodns.com
tavaj.com 52.19.197.101
tavaj.com.br 148.163.129.214
tavaj.cz
tavaj.ir
tavaj.com 52.19.197.101
tavaj.com.br 148.163.129.214
tavaj.cz
tavaj.ir
tavajam.ir
tavajgraphics.com 209.99.64.53
tavaji.men
tavajjoh.ir 51.254.56.97 1
tavajmusic.tk 195.20.45.31
tavajo.com 54.183.99.63
tavajo.ir
tavajobs.com 50.63.202.37
tavajobs.info 50.63.202.60
tavajobs.us 184.168.221.52
tavajoh.com 104.24.98.218
tavajohi.com 5.61.27.168
tavajoi.com 184.168.221.62
tavajprint.com 109.169.66.225
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.40.8.0 31.40.15.255 Net By Net Holding LLC RU 1 0
31.170.32.0 31.170.39.255 Net By Net Holding LLC RU 0 0
37.200.88.0 37.200.95.255 Net By Net Holding LLC (HMAO) RU 0 1
37.232.128.0 37.232.255.255 Net By Net Holding LLC RU 11 2
41.67.80.0 41.67.87.255 NET@NET DSL Network EG 0 0
41.217.160.0 41.217.191.255 NET@NET DSL Network EG 0 0
41.221.128.0 41.221.143.255 NET@NET DSL Network EG 0 0
46.72.0.0 46.73.255.255 Net By Net Holding LLC RU 129 8
46.151.168.0 46.151.175.255 Net By Net Holding LLC RU 1 0
46.187.0.0 46.187.127.255 Net By Net Holding LLC RU 10 4
46.232.216.0 46.232.223.255 Net By Net Holding LLC RU 0 0
62.16.96.0 62.16.127.255 Net By Net Holding LLC RU 19 0
62.182.128.0 62.182.135.255 Net By Net Holding LLC RU 1 0
77.75.0.0 77.75.7.255 Net By Net Holding LLC RU 6 0
78.31.240.0 78.31.247.255 Net By Net Holding LLC RU 0 0
78.41.96.0 78.41.99.255 Net By Net Holding LLC RU 51 0
79.98.88.0 79.98.95.255 Net By Net Holding LLC RU 2 0
79.111.0.0 79.111.255.255 Net By Net Holding LLC RU 225 6
79.120.0.0 79.120.127.255 Net By Net Holding LLC RU 406 0
80.68.64.0 80.68.79.255 Net By Net Holding LLC RU 8 2
80.90.112.0 80.90.127.255 Net By Net Holding LLC RU 26 0
82.149.128.0 82.149.159.255 Net By Net Holding LLC (Murmansk) RU 2 3
84.16.128.0 84.16.159.255 Net By Net Holding LLC RU 15 0
85.31.176.0 85.31.183.255 Net By Net Holding LLC RU 107 0
85.159.40.0 85.159.47.255 Net By Net Holding LLC RU 41 0
89.20.128.0 89.20.159.255 Net By Net Holding LLC RU 81 1
89.221.16.0 89.221.31.255 Net By Net Holding LLC RU 1 0
91.205.168.0 91.205.171.255 Net By Net Holding LLC RU 0 0
91.207.42.0 91.207.43.255 Net By Net Holding LLC RU 9 0
91.239.63.0 91.239.63.255 Net By Net Holding LLC RU 0 0
91.242.40.0 91.242.43.255 Net By Net Holding LLC RU 1 0
92.42.88.0 92.42.95.255 Net By Net Holding LLC RU 0 0
94.125.40.0 94.125.47.255 Net By Net Holding LLC RU 0 0
94.143.56.0 94.143.63.255 Net By Net Holding LLC RU 0 0
94.154.64.0 94.154.79.255 Net By Net Holding LLC RU 18 1
94.232.8.0 94.232.15.255 Net By Net Holding LLC RU 4 0
95.141.224.0 95.141.239.255 Net By Net Holding LLC RU 20 0
95.220.0.0 95.221.255.255 Net By Net Holding LLC RU 32 9
109.63.128.0 109.63.255.255 Net By Net Holding LLC RU 9 4
109.75.240.0 109.75.255.255 Net By Net Holding LLC RU 27 0
109.95.224.0 109.95.231.255 Net By Net Holding LLC RU 20 1
109.170.0.0 109.170.127.255 Net By Net Holding LLC RU 48 0
109.197.88.0 109.197.95.255 Net By Net Holding LLC RU 13 0
128.140.160.0 128.140.167.255 Net By Net Holding LLC RU 3 0
128.204.0.0 128.204.63.255 Net By Net Holding LLC RU 19 1
130.0.216.0 130.0.223.255 Net By Net Holding LLC RU 2 1
149.154.128.0 149.154.143.255 Net By Net Holding LLC RU 0 0
176.77.0.0 176.77.127.255 Net By Net Holding LLC RU 1 2
176.106.128.0 176.106.135.255 Net By Net Holding LLC RU 1 0
176.117.16.0 176.117.31.255 Net By Net Holding LLC RU 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 14 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:400:: 2001:67c:400:ffff:ffff:ffff:ffff:ffff SPC Net Soluciones de Negocio Electronico S.L. ES 0 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 215 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 156 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,425 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
2001:a60:: 2001:a67:ffff:ffff:ffff:ffff:ffff:ffff M-net Telekommunikations GmbH DE 945 0
2001:ae0:: 2001:ae1:ffff:ffff:ffff:ffff:ffff:ffff teuto.net Netzdienste GmbH DE 4 0
2001:df0:4b:: 2001:df0:4b:ffff:ffff:ffff:ffff:ffff CardGate.net Pty Ltd AU 1 0
2001:df0:68:: 2001:df0:68:ffff:ffff:ffff:ffff:ffff Convivial Net JP 1 0
2001:df0:aa:: 2001:df0:aa:ffff:ffff:ffff:ffff:ffff PT. Fotografer Net Global ID 0 0
2001:df1:1e00:: 2001:df1:1e00:ffff:ffff:ffff:ffff:ffff INTERMEDIA.NET AUSTRALIA PTY. LTD. AU 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12714 Net By Net Holding LLC RU 193 2 4,040 80
20911 Net-Surf.net Ltd. BG 28 0 67 8
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 165 0
1618 Daytona Net Works, Inc. US 2 0 251 0
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 17 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 50 2 4,624 10
3254 Lucky Net Ltd UA 4 0 2,056 1
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 1
3595 Global Net Access, LLC US 37 3 89,065 8
3931 Logical Net Corporation US 6 0 748 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,812 25
4776 A-Net Co., Ltd. TH 35 1 144 0
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 384 13 33,808 142
5405 CSO.net Internet Services GmbH AT 1 1 3,976 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 601 4
6364 Atlantic.net, Inc. US 47 5 18,830 2
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,862 0 11,016 13
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 300 1
6831 Net & Com s.r.l. IT 2 1 655 0
6911 Pro-Net Internet Services Limited GB 4 0 161 0
7106 Com Net, Inc. US 9 1 958 2
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 4 0 0
7350 MetComm.Net, LLC US 1 0 37 0
7403 Colba Net Inc. CA 9 0 288 0
7600 Escape.net AU 56 4 514 0
7641 China Broadcasting TV Net CN 7 0 55 0
7806 Binary Net, LLC US 14 0 1,272 0
7850 iHighway.net, Inc. US 22 1 36 0
7891 Bellsouth.Net US 1 0 0 0
7894 Bellsouth.Net US 2 0 1 0
8001 Net Access Corporation US 39 4 15,250 1
8057 Vision Net, Inc. US 43 1 311 1
8061 Bellsouth.Net US 13 0 0 0
8063 Bellsouth.Net US 4 0 0 0
8345 Irkutsk Business Net RU 9 0 290 10
8386 VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 509 0 344 823

@@@@@@@@@@@@@
Domain Tools
tavaj.com.br
address 148.163.129.214
Location Sunnyvale, California, United States (US) flag
Registry arin
IP address 148.163.129.214
Reverse DNS (PTR record) not available
DNS server (NS record) ns3.proofpoint.us (208.84.66.208)
ns1.proofpoint.com (208.84.67.208)
pdns99.ultradns.org (156.154.67.99)
pdns99.ultradns.net (156.154.65.99)
pdns99.ultradns.com (156.154.64.99)
ns1.proofpoint.us (208.84.67.208)
ns3.proofpoint.com (208.84.66.208)
pdns99.ultradns.biz (156.154.66.99)
ASN number 13916
ASN name (ISP) Proofpoint, Inc.
IP-range/subnet 148.163.128.0/19
148.163.128.0 – 148.163.159.255

@@@@@@@@@@@@@@@@@
??????????????
Are you looking for domain ppe-hosted.com?

Domain IPv4 address Ranking Alexa Pagerank
ppe-hosted.com 6
ppe-hosted.com 6
IPv4 routes
Startip Endip Description Country #domains #spamhosts
41.79.220.0 41.79.223.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 117 1
41.79.220.0 41.79.220.255 Clearaccess Hosted. /32 and /30 IP addresses used for hosted servers and hosted client environment. These IP’s are hosted servers as well as dynamically assigned ZA 115 0
76.191.0.0 76.191.15.255 Metronet Fire Dispatch US 0 0
204.89.240.0 204.89.240.255 Tri-Community Dispatch Center US 0 0
208.81.208.0 208.81.211.255 Dispatch Printing Company US 70 0
209.251.232.0 209.251.232.255 Southwest Dispatch Center US 1 0
208.81.208.0 208.81.208.255 Dispatch Printing Company US 70 0
208.81.209.0 208.81.209.255 Dispatch Printing Company US 0 0
208.81.210.0 208.81.210.255 Dispatch Printing Company US 0 0
208.81.211.0 208.81.211.255 Dispatch Printing Company US 0 0
5.226.32.0 5.226.39.255 ADMINOR INFRA HOSTED IN VASTBERGA STOCKHOLM SE 1 0
41.79.180.0 41.79.183.255 The Packet Hub Hosted Services ZA 14 0
41.191.232.0 41.191.239.255 Telco Applications servers and hosted facilities ZW 82 0
41.222.228.0 41.222.231.255 Hosted ZA 34 0
45.118.180.0 45.118.183.255 HDDC-HOSTED SG 137 0
64.112.184.0 64.112.187.255 Hosted Backbone US 0 0
77.75.208.0 77.75.215.255 Services and servers only hosted by TV2 NO 31 0
77.240.48.0 77.240.63.255 Telappliant Hosted Services GB 9 0
87.236.128.0 87.236.135.255 Hosted Services GB 12 0
95.215.174.0 95.215.174.255 A4N Hosted Sites GB 33 0
103.7.192.0 103.7.195.255 Hosted Continuity Pty Ltd AU 4 0
103.40.109.0 103.40.109.255 Hosted Network Pty. Ltd. AU 87 0
103.70.136.0 103.70.137.255 THE VALUE HOSTED (PVT). LIMITED PK 226 14
103.80.20.0 103.80.21.255 Hosted Network Pty. Ltd. AU 4 0
103.243.110.0 103.243.110.255 Hosted Network Pty. Ltd. AU 217 0
103.244.128.0 103.244.131.255 W3 Hosted Servers AU 2 0
103.249.60.0 103.249.63.255 Managed Hosted Applications Limited NZ 26 0
148.59.134.0 148.59.134.255 Hosted SFY CA 4 0
169.255.36.0 169.255.39.255 123 Internetworks own hosted infrastructure ZA 4 1
169.255.252.0 169.255.255.255 Hosting Range (this includes VAS, Radius, Portal, Websites and other hosted Services and Gateway addresses) ZA 2 0
173.209.192.0 173.209.223.255 Hosted Data Solutions, LLC US 2 0
177.39.96.0 177.39.99.255 Websense Hosted Network Operations BR 0 0
178.20.168.0 178.20.175.255 Its Hosted NL 272 0
178.255.24.0 178.255.31.255 Interforce Hosted Solutions BV NL 1,185 0
182.161.64.0 182.161.65.255 Hosted Network Pty. Ltd. AU 0 0
185.63.48.0 185.63.51.255 Oceanet-Telecom – Hosted Services FR 48 0
185.94.204.0 185.94.207.255 Smart Hosted Solutions Ltd GB 0 0
185.167.36.0 185.167.39.255 GTI-Hosted-Service GB 1 0
185.178.224.0 185.178.227.255 VELCOM-HOSTED-1 SI 79 0
185.182.228.0 185.182.231.255 Hosted on RapidSwitch GB 4 0
185.189.76.0 185.189.79.255 Customers direct and Wholesale VM Hosted IT 0 0
185.245.96.0 185.245.99.255 IP hosted by Host-Unlimited.de DE 9 0
193.17.226.0 193.17.226.255 TeleWare Hosted Services Ltd. GB 6 0
193.30.142.0 193.30.142.255 Hosted By Infracom AB SE 0 0
193.164.252.0 193.164.253.255 TeleWare Hosted Services Ltd. GB 1 0
193.203.225.0 193.203.226.255 DLA Hosted ICT Diensten B.V. NL 458 0
194.8.29.0 194.8.29.255 Hosted by Infracom AB SE 23 0
197.149.180.0 197.149.183.255 Assignments to clients hosted in cloud environment ZA 25 0
202.174.4.0 202.174.4.255 Yahoo Taiwan Corporate Network hosted at Yahoo Taiwan Colo TW 0 0
203.12.234.0 203.12.234.255 Bluecentral Hosted Solutions AU 353 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2001:df2:9c00:: 2001:df2:9c00:ffff:ffff:ffff:ffff:ffff CBL Group Hosted Services AU 0 0
2001:df3:b200:: 2001:df3:b200:ffff:ffff:ffff:ffff:ffff THE VALUE HOSTED (PVT.) LIMITED PK 0 0
2403:7d00:: 2403:7d00:ffff:ffff:ffff:ffff:ffff:ffff Hosted Continuity Pty Ltd AU 0 0
2404:bd80:: 2404:bd80:ffff:ffff:ffff:ffff:ffff:ffff MY HOSTED INTERNET LTD MM 3 0
2407:d00:: 2407:d00:ffff:ffff:ffff:ffff:ffff:ffff Managed Hosted Applications Limited NZ 0 0
2407:d080:: 2407:d080:ffff:ffff:ffff:ffff:ffff:ffff Hosted Network Pty. Ltd. AU 0 0
2607:5c80:: 2607:5c80:ffff:ffff:ffff:ffff:ffff:ffff Hosted Backbone US 0 0
2804:440:: 2804:440:ffff:ffff:ffff:ffff:ffff:ffff Websense Hosted Network Operations BR 0 0
2a00:1d38:: 2a00:1d38:ffff:ffff:ffff:ffff:ffff:ffff Its Hosted NL 1 0
2a04:e9c0:: 2a04:e9c7:ffff:ffff:ffff:ffff:ffff:ffff Smart Hosted Solutions Ltd GB 0 0
2a07:54c0:: 2a07:54c7:ffff:ffff:ffff:ffff:ffff:ffff MY HOSTED INTERNET LTD IM 0 0
2001:16c0:fefe:: 2001:16c0:fefe:ffff:ffff:ffff:ffff:ffff IPv6 assignment for hosted server in worldstream, customer Arash Naderpour IR 0 0
2a00:1d38:fa:: 2a00:1d38:fa:ffff:ffff:ffff:ffff:ffff Its Hosted NL 1 0
2a00:1d38:ef01:: 2a00:1d38:ef01:ffff:ffff:ffff:ffff:ffff Its Hosted NL 0 0
2a02:ce8:3:: 2a02:ce8:3:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a02:ce8:5:: 2a02:ce8:5:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a02:ce8:14:: 2a02:ce8:14:ffff:ffff:ffff:ffff:ffff MessageLabs | Symantec Hosted Services GB 0 0
2a04:5340:1:: 2a04:5340:1:ffff:ffff:ffff:ffff:ffff SIM-Networks Hosted in Germany DE 1 0
2a04:5340:2:: 2a04:5340:2:ffff:ffff:ffff:ffff:ffff SIM-Networks Hosted in Germany DE 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12227 Dispatch Printing Company US 4 0 70 0
29755 Southwest Dispatch Center US 1 0 1 0
394772 The Columbus Dispatch US 1 0 2 0
10112 THE VALUE HOSTED (PVT.) LIMITED PK 2 0 226 14
14713 Hosted Backbone US 10 2 14 0
34745 TeleWare Hosted Services Ltd. GB 2 0 7 0
34768 Smart Hosted Solutions Ltd GB 1 1 0 0
50655 Its Hosted NL 3 3 272 0
58936 Managed Hosted Applications Limited NZ 3 0 26 0
132225 Hosted Continuity Pty Ltd AU 1 0 4 0
133120 Hosted Network Pty. Ltd. AU 4 0 308 0
135583 ip2me Hosted Services AU 1 0 2 0
203033 MY HOSTED INTERNET LTD IM 0 1 0 0
DNS server (NS records) ns3.computercrews.com (68.71.81.26)
ns1.computercrews.com (104.153.156.116)
ns2.computercrews.com (70.89.173.99)
Mail server (MX records) mx2-us1.ppe-hosted.com (148.163.129.51)
mx1-us1.ppe-hosted.com (67.231.154.162)
IP address (IPv4) 74.63.246.116
IP address (IPv6)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 74.63.192.0/18
74.63.192.0 – 74.63.255.255
Domain Name: COMPUTERCREWS.COM
Registrar URL: http://www.godaddy.com
Registrant Name: Thomas Crews
Registrant Organization: Computer Crews
Name Server: NS1.COMPUTERCREWS.COM
Name Server: NS2.COMPUTERCREWS.COM
Name Server: NS3.COMPUTERCREWS.COM
DNSSEC: unsigned

 

 




Fort Huachuca Arizona Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Fort Huachuca Arizona Cyber Attacks against Stew Webb Whistleblower

United States visited http://www.stewwebb.com/
2/8/2018 4:07:24 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States Fort Huachuca, United States visited http://www.stewwebb.com/
2/8/2018 4:07:21 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
2/8/2018 4:07:18 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
2/8/2018 4:07:16 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States Fort Huachuca, United States visited http://www.stewwebb.com/
2/8/2018 4:07:12 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States Fort Huachuca, United States visited http://www.stewwebb.com/
2/8/2018 4:07:09 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
2/8/2018 4:07:06 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
2/8/2018 4:07:03 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
NetRange: 63.236.0.0 – 63.239.255.255
[262144 addresses in this network]
CIDR: 63.236.0.0/14 (63.236.0.0 – 63.239.255.255)
[262144 addresses in this network]
NetName: QWEST-INET-9
NetHandle: NET-63-236-0-0-1
Parent: NET63 (NET-63-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 1999-11-19
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment: NOTE: For abuse issues, please email abuse@qwest.net.
Ref: https://whois.arin.net/rest/net/NET-63-236-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Are you looking for IPv4 address 63.237.15.162?
IP address 63.237.15.162
Location Fort Huachuca, Arizona, United States (US) flag
Registry arin
IP address 63.237.15.162
Reverse DNS (PTR record) 63-237-15-162.dia.static.qwest.net
DNS server (NS record) authns1.qwest.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
@@@@@@@@@@???????????
Number of SPAM hosts on 63.224.0.0/12 7
Domains around 63.237.15.162
IP address #domains
63.237.15.218 1
IP address 63.237.15.218
Reverse DNS (PTR record) 63-237-15-218.dia.static.qwest.net
DNS server (NS record) authns2.qwest.net (208.44.130.120)
authns1.qwest.net (63.150.72.4)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
@@@@@@@@@@@@@
?????????????
Mail server Tools
wemeantrucks.net
This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns22.domaincontrol.com. The current IPv4 address is 63.237.15.218. The mail server with the highest priority is wemeantrucks.net.
DNS server (NS records) ns22.domaincontrol.com (208.109.255.11)
ns21.domaincontrol.com (216.69.185.11)
Mail server (MX records) wemeantrucks.net (63.237.15.218)
IP address (IPv4) 63.237.15.218
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
Domain Name: WEMEANTRUCKS.NET
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Bright Farms
Name Server: NS21.DOMAINCONTROL.COM
Name Server: NS22.DOMAINCONTROL.COM
DNSSEC: unsigned

qwest.net

NetRange: 63.237.15.160 – 63.237.15.175
CIDR: 63.237.15.160/28
NetName: Q0819-63-237-15-160
NetHandle: NET-63-237-15-160-1
Parent: QWEST-INET-9 (NET-63-236-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: SIX CONTINENTS HOTELS INC (SCH-158)
RegDate: 2014-08-19
Updated: 2014-08-19
Ref: https://whois.arin.net/rest/net/NET-63-237-15-160-1

OrgName: SIX CONTINENTS HOTELS INC
OrgId: SCH-158
Address: 1175 SMITH AVE
City: FORT HUACHUCA
StateProv: AZ
PostalCode: 85613
Country: US
RegDate: 2014-05-28
Updated: 2014-05-28
Ref: https://whois.arin.net/rest/org/SCH-158

OrgAbuseHandle: HARRI383-ARIN
OrgAbuseName: Harrison, Brian
OrgAbusePhone: removed phone number
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/HARRI383-ARIN

OrgTechHandle: HARRI383-ARIN
OrgTechName: Harrison, Brian
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/HARRI383-ARIN
770-604-5000
etRange: 63.236.0.0 – 63.239.255.255
CIDR: 63.236.0.0/14
NetName: QWEST-INET-9
NetHandle: NET-63-236-0-0-1
Parent: NET63 (NET-63-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 1999-11-19
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment: NOTE: For abuse issues, please email removed email address.
Ref: https://whois.arin.net/rest/net/NET-63-236-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email removed email address
Comment:

############
?????????????????
ihg.com

qwest.com

centurylinkservices.net

Are you looking for domain qwest.net?

63-237-15-162.dia.static.qwest.net
qwest.adult -1
qwest.at 213.33.99.173
qwest.be 178.32.40.97
qwest.biz 72.52.4.119
qwest.ca 155.70.44.175
qwest.cn 23.27.192.117
qwest.co
qwest.co.in 155.70.44.175
qwest.co.jp 219.94.180.181
qwest.co.uk 77.104.129.127 1
qwest.co.za 41.78.28.120
qwest.com 155.70.44.175 7
qwest.com.au 203.88.117.81
qwest.com.cn 23.27.192.117
qwest.cz 217.198.118.96 1
qwest.de 176.9.83.229
qwest.es 94.23.39.143
qwest.eu 217.198.116.188
qwest.fr
qwest.hu 193.226.221.130
qwest.in 155.70.44.175
qwest.info 72.52.4.119
qwest.io 216.239.32.21
qwest.it 185.53.179.8
qwest.jobs 155.70.44.175 -1
qwest.me 69.7.187.140
qwest.mobi 155.70.44.175 5
qwest.net 204.147.80.94 4
qwest.nl 109.106.167.8
qwest.no 213.162.241.97
qwest.online 194.58.112.173
qwest.org 204.147.80.81 -1
qwest.pl
qwest.porn
qwest.pro 194.58.112.173
qwest.properties 184.168.221.37
qwest.realty 69.172.201.153
qwest.ro 155.70.44.175 -1
qwest.ru 185.53.179.40
qwest.se 195.74.38.123
qwest.sex
qwest.shop 88.214.207.96
qwest.su 185.53.178.9
qwest.tv 164.132.235.17
qwest.us 155.70.44.175 7
qwest.xxx 199.253.28.9
qwest.xyz 69.172.201.153
qwest-affinity.com 216.74.33.70 -1
qwest-brentford.com 79.125.4.228
qwest-business.com
IPv4 routes
Startip Endip Description Country #domains #spamhosts
110.74.162.0 110.74.162.255 AIMS-MY-DIA advertised prefix – 110.74.162.0/24 MY 0 0
210.17.162.0 210.17.163.255 210.17.162.0/23 HK 0 0
77.81.162.0 77.81.163.255 Noop-77-81-162-0-23 EU 0 0
85.111.27.0 85.111.27.255 izzet Pasa Mah Abide-i Hurriyet Cad No 162 Caglayan Sisli 34387 ISTANBUL TR 20 0
85.204.162.0 85.204.163.255 Noop-85-204-162-0-23 EU 0 0
89.108.162.0 89.108.162.255 89.108.162.0/24 LB 0 0
92.114.44.0 92.114.47.255 SuperLink ADSL Service 162 PS 0 0
185.45.162.0 185.45.162.255 VCHS-185-45-162-0 GB 1 0
185.45.163.0 185.45.163.255 VCHS-185-45-162-0 GB 7 0
196.44.227.0 196.44.227.255 BCSnet 162 Anderson Street Dialup POP ZA 0 0
202.1.162.0 202.1.162.255 ADSL Subscribers in 202.1.162.0/24 SB 0 0
213.214.162.0 213.214.162.255 fuj-fin-k5-162 FI 0 0
217.168.162.0 217.168.162.255 Bellnet Ltd. 217.168.162 MT 2 0
220.247.162.0 220.247.162.255 220.247.162.0/24 BTS BD 5 0
91.237.66.0 91.237.67.255 NAMEISP-DATACENTER-WEST 91.237.66.0/24 SE 17,619 0
103.207.116.0 103.207.119.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 385 0
121.46.80.0 121.46.83.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
185.237.32.0 185.237.35.255 RB PA 185.237.32.0/24 DE 1 0
212.237.224.0 212.237.227.255 Noop-212-237-224-0-23 GB 0 0
5.105.236.0 5.105.239.255 TRINITY-CLNTS-BLOCK-237 UA 0 0
85.233.207.0 85.233.207.255 87.237.184.0/21 FR 0 0
91.237.66.0 91.237.66.255 NAMEISP-DATACENTER-WEST 91.237.66.0/24 SE 17,619 0
91.237.67.0 91.237.67.255 NAMEISP-DATACENTER-WEST 91.237.66.0/24 SE 0 0
103.207.116.0 103.207.116.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
103.207.119.0 103.207.119.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 51 0
121.46.80.0 121.46.80.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
121.46.81.0 121.46.81.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
121.46.82.0 121.46.82.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
121.46.83.0 121.46.83.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
185.237.32.0 185.237.32.255 RB PA 185.237.32.0/24 DE 0 0
212.101.237.0 212.101.237.255 212.101.237.0/23 LB 0 1
212.101.238.0 212.101.238.255 212.101.237.0/23 LB 0 0
212.237.224.0 212.237.224.255 Noop-212-237-224-0-23 GB 0 0
212.237.225.0 212.237.225.255 Noop-212-237-224-0-23 GB 0 0
212.237.226.0 212.237.226.255 Noop-212-237-226-0-23 GB 0 0
212.237.227.0 212.237.227.255 Noop-212-237-226-0-23 GB 0 0
115.249.0.0 115.249.255.255 RCOM-Static-DIA IN 455 57
115.249.0.0 115.249.3.255 RCOM-Static-DIA IN 4 0
115.249.4.0 115.249.7.255 RCOM-Static-DIA IN 0 2
115.249.8.0 115.249.11.255 RCOM-Static-DIA IN 0 2
115.249.12.0 115.249.15.255 RCOM-Static-DIA IN 1 1
115.249.16.0 115.249.19.255 RCOM-Static-DIA IN 7 4
115.249.20.0 115.249.23.255 RCOM-Static-DIA IN 14 0
115.249.24.0 115.249.27.255 RCOM-Static-DIA IN 2 0
115.249.28.0 115.249.31.255 RCOM-Static-DIA IN 5 0
115.249.32.0 115.249.35.255 RCOM-Static-DIA IN 2 1
115.249.36.0 115.249.39.255 RCOM-Static-DIA IN 9 2
115.249.40.0 115.249.43.255 RCOM-Static-DIA IN 3 1
115.249.44.0 115.249.47.255 RCOM-Static-DIA IN 3 0
115.249.48.0 115.249.51.255 RCOM-Static-DIA IN 2 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a05:ccc0:: 2a05:ccc7:ffff:ffff:ffff:ffff:ffff:ffff Dia Elektronik Bilgisayar Mekanik ve Tibbi Cihazlar san tic ltd sti TR 0 0
2a07:39c0:: 2a07:39c7:ffff:ffff:ffff:ffff:ffff:ffff End user static IP address DK 0 0
2a0a:f880:: 2a0a:f887:ffff:ffff:ffff:ffff:ffff:ffff End user static IP address DK 0 0
2a02:2d00:30:: 2a02:2d00:30:ffff:ffff:ffff:ffff:ffff Weepee static ipv6 BE 0 0
2a02:8400:a:: 2a02:8400:a:ffff:ffff:ffff:ffff:ffff Static IP FR 0 0
2a02:8400:709:: 2a02:8400:709:ffff:ffff:ffff:ffff:ffff Static IP FR 0 0
2a02:8410:1:: 2a02:8410:1:ffff:ffff:ffff:ffff:ffff Static IP FR 0 0
2001:428:: 2001:428:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 151 0
2405:3e00:: 2405:3e00:ffff:ffff:ffff:ffff:ffff:ffff Qwest International HK 0 0
2602:: 2602:ff:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 80 0
2606:5000:: 2606:5000:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2a02:29c8:: 2a02:29c8:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications International Limited GB 0 0
2001:428:902:: 2001:428:902:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 1 0
2001:428:b20:: 2001:428:b20:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:b21:: 2001:428:b21:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 120 0
2001:428:c0c:: 2001:428:c0c:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:1003:: 2001:428:1003:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:2003:: 2001:428:2003:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:2004:: 2001:428:2004:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:2501:: 2001:428:2501:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:3807:: 2001:428:3807:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:380f:: 2001:428:380f:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4003:: 2001:428:4003:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4004:: 2001:428:4004:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4401:6:: 2001:428:4401:6:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4403:: 2001:428:4403:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4407:: 2001:428:4407:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4803:: 2001:428:4803:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:5803:: 2001:428:5803:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:9e03:: 2001:428:9e03:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:e000:: 2001:428:efff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:f000:: 2001:428:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2606:5000:2800:: 2606:5000:29ff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2606:5000:3e00:: 2606:5000:3fff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 12 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
395743 Static 1 LLC US 2 0 0 0
209 Qwest Communications Company, LLC US 1,940 17 65,816 443
3908 Qwest Communications Company, LLC US 11 2 2 0
3909 Qwest Communications Company, LLC US 30 0 2 0
3910 Qwest Communications Company, LLC US 19 4 13 0
4015 Qwest Corporation US 4 1 109 0
4911 Qwest Communications Company, LLC US 7 0 7 0
6223 Qwest Communications Company, LLC US 3 1 0 0
6640 Qwest Communications Company, LLC US 29 0 2,588 0
7359 Qwest Corporation US 4 1 92 0
12714 Net By Net Holding LLC RU 193 2 4,005 74
20911 Net-Surf.net Ltd. BG 28 0 69 12
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 166 0
1618 Daytona Net Works, Inc. US 2 0 252 1
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 20 2
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 49 2 4,021 16
3254 Lucky Net Ltd UA 4 0 2,373 0
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 2
3595 Global Net Access, LLC US 37 3 91,367 13
3931 Logical Net Corporation US 6 0 744 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,844 22
4776 A-Net Co., Ltd. TH 35 1 147 2
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 385 13 33,876 741
5405 CSO.net Internet Services GmbH AT 1 1 3,955 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 676 7
6364 Atlantic.net, Inc. US 47 5 18,807 1
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,938 0 11,120 12
6624 Gower.Net US 2 0 27 0
6735 sdt.net AG DE 6 0 301 1
6831 Net & Com s.r.l. IT 2 1 649 0
6911 Pro-Net Internet Services Limited GB 4 0 165 0
7106 Com Net, Inc. US 9 1 964 0
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 3 0 0
7350 MetComm.Net, LLC US 1 0 38 0
7403 Colba Net Inc. CA 9 0 289 0
7600 Escape.net AU 54 4 518 0
7641 China Broadcasting TV Net CN 9 0 51 0

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Melbourne Australia Synergy Wholesale cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Melbourne Australia SYNERGY WHOLESALE cyber attacks against Stew Webb Whistle blower

Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (13 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)

@@@@@@@@@@@@@@@@@@@@@@@@
Scan wordfence Feb 8, 2018

File appears to be malicious: wp-content/deleteme.da2e7232dcfb448fb7e852be8d960503.php
Type: File
Issue Found 2018/02/08 6:23 pm
Critical
Ignore
Details

Filename: wp-content/deleteme.da2e7232dcfb448fb7e852be8d960503.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval(base64_decode(“. The infection type is: Suspicious eval with a base64_decode.

Success deleting file
The file wp-content/deleteme.da2e7232dcfb448fb7e852be8d960503.php was successfully deleted.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Eden Prairie, United States visited http://www.stewwebb.com/ deleteme.wppqbb.php
2/11/2018 10:12:42 PM (7 minutes ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
@@@@@@@@@@@@@@@@@@@@
https://wordpress.org/search/deleteme.wppqbb.php
Topic Tag: deleteme « WordPress.org Forums
DeleteMe malicious file should I remove it? Started by: heroz. 2; 1; 1 year, 5 months ago · Steve Stern · WordPress file added deleteme.wp#######.php. Started by: wrowlands. 2; 1; 2 years, 9 months ago · dwinden · Log in from user ” deleteme”. Started by: veggiesdontbite. 2; 2; 2 years, 10 months ago · veggiesdontbite.
https://wordpress.org/support/topic-tag/deleteme/

Topic
Voices
Replies
Last Post

DeleteMe malicious file should I remove it?

Started by: heroz
2
1
1 year, 5 months ago

Steve Stern

WordPress file added deleteme.wp#######.php

Started by: wrowlands
2
1
2 years, 9 months ago

dwinden

Log in from user “deleteme”

Started by: veggiesdontbite
2
2
2 years, 11 months ago

veggiesdontbite

http://www.example.com/wp-content/deleteme

Started by: connectit
2
1
2 years, 11 months ago

Michael

What is this deleteme file and should I delete it?

Started by: skubeedoo
4
6
2 years, 8 months ago

marialulis

connectit

(@connectit)

2 years, 11 months ago

I was editing my footer in wordpress and edited the footer.php and functions.php and after updating the page I could no longer get access to my login and every time I go to log in it comes up with this: “http://www.example.com/wp-content/deleteme” with a long list of numbers and letters at the end.

I know exactly what I added to the functions.php and know I just need to delete that, however I can’t get into my wordpress to do so. All I get is a white blank screen.

How do I go about accessing this .php? Is there anyway it can edited in files -> file manager?
@@@@@@@@@@
Michael

(@alchymyth)

2 years, 11 months ago

review http://codex.wordpress.org/FTP_Clients
you will need to use FTP to access the files, or for example to rename the folder of your currently used theme, which should activate the default theme and allow you back into the dashboard to edit your files.

you will then need to change the folder name to its original, and re-activate your theme.

@@@@@@@@@@@@@@@@@

DeleteMe malicious file should I remove it?

heroz

(@heroz)

1 year, 5 months ago

I got this error message when I ran wordfence:
This file may contain malicious executable code: …/wp-content/deleteme.########################.php

What is this file and what action should I take?

>>>Image<<
Steve Stern

(@sterndata)

Guardian of the Interwebs

1 year, 5 months ago

Delete it, but understand that deleting it does not mean your system is clean. It got there somehow.

You need to start working your way through these resources:

https://codex.wordpress.org/FAQ_My_site_was_hacked
https://wordpress.org/support/topic/268083#post-1065779
http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/
http://ottopress.com/2009/hacked-wordpress-backdoors/

Additional Resources:

http://sitecheck.sucuri.net/scanner/
http://www.unmaskparasites.com/
https://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html

@@@@@@@@@@@@@@@@@@@@@@@@@@@
Steve Stern

(@sterndata)

Guardian of the Interwebs

1 year, 5 months ago

Delete it, but understand that deleting it does not mean your system is clean. It got there somehow.

You need to start working your way through these resources:

https://codex.wordpress.org/FAQ_My_site_was_hacked
https://wordpress.org/support/topic/268083#post-1065779
http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/
http://ottopress.com/2009/hacked-wordpress-backdoors/

Additional Resources:

http://sitecheck.sucuri.net/scanner/
http://www.unmaskparasites.com/
https://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html

dwinden

(@dwinden)

2 years, 9 months ago

A google search on deleteme.xxxx.php returned quite some info.
The files are created by a piece of software named Installatron that looks to be a tool offered by hosting providers who have ‘one click’ installations of software, like wordpress, joomla , etc
Anyway this is not an iTSec plugin issue.

dwinden
skubeedoo

(@skubeedoo)

3 years, 5 months ago

I got this error message when I ran wordfence:
This file may contain malicious executable code: …/wp-content/deleteme.########################.php

What is this file and what action should I take?

Wordfence Security – Firewall & Malware Scan

WFSupport

(@wfsupport)

3 years, 5 months ago

Hi

Great question! Thanks for asking. I found several references online to those files being created by Installatron that looks to be a tool offered by hosting providers who have ‘one click’ installations of software, like wordpress, joomla , etc. Does your hosting provider use that software? Check your control panel and let us know. You could send me a zipped copy of that file to tim [at] wordfence.com and I could take a look and see whats in it and offer an opinion.

Thanks!

tim

I hope WFSupport is still around so you can help me out. Or anyone.

My site is: http://www.ellaletraduce.co

I have made a number of mistakes (newbie with all of this) and I ended up uninstalling and deleting wordpress and installing it again.

I have a godaddy account and yes, through cPanel I am able to do the one-click installation with Installatron.

After installing it, I should be able to enter my WordPress dashboard, but when I go to wp-admin it redirects to http://www.ellaletraduce.co/wp-content/deleteme. and a bunch of numbers.

Also, when I try to go to wp-login.php it never loads and Firefox then shows me the message that “the connection has timed out”.

I would really appreciate it if you could help me out in any way.

@@@@@@@@@@@@@@@@@@@@@@@@@
Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (13 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
% Information related to ‘103.252.152.0 – 103.252.155.255’
[1024 addresses in this network]
% Abuse contact for ‘103.252.152.0 – 103.252.155.255’ is ‘noc@synergywholesale.com’
[1024 addresses in this network]
inetnum: 103.252.152.0 – 103.252.155.255
[1024 addresses in this network]
netname: SYNERGYWHOLESALE-AP
descr: SYNERGY WHOLESALE PTY LTD
descr: Suite 105
descr: 66 Victor Crescent
descr: Narre Warren VIC 3805
country: AU
org: ORG-SWPL1-AP
admin-c: SWN3-AP
tech-c: SWN3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-SYNERGYWHOLESALE
mnt-routes: MAINT-AU-SYNERGYWHOLESALE
mnt-irt: IRT-SYNERGYWHOLESALE-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:03:48Z
source: APNIC

irt: IRT-SYNERGYWHOLESALE-AU
address: PO Box 119
address: Beaconsfield VIC 3807
address: Australia
e-mail: noc@synergywholesale.com
abuse-mailbox: noc@synergywholesale.com
admin-c: SWN3-AP
tech-c: SWN3-AP
auth: # Filtered
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2013-10-17T01:49:54Z
source: APNIC

organisation: ORG-SWPL1-AP
org-name: SYNERGY WHOLESALE PTY LTD
country: AU
address: Suite 105
address: 66 Victor Crescent
phone: +61 3 9013 8464
fax-no: +61 3 8080 6481
e-mail: noc@synergywholesale.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:24Z
source: APNIC

person: Synergy Wholesale NOC
address: PO BOX 119
Beaconsfield VIC 3807
country: AU
phone: +61.390138464
fax-no: +61.380806481
e-mail: noc@synergywholesale.com
nic-hdl: SWN3-AP
notify: noc@synergywholesale.com
abuse-mailbox: abuse@synergywholesale.com
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2016-08-05T03:30:38Z
synergywholesale.com

Type: Bot
@@@@@@@@@@@@@@@@@@
Australia Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (16 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
Type: Bot
@@@@@@@@@@@@@@
Hacker Post
and info above delete me code
left off
installatron
Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (13 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
% Information related to ‘103.252.152.0 – 103.252.155.255’
[1024 addresses in this network]
% Abuse contact for ‘103.252.152.0 – 103.252.155.255’ is ‘noc@synergywholesale.com’
[1024 addresses in this network]
inetnum: 103.252.152.0 – 103.252.155.255
[1024 addresses in this network]
netname: SYNERGYWHOLESALE-AP
descr: SYNERGY WHOLESALE PTY LTD
descr: Suite 105
descr: 66 Victor Crescent
descr: Narre Warren VIC 3805
country: AU
org: ORG-SWPL1-AP
admin-c: SWN3-AP
tech-c: SWN3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-SYNERGYWHOLESALE
mnt-routes: MAINT-AU-SYNERGYWHOLESALE
mnt-irt: IRT-SYNERGYWHOLESALE-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:03:48Z
source: APNIC

irt: IRT-SYNERGYWHOLESALE-AU
address: PO Box 119
address: Beaconsfield VIC 3807
address: Australia
e-mail: noc@synergywholesale.com
abuse-mailbox: noc@synergywholesale.com
admin-c: SWN3-AP
tech-c: SWN3-AP
auth: # Filtered
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2013-10-17T01:49:54Z
source: APNIC

organisation: ORG-SWPL1-AP
org-name: SYNERGY WHOLESALE PTY LTD
country: AU
address: Suite 105
address: 66 Victor Crescent
phone: +61 3 9013 8464
fax-no: +61 3 8080 6481
e-mail: noc@synergywholesale.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:24Z
source: APNIC

person: Synergy Wholesale NOC
address: PO BOX 119
Beaconsfield VIC 3807
country: AU
phone: +61.390138464
fax-no: +61.380806481
e-mail: noc@synergywholesale.com
nic-hdl: SWN3-AP
notify: noc@synergywholesale.com
abuse-mailbox: abuse@synergywholesale.com
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2016-08-05T03:30:38Z
synergywholesale.com

Type: Bot
@@@@@@@@@@@@@@@@@@
Australia Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (16 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
Type: Bot
@@@@@@@@@@@
Stew Webb Site
United States Eden Prairie, United States visited http://www.stewwebb.com/
2/13/2018 8:05:00 AM (16 minutes ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: undefined
Installatron Plugin/9.1.36
Type: Bot

United States Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wpixhf.php
2/13/2018 5:25:53 AM (2 hours 55 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
Type: 404 Not Found

United States Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wp7hse.php
2/13/2018 5:25:49 AM (2 hours 55 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
Type: Bot

@@@@@@@@@@@@@@@@@@
Dallas, United States visited http://www.stewwebb.com/
2/13/2018 5:25:27 AM (3 hours 22 mins ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit

Dallas, United States visited http://www.stewwebb.com/
2/13/2018 5:25:17 AM (3 hours 21 mins ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)

Sorry, but no data for that IP or domain was found.

P address 69.162.68.206
Reverse DNS (PTR record) dal01.installatron.com
DNS server (NS record) ns2.limestonenetworks.com (64.31.5.4)
ns1.limestonenetworks.com (64.31.5.3)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 69.162.64.0/18
69.162.64.0 – 69.162.127.255
Domains around 69.162.68.106
IP address #domains
69.162.68.3 1
69.162.68.18 1
69.162.68.50 5
69.162.68.58 1
69.162.68.62 1
69.162.68.98 1
69.162.68.106 245
Mail server Tools
mail.apelturismo.com.ar
mail.villa-pehuenia.com.ar
mail.plagaexpress.com
mail.dariolacheventos.com.ar
mail.matgauch.com
mail.begus.com.ar
mail.mgplot.com.ar
mail.estudioferullo.com
mail.anicellasgrutas.com.ar
mail.complejocaleu.com.ar
Name servers on 69.162.68.106

Overview of name servers hosted on this IP address. You can use the NS Neighbors tool to find domains using a name server.
Name server Tools
ns1.grupophi.com
tera1.teraserver.com.ar
ns1.eurowebdigital.com
ns2.eurowebdigital.com
ns1.nrgdns.net
dns1.tehagolaweb.com

69.162.68.107 1
69.162.68.118 20
69.162.68.156 1
69.162.68.162 4
69.162.68.166 1
69.162.68.178 1
69.162.68.198 20
69.162.68.210 2
69.162.68.215 1
69.162.68.219 1
69.162.68.226 2
69.162.68.227 1
69.162.68.228 1
69.162.68.229 1
69.162.68.230 2
69.162.68.234 1
69.162.68.236 1
69.162.68.250 1
NetRange: 69.162.64.0 – 69.162.127.255
CIDR: 69.162.64.0/18
Domains on 69.162.68.106
Domain Tools
titinas.com.ar
fmcarilo.com.ar
internetviedma.com.ar
emprenditel.com
import-arte.com.ar
santuariosanramon.org.ar
hierroyacero.com.ar
apelturismo.com.ar
flyfishingriopico.com.ar
lasgrutasrionegro.com.ar

NetName: LSN-DLLSTX-2
NetHandle: NET-69-162-64-0-1
Parent: NET69 (NET-69-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS46475
Organization: Limestone Networks, Inc. (LIMES-2)
RegDate: 2008-06-27
Updated: 2012-02-24
OrgName: Limestone Networks, Inc.
OrgId: LIMES-2
Address: 400 S. Akard Street
Address: Suite 200
City: Dallas
StateProv: TX
PostalCode: 75202
Country: US
RegDate: 2007-12-04
Updated: 2017-01-28
NetRange: 69.162.64.0 – 69.162.127.255
CIDR: 69.162.64.0/18
214-242-3600
limestonenetworks.com
This domain is hosted by Limestone Networks, Inc. (AS46475). The first DNS server is ns3.limestonenetworks.com. The current IPv4 address is 64.31.5.5. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 ip4:74.63.205.192/26 ip4:74.63.208.128/28 ip4:64.31.0.192/29
include:_spf.google.com ~al

DNS server (NS records) ns3.limestonenetworks.com (67.220.71.9)
ns1.limestonenetworks.com (64.31.5.3)
ns2.limestonenetworks.com (64.31.5.4)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.130.26)
alt1.aspmx.l.google.com (64.233.163.27)
alt4.aspmx.l.google.com (64.233.160.27)
alt3.aspmx.l.google.com (74.125.204.26)
mx1.limestonenetworks.com (64.31.0.195)
mx2.limestonenetworks.com (74.63.205.207)
IP address (IPv4) 64.31.5.5
IP address (IPv6)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 64.31.0.0/18
64.31.0.0 – 64.31.63.255
Domain Name: LIMESTONENETWORKS.COM
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Limestone Networks, Inc.
Name Server: NS1.LIMESTONENETWORKS.COM
Name Server: NS2.LIMESTONENETWORKS.COM
DNSSEC: unsigned
@@@@@@@@@@@@
United States Eden Prairie, United States visited http://www.stewwebb.com/
2/13/2018 5:25:14 AM (3 hours 21 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: undefined
Installatron Plugin/9.1.36

Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wp7hse.php
2/13/2018 5:25:49 AM (3 hours 25 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net

Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wpixhf.php
2/13/2018 5:25:53 AM (3 hours 26 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net

Eden Prairie, United States visited http://www.stewwebb.com/
2/13/2018 8:05:00 AM (48 minutes ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: undefined
Installatron Plugin/9.1.36

@@@@@@@@@@@@@@@@@@@@@@@@@@
United States Dallas, United States visited http://www.stewwebb.com/
2/13/2018 8:05:04 AM (49 minutes ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5
Safari/536.30.1 Installatron (Mimicking WebKit)

Sorry, but no data for that IP or domain was found.

@@@@@@@@@@@@@@@@@@@@@@
Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (53 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
% Information related to ‘103.252.152.0 – 103.252.155.255’
[1024 addresses in this network]
% Abuse contact for ‘103.252.152.0 – 103.252.155.255’ is ‘noc@synergywholesale.com’
[1024 addresses in this network]
inetnum: 103.252.152.0 – 103.252.155.255
[1024 addresses in this network]
netname: SYNERGYWHOLESALE-AP
descr: SYNERGY WHOLESALE PTY LTD
descr: Suite 105
descr: 66 Victor Crescent
descr: Narre Warren VIC 3805
country: AU
org: ORG-SWPL1-AP
admin-c: SWN3-AP
tech-c: SWN3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-SYNERGYWHOLESALE
mnt-routes: MAINT-AU-SYNERGYWHOLESALE
mnt-irt: IRT-SYNERGYWHOLESALE-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:03:48Z
source: APNIC

irt: IRT-SYNERGYWHOLESALE-AU
address: PO Box 119
address: Beaconsfield VIC 3807
address: Australia
e-mail: noc@synergywholesale.com
abuse-mailbox: noc@synergywholesale.com
admin-c: SWN3-AP
tech-c: SWN3-AP
auth: # Filtered
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2013-10-17T01:49:54Z
source: APNIC

organisation: ORG-SWPL1-AP
org-name: SYNERGY WHOLESALE PTY LTD
country: AU
address: Suite 105
address: 66 Victor Crescent
phone: +61 3 9013 8464
fax-no: +61 3 8080 6481
e-mail: noc@synergywholesale.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:24Z
source: APNIC

person: Synergy Wholesale NOC
address: PO BOX 119
Beaconsfield VIC 3807
country: AU
phone: +61.390138464
fax-no: +61.380806481
e-mail: noc@synergywholesale.com
nic-hdl: SWN3-AP
notify: noc@synergywholesale.com
abuse-mailbox: abuse@synergywholesale.com
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2016-08-05T03:30:38Z
source: APNIC
synergywholesale.com
This domain is hosted by SYNERGY WHOLESALE PTY LTD (AS45638). The first DNS server is ns2.corp.ventraip.net.au. The current IPv4 address is 103.42.108.73. The mail server with the highest priority is mx1.hostedmail.net.au.
v=spf1 a mx
@@@@@@@@@@@@@@@@@
?????????????????????
include:spf.synergywholesale.com
Domain IPv4 address Ranking Alexa Pagerank
synergywholesale.cc
synergywholesale.cloud 112.140.180.152
synergywholesale.co.nz
synergywholesale.co.uk
synergywholesale.com 103.42.108.73 753,321 -1
synergywholesale.com.au 103.42.108.73
synergywholesale.domains 112.140.180.152 -1
synergywholesale.fail 112.140.180.152 -1
synergywholesale.hosting 112.140.180.152
synergywholesale.info
synergywholesale.lighting 50.63.202.54 -1
synergywholesale.me
synergywholesale.mobi
synergywholesale.net 103.42.108.73
synergywholesale.net.au 103.42.108.73
synergywholesale.org
synergywholesale.wtf 112.140.180.152 -1
synergywholesaleproperties.com 209.99.64.55
IPv4 routes

No IPv4 ranges found
IPv6 routes

No IPv6 ranges found
Providers

No providers found
@@@@@@@@@@@@@@@@@
????????????????
include:spf.ausregistry.net.au ~al

@@@@@@@@@@@@@@@@@@
DNS server (NS records) ns2.corp.ventraip.net.au (112.140.180.136)
ns3.corp.ventraip.net.au (50.116.13.233)
ns1.corp.ventraip.net.au (112.140.176.12)
Mail server (MX records) mx1.hostedmail.net.au (103.252.153.1)
mx2.hostedmail.net.au (103.252.153.2)
IP address (IPv4) 103.42.108.73
IP address (IPv6) 2400:b800:2:1::73
ASN number 45638
ASN name (ISP) SYNERGY WHOLESALE PTY LTD
IP-range/subnet 103.42.108.0/24
103.42.108.0 – 103.42.108.255
Domain Name: synergywholesale.com
Registry Domain ID: 1820536225_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.synergywholesale.com
Registry Registrant ID: Not Available From Registry
Registrant Name: Domain Hostmaster
Registrant Organization: Synergy Wholesale Pty Ltd
Registrant Street: PO Box 119
Registrant Street:
Registrant Street:
Registrant City: Beaconsfield
Registrant State/Province: VIC
Registrant Postal Code: 3807
Registrant Country: AU
61.383999483
61.86783945
@@@@@@@@@@@@@@@@@@@@@@@@@
File appears to be malicious: stewwebb_construction_co_2.html.docx
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: stewwebb_construction_co_2.html.docx
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\Xbn”. The infection type is: Javascript code indicative of malware.

Need help with a hacked website?

Our team of security experts will clean the infection and remove malicious content. Once your site is restored we will provide a detailed report of our findings. Includes a 1-year Wordfence Premium license.

File appears to be malicious: wp-content/plugins/wordfence/models/block/wfBlock.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/models/block/wfBlock.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: Appeal_20121212.htm.pdf
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: Appeal_20121212.htm.pdf
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\XvC”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/lib/wfGeoIP.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/lib/wfGeoIP.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\xff”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/lib/wordfenceURLHoover.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/lib/wordfenceURLHoover.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/utils.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/utils.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/wflogs/rules.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/wflogs/rules.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\xC2”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/js/date.1518460764.js
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/js/date.1518460764.js
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x27”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/lib/wfUtils.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/lib/wfUtils.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/js/admin.1518460764.js
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/js/admin.1518460764.js
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.
@@@@@@@@@@@@@@@@@@@@@@
Alert generated at Monday 12th of February 2018 at 10:32:39 PM

Critical Problems:

* File appears to be malicious: wp-content/plugins/wordfence/models/block/wfBlock.php

* File appears to be malicious: Appeal_20121212.htm.pdf

* File appears to be malicious: wp-content/plugins/wordfence/lib/wfGeoIP.php

* File appears to be malicious: wp-content/plugins/wordfence/lib/wordfenceURLHoover.php

* File appears to be malicious: wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/utils.php

* File appears to be malicious: wp-content/wflogs/rules.php

* File appears to be malicious: wp-content/plugins/wordfence/js/date.1518460764.js

* File appears to be malicious: wp-content/plugins/wordfence/lib/wfUtils.php

* File appears to be malicious: wp-content/plugins/wordfence/js/admin.1518460764.js

* File appears to be malicious: stewwebb_construction_co_2.html.docx

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Alibaba San Mateo CA Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

lists
Alibaba.com
Alibaba San Mateo CA Cyber Attacks against Stew Webb Whistle blower

San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (28 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (28 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
NetRange: 198.11.128.0 – 198.11.191.255
[16384 addresses in this network]
CIDR: 198.11.128.0/18 (198.11.128.0 – 198.11.255.255)
[32768 addresses in this network]
NetName: ALIBABA-US-CDN
NetHandle: NET-198-11-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS45102
Organization: Alibaba.com LLC (AL-3)
RegDate: 2013-04-23
Updated: 2017-04-26
Ref: https://whois.arin.net/rest/net/NET-198-11-128-0-1

OrgName: Alibaba.com LLC
OrgId: AL-3
Address: 400 S El Camino Real, Suite 400
City: San Mateo
StateProv: CA
PostalCode: 94402
Country: US
RegDate: 2010-10-29
Updated: 2017-06-16
Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:
Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:
Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:
Comment: 4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref: https://whois.arin.net/rest/org/AL-3

OrgTechHandle: ALIBA-ARIN
OrgTechName: Alibaba NOC
OrgTechPhone: +1-408-748-1200
OrgTechEmail: noc@list.alibaba-inc.com
OrgTechRef: https://whois.arin.net/rest/poc/ALIBA-ARIN

OrgNOCHandle: ALIBA-ARIN
OrgNOCName: Alibaba NOC
OrgNOCPhone: +1-408-748-1200
OrgNOCEmail: noc@list.alibaba-inc.com
OrgNOCRef: https://whois.arin.net/rest/poc/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName: Network Abuse
OrgAbusePhone: +1-408-785-5580
OrgAbuseEmail: intl-abuse@list.alibaba-inc.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NETWO4028-ARIN
198.11.183.69
P address 198.11.183.69
Location San Mateo, California, United States
IP address 198.11.183.69
Reverse DNS (PTR record) not available
DNS server (NS record) rdns1.alidns.com (140.205.71.250)
rdns2.alidns.com (140.205.253.62)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.128.0/18
198.11.128.0 – 198.11.191.255
198.11.183.69
Domains around 198.11.183.69
@@@@@@@@@@@@@@@@@@@@@@@@@@
left off

IP address #domains
198.11.183.9 3
198.11.183.11 3
198.11.183.14 1
198.11.183.15 1
198.11.183.17 1
198.11.183.24 1
198.11.183.25 2
198.11.183.26 5
198.11.183.28 10
198.11.183.30 5
198.11.183.33 4
198.11.183.35 4
198.11.183.36 1
198.11.183.46 1
198.11.183.50 13
198.11.183.55 2
198.11.183.60 2
198.11.183.61 1
198.11.183.63 2
198.11.183.66 1
198.11.183.67 1
198.11.183.70 2
198.11.183.71 2
198.11.183.72 2
198.11.183.75 1
198.11.183.79 11
198.11.183.86 1
198.11.183.88 1
198.11.183.95 162
198.11.183.105 1
198.11.183.109 1
198.11.183.110 2
198.11.183.114 1
198.11.183.116 2
198.11.183.122 1
198.11.183.124 63
198.11.183.129 4
198.11.183.133 1
198.11.183.138 1
198.11.183.144 3
198.11.183.147 1
198.11.183.150 1
198.11.183.154 1
198.11.183.155 1
198.11.183.161 2
198.11.183.167 4
198.11.183.168 10
198.11.183.169 1
198.11.183.171 2
198.11.183.177 1
198.11.183.179 1
198.11.183.180 1
198.11.183.183 2
198.11.183.185 38
198.11.183.187 1
198.11.183.189 7
198.11.183.190 2
198.11.183.193 2
198.11.183.194 1
198.11.183.195 1
198.11.183.197 1
198.11.183.207 2
198.11.183.209 10
198.11.183.211 1
198.11.183.214 1
198.11.183.216 2
198.11.183.221 3
198.11.183.225 2
198.11.183.226 196
198.11.183.228 1
198.11.183.230 3
198.11.183.231 1
198.11.183.232 6
198.11.183.234 2
198.11.183.238 4
198.11.183.239 2
198.11.183.240 2

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
completed below
@@@@@@@@@@@@@@@@@@@@@@@@@@
Whois information
NetRange: 198.11.128.0 – 198.11.191.255
CIDR: 198.11.128.0/18
NetName: ALIBABA-US-CDN
NetHandle: NET-198-11-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS45102
Organization: Alibaba.com LLC (AL-3)
RegDate: 2013-04-23
Updated: 2017-04-26
Ref: https://whois.arin.net/rest/net/NET-198-11-128-0-1

OrgName: Alibaba.com LLC
OrgId: AL-3
Address: 400 S El Camino Real, Suite 400
City: San Mateo
StateProv: CA
PostalCode: 94402
Country: US
RegDate: 2010-10-29
Updated: 2017-06-16
Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:
Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:
Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: removed email address and removed email address
Comment:

ipp.alibabagroup.com
Domain IPv4 address Ranking Alexa Pagerank
alibabagroup.asia -1
alibabagroup.bid
alibabagroup.cc
alibabagroup.click 47.89.58.141
alibabagroup.club
alibabagroup.co
alibabagroup.co.in 50.63.202.21
alibabagroup.co.uk 50.63.202.16
alibabagroup.com 198.11.132.52 12,450 -1
alibabagroup.com.au 50.63.202.40
alibabagroup.com.cn
alibabagroup.company 50.63.202.55
alibabagroup.de 81.169.145.93
alibabagroup.es
alibabagroup.eu 130.185.109.77
alibabagroup.gift 47.89.58.141
alibabagroup.in 103.232.215.150
alibabagroup.info
alibabagroup.ir
alibabagroup.kz 81.177.140.214 0
alibabagroup.loan 47.89.58.141
alibabagroup.ltd 170.178.178.37
alibabagroup.me
alibabagroup.mobi 116.251.214.80
alibabagroup.net 141.8.225.31 -1
alibabagroup.net.cn
alibabagroup.news 47.89.58.141
alibabagroup.nu 185.53.178.9
alibabagroup.online 118.193.11.34
alibabagroup.org 50.63.202.63
alibabagroup.party
alibabagroup.pw 141.8.226.58
alibabagroup.ren
alibabagroup.ru 185.12.92.179
alibabagroup.space
alibabagroup.top 23.234.27.209
alibabagroup.trade 47.89.58.141
alibabagroup.us 69.64.147.242
alibabagroup.video 47.89.58.141
alibabagroup.vn 103.1.236.124
alibabagroup.wang 205.204.101.42
alibabagroup.win
alibabagroup.xn--io0a7i 47.89.58.32
alibabagroup.xn--ses554g
alibabagroup.xxx 125.212.224.227
alibabagroup-inc.com 50.63.202.27
alibabagroupbd.com
alibabagroupholding.com 184.168.221.46
alibabagroupholdinglimited.com 50.62.160.249
alibabagroupholdingltd.com 50.63.202.47
Are you looking for IPv4 address 198.11.188.72?
Are you looking for domain alibabagroup.com?
alibabagroup.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp2.alibabaonline.com. The current IPv4 address is 198.11.132.52. The mail server with the highest priority is mxn.mxhichina.com.
v=spf1 include:spf.mxhichina.com -all
DNS server (NS records) nsp2.alibabaonline.com (198.11.138.242)
ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
nsp.alibabaonline.com (200.196.225.111)
Mail server (MX records) mxn.mxhichina.com (205.204.101.145)
mxw.mxhichina.com (198.11.189.243)
IP address (IPv4) 198.11.132.52
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Registrant Street: 19/F Building A Xihu International Technology Bldg, 391 Wen Er Road
Registrant City: Hangzhou
Registrant State/Province: Zhejiang
Registrant Postal Code: 310099
Registrant Country: CN
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Timothy Alexander Steinert
Alibaba.com
Alibaba.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp.alibabaonline.com. The current IPv4 address is 198.11.132.23. The mail server with the highest priority is mx01.mail.alibaba.com.
v=spf1 include:spf1.alibaba.mail.aliyun.com -all
DNS server (NS records) nsp.alibabaonline.com (200.196.225.111)
ns8.alibabaonline.com (198.11.138.244)
nsp2.alibabaonline.com (198.11.138.242)
nshz.alibabaonline.com (198.11.138.243)
Mail server (MX records) mx01.mail.alibaba.com (42.120.219.27)
mx02.mail.alibaba.com (42.120.219.135)
IP address (IPv4) 198.11.132.23
205.204.101.42
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Admin Street: No. 699 Wangshang Road , Binjiang District
Admin City: Hangzhou
Admin State/Province: Zhejiang
Admin Postal Code: 310052
Admin Country: CN
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: Timothy Alexander Steinert
852.22155100
Aliexpress.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp2.alibabaonline.com. The current IPv4 address is 198.11.132.250. The mail server with the highest priority is mx2.mail.aliyun.com.
v=spf1 include:spf1.service.alibaba.com include:spf2.service.alibaba.com include:spf2.ocm.aliyun.com -al
DNS server (NS records) nsp2.alibabaonline.com (198.11.138.242)
nsp.alibabaonline.com (200.196.225.111)
ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
Mail server (MX records) mx2.mail.aliyun.com (140.205.94.14)
IP address (IPv4) 198.11.132.250
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Domain Name: aliexpress.com
Registry Domain ID: 413519034_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2016-03-16T02:23:44-0700
Creation Date: 2006-04-16T11:16:46-0700
Registrar Registration Expiration Date: 2018-04-16T00:00:00-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: clientUpdateProhibited (https://www.icann.org/epp#clientUpdateProhibited)
Domain Status: clientTransferProhibited (https://www.icann.org/epp#clientTransferProhibited)
Domain Status: clientDeleteProhibited (https://www.icann.org/epp#clientDeleteProhibited)
Domain Status: serverUpdateProhibited (https://www.icann.org/epp#serverUpdateProhibited)
Domain Status: serverTransferProhibited (https://www.icann.org/epp#serverTransferProhibited)
Domain Status: serverDeleteProhibited (https://www.icann.org/epp#serverDeleteProhibited)
Registry Registrant ID:
Registrant Name: Timothy Alexander Steinert
Registrant Organization: Hangzhou Alibaba Advertising Co., Lt
Registrant Street: No. 699 Wangshang Road , Binjiang District
Registrant City: Hangzhou
Registrant State/Province: Zhejiang
Registrant Postal Code: 310052
Registrant Country: CN
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Timothy Alexander Steinert
list.alibaba-inc.com
Are you looking for IPv4 address 10.20.3.90?
IP address 10.20.3.90
Summary IP Address 10.20.3.90 is a private IP address. Private IP addresses are used inside a local area network (LAN) and are not visible on the internet. Private IP addresses are defined in RFC 1918 (IPv4) and RFC 4193 (IPv6).
NetRange: 10.0.0.0 – 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2013-08-30
Are you looking for domain alibaba-inc.com?
This domain is hosted by Hangzhou Alibaba Advertising Co.,Ltd. (AS37963). The first DNS server is ns8.alibabaonline.com. The current IPv4 address is 121.0.17.65. The mail server with the highest priority is mx1.alibaba-inc.com.
v=spf1 include:spf1.staff.mail.aliyun.com -al
DNS server (NS records) ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
nsp2.alibabaonline.com (198.11.138.242)
nsp.alibabaonline.com (200.196.225.111)
Mail server (MX records) mx1.alibaba-inc.com (205.204.101.143)
mxus1.alibaba-inc.com (205.204.101.143)
IP address (IPv4) 121.0.17.65
IP address (IPv6)
ASN number 37963
ASN name (ISP) Hangzhou Alibaba Advertising Co.,Ltd.
IP-range/subnet 121.0.16.0/21
121.0.16.0 – 121.0.23.255

Domain IPv4 address Ranking Alexa Pagerank
alibaba-inc.asia -1
alibaba-inc.bid
alibaba-inc.biz 60.205.17.162
alibaba-inc.cc 35.201.173.170
alibaba-inc.club 10.244.35.92 -1
alibaba-inc.cn -1
alibaba-inc.co
alibaba-inc.com 121.0.17.65 2,111 2
alibaba-inc.com.cn
alibaba-inc.date
alibaba-inc.ink 121.42.72.40
alibaba-inc.jp 5
alibaba-inc.loan
alibaba-inc.ltd
alibaba-inc.mobi 219.137.207.17
alibaba-inc.mom
alibaba-inc.net 222.76.250.26 -1
alibaba-inc.net.cn
alibaba-inc.nl 185.53.177.20
alibaba-inc.org 93.191.168.52
alibaba-inc.pro
alibaba-inc.shop
alibaba-inc.site
alibaba-inc.tech 127.0.0.1
alibaba-inc.top
alibaba-inc.us 184.168.221.38
alibaba-inc.vip 47.89.58.32
alibaba-inc.wang
alibaba-inc.xin
alibaba-inc.xn--ses554g
alibaba-inc.xyz
alibaba-incs.com 104.16.91.230
IPv4 routes
Startip Endip Description Country #domains #spamhosts
135.84.40.0 135.84.41.255 Angie’s List, Inc. US 0 0
204.27.248.0 204.27.248.255 Amarican List Counsel, Inc. US 0 0
204.130.201.0 204.130.201.255 American List Counsel, Inc US 0 0
91.236.59.0 91.236.59.255 List Technology Iberica S.A. ES 0 0
157.247.0.0 157.247.255.255 AVL LIST GmbH AT 3 0
185.178.64.0 185.178.67.255 Martin List-Petersen trading as Tuxbox IE 0 0
192.102.17.0 192.102.17.255 AVL LIST GmbH AT 8 0
193.26.220.0 193.26.220.255 Javno podjetje uradni list Republike Slovenije d.o.o. SI 8 0
77.74.229.0 77.74.229.255 Sluzbeni list Bosne i Hercegovine BA 15 0
43.230.32.0 43.230.35.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
43.250.12.0 43.250.15.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 1 0
45.112.208.0 45.112.211.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.212.0 45.112.215.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.216.0 45.112.219.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.220.0 45.112.223.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
47.56.0.0 47.57.255.255 Alibaba.com LLC US 1 0
47.74.0.0 47.75.255.255 Alibaba.com LLC US 48,712 2
47.76.0.0 47.79.255.255 Alibaba.com LLC US 3 0
47.80.0.0 47.87.255.255 Alibaba.com LLC US 14 0
47.88.0.0 47.91.255.255 Alibaba.com LLC US 1,830,436 20
47.235.0.0 47.235.255.255 Alibaba.com LLC US 0 0
47.236.0.0 47.239.255.255 Alibaba.com LLC US 0 0
47.240.0.0 47.243.255.255 Alibaba.com LLC US 1 0
47.244.0.0 47.245.255.255 Alibaba.com LLC US 0 0
47.246.0.0 47.246.255.255 Alibaba.com LLC US 1 0
47.250.0.0 47.251.255.255 Alibaba.com LLC US 0 0
47.252.0.0 47.253.255.255 Alibaba.com LLC US 12 0
47.254.0.0 47.254.255.255 Alibaba.com LLC US 3,743 0
72.254.0.0 72.254.255.255 Alibaba.com LLC US 0 0
103.216.108.0 103.216.111.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
110.75.192.0 110.75.255.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 81 0
119.38.208.0 119.38.223.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 9 0
121.0.16.0 121.0.31.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 88 0
139.95.0.0 139.95.255.255 Alibaba.com LLC US 0 0
147.139.0.0 147.139.255.255 Alibaba.com LLC US 0 0
155.102.0.0 155.102.255.255 Alibaba.com LLC US 0 0
157.119.240.0 157.119.243.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
161.117.0.0 161.117.255.255 Alibaba.com Singapore E-Commerce Private Limited SG 0 0
163.181.0.0 163.181.255.255 Alibaba.com LLC US 27 0
170.33.0.0 170.33.255.255 Alibaba.com Singapore E-Commerce Private Limited SG 14 0
185.218.176.0 185.218.179.255 Alibaba Cloud (Singapore) Private Limited RU 0 0
198.11.128.0 198.11.191.255 Alibaba.com LLC US 103,048 1
205.204.96.0 205.204.127.255 Alibaba.com LLC US 14,189 0
45.112.212.0 45.112.212.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.213.0 45.112.213.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.214.0 45.112.214.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.215.0 45.112.215.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
47.74.0.0 47.74.63.255 Alibaba.com LLC US 15,381 0
47.74.0.0 47.74.7.255 Alibaba.com LLC US 5,806 0
47.74.64.0 47.74.127.255 Alibaba.com LLC US 85 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a0a:5780:: 2a0a:5780:ffff:ffff:ffff:ffff:ffff:ffff Martin List-Petersen trading as Tuxbox IE 0 0
2401:2e00:: 2401:2e00:ffff:ffff:ffff:ffff:ffff:ffff Alibaba (China) Technology Co., Ltd. CN 0 0
2a0b:da40:: 2a0b:da47:ffff:ffff:ffff:ffff:ffff:ffff Alibaba Cloud (Singapore) Private Limited RU 0 0
2001:330:: 2001:330:1fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:2000:: 2001:330:3fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:4000:: 2001:330:7fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:8000:: 2001:330:ffff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:3e8:: 2001:3e8:ffff:ffff:ffff:ffff:ffff:ffff MediaLive Japan,Inc. JP 0 0
2001:410:: 2001:410:ffff:ffff:ffff:ffff:ffff:ffff Canarie Inc CA 12 0
2001:418:: 2001:418:ffff:ffff:ffff:ffff:ffff:ffff NTT America, Inc. US 132 0
2001:420:: 2001:420:ffff:ffff:ffff:ffff:ffff:ffff Cisco Systems, Inc. US 384 0
2001:450:: 2001:450:ffff:ffff:ffff:ffff:ffff:ffff Level 3 Communications, Inc. US 4 0
2001:458:: 2001:458:ffff:ffff:ffff:ffff:ffff:ffff Stealth Communications, Inc. US 3 0
2001:470:: 2001:470:ffff:ffff:ffff:ffff:ffff:ffff Hurricane Electric, Inc. US 18,918 0
2001:4b0:: 2001:4b0:ffff:ffff:ffff:ffff:ffff:ffff AOL Inc. US 0 0
2001:4b8:: 2001:4b8:ffff:ffff:ffff:ffff:ffff:ffff Wayport, Inc. US 0 0
2001:4e8:: 2001:4e8:ffff:ffff:ffff:ffff:ffff:ffff Shaw Communications Inc. CA 0 0
2001:4f8:: 2001:4f8:ffff:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 28 0
2001:500:10:: 2001:500:10:ffff:ffff:ffff:ffff:ffff Gauss Research Laboratory, Inc. PR 0 0
2001:500:2e:: 2001:500:2f:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:60:: 2001:500:60:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:61:: 2001:500:61:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:62:: 2001:500:62:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:63:: 2001:500:63:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:64:: 2001:500:64:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:65:: 2001:500:65:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:66:: 2001:500:66:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:67:: 2001:500:67:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:68:: 2001:500:68:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:69:: 2001:500:69:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6a:: 2001:500:6a:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6b:: 2001:500:6b:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6c:: 2001:500:6c:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6d:: 2001:500:6d:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6e:: 2001:500:6e:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6f:: 2001:500:6f:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:70:: 2001:500:70:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:71:: 2001:500:71:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:72:: 2001:500:72:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:73:: 2001:500:73:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:74:: 2001:500:74:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:75:: 2001:500:75:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:76:: 2001:500:76:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:77:: 2001:500:77:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:78:: 2001:500:78:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:79:: 2001:500:79:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7a:: 2001:500:7a:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7b:: 2001:500:7b:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7c:: 2001:500:7c:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:85:: 2001:500:85:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
56651 Javno podjetje uradni list Republike Slovenije d.o.o. SI 1 0 8 0
37963 Hangzhou Alibaba Advertising Co.,Ltd. CN 238 0 2,038,735 121
45102 Alibaba (China) Technology Co., Ltd. CN 233 0 2,278,472 36
134963 Alibaba.com Singapore E-Commerce Private Limited SG 22 0 225 0
1 Level 3 Communications, Inc. US 10 0 15 8
5 Symbolics, Inc. US 15 0 5 12
6 Bull HN Information Systems Inc. US 29 0 82 0
19 Leidos, Inc. US 8 0 85 0
78 BT Americas, Inc US 6 0 2 0
97 NTT America, Inc. US 2 0 0 0
106 General Dynamics Advanced Information Systems, Inc. US 10 0 48 0
109 Cisco Systems, Inc. US 77 26 816 2
125 Honeywell International, Inc. US 49 0 907 0
158 Ericsson Network Systems, Inc. US 89 12 252 0
161 Texas Instruments, Inc. US 16 0 134 0
200 Level 3 Communications, Inc. US 2 0 0 9
202 Level 3 Communications, Inc. US 1 0 7 0
229 Merit Network Inc. US 2 0 0 0
231 Merit Network Inc. US 4 1 1 0
237 Merit Network Inc. US 55 5 1,270 1
260 Xconnect24 Inc. US 16 4 97 1
262 NTT America, Inc. US 1 1 0 0
283 MPower Labs, Inc. US 5 0 7 0
555 Velocity Technology Solutions II, Inc. US 3 0 193 0
560 Level 3 Communications, Inc. US 0 2 0 0
572 Greater Baltimore Medical Center Inc US 6 0 0 0
598 Level 3 Communications, Inc. US 1 0 0 0
605 Vanguard Health Management, Inc. US 1 0 0 0
613 BP America, Inc. US 2 0 0 0
684 MTS Inc. CA 2 0 0 0
699 KANOBE INC US 3 0 16 0
701 MCI Communications Services, Inc. d/b/a Verizon Business US 1,164 19 151,206 170
702 MCI Communications Services, Inc. d/b/a Verizon Business US 198 54 60,385 5
703 MCI Communications Services, Inc. d/b/a Verizon Business US 91 3 1,106 1
705 MCI Communications Services, Inc. d/b/a Verizon Business US 145 0 9 0
714 Apple Inc. US 597 68 9,598 5
797 AT&T Services, Inc. US 57 0 742 0
801 AtTask, Inc US 1 0 0 0
812 Rogers Communications Canada Inc. CA 501 43 26,501 45
813 MCI Communications Services, Inc. d/b/a Verizon Business US 28 0 140 0
852 TELUS Communications Inc. CA 700 21 18,343 36
1236 General Dynamics C4 Systems, Inc. US 6 0 86 0
1280 Internet Systems Consortium, Inc. US 22 8 466 0
1313 Adobe Systems Inc. US 9 2 161 0
1321 Advanced Networks & Services Inc. US 11 0 0 0
1323 Advanced Networks & Services Inc. US 1 0 0 0
1325 Advanced Networks & Services Inc. US 2 0 0 0
1326 Advanced Networks & Services Inc. US 8 0 1 0
1331 Advanced Networks & Services Inc. US 4 0 0 0
1337 Advanced Networks & Services Inc. US 12 12 0 0

 

@@@@@@@@@@@@@@
hk.alibaba-inc.  com

https://ipp.alibabagroup  .com
https://  intl.aliyun.com/

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Terrorists attacks against Stew Webb Whistleblower in 24 hours

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Cyber Terrorists attacks against Stew Webb Whistle blower in 24 hours

Throttling Feb 19 2018
Top 5 Ips Hits in last 24 hours
174.223.9.83 United States US 181
65.24.131.115 United States US 140
24.171.217.39 Puerto Rico PR 64
73.32.246.151 United States US 52
100.19.103.184 United States US 51
@@@@@@@@@@@@@@@@@@@@
February 17, 2018
Top 5 Ips Hits in last 24 hours
174.223.9.83 United States US 181 hits in last 24 hours
65.24.131.115 United States US 140 hits in last 24 hours
24.171.217.39 Puerto Rico PR 64 hits in last 24 hours
73.32.246.151 United States US 52 hits in last 24 hours
@@@@@@@@@@@@@@@@@@@@
February 15, 2018
Top 5 Ips Hits in last 24 hours
35.168.214.172 United States US 394
40.77.167.92 United States US 303
76.103.149.111 United States US 269
72.204.10.197 United States US 172
104.9.36.28 United States US 146

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
February 12, 2018
Top 5 Ips Hits in last 24 hours
76.103.149.111 United States US 269
72.204.10.197 United States US 191
98.176.168.28 United States US 167
76.19.69.217 United States US 130
174.223.137.36 US 184
75.137.117.109 US 155
96.238.5.45 US 138
67.254.198.135 US 123
174.238.144.68 US 121
40.77.167.187 US 110
198.245.53.136 CA 103
February 12, 2018
2:23pm
188.19.173.160 (Russian Federation)

Blocked because the IP is blacklisted

February 12, 2018
2:22pm
176.120.51.115 (Ukraine)

Blocked because the IP is blacklisted

February 12, 2018
11:32am
110.139.202.142 (Indonesia)

Blocked because the IP is blacklisted

February 12, 2018
11:29am
84.52.98.181 (Russian Federation)

Blocked because the IP is blacklisted

February 12, 2018
10:51am
46.0.79.219 (Russian Federation)

Blocked because the IP is blacklisted
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Throttling Feb 3 2018
Top 5 Ips Hits in last 24 hours
70.126.77.136 United States US 100
66.180.182.136 United States US 23
166.170.14.98 United States US 22
216.160.138.220 United States US 21
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
February 8 2018
Top 5 Ips Hits in last 24 hours
174.223.137.36 United States US 206
40.77.167.76 United States US 193
40.77.167.180 United States US 192
104.199.36.229 United States US 160
40.77.167.193 United States US 158
40.77.167.187 United States United States 110
47.90.85.59 Hong Kong Hong Kong 72
108.67.56.10 United States United States 22
76.103.111.98 United States United States 20
76.24.221.134 United States United States 19
68.108.221.94 United States United States 18
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
March 1 2018
Top 5 Ips Hits in last 24 hours
174.223.137.36 United States US 206
40.77.167.76 United States US 193
40.77.167.180 United States US 192
104.199.36.229 United States US 160
40.77.167.193 United States US 158

@@@@@@@@@@@@@@@@@@@@@@@@
This a sample from March 1 2018
log
174.223.1.93 United States US 119 Hits in last 24 hours
IP address 174.223.1.93
Location Phenix City, Alabama, United States (US) flag
Registry arin
IP address 174.223.1.93
Reverse DNS (PTR record) 93.sub-174-223-1.myvzw.com
DNS server (NS record) carkdns.vzwdomain.com (66.174.92.13)
njbbdns.vzwdomain.com (69.78.134.171)
ns1.vzwdomain.com (66.174.0.3)
ASN number 22394
ASN name (ISP) Cellco Partnership DBA Verizon Wireless
IP-range/subnet 174.223.0.0/17
174.223.0.0 – 174.223.127.255
NetRange: 174.192.0.0 – 174.255.255.255
CIDR: 174.192.0.0/10
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cellco Partnership DBA Verizon Wireless (CLLC)
RegDate: 2008-12-16
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-192-0-0-1

OrgName: Cellco Partnership DBA Verizon Wireless
OrgId: CLLC
Address: 180 Washington Valley Road
City: Bedminster
StateProv: NJ
PostalCode: 07039
Country: US
RegDate: 2001-09-30
Updated: 2017-10-12
908-306-7000
verizonwireless. com

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Malicious File Uploads cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Malicious File Uploads cyber attacks against Stew Webb Whistle blower

United States Valencia, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/dzs-portfolio/admin/upload.php
2/8/2018 8:05:52 PM (42 minutes ago)
IP: 50.113.182.82 Hostname: pxy01twcca.ladc.ca.charter.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X; sl-SI) AppleWebKit/531.36.7 (KHTML, like Gecko) Version/4.0.5 Mobile/8B115 Safari/6531.36.7
Type: Blocked
Netherlands Netherlands was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:59:23 PM (48 minutes ago)
IP: 103.251.164.13 Hostname: 103.251.164.13
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows NT 5.1) AppleWebKit/5321 (KHTML, like Gecko) Chrome/38.0.821.0 Mobile Safari/5321
Type: Blocked
United States Centerview, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/admin/upload.php
2/8/2018 7:58:07 PM (50 minutes ago)
IP: 76.0.4.88 Hostname: mo-76-0-4-88.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
Type: Blocked
United States Mount Gilead, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-portfolio/upload.php
2/8/2018 7:56:52 PM (51 minutes ago)
IP: 71.213.176.237 Hostname: 71-213-176-237.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Opera/8.91 (Windows 95; sl-SI) Presto/2.12.257 Version/12.00
Type: Blocked
United States Kissimmee, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/upload.php
2/8/2018 7:56:33 PM (51 minutes ago)
IP: 71.54.179.124 Hostname: fl-71-54-179-124.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
Type: Blocked
United States Warrenton, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/uploader/uploadify/uploadify.php
2/8/2018 7:55:17 PM (53 minutes ago)
IP: 174.125.14.182 Hostname: 174-125-14-182.dyn.centurytel.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_6_6 rv:2.0) Gecko/20161124 Firefox/36.0
Type: Blocked
United States Belleville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:54:58 PM (53 minutes ago)
IP: 67.234.107.79 Hostname: pa-67-234-107-79.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States Mebane, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/simple-ads-manager/sam-ajax-admin.php
2/8/2018 7:54:51 PM (53 minutes ago)
IP: 99.194.16.24 Hostname: 99-194-16-24.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_7) AppleWebKit/5312 (KHTML, like Gecko) Chrome/37.0.818.0 Mobile Safari/5312
Type: Blocked
United States Trussville, United States was blocked by firewall for a Malicious File Upload in file: files=2W4yr.php.php.png at http://stewwebb.com/wp-admin/admin-ajax.php?action=load_ajax_function
2/8/2018 7:54:33 PM (54 minutes ago)
IP: 174.125.207.38 Hostname: 174-125-207-38.dyn.centurytel.net
Human/Bot: Bot
Browser: undefined
Opera/8.18 (Windows 98; Win 9x 4.90; sl-SI) Presto/2.11.335 Version/10.00
Type: Blocked
United States Shippensburg, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/page-google-maps/pr.php
2/8/2018 7:54:28 PM (54 minutes ago)
IP: 67.234.191.187 Hostname: pa-67-234-191-187.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux i686) AppleWebKit/5340 (KHTML, like Gecko) Chrome/38.0.825.0 Mobile Safari/5340
Type: Blocked
United States Centerburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:54:07 PM (54 minutes ago)
IP: 71.213.21.24 Hostname: 71-213-21-24.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows CE; en-US; rv:1.9.2.20) Gecko/20100828 Firefox/36.0
Type: Blocked
United States Sparta, United States was blocked by firewall for a Malicious File Upload in file: files=yt93x.php at http://stewwebb.com/wp-content/plugins/simple-dropbox-upload-form/dragup/
2/8/2018 7:54:00 PM (54 minutes ago)
IP: 184.158.68.215 Hostname: 184-158-68-215.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows CE) AppleWebKit/5341 (KHTML, like Gecko) Chrome/37.0.875.0 Mobile Safari/5341
Type: Blocked
United States Pleasant Hill, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/font-uploader/font-upload.php
2/8/2018 7:53:53 PM (54 minutes ago)
IP: 184.5.199.59 Hostname: mo-184-5-199-59.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_7_0 rv:6.0; sl-SI) AppleWebKit/532.35.3 (KHTML, like Gecko) Version/5.0 Safari/532.35.3
Type: Blocked
United States Bucyrus, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:43 PM (55 minutes ago)
IP: 71.213.171.142 Hostname: 71-213-171-142.mnfd.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States Shippensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php?Year=2018&Month=…
2/8/2018 7:53:41 PM (55 minutes ago)
IP: 67.234.2.7 Hostname: pa-67-234-2-7.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Opera/8.30 (X11; Linux i686; sl-SI) Presto/2.8.251 Version/10.00
Type: Blocked
Russia Ulan-Ude, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/gallery-plugin/upload/php.php
2/8/2018 7:53:22 PM (55 minutes ago)
IP: 92.126.154.118 Hostname: 92.126.154.118.stbur.ru
Human/Bot: Bot
Browser: Firefox version 35.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_6 rv:3.0) Gecko/20111223 Firefox/35.0
Type: Blocked
United States Wake Forest, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-post.php?task=wpmp_upload_previews
2/8/2018 7:53:21 PM (55 minutes ago)
IP: 184.3.173.178 Hostname: nc-184-3-173-178.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64; rv:6.0) Gecko/20140513 Firefox/36.0
Type: Blocked
United States Greenville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:13 PM (55 minutes ago)
IP: 76.0.176.164 Hostname: nc-76-0-176-164.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (55 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (55 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (55 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (55 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
Russia Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (55 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Type: Blocked
Russia Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (55 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Type: Blocked
United States Warrensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/real3d-flipbook/includes/process.php
2/8/2018 7:51:59 PM (57 minutes ago)
IP: 76.0.26.95 Hostname: mo-76-0-26-95.dyn.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (compatible; MSIE 5.0; Windows 95; Trident/5.1)
Type: Blocked
United States Manchester, United States was blocked by firewall for UserPro – User Profiles with Social Login <= 4.9.17 – Authentication Bypass in query string: up_auto_log=true at http://stewwebb.com/?up_auto_log=true
2/8/2018 7:51:53 PM (57 minutes ago)
IP: 98.174.87.168 Hostname: customernet.completeitcenter.com
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows NT 4.0; en-US; rv:1.9.0.20) Gecko/20120810 Firefox/35.0
Type: Blocked
United Kingdom London, United Kingdom was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:50:39 PM (58 minutes ago)
IP: 35.178.19.46 Hostname: ec2-35-178-19-46.eu-west-2.compute.amazonaws.com
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
Type: Blocked
United States Auburn, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:49:24 PM (59 minutes ago)
IP: 75.172.5.254 Hostname: 75-172-5-254.tukw.qwest.net
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=4
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=3
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=2
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=1
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=0
2/8/2018 7:43:25 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Venezuela Caracas, Venezuela was blocked by firewall at http://www.stewwebb.com/
2/8/2018 6:24:10 PM (2 hours 25 mins ago)
IP: 190.72.143.141 Hostname: 190-72-143-141.dyn.dsl.cantv.net
Human/Bot: Bot
Browser: Chrome version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.86 Safari/537.36
Type: Blocked
Venezuela Caracas, Venezuela left http://www.stewwebb.com/ and was blocked by firewall at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
2/8/2018 6:23:55 PM (2 hours 25 mins ago)
IP: 190.72.143.141 Hostname: 190-72-143-141.dyn.dsl.cantv.net
Human/Bot: Bot
Browser: Chrome version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.86 Safari/537.36
Type: Blocked
United States Dallas, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php
2/8/2018 2:42:28 PM (6 hours 6 mins ago)
IP: 50.22.59.195 Hostname: linux.servidor5.net
Human/Bot: Bot
Browser: undefined
wp-windowsphone

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower

(Larry Mizel top right)

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

evidence

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower

Peace Valley, United States visited http://www.stewwebb.com/
2/11/2018 6:34:05 PM (3 hours 24 mins ago)
IP: 64.251.142.57 Hostname: 64-251-142-57.fidnet.com
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
NetRange: 64.251.128.0 – 64.251.159.255
[8192 addresses in this network]
CIDR: 64.251.128.0/19 (64.251.128.0 – 64.251.191.255)
[16384 addresses in this network]
NetName: NETBLK2-FIDN
NetHandle: NET-64-251-128-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Fidelity Communication International Inc. (FIDN)
RegDate: 2001-02-16
Updated: 2003-08-11
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-64-251-128-0-1

OrgName: Fidelity Communication International Inc.
OrgId: FIDN
Address: 64 N.Clark
City: Sullivan
StateProv: MO
PostalCode: 63080
Country: US
RegDate: 1995-06-19
Updated: 2012-09-29
Ref: https://whois.arin.net/rest/org/FIDN

OrgAbuseHandle: NOC2396-ARIN
OrgAbuseName: Network Operations Center
OrgAbusePhone: +1-573-468-1220
OrgAbuseEmail: nocadmins@fidnet.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NOC2396-ARIN

OrgTechHandle: NOC2396-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-573-468-1220
OrgTechEmail: nocadmins@fidnet.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC2396-ARIN
Are you looking for IPv4 address 64.251.142.57?Are you looking for domain fidnet.com?
This domain is hosted by Fidelity Communication International Inc. (AS11976). The first DNS server is sullivan.hwy66.com. The current IPv4 address is 216.229.64.111. The mail server with the highest priority is mx1.emailsrvr.com.
=spf1 include:emailsrvr.com ~all
DNS server (NS records) sullivan.hwy66.com (216.229.72.9)
ns1.fidnet.com (216.229.72.9)
ns2.fidnet.com (216.229.73.9)
ns3.fidnet.com (216.229.74.9)
rolla.hwy66.com (216.229.73.9)
Mail server (MX records) mx1.emailsrvr.com (108.166.43.1)
mx2.emailsrvr.com (108.166.43.2)
IP address (IPv4) 216.229.64.111
IP address (IPv6)
ASN number 11976
ASN name (ISP) Fidelity Communication International Inc.
IP-range/subnet 216.229.64.0/23
216.229.64.0 – 216.229.65.255
Domain Status:
Registry Registrant ID:
Registrant Name: Fidelity Communication International Inc.
Registrant Organization: Fidelity Communication International Inc.
Registrant Street: 64 N CLARK ST
Registrant City: SULLIVAN
Registrant State/Province: MO
Registrant Postal Code: 63080-1610
Registrant Country: US
573-468-8081
fidelitycommunications.com
This domain is hosted by Fidelity Communication International Inc. (AS11976). The first DNS server is ns3.fidnet.com. The current IPv4 address is 216.229.64.110. The mail server with the highest priority is fidelitycommunications-com.mail.protection.outlook.com.
v=spf1 a:webmail.fidelitycommunications.com
a:billpay.fidelitycommunications.com
ip4:216.229.64.64/26 ip4:216.229.64.136/29
include:_spf.smtp.com include:servers.mcsv.net
include:spf.protection.outlook.com ~a
DNS server (NS records) ns3.fidnet.com (216.229.74.9)
ns1.fidnet.com (216.229.72.9)
ns2.fidnet.com (216.229.73.9)
Mail server (MX records) fidelitycommunications-com.mail.protection.outlook.com (207.46.163.106)
IP address (IPv4) 216.229.64.110
IP address (IPv6)
ASN number 11976
ASN name (ISP) Fidelity Communication International Inc.
IP-range/subnet 216.229.64.0/23
216.229.64.0 – 216.229.65.255

Domain IPv4 address Ranking Alexa Pagerank
fidnet.biz 198.252.99.168
fidnet.com 216.229.64.111 3
fidnet.com.ua
fidnet.eu 213.186.33.5
fidnet.fr 213.186.33.5
fidnet.net
fidnet.org
fidnet3.com 213.251.168.185 -1
fidnet3.fr 85.159.215.247
fidnetb.com 45.126.209.154
fidnethelpdesk.com 192.185.174.55
IPv4 routes
Startip Endip Description Country #domains #spamhosts
85.119.142.0 85.119.142.255 Site 3 subnet 142 NO 0 0
93.126.142.0 93.126.142.255 93.126.142.0/24 LB 0 0
185.77.251.0 185.77.251.255 Noop-185-77-251-0-24 GB 0 0
188.208.142.0 188.208.142.255 CLOUDPROS-188-208-142-0-24 ES 24 0
188.211.251.0 188.211.251.255 Noop-188-211-251-0-24 GB 0 0
212.8.251.0 212.8.251.255 NFOrce Entertainment BV – route 212.8.251.0/24 RU 1,271 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
55844 142 KASIKORNBANK Building 4th Floor Silom Road Suriyawong Bangrak Bangkok 10500 TH 2 2 4 0

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Amazon US Gov Israel Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Amazon US Gov or Israel Cyber Attacks against Stew Webb Whistle blower

United States Ashburn, United States visited http://stewwebb.com/ads.txt
2/11/2018 11:30:45 PM (23 minutes ago)
IP: 52.91.59.128 Hostname: ec2-52-91-59-128.compute-1.amazonaws.com
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
NetRange: 52.84.0.0 – 52.95.255.255
[786432 addresses in this network]
CIDR: 52.88.0.0/13, 52.84.0.0/14 (52.88.0.0 – 52.95.255.255)
[524288 addresses in this network]
NetName: AT-88-Z
NetHandle: NET-52-84-0-0-1
Parent: NET52 (NET-52-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 1991-12-19
Updated: 2015-03-20
Ref: https://whois.arin.net/rest/net/NET-52-84-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




US Gov Israel PSINet Washington DC Cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower

18-USC-1010-1015

18-USC-4

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Cyber Terrorism

Evidence

US Gov Israel PSINet Washington DC Cyber attacks against Stew Webb Whistle blower

New Malden, United Kingdom visited http://www.stewwebb.com/
2/12/2018 12:36:28 AM (4 minutes ago)
IP: 154.51.131.142 Hostname: 154.51.131.142
Browser: IE version 8.0 running on Win32
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 1.0.3705; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
Type: Bot
United Kingdom New Malden, United Kingdom visited http://stewwebb.com/
2/12/2018 12:36:25 AM (4 minutes ago)
IP: 154.51.131.142 Hostname: 154.51.131.142
Browser: IE version 8.0 running on Win32
Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; Trident/4.0; .NET CLR 1.1.4322; .NET CLR 1.0.3705; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)

Sorry, but no data for that IP or domain was found.

@@@@@

P address 154.51.131.142
Location London, England, United Kingdom

IP address 154.51.131.142
Reverse DNS (PTR record) not available
DNS server (NS record) auth2.dns.cogentco.com (66.28.0.30)
auth1.dns.cogentco.com (66.28.0.14)
ASN number 174
ASN name (ISP) Cogent Communications
IP-range/subnet 154.48.0.0/12
154.48.0.0 – 154.63.255.255

Number of SPAM hosts on 154.48.0.0/12 22
@@@@@@@@@
????????
Domain Tools
gitarakor.com

@@@@@@@@@@@@@@@@@
Domains around 154.51.131.142
IP address #domains
154.51.131.34 1
154.51.131.35 4
154.51.131.37 5
154.51.131.100 1
154.51.131.140 2
154.51.131.141 2
154.51.131.142 1
154.51.131.151 1

NetRange: 154.51.0.0 – 154.51.255.255
CIDR: 154.51.0.0/16
NetName: COGENT-154-51-16
NetHandle: NET-154-51-0-0-1
Parent: NET154 (NET-154-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS174
Organization: PSINet, Inc. (PSI-2)
RegDate: 1992-02-05
Updated: 2017-10-30
OrgName: PSINet, Inc.
OrgId: PSI-2
Address: 2450 N Street NW
City: Washington
StateProv: DC
PostalCode: 20037
Country: US
RegDate: 1990-10-07
Updated: 2015-06-04

877-875-4311

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




March 3 2018 Cyber Attackers against Stew Webb Whistleblower Exposed

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

March 3, 2018
wordfence.com
evidence
Top 5 IPs Blocked
IP Country Block Count
70.126.77.136 United States US 160 hits in last 24 hours
71.218.130.202 United States US 120 hits in last 24 hours

Type: Bot
United States Ashburn, United States visited http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2013%2F09%2F11%2Fill…
3/3/2018 2:54:06 PM (35 seconds ago)
IP: 34.201.61.185 Hostname: ec2-34-201-61-185.compute-1.amazonaws.com
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html#wc)
Type: Bot
United States Ashburn, United States visited http://www.stewwebb.com/wp-json/oembed/1.0/embed?url=http%3A%2F%2Fwww.stewwebb.com%2F2013%2F09%2F11%2Fill…
3/3/2018 2:53:34 PM (1 minute ago)
IP: 34.201.61.185 Hostname: ec2-34-201-61-185.compute-1.amazonaws.com
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html#wc)

@@@@@@@@@@@@@@@@@@@@@@@@@@
Vancouver, Canada arrived from https://www.bing.com/ and visited http://www.stewwebb.com/2014/07/05/terrible-price-pay/
3/3/2018 2:52:28 PM (2 minutes ago)
IP: 96.49.110.163 Hostname: S0106306023d552ac.vc.shawcable.net
Browser: Edge version 16.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36 Edge/16.16299
@@@@@@@@@@@@@@@@@@@@@@@@@
Bridgnorth, United Kingdom visited http://www.stewwebb.com/
3/3/2018 2:50:41 PM (5 minutes ago)
IP: 109.180.251.69 Hostname: 109.180.251.69
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/893.14.2 Darwin/17.3.0

@@@@@@@@@@@@@@@@@@@@@@@@@
Type: Bot
United States Alfred, United States visited http://www.stewwebb.com/
3/3/2018 2:46:11 PM (11 minutes ago)
IP: 74.75.219.204 Hostname: cpe-74-75-219-204.maine.res.rr.com
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/889.9 Darwin/17.2.0
Type: Bot
@@@@@@@@@@@@@@@@@@@@@@@@@@@@
France Paris, France visited http://www.stewwebb.com/category/new-world-order-2/
3/3/2018 2:46:08 PM (11 minutes ago)
IP: 82.102.18.77 Hostname: 82.102.18.77
Browser: IE version 6.0 running on Win32
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR 1.0.3705;)
Vancouver, Canada visited http://www.stewwebb.com/
3/3/2018 2:45:19 PM (13 minutes ago)
IP: 72.143.227.63 Hostname: 72.143.227.63
Browser: Safari version 0.0 running on iOS
MobileSafari/602.1 CFNetwork/811.5.4 Darwin/16.7.0
Slovenia Slovenia visited http://www.stewwebb.com/
3/3/2018 2:45:19 PM (13 minutes ago)
IP: 188.196.172.229 Hostname: internet-188-196-172-229.narocnik.mobitel.si
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0

@@@@@@@@@@@@@@@@@@
Repeated 16 times
Vancouver, Canada visited http://www.stewwebb.com/
3/3/2018 2:43:21 PM (16 minutes ago)
IP: 72.143.227.63 Hostname: 72.143.227.63
Browser: Safari version 10.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 10_3_3 like Mac OS X) AppleWebKit/603.3.8 (KHTML, like Gecko) Version/10.0 Mobile/14G60 Safari/602.1
Type: 404 Not Found
United States Ashburn, United States tried to access non-existent page http://www.stewwebb.com/American_Christians_duped_by_Political_Zionism_20130320_files/editdata.mso
3/3/2018 2:42:09 PM (17 minutes ago)
IP: 34.201.61.185 Hostname: ec2-34-201-61-185.compute-1.amazonaws.com
Human/Bot: Bot
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html#wc)

Ashburn, United States visited http://www.stewwebb.com/2017/01/02/who-controls-senator-john-mccain-larry-mizel-organized-crime-boss-hog
3/3/2018 3:16:41 PM (36 seconds ago)
IP: 54.89.126.241 Hostname: ec2-54-89-126-241.compute-1.amazonaws.com
Browser: undefined
Mozilla/5.0 (compatible; proximic; +http://www.proximic.com/info/spider.php)
Type: Bot
United States Ashburn, United States visited http://www.stewwebb.com/?p=3512
3/3/2018 3:16:24 PM (54 seconds ago)
IP: 34.201.61.185 Hostname: ec2-34-201-61-185.compute-1.amazonaws.com
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html#wc)

Tula, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/3/2018 2:27:27 PM (36 minutes ago)
IP: 128.74.64.188 Hostname: 128-74-64-188.broadband.corbina.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Tambov, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/3/2018 12:19:07 PM (2 hours 45 mins ago)
IP: 178.75.73.25 Hostname: 178.75.73.25
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/joomla/administrator/index.php
3/3/2018 11:19:31 AM (3 hours 42 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/joomla/robots.txt
3/3/2018 11:19:31 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/administrator/index.php
3/3/2018 11:19:31 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/robots.txt
3/3/2018 11:19:31 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/administrator/index.php
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/robots.txt
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/wp/
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/wordpress/
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/robots.txt
3/3/2018 11:19:29 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/xmlrpc.php?rsd=
3/3/2018 11:19:29 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/
3/3/2018 11:19:29 AM (3 hours 42 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/robots.txt
3/3/2018 11:19:28 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/wp/
3/3/2018 7:29:16 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/wordpress/
3/3/2018 7:29:16 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/blog/
3/3/2018 7:29:16 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/3/2018 7:29:15 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/
3/3/2018 7:29:15 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/3/2018 7:29:14 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/robots.txt
3/3/2018 7:29:13 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
United States Boston, United States was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://stewwebb.com/
3/3/2018 6:40:06 AM (8 hours 22 mins ago)
IP: 174.192.11.151 Hostname: 151.sub-174-192-11.myvzw.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-J727V Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36

Cyber Attackers against Stew Webb Whistle blower March 3 2018

Ashburn, United States visited http://www.stewwebb.com/2017/01/02/who-controls-senator-john-mccain-larry-mizel-organized-crime-boss-hog
3/3/2018 3:16:41 PM (36 seconds ago)
IP: 54.89.126.241 Hostname: ec2-54-89-126-241.compute-1.amazonaws.com
Browser: undefined
Mozilla/5.0 (compatible; proximic; +http://www.proximic.com/info/spider.php)
Type: Bot
United States Ashburn, United States visited http://www.stewwebb.com/?p=3512
3/3/2018 3:16:24 PM (54 seconds ago)
IP: 34.201.61.185 Hostname: ec2-34-201-61-185.compute-1.amazonaws.com
Browser: undefined
BUbiNG (+http://law.di.unimi.it/BUbiNG.html#wc)

Tula, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/3/2018 2:27:27 PM (36 minutes ago)
IP: 128.74.64.188 Hostname: 128-74-64-188.broadband.corbina.ru
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
Russia Tambov, Russia was blocked by firewall at http://www.stewwebb.com/wp-login.php
3/3/2018 12:19:07 PM (2 hours 45 mins ago)
IP: 178.75.73.25 Hostname: 178.75.73.25
Human/Bot: Bot
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/joomla/administrator/index.php
3/3/2018 11:19:31 AM (3 hours 42 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/joomla/robots.txt
3/3/2018 11:19:31 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/administrator/index.php
3/3/2018 11:19:31 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/robots.txt
3/3/2018 11:19:31 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/administrator/index.php
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/robots.txt
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/wp/
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/wordpress/
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/
3/3/2018 11:19:30 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/blog/robots.txt
3/3/2018 11:19:29 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/xmlrpc.php?rsd=
3/3/2018 11:19:29 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/
3/3/2018 11:19:29 AM (3 hours 42 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
United States Columbus, United States was blocked by firewall at http://stewwebb.com/robots.txt
3/3/2018 11:19:28 AM (3 hours 43 mins ago)
IP: 18.217.246.253 Hostname: ec2-18-217-246-253.us-east-2.compute.amazonaws.com
Human/Bot: Bot
Browser: Opera version 36.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/49.0.2623.75 Safari/537.36 OPR/36.0.2130.32
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/wp/
3/3/2018 7:29:16 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/wordpress/
3/3/2018 7:29:16 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/blog/
3/3/2018 7:29:16 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/blog/robots.txt
3/3/2018 7:29:15 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/
3/3/2018 7:29:15 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/xmlrpc.php?rsd=
3/3/2018 7:29:14 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
Japan Tokyo, Japan was blocked by firewall at http://www.stewwebb.com/robots.txt
3/3/2018 7:29:13 AM (7 hours 33 mins ago)
IP: 82.102.28.206 Hostname: 82.102.28.206
Human/Bot: Bot
Browser: Firefox version 50.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:50.0) Gecko/20100101 Firefox/50.0
Type: Blocked
United States Boston, United States was blocked by firewall for Total Security <= 3.3.8 – Persistent XSS at http://stewwebb.com/
3/3/2018 6:40:06 AM (8 hours 22 mins ago)
IP: 174.192.11.151 Hostname: 151.sub-174-192-11.myvzw.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Android
Mozilla/5.0 (Linux; Android 7.0; SM-J727V Build/NRD90M) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/64.0.3282.137 Mobile Safari/537.36
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
??????????????????????????????????
Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Amazon Cyber Attacks Stew Webb Whistleblower Hundreds in 24 hours

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

February 15, 2018

United States Ashburn, United States was blocked for Exceeded the maximum global requests per minute for crawlers or humans. at http://www.stewwebb.com/
2/15/2018 1:53:46 PM (5 minutes ago)
IP: 35.171.223.159 Hostname: ec2-35-171-223-159.compute-1.amazonaws.com
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/535.1 (KHTML, like Gecko) Chrome/13.0.782.112 Safari/535.1

NetRange: 35.152.0.0 – 35.183.255.255
[2097152 addresses in this network]
CIDR: 35.176.0.0/13, 35.152.0.0/13, 35.160.0.0/12 (35.176.0.0 – 35.191.255.255)
[1048576 addresses in this network]
NetName: AT-88-Z
NetHandle: NET-35-152-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2016-08-09
Updated: 2016-08-09
Ref: https://whois.arin.net/rest/net/NET-35-152-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email) Without these we will be unable to identify the correct owner of the IP address at that point in time.
Ref: https://whois.arin.net/rest/org/AT-88-Z

OrgNOCHandle: AANO1-ARIN
OrgNOCName: Amazon AWS Network Operations
OrgNOCPhone: +1-206-266-4064
OrgNOCEmail: amzn-noc-contact@amazon.com
OrgNOCRef: https://whois.arin.net/rest/poc/AANO1-ARIN

OrgAbuseHandle: AEA8-ARIN
OrgAbuseName: Amazon EC2 Abuse
OrgAbusePhone: +1-206-266-4064
OrgAbuseEmail: abuse@amazonaws.com
OrgAbuseRef: https://whois.arin.net/rest/poc/AEA8-ARIN

OrgTechHandle: ANO24-ARIN
OrgTechName: Amazon EC2 Network Operations
OrgTechPhone: +1-206-266-4064
OrgTechEmail: amzn-noc-contact@amazon.com
OrgTechRef: https://whois.arin.net/rest/poc/ANO24-ARIN
@@@@
IP: 35.171.223.159 Hostname: ec2-35-171-223-159.compute-1.amazonaws.com
Are you looking for IPv4 address 35.171.223.159?
IP address 35.171.223.159
Reverse DNS (PTR record) ec2-35-171-223-159.compute-1.amazonaws.com
DNS server (NS record) x4.amazonaws.org (204.13.251.31)
x3.amazonaws.org (208.78.71.31)
x1.amazonaws.com (156.154.64.10)
pdns1.ultradns.net (204.74.108.1)
x2.amazonaws.com (156.154.65.10)
ASN number 14618
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 35.168.0.0/13
35.168.0.0 – 35.175.255.255
NetRange: 35.152.0.0 – 35.183.255.255
CIDR: 35.152.0.0/13, 35.176.0.0/13, 35.160.0.0/12
NetName: AT-88-Z
NetHandle: NET-35-152-0-0-1
Parent: NET35 (NET-35-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 2016-08-09
Updated: 2016-08-09
OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28
206-266-4064
Are you looking for domain amazonaws.com
amazonaws.com
This domain is hosted by Amazon.com, Inc. (AS16509). The first DNS server is u2.amazonaws.com. The current IPv4 address is 72.21.210.29. The mail server with the highest priority is amazon-smtp.amazon.com.
DNS server (NS records) u2.amazonaws.com (156.154.65.10)
u1.amazonaws.com (156.154.64.10)
r1.amazonaws.com (205.251.192.27)
r2.amazonaws.com (205.251.195.199)
Mail server (MX records) amazon-smtp.amazon.com (52.119.213.148)
IP address (IPv4) 72.21.210.29
72.21.206.80
207.171.166.22
IP address (IPv6)
ASN number 16509
ASN name (ISP) Amazon.com, Inc.
IP-range/subnet 72.21.192.0/19
72.21.192.0 – 72.21.223.255
Registry Registrant ID:
Registrant Name: Legal Department
Registrant Organization: Amazon.com, Inc.
Registrant Street: PO BOX 81226
Registrant City: Seattle
Registrant State/Province: WA
Registrant Postal Code: 98108-1226
Registrant Country: US
Domain IPv4 address Ranking Alexa Pagerank
amazonaws.africa
amazonaws.airforce 212.95.239.234 -1
amazonaws.army 212.95.239.234 -1
amazonaws.asia 72.21.206.80 -1
amazonaws.at 213.212.81.71
amazonaws.bid 213.212.81.71 -1
amazonaws.biz 72.21.210.29
amazonaws.blog 213.212.81.71
amazonaws.buzz 72.52.10.14 -1
amazonaws.ca 72.21.210.29
amazonaws.cc 207.171.166.22
amazonaws.ch 213.212.81.71
amazonaws.click 213.212.81.71
amazonaws.cloud 213.212.81.71
amazonaws.club 72.52.10.14 -1
amazonaws.cm 72.21.206.80 -1
amazonaws.cn 72.21.210.29 16,990 -1
amazonaws.co 72.21.206.80 -1
amazonaws.co.in 207.171.166.22
amazonaws.co.kr 72.52.10.14
amazonaws.co.nz 72.21.206.80
amazonaws.co.uk 87.238.85.156 -1
amazonaws.co.za 72.21.206.80
amazonaws.com 207.171.166.22 103 8
amazonaws.com.ar
amazonaws.com.au 207.171.166.22
amazonaws.com.ba 195.222.33.180
amazonaws.com.cn 72.21.206.80 117,065 -1
amazonaws.com.mx 72.21.206.80
amazonaws.com.pl
amazonaws.com.sg 72.21.206.80
amazonaws.com.tw 72.21.206.80
amazonaws.com.vn
amazonaws.consulting 213.212.81.71
amazonaws.de 87.238.81.156 -1
amazonaws.dk 213.212.81.71
amazonaws.download 213.212.81.71
amazonaws.engineer 212.95.239.234
amazonaws.es
amazonaws.eu 87.238.81.156
amazonaws.fr 87.238.85.156 -1
amazonaws.game 213.212.81.71
amazonaws.games
amazonaws.global 213.212.81.71 -1
amazonaws.health 213.212.81.71
amazonaws.help 213.212.81.71
amazonaws.host 213.212.81.71 -1
amazonaws.hosting 213.212.81.71
amazonaws.ie 213.212.81.71
amazonaws.in 207.171.166.22
IPv4 routes
Startip Endip Description Country #domains #spamhosts
46.51.224.0 46.51.255.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,354 1
46.137.192.0 46.137.223.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 1,552 0
46.137.224.0 46.137.255.255 The activity you have detected originates from a dynamic hosting environment. For fastest response, please submit abuse reports at http://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSAbuse For more information regarding EC2 see: http://ec2.amazonaws.com/ All reports MUST include: * src IP * dest IP (your IP) * dest port * Accurate date/timestamp and timezone of activity * Intensity/frequency (short log extracts) * Your contact details (phone and email) Without these we will be unable to i IE 719 0
46.51.128.0 46.51.255.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 32,127 1
46.137.0.0 46.137.255.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 103,187 0
79.125.0.0 79.125.127.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 21,417 0
122.248.192.0 122.248.255.255 Amazon Web Services, Elastic Compute Cloud, EC2, SG SG 2,752 0
175.41.128.0 175.41.191.255 Amazon Web Services, Elastic Compute Cloud, EC2, SG SG 1,566 0
175.41.192.0 175.41.255.255 Amazon Web Services, Elastic Compute Cloud, EC2, JP JP 959 0
46.51.128.0 46.51.191.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 2,947 0
46.51.192.0 46.51.207.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 27,568 0
46.137.0.0 46.137.127.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 65,093 0
46.137.128.0 46.137.191.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 35,823 0
79.125.0.0 79.125.63.255 Amazon Web Services, Elastic Compute Cloud, EC2, EU IE 13,664 0
103.70.216.0 103.70.219.255 No -159-A, Par Mauk Kha Lane, Aung Thiekdi Road, Myagone TSP MM 0 1
182.255.52.0 182.255.55.255 No -159-A, Par Mauk Kha Lane, Aung Thiekdi Road, Myagone TSP MM 0 0
193.108.184.0 193.108.184.255 Prinzregentenstrasse 159 DE 18 0
194.42.47.128 194.42.47.255 Prinzregentenstra?e 159 DE 0 0
213.159.10.0 213.159.11.255 Noop-213-159-10-0-24 US 8 0
213.159.12.0 213.159.13.255 Noop-213-159-12-0-24 US 1 0
213.159.136.0 213.159.143.255 HL-213-159-136-0-22 US 0 0
80.254.159.0 80.254.159.255 ScanSafe LON4 (159) GB 0 0
110.74.159.0 110.74.159.255 AIMS-MY-DIA advertised prefix – 110.74.159.0/24 MY 0 0
182.255.52.0 182.255.52.255 No -159-A, Par Mauk Kha Lane, Aung Thiekdi Road, Myagone TSP MM 0 0
213.159.10.0 213.159.10.255 Noop-213-159-10-0-24 US 8 0
213.159.11.0 213.159.11.255 Noop-213-159-11-0-24 US 0 0
213.159.12.0 213.159.12.255 Noop-213-159-12-0-24 US 1 0
213.159.13.0 213.159.13.255 Noop-213-159-13-0-24 US 0 0
213.159.136.0 213.159.139.255 HL-213-159-136-0-22 US 0 0
213.159.140.0 213.159.143.255 HL-213-159-140-0-22 US 0 0
217.199.159.0 217.199.159.255 AS9129-MNT-217-199-159-0 KE 0 0
27.0.192.0 27.0.195.255 ROOM1405C,14/F.,LUCKY CENTRE,165-171 WANCHAI ROAD HK 1,245 0
45.116.212.0 45.116.215.255 RM1405C 13/F LUCKY CTR 165-171 WANCHAI RD WANCHAI HONG KONG HK 3,620 0
89.34.171.0 89.34.171.255 Noop-89-34-171-0-25 GB 0 0
103.57.24.0 103.57.27.255 RM1405C 13/F LUCKY CTR 165-171 WANCHAI RD WANCHAI HONG KONG HK 1,313 0
103.96.72.0 103.96.75.255 Room1405,14/F Lucky Centre 171 Wanchai road, Wanchai HK 1,337 0
103.197.24.0 103.197.27.255 ROOM1405C,14/F.,LUCKY CENTRE,165-171 WANCHAI ROAD HK 1,007 0
103.208.32.0 103.208.35.255 ROOM1405C,14/F.,LUCKY CENTRE,165-171 WANCHAI ROAD HK 2,509 1
103.242.192.0 103.242.195.255 171 Incorporation IN 0 0
188.215.120.0 188.215.127.255 SuperLink ADSL Service 171 PS 0 0
89.108.171.0 89.108.171.255 89.108.171.0/24 LB 0 0
91.109.171.0 91.109.171.255 Comuni Riuniti XL s.r.l. Net 171 IT 0 0
103.208.32.0 103.208.32.255 ROOM1405C,14/F.,LUCKY CENTRE,165-171 WANCHAI ROAD HK 747 1
103.242.192.0 103.242.192.255 171 Incorporation IN 0 0
103.242.193.0 103.242.193.255 171 Incorporation IN 0 0
103.242.194.0 103.242.194.255 171 Incorporation IN 0 0
103.242.195.0 103.242.195.255 171 Incorporation IN 0 0
188.215.120.0 188.215.123.255 SuperLink ADSL Service 171 PS 0 0
202.1.171.0 202.1.171.255 ADSL Subscribers in 202.1.171.0/24 SB 0 0
176.223.172.0 176.223.175.255 HL-176-223-172-0-23 GB 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2407:780:: 2407:780:ffff:ffff:ffff:ffff:ffff:ffff No -159-A, Par Mauk Kha Lane, Aung Thiekdi Road, Myagone TSP MM 0 0
2604:3ec0:: 2604:3ec0:ffff:ffff:ffff:ffff:ffff:ffff SQUARE COMPUTE LLP US 0 0
2604:3ec0:: 2604:3ec0:fff:ffff:ffff:ffff:ffff:ffff SQUARE COMPUTE LLP US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
132972 171 Incorporation IN 8 0 0 0
394909 SQUARE COMPUTE LLP US 5 1 3 0

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

Bush Illuminati Human Sacrifice Denver June 20-21 2018

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

FBI Raids Satanic Human Sacrifice Video

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism April 18 2010

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Please email or twitter to President Trump


Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Archives


Stew Webb 34 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”