Blog Archives

Radio Stew Webb and Tom Heneghan August 7 2018

Radio Stew Webb and Tom Heneghan August 7 2018

Intel Briefing – Tom Heneghan, Stew Webb (8-7-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much needed and appreciated thank you. – Stew Webb

 

 




Radio Stew Webb and Tom Heneghan June 15 2018

Radio Stew Webb and Tom Heneghan June 15 2018

 

Intel Briefing – Tom Heneghan Stew Webb (6-15-18) from Truth Warriors on Vimeo.

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Radio Stew Webb and Tom Heneghan June 13 2018

Radio Stew Webb and Tom Heneghan June 13 2018

 

Hillary Assassinated Stevens! Heneghan, Webb (6-13-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism

Today April 18, 2018

Timothy Garrison US Attorney Kansas City, Missouri Appointed by US Attorney General Jeff Sessions

By Stew Webb Federal Whistle blower now 34 years

Welcome to the Web site for the U.S. Attorney’s Office in the Western District of Missouri.

U.S. Attorney Timothy A. Garrison is the top-ranking federal law enforcement official in the Western District of Missouri, which includes Kansas City, St. Joseph, Columbia, Jefferson City, Springfield and Joplin.

The office is responsible for prosecuting federal crimes in the district, including crimes related to terrorism, public corruption, child exploitation, firearms, and narcotics. The office also defends the United States in civil cases and prosecutes civil claims for the United States.

Kansas City Main Phone: (816) 426-3122 or toll free at 1-800-733-6558

Kansas City Fax Line: (816) 426-4210

Springfield Main Phone: (417) 831-4406 or toll free at 1-800-347-4493

Springfield Fax Line: (417) 831-0078

Jefferson City Main Phone: (573) 634-8214 or toll free at 1-800-836-3518

Jefferson City Fax Line: (573) 634-8723

Correspondence to the Western District of Missouri, including the U.S. Attorney , may be sent to:

Charles Evans Whittaker Courthouse
U.S. Attorney’s Office
Room 5510
400 East 9th Street
Kansas City, MO 64106

In Springfield:

U.S. Attorney’s Office
Hammons Tower, Suite 500
901 St. Louis
Springfield, MO 65806-2511

In Jefferson City:

U.S. Attorney’s Office
80 Lafayette Street, Suite 2100
Jefferson City, MO 65101

Contact Don Ledford, Public Affairs Officer, at ( 816) 426-4220 or by e-mail at Don.Ledford@usdoj.gov (link sends e-mail)

Letter to Kansas City US Attorney Timothy  Garrison purpose to Prosecute Cyber Terrorism

Certified Mail Sent: Number: add later

Reference Prosecution of Cyber Terrorism here is the evidence:

I also have  3 ½ — 4 years of evidence…

I am writing to inform you of Cyber Attacks against my website stewebb.com, my former telephone – internet company Comcast.net had direct dos attacks killing over 12 modems in 14 months.

I lost 4 computer screens and 2 computers due to these attacks.

I have enclosed links to evidence posted today for your benefit to expedite your prosecutions regarding cyber attacks against me.

Reference Prosecution of Cyber Terrorism here is the evidence:

Evidence of Cyber Attacks against Stew Webb US Federal Whistle blower April 18 2018

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

Cyber Attackers Felonies against Stew Webb Whistle blower April 26 2018
http://www.stewwebb.com/2018/04/26/cyber-attackers-felonies-against-stew-webb-whistle-blower-april-26-2018/

Plus 3 ½ — 4 years of evidence.

Please Note the links below enclosed to President Donald Trump and Attorney General Jeff Sessions

Today April 18, 2018

When may I come to the Grand Jury the Judge Richard Matsch of Denver gave me a standing order in 1995.

Sincerely,

Stewart A. Webb

816-492-9809

Stewart A. Webb

federalwhistleblower@gmail.com

816-492-9809

http://www.stewwebb.com

Stewart A. Webb

_____________________________

S/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 18 2018
http://www.stewwebb.com/2018/04/18/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-18-2018/

Evidence of Cyber Attacks against Stew Webb Federal Whistleblower April 21 2018
http://www.stewwebb.com/2018/04/21/evidence-of-cyber-attacks-against-stew-webb-federal-whistleblower-april-21-2018/

President Trump Stop NSA NAZI Espionage
http://www.stewwebb.com/2018/03/27/president-trump-stop-nsa-nazi-espionage/

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower
http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

Letter to President Trump 2017-02-23 from Whistle blowers
http://www.stewwebb.com/2017/08/28/letter-to-president-trump-2017-02-23-from-whistle-blowers/

Letter to Attorney General Jeff Sessions from Whistle blowers
https://www.stewwebb.com/2017/08/28/letter-to-attorney-general-jeff-sessions-from-whistle-blowers/

Stew Webb Whistle blower sues US Government Assassins P1of2
http://www.stewwebb.com/2018/04/04/stew-webb-whistle-blower-sues-us-government-assassins-p1of2/

US CIA Cyber attacks against Stew Webb Whistle blower February 1, 2018
http://www.stewwebb.com/2018/02/01/us-cia-cyber-attacks-against-stew-webb-whistle-blower/

Evidence:

Stew Webb Grand Jury Demands
http://www.stewwebb.com/2016/03/22/stew-webb-whistleblower-grand-jury-demand-against-hillary-clinton/

 




Robert Mueller involved in FBI Sarasota 9/11 probe cover up

Robert Mueller involved in FBI release of deceptive statements about Sarasota 9/11 probe

By Stew Webb Federal Whistle blower

January 18, 2018

By Dan Christensen, FloridaBulldog.org

A recent government court filing is raising questions about then-FBI Director Robert Mueller’s involvement in the public release of deceptive official statements about a secret FBI investigation of Sarasota Saudis with apparent ties to the 9/11 hijackers.

The misleading statements, issued by FBI officials in Miami and Tampa, were made within days of a September 2011 Florida Bulldog story disclosing the existence of the investigation and reporting that Congress had been kept in the dark about it.

The statements sought to discredit the story, asserting that agents had found no connection between the Sarasota Saudi family and the 9/11 plot. In fact, the FBI’s own files contained at least three reports that said the opposite: that agents found “many connections” between the family and “individuals associated with the terrorist attacks on 9/11/2001.” The FBI released those reports later amid continuing Freedom of Information (FOI) litigation brought by Florida Bulldog.

Mueller, now the special counsel overseeing the investigation into alleged Russian efforts to interfere in the 2016 presidential election, is referenced in a document index created in late November by the FBI at the direction of U.S. District Judge William J. Zloch of Fort Lauderdale. The index was compiled after Zloch asked the FBI to explain where in its complex file system it had located about 80 pages released earlier in the six-year-old FOI case.

The FBI has produced an additional 80,000 classified pages for Zloch’s private inspection. The judge recently indicated he’d completed his three-year review of those records, but has given no hint as to what they say.

Flurry of 9/11 related activities

News of Mueller’s involvement comes amid a flurry of 9/11 related activities, and not just in Fort Lauderdale. Today, January 18, lawyers for thousands of survivors, relatives and other victims of the 2001 al Qaeda terrorist attacks will appear in federal court in New York City to argue against Saudi Arabia’s renewed motion to dismiss their long-running lawsuit against it, and other matters.

Last week in Atlanta, attorneys for Florida Bulldog replied in a federal appeals court to government arguments that seek to block the further release of records of the 9/11 Review Commission. The filing also opposed the FBI’s effort to overturn rulings by Miami U.S. District Judge Cecilia Altonaga that would require the FBI to restore the names of agents and others whose names were redacted from documents released earlier on privacy grounds.

Abdulaziz al-Hijji, right, in Sarasota prior to 9/11 and leaving his London office in 2012 Photo in London by Warren Allot for The Telegraph

In Washington last month, three members of Congress, two Republicans and one Democrat, introduced House Resolution 663 that calls for the declassification of all 9/11 documents “to the greatest extent possible” to allow for a “full public understanding” of what happened.

The index reference to former FBI Director Mueller is contained in an item about a FBI white paper that was written one week after the Bulldog and the Miami Herald simultaneously published the Bulldog’s story about the abrupt departure of Saudis Abdulaziz and Anoud al-Hijji from their Sarasota area home about two weeks before 9/11. The couple left behind their cars, clothes, furniture, jewelry and other personal items.

“It was created to brief the FBI Director concerning the FBI’s investigation of 4224 Escondito Circle,” the al-Hijjis’ address, the index says.

The white paper, titled “Alleged Sarasota Link to 9/11 Hijackers,” is on stationery of the Counterterrorism Division Guantanamo Detainee Prosecution Section 9:11 Prosecution Unit. It was first released in March 2013 and erroneously begins: “The FBI found no evidence that connected the family members mentioned in the Miami Herald article to any of the 9/11 hijackers, nor was any connection found between the family and the 9/11 plot.”

Same day announcement

The same day the white paper was prepared for Director Mueller, Sept. 15, 2011, FBI Tampa Public Affairs Officer David Couvertier sent a similarly worded email to the Tampa Bay Times on behalf of Special Agent in Charge Steven E. Ibison: “At no time did the FBI develop evidence that connected the family members to any of the 9/11 hijackers as suggested in the article, and there was no connection found to the 9/11 plot.”

Florida Bulldog’s Miami attorney, Thomas Julin, filed court papers last week asserting a “red flag” has been raised in the case by disclosure of the FBI director’s involvement.

“That Mueller received a briefing about the Sarasota investigation suggests that the issues the Bulldog raised required the attention of the FBI’s highest authority,” Julin wrote.

The circumstances further suggest that Director Mueller approved the deception in which the FBI engaged.

Mueller did not respond to questions emailed to his office on Tuesday.

The two-page white paper, not attributed to any individual, is likewise interesting for what it did not tell Mueller. For example, it made no mention of the 2002 FBI reports stating that “many connections” were found between the al-Hijjis and the 9/11 hijackers. Nor did it discuss whether the FBI withheld the results of its Sarasota investigation from Congress, as former Florida Sen. Bob Graham, co-chair of Congress’ Joint Inquiry into 9/11, has said under oath.

The provenance of the “Guantanamo” white paper is also curious. While the source of the document is undoubtedly the FBI,  a second altered version was released to Florida Bulldog last year amid another FOI lawsuit seeking records of the 9/11 Review Commission that is now on appeal by both sides. The reference in the heading that indicates the document was generated by Guantanamo’s 9/11 prosecution unit is missing. No explanation for the differences was given.

The white paper appears to have been written in response to a Sept. 14, 2011 request for information about the Sarasota investigation made by Sen. Patrick Leahy, D-VT, then chairman of the Senate Judiciary Committee, to Mueller and then-Attorney General Eric Holder.

More than two months later, on Nov. 22, Assistant Attorney General Ronald Weich sent Leahy a response that perpetuated the FBI’s deception about its Sarasota findings:

“Contrary to suggestions in media reports, the FBI did not develop any evidence that connected the family members to any of the 9/11 hijackers or to the 9/11 plot.”

Related posts:

  1. FBI says again it found no ties between Sarasota Saudis and 9/11 hijackers; won’t release details
  2. Bob Graham: FBI hindered Congress’s 9/11 inquiry, withheld reports about Sarasota Saudis
  3. Graham: FBI’s public statements are in conflict with still secret records of Sarasota 9/11 probe
  4. U.S. judge asked to okay deposition of FBI agent in Sarasota Saudi probe
  5. FBI slams own 9/11 document; New report discounts Sarasota Saudis ties to hijackers

 

http://www.floridabulldog.org/911-articles/

Florida Bulldog

http://www.floridabulldog.org/

Dan Christensen

dchristensen@browardbulldog.org

Related

911 related lawsuit

Lawsuit #1 – On September 5, 2012, Broward Bulldog — now Florida Bulldog — filed a Freedom of Information Act lawsuit in federal court in Fort Lauderdale against the Department of Justice and the FBI. The 25-page FOIA complaint seeks records of an FBI investigation involving a Saudi family, former residents of Sarasota, who may have provided aid or assistance to the 9/11 hijackers.

Lawsuit #2 – On June 15, 2016, the Bulldog again sued the FBI and Justice Department – this time seeking records about the FBI 9/11 Review Commission. Those records include the commission’s efforts to discredit an April 2002 FBI report released under the Freedom of Information Act that corroborated earlier reporting about the Saudi family’s quick exit from their Sarasota home two weeks before the attacks and their apparent ties to the 9/11 hijackers.

Mandatory Declassification Review – Florida Bulldog Editor Dan Christensen and 9/11 authors Anthony Summers and Robbyn Swan are also pursuing what’s known as a Mandatory Declassification Review of 28 pages that were censored from the report to the nation by Congress’s Joint Inquiry into the terrorist attacks. Those pages involve “specific sources of foreign support” for the hijackers while they were in the U.S. The matter, filed in 2013, is before the Interagency Security Classification Appeals Panel. CASE CLOSED JANUARY 2017. Key documents from the Mandatory Declassification Review and FOIA cases are below.

FOIA LAWSUIT #2  (9/11 Review Commission):

**New**  6/2/17 – Joint Status Report Regarding the Conclusion of this Case

6/2/17 – Motion for Reconsideration of Court’s Order Denying Defendants’s Motion for Summary Judgement

6/2/17 – Exhibit 1 to Motion for Reconsideration

5/16/17 – Order Granting in Part and Denying in Part Motions for Summary Judgment

3/28/17 – Plaintiffs Opposition to Motion for Summary Judgment on Count 1

3/14/17 – Defendants Motion for Summary Judgment on Count I

2/27/17 – Order Granting in Part and Denying in Part Motion for Partial Summary Judgment

1/19/17 – Defendants’ Reply to Response to Motion for Summary Judgment on Counts 2 and 3

1/13/17 – Plaintiffs Memo in Opposition to Defendants Motion for Summary Judgment on Counts 2 and 3  Hearing set for Feb. 7,  8 a.m. before Miami U.S. District Court Judge Cecilia Altonaga

1/13/17 – Declaration of Dan Christensen Exhibits removed due to large file

1/13/17 – Declaration of Terry Strada

**New** – 12/31/16 – Defendants Motion for Summary Judgment on Counts 2 and 3

12/31/16 – DE-27-1 Second Declaration of David M. Hardy

12/20/16 – Government Motion to Continue Trial denied

8/10/16 – Order Cancelling Mediation

8/3/16 – Scheduling Order

7/25/16 – Answer and Affirmative Defenses

6/15/16 — Complaint

MANDATORY DECLASSIFICATION REVIEW (28 pages and underlying documents):

**New** 1/13/17  — ISCAP Release of the 28 Pages Part1  With asserted reasons for each redaction                               ISCAP Release of the 28 PagesPart2   ISCAP Release of the 28 PagesPart3

CASE CLOSED

7/15/16 – 28pages released by President Obama. ISCAP proceedings continue regarding underlying FBI, CIA documents

10/1/14 — Letter to ISCAP from Members of Congress

7/15/14 — Letter from John P. Fitzpatrick regarding ISCAP Appeal 

7/10/14 — Appeal to Interagency Classification Appeals Panel (ISCAP) regarding the 28 pages

7/3/14 — Letter from David M. Hardy (FBI) Denying Request for a Mandatory Declassification Review

3/17/14 — Review Committee will hear appeal

2/13/14 — Request for Declassification Review Committee Determination

12/3/13 — H. Res. 428 -Congressmen urge Obama to declassify 28 pages from censored 9/11 report

10/2/13 — 9/11 Families press release 

6/26/13 — DOJ Response to Request for Mandatory Declassification Review

6/20/13 — 9/11 Families Letter to President Obama

6/10/13 — Request to White House to release 28 censored page from Congress’s report on 9/11

6/10/13 — Request to Department of Justice for Mandatory Declassification Review of the 28 pages

FOIA LAWSUIT #1 (FBI’s Sarasota investigation):

**NEW** 3/31/17 – Order on Interim Motion for Attorneys Fees

8/8/16 – Defense Notice of Declassification

5/31/16 – Interim motion for attorney fees

5/31/16 – Declaration of Thomas R. Julin

3/22/16 – Paperless order by Judge William J. Zloch denying 4/24/15 motion for status conference and to depose FBI agent

5/11/15 – FBI response to request to depose FBI agent

4/24/15 — Request to depose FBI agent

7/1/14 —Document release #4. 11 pages.

6/6/14 — Fourth Hardy Declaration Document Release #3. 31 pages.

5/9/14 — Third Hardy Declaration   Document Release #2.  4 pages.

5/1/14 — Defendants Notice of In Camera Filing-boxes

4/18/14 — Order Denying Motion for Reconsideration and Defendants Notice of In Camera Filing

4/17/14 — Government’s Motion for Reconsideration and Second Hardy Declaration

4/6/14 — Further Order on Motion to Compel

4/4/14 Order Compelling Better Search

3/26/14 — Newspapers’ amicus brief

3/20/14 — Order granting leave to file amicus brief

10/9/13 — Government motion opposing the filing of an Amicus brief by The Miami Herald

9/27/13 — Miami Herald Motion for Leave to File Amicus Curiae Brief

9/13/13– Sarasota Herald Tribune Motion to Intervene

8/15/13 — Our Reply to Government’s Response to Motion to Compel

8/7/13 — Government’s Response to Motion to Compel

7/19/13 — Our Motion to Compel Additional Search

7/12/13 — Order from Pretrial Conference

6/28/13 — Order Denying Defendants Motion to Dismiss Complaint

6/19/13 — Defendants Motion for Protective Order

6/26/13 — Joint Pretrial Stipulation

7/6/13 — Plaintiffs Opposition to Motion for Protective Order

6/10/13 — Government’s Reply to Memorandum in Opposition

5/31/13 — Our Memorandum in Opposition to Summary Judgment

5/13/14 — The Government’s Motion for Summary Judgment   Government Exhibits

3/29/13 — FBI Document Release — #1. 35 pages.

12/13/12 — The Government’s Reply to our Memorandum in Opposition to Dismissal

12/3/12 — Our Response in Opposition to the Motion to Dismiss the Complaint

11/19/12 — The Government’s Motion to Dismiss 

9/5/12 Our FOIA complaint

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Radio Stew Webb and Tom Heneghan March 2 2018

Radio Stew Webb and Tom Heneghan March 2 2018

http://www.vimeo.com/truthwarriors

Intel Report – Tom Heneghan, Stew Webb (3-2-18) from Truth Warriors on Vimeo.

 Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Fort Huachuca Arizona Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Fort Huachuca Arizona Cyber Attacks against Stew Webb Whistleblower

United States visited http://www.stewwebb.com/
2/8/2018 4:07:24 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States Fort Huachuca, United States visited http://www.stewwebb.com/
2/8/2018 4:07:21 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
2/8/2018 4:07:18 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
2/8/2018 4:07:16 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States Fort Huachuca, United States visited http://www.stewwebb.com/
2/8/2018 4:07:12 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: Bot
United States Fort Huachuca, United States visited http://www.stewwebb.com/
2/8/2018 4:07:09 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152.png
2/8/2018 4:07:06 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
MobileSafari/604.1 CFNetwork/894 Darwin/17.4.0
Type: 404 Not Found
United States Fort Huachuca, United States tried to access non-existent page http://www.stewwebb.com/apple-touch-icon-152×152-precomposed.png
2/8/2018 4:07:03 PM (4 minutes ago)
IP: 63.237.15.162 Hostname: 63-237-15-162.dia.static.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
NetRange: 63.236.0.0 – 63.239.255.255
[262144 addresses in this network]
CIDR: 63.236.0.0/14 (63.236.0.0 – 63.239.255.255)
[262144 addresses in this network]
NetName: QWEST-INET-9
NetHandle: NET-63-236-0-0-1
Parent: NET63 (NET-63-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 1999-11-19
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment: NOTE: For abuse issues, please email abuse@qwest.net.
Ref: https://whois.arin.net/rest/net/NET-63-236-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email abuse@centurylinkservices.net
Comment:
Comment: All abuse reports MUST include:
Comment: * src IP
Comment: * dest IP (your IP)
Comment: * dest port
Comment: * Accurate date/timestamp and timezone of activity
Comment: * Intensity/frequency (short log extracts)
Comment: * Your contact details (phone and email)
Comment: Without these we will be unable to identify the correct owner of the IP address at that point in time.
Comment:
Comment: For subpoena or court order please fax 844.254.5800 or refer to our Law Enforcement Support page https://www.centurylink.com/static/Pages/AboutUs/Legal/LawEnforcement/
Ref: https://whois.arin.net/rest/org/QCC-18

OrgTechHandle: QIA-ARIN
OrgTechName: Qwest IP Admin
OrgTechPhone: +1-877-886-6515
OrgTechEmail: ipadmin@centurylink.com
OrgTechRef: https://whois.arin.net/rest/poc/QIA-ARIN

OrgAbuseHandle: CAD54-ARIN
OrgAbuseName: Centurylink Abuse Desk
OrgAbusePhone: +1-877-886-6515
OrgAbuseEmail: abuse@centurylinkservices.net
OrgAbuseRef: https://whois.arin.net/rest/poc/CAD54-ARIN
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Are you looking for IPv4 address 63.237.15.162?
IP address 63.237.15.162
Location Fort Huachuca, Arizona, United States (US) flag
Registry arin
IP address 63.237.15.162
Reverse DNS (PTR record) 63-237-15-162.dia.static.qwest.net
DNS server (NS record) authns1.qwest.net (63.150.72.4)
authns2.qwest.net (208.44.130.120)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
@@@@@@@@@@???????????
Number of SPAM hosts on 63.224.0.0/12 7
Domains around 63.237.15.162
IP address #domains
63.237.15.218 1
IP address 63.237.15.218
Reverse DNS (PTR record) 63-237-15-218.dia.static.qwest.net
DNS server (NS record) authns2.qwest.net (208.44.130.120)
authns1.qwest.net (63.150.72.4)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
@@@@@@@@@@@@@
?????????????
Mail server Tools
wemeantrucks.net
This domain is hosted by Qwest Communications Company, LLC (AS209). The first DNS server is ns22.domaincontrol.com. The current IPv4 address is 63.237.15.218. The mail server with the highest priority is wemeantrucks.net.
DNS server (NS records) ns22.domaincontrol.com (208.109.255.11)
ns21.domaincontrol.com (216.69.185.11)
Mail server (MX records) wemeantrucks.net (63.237.15.218)
IP address (IPv4) 63.237.15.218
IP address (IPv6)
ASN number 209
ASN name (ISP) Qwest Communications Company, LLC
IP-range/subnet 63.224.0.0/12
63.224.0.0 – 63.239.255.255
Domain Name: WEMEANTRUCKS.NET
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Bright Farms
Name Server: NS21.DOMAINCONTROL.COM
Name Server: NS22.DOMAINCONTROL.COM
DNSSEC: unsigned

qwest.net

NetRange: 63.237.15.160 – 63.237.15.175
CIDR: 63.237.15.160/28
NetName: Q0819-63-237-15-160
NetHandle: NET-63-237-15-160-1
Parent: QWEST-INET-9 (NET-63-236-0-0-1)
NetType: Reassigned
OriginAS: AS209
Organization: SIX CONTINENTS HOTELS INC (SCH-158)
RegDate: 2014-08-19
Updated: 2014-08-19
Ref: https://whois.arin.net/rest/net/NET-63-237-15-160-1

OrgName: SIX CONTINENTS HOTELS INC
OrgId: SCH-158
Address: 1175 SMITH AVE
City: FORT HUACHUCA
StateProv: AZ
PostalCode: 85613
Country: US
RegDate: 2014-05-28
Updated: 2014-05-28
Ref: https://whois.arin.net/rest/org/SCH-158

OrgAbuseHandle: HARRI383-ARIN
OrgAbuseName: Harrison, Brian
OrgAbusePhone: removed phone number
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/HARRI383-ARIN

OrgTechHandle: HARRI383-ARIN
OrgTechName: Harrison, Brian
OrgTechPhone: removed phone number
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/HARRI383-ARIN
770-604-5000
etRange: 63.236.0.0 – 63.239.255.255
CIDR: 63.236.0.0/14
NetName: QWEST-INET-9
NetHandle: NET-63-236-0-0-1
Parent: NET63 (NET-63-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Qwest Communications Company, LLC (QCC-18)
RegDate: 1999-11-19
Updated: 2012-02-24
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment: NOTE: For abuse issues, please email removed email address.
Ref: https://whois.arin.net/rest/net/NET-63-236-0-0-1

OrgName: Qwest Communications Company, LLC
OrgId: QCC-18
Address: 100 CENTURYLINK DR
City: Monroe
StateProv: LA
PostalCode: 71203
Country: US
RegDate: 2005-05-09
Updated: 2017-01-28
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment: For abuse issues, please email removed email address
Comment:

############
?????????????????
ihg.com

qwest.com

centurylinkservices.net

Are you looking for domain qwest.net?

63-237-15-162.dia.static.qwest.net
qwest.adult -1
qwest.at 213.33.99.173
qwest.be 178.32.40.97
qwest.biz 72.52.4.119
qwest.ca 155.70.44.175
qwest.cn 23.27.192.117
qwest.co
qwest.co.in 155.70.44.175
qwest.co.jp 219.94.180.181
qwest.co.uk 77.104.129.127 1
qwest.co.za 41.78.28.120
qwest.com 155.70.44.175 7
qwest.com.au 203.88.117.81
qwest.com.cn 23.27.192.117
qwest.cz 217.198.118.96 1
qwest.de 176.9.83.229
qwest.es 94.23.39.143
qwest.eu 217.198.116.188
qwest.fr
qwest.hu 193.226.221.130
qwest.in 155.70.44.175
qwest.info 72.52.4.119
qwest.io 216.239.32.21
qwest.it 185.53.179.8
qwest.jobs 155.70.44.175 -1
qwest.me 69.7.187.140
qwest.mobi 155.70.44.175 5
qwest.net 204.147.80.94 4
qwest.nl 109.106.167.8
qwest.no 213.162.241.97
qwest.online 194.58.112.173
qwest.org 204.147.80.81 -1
qwest.pl
qwest.porn
qwest.pro 194.58.112.173
qwest.properties 184.168.221.37
qwest.realty 69.172.201.153
qwest.ro 155.70.44.175 -1
qwest.ru 185.53.179.40
qwest.se 195.74.38.123
qwest.sex
qwest.shop 88.214.207.96
qwest.su 185.53.178.9
qwest.tv 164.132.235.17
qwest.us 155.70.44.175 7
qwest.xxx 199.253.28.9
qwest.xyz 69.172.201.153
qwest-affinity.com 216.74.33.70 -1
qwest-brentford.com 79.125.4.228
qwest-business.com
IPv4 routes
Startip Endip Description Country #domains #spamhosts
110.74.162.0 110.74.162.255 AIMS-MY-DIA advertised prefix – 110.74.162.0/24 MY 0 0
210.17.162.0 210.17.163.255 210.17.162.0/23 HK 0 0
77.81.162.0 77.81.163.255 Noop-77-81-162-0-23 EU 0 0
85.111.27.0 85.111.27.255 izzet Pasa Mah Abide-i Hurriyet Cad No 162 Caglayan Sisli 34387 ISTANBUL TR 20 0
85.204.162.0 85.204.163.255 Noop-85-204-162-0-23 EU 0 0
89.108.162.0 89.108.162.255 89.108.162.0/24 LB 0 0
92.114.44.0 92.114.47.255 SuperLink ADSL Service 162 PS 0 0
185.45.162.0 185.45.162.255 VCHS-185-45-162-0 GB 1 0
185.45.163.0 185.45.163.255 VCHS-185-45-162-0 GB 7 0
196.44.227.0 196.44.227.255 BCSnet 162 Anderson Street Dialup POP ZA 0 0
202.1.162.0 202.1.162.255 ADSL Subscribers in 202.1.162.0/24 SB 0 0
213.214.162.0 213.214.162.255 fuj-fin-k5-162 FI 0 0
217.168.162.0 217.168.162.255 Bellnet Ltd. 217.168.162 MT 2 0
220.247.162.0 220.247.162.255 220.247.162.0/24 BTS BD 5 0
91.237.66.0 91.237.67.255 NAMEISP-DATACENTER-WEST 91.237.66.0/24 SE 17,619 0
103.207.116.0 103.207.119.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 385 0
121.46.80.0 121.46.83.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
185.237.32.0 185.237.35.255 RB PA 185.237.32.0/24 DE 1 0
212.237.224.0 212.237.227.255 Noop-212-237-224-0-23 GB 0 0
5.105.236.0 5.105.239.255 TRINITY-CLNTS-BLOCK-237 UA 0 0
85.233.207.0 85.233.207.255 87.237.184.0/21 FR 0 0
91.237.66.0 91.237.66.255 NAMEISP-DATACENTER-WEST 91.237.66.0/24 SE 17,619 0
91.237.67.0 91.237.67.255 NAMEISP-DATACENTER-WEST 91.237.66.0/24 SE 0 0
103.207.116.0 103.207.116.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
103.207.119.0 103.207.119.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 51 0
121.46.80.0 121.46.80.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
121.46.81.0 121.46.81.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
121.46.82.0 121.46.82.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
121.46.83.0 121.46.83.255 Tern Centre, No.237, Queen’s Rd Center, Central District HK 0 0
185.237.32.0 185.237.32.255 RB PA 185.237.32.0/24 DE 0 0
212.101.237.0 212.101.237.255 212.101.237.0/23 LB 0 1
212.101.238.0 212.101.238.255 212.101.237.0/23 LB 0 0
212.237.224.0 212.237.224.255 Noop-212-237-224-0-23 GB 0 0
212.237.225.0 212.237.225.255 Noop-212-237-224-0-23 GB 0 0
212.237.226.0 212.237.226.255 Noop-212-237-226-0-23 GB 0 0
212.237.227.0 212.237.227.255 Noop-212-237-226-0-23 GB 0 0
115.249.0.0 115.249.255.255 RCOM-Static-DIA IN 455 57
115.249.0.0 115.249.3.255 RCOM-Static-DIA IN 4 0
115.249.4.0 115.249.7.255 RCOM-Static-DIA IN 0 2
115.249.8.0 115.249.11.255 RCOM-Static-DIA IN 0 2
115.249.12.0 115.249.15.255 RCOM-Static-DIA IN 1 1
115.249.16.0 115.249.19.255 RCOM-Static-DIA IN 7 4
115.249.20.0 115.249.23.255 RCOM-Static-DIA IN 14 0
115.249.24.0 115.249.27.255 RCOM-Static-DIA IN 2 0
115.249.28.0 115.249.31.255 RCOM-Static-DIA IN 5 0
115.249.32.0 115.249.35.255 RCOM-Static-DIA IN 2 1
115.249.36.0 115.249.39.255 RCOM-Static-DIA IN 9 2
115.249.40.0 115.249.43.255 RCOM-Static-DIA IN 3 1
115.249.44.0 115.249.47.255 RCOM-Static-DIA IN 3 0
115.249.48.0 115.249.51.255 RCOM-Static-DIA IN 2 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a05:ccc0:: 2a05:ccc7:ffff:ffff:ffff:ffff:ffff:ffff Dia Elektronik Bilgisayar Mekanik ve Tibbi Cihazlar san tic ltd sti TR 0 0
2a07:39c0:: 2a07:39c7:ffff:ffff:ffff:ffff:ffff:ffff End user static IP address DK 0 0
2a0a:f880:: 2a0a:f887:ffff:ffff:ffff:ffff:ffff:ffff End user static IP address DK 0 0
2a02:2d00:30:: 2a02:2d00:30:ffff:ffff:ffff:ffff:ffff Weepee static ipv6 BE 0 0
2a02:8400:a:: 2a02:8400:a:ffff:ffff:ffff:ffff:ffff Static IP FR 0 0
2a02:8400:709:: 2a02:8400:709:ffff:ffff:ffff:ffff:ffff Static IP FR 0 0
2a02:8410:1:: 2a02:8410:1:ffff:ffff:ffff:ffff:ffff Static IP FR 0 0
2001:428:: 2001:428:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 151 0
2405:3e00:: 2405:3e00:ffff:ffff:ffff:ffff:ffff:ffff Qwest International HK 0 0
2602:: 2602:ff:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 80 0
2606:5000:: 2606:5000:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2a02:29c8:: 2a02:29c8:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications International Limited GB 0 0
2001:428:902:: 2001:428:902:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 1 0
2001:428:b20:: 2001:428:b20:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:b21:: 2001:428:b21:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 120 0
2001:428:c0c:: 2001:428:c0c:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:1003:: 2001:428:1003:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:2003:: 2001:428:2003:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:2004:: 2001:428:2004:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:2501:: 2001:428:2501:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:3807:: 2001:428:3807:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:380f:: 2001:428:380f:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4003:: 2001:428:4003:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4004:: 2001:428:4004:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4401:6:: 2001:428:4401:6:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4403:: 2001:428:4403:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4407:: 2001:428:4407:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:4803:: 2001:428:4803:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:5803:: 2001:428:5803:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:9e03:: 2001:428:9e03:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:e000:: 2001:428:efff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2001:428:f000:: 2001:428:ffff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2606:5000:2800:: 2606:5000:29ff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2606:5000:3e00:: 2606:5000:3fff:ffff:ffff:ffff:ffff:ffff Qwest Communications Company, LLC US 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 12 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 5 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 2 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
395743 Static 1 LLC US 2 0 0 0
209 Qwest Communications Company, LLC US 1,940 17 65,816 443
3908 Qwest Communications Company, LLC US 11 2 2 0
3909 Qwest Communications Company, LLC US 30 0 2 0
3910 Qwest Communications Company, LLC US 19 4 13 0
4015 Qwest Corporation US 4 1 109 0
4911 Qwest Communications Company, LLC US 7 0 7 0
6223 Qwest Communications Company, LLC US 3 1 0 0
6640 Qwest Communications Company, LLC US 29 0 2,588 0
7359 Qwest Corporation US 4 1 92 0
12714 Net By Net Holding LLC RU 193 2 4,005 74
20911 Net-Surf.net Ltd. BG 28 0 69 12
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 49 0
819 LARG*net CA 21 1 166 0
1618 Daytona Net Works, Inc. US 2 0 252 1
1886 BT NET d.o.o. za trgovinu i usluge HR 6 8 20 2
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
2527 So-net Entertainment Corporation JP 49 2 4,021 16
3254 Lucky Net Ltd UA 4 0 2,373 0
3263 Erfan Net Fars Internet and Support Services Company PJSC IR 1 0 0 2
3595 Global Net Access, LLC US 37 3 91,367 13
3931 Logical Net Corporation US 6 0 744 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,844 22
4776 A-Net Co., Ltd. TH 35 1 147 2
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 385 13 33,876 741
5405 CSO.net Internet Services GmbH AT 1 1 3,955 0
5541 SC AD NET MARKET MEDIA SRL RO 23 3 676 7
6364 Atlantic.net, Inc. US 47 5 18,807 1
6381 BellSouth.net Inc. US 7 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 12 0 4 0
6389 BellSouth.net Inc. US 1,938 0 11,120 12
6624 Gower.Net US 2 0 27 0
6735 sdt.net AG DE 6 0 301 1
6831 Net & Com s.r.l. IT 2 1 649 0
6911 Pro-Net Internet Services Limited GB 4 0 165 0
7106 Com Net, Inc. US 9 1 964 0
7146 Georgia Business Net, Inc US 2 0 44 0
7175 aussie.net Pty Limited AU 2 3 0 0
7350 MetComm.Net, LLC US 1 0 38 0
7403 Colba Net Inc. CA 9 0 289 0
7600 Escape.net AU 54 4 518 0
7641 China Broadcasting TV Net CN 9 0 51 0

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Melbourne Australia Synergy Wholesale cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Melbourne Australia SYNERGY WHOLESALE cyber attacks against Stew Webb Whistle blower

Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (13 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)

@@@@@@@@@@@@@@@@@@@@@@@@
Scan wordfence Feb 8, 2018

File appears to be malicious: wp-content/deleteme.da2e7232dcfb448fb7e852be8d960503.php
Type: File
Issue Found 2018/02/08 6:23 pm
Critical
Ignore
Details

Filename: wp-content/deleteme.da2e7232dcfb448fb7e852be8d960503.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “eval(base64_decode(“. The infection type is: Suspicious eval with a base64_decode.

Success deleting file
The file wp-content/deleteme.da2e7232dcfb448fb7e852be8d960503.php was successfully deleted.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Eden Prairie, United States visited http://www.stewwebb.com/ deleteme.wppqbb.php
2/11/2018 10:12:42 PM (7 minutes ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
@@@@@@@@@@@@@@@@@@@@
https://wordpress.org/search/deleteme.wppqbb.php
Topic Tag: deleteme « WordPress.org Forums
DeleteMe malicious file should I remove it? Started by: heroz. 2; 1; 1 year, 5 months ago · Steve Stern · WordPress file added deleteme.wp#######.php. Started by: wrowlands. 2; 1; 2 years, 9 months ago · dwinden · Log in from user ” deleteme”. Started by: veggiesdontbite. 2; 2; 2 years, 10 months ago · veggiesdontbite.
https://wordpress.org/support/topic-tag/deleteme/

Topic
Voices
Replies
Last Post

DeleteMe malicious file should I remove it?

Started by: heroz
2
1
1 year, 5 months ago

Steve Stern

WordPress file added deleteme.wp#######.php

Started by: wrowlands
2
1
2 years, 9 months ago

dwinden

Log in from user “deleteme”

Started by: veggiesdontbite
2
2
2 years, 11 months ago

veggiesdontbite

http://www.example.com/wp-content/deleteme

Started by: connectit
2
1
2 years, 11 months ago

Michael

What is this deleteme file and should I delete it?

Started by: skubeedoo
4
6
2 years, 8 months ago

marialulis

connectit

(@connectit)

2 years, 11 months ago

I was editing my footer in wordpress and edited the footer.php and functions.php and after updating the page I could no longer get access to my login and every time I go to log in it comes up with this: “http://www.example.com/wp-content/deleteme” with a long list of numbers and letters at the end.

I know exactly what I added to the functions.php and know I just need to delete that, however I can’t get into my wordpress to do so. All I get is a white blank screen.

How do I go about accessing this .php? Is there anyway it can edited in files -> file manager?
@@@@@@@@@@
Michael

(@alchymyth)

2 years, 11 months ago

review http://codex.wordpress.org/FTP_Clients
you will need to use FTP to access the files, or for example to rename the folder of your currently used theme, which should activate the default theme and allow you back into the dashboard to edit your files.

you will then need to change the folder name to its original, and re-activate your theme.

@@@@@@@@@@@@@@@@@

DeleteMe malicious file should I remove it?

heroz

(@heroz)

1 year, 5 months ago

I got this error message when I ran wordfence:
This file may contain malicious executable code: …/wp-content/deleteme.########################.php

What is this file and what action should I take?

>>>Image<<
Steve Stern

(@sterndata)

Guardian of the Interwebs

1 year, 5 months ago

Delete it, but understand that deleting it does not mean your system is clean. It got there somehow.

You need to start working your way through these resources:

https://codex.wordpress.org/FAQ_My_site_was_hacked
https://wordpress.org/support/topic/268083#post-1065779
http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/
http://ottopress.com/2009/hacked-wordpress-backdoors/

Additional Resources:

http://sitecheck.sucuri.net/scanner/
http://www.unmaskparasites.com/
https://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html

@@@@@@@@@@@@@@@@@@@@@@@@@@@
Steve Stern

(@sterndata)

Guardian of the Interwebs

1 year, 5 months ago

Delete it, but understand that deleting it does not mean your system is clean. It got there somehow.

You need to start working your way through these resources:

https://codex.wordpress.org/FAQ_My_site_was_hacked
https://wordpress.org/support/topic/268083#post-1065779
http://smackdown.blogsblogsblogs.com/2008/06/24/how-to-completely-clean-your-hacked-wordpress-installation/
http://ottopress.com/2009/hacked-wordpress-backdoors/

Additional Resources:

http://sitecheck.sucuri.net/scanner/
http://www.unmaskparasites.com/
https://blog.sucuri.net/2012/03/wordpress-understanding-its-true-vulnerability.html

dwinden

(@dwinden)

2 years, 9 months ago

A google search on deleteme.xxxx.php returned quite some info.
The files are created by a piece of software named Installatron that looks to be a tool offered by hosting providers who have ‘one click’ installations of software, like wordpress, joomla , etc
Anyway this is not an iTSec plugin issue.

dwinden
skubeedoo

(@skubeedoo)

3 years, 5 months ago

I got this error message when I ran wordfence:
This file may contain malicious executable code: …/wp-content/deleteme.########################.php

What is this file and what action should I take?

Wordfence Security – Firewall & Malware Scan

WFSupport

(@wfsupport)

3 years, 5 months ago

Hi

Great question! Thanks for asking. I found several references online to those files being created by Installatron that looks to be a tool offered by hosting providers who have ‘one click’ installations of software, like wordpress, joomla , etc. Does your hosting provider use that software? Check your control panel and let us know. You could send me a zipped copy of that file to tim [at] wordfence.com and I could take a look and see whats in it and offer an opinion.

Thanks!

tim

I hope WFSupport is still around so you can help me out. Or anyone.

My site is: http://www.ellaletraduce.co

I have made a number of mistakes (newbie with all of this) and I ended up uninstalling and deleting wordpress and installing it again.

I have a godaddy account and yes, through cPanel I am able to do the one-click installation with Installatron.

After installing it, I should be able to enter my WordPress dashboard, but when I go to wp-admin it redirects to http://www.ellaletraduce.co/wp-content/deleteme. and a bunch of numbers.

Also, when I try to go to wp-login.php it never loads and Firefox then shows me the message that “the connection has timed out”.

I would really appreciate it if you could help me out in any way.

@@@@@@@@@@@@@@@@@@@@@@@@@
Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (13 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
% Information related to ‘103.252.152.0 – 103.252.155.255’
[1024 addresses in this network]
% Abuse contact for ‘103.252.152.0 – 103.252.155.255’ is ‘noc@synergywholesale.com’
[1024 addresses in this network]
inetnum: 103.252.152.0 – 103.252.155.255
[1024 addresses in this network]
netname: SYNERGYWHOLESALE-AP
descr: SYNERGY WHOLESALE PTY LTD
descr: Suite 105
descr: 66 Victor Crescent
descr: Narre Warren VIC 3805
country: AU
org: ORG-SWPL1-AP
admin-c: SWN3-AP
tech-c: SWN3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-SYNERGYWHOLESALE
mnt-routes: MAINT-AU-SYNERGYWHOLESALE
mnt-irt: IRT-SYNERGYWHOLESALE-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:03:48Z
source: APNIC

irt: IRT-SYNERGYWHOLESALE-AU
address: PO Box 119
address: Beaconsfield VIC 3807
address: Australia
e-mail: noc@synergywholesale.com
abuse-mailbox: noc@synergywholesale.com
admin-c: SWN3-AP
tech-c: SWN3-AP
auth: # Filtered
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2013-10-17T01:49:54Z
source: APNIC

organisation: ORG-SWPL1-AP
org-name: SYNERGY WHOLESALE PTY LTD
country: AU
address: Suite 105
address: 66 Victor Crescent
phone: +61 3 9013 8464
fax-no: +61 3 8080 6481
e-mail: noc@synergywholesale.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:24Z
source: APNIC

person: Synergy Wholesale NOC
address: PO BOX 119
Beaconsfield VIC 3807
country: AU
phone: +61.390138464
fax-no: +61.380806481
e-mail: noc@synergywholesale.com
nic-hdl: SWN3-AP
notify: noc@synergywholesale.com
abuse-mailbox: abuse@synergywholesale.com
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2016-08-05T03:30:38Z
synergywholesale.com

Type: Bot
@@@@@@@@@@@@@@@@@@
Australia Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (16 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
Type: Bot
@@@@@@@@@@@@@@
Hacker Post
and info above delete me code
left off
installatron
Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (13 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
% Information related to ‘103.252.152.0 – 103.252.155.255’
[1024 addresses in this network]
% Abuse contact for ‘103.252.152.0 – 103.252.155.255’ is ‘noc@synergywholesale.com’
[1024 addresses in this network]
inetnum: 103.252.152.0 – 103.252.155.255
[1024 addresses in this network]
netname: SYNERGYWHOLESALE-AP
descr: SYNERGY WHOLESALE PTY LTD
descr: Suite 105
descr: 66 Victor Crescent
descr: Narre Warren VIC 3805
country: AU
org: ORG-SWPL1-AP
admin-c: SWN3-AP
tech-c: SWN3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-SYNERGYWHOLESALE
mnt-routes: MAINT-AU-SYNERGYWHOLESALE
mnt-irt: IRT-SYNERGYWHOLESALE-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:03:48Z
source: APNIC

irt: IRT-SYNERGYWHOLESALE-AU
address: PO Box 119
address: Beaconsfield VIC 3807
address: Australia
e-mail: noc@synergywholesale.com
abuse-mailbox: noc@synergywholesale.com
admin-c: SWN3-AP
tech-c: SWN3-AP
auth: # Filtered
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2013-10-17T01:49:54Z
source: APNIC

organisation: ORG-SWPL1-AP
org-name: SYNERGY WHOLESALE PTY LTD
country: AU
address: Suite 105
address: 66 Victor Crescent
phone: +61 3 9013 8464
fax-no: +61 3 8080 6481
e-mail: noc@synergywholesale.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:24Z
source: APNIC

person: Synergy Wholesale NOC
address: PO BOX 119
Beaconsfield VIC 3807
country: AU
phone: +61.390138464
fax-no: +61.380806481
e-mail: noc@synergywholesale.com
nic-hdl: SWN3-AP
notify: noc@synergywholesale.com
abuse-mailbox: abuse@synergywholesale.com
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2016-08-05T03:30:38Z
synergywholesale.com

Type: Bot
@@@@@@@@@@@@@@@@@@
Australia Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (16 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
Type: Bot
@@@@@@@@@@@
Stew Webb Site
United States Eden Prairie, United States visited http://www.stewwebb.com/
2/13/2018 8:05:00 AM (16 minutes ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: undefined
Installatron Plugin/9.1.36
Type: Bot

United States Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wpixhf.php
2/13/2018 5:25:53 AM (2 hours 55 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
Type: 404 Not Found

United States Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wp7hse.php
2/13/2018 5:25:49 AM (2 hours 55 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: Firefox version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
Type: Bot

@@@@@@@@@@@@@@@@@@
Dallas, United States visited http://www.stewwebb.com/
2/13/2018 5:25:27 AM (3 hours 22 mins ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit

Dallas, United States visited http://www.stewwebb.com/
2/13/2018 5:25:17 AM (3 hours 21 mins ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)

Sorry, but no data for that IP or domain was found.

P address 69.162.68.206
Reverse DNS (PTR record) dal01.installatron.com
DNS server (NS record) ns2.limestonenetworks.com (64.31.5.4)
ns1.limestonenetworks.com (64.31.5.3)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 69.162.64.0/18
69.162.64.0 – 69.162.127.255
Domains around 69.162.68.106
IP address #domains
69.162.68.3 1
69.162.68.18 1
69.162.68.50 5
69.162.68.58 1
69.162.68.62 1
69.162.68.98 1
69.162.68.106 245
Mail server Tools
mail.apelturismo.com.ar
mail.villa-pehuenia.com.ar
mail.plagaexpress.com
mail.dariolacheventos.com.ar
mail.matgauch.com
mail.begus.com.ar
mail.mgplot.com.ar
mail.estudioferullo.com
mail.anicellasgrutas.com.ar
mail.complejocaleu.com.ar
Name servers on 69.162.68.106

Overview of name servers hosted on this IP address. You can use the NS Neighbors tool to find domains using a name server.
Name server Tools
ns1.grupophi.com
tera1.teraserver.com.ar
ns1.eurowebdigital.com
ns2.eurowebdigital.com
ns1.nrgdns.net
dns1.tehagolaweb.com

69.162.68.107 1
69.162.68.118 20
69.162.68.156 1
69.162.68.162 4
69.162.68.166 1
69.162.68.178 1
69.162.68.198 20
69.162.68.210 2
69.162.68.215 1
69.162.68.219 1
69.162.68.226 2
69.162.68.227 1
69.162.68.228 1
69.162.68.229 1
69.162.68.230 2
69.162.68.234 1
69.162.68.236 1
69.162.68.250 1
NetRange: 69.162.64.0 – 69.162.127.255
CIDR: 69.162.64.0/18
Domains on 69.162.68.106
Domain Tools
titinas.com.ar
fmcarilo.com.ar
internetviedma.com.ar
emprenditel.com
import-arte.com.ar
santuariosanramon.org.ar
hierroyacero.com.ar
apelturismo.com.ar
flyfishingriopico.com.ar
lasgrutasrionegro.com.ar

NetName: LSN-DLLSTX-2
NetHandle: NET-69-162-64-0-1
Parent: NET69 (NET-69-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS46475
Organization: Limestone Networks, Inc. (LIMES-2)
RegDate: 2008-06-27
Updated: 2012-02-24
OrgName: Limestone Networks, Inc.
OrgId: LIMES-2
Address: 400 S. Akard Street
Address: Suite 200
City: Dallas
StateProv: TX
PostalCode: 75202
Country: US
RegDate: 2007-12-04
Updated: 2017-01-28
NetRange: 69.162.64.0 – 69.162.127.255
CIDR: 69.162.64.0/18
214-242-3600
limestonenetworks.com
This domain is hosted by Limestone Networks, Inc. (AS46475). The first DNS server is ns3.limestonenetworks.com. The current IPv4 address is 64.31.5.5. The mail server with the highest priority is aspmx.l.google.com.
v=spf1 ip4:74.63.205.192/26 ip4:74.63.208.128/28 ip4:64.31.0.192/29
include:_spf.google.com ~al

DNS server (NS records) ns3.limestonenetworks.com (67.220.71.9)
ns1.limestonenetworks.com (64.31.5.3)
ns2.limestonenetworks.com (64.31.5.4)
Mail server (MX records) aspmx.l.google.com (173.194.76.27)
alt2.aspmx.l.google.com (74.125.130.26)
alt1.aspmx.l.google.com (64.233.163.27)
alt4.aspmx.l.google.com (64.233.160.27)
alt3.aspmx.l.google.com (74.125.204.26)
mx1.limestonenetworks.com (64.31.0.195)
mx2.limestonenetworks.com (74.63.205.207)
IP address (IPv4) 64.31.5.5
IP address (IPv6)
ASN number 46475
ASN name (ISP) Limestone Networks, Inc.
IP-range/subnet 64.31.0.0/18
64.31.0.0 – 64.31.63.255
Domain Name: LIMESTONENETWORKS.COM
Registrar URL: http://www.godaddy.com
Registrant Name: ******** ********
Registrant Organization: Limestone Networks, Inc.
Name Server: NS1.LIMESTONENETWORKS.COM
Name Server: NS2.LIMESTONENETWORKS.COM
DNSSEC: unsigned
@@@@@@@@@@@@
United States Eden Prairie, United States visited http://www.stewwebb.com/
2/13/2018 5:25:14 AM (3 hours 21 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: undefined
Installatron Plugin/9.1.36

Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wp7hse.php
2/13/2018 5:25:49 AM (3 hours 25 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net

Eden Prairie, United States visited http://www.stewwebb.com/deleteme.wpixhf.php
2/13/2018 5:25:53 AM (3 hours 26 mins ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net

Eden Prairie, United States visited http://www.stewwebb.com/
2/13/2018 8:05:00 AM (48 minutes ago)
IP: 206.191.194.1 Hostname: web1.sierranv.net
Browser: undefined
Installatron Plugin/9.1.36

@@@@@@@@@@@@@@@@@@@@@@@@@@
United States Dallas, United States visited http://www.stewwebb.com/
2/13/2018 8:05:04 AM (49 minutes ago)
IP: 69.162.68.206 Hostname: dal01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5
Safari/536.30.1 Installatron (Mimicking WebKit)

Sorry, but no data for that IP or domain was found.

@@@@@@@@@@@@@@@@@@@@@@
Melbourne, Australia visited http://www.stewwebb.com/
2/13/2018 8:05:24 AM (53 minutes ago)
IP: 103.252.152.3 Hostname: syd01.installatron.com
Browser: undefined
Mozilla/5.0 AppleWebKit/536.30.1 (KHTML, like Gecko) Version/6.0.5 Safari/536.30.1 Installatron (Mimicking WebKit)
% Information related to ‘103.252.152.0 – 103.252.155.255’
[1024 addresses in this network]
% Abuse contact for ‘103.252.152.0 – 103.252.155.255’ is ‘noc@synergywholesale.com’
[1024 addresses in this network]
inetnum: 103.252.152.0 – 103.252.155.255
[1024 addresses in this network]
netname: SYNERGYWHOLESALE-AP
descr: SYNERGY WHOLESALE PTY LTD
descr: Suite 105
descr: 66 Victor Crescent
descr: Narre Warren VIC 3805
country: AU
org: ORG-SWPL1-AP
admin-c: SWN3-AP
tech-c: SWN3-AP
mnt-by: APNIC-HM
mnt-lower: MAINT-AU-SYNERGYWHOLESALE
mnt-routes: MAINT-AU-SYNERGYWHOLESALE
mnt-irt: IRT-SYNERGYWHOLESALE-AU
status: ALLOCATED PORTABLE
remarks: ——————————————————–
remarks: To report network abuse, please contact mnt-irt
remarks: For troubleshooting, please contact tech-c and admin-c
remarks: Report invalid contact via www.apnic.net/invalidcontact
remarks: ——————————————————–
last-modified: 2017-08-29T23:03:48Z
source: APNIC

irt: IRT-SYNERGYWHOLESALE-AU
address: PO Box 119
address: Beaconsfield VIC 3807
address: Australia
e-mail: noc@synergywholesale.com
abuse-mailbox: noc@synergywholesale.com
admin-c: SWN3-AP
tech-c: SWN3-AP
auth: # Filtered
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2013-10-17T01:49:54Z
source: APNIC

organisation: ORG-SWPL1-AP
org-name: SYNERGY WHOLESALE PTY LTD
country: AU
address: Suite 105
address: 66 Victor Crescent
phone: +61 3 9013 8464
fax-no: +61 3 8080 6481
e-mail: noc@synergywholesale.com
mnt-ref: APNIC-HM
mnt-by: APNIC-HM
last-modified: 2017-08-20T22:54:24Z
source: APNIC

person: Synergy Wholesale NOC
address: PO BOX 119
Beaconsfield VIC 3807
country: AU
phone: +61.390138464
fax-no: +61.380806481
e-mail: noc@synergywholesale.com
nic-hdl: SWN3-AP
notify: noc@synergywholesale.com
abuse-mailbox: abuse@synergywholesale.com
mnt-by: MAINT-AU-SYNERGYWHOLESALE
last-modified: 2016-08-05T03:30:38Z
source: APNIC
synergywholesale.com
This domain is hosted by SYNERGY WHOLESALE PTY LTD (AS45638). The first DNS server is ns2.corp.ventraip.net.au. The current IPv4 address is 103.42.108.73. The mail server with the highest priority is mx1.hostedmail.net.au.
v=spf1 a mx
@@@@@@@@@@@@@@@@@
?????????????????????
include:spf.synergywholesale.com
Domain IPv4 address Ranking Alexa Pagerank
synergywholesale.cc
synergywholesale.cloud 112.140.180.152
synergywholesale.co.nz
synergywholesale.co.uk
synergywholesale.com 103.42.108.73 753,321 -1
synergywholesale.com.au 103.42.108.73
synergywholesale.domains 112.140.180.152 -1
synergywholesale.fail 112.140.180.152 -1
synergywholesale.hosting 112.140.180.152
synergywholesale.info
synergywholesale.lighting 50.63.202.54 -1
synergywholesale.me
synergywholesale.mobi
synergywholesale.net 103.42.108.73
synergywholesale.net.au 103.42.108.73
synergywholesale.org
synergywholesale.wtf 112.140.180.152 -1
synergywholesaleproperties.com 209.99.64.55
IPv4 routes

No IPv4 ranges found
IPv6 routes

No IPv6 ranges found
Providers

No providers found
@@@@@@@@@@@@@@@@@
????????????????
include:spf.ausregistry.net.au ~al

@@@@@@@@@@@@@@@@@@
DNS server (NS records) ns2.corp.ventraip.net.au (112.140.180.136)
ns3.corp.ventraip.net.au (50.116.13.233)
ns1.corp.ventraip.net.au (112.140.176.12)
Mail server (MX records) mx1.hostedmail.net.au (103.252.153.1)
mx2.hostedmail.net.au (103.252.153.2)
IP address (IPv4) 103.42.108.73
IP address (IPv6) 2400:b800:2:1::73
ASN number 45638
ASN name (ISP) SYNERGY WHOLESALE PTY LTD
IP-range/subnet 103.42.108.0/24
103.42.108.0 – 103.42.108.255
Domain Name: synergywholesale.com
Registry Domain ID: 1820536225_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.synergywholesale.com
Registry Registrant ID: Not Available From Registry
Registrant Name: Domain Hostmaster
Registrant Organization: Synergy Wholesale Pty Ltd
Registrant Street: PO Box 119
Registrant Street:
Registrant Street:
Registrant City: Beaconsfield
Registrant State/Province: VIC
Registrant Postal Code: 3807
Registrant Country: AU
61.383999483
61.86783945
@@@@@@@@@@@@@@@@@@@@@@@@@
File appears to be malicious: stewwebb_construction_co_2.html.docx
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: stewwebb_construction_co_2.html.docx
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\Xbn”. The infection type is: Javascript code indicative of malware.

Need help with a hacked website?

Our team of security experts will clean the infection and remove malicious content. Once your site is restored we will provide a detailed report of our findings. Includes a 1-year Wordfence Premium license.

File appears to be malicious: wp-content/plugins/wordfence/models/block/wfBlock.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/models/block/wfBlock.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: Appeal_20121212.htm.pdf
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: Appeal_20121212.htm.pdf
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\XvC”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/lib/wfGeoIP.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/lib/wfGeoIP.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\xff”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/lib/wordfenceURLHoover.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/lib/wordfenceURLHoover.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/utils.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/utils.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/wflogs/rules.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/wflogs/rules.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\xC2”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/js/date.1518460764.js
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/js/date.1518460764.js
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x27”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/lib/wfUtils.php
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/lib/wfUtils.php
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.

File appears to be malicious: wp-content/plugins/wordfence/js/admin.1518460764.js
Type: File
Issue Found 2018/02/12 10:31 pm
Critical
Ignore
Details

Filename: wp-content/plugins/wordfence/js/admin.1518460764.js
File Type: Not a core, theme or plugin file.
Details: This file appears to be installed by a hacker to perform malicious activity. If you know about this file you can choose to ignore it to exclude it from future scans. The text we found in this file that matches a known malicious file is: “\x00”. The infection type is: Javascript code indicative of malware.
@@@@@@@@@@@@@@@@@@@@@@
Alert generated at Monday 12th of February 2018 at 10:32:39 PM

Critical Problems:

* File appears to be malicious: wp-content/plugins/wordfence/models/block/wfBlock.php

* File appears to be malicious: Appeal_20121212.htm.pdf

* File appears to be malicious: wp-content/plugins/wordfence/lib/wfGeoIP.php

* File appears to be malicious: wp-content/plugins/wordfence/lib/wordfenceURLHoover.php

* File appears to be malicious: wp-content/plugins/wordfence/vendor/wordfence/wf-waf/src/lib/utils.php

* File appears to be malicious: wp-content/wflogs/rules.php

* File appears to be malicious: wp-content/plugins/wordfence/js/date.1518460764.js

* File appears to be malicious: wp-content/plugins/wordfence/lib/wfUtils.php

* File appears to be malicious: wp-content/plugins/wordfence/js/admin.1518460764.js

* File appears to be malicious: stewwebb_construction_co_2.html.docx

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Alibaba San Mateo CA Cyber Attacks against Stew Webb Whistle blower

By Stew Webb Federal Whistle blower

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

lists
Alibaba.com
Alibaba San Mateo CA Cyber Attacks against Stew Webb Whistle blower

San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (28 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (28 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
NetRange: 198.11.128.0 – 198.11.191.255
[16384 addresses in this network]
CIDR: 198.11.128.0/18 (198.11.128.0 – 198.11.255.255)
[32768 addresses in this network]
NetName: ALIBABA-US-CDN
NetHandle: NET-198-11-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS45102
Organization: Alibaba.com LLC (AL-3)
RegDate: 2013-04-23
Updated: 2017-04-26
Ref: https://whois.arin.net/rest/net/NET-198-11-128-0-1

OrgName: Alibaba.com LLC
OrgId: AL-3
Address: 400 S El Camino Real, Suite 400
City: San Mateo
StateProv: CA
PostalCode: 94402
Country: US
RegDate: 2010-10-29
Updated: 2017-06-16
Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:
Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:
Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: intl-abuse@list.alibaba-inc.com and abuse@alibaba-inc.com
Comment:
Comment: 4. For network issue, please send email to this mail list: aliops-goc@list.alibaba-inc.com
Ref: https://whois.arin.net/rest/org/AL-3

OrgTechHandle: ALIBA-ARIN
OrgTechName: Alibaba NOC
OrgTechPhone: +1-408-748-1200
OrgTechEmail: noc@list.alibaba-inc.com
OrgTechRef: https://whois.arin.net/rest/poc/ALIBA-ARIN

OrgNOCHandle: ALIBA-ARIN
OrgNOCName: Alibaba NOC
OrgNOCPhone: +1-408-748-1200
OrgNOCEmail: noc@list.alibaba-inc.com
OrgNOCRef: https://whois.arin.net/rest/poc/ALIBA-ARIN

OrgAbuseHandle: NETWO4028-ARIN
OrgAbuseName: Network Abuse
OrgAbusePhone: +1-408-785-5580
OrgAbuseEmail: intl-abuse@list.alibaba-inc.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NETWO4028-ARIN
198.11.183.69
P address 198.11.183.69
Location San Mateo, California, United States
IP address 198.11.183.69
Reverse DNS (PTR record) not available
DNS server (NS record) rdns1.alidns.com (140.205.71.250)
rdns2.alidns.com (140.205.253.62)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.128.0/18
198.11.128.0 – 198.11.191.255
198.11.183.69
Domains around 198.11.183.69
@@@@@@@@@@@@@@@@@@@@@@@@@@
left off

IP address #domains
198.11.183.9 3
198.11.183.11 3
198.11.183.14 1
198.11.183.15 1
198.11.183.17 1
198.11.183.24 1
198.11.183.25 2
198.11.183.26 5
198.11.183.28 10
198.11.183.30 5
198.11.183.33 4
198.11.183.35 4
198.11.183.36 1
198.11.183.46 1
198.11.183.50 13
198.11.183.55 2
198.11.183.60 2
198.11.183.61 1
198.11.183.63 2
198.11.183.66 1
198.11.183.67 1
198.11.183.70 2
198.11.183.71 2
198.11.183.72 2
198.11.183.75 1
198.11.183.79 11
198.11.183.86 1
198.11.183.88 1
198.11.183.95 162
198.11.183.105 1
198.11.183.109 1
198.11.183.110 2
198.11.183.114 1
198.11.183.116 2
198.11.183.122 1
198.11.183.124 63
198.11.183.129 4
198.11.183.133 1
198.11.183.138 1
198.11.183.144 3
198.11.183.147 1
198.11.183.150 1
198.11.183.154 1
198.11.183.155 1
198.11.183.161 2
198.11.183.167 4
198.11.183.168 10
198.11.183.169 1
198.11.183.171 2
198.11.183.177 1
198.11.183.179 1
198.11.183.180 1
198.11.183.183 2
198.11.183.185 38
198.11.183.187 1
198.11.183.189 7
198.11.183.190 2
198.11.183.193 2
198.11.183.194 1
198.11.183.195 1
198.11.183.197 1
198.11.183.207 2
198.11.183.209 10
198.11.183.211 1
198.11.183.214 1
198.11.183.216 2
198.11.183.221 3
198.11.183.225 2
198.11.183.226 196
198.11.183.228 1
198.11.183.230 3
198.11.183.231 1
198.11.183.232 6
198.11.183.234 2
198.11.183.238 4
198.11.183.239 2
198.11.183.240 2

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
completed below
@@@@@@@@@@@@@@@@@@@@@@@@@@
Whois information
NetRange: 198.11.128.0 – 198.11.191.255
CIDR: 198.11.128.0/18
NetName: ALIBABA-US-CDN
NetHandle: NET-198-11-128-0-1
Parent: NET198 (NET-198-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS45102
Organization: Alibaba.com LLC (AL-3)
RegDate: 2013-04-23
Updated: 2017-04-26
Ref: https://whois.arin.net/rest/net/NET-198-11-128-0-1

OrgName: Alibaba.com LLC
OrgId: AL-3
Address: 400 S El Camino Real, Suite 400
City: San Mateo
StateProv: CA
PostalCode: 94402
Country: US
RegDate: 2010-10-29
Updated: 2017-06-16
Comment: 1.For AliCloud IPR Infringement and Abuse Claim, please use below link with browser to report: https://intl.aliyun.com/report
Comment:
Comment: 2.For Alibaba.com and Aliexpress.com’s IPR Infringement , please use below link with browser to report: https://ipp.alibabagroup.com
Comment:
Comment: 3.For Alibaba.com and Aliexpress.com’s Abuse, please send email to those two mail lists to report: removed email address and removed email address
Comment:

ipp.alibabagroup.com
Domain IPv4 address Ranking Alexa Pagerank
alibabagroup.asia -1
alibabagroup.bid
alibabagroup.cc
alibabagroup.click 47.89.58.141
alibabagroup.club
alibabagroup.co
alibabagroup.co.in 50.63.202.21
alibabagroup.co.uk 50.63.202.16
alibabagroup.com 198.11.132.52 12,450 -1
alibabagroup.com.au 50.63.202.40
alibabagroup.com.cn
alibabagroup.company 50.63.202.55
alibabagroup.de 81.169.145.93
alibabagroup.es
alibabagroup.eu 130.185.109.77
alibabagroup.gift 47.89.58.141
alibabagroup.in 103.232.215.150
alibabagroup.info
alibabagroup.ir
alibabagroup.kz 81.177.140.214 0
alibabagroup.loan 47.89.58.141
alibabagroup.ltd 170.178.178.37
alibabagroup.me
alibabagroup.mobi 116.251.214.80
alibabagroup.net 141.8.225.31 -1
alibabagroup.net.cn
alibabagroup.news 47.89.58.141
alibabagroup.nu 185.53.178.9
alibabagroup.online 118.193.11.34
alibabagroup.org 50.63.202.63
alibabagroup.party
alibabagroup.pw 141.8.226.58
alibabagroup.ren
alibabagroup.ru 185.12.92.179
alibabagroup.space
alibabagroup.top 23.234.27.209
alibabagroup.trade 47.89.58.141
alibabagroup.us 69.64.147.242
alibabagroup.video 47.89.58.141
alibabagroup.vn 103.1.236.124
alibabagroup.wang 205.204.101.42
alibabagroup.win
alibabagroup.xn--io0a7i 47.89.58.32
alibabagroup.xn--ses554g
alibabagroup.xxx 125.212.224.227
alibabagroup-inc.com 50.63.202.27
alibabagroupbd.com
alibabagroupholding.com 184.168.221.46
alibabagroupholdinglimited.com 50.62.160.249
alibabagroupholdingltd.com 50.63.202.47
Are you looking for IPv4 address 198.11.188.72?
Are you looking for domain alibabagroup.com?
alibabagroup.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp2.alibabaonline.com. The current IPv4 address is 198.11.132.52. The mail server with the highest priority is mxn.mxhichina.com.
v=spf1 include:spf.mxhichina.com -all
DNS server (NS records) nsp2.alibabaonline.com (198.11.138.242)
ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
nsp.alibabaonline.com (200.196.225.111)
Mail server (MX records) mxn.mxhichina.com (205.204.101.145)
mxw.mxhichina.com (198.11.189.243)
IP address (IPv4) 198.11.132.52
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Registrant Street: 19/F Building A Xihu International Technology Bldg, 391 Wen Er Road
Registrant City: Hangzhou
Registrant State/Province: Zhejiang
Registrant Postal Code: 310099
Registrant Country: CN
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Timothy Alexander Steinert
Alibaba.com
Alibaba.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp.alibabaonline.com. The current IPv4 address is 198.11.132.23. The mail server with the highest priority is mx01.mail.alibaba.com.
v=spf1 include:spf1.alibaba.mail.aliyun.com -all
DNS server (NS records) nsp.alibabaonline.com (200.196.225.111)
ns8.alibabaonline.com (198.11.138.244)
nsp2.alibabaonline.com (198.11.138.242)
nshz.alibabaonline.com (198.11.138.243)
Mail server (MX records) mx01.mail.alibaba.com (42.120.219.27)
mx02.mail.alibaba.com (42.120.219.135)
IP address (IPv4) 198.11.132.23
205.204.101.42
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Admin Street: No. 699 Wangshang Road , Binjiang District
Admin City: Hangzhou
Admin State/Province: Zhejiang
Admin Postal Code: 310052
Admin Country: CN
Admin Phone: removed phone number
Admin Phone Ext:
Admin Fax: removed phone number
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: Timothy Alexander Steinert
852.22155100
Aliexpress.com
This domain is hosted by Alibaba (China) Technology Co., Ltd. (AS45102). The first DNS server is nsp2.alibabaonline.com. The current IPv4 address is 198.11.132.250. The mail server with the highest priority is mx2.mail.aliyun.com.
v=spf1 include:spf1.service.alibaba.com include:spf2.service.alibaba.com include:spf2.ocm.aliyun.com -al
DNS server (NS records) nsp2.alibabaonline.com (198.11.138.242)
nsp.alibabaonline.com (200.196.225.111)
ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
Mail server (MX records) mx2.mail.aliyun.com (140.205.94.14)
IP address (IPv4) 198.11.132.250
IP address (IPv6)
ASN number 45102
ASN name (ISP) Alibaba (China) Technology Co., Ltd.
IP-range/subnet 198.11.132.0/24
198.11.132.0 – 198.11.132.255
Domain Name: aliexpress.com
Registry Domain ID: 413519034_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.markmonitor.com
Registrar URL: http://www.markmonitor.com
Updated Date: 2016-03-16T02:23:44-0700
Creation Date: 2006-04-16T11:16:46-0700
Registrar Registration Expiration Date: 2018-04-16T00:00:00-0700
Registrar: MarkMonitor, Inc.
Registrar IANA ID: 292
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: removed phone number
Domain Status: clientUpdateProhibited (https://www.icann.org/epp#clientUpdateProhibited)
Domain Status: clientTransferProhibited (https://www.icann.org/epp#clientTransferProhibited)
Domain Status: clientDeleteProhibited (https://www.icann.org/epp#clientDeleteProhibited)
Domain Status: serverUpdateProhibited (https://www.icann.org/epp#serverUpdateProhibited)
Domain Status: serverTransferProhibited (https://www.icann.org/epp#serverTransferProhibited)
Domain Status: serverDeleteProhibited (https://www.icann.org/epp#serverDeleteProhibited)
Registry Registrant ID:
Registrant Name: Timothy Alexander Steinert
Registrant Organization: Hangzhou Alibaba Advertising Co., Lt
Registrant Street: No. 699 Wangshang Road , Binjiang District
Registrant City: Hangzhou
Registrant State/Province: Zhejiang
Registrant Postal Code: 310052
Registrant Country: CN
Registrant Phone: removed phone number
Registrant Phone Ext:
Registrant Fax: removed phone number
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Timothy Alexander Steinert
list.alibaba-inc.com
Are you looking for IPv4 address 10.20.3.90?
IP address 10.20.3.90
Summary IP Address 10.20.3.90 is a private IP address. Private IP addresses are used inside a local area network (LAN) and are not visible on the internet. Private IP addresses are defined in RFC 1918 (IPv4) and RFC 4193 (IPv6).
NetRange: 10.0.0.0 – 10.255.255.255
CIDR: 10.0.0.0/8
NetName: PRIVATE-ADDRESS-ABLK-RFC1918-IANA-RESERVED
NetHandle: NET-10-0-0-0-1
Parent: ()
NetType: IANA Special Use
OriginAS:
Organization: Internet Assigned Numbers Authority (IANA)
RegDate:
Updated: 2013-08-30
Are you looking for domain alibaba-inc.com?
This domain is hosted by Hangzhou Alibaba Advertising Co.,Ltd. (AS37963). The first DNS server is ns8.alibabaonline.com. The current IPv4 address is 121.0.17.65. The mail server with the highest priority is mx1.alibaba-inc.com.
v=spf1 include:spf1.staff.mail.aliyun.com -al
DNS server (NS records) ns8.alibabaonline.com (198.11.138.244)
nshz.alibabaonline.com (198.11.138.243)
nsp2.alibabaonline.com (198.11.138.242)
nsp.alibabaonline.com (200.196.225.111)
Mail server (MX records) mx1.alibaba-inc.com (205.204.101.143)
mxus1.alibaba-inc.com (205.204.101.143)
IP address (IPv4) 121.0.17.65
IP address (IPv6)
ASN number 37963
ASN name (ISP) Hangzhou Alibaba Advertising Co.,Ltd.
IP-range/subnet 121.0.16.0/21
121.0.16.0 – 121.0.23.255

Domain IPv4 address Ranking Alexa Pagerank
alibaba-inc.asia -1
alibaba-inc.bid
alibaba-inc.biz 60.205.17.162
alibaba-inc.cc 35.201.173.170
alibaba-inc.club 10.244.35.92 -1
alibaba-inc.cn -1
alibaba-inc.co
alibaba-inc.com 121.0.17.65 2,111 2
alibaba-inc.com.cn
alibaba-inc.date
alibaba-inc.ink 121.42.72.40
alibaba-inc.jp 5
alibaba-inc.loan
alibaba-inc.ltd
alibaba-inc.mobi 219.137.207.17
alibaba-inc.mom
alibaba-inc.net 222.76.250.26 -1
alibaba-inc.net.cn
alibaba-inc.nl 185.53.177.20
alibaba-inc.org 93.191.168.52
alibaba-inc.pro
alibaba-inc.shop
alibaba-inc.site
alibaba-inc.tech 127.0.0.1
alibaba-inc.top
alibaba-inc.us 184.168.221.38
alibaba-inc.vip 47.89.58.32
alibaba-inc.wang
alibaba-inc.xin
alibaba-inc.xn--ses554g
alibaba-inc.xyz
alibaba-incs.com 104.16.91.230
IPv4 routes
Startip Endip Description Country #domains #spamhosts
135.84.40.0 135.84.41.255 Angie’s List, Inc. US 0 0
204.27.248.0 204.27.248.255 Amarican List Counsel, Inc. US 0 0
204.130.201.0 204.130.201.255 American List Counsel, Inc US 0 0
91.236.59.0 91.236.59.255 List Technology Iberica S.A. ES 0 0
157.247.0.0 157.247.255.255 AVL LIST GmbH AT 3 0
185.178.64.0 185.178.67.255 Martin List-Petersen trading as Tuxbox IE 0 0
192.102.17.0 192.102.17.255 AVL LIST GmbH AT 8 0
193.26.220.0 193.26.220.255 Javno podjetje uradni list Republike Slovenije d.o.o. SI 8 0
77.74.229.0 77.74.229.255 Sluzbeni list Bosne i Hercegovine BA 15 0
43.230.32.0 43.230.35.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
43.250.12.0 43.250.15.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 1 0
45.112.208.0 45.112.211.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.212.0 45.112.215.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.216.0 45.112.219.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.220.0 45.112.223.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
47.56.0.0 47.57.255.255 Alibaba.com LLC US 1 0
47.74.0.0 47.75.255.255 Alibaba.com LLC US 48,712 2
47.76.0.0 47.79.255.255 Alibaba.com LLC US 3 0
47.80.0.0 47.87.255.255 Alibaba.com LLC US 14 0
47.88.0.0 47.91.255.255 Alibaba.com LLC US 1,830,436 20
47.235.0.0 47.235.255.255 Alibaba.com LLC US 0 0
47.236.0.0 47.239.255.255 Alibaba.com LLC US 0 0
47.240.0.0 47.243.255.255 Alibaba.com LLC US 1 0
47.244.0.0 47.245.255.255 Alibaba.com LLC US 0 0
47.246.0.0 47.246.255.255 Alibaba.com LLC US 1 0
47.250.0.0 47.251.255.255 Alibaba.com LLC US 0 0
47.252.0.0 47.253.255.255 Alibaba.com LLC US 12 0
47.254.0.0 47.254.255.255 Alibaba.com LLC US 3,743 0
72.254.0.0 72.254.255.255 Alibaba.com LLC US 0 0
103.216.108.0 103.216.111.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
110.75.192.0 110.75.255.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 81 0
119.38.208.0 119.38.223.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 9 0
121.0.16.0 121.0.31.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 88 0
139.95.0.0 139.95.255.255 Alibaba.com LLC US 0 0
147.139.0.0 147.139.255.255 Alibaba.com LLC US 0 0
155.102.0.0 155.102.255.255 Alibaba.com LLC US 0 0
157.119.240.0 157.119.243.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
161.117.0.0 161.117.255.255 Alibaba.com Singapore E-Commerce Private Limited SG 0 0
163.181.0.0 163.181.255.255 Alibaba.com LLC US 27 0
170.33.0.0 170.33.255.255 Alibaba.com Singapore E-Commerce Private Limited SG 14 0
185.218.176.0 185.218.179.255 Alibaba Cloud (Singapore) Private Limited RU 0 0
198.11.128.0 198.11.191.255 Alibaba.com LLC US 103,048 1
205.204.96.0 205.204.127.255 Alibaba.com LLC US 14,189 0
45.112.212.0 45.112.212.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.213.0 45.112.213.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.214.0 45.112.214.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
45.112.215.0 45.112.215.255 Hangzhou Alibaba Advertising Co.,Ltd. CN 0 0
47.74.0.0 47.74.63.255 Alibaba.com LLC US 15,381 0
47.74.0.0 47.74.7.255 Alibaba.com LLC US 5,806 0
47.74.64.0 47.74.127.255 Alibaba.com LLC US 85 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a0a:5780:: 2a0a:5780:ffff:ffff:ffff:ffff:ffff:ffff Martin List-Petersen trading as Tuxbox IE 0 0
2401:2e00:: 2401:2e00:ffff:ffff:ffff:ffff:ffff:ffff Alibaba (China) Technology Co., Ltd. CN 0 0
2a0b:da40:: 2a0b:da47:ffff:ffff:ffff:ffff:ffff:ffff Alibaba Cloud (Singapore) Private Limited RU 0 0
2001:330:: 2001:330:1fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:2000:: 2001:330:3fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:4000:: 2001:330:7fff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:330:8000:: 2001:330:ffff:ffff:ffff:ffff:ffff:ffff SamsungSDS Inc. KR 0 0
2001:3e8:: 2001:3e8:ffff:ffff:ffff:ffff:ffff:ffff MediaLive Japan,Inc. JP 0 0
2001:410:: 2001:410:ffff:ffff:ffff:ffff:ffff:ffff Canarie Inc CA 12 0
2001:418:: 2001:418:ffff:ffff:ffff:ffff:ffff:ffff NTT America, Inc. US 132 0
2001:420:: 2001:420:ffff:ffff:ffff:ffff:ffff:ffff Cisco Systems, Inc. US 384 0
2001:450:: 2001:450:ffff:ffff:ffff:ffff:ffff:ffff Level 3 Communications, Inc. US 4 0
2001:458:: 2001:458:ffff:ffff:ffff:ffff:ffff:ffff Stealth Communications, Inc. US 3 0
2001:470:: 2001:470:ffff:ffff:ffff:ffff:ffff:ffff Hurricane Electric, Inc. US 18,918 0
2001:4b0:: 2001:4b0:ffff:ffff:ffff:ffff:ffff:ffff AOL Inc. US 0 0
2001:4b8:: 2001:4b8:ffff:ffff:ffff:ffff:ffff:ffff Wayport, Inc. US 0 0
2001:4e8:: 2001:4e8:ffff:ffff:ffff:ffff:ffff:ffff Shaw Communications Inc. CA 0 0
2001:4f8:: 2001:4f8:ffff:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 28 0
2001:500:10:: 2001:500:10:ffff:ffff:ffff:ffff:ffff Gauss Research Laboratory, Inc. PR 0 0
2001:500:2e:: 2001:500:2f:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:60:: 2001:500:60:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:61:: 2001:500:61:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:62:: 2001:500:62:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:63:: 2001:500:63:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:64:: 2001:500:64:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:65:: 2001:500:65:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:66:: 2001:500:66:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:67:: 2001:500:67:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:68:: 2001:500:68:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:69:: 2001:500:69:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6a:: 2001:500:6a:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6b:: 2001:500:6b:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6c:: 2001:500:6c:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6d:: 2001:500:6d:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6e:: 2001:500:6e:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:6f:: 2001:500:6f:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:70:: 2001:500:70:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:71:: 2001:500:71:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:72:: 2001:500:72:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:73:: 2001:500:73:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:74:: 2001:500:74:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:75:: 2001:500:75:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:76:: 2001:500:76:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:77:: 2001:500:77:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:78:: 2001:500:78:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:79:: 2001:500:79:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7a:: 2001:500:7a:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7b:: 2001:500:7b:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:7c:: 2001:500:7c:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
2001:500:85:: 2001:500:85:ffff:ffff:ffff:ffff:ffff Internet Systems Consortium, Inc. US 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
56651 Javno podjetje uradni list Republike Slovenije d.o.o. SI 1 0 8 0
37963 Hangzhou Alibaba Advertising Co.,Ltd. CN 238 0 2,038,735 121
45102 Alibaba (China) Technology Co., Ltd. CN 233 0 2,278,472 36
134963 Alibaba.com Singapore E-Commerce Private Limited SG 22 0 225 0
1 Level 3 Communications, Inc. US 10 0 15 8
5 Symbolics, Inc. US 15 0 5 12
6 Bull HN Information Systems Inc. US 29 0 82 0
19 Leidos, Inc. US 8 0 85 0
78 BT Americas, Inc US 6 0 2 0
97 NTT America, Inc. US 2 0 0 0
106 General Dynamics Advanced Information Systems, Inc. US 10 0 48 0
109 Cisco Systems, Inc. US 77 26 816 2
125 Honeywell International, Inc. US 49 0 907 0
158 Ericsson Network Systems, Inc. US 89 12 252 0
161 Texas Instruments, Inc. US 16 0 134 0
200 Level 3 Communications, Inc. US 2 0 0 9
202 Level 3 Communications, Inc. US 1 0 7 0
229 Merit Network Inc. US 2 0 0 0
231 Merit Network Inc. US 4 1 1 0
237 Merit Network Inc. US 55 5 1,270 1
260 Xconnect24 Inc. US 16 4 97 1
262 NTT America, Inc. US 1 1 0 0
283 MPower Labs, Inc. US 5 0 7 0
555 Velocity Technology Solutions II, Inc. US 3 0 193 0
560 Level 3 Communications, Inc. US 0 2 0 0
572 Greater Baltimore Medical Center Inc US 6 0 0 0
598 Level 3 Communications, Inc. US 1 0 0 0
605 Vanguard Health Management, Inc. US 1 0 0 0
613 BP America, Inc. US 2 0 0 0
684 MTS Inc. CA 2 0 0 0
699 KANOBE INC US 3 0 16 0
701 MCI Communications Services, Inc. d/b/a Verizon Business US 1,164 19 151,206 170
702 MCI Communications Services, Inc. d/b/a Verizon Business US 198 54 60,385 5
703 MCI Communications Services, Inc. d/b/a Verizon Business US 91 3 1,106 1
705 MCI Communications Services, Inc. d/b/a Verizon Business US 145 0 9 0
714 Apple Inc. US 597 68 9,598 5
797 AT&T Services, Inc. US 57 0 742 0
801 AtTask, Inc US 1 0 0 0
812 Rogers Communications Canada Inc. CA 501 43 26,501 45
813 MCI Communications Services, Inc. d/b/a Verizon Business US 28 0 140 0
852 TELUS Communications Inc. CA 700 21 18,343 36
1236 General Dynamics C4 Systems, Inc. US 6 0 86 0
1280 Internet Systems Consortium, Inc. US 22 8 466 0
1313 Adobe Systems Inc. US 9 2 161 0
1321 Advanced Networks & Services Inc. US 11 0 0 0
1323 Advanced Networks & Services Inc. US 1 0 0 0
1325 Advanced Networks & Services Inc. US 2 0 0 0
1326 Advanced Networks & Services Inc. US 8 0 1 0
1331 Advanced Networks & Services Inc. US 4 0 0 0
1337 Advanced Networks & Services Inc. US 12 12 0 0

 

@@@@@@@@@@@@@@
hk.alibaba-inc.  com

https://ipp.alibabagroup  .com
https://  intl.aliyun.com/

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Cyber Terrorists attacks against Stew Webb Whistleblower in 24 hours

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Cyber Terrorists attacks against Stew Webb Whistle blower in 24 hours

Throttling Feb 19 2018
Top 5 Ips Hits in last 24 hours
174.223.9.83 United States US 181
65.24.131.115 United States US 140
24.171.217.39 Puerto Rico PR 64
73.32.246.151 United States US 52
100.19.103.184 United States US 51
@@@@@@@@@@@@@@@@@@@@
February 17, 2018
Top 5 Ips Hits in last 24 hours
174.223.9.83 United States US 181 hits in last 24 hours
65.24.131.115 United States US 140 hits in last 24 hours
24.171.217.39 Puerto Rico PR 64 hits in last 24 hours
73.32.246.151 United States US 52 hits in last 24 hours
@@@@@@@@@@@@@@@@@@@@
February 15, 2018
Top 5 Ips Hits in last 24 hours
35.168.214.172 United States US 394
40.77.167.92 United States US 303
76.103.149.111 United States US 269
72.204.10.197 United States US 172
104.9.36.28 United States US 146

@@@@@@@@@@@@@@@@@@@@@@@@@@@@
February 12, 2018
Top 5 Ips Hits in last 24 hours
76.103.149.111 United States US 269
72.204.10.197 United States US 191
98.176.168.28 United States US 167
76.19.69.217 United States US 130
174.223.137.36 US 184
75.137.117.109 US 155
96.238.5.45 US 138
67.254.198.135 US 123
174.238.144.68 US 121
40.77.167.187 US 110
198.245.53.136 CA 103
February 12, 2018
2:23pm
188.19.173.160 (Russian Federation)

Blocked because the IP is blacklisted

February 12, 2018
2:22pm
176.120.51.115 (Ukraine)

Blocked because the IP is blacklisted

February 12, 2018
11:32am
110.139.202.142 (Indonesia)

Blocked because the IP is blacklisted

February 12, 2018
11:29am
84.52.98.181 (Russian Federation)

Blocked because the IP is blacklisted

February 12, 2018
10:51am
46.0.79.219 (Russian Federation)

Blocked because the IP is blacklisted
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Throttling Feb 3 2018
Top 5 Ips Hits in last 24 hours
70.126.77.136 United States US 100
66.180.182.136 United States US 23
166.170.14.98 United States US 22
216.160.138.220 United States US 21
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
February 8 2018
Top 5 Ips Hits in last 24 hours
174.223.137.36 United States US 206
40.77.167.76 United States US 193
40.77.167.180 United States US 192
104.199.36.229 United States US 160
40.77.167.193 United States US 158
40.77.167.187 United States United States 110
47.90.85.59 Hong Kong Hong Kong 72
108.67.56.10 United States United States 22
76.103.111.98 United States United States 20
76.24.221.134 United States United States 19
68.108.221.94 United States United States 18
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
March 1 2018
Top 5 Ips Hits in last 24 hours
174.223.137.36 United States US 206
40.77.167.76 United States US 193
40.77.167.180 United States US 192
104.199.36.229 United States US 160
40.77.167.193 United States US 158

@@@@@@@@@@@@@@@@@@@@@@@@
This a sample from March 1 2018
log
174.223.1.93 United States US 119 Hits in last 24 hours
IP address 174.223.1.93
Location Phenix City, Alabama, United States (US) flag
Registry arin
IP address 174.223.1.93
Reverse DNS (PTR record) 93.sub-174-223-1.myvzw.com
DNS server (NS record) carkdns.vzwdomain.com (66.174.92.13)
njbbdns.vzwdomain.com (69.78.134.171)
ns1.vzwdomain.com (66.174.0.3)
ASN number 22394
ASN name (ISP) Cellco Partnership DBA Verizon Wireless
IP-range/subnet 174.223.0.0/17
174.223.0.0 – 174.223.127.255
NetRange: 174.192.0.0 – 174.255.255.255
CIDR: 174.192.0.0/10
NetName: WIRELESSDATANETWORK
NetHandle: NET-174-192-0-0-1
Parent: NET174 (NET-174-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Cellco Partnership DBA Verizon Wireless (CLLC)
RegDate: 2008-12-16
Updated: 2012-03-02
Ref: https://whois.arin.net/rest/net/NET-174-192-0-0-1

OrgName: Cellco Partnership DBA Verizon Wireless
OrgId: CLLC
Address: 180 Washington Valley Road
City: Bedminster
StateProv: NJ
PostalCode: 07039
Country: US
RegDate: 2001-09-30
Updated: 2017-10-12
908-306-7000
verizonwireless. com

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Malicious File Uploads cyber attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Evidence

Malicious File Uploads cyber attacks against Stew Webb Whistle blower

United States Valencia, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/dzs-portfolio/admin/upload.php
2/8/2018 8:05:52 PM (42 minutes ago)
IP: 50.113.182.82 Hostname: pxy01twcca.ladc.ca.charter.com
Human/Bot: Bot
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPad; CPU OS 7_1_1 like Mac OS X; sl-SI) AppleWebKit/531.36.7 (KHTML, like Gecko) Version/4.0.5 Mobile/8B115 Safari/6531.36.7
Type: Blocked
Netherlands Netherlands was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:59:23 PM (48 minutes ago)
IP: 103.251.164.13 Hostname: 103.251.164.13
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows NT 5.1) AppleWebKit/5321 (KHTML, like Gecko) Chrome/38.0.821.0 Mobile Safari/5321
Type: Blocked
United States Centerview, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/admin/upload.php
2/8/2018 7:58:07 PM (50 minutes ago)
IP: 76.0.4.88 Hostname: mo-76-0-4-88.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
Type: Blocked
United States Mount Gilead, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-portfolio/upload.php
2/8/2018 7:56:52 PM (51 minutes ago)
IP: 71.213.176.237 Hostname: 71-213-176-237.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Opera/8.91 (Windows 95; sl-SI) Presto/2.12.257 Version/12.00
Type: Blocked
United States Kissimmee, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/dzs-videogallery/upload.php
2/8/2018 7:56:33 PM (51 minutes ago)
IP: 71.54.179.124 Hostname: fl-71-54-179-124.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: IE version 9.0 running on Win32
Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 4.0; Trident/4.0)
Type: Blocked
United States Warrenton, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/uploader/uploadify/uploadify.php
2/8/2018 7:55:17 PM (53 minutes ago)
IP: 174.125.14.182 Hostname: 174-125-14-182.dyn.centurytel.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_6_6 rv:2.0) Gecko/20161124 Firefox/36.0
Type: Blocked
United States Belleville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:54:58 PM (53 minutes ago)
IP: 67.234.107.79 Hostname: pa-67-234-107-79.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States Mebane, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/simple-ads-manager/sam-ajax-admin.php
2/8/2018 7:54:51 PM (53 minutes ago)
IP: 99.194.16.24 Hostname: 99-194-16-24.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10_6_7) AppleWebKit/5312 (KHTML, like Gecko) Chrome/37.0.818.0 Mobile Safari/5312
Type: Blocked
United States Trussville, United States was blocked by firewall for a Malicious File Upload in file: files=2W4yr.php.php.png at http://stewwebb.com/wp-admin/admin-ajax.php?action=load_ajax_function
2/8/2018 7:54:33 PM (54 minutes ago)
IP: 174.125.207.38 Hostname: 174-125-207-38.dyn.centurytel.net
Human/Bot: Bot
Browser: undefined
Opera/8.18 (Windows 98; Win 9x 4.90; sl-SI) Presto/2.11.335 Version/10.00
Type: Blocked
United States Shippensburg, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/page-google-maps/pr.php
2/8/2018 7:54:28 PM (54 minutes ago)
IP: 67.234.191.187 Hostname: pa-67-234-191-187.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux i686) AppleWebKit/5340 (KHTML, like Gecko) Chrome/38.0.825.0 Mobile Safari/5340
Type: Blocked
United States Centerburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:54:07 PM (54 minutes ago)
IP: 71.213.21.24 Hostname: 71-213-21-24.mnfd.qwest.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows CE; en-US; rv:1.9.2.20) Gecko/20100828 Firefox/36.0
Type: Blocked
United States Sparta, United States was blocked by firewall for a Malicious File Upload in file: files=yt93x.php at http://stewwebb.com/wp-content/plugins/simple-dropbox-upload-form/dragup/
2/8/2018 7:54:00 PM (54 minutes ago)
IP: 184.158.68.215 Hostname: 184-158-68-215.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win32
Mozilla/5.0 (Windows CE) AppleWebKit/5341 (KHTML, like Gecko) Chrome/37.0.875.0 Mobile Safari/5341
Type: Blocked
United States Pleasant Hill, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/font-uploader/font-upload.php
2/8/2018 7:53:53 PM (54 minutes ago)
IP: 184.5.199.59 Hostname: mo-184-5-199-59.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_7_0 rv:6.0; sl-SI) AppleWebKit/532.35.3 (KHTML, like Gecko) Version/5.0 Safari/532.35.3
Type: Blocked
United States Bucyrus, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:43 PM (55 minutes ago)
IP: 71.213.171.142 Hostname: 71-213-171-142.mnfd.qwest.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States Shippensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/reflex-gallery/admin/scripts/FileUploader/php.php?Year=2018&Month=…
2/8/2018 7:53:41 PM (55 minutes ago)
IP: 67.234.2.7 Hostname: pa-67-234-2-7.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Opera/8.30 (X11; Linux i686; sl-SI) Presto/2.8.251 Version/10.00
Type: Blocked
Russia Ulan-Ude, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/gallery-plugin/upload/php.php
2/8/2018 7:53:22 PM (55 minutes ago)
IP: 92.126.154.118 Hostname: 92.126.154.118.stbur.ru
Human/Bot: Bot
Browser: Firefox version 35.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_6 rv:3.0) Gecko/20111223 Firefox/35.0
Type: Blocked
United States Wake Forest, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-admin/admin-post.php?task=wpmp_upload_previews
2/8/2018 7:53:21 PM (55 minutes ago)
IP: 184.3.173.178 Hostname: nc-184-3-173-178.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Firefox version 36.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64; rv:6.0) Gecko/20140513 Firefox/36.0
Type: Blocked
United States Greenville, United States was blocked by firewall for a Malicious File Upload in file: files=Vsvsd.php at http://stewwebb.com/wp-content/plugins/php-event-calendar/server/file-uploader/
2/8/2018 7:53:13 PM (55 minutes ago)
IP: 76.0.176.164 Hostname: nc-76-0-176-164.dhcp.embarqhsd.net
Human/Bot: Bot
Browser: Safari version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_5_6 rv:3.0; sl-SI) AppleWebKit/535.7.2 (KHTML, like Gecko) Version/4.0.2 Safari/535.7.2
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (55 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States San Mateo, United States was blocked by firewall at http://stewwebb.com/wp-content/plugins/mailpress/mp-includes/action.php
2/8/2018 7:53:00 PM (55 minutes ago)
IP: 198.11.183.69 Hostname: 198.11.183.69
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/5322 (KHTML, like Gecko) Chrome/37.0.872.0 Mobile Safari/5322
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (55 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
United States Fall Creek, United States was blocked by firewall for Slider Revolution: Arbitrary File Upload at http://stewwebb.com/wp-admin/admin-ajax.php
2/8/2018 7:52:58 PM (55 minutes ago)
IP: 184.158.0.64 Hostname: 184-158-0-64.dyn.centurytel.net
Human/Bot: Bot
Browser: Chrome version 0.0 running on Win8
Mozilla/5.0 (Windows NT 6.2) AppleWebKit/5362 (KHTML, like Gecko) Chrome/37.0.829.0 Mobile Safari/5362
Type: Blocked
Russia Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (55 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Type: Blocked
Russia Biysk, Russia was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/sharexy/ajaxresponder.php
2/8/2018 7:52:57 PM (55 minutes ago)
IP: 31.43.219.37 Hostname: 31.43.219.37
Human/Bot: Bot
Browser: Firefox version 36.0 running on MacOSX
Mozilla/5.0 (Macintosh; PPC Mac OS X 10_8_3 rv:6.0) Gecko/20111013 Firefox/36.0
Type: Blocked
United States Warrensburg, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/real3d-flipbook/includes/process.php
2/8/2018 7:51:59 PM (57 minutes ago)
IP: 76.0.26.95 Hostname: mo-76-0-26-95.dyn.embarqhsd.net
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (compatible; MSIE 5.0; Windows 95; Trident/5.1)
Type: Blocked
United States Manchester, United States was blocked by firewall for UserPro – User Profiles with Social Login <= 4.9.17 – Authentication Bypass in query string: up_auto_log=true at http://stewwebb.com/?up_auto_log=true
2/8/2018 7:51:53 PM (57 minutes ago)
IP: 98.174.87.168 Hostname: customernet.completeitcenter.com
Human/Bot: Bot
Browser: undefined
Mozilla/5.0 (Windows NT 4.0; en-US; rv:1.9.0.20) Gecko/20120810 Firefox/35.0
Type: Blocked
United Kingdom London, United Kingdom was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:50:39 PM (58 minutes ago)
IP: 35.178.19.46 Hostname: ec2-35-178-19-46.eu-west-2.compute.amazonaws.com
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
Type: Blocked
United States Auburn, United States was blocked by firewall for Malicious File Upload (PHP) at http://stewwebb.com/wp-content/plugins/wpstorecart/php/upload.php
2/8/2018 7:49:24 PM (59 minutes ago)
IP: 75.172.5.254 Hostname: 75-172-5-254.tukw.qwest.net
Human/Bot: Bot
Browser: IE version 6.0 running on Win32
Mozilla/5.0 (compatible; MSIE 6.0; Windows 98; Trident/5.0)
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=4
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=3
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=2
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=1
2/8/2018 7:43:26 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Canada Montreal, Canada was blocked by firewall at http://stewwebb.com/?author=0
2/8/2018 7:43:25 PM (1 hour 5 mins ago)
IP: 198.245.60.60 Hostname: ns4000056.ip-198-245-60.net
Human/Bot: Bot
Type: Blocked
Venezuela Caracas, Venezuela was blocked by firewall at http://www.stewwebb.com/
2/8/2018 6:24:10 PM (2 hours 25 mins ago)
IP: 190.72.143.141 Hostname: 190-72-143-141.dyn.dsl.cantv.net
Human/Bot: Bot
Browser: Chrome version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.86 Safari/537.36
Type: Blocked
Venezuela Caracas, Venezuela left http://www.stewwebb.com/ and was blocked by firewall at http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-0…
2/8/2018 6:23:55 PM (2 hours 25 mins ago)
IP: 190.72.143.141 Hostname: 190-72-143-141.dyn.dsl.cantv.net
Human/Bot: Bot
Browser: Chrome version 59.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/59.0.3071.86 Safari/537.36
Type: Blocked
United States Dallas, United States was blocked by firewall at http://www.stewwebb.com/xmlrpc.php
2/8/2018 2:42:28 PM (6 hours 6 mins ago)
IP: 50.22.59.195 Hostname: linux.servidor5.net
Human/Bot: Bot
Browser: undefined
wp-windowsphone

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower

(Larry Mizel top right)

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

evidence

Fidelity Larry Mizel Denver Cyber Attacks against Stew Webb Whistleblower

Peace Valley, United States visited http://www.stewwebb.com/
2/11/2018 6:34:05 PM (3 hours 24 mins ago)
IP: 64.251.142.57 Hostname: 64-251-142-57.fidnet.com
Browser: Chrome version 0.0 running on Win10
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36
NetRange: 64.251.128.0 – 64.251.159.255
[8192 addresses in this network]
CIDR: 64.251.128.0/19 (64.251.128.0 – 64.251.191.255)
[16384 addresses in this network]
NetName: NETBLK2-FIDN
NetHandle: NET-64-251-128-0-1
Parent: NET64 (NET-64-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Fidelity Communication International Inc. (FIDN)
RegDate: 2001-02-16
Updated: 2003-08-11
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Ref: https://whois.arin.net/rest/net/NET-64-251-128-0-1

OrgName: Fidelity Communication International Inc.
OrgId: FIDN
Address: 64 N.Clark
City: Sullivan
StateProv: MO
PostalCode: 63080
Country: US
RegDate: 1995-06-19
Updated: 2012-09-29
Ref: https://whois.arin.net/rest/org/FIDN

OrgAbuseHandle: NOC2396-ARIN
OrgAbuseName: Network Operations Center
OrgAbusePhone: +1-573-468-1220
OrgAbuseEmail: nocadmins@fidnet.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NOC2396-ARIN

OrgTechHandle: NOC2396-ARIN
OrgTechName: Network Operations Center
OrgTechPhone: +1-573-468-1220
OrgTechEmail: nocadmins@fidnet.com
OrgTechRef: https://whois.arin.net/rest/poc/NOC2396-ARIN
Are you looking for IPv4 address 64.251.142.57?Are you looking for domain fidnet.com?
This domain is hosted by Fidelity Communication International Inc. (AS11976). The first DNS server is sullivan.hwy66.com. The current IPv4 address is 216.229.64.111. The mail server with the highest priority is mx1.emailsrvr.com.
=spf1 include:emailsrvr.com ~all
DNS server (NS records) sullivan.hwy66.com (216.229.72.9)
ns1.fidnet.com (216.229.72.9)
ns2.fidnet.com (216.229.73.9)
ns3.fidnet.com (216.229.74.9)
rolla.hwy66.com (216.229.73.9)
Mail server (MX records) mx1.emailsrvr.com (108.166.43.1)
mx2.emailsrvr.com (108.166.43.2)
IP address (IPv4) 216.229.64.111
IP address (IPv6)
ASN number 11976
ASN name (ISP) Fidelity Communication International Inc.
IP-range/subnet 216.229.64.0/23
216.229.64.0 – 216.229.65.255
Domain Status:
Registry Registrant ID:
Registrant Name: Fidelity Communication International Inc.
Registrant Organization: Fidelity Communication International Inc.
Registrant Street: 64 N CLARK ST
Registrant City: SULLIVAN
Registrant State/Province: MO
Registrant Postal Code: 63080-1610
Registrant Country: US
573-468-8081
fidelitycommunications.com
This domain is hosted by Fidelity Communication International Inc. (AS11976). The first DNS server is ns3.fidnet.com. The current IPv4 address is 216.229.64.110. The mail server with the highest priority is fidelitycommunications-com.mail.protection.outlook.com.
v=spf1 a:webmail.fidelitycommunications.com
a:billpay.fidelitycommunications.com
ip4:216.229.64.64/26 ip4:216.229.64.136/29
include:_spf.smtp.com include:servers.mcsv.net
include:spf.protection.outlook.com ~a
DNS server (NS records) ns3.fidnet.com (216.229.74.9)
ns1.fidnet.com (216.229.72.9)
ns2.fidnet.com (216.229.73.9)
Mail server (MX records) fidelitycommunications-com.mail.protection.outlook.com (207.46.163.106)
IP address (IPv4) 216.229.64.110
IP address (IPv6)
ASN number 11976
ASN name (ISP) Fidelity Communication International Inc.
IP-range/subnet 216.229.64.0/23
216.229.64.0 – 216.229.65.255

Domain IPv4 address Ranking Alexa Pagerank
fidnet.biz 198.252.99.168
fidnet.com 216.229.64.111 3
fidnet.com.ua
fidnet.eu 213.186.33.5
fidnet.fr 213.186.33.5
fidnet.net
fidnet.org
fidnet3.com 213.251.168.185 -1
fidnet3.fr 85.159.215.247
fidnetb.com 45.126.209.154
fidnethelpdesk.com 192.185.174.55
IPv4 routes
Startip Endip Description Country #domains #spamhosts
85.119.142.0 85.119.142.255 Site 3 subnet 142 NO 0 0
93.126.142.0 93.126.142.255 93.126.142.0/24 LB 0 0
185.77.251.0 185.77.251.255 Noop-185-77-251-0-24 GB 0 0
188.208.142.0 188.208.142.255 CLOUDPROS-188-208-142-0-24 ES 24 0
188.211.251.0 188.211.251.255 Noop-188-211-251-0-24 GB 0 0
212.8.251.0 212.8.251.255 NFOrce Entertainment BV – route 212.8.251.0/24 RU 1,271 0
IPv6 routes

No IPv6 ranges found
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
55844 142 KASIKORNBANK Building 4th Floor Silom Road Suriyawong Bangrak Bangkok 10500 TH 2 2 4 0

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Amazon US Gov Israel Cyber Attacks against Stew Webb Whistleblower

By Stew Webb Federal Whistle blower 34 years

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

http://www.stewwebb.com/2017/12/07/president-trump-stop-cyber-terrorism-against-stew-webb-whistle-blower/

The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce.

Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I will be posting the entire report proving over 6 million felonies over three years against my email account, my internet service providers and my website stewwebb.com under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] and Violations of my 1st Amendment Right to freedom of speech and Violations under RICO The Racketeering Influence and Corruption Organization Act plus attempted murders since 2009 because of filings in US District Court in Kansas City for Injunctive Relief from attempted murder using Blackwater Helicopter to lazer and kill this whistle blower then three car crashes from October 2010 – November 2011 which I have not been paid and which the car crashes has disabled this Whistle blower and I am being cheated out of one half of the social security minimum that I am entitled to under US law.

Related

Below are at least 12 or more links to Israel, US DOD, British Intel, Larry Mizel, George HW Bush, Kansas City FBI, Missouri Fusing Center and many others in the US Shadow Government also now being called the Deep State. The Shadow Government is the top of the deep state also known as the Illuminati also known and the Council of 13 also known as the 12 Disciples of Satan, George HW Bush, Larry Mizel, Henry Kissinger, William Grace, Answar Ben Shari, Pope Benidick, David Rockefeller, Patrick WU aka Patrick WY, Meyer Rothchild, Paul Warberg, and I am missing 2 of the 12.

Amazon US Gov or Israel Cyber Attacks against Stew Webb Whistle blower

United States Ashburn, United States visited http://stewwebb.com/ads.txt
2/11/2018 11:30:45 PM (23 minutes ago)
IP: 52.91.59.128 Hostname: ec2-52-91-59-128.compute-1.amazonaws.com
Browser: Chrome version 0.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
NetRange: 52.84.0.0 – 52.95.255.255
[786432 addresses in this network]
CIDR: 52.88.0.0/13, 52.84.0.0/14 (52.88.0.0 – 52.95.255.255)
[524288 addresses in this network]
NetName: AT-88-Z
NetHandle: NET-52-84-0-0-1
Parent: NET52 (NET-52-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: Amazon Technologies Inc. (AT-88-Z)
RegDate: 1991-12-19
Updated: 2015-03-20
Ref: https://whois.arin.net/rest/net/NET-52-84-0-0-1

OrgName: Amazon Technologies Inc.
OrgId: AT-88-Z
Address: 410 Terry Ave N.
City: Seattle
StateProv: WA
PostalCode: 98109
Country: US
RegDate: 2011-12-08
Updated: 2017-01-28

Your kind Contributions are very much appreciated thank you. – Stew Webb

 

 




Kansas City FBI Cyber Attack against Stew Webb Whistle blower

By Stew Webb
This is evidence gathered October 31, 2017 from Stew Webb Federal Whistle

website stewwebb.com is being attacked by Cyber Terrorists in Violations of my 1st Amendment Right to freedom of speech and a form of RICO.
I have over three years of evidence.
I will be posting the entire report proving over 6 million felonies under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.
I am aware that this attack most likely by the same Cyber Terrorists and these are many Military Installations, Private and Public Corporations and FBI all tied to Larry Mizel and George HW Bush Organized Crime Ring.

EVIDENCE BELOW

Kansas City, United States tried to access non-existent page http://www.stewwebb.com/2017/01/20/george-hw-bush-eatsco-treason-sedition/%5C&du=www.stewwebb.com/2017/01/20/george-hw-bush-eatsco-trea…10/31/2017 4:01:42 PM (22 seconds ago) IP: 96.43.142.138 [block] Hostname: 96.43.142.138
Browser: undefined
Mozilla/5.0 (X11; CrOS i686 3912.101.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/27.0.1453.116 Safari/537.36

NetRange: 96.43.128.0 – 96.43.143.255 [4096 addresses in this network. Click to block this network]
CIDR: 96.43.128.0-96.43.159.255 [8191 addresses in this network. Click to block this network]
NetName: JOESDC-01
NetHandle: NET-96-43-128-0-1
Parent: NET96 (NET-96-0-0-0-0)
NetType: Direct Allocation
OriginAS: AS19969
Organization: Joe’s Datacenter, LLC (JOESD)
RegDate: 2009-10-16
Updated: 2012-02-24
Ref: https://whois.arin.net/rest/net/NET-96-43-128-0-1

 

OrgName: Joe’s Datacenter, LLC
OrgId: JOESD
Address: 1325 Tracy Ave
City: Kansas City
StateProv: MO
PostalCode: 64106
Country: US
RegDate: 2009-08-21
Updated: 2017-01-28
Ref: https://whois.arin.net/rest/org/JOESD

ReferralServer: rwhois://support.joesdatacenter.com:4321

OrgAbuseHandle: NAA25-ARIN
OrgAbuseName: Network Abuse Administrator
OrgAbusePhone: +1-877-226-0840
OrgAbuseEmail: security@joesdatacenter.com
OrgAbuseRef: https://whois.arin.net/rest/poc/NAA25-ARIN

OrgTechHandle: JPM84-ARIN
OrgTechName: Morgan, Joe Patrick
OrgTechPhone: +1-816-726-7615
OrgTechEmail: joe@joesdatacenter.com
OrgTechRef: https://whois.arin.net/rest/poc/JPM84-ARIN

OrgNOCHandle: JPM84-ARIN
OrgNOCName: Morgan, Joe Patrick
OrgNOCPhone: +1-816-726-7615
OrgNOCEmail: joe@joesdatacenter.com
OrgNOCRef: https://whois.arin.net/rest/poc/JPM84-ARIN

RAbuseHandle: NAA25-ARIN
RAbuseName: Network Abuse Administrator
RAbusePhone: +1-877-226-0840
RAbuseEmail: security@joesdatacenter.com
RAbuseRef: https://whois.arin.net/rest/poc/NAA25-ARIN

RTechHandle: JPM84-ARIN
RTechName: Morgan, Joe Patrick
RTechPhone: +1-816-726-7615
RTechEmail: joe@joesdatacenter.com
RTechRef: https://whois.arin.net/rest/poc/JPM84-ARIN

RNOCHandle: JPM84-ARIN
RNOCName: Morgan, Joe Patrick
RNOCPhone: +1-816-726-7615
RNOCEmail: joe@joesdatacenter.com
RNOCRef: https://whois.arin.net/rest/poc/JPM84-ARIN
@@@@@@@@@@@@
http://www.kcix.net/

This domain is hosted by WholeSale Internet, Inc. (AS32097). The first DNS server is ns1.kcix.net. The current IPv4 address is 208.110.64.11. The mail server with the highest priority is kcix.net.

v=spf1 +a +mx +ip4:208.110.64.10 +ip4:208.110.64.11 ~
DNS server (NS records) ns1.kcix.net (208.110.64.5)
ns2.kcix.net (208.110.64.6)
Mail server (MX records) kcix.net (208.110.64.11)
IP address (IPv4) 208.110.64.11
IP address (IPv6)
ASN number 32097
ASN name (ISP) WholeSale Internet, Inc.
IP-range/subnet 208.110.64.0/19
208.110.64.0 – 208.110.95.255

Domain Name: KCIX.NET
Registry Domain ID: 112561627_DOMAIN_NET-VRSN
Registrar WHOIS Server: whois.enom.com
Registrar URL: www.enom.com
Updated Date: 2017-01-27T00:52:10.00Z
Creation Date: 2004-02-25T03:21:21.00Z
Registrar Registration Expiration Date: 2018-02-25T03:21:00.00Z
Registrar: ENOM, INC.
Registrar IANA ID: 48
Domain Status: clientTransferProhibited https://www.icann.org/epp#clientTransferProhibited
Registry Registrant ID:
Registrant Name: AARON WENDEL
Registrant Organization: KANSAS CITY INTERNET EXCHANGE, LLC
Registrant Street: 6910 W. 83RD ST.
Registrant Street: SUITE 207
Registrant City: OVERLAND PARK
Registrant State/Province: KS
Registrant Postal Code: 66204
Registrant Country: US
Registrant Phone: +1.8168680888
Registrant Phone Ext:
Registrant Fax: +1.3144315202
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: AARON WENDEL
Admin Organization: KANSAS CITY INTERNET EXCHANGE, LLC
Admin Street: 6910 W. 83RD ST.
Admin Street: SUITE 207
Admin City: OVERLAND PARK
Admin State/Province: KS
Admin Postal Code: 66204
Admin Country: US
Admin Phone: +1.8168680888
Admin Phone Ext:
Admin Fax: +1.3144315202
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: AARON WENDEL
Tech Organization: KANSAS CITY INTERNET EXCHANGE, LLC
Tech Street: 6910 W. 83RD ST.
Tech Street: SUITE 207
Tech City: OVERLAND PARK
Tech State/Province: KS
Tech Postal Code: 66204
Tech Country: US
Tech Phone: +1.8168680888
Tech Phone Ext:
Tech Fax: +1.3144315202
Tech Fax Ext:
Tech Email: removed email address
Name Server: NS1.KCIX.NET
Name Server: NS2.KCIX.NET
DNSSEC: unSigned
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: +1.4252982646
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2017-01-27T00:52:10.00Z <<<

 

Are you looking for IPv4 address 208.110.64.11?Are you looking fo
Domains
Domain IPv4 address Ranking Alexa Pagerank
kcix.cc
kcix.cn 47.89.58.32
kcix.co.kr 101.55.3.150
kcix.com 98.124.199.30
kcix.com.cn
kcix.de
kcix.net 208.110.64.11 -1
kcix.org 101.55.3.150
kcix.win 107.178.149.108
kcixd.loan 209.99.40.226
kcixdg.wang 185.216.72.96
kcixdt.work 142.91.134.178
kcixhi.info 67.229.215.92
kcixi.com
kcixike.top
kcixin001.com 185.176.40.63
kcixonline.com 45.40.164.132 2
kcixsy.info 166.88.190.3
kcixv.loan 198.204.236.83
IPv4 routes
Startip Endip Description Country #domains #spamhosts
31.172.136.0 31.172.143.255 Home net project, http://domonet.ua/ UA 20 0
46.150.160.0 46.150.191.255 Web Page: http://www.opticom.net RU 9 0
62.122.192.0 62.122.199.255 Web Page: http://www.opticom.net RU 10 0
185.166.4.0 185.166.7.255 http.net Internet GmbH DE 0 0
213.160.64.0 213.160.95.255 http.net Internet GmbH DE 21,560 0
31.172.136.0 31.172.137.255 Home net project, http://domonet.ua/ UA 4 0
31.172.136.0 31.172.136.255 Home net project, http://domonet.ua/ UA 0 0
31.172.137.0 31.172.137.255 Home net project, http://domonet.ua/ UA 4 0
31.172.141.0 31.172.141.255 Home net project, http://domonet.ua/ UA 4 0
46.150.180.0 46.150.183.255 Web Page: http://www.opticom.net RU 0 0
62.122.197.0 62.122.197.255 Web Page: http://www.opticom.net RU 5 0
128.0.170.0 128.0.170.255 Home net project, http UA 1 0
128.0.174.0 128.0.174.255 Home net project, http UA 6 1
194.44.16.0 194.44.16.255 http://www.uar.net UA 1 0
194.44.17.0 194.44.17.255 http://www.lutsk.uar.net UA 1 3
194.44.20.0 194.44.20.255 http://www.lutsk.uar.net UA 0 0
194.44.32.0 194.44.32.255 http://www.radioservice.net.ua UA 0 0
194.44.36.0 194.44.36.255 http://www.radioservice.net.ua UA 0 0
194.44.41.0 194.44.41.255 http://www.uar.net UA 0 3
194.44.42.0 194.44.42.255 http://www.uar.net UA 1 0
194.44.45.0 194.44.45.255 http://www.uar.net UA 1 0
194.44.46.0 194.44.47.255 http://www.rv.uar.net UA 0 0
194.44.61.0 194.44.61.255 http://www.uar.net UA 4 1
194.44.65.0 194.44.65.255 http://www.uar.net UA 2 1
194.44.69.0 194.44.69.255 http://www.rv.uar.net UA 2 0
194.44.73.0 194.44.73.255 http://www.rv.uar.net UA 0 0
194.44.76.0 194.44.76.255 http://www.rv.uar.net UA 0 0
194.44.79.0 194.44.79.255 http://www.rv.uar.net UA 0 0
194.44.80.0 194.44.81.255 http://www.rv.uar.net UA 0 0
194.44.89.0 194.44.89.255 http://www.rv.uar.net UA 0 0
194.44.90.0 194.44.90.255 http://www.rv.uar.net UA 0 0
194.44.91.0 194.44.91.255 http://www.rv.uar.net UA 0 0
194.44.95.0 194.44.95.255 http://www.rv.uar.net UA 12 0
194.44.96.0 194.44.96.255 http://www.rv.uar.net UA 0 0
194.44.99.0 194.44.99.255 http://www.rv.uar.net UA 0 3
194.44.100.0 194.44.100.255 http://www.uar.net UA 0 0
194.44.101.0 194.44.101.255 http://www.rv.uar.net UA 0 0
194.44.103.0 194.44.103.255 http://www.rv.uar.net UA 0 0
194.44.106.0 194.44.107.255 http://www.uar.net UA 0 0
194.44.118.0 194.44.119.255 http://www.rv.uar.net UA 0 0
194.44.118.0 194.44.118.255 http://www.rv.uar.net UA 0 0
194.44.119.0 194.44.119.255 http://www.rv.uar.net UA 0 0
194.44.144.0 194.44.144.255 http://www.uar.net UA 5 0
194.44.149.0 194.44.149.255 http://www.rv.uar.net UA 0 0
194.44.151.0 194.44.151.255 http://www.uar.net UA 2 1
194.44.153.0 194.44.153.255 http://www.uar.net UA 2 0
194.44.155.0 194.44.155.255 http://www.uar.net UA 0 0
194.44.158.0 194.44.158.255 http://www.uar.net UA 1 1
194.44.159.0 194.44.159.255 http://www.uar.net UA 0 0
194.44.162.0 194.44.162.255 http://www.uar.net UA 0 0
IPv6 routes
Startip Endip Description Country #domains #spamhosts
2a00:17d8:: 2a00:17df:ffff:ffff:ffff:ffff:ffff:ffff http.net Internet GmbH DE 107 0
2001:7f8:1d:: 2001:7f8:1d:ffff:ffff:ffff:ffff:ffff http://www.trex.fi/ FI 0 0
2a00:54e0:: 2a00:54e0:ffff:ffff:ffff:ffff:ffff:ffff EL.COM. S.R.L. – dodonet network – http://www.dodonet.it IT 0 0
2a01:7bc0:: 2a01:7bc0:ffff:ffff:ffff:ffff:ffff:ffff http://www.isolcom.fi/ FI 0 0
2001:830:fc:: 2001:830:fc:ffff:ffff:ffff:ffff:ffff Mainlab GmbH – http://www.mainlab.de/ DE 0 0
2a05:dfc7:5:: 2a05:dfc7:5:ffff:ffff:ffff:ffff:ffff FuslVZ OpenNIC Anycast DNS Resolver (IPv6-1) – http://dnsrec.meo.ws/ GB 14 0
2a05:dfc7:5353:: 2a05:dfc7:5353:ffff:ffff:ffff:ffff:ffff FuslVZ OpenNIC Anycast DNS Resolver (IPv6-5) – http://dnsrec.meo.ws/ GB 0 0
2a00:d18:: 2a00:d18:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 2 0
2a00:16d0:: 2a00:16d0:ffff:ffff:ffff:ffff:ffff:ffff Net By Net Holding LLC RU 0 0
2a03:d240:: 2a03:d240:ffff:ffff:ffff:ffff:ffff:ffff Net-Surf.net Ltd. BG 0 0
2001:518:: 2001:518:ffff:ffff:ffff:ffff:ffff:ffff Net Access Corporation US 6 0
2001:5a8:: 2001:5a8:ffff:ffff:ffff:ffff:ffff:ffff SONIC.NET, INC. US 13 0
2001:678:d4:: 2001:678:d4:ffff:ffff:ffff:ffff:ffff Medi@net S.r.l. IT 0 0
2001:678:170:: 2001:678:170:ffff:ffff:ffff:ffff:ffff Air NET Marcin Gola PL 0 0
2001:678:178:: 2001:678:178:ffff:ffff:ffff:ffff:ffff PROGRESS NET Sp. z o.o. PL 0 0
2001:678:190:: 2001:678:190:ffff:ffff:ffff:ffff:ffff Forest Net LTD RU 0 0
2001:678:320:: 2001:678:320:ffff:ffff:ffff:ffff:ffff Tipsport.net a.s. CZ 0 0
2001:678:38c:: 2001:678:38c:ffff:ffff:ffff:ffff:ffff Rawi-Net Sp. z o.o PL 0 0
2001:678:3c8:: 2001:678:3c8:ffff:ffff:ffff:ffff:ffff ARX-NET SA GR 4 0
2001:678:3e8:: 2001:678:3e8:ffff:ffff:ffff:ffff:ffff Janex-Net Marek Jasinski PL 3 0
2001:67c:84:: 2001:67c:84:ffff:ffff:ffff:ffff:ffff MAN net Ltd. CZ 0 0
2001:67c:e8:: 2001:67c:e8:ffff:ffff:ffff:ffff:ffff Multi-Net plus Ltd CZ 0 0
2001:67c:11c:: 2001:67c:11c:ffff:ffff:ffff:ffff:ffff MT-NEt G.Wojcik J.Kusnierz s.c. PL 3 0
2001:67c:53c:: 2001:67c:53c:ffff:ffff:ffff:ffff:ffff RECRO-NET d.o.o. HR 0 0
2001:67c:618:: 2001:67c:618:ffff:ffff:ffff:ffff:ffff KM-NET Marek Sobol PL 0 0
2001:67c:668:: 2001:67c:668:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:67c:738:: 2001:67c:738:ffff:ffff:ffff:ffff:ffff Maximum-Net LLC UA 2 0
2001:67c:7e4:: 2001:67c:7e4:ffff:ffff:ffff:ffff:ffff BB-ONE.net Limited DE 0 0
2001:67c:10a8:: 2001:67c:10a9:ffff:ffff:ffff:ffff:ffff berli.net DE 2 0
2001:67c:1160:: 2001:67c:1160:ffff:ffff:ffff:ffff:ffff Schuh-NET DE 0 0
2001:67c:11e8:: 2001:67c:11e8:ffff:ffff:ffff:ffff:ffff WI-HURA.NET Sp. z o.o. PL 0 0
2001:67c:1320:: 2001:67c:1320:ffff:ffff:ffff:ffff:ffff integration.net GmbH DE 302 0
2001:67c:13e0:: 2001:67c:13e0:ffff:ffff:ffff:ffff:ffff MS-NET MICHAL SLUSARCZYK PL 0 0
2001:67c:1728:: 2001:67c:1728:ffff:ffff:ffff:ffff:ffff 6assist.net IXP UA 0 0
2001:67c:2100:: 2001:67c:2100:ffff:ffff:ffff:ffff:ffff CH-NET S.R.L. RO 1 0
2001:67c:2158:: 2001:67c:2158:ffff:ffff:ffff:ffff:ffff WIECZOR-NET Sieci Komputerowe, Internet Henryk Wieczorek PL 1 0
2001:67c:2190:: 2001:67c:2190:ffff:ffff:ffff:ffff:ffff SPOJE.NET s.r.o. CZ 159 0
2001:67c:21ec:: 2001:67c:21ec:ffff:ffff:ffff:ffff:ffff e-utp.net Marcin Gondek PL 8 0
2001:67c:24f4:: 2001:67c:24f4:ffff:ffff:ffff:ffff:ffff BEST-NET s.r.o. CZ 1,423 0
2001:67c:2604:: 2001:67c:2604:ffff:ffff:ffff:ffff:ffff SURANY.NET s.r.o. SK 3 0
2001:67c:286c:: 2001:67c:286c:ffff:ffff:ffff:ffff:ffff thirdnode.net IPv6 PI GB 8 0
2001:67c:2ac0:: 2001:67c:2ac0:ffff:ffff:ffff:ffff:ffff secondary.net.ua UA 1 0
2001:67c:2b5c:: 2001:67c:2b5c:ffff:ffff:ffff:ffff:ffff Juraj Koba – SOBOTISTE.NET SK 0 0
2001:67c:2db4:: 2001:67c:2db4:ffff:ffff:ffff:ffff:ffff elzappero.net Marcin Zapotoczny PL 0 0
2001:67c:2e34:: 2001:67c:2e34:ffff:ffff:ffff:ffff:ffff NPK Home-Net Ltd. UA 0 0
2001:7f8:29:: 2001:7f8:29:ffff:ffff:ffff:ffff:ffff contact: ipv6@n-ix.net for information DE 0 0
2001:7f8:9b:: 2001:7f8:9b:ffff:ffff:ffff:ffff:ffff Podkarpacki.net Rafal Czarny PL 0 0
2001:7f8:a9:: 2001:7f8:a9:ffff:ffff:ffff:ffff:ffff SC ITNS.NET SRL MD 0 0
2001:7fe:: 2001:7fe:ffff:ffff:ffff:ffff:ffff:ffff Prefix reserved for DNS root name server i.root-servers.net. SE 0 0
2001:930:: 2001:930:ffff:ffff:ffff:ffff:ffff:ffff VODAFONE NET ILETISIM HIZMETLERI ANONIM SIRKETI TR 0 0
Providers
ASN Provider Country #prefixes IPv4 #prefixes IPv6 #domains #spamhosts
12574 http.net Internet GmbH DE 1 1 21,560 0
58544 http TH 2 0 3 0
12714 Net By Net Holding LLC RU 193 2 4,237 138
20911 Net-Surf.net Ltd. BG 27 0 72 11
51939 Net By Net Holding LLC RU 1 0 0 0
267 Nether.Net US 1 0 0 0
606 schat.net US 3 0 48 0
819 LARG*net CA 21 1 163 0
1618 Daytona Net Works, Inc. US 2 0 272 0
1886 BT NET d.o.o. za trgovinu i usluge HR 7 8 10 0
1902 Deutsche Telekom Pan-Net s.r.o. SK 3 0 0 0
3254 Lucky Net Ltd UA 4 0 1,833 5
3595 Global Net Access, LLC US 40 3 92,933 12
3931 Logical Net Corporation US 6 0 764 0
3976 I.Net Technologies Inc. KR 1 0 0 0
4685 Asahi Net JP 33 2 8,936 10
4776 A-Net Co., Ltd. TH 35 1 149 3
4781 PAGIC.net , INC. TW 8 0 3 0
4788 TM Net, Internet Service Provider MY 431 11 34,163 778
5405 CSO.net Internet Services GmbH AT 1 1 3,894 0
5541 SC AD NET MARKET MEDIA SRL RO 24 3 592 4
6364 Atlantic.net, Inc. US 47 5 18,379 11
6380 BellSouth.net Inc. US 5 0 0 0
6381 BellSouth.net Inc. US 9 0 0 0
6382 BellSouth.net Inc. US 5 0 0 0
6383 BellSouth.net Inc. US 5 0 0 0
6384 BellSouth.net Inc. US 7 0 0 0
6385 BellSouth.net Inc. US 6 0 0 0
6386 BellSouth.net Inc. US 23 0 4 0
6389 BellSouth.net Inc. US 2,045 0 11,271 16
6624 Gower.Net US 2 0 26 0
6735 sdt.net AG DE 6 1 301 2
6831 Net & Com s.r.l. IT 2 0 654 0
6911 Pro-Net Internet Services Limited GB 6 0 187 1
7106 Com Net, Inc. US 10 1 1,000 2
7146 Georgia Business Net, Inc US 2 0 45 0
7175 aussie.net Pty Limited AU 3 1 2 0
7350 MetComm.Net, LLC US 1 0 40 0
7403 Colba Net Inc. CA 8 0 291 2
7600 Escape.net AU 55 4 512 0
7641 China Broadcasting TV Net CN 8 0 60 0
7806 Binary Net, LLC US 16 0 1,265 0
7850 iHighway.net, Inc. US 22 1 37 0
7891 Bellsouth.Net US 1 0 0 0
7893 Bellsouth.Net US 2 0 0 0
7894 Bellsouth.Net US 9 0 1 0
8001 Net Access Corporation US 40 4 16,743 2
8057 Vision Net, Inc. US 42 1 317 5
8061 Bellsouth.Net US 13 0 0 0
8062 Bellsouth.Net US 7 0 5 0

 

 

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Larry Mizel Cyber attack against Stew Webb Whistle blower

Larry A. Mizel Organized Crime Boss Hog upper right

BiBi and Larry

Larry Mizel Cyber Terrorist left and Norman Brownstein right

Larry Mizel Cyber attack against Stew Webb Whistle blower

By Stew Webb
This is evidence gathered October 22, 2017 from Stew Webb Federal Whistle

website stewwebb.com is being attacked by Cyber Terrorists in Violations of my 1st Amendment Right to freedom of speech and a form of RICO.
I have over three years of evidence.
I will be posting the entire report proving over 6 million felonies under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.
I am aware that this attack most likely by the same Cyber Terrorists and these are many Military Installations, Private and Public Corporations and FBI all tied to Larry Mizel and George HW Bush Organized Crime Ring.

Larry Mizel Wide open west financial Cyber attack against Stew Webb Whistle blower
United States Schaumburg, United States visited http://www.stewwebb.com/2017/10/18/bush-clinton-homosexual-pedophile-sex-ring-totally-unmasked/
10/22/2017 1:43:17 PM (2 hours 45 mins ago) IP: 64.53.196.97 [unblock] Hostname: d53-64-97-196.nap.wideopenwest.com
Browser: Safari version 0.0 running on iOS
Mozilla/5.0 (iPhone; CPU iPhone OS 11_0_3 like Mac OS X) AppleWebKit/604.1.38 (KHTML, like Gecko) Version/11.0 Mobile/15A432 Safari/604.1
64.53.196.97

IP address 64.53.196.97
Location Schaumburg, Illinois, United States

IP address 64.53.196.97
Reverse DNS (PTR record) d53-64-97-196.nap.wideopenwest.com
DNS server (NS record) dns1.wideopenwest.com (64.233.207.16)
dns2.wideopenwest.com (64.233.207.2)
ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.53.196.0/22
64.53.196.0 – 64.53.199.255

Domains around
64.53.196.177
nofunberg.com
. This domain is hosted by WideOpenWest Finance LLC (AS12083). The first DNS server is ns1.hover.com. The current IPv4 address is 64.53.196.177. The mail server with the highest priority is mx.hover.com.cust.hostedemail.com.
DNS server (NS records) ns1.hover.com (216.40.47.26)
ns2.hover.com (64.98.148.13)
Mail server (MX records) mx.hover.com.cust.hostedemail.com (216.40.42.4)
IP address (IPv4) 64.53.196.177

ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.53.196.0/22
64.53.196.0 – 64.53.199.255
S server (NS records) dns2.wideopenwest.com (64.233.207.2)
dns1.wideopenwest.com (64.233.207.16)
Mail server (MX records) mx.wowway.com (64.8.71.111)
IP address (IPv4) 64.233.207.78

ASN number 12083
ASN name (ISP) WideOpenWest Finance LLC
IP-range/subnet 64.233.207.0/24
64.233.207.0 – 64.233.207.255

 

Domain Name: NOFUNBERG.COM
Domain ID: 1906313907_DOMAIN_COM-VRSN
Registrar WHOIS Server: whois.tucows.com
Registrar URL: http://tucowsdomains.com
Updated Date: 2017-02-28T10:06:39Z
Creation Date: 2015-03-01T10:27:55Z
Registrar Registration Expiration Date: 2018-03-01T10:27:55Z
Registrar: TUCOWS, INC.
Registrar IANA ID: 69
Registrar Abuse Contact Email: removed email address
Registrar Abuse Contact Phone: +1.4165350123
Reseller: Hover
Domain Status: clientTransferProhibited https://icann.org/epp#clientTransferProhibited
Domain Status: clientUpdateProhibited https://icann.org/epp#clientUpdateProhibited
Registry Registrant ID:
Registrant Name: Contact Privacy Inc. Customer 0139498153
Registrant Organization: Contact Privacy Inc. Customer 0139498153
Registrant Street: 96 Mowat Ave
Registrant City: Toronto
Registrant State/Province: ON
Registrant Postal Code: M6K 3M1
Registrant Country: CA
Registrant Phone: +1.4165385457
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: removed email address
Registry Admin ID:
Admin Name: Contact Privacy Inc. Customer 0139498153
Admin Organization: Contact Privacy Inc. Customer 0139498153
Admin Street: 96 Mowat Ave
Admin City: Toronto
Admin State/Province: ON
Admin Postal Code: M6K 3M1
Admin Country: CA
Admin Phone: +1.4165385457
Admin Phone Ext:
Admin Fax:
Admin Fax Ext:
Admin Email: removed email address
Registry Tech ID:
Tech Name: Contact Privacy Inc. Customer 0139498153
Tech Organization: Contact Privacy Inc. Customer 0139498153
Tech Street: 96 Mowat Ave
Tech City: Toronto
Tech State/Province: ON
Tech Postal Code: M6K 3M1
Tech Country: CA
Tech Phone: +1.4165385457
Tech Phone Ext:
Tech Fax:
Tech Fax Ext:
Tech Email: removed email address
Name Server: NS1.HOVER.COM
Name Server: NS2.HOVER.COM
DNSSEC: unsigned
URL of the ICANN WHOIS Data Problem Reporting System: http://wdprs.internic.net/
>>> Last update of WHOIS database: 2017-02-28T10:06:39Z <<<

“For more information on Whois status codes, please visit https://icann.org/epp”

Registration Service Provider:
Hover, removed email address
+1.8667316556
https://help.hover.com

hover.com
v=spf1 ip4:216.40.44.0/24 ip4:216.40.42.17/32 include:support.zendesk.com include:servers.mcsv.net ?

DNS server (NS records) ns2.hover.com (64.98.148.13)
ns1.hover.com (216.40.47.26)
Mail server (MX records) mx.hover.com.cust.hostedemail.com (216.40.42.4)
IP address (IPv4) 64.99.80.28
IP address (IPv6)
ASN number 15348
ASN name (ISP) Tucows.com Co.
IP-range/subnet 64.99.80.0/24
64.99.80.0-64.99.80.255

contactprivacy.com

 

4.53.196.0 – 64.53.199.255
CIDR: 64.53.196.0/22
NetName: IL-NAPR
NetHandle: NET-64-53-196-0-1
Parent: WIDEOPENWEST-2BLK (NET-64-53-128-0-1)
NetType: Reassigned
OriginAS: AS12083
Customer: Wide Open West (C02132434)
RegDate: 2009-01-14
Updated: 2014-12-16
Comment: Address complaints to removed email address
Ref: https://whois.arin.net/rest/net/NET-64-53-196-0-1

 

CustName: Wide Open West
Address: 1674 Frontenac Rd
City: Naperville
StateProv: IL
PostalCode: 60563
Country: US
RegDate: 2009-01-14
Updated: 2014-12-16
Ref: https://whois.arin.net/rest/customer/C02132434

OrgTechHandle: UNIXA3-ARIN
OrgTechName: Unix Administration
OrgTechPhone: +1-630-536-3158
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/UNIXA3-ARIN

OrgNOCHandle: IPADM669-ARIN
OrgNOCName: IP Administrator
OrgNOCPhone: +1-706-634-2898
OrgNOCEmail: removed email address
OrgNOCRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

OrgAbuseHandle: IPADM469-ARIN
OrgAbuseName: IP Administrator
OrgAbusePhone: +1-706-645-8194
OrgAbuseEmail: removed email address
OrgAbuseRef: https://whois.arin.net/rest/poc/IPADM469-ARIN

OrgTechHandle: IPADM669-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-706-634-2898
OrgTechEmail: removed email address
OrgTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

RTechHandle: IPADM669-ARIN
RTechName: IP Administrator
RTechPhone: +1-706-634-2898
RTechEmail: removed email address
RTechRef: https://whois.arin.net/rest/poc/IPADM669-ARIN

Your kind Contributions are very much appreciated thank you. – Stew Webb

 




Stew Webb Latest Radio Archives

StewWebb-RadioNetwork

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com
Radio Archives
https://www.youtube.com/channel/UC74KYEt1PE_r9FlTlB15QoA
https://www.youtube.com/stewwebb1
http://www.stewwebb.com/stew-webb-radio-archives/
http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives/

 




Radio Stew Webb and Tom Heneghan 2016-03-20

stewwebbradionetwork-com-2015-09-24

stewwebbradionetwork-com-2015-09-24

Stew Webb and Tom Heneghan discuss the latest Intelligence and Donald Trump Declared Threat to National Security by Obama!

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

Stew Webb Radio Archives
http://www.stewwebb.com/stew-webb-radio-archives

 

 




US judge orders Iran to pay $10.5 billion for 9/11 attacks

Israel-Connected-to-911

Whistle blower Lt Scott Bennett Press TV interview Israel, US Government, George W. Bush, Hillary Clinton and others need to be investigated for their roll in the 911 World Trade Center attacks September 11, 2001.

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Full Speech: Donald Trump Rally in Kansas City MO 3-12-2016

Donald-Trump-KCMO-2016-03-12

Full Speech: Donald Trump Rally in Kansas City, MO (3-12-16)

 

More Donald Trump Speeches:

https://www.youtube.com/channel/UCHqC-yWZ1kri4YzwRSt6RGQ

Stew Webb Radio Network
Listen Live
US Intel Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




Donald Trump Kansas City 6pm March 12 2016

Donald-Trump-Make-America-Great-Again

Donald Trump in Kansas City 6pm Saturday March 12 2016

SATURDAY, MARCH 12, 2016 –
KANSAS CITY, MO
Arvest Bank Theatre at The Midland
6:00 PM
Located in: Kansas City Power & Light District
Address: 1228 Main St, Kansas City, MO 64105
Campaign Rally
GET TICKETS

http://www.donaldjtrump.com/schedule

Full Speech: Donald Trump Rally in Kansas City, MO (3-12-16)

Stew Webb Radio Network
Listen Live
Breaking News
http://www.stewwebb.com
Listen live by phone
712-775-8269
federalwhistleblower@gmail.com

 




FBI DHS Israeli Cyber Attacks against US Whistle blower

Israel-Cyber-Terrorism-and-espionage-is-DOD-a-Co-Conspirator

Israel-Cyber-Terrorism-and-espionage-is-DOD-a-Co-Conspirator

Hits
Humans
Registered Users
Crawlers
Google Crawlers
Pages Not Found
Logins and Logouts
Top Consumers
Top 404s
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
11/28/2015 3:47:10 AM (1 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:09 AM (3 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:07 AM (4 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:06 AM (5 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:05 AM (7 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:03 AM (8 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:02 AM (10 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:47:01 AM (11 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:59 AM (12 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:58 AM (14 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:57 AM (15 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:55 AM (16 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:54 AM (18 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:52 AM (19 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:51 AM (21 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:50 AM (22 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:48 AM (23 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:47 AM (25 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:46 AM (26 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:44 AM (27 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:43 AM (29 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:41 AM (30 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:40 AM (31 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:38 AM (34 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:36 AM (35 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:35 AM (37 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:33 AM (38 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:32 AM (40 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:30 AM (41 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:29 AM (43 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:27 AM (45 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:25 AM (46 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:24 AM (48 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:22 AM (49 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:21 AM (51 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:20 AM (52 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:18 AM (53 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:17 AM (55 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:15 AM (56 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:14 AM (58 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:12 AM (59 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:11 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:09 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:08 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:07 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:05 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:04 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:02 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:46:00 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:59 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:58 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:56 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:55 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:54 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:52 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:51 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:48 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:47 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:46 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:44 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:39 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:37 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:35 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:33 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:32 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:30 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:29 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:28 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:26 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:25 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:24 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:22 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:21 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:19 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:18 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:16 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:15 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:13 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:12 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:10 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:09 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:07 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:06 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:04 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:03 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:02 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:00 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:59 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:57 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:56 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:54 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:53 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:51 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:50 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:48 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:47 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:46 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:44 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:42 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:41 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:39 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:38 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:36 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:35 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:34 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:32 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:44:31 AM (2 minutes ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:43 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:45:41 AM (1 minute ago)
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
Japan Tokyo, Japan visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:44:24 AM (3 minutes ago) IP: 203.189.102.104 [unblock] Hostname: 203-189-102-104.user.win-rd.jp
Browser: IE version 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
[Unblock this IP] — [Block this network] — [Run WHOIS on 203.189.102.104] — [See recent traffic]
Japan Tokyo, Japan visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:44:21 AM (3 minutes ago) IP: 203.189.102.104 [unblock] Hostname: 203-189-102-104.user.win-rd.jp
Browser: IE version 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
[Unblock this IP] — [Block this network] — [Run WHOIS on 203.189.102.104] — [See recent traffic]
Japan Tokyo, Japan visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:44:19 AM (3 minutes ago) IP: 203.189.102.104 [unblock] Hostname: 203-189-102-104.user.win-rd.jp
Browser: IE version 6.0
Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
[Unblock this IP] — [Block this network] — [Run WHOIS on 203.189.102.104] — [See recent traffic]
China Xiamen, China arrived from http://www.finewinegiftstore.com/product/38-stainless-steel-blow-off-tube-for-6-5-and-7-9-gallon-bucket-lids/ and visited http://www.stewwebb.com/2014/02/18/hillary-clinton-aipac-bush-organized-crime-figure/trackback/
11/28/2015 3:43:46 AM (4 minutes ago) IP: 58.23.62.37 [unblock this range] Hostname: 58.23.62.37
PHP/5.2.33
[Unblock this range] — [Block this network] — [Run WHOIS on 58.23.62.37] — [See recent traffic]
Brazil Boa Vista, Brazil visited http://www.stewwebb.com/
11/28/2015 3:43:44 AM (4 minutes ago) IP: 200.10.48.102 [unblock] Hostname: reverso-200-10-48-102.bakanas.net.br
Browser: Chrome version 35.0 running on Win7
Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/35.0.1916.153 Safari/537.36
[Unblock this IP] — [Block this network] — [Run WHOIS on 200.10.48.102] — [See recent traffic]
China Xiamen, China arrived from http://www.finewinegiftstore.com/product/38-stainless-steel-blow-off-tube-for-6-5-and-7-9-gallon-bucket-lids/ and visited http://www.stewwebb.com/2015/11/22/independence-day-july-4th/
11/28/2015 3:43:43 AM (4 minutes ago) IP: 58.23.62.37 [unblock this range] Hostname: 58.23.62.37
PHP/5.2.33
[Unblock this range] — [Block this network] — [Run WHOIS on 58.23.62.37] — [See recent traffic]
United States United States visited http://www.stewwebb.com/
11/28/2015 3:43:38 AM (4 minutes ago) IP: 176.61.140.111 [unblock] Hostname: 176.61.140.111
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this IP] — [Block this network] — [Run WHOIS on 176.61.140.111] — [See recent traffic]
China China arrived from http://www.finewinegiftstore.com/product/38-stainless-steel-blow-off-tube-for-6-5-and-7-9-gallon-bucket-lids/ and visited http://www.stewwebb.com/2015/11/22/independence-day-july-4th/
11/28/2015 3:43:35 AM (4 minutes ago) IP: 117.164.235.143 [unblock this range] Hostname: 117.164.235.143
PHP/5.2.33
China Hefei, China visited http://www.stewwebb.com/2014/01/28/rip-ken-adachi-educate-yourself-org/
11/28/2015 3:46:08 AM (2 minutes ago) IP: 223.240.77.32 [unblock this range] Hostname: 223.240.77.32
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
China Beijing, China visited http://www.stewwebb.com/2015/10/
11/28/2015 3:46:41 AM (2 minutes ago) IP: 220.181.108.148 [unblock this range] Hostname: baiduspider-220-181-108-148.crawl.baidu.com
Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
[Unblock this range] — [Block this network] — [Run WHOIS on 220.181.108.148] — [See recent traffic]
China Beijing, China visited http://www.stewwebb.com/2013/07/25/gulf-of-mexico-gas-rig-explodes/
11/28/2015 3:46:29 AM (2 minutes ago) IP: 180.76.15.33 [unblock this range] Hostname: baiduspider-180-76-15-33.crawl.baidu.com
Mozilla/5.0 (compatible; Baiduspider/2.0; +http://www.baidu.com/search/spider.html)
China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.zip
11/28/2015 1:52:35 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.rar
11/28/2015 1:52:33 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.com.zip
11/28/2015 1:52:32 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/stewwebb.com.rar
11/28/2015 1:52:30 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwstewwebbcom.zip
11/28/2015 1:52:29 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwstewwebbcom.rar
11/28/2015 1:52:27 AM (43 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www_stewwebb_com.zip
11/28/2015 1:52:26 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www_stewwebb_com.rar
11/28/2015 1:52:25 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.stewwebb.com.zip
11/28/2015 1:52:23 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.stewwebb.com.rar
11/28/2015 1:52:22 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/web.zip
11/28/2015 1:52:20 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/web.rar
11/28/2015 1:52:19 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.zip
11/28/2015 1:52:17 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/www.rar
11/28/2015 1:52:16 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/?½??????.zip
11/28/2015 1:52:13 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/?½??????.rar
11/28/2015 1:52:10 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwroot.zip
11/28/2015 1:52:09 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
[Unblock this range] — [Block this network] — [Run WHOIS on 106.86.155.215] — [See recent traffic]

China Chongqing, China tried to access non-existent page http://www.stewwebb.com/wwwroot.rar
11/28/2015 1:52:08 AM (44 minutes ago) IP: 106.86.155.215 [unblock this range] Hostname: 106.86.155.215
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)
Harlow, United Kingdom visited http://www.stewwebb.com/feed/
11/28/2015 3:37:43 AM (11 minutes ago) IP: 82.27.235.189 [unblock this range] Hostname: cpc12-bsfd7-2-0-cust188.5-3.cable.virginm.net
Aggregator/2.7.1 (MSM8974; 5.1.1),gzip
[Unblock this range] — [Block this network] — [Run WHOIS on 82.27.235.189] — [See recent traffic]
United States Kansas City, United States left http://www.stewwebb.com/stewart_webb_amended_complaint_20121121.pdf and tried to access non-existent page http://www.stewwebb.com/stewart_webb_amended_complaint_20121121.pdf
11/28/2015 3:37:09 AM (12 minutes ago) IP: 142.54.178.147 [unblock this range] Hostname: ns1.forhard.com
Mozilla/5.0 (Windows NT 5.1; rv:40.0) Gecko/20100101 Firefox/40.0
[Unblock this range] — [Block this network] — [Run WHOIS on 142.54.178.147] — [See recent traffic]
United States Seattle, United States visited http://www.stewwebb.com/robots.txt
11/28/2015 3:37:07 AM (12 minutes ago) IP: 52.23.156.32 [unblock this range] Hostname: ec2-52-23-156-32.compute-1.amazonaws.com
ltx71 – (http://ltx71.com/)
[Unblock this range] — [Block this network] — [Run WHOIS on 52.23.156.32] — [See recent traffic]
Australia Australia visited http://www.stewwebb.com/
11/28/2015 3:36:54 AM (12 minutes ago) IP: 123.211.87.200 [unblock] Hostname: CPE-123-211-87-200.lnse4.cha.bigpond.net.au
Apple-PubSub/65.23
Riga, Latvia arrived from https://www.google.lv/ and visited http://www.stewwebb.com/
11/28/2015 3:39:00 AM (11 minutes ago) IP: 80.232.243.112 [unblock] Hostname: 80.232.243.112
Browser: Opera version 33.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36 OPR/33.0.1990.115
[Unblock this IP] — [Block this network] — [Run WHOIS on 80.232.243.112] — [See recent traffic]
Hong Kong Tsimshatsui, Hong Kong tried to access non-existent page http://www.stewwebb.com/a.htm
11/28/2015 3:38:15 AM (11 minutes ago) IP: 202.69.240.125 [unblock] Hostname: 202.69.240.125
Browser: Chrome version 0.0 running on Linux
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.31 (KHTML, like Gecko) Chrome/26.0.1410.63 Safari/537.31
United States San Francisco, United States visited http://www.stewwebb.com/feed/
11/28/2015 3:49:32 AM (1 minute ago) IP: 192.0.116.203 [unblock this range] Hostname: 192.0.116.203
Automattic Feed Fetcher 1.0
[Unblock this range] — [Block this network] — [Run WHOIS on 192.0.116.203] — [See recent traffic]
United States Buffalo, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/
11/28/2015 3:49:23 AM (1 minute ago) IP: 23.229.22.41 [unblock this range] Hostname: preqin-car-41.premiumecar.com
Browser: Chrome version 39.0 running on Win7
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/39.0.2171.95 Safari/537.36
United States Cheyenne, United States visited http://www.stewwebb.com/
11/28/2015 3:50:30 AM (1 minute ago) IP: 104.152.215.160 [unblock] Hostname: 160-215-152-104-static.reverse.queryfoundry.net
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this IP] — [Block this network] — [Run WHOIS on 104.152.215.160] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/
11/28/2015 3:50:29 AM (1 minute ago) IP: 89.39.173.49 [unblock this range] Hostname: 89.39.173.49
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this range] — [Block this network] — [Run WHOIS on 89.39.173.49] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/2015/11/28/us-government-and-israel-cyber-attack-against-stew-webb-whistle-blower/
11/28/2015 3:50:26 AM (1 minute ago) IP: 89.39.172.193 [unblock this range] Hostname: 89.39.172.193
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this range] — [Block this network] — [Run WHOIS on 89.39.172.193] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/2015/11/28/us-government-and-israel-cyber-attacks-us-whistle-blower/
11/28/2015 3:50:26 AM (1 minute ago) IP: 86.107.109.78 [unblock this range] Hostname: 86.107.109.78
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36
[Unblock this range] — [Block this network] — [Run WHOIS on 86.107.109.78] — [See recent traffic]
Romania Romania visited http://www.stewwebb.com/feed/
11/28/2015 3:50:21 AM (1 minute ago) IP: 188.240.40.21 [unblock] Hostname: 188.240.40.21
Browser: Chrome version 46.0 running on MacOSX
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.71 Safari/537.36

France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:32 AM (11 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:30 AM (13 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:28 AM (15 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:23 AM (21 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:21 AM (22 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:20 AM (24 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:18 AM (25 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:16 AM (27 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:15 AM (28 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:14 AM (30 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:12 AM (31 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:11 AM (33 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:09 AM (35 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:08 AM (36 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:06 AM (37 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:05 AM (39 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:03 AM (41 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:01 AM (42 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:00 AM (44 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:59 AM (45 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:57 AM (46 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:56 AM (48 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:54 AM (49 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:53 AM (50 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:52 AM (52 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:50 AM (54 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:47 AM (56 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:46 AM (58 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:44 AM (59 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:43 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:41 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:40 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:39 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:37 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:36 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:34 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:33 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:31 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:30 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:29 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:27 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:26 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:25 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:23 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:22 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:21 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:19 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:18 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:17 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 3:59:15 AM (1 minute ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:26 AM (17 seconds ago)
France Roubaix, France attempted a failed login using an invalid username “admin1”.
IP: 151.80.142.210 [unblock]
Hostname: 210.ip-151-80-142.eu
11/28/2015 4:00:24 AM (19 seconds ago)
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
ThrottlingNov272015
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
1145am cst
Israel left http://www.stewwebb.com/ and visited http://www.stewwebb.com/2014/11/25/this-link-is-for-you-cyber-terrorism-felons/
11/27/2015 11:02:32 AM (4 minutes ago) IP: 213.184.113.29 [unblock this range] Hostname: 213.184.113.29
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0
+++++++++++++++++++++++++++++++++
Buffalo, United States left http://www.stewwebb.com/ and visited http://www.stewwebb.com/category/colorado-breaking-news/
11/27/2015 11:02:47 AM (4 minutes ago) IP: 192.3.253.213 [unblock this range] Hostname: 192-3-253-213-host.colocrossing.com
Browser: Firefox version 34.0 running on WinVista
Mozilla/5.0 (Windows NT 6.0; rv:34.0) Gecko/20100101 Firefox/34.0

++++++++++++++++++++++++++++++++++++
Zhoushan, China visited http://www.stewwebb.com/category/news/page/5/
11/27/2015 11:04:31 AM (3 minutes ago) IP: 123.96.138.148 [unblock] Hostname: 123.96.138.148
Browser: IE version 8.0 running on Win7
Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Trident/4.0)

+++++++++++++++++++++++++++++++++++++++
United States Durham, United States arrived from https://www.pinterest.com/ and visited http://www.stewwebb.com/2013/08/11/bush-millman-clinton-zionist-organized-crime-family-flow-chart-1/
11/27/2015 11:01:34 AM (11 minutes ago) IP: 45.37.69.70 [unblock] Hostname: cpe-45-37-69-70.nc.res.rr.com
Browser: Chrome version 46.0 running on Win8.1
Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.86 Safari/537.36
++++++++++++++++++++++++++++++++
Fairfax, United States visited http://www.stewwebb.com/category/courts-2/
11/27/2015 11:01:58 AM (11 minutes ago) IP: 69.196.253.30 [unblock this range] Hostname: eth0-0-fw3-1-ap-r137-3-va3.blackboard.com
Blackboard Safeassign
++++++++++++++++++++++++++++++++++++++

Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 11:14:10 AM (1 minute ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 11:09:11 AM (6 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 11:04:20 AM (11 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:59:25 AM (16 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:54:30 AM (20 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:49:34 AM (25 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:44:46 AM (30 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:39:48 AM (35 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:34:37 AM (40 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:29:35 AM (45 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:24:25 AM (51 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:19:21 AM (56 minutes ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:14:15 AM (1 hour 1 min ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:09:08 AM (1 hour 6 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 10:04:01 AM (1 hour 11 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:58:58 AM (1 hour 16 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:54:03 AM (1 hour 21 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:47:00 AM (1 hour 28 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:41:46 AM (1 hour 33 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:34:26 AM (1 hour 40 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:28:40 AM (1 hour 46 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:21:22 AM (1 hour 54 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:16:07 AM (1 hour 59 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:08:27 AM (2 hours 6 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.
IP: 178.137.95.130 [unblock]
Hostname: 178-137-95-130-lvv.broadband.kyivstar.net
11/27/2015 9:03:14 AM (2 hours 12 mins ago)
Ukraine Lviv, Ukraine attempted a failed login using an invalid username “admin”.IP: 178.137.95.130 [unblock]Hostname: 178-137-95-130-lvv.broadband.kyivstar.net11/27/2015 8:57:14 AM (2 hours 18 mins ago)
Whois IP 178.137.95.130
Updated 1 second ago

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
% To receive output for a database update, use the “-B” flag.

% Information related to ‘178.137.64.0 – 178.137.127.255’

% Abuse contact for ‘178.137.64.0 – 178.137.127.255′ is ’email@kyivstar.net’

inetnum: 178.137.64.0 – 178.137.127.255
netname: KYIVSTAR-NET-14
descr: Kyivstar GSM
descr: Ukrainian mobile phone operator
country: UA
admin-c: KSUA-RIPE
tech-c: KSUA-RIPE
status: ASSIGNED PA
mnt-by: KYIVSTAR-MNT
mnt-lower: KYIVSTAR-MNT
mnt-routes: KYIVSTAR-MNT
created: 2012-02-17T11:54:15Z
last-modified: 2012-02-17T11:54:15Z
source: RIPE # Filtered

role: Kyivstar GSM
address: Degtyarevskaya, 53
address: Kiev, Ukraine
admin-c: AEL17-RIPE
tech-c: JEDI-RIPE
tech-c: AEL17-RIPE
nic-hdl: KSUA-RIPE
remarks: Please send all abuse reports here:
abuse-mailbox: email@kyivstar.net
mnt-by: KYIVSTAR-MNT
created: 2003-05-19T14:48:31Z
last-modified: 2014-06-17T07:59:30Z
source: RIPE # Filtered

% Information related to ‘178.137.80.0/20AS15895’

route: 178.137.80.0/20
descr: Kyivstar GSM, Kiev, Ukraine
origin: AS15895
mnt-by: KYIVSTAR-MNT
created: 2010-04-14T13:34:01Z
last-modified: 2010-04-14T13:34:01Z
source: RIPE # Filtered

% This query was served by the RIPE Database Query Service version 1.83-JAVA8 (DB-1)

ht




Vinny Eastwood interviews Stew Webb latest intelligence

Vinny_Eastwood_Show

Vinny_Eastwood_Show

Vinny Eastwood interviews Federal Whistle blower Stew Webb Nov 17 2015

Latest from US Intel and French Intel one hour.

stewwebbradionetwork-com-2015-09-24

stewwebbradionetwork-com-2015-09-24

http://www.stewwebb.com

 




Larry Mizel Denver Zionist Mafia Satanic Jew runs Israel and USA

Larry_Mizel_July2013

AIPAC Director, Larry Mizel, Denver’s Zionist Mafia Satanic Jew runs Israel and USA and stole your Pension Funds and looted the U.S. Treasury.

AIPAC_and_Abramoff_Operated_Child_Sex_Ring

Illuminati Mafia Revealed by Stew Webb and Professor James Fetzer on Veterans Truth Network August 11, 2015

To listen to the full interview click on the link below:

Veterans Truth Network Archives:
http://www.veteranstruthnetwork.com/index.php/joomla-pages-2/register

Veterans Truth Network
Radio-Magazine-TV
http://www.veteranstruthnetwork.com/
Listen Live
http://veteranstruthnetwork.com/modules/mod_radioplayer/tmpl/popup.php?radio=Radio+Listen+Now+Popup
Radio Schedule-Shows
http://www.veteranstruthnetwork.com/index.php/explore/module-positions
Archives of all hosts shows
http://www.veteranstruthnetwork.com/index.php/joomla-pages-2/register
Veterans Truth Warriors
https://www.facebook.com/vtnstudio?fref=ts
Veterans Truth Network Magazine
Professor Dr. James Fetzer Senior Managing Editor
Owners and Founders
Federal Whistleblower Stew Webb and DOD-CIA-NSA-Whistleblower Gene Chip Tatum Founders
http://www.chiptatum.com
http://www.stewwebb.com

 

 




Veterans Truth Network Magazine-Radio-TV Born April 5, 2015

stewwebbradionetwork-com-2015-09-24

Veterans Truth Network Magazine-Radio-TV (Born April 5, 2015 only 2 month old) Created by Federal Whistleblower Stew Webb has now been changed to Stew Webb Radio Network.

http://www.stewwebbradionetwork.com

http://www.stewwebb.com

http://www.stewwebb.com/stew-webb-radio-network-schedule-and-archives




Hacker Alert: Israel, VIASat Englewood, CO., Opera Oslo Norway, Buffalo, NY., Kansas City 2015-01-19

Israel-LockheedMartin-WOWFinancial-HughesCorp-USAirForce-CyberTerrorists-2015

By Stew Webb

Cyber Terrorism against Stew Webb on Monday January 19, 2015
http://www.stewwebb.com
Press TV interviews Stew Webb on Cyber Terrorism, email hacking, fake meta bots and redirecting stewwebb.com and the recent Edward Snowden revelations.
Fresh revelation has come to the surface about spying on journalists by Britain’s spy agency the G-C-H-Q. The organization is accused of tapping electronic communications of the world’s top media organizations.
The Guardian’s analysis of documents leaked by whistleblower Edward Snowden shows the G-C-H-Q scooped up tens of thousands of emails of journalists in the United States, Britain and elsewhere. The BBC, Reuters, the Guardian, the New York Times and the Washington Post are among those targeted by the spy agency. According to the report, the journalists’ communications were among 70-thousand emails the G-C-H-Q gathered in less than 10 minutes on one day in 2008. The disclosure comes as the British government faces intense pressure to protect the confidential communications of reporters, MPs and lawyers from snooping.

This is evidence gathered today January 19, 2015 from StewWebb.com the site is being attacked by Cyber Terrorists in Violations of my 1st Amendment Right to freedom of speech and a form of RICO.
I have over one year of evidence.

I will be posting the entire report proving over 5 million felonies under The Computer Fraud and Abuse Act (CFAA) [18 U.S.C. Section 1030] makes it illegal for anyone to distribute computer code or place it in the stream of commerce if they intend to cause either damage or economic loss. The CFAA focuses on a code’s damage to computer systems and the attendant economic losses, and it provides criminal penalties for either knowingly or recklessly releasing a computer virus into computers used in interstate commerce. Someone convicted under the CFAA could face a prison sentence as long as 20 years and a fine of up to $250,000.

I am aware that Veterans Today is under the same attack most likely by the same Cyber Terrorists and these are many Military Installations, Private and Public Corporations and FBI all tied to Organized Crime.

Lawsuits alleging trademark infringement and violations of the U.S. Computer Fraud and Abuse Act, the Telephone Consumer Protection Act and a state statute prohibiting unsolicited messages through the telephone or fax machine including emails with the damage these messages did to my reputation. It is simply wrong for me to be associated with this kind of material, of the solicitation to view pictures of nude children.

I really want to prevent this from ever happening again to anyone. My impression is that spamming is generally despised by e-mail recipients, the fact that this was a solicitation for pornography of over 5 million emails further damages my reputation.
But one of the problems with handling a lawsuit generated in cyberspace is that few laws directly apply to the case. In crafting a suit, cites federal and state statutes that were drafted to cover telephone and fax communications, as well as one protecting the individual or corporate name.

The use of the telephone and fax law is important because it sets a penalty of $500 per unauthorized transaction. If every e-mail message is determined to be a transaction, one could be entitled $25 Billion on that law alone.

Federal prosecutors said there are laws to punish computer hackers criminally as well. Both state and federal laws apply to illegal computer
activity. I pan to argue that it is already illegal under existing law.

I don’t think any of this was an accident. I think I was a target and we will prove it with the law we have.
I want to punish them for what they have done.

This is one example of re directing away from site evidence taken today charges will be filed soon.

Website_Attack_Redirecting_Jan192015_IP-180-191-112-2

Evidence below:

Hacker Alert: Israel, VIASat Englewood, CO., Opera Oslo Norway, Buffalo, NY., Kansas City 2015-01-19

http://www.stewwebb.com/Hacker-Alert-Israel-VIASat-Englewood-CO-Oslo-Norway-Buffalo-Kansas-City-2015-01-19.pdf

Hacker Alert: Israel, Lockheed Martin, WOW Financial, Hughes Corp, US Air Force Cyber Now Terrorists
http://www.stewwebb.com/2015/01/18/israel-lockheed-martin-wow-financial-hughes-corp-us-air-force-cyber-terrorists-2015-01-17

Lockheed Martin Corporation Denver Cyber Terrorizing this site 2015-01-16 Felonies
http://www.stewwebb.com/2015/01/16/lockheed-martin-corporation-denver-cyber-terrorizing-site-2015-01-16-felonies
Stew Webb 1st amendment rights violated Cyber Terrorism attacks 2015-01-15
http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-01-15
Stew Webb 1st amendment rights violated Cyber Terrorism attacks 2015-01-14
http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-01-14
Stew Webb 1st amendment rights violated Cyber Terrorism attacks 2015-01-13
http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-01-13
Stew Webb 1st amendment rights violated Cyber Terrorism attacks 2015-01-12
http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-01-12
Stew Webb 1st amendment rights violated Cyber Terrorism attacks 2015-01-11
http://www.stewwebb.com/2015/01/15/stew-webb-1st-amendment-rights-violated-cyber-terrorism-attacks-2015-01-11
This link is for you Cyber Terrorism Felons
http://www.stewwebb.com/2014/11/25/this-link-is-for-you-cyber-terrorism-felons

 UPDATED January 20, 2015 Evidence

Hacker Alert Stew Webb Violations Cyber Terror Laws 2015-01-20
Hacker Alert: Kansas City fbivps, Denver, Princeton Edu,Oslo Norway,LockHeed Martin, Schlage Lock Company, General Electric, Colo Crossings NY, 2015-01-20

http://www.stewwebb.com/Hacker-Alert-StewWebb-Violations-Cyber-Terror-Laws-2015-01-20.pdf

 




Federal Judges Coverup U.S. Attorneys Deaths tied to Jeb Bush Part1

James_Comey_FBI_Director

By Stew Webb

Editor’s note: This is one industry alone. It was done to all of them. While the American people are living off declining wages and are told a $10 dollar minimum wage will bankrupt the nation, 70% of America’s spending heads offshore. This is the group that has funded the fight against Obamacare, thinking that broad federal involvement in healthcare would eventually lead to an oversight group capable of fighting back.
Every industry in America today is run by organized crime. They own judges, prosecutors, they run the police. I remember reading an article last week concerned about privatization of police forces. They have always been privatized. I learned this long ago. Each state, each municipality, has those who are above the law. I watch it penetrate every aspect of our lives, leaking nuclear plants, here our city drinking water supply, one of the largest lakes in the world, is dying, poisoned by corporate agriculture.
When Fox News told me that the US government “misplaced” over $5 trillion under Bush 43 because of “evil Negroes buying mansions with no credit,” I knew I was going to see America’s last days. They harped on this for 2 years, like other wild conspiracy theories. When real conspiracies happen, like this one laid out below, does anyone wonder where the “mainslime media” was for so many years? g

November 6, 2013
Director James B. Comey
FBI Headquarters
935 Pennsylvania Avenue, NW
Washington, D.C. 20535-0001
RE: Report of Racketeering and Other Crimes Obstructing Courts in Kansas and Western Missouri
Dear Director Comey;
I am writing to report corrupt and criminal activities by state and federal government officials within the District of Kansas and the Western District of Missouri. The continuing nature of this enterprise, and the severity in which it violates the public interest of the nation, requires your immediate action.
As an attorney, I represented the Missouri corporate client Medical Supply Chain, Inc. (MSC) in a hospital supply antitrust matter from 2002-2005. The defendant cartel of dominant manufacturers, distributors, and their investment bank US Bancorp Piper Jaffray (all members and partners in the group purchasing organization Novation, LLC) had identified Internet electronic marketplaces including my client as capable of saving 20 Billion Dollars a year in what was in 2002, a 1.2 Trillion Dollar marketplace.
Today, the total of hospital supply spending by health systems nationally is well over 2 Trillion dollars and rising due to unsustainable artificial inflation of hospital supply costs. In industries that are not monopolized, many of these same items produced by the same manufactures substantially decreased in price. Government subsidies and private insurers have not been able to cover the monopoly costs with premiums their insured customers can afford.
This same scheme has destroyed the Veteran’s Administration ability to meet thedemands of returning soldiers and their war related injuries. But the technology to provide competition in hospital supplies has been kept off the market by the Novation LLC cartel.
A Novation, LLC cartel member, GE Medical and its president Jeffrey Immelt came up with a plan at the direction of General Electric’s CEO Jack Welch to obstruct Internet hospital supply marketplaces from entering the nationwide market for hospital supplies by organizing the other members of the Novation, LLC cartel in an agreement to block new entrants through per se restraints of trade including refusal to deal, market share allocation, interlocking directors, and multi year exclusive supply contracts procured with bribes paid to hospital administrators and a scheme to give rebates without reporting the savings to Medicare. The Sherman Act scheme expanded to include extortion of medical supply manufacturers, including shares in supplier corporations and kickbacks to the cartel in order to be permitted to sell supplies to the 65,000 members in hospitals and
other health systems nationwide.
Unknown to me at the time I researched and filed the central antitrust complaint (attached to this letter as ATCH 1) in 2005 identifying over $80 Billion dollars lost to Medicare, Medicaid, CHAMPUS, and private healthcare insurers from the Sherman Act prohibited restrain of trade, the USDOJ Ft. Worth, Texas office had received a sealed False Claims Act complaint (ATCH 9) from a Novation, LLC executive identifying conduct to rig market process to hospitals nationwide through unlawful policies in the purchase of supplies that she had personally witnessed.
The relator, Cynthia Fitzgerald in her complaint US ex rel Cynthia I. Fitzgerald v. Novation LLC, et al, N. Dist. Of TX Case 03-01589 (ATCH 9) said that she sought money from companies that were competing for a contract for intravenous catheters, then awarded the contract to the one that gave her a check for $100,000, Becton Dickinson:
“Ms. Fitzgerald said that she never told the companies they could win the contract by making a big payment — the message was implicit. She said Novation was collecting donations then to finance an internal communication system for its hospitals, but it channeled many other cash and in-kind payments to the hospitals for other purposes.
In her lawsuit, she argues that the hospitals would not be able to accurately account for these payments when reporting their supply costs to the government. That meant they would claim bigger reimbursements from Medicare than they were entitled to.”
M. Williams Walsh, “Senators to Investigate Hospital Purchasing,” New York Times, Aug. 14, 2009.
In the District Court for the District of Kansas, Medical Supply Chain, Inc.’s complaints were repeatedly dismissed for alleged failures to plead elements of Sherman I and Sherman II violations and finally for failing to plead predicate acts of Hobbs Act extortion as a private cause of action under RICO. This was despite the profound simplicity of a per se Sherman Act, 15 U.S.C. § 1 claim like a concerted refusal to deal (group boycott) which only requires two elements: that Novation LLC members and their associates including US Bancorp NA Piper Jaffray expressly agreed to exclude business with Internet marketplaces for hospital supplies and restrain health systems doing business with the cartel to the two Internet marketplaces which would protect the fixed supply prices and market shares of the Novation LLC cartel members Global Health.
Exchange (GHX) started by Jeffrey Immelt at Jack Welch’s direction and Neoforma,Inc. See U.S. v. Realty Multi-List, Inc., 629 F.2d 1351 at 1366-76 (C.A.5 (Ga.), 1980) The record, including the complaints found to be deficient and answer memorandums in opposition to dismissal, demonstrates that each element to state a claim under the controlling case law for each jurisdiction, along with supporting averments of facts and circumstances for each element was present in the face of the complaints and amended complaints, arranged in order to support and make plausible each element of the claim.
Each complaint alleged that US Bancorp Piper Jaffray conspired with the non-defendants Novation LLC and Novation LLC’s members including Neoforma, Inc. an Internet based electronic marketplace competing directly with MSC to supply hospitals to first breach a promise to supply MSC escrow accounts after US Bank first approving the accounts for each of the new MSC supplier representatives the company had recruited from 2000
applicants out of a concerted refusal to deal when the parent company US Bancorp NA suddenly recognized the threat to their Piper Jaffray investment syndicate’s interests in underwriting new entrants to the hospital supply market that could be extorted by the Novation LLC cartel as US Bancorp NA had done to the other Internet marketplace Neoforma, Inc. to defraud its investors out of the $900 Million dollar capitalization of
Neoforma, Inc. raised by a prospectus to provide cost cutting competition to existing bricks and mortar based hospital suppliers.
The existence of a monopoly and unlawful restraint of trade was further made plausible in the complaints by citations to SEC registered press releases by CEO’s of publicly traded corporations announcing the potential success of their ventures by obtaining exclusive supply agreements with Novation LLC (ATCH 1).
I believed at first that the court was in error due to misrepresentations of the defendants intheir motions for dismissal. My client and I went repeatedly to the appellate court seekingto correct what were clear errors in facts and the applicable law including the pleading standard. This resulted in orders by KS Dist. Judge Carlos Murguia, W.D. of MO Judge Ortrie D. Smith and Tenth Circuit Court of Appeals Judges that vilified MSC, its founder Samuel K. Lipari and myself for briefing issues where the court ruled contrary to the controlling law and the expressly stated facts of the complaints, including appealing dismissed complaints that addressed subsequent conduct of the cartel members that injured MSC and restrained trade in furtherance of the ongoing criminal antitrust conspiracy.
When MSC’s supply chain expert Lynn Everard was scheduled to testify before the US Senate for the second time in the September 14, 2004 “Hospital Group Purchasing: How to Maintain Innovation and Cost Savings” hearing by the Subcommittee on Antitrust, Competition Policy and Consumer Rights, the defendants undertook extrajudicial efforts to prevent the racketeering enterprise from losing the Sherman Act prohibited antitrust franchise that was skimming over $80 Billion dollars annually from hospital supplies in America. US Bancorp NA CEO John (Jack) Grundhofer did not believe the bank could contain the SEC prosecution of its investment banking subsidiary Piper Jaffray for fraud and conflict of interest in its published evaluations of new company stock offerings in a documented “pay to play” scheme when US Bancorp Piper Jaffray had a member on the board of Novation LLC to control entrants to the hospital supply marketplace and concentrated on healthcare I.P.O.’s. Elizabeth Weatherman, Vice Chair National Venture Capital Association had testified before the same Senate Subcommittee in 2003 that the new entrants to the hospital supply marketplace were being deprived of venture capital due to the open restraint of trade in the hospital supply marketplace resulting from the
anticompetitive conduct of the Novation LLC cartel.
Grundhofer, still fearing the Kansas District court’s exposure of the bank’s role in the criminal antitrust and Medicare fraud franchise from the MSC litigation, first attempted to have the Royal Bank of Canada purchase the US Bancorp investment bank subsidiary for approximately $600 million unsuccessfully, then jettisoned Piper Jaffray by spinning it off to US Bancorp NA shareholders at a loss.
The shareholders of Neoforma, Inc. prevailed in the preliminary rounds of a class action securities fraud case against the Internet hospital supply marketplace and its underwriting syndicate which included US Bancorp Piper Jaffray for what they alleged was a “pump and dump scheme.” Not realizing how Neoforma, Inc.’s CEO Robert J. Zollars recruited from Novation LLC cartel member Cardinal Health, Inc. after Cardinal had obtained
through fraud Samuel K. Lipari’s MSC business model for a cost savings neutral Internet electronic marketplace to radically cut hospital costs through enterprise resource technology.
Neither the Neoforma, Inc. shareholders or their Milberg Weiss class action counsel that took control of the Neoforma board during the litigation were aware of Robert J. Zollars’ role as an agent of Novation LLC when the company was re-tasked to protect the Novation LLC artificially inflated hospital supply costs, despite the absence of any return from these non cost saving operations instead of competing with the cartel in a profitable
business reducing hospital costs that would have realized the stock investment returns described in the Neoforma, Inc. prospectus.
General Electric (GE), was a defendant along with Jeffrey Immelt, then president of GE Medical and Jack Welch, the CEO of GE, charged with conspiring with the nondefendants the Novation LLC cartel, and the two Internet hospital supply marketplaces Neoforma, Inc., and GHX in the second and third MSC cases against the cartel, and with taking independent subsequent action against MSC to prevent MSC’s entry into the
nationwide hospital supply market or to establish the functioning independent Internet hospital supply marketplace Welch had instructed Immelt to prevent.
The complaint (ATCH 1) alleged Immelt at Welch’s direction created the captive GHX with existing Novation LLC cartel members and represented the exchange as independent. MSC had obtained and filed as an exhibit to its 2003 complaint the standard contract whereby each member of Novation LLC was required to enroll in GHX and Neoforma, Inc., facilitating the direct per se antitrust prohibited conduct of allocating market share.
USA Thelma Louise Quince Colbert, the head of FCA Act investigations in the Ft. Worth Office of the US Attorney for the Northern District of Texas who had initiated the False Claims Act prosecution of Cynthia Fitzgerald’s charges against Novation LLC was found dead in her swimming pool by her daughter on July 20, 2004.
The Criminal Chief of the Dallas U.S. Attorney’s office Shannon K. Ross who signed the subpoenas against Novation LLC, General Electric, and Cardinal Health in the government case against the hospital supply cartel was found dead September 11, 2004.
Based on the federal codes cited in a copy of one of the subpoenas, the investigators were seeking evidence of health care fraud, conspiracy to defraud the United States, theft or bribery involving programs receiving federal funds, obstruction of investigations and other possible violations.
Jeffrey Immelt, now CEO of GE as a result of his maintaining the monopoly artificial inflation of hospital scanning machine lease costs through the Novation LLC cartel protection of market share, feared that the MSC litigation would reveal GE had violated an antitrust consent decree obtained by the Department of Justice against GE. To prevent discovery of the crime and to exploit time gained by the suspicious deaths of Assistant US Attorneys Thelma Quince Colbert and Shannon K. Ross, Jeffrey Immelt sought to eliminate other loose ends.
Two ethics complaints were initiated against me by the State of Kansas Attorney Discipline Administrator Stanton Hazlett for my representation of the African American James L. Bolden and his witness of American Indian descent David M. Price. The complaints and the subsequent two year prosecution of myself was expressly for seeking to vindicate the federal race based statutory civil rights of Bolden under 42 USC §§ 1981 and 1982 and the right of Price’s infant son to be with his parent under the Indian Child Welfare Act (“ICWA”) 25 U.S.C. §§ 1901–1963 which prohibited the taking and placement of the child without notice to the natural father.
The unusual conduct of Kansas Attorney Discipline Administrator Stanton Hazlett of prosecuting me for advocacy protected under 42 USC §1981, §1983 from state retaliation and the conduct of the Kansas District Court judge who was hearing both the Bolden case and the 2005 MSC case links the prosecution to what it clearly was, a pretext to deprive MSC of counsel and to obstruct justice in the antitrust litigation:
“23. The Hon. Judge Kathryn H. Vratil made no rulings in Medical Supply Chain, Inc. v. Novation, et al, KS Dist. Court case no.:05-2299 delaying the opportunity to obtain discovery on the defendants’ participation in the wrongful disbarment of Medical Supply’s counsel for almost a year.
24. Kansas District Court Judge Kathryn H. Vratil then participated in an ex parte discussion on the day of the disbarment oral argument with personnel and justices of the Kansas Supreme Court, disparaging Medical Supply’s counsel without his knowledge or opportunity to question Kansas District Court Judge Kathryn H. Vratil’s testimony in conduct designed to cause Medical Supply’s counsel to be disbarred without due process.
25. Kansas District Court Judge Kathryn H. Vratil then removed herself from the case on October 20, 2005 minutes before the Kansas Supreme Court justices heard Medical Supply’s counsel’s oral argument. A transcript of the hearing which was resultantly delayed will give light to these unusual events.”
Lipari v. Novation, LLC et al Jackson County Missouri Case No. 0816-CV04217 Appendix One, pg. 3 Procedural History. See also Lipari v. General Electric, US District Court for the Western District of Missouri, Case No. 07-0849-CV-W-FJG Proposed Amended Complaint. (Doc. 27 PL. MOT. FED. R. CIV. P. 59(e) at pg. 7, ¶ 10 ).
An associate of Kansas Attorney Discipline Administrator Stanton Hazlett, an attorney named Gene Schroer (that I believe investigated for Hazlett my representation of Bolden) arranged a meeting with Lipari and myself through the attorney Dennis Hawver.
I, Lipari and Dennis Hawver witnessed Gene Schroer trying to broker a surrendering of the MSC litigation to unnamed Chicago attorneys for a repayment of the $300,000.00 the corruption cost MSC while relaying the extortion Lipari would suffer from Hazlett if he did not comply. It was only Lipari’s fear of being killed in Illinois that kept him from going taking the offer:
“One such person who had a conversation with Stanton Hazlett has made it clear that Mr. Landrith will be disbarred regardless of the law or evidence in the record. While this threat imperils Medical Supply’s chance for justice in this litigation, the threat accompanied offers to “save” Medical Supply.
This involves replacing Medical Supply’s counsel with a Kansas attorney as lead counsel I feel Stanton Hazlett believes he and Magistrate O’Hara can control. I was offered the $300,000.00 US Bancorp deprived Medical Supply of to capitalize my company’s entry to market if I would agree to this arrangement. While this is being suggested to me repeatedly to the point that it is becoming a pressure, the suggested attorneys have no antitrust experience or familiarity with the present actions. 30. I believe Stanton Hazlett and Magistrate O’Hara are acting in the interests of the defendant
Shughart Thomson & Kilroy to use their control over the enforcement of Kansas Attorney Ethics rules to change counsel so that evidence of Shughart Thomson & Kilroy’s actions in furtherance of the defendant’s conspiracy will not be subjected to discovery, accomplishing the conspiracy’s short term objective of concealingw hat was done to influence the Kansas District Court and the defendant conspiracy’s long term objective of eliminating liability for their conduct. Because the conspiracy so overtly seeks to control and prevent the presentation of evidence regarding the occurrences in Kansas District court and the motivations for what was done to Mr. Landrith while suppressing evidence of misconduct including felony obstruction of justice, witness intimidation and harassment related to Mr. Bolden and Mr. Price’s entirely unrelated cases.”
Affidavit of Samuel Lipari (ATCH 2), Case 2:05-cv-02299-KHV-GLR Document 30-2 Filed 07/20/2005 Filings by MSC founder Samuel K. Lipari, proceeding pro se in Jackson County, Missouri state court revealed that he sought the help of the trusted mortgage broker Donna L. Huffman who was completing law school to continue the complex antitrust litigation against the Novation LLC cartel:
“563. The petitioner sought out the real estate financial help of Donna Huffman, a mortgage broker licensed by the states of Kansas and Missouri and by the United States Department of Housing and Urban Development (H.U.D.) in January 2007 while considering a sale or purchase of his father’s Lee’s Summit town home to continue the stability of his father’s trucking business while his father made arrangements to undergo extensive chemotherapy in treatment of bone cancer.
564. The defendants caused Donna Huffman to be retaliated against for her association with the petitioner and his witness Bret D. Landrith.
565. Two investigators from the Kansas Attorney Disciplinary Administrator Stanton Hazlett’s office came to the petitioner’ s attorney Dennis Hawver’s Ozawkie Kansas office around 8:30 am, Tuesday morning, November 27, 2007.
566. While there, the investigators and Dennis Hawver telephoned the petitioner’s witness Bret D. Landrith in Lee’s Summit, Missouri and revealed to Landrith that the Kansas Attorney Disciplinary Administrator was investigating Donna Huffman for fitness to be admitted to the Kansas Bar.
567. An investigator questioned Landrith about the Western District of Missouri case Huffman v. ADP, Fidelity et al, Case No. 05-CV-01205.
568. The Kansas Attorney Disciplinary Administrator investigators from Stanton Hazlett’s office wanted to know if Landrith had represented Donna Huffman and if he had been paid by her.
569. The Huffman v. ADP, Fidelity action is available on Stanford Law School’s class action website at http://securities.stanford.edu/1035/ADP05_01
570. Landrith informed the two investigators that he had represented Donna Huffman on the Western District of Missouri case and that he never received a fee or payment for the case because he was disbarred and no longer was entitled to the property right of contingent fees for his representation but that he thought it had settled because Huffman later gave him gratuitously $2,000.00.
571. Landrith also informed the investigators that 100,000 to 300,000 members of the prospective class had been screwed out of their retirement because Donna Huffman could not find a replacement attorney after he had been disbarred.
572. Landrith reminded Kansas Attorney Disciplinary Administrator Stanton Hazlett’s investigators that their office had disbarred him for bringing the Civil Rights claims of the African American James Bolden against the city of Topeka to federal court which Landrith had prevailed on in the Tenth Circuit Court of Appeals following disbarment and for representing James Bolden’s witness against the City of Topeka theft of H.U.D. funds in an adoption appeal where David Price’s infant son had been kidnapped.
573. The F.B.I. raided the City of Topeka front company Topeka City Homes which had been set up and controlled by the city after the Kansas District court erroneously dismissed Bolden’s case and seized the records for violation of H.U.D. financial requirements.
574. As a result of Bret D. Landrith notifying the petitioner on November 27, 2007 of this meeting, the petitioner learned that his business associate Donna Huffman, an intelligent, capable woman who he trusts had been prevented from taking the July 2007 bar examination and was in danger of being found unfit by the influence of Kansas Attorney Disciplinary Administrator Stanton Hazlett’s office over whether she is admitted in her home state and likely any other state to practice law on the false probable cause of being a plaintiff in the Western District of Missouri case Huffman v. ADP, Fidelity et al, Case No. 05-CV-01205 which was not frivolous and where the defendant Fidelity admitted to the claim impermissible fees on some of the subject Simple IRA mutual funds in a mailing to the prospective ADP class members after the complaint was filed.
575. The defendant Husch Blackwell Sanders LLP represented the wrong doers in ADP, Fidelity et al and attempted to exploit both the disbarment of Huffman’s counsel Bret D. Landrith by extrinsic fraud perpetrated by the defendant Shughart, Thompson & Kilroy PC.
576. While Huffman was unrepresented by counsel, Husch Blackwell Sanders LLP misrepresented to Huffman the current state of federal antitrust statutes to securities dealers and threatened Huffman with sanctions disparaging Landrith’s representation of the petitioner and the antitrust outcomes obtained by the defendant Shughart, Thompson & Kilroy PC solely through extrinsic fraud on the Kansas District Court.
577. In a direct response to the above averment stated in the petitioner’s action against GE, The defendants Lathrop & Gage L.C., Husch Blackwell Sanders LLP, and Shughart, Thompson & Kilroy PC through their networking with State of Kansas officials willing to disregard their oaths of office and violate federal law, caused Donna Huffman to be again denied the opportunity to take the Kansas Bar Exam.
578. Donna Huffman was prevented from representing the petitioner with the false assertion that she is mentally unfit based merely on the unconstitutional pretext that she asserted her individual legal rights pro se in protecting her child and won Director James B. Comey against the State of Kansas that was found to be abusing Huffman’s rights in Huffman v. State of Kansas Social & Rehabilitation Services, Shawnee County Kansas District Court case.
579. The Kansas SRS had failed to protect Donna Huffman’s child from documented physical abuse and continuing endangerment by Huffman’s exhusband, Chris W. Huffman a State Corridor Engineer for the Kansas Department of Transportation who’s connections to the US Department of Transportation make him an important source and facilitator of million of dollars in federal highway funds for Governor Kathleen Sebelius.”
Lipari v. Novation, LLC et al Jackson County Missouri Case No. 0816-CV04217 Initial Petition at 89-91 (ATCH 3).
Donna L. Huffman was kept from taking the bar in Kansas for three years after her graduation based on repeated extrinsic fraud committed against her by employees Kansas Attorney Discipline Administrator Stanton A. Hazlett. Hazlett’s employees also used extrinsic fraud to keep her from being admitted to take the bar in the neighboring state of Nebraska.
Samuel K. Lipari also revealed that he had sought the help of attorney David Sperry of Independence, Missouri (ATCH 3) who had both experience in complex commercial litigation and the discovery disputes Lipari anticipated would be the deciding issue in his claims. Sperry feared the defendants manipulation of the venue and suddenly died of cancer.
Shortly after being disbarred, my brief prevailed in an appeal of Judge Kathryn H. Vratil’s order dismissing Bolden’s §§1981 and 1982 claims. When Bolden was unable to obtain replacement counsel, the misconduct by state and federal court officials forced the appeals court to dismiss oral argument. See Bolden v. City of Topeka. 441 F.3d 1129 (10th Cir. 2006). The Tenth Circuit Court of Appeals Decision reinvigorated 42 USC
Sec. 1981 as a cause of action against government discrimination and real estate takings in Bolden v. City of Topeka. 441 F.3d 1129 (10th Cir. 2006).
The decision has been favorably cited by the Sixth Circuit in Coles v. Granville Case No. 05-3342 (6th Cir. May 22, 2006).
The Kansas Supreme Court later adopted my argument (for which I was expressly disbarred for making) that the Indian Child Welfare Act applied to American Indians living off the reservation in its decision on In The Matter Of A.J.S., Kansas Supreme Court Case No. 99,130 (2009) and that it deprived a state court of jurisdiction to terminate parental rights without observing the requirements under the statute. The Kansas Supreme Court has also adopted my argument (for which I was expressly disbarred for making) that misrepresentations by a natural mother to conceal the existence of a child from a father could not disqualify a father’s reasonable efforts to parent his child. In The Matter Of The Adoption Of Baby Girl P. Case No. No. 102, 287 at 13-16 (Kan., Oct. 2010). The state judgment of disbarment on its face expressly finds that I am disbarred because I made these arguments supported by the factual record of the case, yet has not reversed the taking of my constitutional property interest for my federally protected advocacy.
The prosecution of a white attorney for bringing an African American’s colorable race based civil rights claims to federal court and for good faith appellate advocacy on the Indian Child Welfare Act is unlawful, void, and criminal under 18 USC §§ 241, 242, and 245. The statutes enhance the gravamen of the crime when the deprivation of rights was for the purpose of kidnapping a child through fraud. Evidence that I was wrongfully
disbarred to effect the taking of Baby C is found in Webb v. Hon. Judge Vratil et al, KDC Case # :2-09-cv-02063-FJG Memorandum for Summary Judgment ( evidence proving extrinsic fraud to procure my disbarment and the transcript of the tribunal’s prevention of testimony and evidence regarding the adoption of Baby C, then recommending disbarment based on the Baby C case).
The Novation LLC cartel had extorted large interests in Neoforma, Inc. though their agent Robert J. Zollars, the CEO of Neoforma, Inc. against the interests of the Neoforma shareholders. The unlawful practices of Novation LLC had been repeatedly exposed in a series by the New York Times, and the two entities that had formed Novation as a super group purchasing organization to corruptly circumvent the Medicare anti-kickback statute, University Health Consortium (UHC) and Volunteer Hospital Association (VHA) also had to distance themselves from the SEC criminal investigation US Bancorp Piper Jaffray by divesting themselves of Neoforma, Inc.
When the investment banking and merger syndicate of Merrill Lynch & Company, Inc., Fenwick & West LLP., Innisfree Limited, Lazard, McDermott Will & Emery LLP., Wachtell Lipton Rosen & Katz, Skadden Arps Slate Meagher & Flom LLP., Sidley Austin Brown & Wood LLP., and William Blair & Company (formed by Novation LLC for the purpose of solving the cartel’s exposure to the petitioner through Neoforma, Inc. ) discovered MSC’s claims in November 2005 that had not been disclosed in Securities and Exchange Commission required filings and began to fear the liability of taking
Neoforma, Inc. private to obstruct justice in MSC’s antitrust civil litigation and the government False Claims Act Medicare fraud investigation that were both seeking the records of where the Novation LLC member hospitals’ laundered funds went; Jeffrey R. Immelt caused GE Capital (also a MSC defendant) to underwrite the loan giving the money to Novation LLC for merging Neoforma, Inc. with GHX, LLC the sole remaining competitor electronic marketplace for hospital supplies.
GE Capital funded the purchase of Neoforma, Inc. from VHA and UHC in March 2006. Neoforma was never profitable: “Neoforma’s balance sheet shows a cumulative loss of nearly $739 million dollars as of Sept. 30, 2004.” Healthcare Purchasing News March 2005. In 2005, in accordance with GAAP, Neoforma’s net loss and net loss per share were $35.9 million dollars and $1.81 per share respectively, an improvement from the $61.2 million dollar net loss and $3.17 net loss per share recorded in the prior year.” Neoforma, Inc. press release San Jose, CA USA 02/26/2003.
VHA and Novation’s sale of Neoforma was also required because Novation was having to support Neoforma losses with $61 million dollars a year and the defendants no longer needed the fraud of second Internet hospital supply marketplace after procuring the dismissal of MSC’s antitrust case in Judge Carlos Murguia’s District of Kansas court and the reciprocal disbarment of myself in both the District of Kansas and the Western District of Missouri without hearings.
After being disbarred, I made myself available to testify in Lipari’s pro se litigation in the State of Missouri (ATCH 3), believing that gave myself a chance to present my evidence to a jury and provide the evidentiary hearing that the State of Kansas Attorney Disciplinary Administrator and the District of Kansas was determined I would not have. However, the cartel continued its extrinsic frauds against Lipari in state court, repeatedly removing Lipari’s cases to the Western District of Missouri District Court where the Chief Judge Fernando J. Gaitan, Jr. was on the board of directors of the Novation LLC cartel hospital chain Saint Lukes Health System, Inc. where the hospital’s own documents revealed it was a director of Novation LLC and did over 90 Million dollars a year in purchasing exclusively through long term Novation LLC contracts. The claims would then be
dismissed contrary to the controlling law for each jurisdiction and the opinions would vilify Lipari for bringing the evidence of the ongoing Sherman Act 15 U.S.C. §§ 1, 2 and RICO 18 U.S.C. §§ 1961et seq. felonies in his cases.
After the disbarment I also was prevented from working even in out of state and in non law related jobs to support my four children due to reports to databases made by State of Kansas officials for having represented Bolden and Price further depriving me of my constitutional property rights for having advocated on behalf of these two minority citizens to vindicate their federal statutory rights to be free from discrimination.
This retaliation and foreseeable violation of my civil rights increased when my former client David M. Price had his 16 year old daughter taken by different state officials years later in furtherance of the growing and widespread practice in Kansas to take children through fraud and bad faith state child protective services actions violating 42 U.S.C. § 671 to further False Claims Act, 31 U.S.C. § 3729, et seq., prohibited taking of US Treasury funds.
Price brought an action to seek to have me reinstated in Kansas District Court to represent him and a class of similarly situated parents in a class action against the state social services. The case was styled Price v. Hon. Judge Vratil et al, Kansas District Court (“KDC”) Case # 2:09-cv-02198. Price was prosecuted for the second time a week after filing the action on a contempt charge brought by the Kansas Attorney General that had been dismissed by the Kansas Supreme Court. Then, Price and I were subpoenaed to testify in a federal criminal case USA v. Carrie Neighbors and Guy Neighbors, KS Dist. Ct. Case No. 07-20124, 08-20105, 07-20073 before Judge Carlos Murguia in the belief that I would be discredited with a perjury charge. David M. Priced served over 6 months of the jail sentence for contempt while the case was on removal to federal court even though the Tenth Circuit had exclusive jurisdiction from an appeal of the remand.
When the retaliation for my testimony in the federal criminal case USA v. Carrie Neighbors and Guy Neighbors did not succeed, I was charged with contempt of court in my 2004 divorce case where I was never personally served and subject to only in rem jurisdiction and could not support my family because of the continuing unlawful conduct of state officials including social services officials that kept me from being employable in even warehouse or McDonald’s food preparation jobs.
I contacted the state officials by letter explaining the lack of jurisdiction to enforce money judgments (I had also sent them registered letters in 2007) and why their continued conduct was unlawful and provided them case law that clearly established their violation of my rights for having represented Price’s American Indian infant son and the African American James Bolden’s civil rights claims was unlawful. In retaliation they cut off my food stamps and threatened to jail me.
I was forced to bring causes of action to enjoin the state officials and seek damages in the Shawnee County, State of Kansas court (ATCH 17). However the court ruled that 42 USC § 1981 does not cover white attorneys being retaliated against for their advocacy on behalf of African Americans or the American Indian infant Baby C. This ruling was due to repeated misrepresentations to the court of the controlling federal law by state officials
and misrepresentations of the facts.
I also experienced the same de facto denial of property rights in the Johnson County, Kansas court regarding a house I had title to but could not live in or sell (ATCH 14). Both of these matters ended up in federal court where Judge Carlos Murguia and Judge Eric Melgren summarily dismissed my claims contrary to All established and controlling precedent for the court as informal sanctions prior to a show cause order. I sought appellate review in each case, but the Tenth Circuit did not hear the issues I raised and issued an injunction against further filings.
Before the appeal mandates were issued and before the injunction against further filings was ordered, I filed a request for presentation to the federal Grand Jury of the facts in each complaint that documented continuing specific RICO 18 U.S.C. §§ 1961et seq. felonies (ATCH 13-19). The US Attorney for the District of Kansas, Barry Grissom who had initiated the filing sanctions against me in Judge Carlos Murguia’s court refused tosubmit the evidence to a grand jury.
It is my informed belief that the Tenth Circuit panel in opinions authored by Senior Judge John C. Porfilio took the extraordinary measures to not hear my two appeals because of an action for prospective injunctive relief in the District of Columbia, Landrith et al v. John G. Roberts 1:12-cv-01916-ABJ that Samuel Lipari and I have brought to seek redress from the ineffectiveness of judicial ethics complaints, citing the complaints brought in Medical Supply Chain, Inc. v. Novation, et al, KS Dist. Court case no.:05- 2299. And, that the unusual and severe conduct of the panel led by Senior Judge John C. Porfilio of not reviewing the issues I had appealed was a direct effort to interfere with the District of Columbia case that had the foreseeable effect of depriving me of ownership of the $750,00.00 Leawood, Kansas house and of my constitutional and statutory rights in the State of Kansas.
A temporal relationship supporting my belief that the Tenth Circuit panel judges and the Administrator of the Courts had eliminated the judicial independence of the Tenth Circuit required under Judicial Canon 1 in an effort to present the District of Columbia judge the case on 10/18/2013 after an almost one year delay on the Friday after the Tenth Circuit issued the filing injunction order against me. The appearance docket shows a flurry of
text only orders on that Friday and the following Monday showing that the official court record had been tampered with and that the judge could not make the dismissal order expected by the conspirators.
In August of this year, I approached different healthcare systems as a sales representative of Medical Supply Chain (now a sole proprietorship operated by Samuel Lipari) and discovered that the Novation LLC restraint of trade through long term anticompetitive contracts still exists. The scheme is also operated by Novation LLC through the Veterans’ Administration despite statutory provisions intended to make bidding open for minority and small business contractors.
I am therefore forwarding to you Samuel Lipari’s antitrust complaint against the Novation cartel members and a RICO complaint he brought against the cartel members that used state officials in Missouri and Kansas to keep him out of even the home health market, a market they do not monopolize in order to keep him from having resources to enter the nationwide hospital supply market and compete against them with his technology to lower healthcare costs.
I am also forwarding my two grand jury requests to you in a demand that you investigate and present this evidence to a grand jury and stop the foreseeable violations to the rights of citizens in the State of Kansas from the unchecked racketeering that deprives them of access to the courts in violation of 18 U.S.C. §§ 1961et seq.
Sincerely,
Bret D. Landrith
bret@bretlandrith.com
Attachments
1. MSC v. Novation Complaint 05-0210
2. Attachment 2 Affidavit of Samuel Lipari 05-0210
3. Lipari v. VHA – Novation et al. Complaint 08-04217
4. Appendix 1. Procedural History
5. Appendix 2. Table of Cases Complaint
6. Appendix 3. State Role in Disbarment
7. Appendix 4. US Bank Relationship
8. Appendix 5. GE Relationships
9. Appendix 6. (Cynthia Fitzgerald) Ex rel Complaint
10. Lipari v. GE, Wells Fargo, Regus International, Chapel Ridge (RICO) Petition 0916-38273
S/Bret D. Landrith
Director James B. Comey
FBI Headquarters
November 6, 2013
Page 15
Attachments will be in part 2
By Stew Webb
Stew Webb Website
Veterans Today Radio News Reports Stew Webb Host

http://www.veteranstoday.com/2014/09/28/federal-judges-coverup-u-s-attorneys-deaths-tied-to-jeb-bush-part1/

 

 




Stew Webb Press TV interviews

StewWebb_Reports_ON_PressTV

Click on Picture below to watch interview:

Click on Picture below to watch interview:

Click on Picture below to watch interview:

Click on Picture below to watch interview:

Click on Picture below to watch interview:

Click on Picture below to watch interview:

Click on Picture below to watch interview:

Click on Picture below to watch interview:

http://www.stewwebb.com

http://www.veteranstoday.com/author/swebb

http://www.stewwebb.com/stew-webb-veterans-today-radio-archives/

http://www.stewwebb.com/stew-webb-press-tv-interviews/

 




CIA director apologizes for snooping on Senate lawmakers-Stew Webb PressTV

CIA_Director_apologizes_for_snooping_on_Senate_lawmakers




Alien Agenda IV: Alien Ultimatum or Final Warning ?

Alien_Agenda_IV_Alien_Ultimatum_or_Final_Warning

by Preston James

Has a Final Warning been delivered by a benevolent Alien ET group that the Super-elite Oligarchs running Planet Earth must quickly clean house or suffer a Final Judgment/Cosmic Reset?

Several top inside sources, including Veterans Today Senior Editor Gordon Duff have claimed that a very serious message was delivered to Super-elite Oligarchs.

As the reports go, a somber military style briefing was delivered during a recent meeting of a certain top group of Super-elite Oligarchs, not the CFR or Trilats, but perhaps a group something like the Pilgrim Society.

It could be expected to be exceedingly difficult to get accurate information about such a sensitive meeting and what goes on behind closed doors with high security in place but Gordon Duff has provided confirmation that this briefing did occur.

Indications suggest, but do not confirm, that the briefer, allegedly a very high ranking official in the UN, communicated a very somber message to this group of Super-elite Oligarchs on behalf of this certain group of Alien ETs.

The actual description of the details of the message that was delivered by this briefer has not yet been disclosed. It appears the basic idea was that unless these Super-elites cleaned up the massive corruption and evil in the world, a very powerful Cosmic Entity was going to deliver a massive worldwide Final Judgement, perhaps best described as a Complete Cosmic Reset for Planet Earth.

This briefer may have told this group of super-elite Oligarchs that unless they abated the high levels of corruption they have perhaps allowed and/or produced, 90% in the room would not be there in two years.

It is unknown at this time if this certain Alien ET group that is rumored to have insisted that this message be delivered to Super-elites will be the ones delivering a “judgment” or not. However, based on what we do know, it is unlikely that they would be the ones. It is likely that the Military Briefer was delivering this warning about another Alien ET group that is very old, has an evil history operating as a major Earth Parasite mass-murderer of humans. This is the same Alien ET entity which has been the origin of most evil in the world and will continue to do so unless human consent is withdrawn at every level.

Note: This article is written for well informed active Military, Veterans, Intel or retired Intel, USG Policy Makers, and Members of Congress. If you do not have some knowledge of Secret Space War issues, reading this article is probably a waste of your valuable time.

What particular Entity would be delivering a Final Judgment or “Cosmic Reset” to Planet Earth?

I cannot provide you with information as to what the means of any such Judgment to be delivered to the world would be or what the actual reasons will be. Only an educated guess can be made at that. It could be a warning that unless abated societal corruption will run its course and will soon destroy modern civilization as we know it resulting in mass death. Or perhaps it will be a provoked Civil War, or induced urban rioting and the burning of large urban areas followed by a massive crackdown and mass arrests by the Department of Homeland Security (DHS); or the inducement of a major worldwide nuclear WW3; or perhaps an induced major worldwide economic crash followed by massive urban breakdown and loss of government.

Or perhaps a direct geophysical attack on Planet Earth by a certain Alien ET group using advanced Cosmic Space War weapons systems used to induce worldwide weather or environmental disasters. Or perhaps an induced large meteor strike. Or perhaps a direct invasion by an evil, parasitical, cannibalistic Alien ET group known as the Dracos, the reptilian “Order of the Snake”. Perhaps this Judgment will be a massive worldwide flood, a world wide massive alien attack using super weapons unknown to most, such as a powerful worldwide EMP or some other static generating interference or force-filed that would stop all electronics cold. Perhaps a climate catastrophe or numerous, repetitive disasters. Perhaps the sudden spontaneous detonation of all nuclear material.

Or could it be that this particular, evil group of Cosmic Parasites the Dracos are now taking the Earth’s nations into a complete economic collapse and total Nuclear WW3, unless they are stopped cold soon. And a certain benevolent group of Alien ETs, the Tall White Nordics are attempting to warn the super-elite oligarchs that unless they get serious about stopping this and detach from this evil they will lose everything they own as the whole world goes up in ruin in a nuclear WW3.

At this time it is not known if this briefing communicated a warning of what is set to occur as societal disintegration due to massive corruption at every level, or whether it communicated an alien ultimatum to clean it up or suffer an alien delivered judgment by another Alien ET group which will not allow the coalition between Dracos and Humans to use their jointly developed ultra-high weapons of war technology or their jointly developed time-warp technology to pose a threat to the galaxy or beyond.

Artists concept of what an ancient reptilian, “order of the snake” Draco Alien ET Warrior looks like, based on historical reports. The evil Luciferian Dracos, the originators of World Zionism which emerged from the Teutonic Knights and the Hanseatic League, now suspected to be the horsepower behind Mystery Babylon, Babylonian Money-Magick and the Old Black Nobility aka the “Hidden Hand”.

Are the Dracos Cosmic parasites who have been attacking Planet Earth for many centuries going back at least to Ancient Babylonia?

Some insiders have referred to this exceedingly evil Cosmic Parasite group the Dracos as the evil reptilian Luciferians, with Mars the War God as their leader also known to some as Marduke. Marduke is believed to have lived many years and was previously driven from Planet Earth when human consent was withdrawn.

Marduke or “Mars the God of War” appears on several military awards such as the Congressional medal of Honor and allegedly has a statute on top of the US Capitol Building, some also refer to as Persephone, Goddess of the Underworld and Minerals. Others say this statute represents both in true Masonic duplicity and sexual dualism.

Some believe Marduke is back for another try and this time he may succeed in completing his Alien Agenda which is to allegedly inculcate a worldwide occult Luciferian network of his own super-elite Oligarchs to rule on his behalf. In return he provides all the wealth, power and status these folks can imagine but is using them to take the world to destruction, depopulation while creating massive human suffering to feed his parasitical negative energy needs.

It has now been established beyond any reasonable doubt to anyone who examines all available evidence already publicly disclosed that Alien ETs exists; crashed Alien ET anti-gravity vehicles have been recovered and back-engineered; that Alien ETs have frequently visited the Earth; have entered into treaties with the leaders of more than one government; have exchanged ultra high tech alien technology for access to human and animal DNA, have established secret underground and underwater bases for themselves; and have established secret bases with various nations as joint efforts for android development, trans-humanism development, and advanced cloning, hybridization and chimera experimentation.

It has also now pretty clear to some who have access to top insider information that there is a complex Cosmic Space War which is ongoing at this time. This space war involves certain alien ET groups against each other, against human groups, and human groups using alien ET anti-gravity craft against each other.

Soon the reality of Alien ET’s and their Anti-gravity Craft (AGCs) will be revealed publicly to the World.

It is now known beyond any reasonable doubt that the USG knows Alien ET Anti-gravity Craft exist and that the USG has deep black secret Space Fleet of their own Anti-gravity Craft (AGCs).

Regardless of the typical party line of lies and coverups typically and serially presented by the Controlled Major Mass Media (CMMM), UFOs have crashed and been recovered, have been identified and back-engineered and the USG has had a Secret Space Fleet of Anti-gravity craft for over twenty years.

And there is an ongoing Secret Space War with various factions battling in Space for Tactical Dominance: Alien ET craft of different Alien ET groups are periodically battling each other, firing sophisticated “beyond black” ultra high-tech space weapons such as plasma cannons and high powered lasers or masers (particle beams); human Space fleets are periodically battling Alien ET Anti-gravity Craft (AGCs); and various Earth originated Secret Space Fleets are battling each other.

There have been rumors dating back to the 1970′s that the USAF and the USN had their own space fleets and at times had some battles with each other. Some insiders have suggested that the 9/11/01 attack on the Pentagon with the cruise missile was done by the USAF in retaliation for the USN investigating an alleged WZ theft of over 3 Trillion dollars. It is known the the Office of naval Intel and the navy accounting section was the main target at the Pentagon.

By the way, the brief video clip by Richard Dolan is not easy to discount. He is very highly respected, always conservative in his conclusions and has become the confident of numerous insiders that know the truth about Alien ETs, Anti-gravity Craft (AGCs), USG back-engineering of AGCs, the USG Secret Space Program, and off-planet colonization and “Break-away Societies.”

YouTube – Veterans Today –

Richard Dolan was also the personal confident of a top ranking CIA man responsible for UFO matters for the USG, and took his deathbed confession which is staggering in its implications.

YouTube – Veterans Today –

“They” walk among us.

It is now well known by many insiders, some of whom have disclosed that there are some Alien ETs that looks like normal humans and are walking among us, deeply embedded in high positions of Government, getting married and producing alien/human hybrids. The lowest estimate of the number is 200,000, some say it is far higher and these folks comprise the Oligarchical “Bloodline Families” and most of the Oligarchy and cannot therefore be easily reasoned with since they are really not human and have a love for Luciferianism in their blood.

It is also well known that some Alien ETs who look human are involved in enforcement activities to cover up actual UFO encounters and suppress disclosure by insiders. Yes, Kelly AFB once had a special team of Psyop experts that “dressed up” and imitated the real Alien ET men in black and suppressed the UFO and Anti-gravity secrets, but most suppression is now done by the real “Men in Black” which are either pure Alien ETs or alien ET/human hybrids.

Has an actual Space Fleet Pilot been recently allowed or “programmed” to go public ?

A very interesting personal testimony of a man claiming to be a US Space Fleet Pilot has emerged. Everyone must judge for themselves as to the plausibility of this man’s claims. Personally I think they are accurate based on what other reports I am aware of which carry similar stories. But if they are not, someone would have had to have provided deep black secret information to this man.

The USAF has had advanced anti-gravity crafty since during the Vietnam war and landed some at night in war zones that were supposed “not to exist” in order to haul drugs out. This was known as Operation Whitestar and when these craft landed (usually only one at a time and infrequently too), everyone was told to turn away and not look.

It is no longer deniable that the USAF has deployed Anti-gravity Craft (AGCs), aka Black triangles for at least 20 years, first photographed by police and many witnesses in Belgium:

http://nexusilluminati.blogspot.co.uk/2014/06/black-triangles-cornerstone-of-usa.html

And it is important to note that several top insiders have disclosed to associates that one Alien ET group is demanding “complete disclosure” of the reality of Alien ETs soon or they will do it themselves. It is suspected this same group, the Tall Whites aka “Nordics” had instructed their Earth representative to communicate a “Final Warning” to the Super-elite Oligarchs who are deeply involved in running Planet Earth.

YouTube – Veterans Today –

The reason for the communication of this “Final Warning” or Ultimatum to Planet Earth remains unknown at this time.

The information provided does not at this time include the Alien ET’s reason for giving this Final Warning or Ultimatum. We can only speculated based on background information. One informed source who does not know for sure has suggested that perhaps a very power Alien ET group, the Tall Whites, believed to be “peace-makers” is concerned that a certain group of evil humans working with a certain notably evil Alien ET group (known to be incredibly bloodthirsty, evil and anti-human, the Serpentine Reptoid Dracos), have began to develop access to means to warp time and create a significant galactic threat which extends beyond the earth’s solar system.

Cosmic Rules of Play have been claimed by some insiders as a means provided to the masses to stop this process that will produce Worldwide Judgment or a “Cosmic Reset” for Planet Earth.

It is strongly suspected that this certain Alien ET group that has delivered this Ultimatum believes that there are Cosmic Rules of Play that require humans in mass must give consent to their corrupt Oligarchical Rulers in order for this evil Alien ET group to work with these certain oligarchs to advance an evil anti-human agenda. If true as this group has claimed in the past, this means that if humans withdraw consent in mass, this evil Alien ET group cannot advance its agenda to destroy humans, Terra-form the earth, colonize it and mine the minerals for their own sinister purposes.

Human enslavement and mass death with great human suffering is the Draco game which their Cutouts help them fulfill in return for vast political power, wealth and status.

Mass human death and maximum human suffering feeds the negative energy needs of the parasitical Dracos. Without this and periodic human sacrifices on Luciferian or satanic holidays, these Cosmic parasites start losing power over the world since their need for negative energy is disrupted. If you stop the human sacrifice of the Luciferian/Satanic cults you will cut off this source of power for the Dracos. And this can easily be stopped if we have some decent leadership in the FBI and the US Department of Justice, since they have Intel reports which detail all who do these serious crimes against humanity and children, often infants. Historically, those in these key investigatory and prosecutorial positions have themselves been deeply compromised by the International Zionist crime Syndicate of the City of London run out of Cutouts in Israel and Germany and deeply infiltrated into America and many other nations through Israeli espionage fronts like AIPAC, B’nai B’rith, the ADL and the SPLC.

And perhaps the recent emphasis in Europe on Dumping the Federal reserve System in America and on the elimination of Israeli Apartheid as a means to get Palestinians back their stolen land and housing is best viewed as the results of some very effective payback covert operations already deployed.

Luciferian Organizations like the Skull and Bones serve as major Cutouts for the Luciferian Dracos.

It is well known from History that the group that started the notorious Skull and Bones obtained their money from Opium Sales and enslaving humans through addiction in order to amass great fortunes. Skull and Bones is a notable Death Cult that worships death and believes that by ministering death to the masses, they can purify and protect the human race. It is suspected that many of the groups in this occult network have basically contracted with these evil Alien ETs who have a hidden agenda to destroy mankind through the generation of massive war, and various sophisticated soft-kill methods as well as biological warfare means such as engineered plagues.

It is also well known by astute researchers that many of the world top oligarchical groups are part of a worldwide Occult Network that worship Lucifer, are dualistic sexual perverts, have major interests in the “Seven Sisters” or their offshoots (emphasis on capitalizing on the mining of Earth minerals for huge profits). It has been suggested that these folks suffer from a number of dysfunctional delusions which make them a clear and present danger to all other residents of Planet earth, and that they believe that doing evil is desirable and necessary in order to obtain massive power from their god Lucifer, as long as they are not on the receiving end.

If there are Cosmic Rules of Play requiring human consent, how then can humans withdraw consent?

The way that has been proved the most effective has been related to the printing press and the mass media. When Gutenberg invented the printing press this revolutionized instant communication and served to increase the “Moral Density” of the masses as long as it represented the truth. When the Press and Mainstream media was hijacked and became a tool of Madison Avenue as suggested and enabled by Eduard Bernays, it became a tool used to mind-kontrol the masses and advance an evil agenda to corrupt and enslave the masses.

The worldwide Internet has become the New Gutenberg Press and despite the numerous World Zionist driven misinformation sites, the Truth is still being advanced and spreads like lightning all over the world instantly. truth resonates and once out, its massive dissemination all over the world and diffusion among the masses cannot be stopped.

The worldwide Internet versus the Controlled Major Mass Media (CMMM).

At present the Alternative news provided by the Internet is far outpacing the Controlled major Mass Media (CMMM) in America which has become a USG propaganda discriminator and advertiser of mostly false or exaggerated claims from Big Pharma, military recruiting ads, phony gadget ads, late night phone-sex ads for drunk, high or delusional male listeners.

The Major Mass Media can be a powerful tool of promoting ethics, morality and exposing injustice and corruption in the Government and in business. But it is now hijacked and compromised with owners and Editors serving as agents of those who have hijacked America and have worked so hard to nullify the US Constitution, Bill of Rights and Rule of Law.

Personally, I think that the masses of the world are engaged in a race involving the Internet against the Ruling super-elite oligarchical groups that run the world and promote massive corruption and lies at every level to obtain their own evil agenda.

We know that the Internet is waking many up all over the world and has become a powerful tool of truth. It is stimulating a very massive emerging populism in many nations all over the world including America. Populism is coffin nails to the Ruling oligarchs evil occult agenda. these evil groups know this and are now responding.

And according to Senior Veterans Today editor Gordon Duff, Israeli Intel and espionage fronts inside America have been recently exposed inside the US High Military and Intel Command for doing the 9/11/01 attack on America which was a nuclear attack based on new Russian Intel dumped into the public sector, apparently in retaliation for the USG’s covert interference in the Ukraine and Syria.

Yes, the USG Military and Intel High Command know Israel did 9/11 with the help of some Traitors in the JCS, NORAD and the USAF, and numerous Israeli-American Israeli-first “dual citizens” and they are hoppin’ mad and want total payback asap. This exposure and retaliation has already caused the USN to sink two Israeli Dolphin subs which contained nuclear armed Tomahawks.

And more is coming in the form of very crafty, sophisticated Psyops and covert operations which are designed to produce maximum payback against those in Israeli and America that did 9/11. this exposure will help break the brainwashing of the CMMM and will expose the perversions and evil promulgated by these World Zionist entities which are basically Luciferian and evil to the core.

The worldwide Internet is causing the CMMM to fail.

Lately this strategy has started failing as the staged mass shootings (done by Mind-kontrol) and the phony simulated ones are becoming completely exposed by astute researchers such as Professor James Fetzer with his amazing Sandy Hook work. Too many folks have already learned about what a Gladio-style, inside-job, false-flag attack is and why governments have staged them for hundreds of years. Without all this fake, staged Madison Avenue advertising and expensive Political advertising the CMMM would go bankrupt. Since its business is down due to a growing lack of trust in it, revenues are dropping and much of the advertising revenues comes from the Military for recruiting, Big Pharma, sports, and phony gadgets and systems.

What options are available to the Ruling oligarchs to stop this coming loss of control?

Their options include: starting a color revolution or civil war to give a government more power; stage various false-flag attacks to promote massive fear which can be used to motivate the masses to give up rights, freedom and liberty. Perhaps they can start a Civil War between America masses and their own private Zionist army inside America, the Department of Homeland Security (DHS). Or they can start a nuclear WW3 over some staged conflict or Color Revolution that they have set up. Or they can perhaps generate a complete 1930′s style depression. Or perhaps withdraw various types of welfare and food-stamps and precipitate major rioting and burning in certain large urban areas.

The Big Trick, a great deception?

Apparently this Alien ET group which has delivered the warning is attempting to point out that the agenda being followed by this interconnected group of Ruling Elite Oligarchs (an occultic Luciferian Agenda) is actually a very big deception and trick. And they are also apparently making the point that if this evil agenda is continued, it will lead these leaders, their own families and the whole world into massive depopulation and terra-forming at the hands of this evil Alien ET group many call the Dracos whose home base is believed to be the City of London.

Actually some insiders believe that this evil Alien ET group has so far completely deceived these super-elite oligarchs into doing their dirty work but providing massive wealth, power and status, but taking a path that will soon lead to total destruction and mass death including 90% of all Oligarchs. This mass death will be part of the secret Agenda of the Dracos to depopulate the earth of humans, Terra-form it and repopulate it with their own or their android creations and then mining minerals they value.

In order to pull this off they have had to have their own cadre of super-elite Oligarchs doing their evil, parasitical will while being self-deluded into believing that they are purifying and saving the human race by drastically “thinning the herd”.

Many experts on society know that if the masses withdraw consent and become desperate or unable to live with the status quo any longer having lost everything dear and all their dream, no longer have anything to lose and will quickly create a major change in governance. But if they have been disarmed and their government becomes a tyrannical force making war against the masses, then it becomes far more difficult for the masses to induce or create change. That is why it is so important that American retain their arms.

Right now the largest army in the world is comprised of American hunters and gun owners of all classes, races and origins. This provides the ultimate barrier to an out of control USG that has been hijacked by World Zionists working on behalf of the evil, Luciferian reptilian Dracos who worker bees are also sometimes called the “Order of the Snake.”

The Chief Action Agents or Cutouts for the Dracos are World Zionists.

The Draco guarding the City of London which is the Center and Central Command for World Zionism and Luciferianism. It is the Babylonian, Black-magick Financial Power of the City of London Rothschild Banking System that provides the Draco power for World Zionists, aka “World Bolsheviks” in Israel and wherever they have penetrated any nation.

Gordon Duff, Senior Editor of veterans Today, has revealed on several occasions that the Soviet Union, which was started by Bolsheviks in 1917, later created the State of Israel as a Soviet, Bolshevik enclave to use to penetrate American Intel. And he also reveled that American Intel allowed this to hope to use Israel to penetrate Soviet Intel.

When Pollard, a Dual Israeli-American Citizen betrayed America and committed the biggest acts of espionage against America in history resulting in over 1,000 deaths of American agents and assets, contrary to popular belief he was functioning as a Soviet Spy, sheep-dipped to track back to Israel rather than the Bolshevik based Soviet union.

After the Soviet Union fell due to Lee Wanta’s heroic work as President Reagan’s Secret Agent under the Totten Doctrine, Israel has remained a Soviet left behind army and a center for the neo-Bolshevik infiltration, hijacking, take-down, destruction and mass-murder of most Americans, and also to serve as a replay of the mass murder of 66 million Russian Peasants in Bolshevik Russia after the Tsar and his family were murdered.

World Zionism is Luciferianism and is Draco inspired and empowered.

If you haven’t already figured out that World Zionism is actually Bolshevism and is run by Luciferian anointed families, it should be clear now. The City of London Rothschild based, Zionist private Central Banking is little more than Bolshevism disguised as private Central Banking. And Talmudic Judaism is Luciferianism anointed by the Dracos. Some astute researchers believe that the reason Talmudic Zionism is dead set on subduing, asset stripping, dirtying up and then murdering all Goyim as an act of complete neo-Bolshevism revenge against those who believe that they have been accepted by God Almighty instead of Judaics.

If the thesis that the Dracos are evil Luciferians is correct, this would explain the alliance of the WZ’s with Luciferianism, Satanism and memberships in the highest levels of Masonry and various linked occult death worshiping cults, as well as their obsession with murdering all Goyim as part of a seriously dysfunctional and clearly false racial delusion.

The Bottom line to all this is this: Americans must take back America from the foreign infiltrators and hijackers.

Populism is emerging at a rapid rate all over the world in most societies thanks to the worldwide Internet which is the equivalent to a new Gutenberg Press. Truth published in the alternative Internet media resonates with the populace and spreads like wildfire at the speed of lightning. It has now become a new worldwide sport to use the high speed ability of the Internet to research government covert operations and crack them as criminal conspiracies. And millions of amateur Internet researchers are doing so from all ages, walks of life, cultures and nations.

Yes it is becoming a very big pastime and leisure sport and Populist Internet Researchers are getting very, very good at cracking government criminal conspiracies. This is especially so when top investigative researchers like Professor Jim Fetzer and his numerous associates of other top experts start disassembling these government criminal conspiracies that typically use the false cloak of “national security” to keep the public from knowing about their evil crimes. Once Professor Fetzer starts in on a case, thousands follow suit from all walks of life as well as other top experts and continue disassembling these government criminal conspiracies and RICO crimes.

A new major individual Sport and Worldwide Leisure Pastime of cracking conspiracies by basic Internet Research has emerged which provides powerful access for almost anyone of any age to vast quantities of information in mere seconds by the use of sophisticated search engines.

The Powers That Be (PTB) know that unless they do something to either restrict the Internet or mitigate its elicitation of world populism, their power and control over the masses will be short lived. Their options to do so are limited also because of the Internet’s worldwide penetration and the fact that the masses are becoming informed of government staged and deployed Gladio-style, inside-job, false-flag attacks and it is becoming a leisure pastime and new sport to figure out recent covert operations and how they were staged.

Much of the credit for this new pastime of cracking government covert ops must be credited to Professor James Fetzer who started this new trend of what is best described as covert research by groups of top experts in associated fields relevant to each case. This has been Professor Fetzer’s usual methodology in cracking many prominent cases such as the JFK & RFK Assassinations, the 9/11 attack on America, the Boston Marathon fake Bombing, and the Sandy Hook Hoax which had no dead kids or teachers at all.

The simple truth is this, that truth is the perfect antiseptic to government lies and tyranny. If a significant proportion of the masses “wake up” and get active to change things (some experts say 12%), rapid political change for the good will occur. The Media is always the key. As long at the Major Mass Media is consolidated into six huge WZ linked corporations, the public remains mind-kontrolled and bamboozled by government lies which the CMMM disseminates as the truth.

It’s time for the Masses to “Wake-up” and take America back to be their own Constitutional Republic once again.

The massively corrupt super-elite Oligarchs have been able to maintain rule because of the public’s inability to fathom their own Government’s massive lies and evildoing. Most of the masses have a deep desire to Belicia that either the Government is a benevolent parent figure, some are determined to believe that the Government is God. Up until the advent of the Internet it has been very hard for most to accept that their own Government almost never tell the truth about anything. Or that it is run by criminal psychopaths and the criminally insane who don’t give a hoot about any citizen at all.

The CMMM has been very effective in maintaining this myth that the God is good and cannot lie or conspire against “We the People” in order to take our assets and use our young as cannon fodder in the Banksters wars for profit. But with the advent and popularity of the alternative media on the worldwide Internet, the New Gutenberg Press, this is all changing and for the first time in many years, the public has quick access to most of the truth.

If the masses wake up and stop cooperating with the system at all levels and demand change, it will happen. If the masses remain well armed and fiercely resist any attempts to be disarmed, tyranny cannot prevail as the masses demand real change and work together to route out the foreign espionage elements and criminal banking that has infiltrated and hijacked America.

Understanding Psi-power, the unconscious power of the group mind of the masses is the key for “We the People” to take back their Constitutional republic of America from the World Zionist hijackers.

This ability of the American People to take back their Constitutional republic is best described as Psi-power. The top Luciferians at the head of the Snake aka the World Zionists have always known about Psi-power and how it must be used to mind-kontrol the masses and direct them to become totally distracted in ways that prevent their own use of Psi-power to establish control over their own nation.

I cannot tell you how this reversal of control may occur if a certain mass of Americans wake up (estimated by experts to be about 12% of the people). I can, however, assure you the likelihood is very high that somehow Americans will find a way take America back if a certain critical mass of “We the People” wakes up. This process is an unconscious spontaneously emergent event in the mass group mind, but once it reaches a critical mass it cannot be stopped by the ruling Oligarchs.

The mass awakening of the masses and group effort to take their nation back is always a mysterious psychological, mass-mind process best called voluntary psychic hiving of the group mind. It can occur in numerous mysterious ways but the results are people waking up and taking back their nation one way or another. It is the reverse of psychotronically, mind-kontrolled, drug or genetic induced hiving because it comes from the heart and mind. Psychological warfare experts have known for many years that in order to maintain control in a nation, the hearts and minds must be won over. If this does not happen, control cannot be gained and if temporarily gained will be lost eventually.

The powers that Be (PTB) aka the Luciferian World Zionists that have hijacked America know that unless they keep Americans distracted with staged TV shows and movies, drug, alcohol, gambling or porno addictions (also called “stoking the flesh”) and complete control of the information highway (CMMM) to be misinformation and lies, Americans will wake up. Right now the PTB/WZs are losing control over the Hearts and Minds of Americans.

The PTB/WZs know that ultimately the ongoing erosion of the CMMM by the Internet, the New Gutenberg Press, will result in the waking up of America and most of the World. That is why they are doing everything they can and also considering extreme options such as provoking a new American Civil War between DHS and “We the People”, an EMP or equivalent attack, or a nuclear WW3 to abate this worldwide emergence of populism.

If you have had trouble sleeping at night or hear ringing in your ears, you will understand this is evidence of a massive, ongoing psychotronic attack on the world through various sophisticated means including Wi-Fi, Cell Phone Towers and perhaps space platform or ground based equipment. And yet despite all this, such efforts have so far not succeeded in suppressing the American Spirit which is now rising and cannot be stopped.

Bonus item for those who have time and interest. Here is an excellent presentation by Richard Dolan delivered in Amsterdam several years ago.

YouTube – Veterans Today –

Read More: Click here to Read Full Article and view videos




9/11 & Israeli Apartheid, The Kiss of Death for World Zionism

911_and_Israeli_apartheid_The_kiss_of_Death_for_World_Zionism

9/11 & Israeli Apartheid, The Kiss of Death for World Zionism

… by Preston James

South African Apartheid was exposed and dispensed with after many years of struggle and major divestitures of corporate and institutional investments from anything related to South Africa.

The world literally turned against the Government of South Africa and its Apartheid, eventually causing its collapse.

The same thing is now happening to Israel over the Apartheid for the Palestinians it now holds captive in the world’s largest open air prison camp.

The whole world is turning against Israel for its Apartheid against Palestinians and massive, illegal theft of Palestinian lands and destruction of their households.

But there is a background story that is responsible and it involves the covert works of numerous high ranking Intel Cowboys inside American Intel who are dedicated America-firsters and have been working hard to restore America as a Constitutional Republic. Only some of this story can now be told, but eventually perhaps the rest will come out.

It was only a matter of time for Citizens of the World to focus on Israeli Apartheid against Palestinians and the massive, illegal theft of Palestinian land by Khazarian “fake Hebrew” imposters.

And now most of Europe, especially its University students and youth are fully aware of the massive and illegitimate land theft of Palestinian lands by these Khazarian “fake Hebrews” imposters.

And the Europeans are now fully aware of the abject tyranny and monstrous abuses fomented against Palestinians by these Israeli “fake Hebrew” invaders who repeatedly steal more and more Palestinian land, and demo Palestinian houses to clear that land and build illegal Israeli settlements there.

And as concerns about Israeli oppression, tyranny, arrests and serial mass-murder against Palestinians by these fake Hebrew Israelis rises, numerous European Corporations are divesting from anything associated with Israel. And now some American Corporations are starting to divest from any investment related to Israel also.

The turning of the tide and a change in the “prevailing winds” in America has been caused by the realization inside the US Military High Command and loyal segments of American Intel that 9/11 was a Gladio-style, inside-job, stand-down, false-flag attack done by the World Zionists.

This realization inside the US Military High Command by America-firsters and those loyal to America only has triggered a major lane change of US Policy towards Israel and an aversion to fighting any new wars on behalf of the WZs and Israel.

YouTube – Veterans Today –

This emergent boycotting of Israel by Europeans is now spreading to America.

And like what happened in Europe, it cannot be stopped. Despite all the desperate efforts by the formerly the all powerful AIPAC, ADL and B’nai B’rith. Each of these World Zionist (WZ) espionage fronts has actually been covertly defanged recently by Intel Cowboys working inside the American Intel establishment and the Department of Defense. This is a major change in the “prevailing winds” inside American Intel and the DOD and is the most significant correction to the WZ/Israeli-staged 9/11 Gladio-style, false flag attack that has occurred.

And the occurrence of the major Snowden disclosures of serious NSA RICO crimes of warrantless spying against all Americans and much of the world at about the same approximate time are no mere coincidence.

The new American Military and Intel High Command now fully realizes that Israel and its assets inside America and the Bush Cabal did the 9/11/01 attack on America, and a significant portion of them are “hoppin angry” about it and want payback.

Yes, the real turning point inside some top levels of American Intel, and especially the high military command, was the realization that the WZ’s used the following espionage fronts, “dualies”, assets and agents to plan and deploy the 9/11 attacks on America and cover it up: Israeli top Zionists, Bush Crime Cabal lackeys inside the highest echelons of the JCS, NORAD, the NSA, and the USAF; major guidance from the Mossad and the top of the Israeli Government; certain select NeoCons and PNACer Israel-American “Israeli-first” dual citizens traitors; the top controllers of AIPAC who are covert Israeli espionage agents that have infiltrated and parasitized America; and the Controlled Major Mass Media (CMMM) comprised of six major international news corporations, three of which are large defense contractors and the other three are members of the WZ “Club”.

The CMMM has served as the main propaganda and coverup mechanism for this 9/11/01 attack on America which has now been conclusively shown to have been a nuclear event at the Twin Towers, using US nukes stolen by the Bush Cabal, sold to Israel who in turn deployed them and has sold some of them to other nations.

You want names? Watch the following video and add to this the following names Dick Cheney, Donald Rumsfeld, Richard Meyers, George Bush 1 & 2 and notorious, alleged Mossad Kingpin and international Hitman, Michael Harrari who told who told a former Russian Nuclear Defense Officer Dmitri Khalezov that he was involved (1).

YouTube – Veterans Today –

Israel did the 9/11/01 attack on America with nukes provided by the Bush Cabal.

Veterans Today just published a monumentally important and very revealing series of three articles by Gordon Duff, Senior Editor at VT proving the Twin Towers were destroyed on 9/11/01 by the use of nuclear demolition charges. In these amazing articles it is disclosed that the Bush Administration stole nukes from the American nuclear arsenal and sold them to Israel which later used them in their 9/11 terror attack on America (2)(3)(4).

Hopefully, some day the story of the heroic works of the folks in the High Command of US Military and American Intel associated with this major change in US Policy will be able to be told. At present it cannot, and remains under the surface. However it is real and growing by the day. Suffice it to say numerous true American Heroes have been hard at work driving a wooden stake through the heart of these vampire Israeli espionage fronts that have parasitically infiltrated and hijacked most of the USG agencies, Congress, the Department of justice and the Judiciary, the US Military and American Intel.

In fact this infiltration has gotten so bad that Israel, the main action-agents of the World Zionists (WZs), have been able to completely hijack American Intel and now have all NSA raw data feeds downloaded by satellite directly to Israel. And numerous private DOD contractors based in Israel have been able to hijack most of the phone billing records, credit card and credit transactions of all Americans.

In spite of how sinister and depressing this situation has become with infiltration and hijacking of American institutions by the WZs, there has been a major change in the prevailing winds inside the top echelons of American Intel. Certainly this change has been long justified because of all the sinister crimes of these WZ (IZCS) infiltrators and hijackers inside America.

________________________

World Zionists (WZs) run the world’s largest crime syndicate, the International Zionist Crime Syndicate (IZCS)

World Zionists (WZs) can best be described as the world’s largest organized crime syndicate, the International Zionist Crime Syndicate (IZCS). They appear to be soulless parasites upon the human race.They are empowered by the Zionist City of London private Central Banksters who specialize in Babylonian Money-Magick and making money from nothing (debt-based notes presented as money) and pernicious usury. They are generally recognized by numerous Intel insiders to be parasites on the world, war profiteers and mass murderers behind every major war, as well as the hidden-hand behind most drug trafficking, pornography, sex trafficking, slave labor and massive banking, mortgage fraud and other and financial frauds and scams. Using their Imaginary debt-based pretend money, they have bought and now own almost every single US Congressperson, most Supreme Court Judges, and almost every federal judge.

It is important to note that WZs are comprised of a relatively small number and not all are Judaics. In fact World Zionisms origins go back to the “Teutonic Knights” and the European Nobility efforts to capture and dominate Jerusalem during the Crusades. It is the same families that are still trying to occupy and control Jerusalem. The reasons for their obsession with this will be disclosed in a later article but is related to their Luciferian beliefs and participation in “Satanic hooded black mass” worship with human sacrifice.

It is also important to note that all wars are Bankster Wars, that is, they are pre-arranged and orchestrated by the City of London Zionist private Central Banksters and their franchise associated central banks all over most of the world. No one has done a better job exposing this than Michael Rivero. If you have the time you will probably find this video quite revealing.

YouTube – Veterans Today –

________________________

Do not assume if a person is of the Judaic faith, he or she is a Zionist, because most aren’t.

It is also important to note that few of the Judaic faith are Zionists, but many Judaics are conned into providing support to WZ’s financially and otherwise due to WZs playing on their Racial Survival Delusion. It is also important to note that numerous Judaics, especially some Orthodox Judaics are anti-zionist but get no media coverage due to the WZ’s hijacking of America’s Major Mass Media.

Those that the WZs don’t “own” they typically blackmail or coerce to do their will using sophisticated psyops and human compromise operations. The amount of fear most politicians and USG officials have towrds these WZ sheep-dipped as PNACers, Top NeoCons, AIPAC, the ADL and B’nai B’rith and the associated Israeli-American “Israeli-first” Dual Citizens has been monumental until lately. But now all this has been changing and much of the credit must go to the work of the Intel Cowboys inside American Intel at the mid to high ranges.

It would be very liberating for those Judaics held captive by this WZ generated and deployed racial survival delusion to become informed about its origin (a very crafty psyops deployed by the city of London based WZs). It would be a stark but liberating realization for these Judaics to learn and understand that it was the City of London WZs that used Hitler and a core group of the Nazis to seize them, confiscate their property and place them in Internment work camps where many died. And all done in order to create this racial survival delusion which would serve as continuing cover for the worldwide criminal operations of the WZ’s IZCS.

Those of the Judaic faith could then understand that they have been played all along and used to further the cause of WZs rather than anything long term that would help them. Yes, it now appears that many mainstream Judaics, especially those living in Israel, have been set up by the WZs for a coming persecution.

In fact it is now becoming quite obvious that the WZs have set up the conditions for worldwide persecution of those of the Judaic faith by placing them in this huge trap where they will likely be blamed for the crimes against humanity of the WZs in Palestine and all around the world such as the 9/11 attacks and numerous Mossad arranged terror bombings and their part in int motivated by belief in this false racial survival delusion.

________________________

A secret WZ Agenda to destroy America the Constititional Republic and all American Goyim.

Fifty years of infiltration, hijacking and occupation of America by WZ’s and their main action agents Israel and American-Israeli “Israeli-first” dual citizen Traitors has nearly bankrupted America. It has also taken America into endless perpetual wars for the WZs, their Banksters and Israel all paid for by the secret fraud by the private Central Banksters using phony debt-based money to transfer the wealth of hard working Americans along with many illegal taxes. This, along with the WZ bought “Free-Trade” legislation in Congress that Ross Perot warned about (the “big sucking sound”), has all been part of the WZ’s secret agenda to destroy America for the City of London Zionists and destroy all American Goyim once and for all.

Part of this secret WZ Agenda is to transform America into a Police State with an Internal WZ army that can be deployed against the American People (Department of Homeland Security, occasionally called “Homoland Security” by some due to the history of some in top positions who exercised radical discrimination and instituted bad job assignments against straight hetero-male DHS management who had not been “dirtied up” or human compromised.

One example of this was rumored to have been for certain male managers being ordered to move their offices, desks and all into the male lavatories.

________________________

The WZ has instituted the militarization of the American police and psychotronic mind-kontrol operations to entrain police aggressiveness and excessive force in the brains of police.

Another part of this WZ Secret Agenda has been to fully militarize the American police and transform them into another military force which can be deployed in unison on behalf of the America WZ controlled “National Security State” to use excessive force to tyrannize and murder American Goyim.

As many now realize most major police departments have been trained by the ADL and ISF clones to view the average American as a potential domestic terrorist and have mind-kontrolled them with constant on pulsed beam operated microwave shoulder held police radios which entrain aggressiveness in many of their brains.

________________________

Top WZs are know to be avid Luciferians and associated with occult and Satanic networks which use black-mass hooded rituals, pedophilia and human sacrifice of children.

It is known by some high level Intel Insiders that the WZ has a long history of infiltrating and occupying the USG and filling the landscape and the Major Mass media that they control with numerous, repetitive Luciferian symbols they believe cast spells on “we the people” and bring them under their spiritual influence and demonic power. You may not believe this works, but some experts believe the proliferate display of these symbols can constitute sophisticated mind-kontrol on “we the people”.

________________________

A wooden stake is now being driven through the vampire heart of the world’s largest parasite, the demonic WZ/IZCS.

Due to some recent “changes” in the high command of the US Military and American Intel, you will soon see more and more effects of a wooden stake being driven through the heart of the WZ/IZCS vampire and a near complete or complete disempowering of the WZ/IZCS espionage fronts inside America as well as the disempowering and perhaps demise of the WZ controlled NSA.

The NSA is now part of a very large worldwide IZCS, which is actually a RICO Criminal Syndicate which takes orders from the City of London Zionist private Central Banksters, Israeli leaders, and heads of Israeli DOD contractors who have infiltrated and hijacked American Intel including and especially the criminal NSA.

The NSA has been run by WZ controlled Traitors and Infil-Traitors for many years, and yet they have the balls to accuse Snowden of being a traitor for reporting their massive crimes against “We the People”.

Most important, in the near future you will see a major change coming for the NSA and the associated RICO criminals who sit at its helm and control it and are using it to completely violate the US Constitution and Bill of Rights on behalf of the WZs, especially those who control the new NSA mega-spying facility in Bluffdale, Utah.

Soon you will see the NSA having its wings severely clipped and control over it being taken back by the American high Military Command, which now is staffed by numerous America-Firsters and soldiers who know the truth about how the WZ’s deployed the 9/11 false-flag attack with help from numerous cutouts and traitors inside America.

Soon it will no longer be possible for a head of the NSA to lie through his teeth to Congress and to the American People and get away with it without being charged with felony perjury and get 20 years in prison as this “creature of the night” should have. No matter how hard the WZ and the NSA try to stop this process of its disassembling, it is far too late for them, and the only thing they can do is to try to start WW3 in the Mideast or the Ukraine or start a full scale American Civil War. If they attempt do either, they will probably also be finished.

You may see the NSA losing half its funding eventually or if not that being dis-empowered through major legislation in response to major political pressures from European allies and “We the People”. there are some things which the NSA has become involved in which are extremely alarming and will be disclosed soon by Edward Snowden and others.

The tide is now turning and truth will be screamed from the rooftops worldwide.

The Snowden disclosure was the nexus of numerous converging factors behind the eventual complete exposure and coming demise of the RICO criminals who seized it and have been attempting to use it to create the basis for transforming America into GAZA 2, the largest open air prison camp in the world.

At present, WZs have transformed Palestine into the largest open air prison camp in the world and made all Palestinians living there prisoners of their Apartheid war to establish “Greater Israel”, one of the greatest crimes against humanity in history. And many Europeans are confused how the Israelis can be acting like hard core Nazis that they supposedly hated and had established Israel as a refuge against such future tyranny.

________________________

What is really going on at the new NSA facility in Bluffdale, Utah?

Why this new NSA facility is in Bluffdale, Utah, near and connected to a major “beyond-black” deep underground base, which has infiltrated the NSA and hijacked it, and how they are being dealt with and disempowered and deposed will be explored in a followup article. Suffice it to say that major forces high inside American Intel have taken covert actions to decimate the Israeli-run NSA, and either completely eliminate it or weaken it dramatically and transform it into a true constitutional Intel agency working only on behalf of “We the People”.

________________________

Everything will eventually be fully exposed, everything and that includes all the NSA’s massive crimes against the American People.

It is known by some Intel insiders that sometime in the future, many if not most of the NSA wiretaps, raw data and “evidence” which has all been recorded and stockpiled will be released on the worldwide internet for all to view and listen to. This will prove that the NSA had raw data evidencing all Viet Nam related USG/CIA drug trafficking, proof that the NSA knew where almost every American POW/MIA has been and which ones are still in captivity, how Kissinger ordered the US Army and Navy to assassinate as many American POWs and MIAs as possible using mercenary or special ops sniper teams and eventually VX poison gas dispensed by carrier based aircraft (admitted by Admiral Moorer–known as “Operation Tailwind”).

This will show the complicity of the NSA in all political assassinations including JFK, MLK, RFK and Malcolm X as accessories after the fact covering it up as well as having pre-knowledge but doing nothing.

________________________

The NSA is a part of a large RICO crime syndicate, the IZCS, and has concealed major USG, American Intel, and Mossad related crime evidence for many years.

And most important this NSA raw data which will be shared with the American public will show that the NSA knew who inside the USG and Military and Israeli Intel were planning the 9/11 attacks, and who actually did it, and how it was done specifically, while they did nothing to stop it or bring the perps to justice. The reason the NSA never has done anything to stop these crimes is because they have been part of the City of London run WZ/IZCS RICO crime syndicate from the very start and were set up by the Banksters to serve their own hidden agenda.

Certainly this phony “War on Terror” was created by the WZ use of 9/11 to spook the American masses to blame all Mideast Muslims, to support illegal, Unconstitutional, undeclared proxy wars for Israel. It was also designed to motivate many Americans to be willing to give up many Constitutional Rights for the promise of increased safety from terrorist attacks that were sure to come. The masses were told that, unless they gave up their rights allowing the militarization of the police and the positioning of the National security State against any American who dissents in any way, many acts of terror would occur in the “homeland”.

As all these secrets start coming out, watch these soulless parasites run for cover, but be certain there will be no safety from prosecution anywhere in America unless they obtain immunity agreements and start singing on their higher ups like parakeets. And as some know, this will lead to the Denver Circle of Twelve “Bloodthirsty Ones” (refer to Stew Webb’s excellent website for more information on this (6)—he knows firsthand since he was married to a women from a top ranking member of the IZCS years ago before he became a Federal Whistleblower—some trolls have tried to discredit Stew and displace his story but those who spend time studying the available evidence soon realize that Stew’s story is true).

________________________

Remember this, all secrecy is now ending and this petrifies the WZ/IZCS.

“Everything secret degenerates, even the administration of justice; nothing is safe that does not show how it can bear discussion and publicity.” Lord Acton

“Since I entered politics, I have chiefly had men’s views confided to me privately. Some of the biggest men in the United States, in the field of commerce and manufacture, are afraid of somebody, are afraid of something. They know that there is a power somewhere so organized, so subtle, so watchful, so interlocked, so complete, so pervasive, that they had better not speak above their breath when they speak in condemnation of it.” Woodrow Wilson

Since the World Zionists were able to rise to power, capturing the City of London financial system with their early Intel on Napoleon’s defeat, they understood that complete secrecy of their existence and evil, Luciferian, occult, death cult practices was essential. They never expected to ever be found out and have always feared a “French Revolution” reaction by the masses if they ever found out.

That is why they have worked so hard to buy up or stack the top editors with folks they control. They realized that near complete control of the Major Mass media was essential. And it is now generally realized that the worldwide Internet is the wooden stake in their vampire hearts.

That is why you will see their last stand as a major attempt to pass major Unconstitutional laws to restrict and censor the internet in America and even in Europe. It is unlikely this can work, for it will create a major backlash by “We the People”.

Truth is like an out-of-control freight train coming at them, and they have almost no where to hide anymore. They fear exposure, and yet now they are being completely exposed, and all their formerly secret dirty anti-human deeds are being fully exposed.

These scum have few options left, either get out of America, take their multi-trillion dollar stashes and go into retirement and exile. Or start WW3 in Syria, Iran or the Ukraine, neither of these options any longer appeals to most Euro nations. The only other option they have is to start a major civil war inside America between their National Security Apparatus and “we the people”.

Obviously it is now clearly apparent to anyone with half a brain who studies the evidence available on the Alternative Media of the worldwide Internet that the “visible” American Government has been completely infiltrated and hijacked by the “Invisible” Secret Shadow Government (SSG), which is unfortunately run by several very old, now near-death from natural causes, senior Illuminati or Denver Circle of Twelve Bloodthirsty Ones. However the SSG has numerous “new kids on the block”, many of whom are anti-IZCS and dedicated to actually serving the interests of “we the people”.

________________________

Senior IZCS and WZs refer to themselves as the Illuminati, or the Luciferians, or the Lucifer Enlightened Ones.

It is important to note that the senior WZ/IZCS members refer to themselves as “Illuminati”, and secretly worship Lucifer and consider themselves the top leaders of a worldwide interlinked occult network of Satan-worshipers. These scum live to do evil and acquire more and more money, power and prestige. They care nothing of the average person, and view them as subhuman insects to be destroyed.

This intersection between Satanism, human-sacrifice, pedophilia and the City of London Zionist private Banksters, the Federal Reserve System and the large Wall Street Banks as well as those who run the WZ/IZCS as well as the Bush Crime Cabal (BCC) is very important to understand. The fact that the BCC cooperates with the IZCS is quite confusing to many researchers, and it is best to consider them two sides of the same WZ coin. They are partners in this massive worldwide WZ Rico crime syndicate.

These folks are all criminal psychopaths and parasites upon humans everywhere and basically comprise a Death Cult. John Kerry criticizes Snowden and says he should man up and surrender to the US Department of Justice. What a notable hypocrite Kerry is. He should man up and tell all of us how he sold his soul to Lucifer when he joined the Skull and Bones (Russell Trust) Death Cult. He should admit that he worships death and believes in mass murdering humans through staged wars and terrorism in order to purify and “preserve” the human race.

________________________

The IZCS is a money-making criminal machine specializing in anti-human crimes which destroy normal sex roles, the family, cities, and healthy American culture and important American Institutions of Government and society.

The IZCS has been a money-making criminal machine with an endless lust to steal the fruits of other people’s labor and use Americans and NATO troops as cannon-fodder for their Zionist wars of acquisition. Its top members are hard core Satan-worshipers aka Luciferians and they are basically a self-centered, anti-human death cult which practices child pedophilia and child sacrifice at the highest levels.

________________________

The IZCS specializes in bribery, human-compromise, theft, fraud, deception, duplicity, lying, murder and mass-murder tyranny, sex-trafficking, pornography, oppression of all sorts and the use of the “divide and conquer” strategy to keep others from catching on to their devilish games of death and destruction.

The current VA scandal is merely the tip of the iceberg of the abuse of millions of wonderful American Soldiers who have been served up as cannon fodder to be purposefully sacrificed in WZ/Israeli perpetual wars, all as part of a well developed Agenda to maim and murder American Soldiers and deny many of them any decent medical care. And is now known that the VA has had a secret Agenda to take away the financial rights of many vets and also their rights to own guns for self-defense.

This is a complete abuse of process and blatantly illegal and is a covert way of reducing many vets to institutionalized mental wards of the National Security State with no trial and no personal Constitutional Rights respected. Bureaucratic refusals to provide necessary care for Vets and the faking of related documents is shameful beyond reason and pure evil. And the actual legal/financial liabilities which are potentially prosecutable against these VA and USG perps is fathomless and unimaginable to most, and the financial damages that could be awarded to the Veteran victims since Viet Nam are huge and may approach the national debt.

The only thing worse is sending our wonderful American Soldiers into illegal, Unconstitutional, undeclared wars of aggression for a foreign entity that has been busy for the last 50 years doing espionage inside America against America. Sending the best of America to fight and be used as “cannon fodder” in wars for the Zionist City of London and its main action agent Cutout, Israel, is evil beyond words and a direct threat to the security and future of America. Anyone involved in this has committed Treason and Sedition as well as numerous RICO crimes and felonies as well as crimes against humanity and mass-murder.

Once most vets and Americans in general find out how deep this criminal abuse and neglect goes at the VA, there will be hell to pay for those involved. Many VA top Policy-makers and “top-dogs” should be tried for criminal negligence and murder, and numerous felony offenses as well as RICO.

________________________

Is there a deeper Agenda at play with American Soldiers returning from combat since the illegal WZ war in Viet Nam?

It is now apparent that many covert things were done to American Troops in Viet Nam to make sure they became either disabled or dead upon returning from this WZ proxy war. One was the use and planned exposure of Agent orange designed to murder or disable American Soldiers. many of those who haven’t died of cancer have paid a horrible price as far as numerous surgeries and various levels of disability.

It is now known that the use of DU was forbidden by the US Military until the wars in the WZ wars in the Mideast occurred. Suddenly all the excess depleted Uranium from numerous reactors could be “discharged” in the battle field. We now know for sure that the use of DU is a plague on the returning American Soldier and a disability or death sentence to many.

And yet all these scum responsible still walk around freely rather than being charged with criminal negligence, murder, crimes against humanity and war crimes. Those responsible should be indicted, arrested, fully prosecuted, convicted and many sentence to either life in prison or death on a military gallows by hanging.

It is also now known that a large number of American soldiers were purposefully exposed to a bad mix of nerve agents released by the American bombing of various Iraqi germ warfare weapon dumps, all precursors sold to Saddam Hussein by American Defense Contractors.

And it is also known that various “experimental” obviously toxic vaccines were forcibly given to American Soldiers which has caused numerous deaths and disabilities in American Soldiers who have returned.

All these horrid deaths and disabilities of American soldiers as well as the secret VA plan to take away vets rights to own guns and policies guaranteed to deny them care have been part of a WZ instituted agenda to destroy American Soldiers or at least disable them.

________________________

Is there an even darker part of the secret agenda to destroy American Soldiers?

It has been alleged by some top psychotronic experts on the inside that there a secret plan has been deployed to Mind-kontrol American Soldiers to destroy themselves.

If this plan exists as it has been alleged, it is certainly working because approximately twenty-two American Soldiers or vets commit suicide each day. We know that the very insanity of the conditions present that American soldiers have had to fight under in Viet Nam, and all the WZ Mideast proxy Wars for Israel and the Zionist controlled and related war-profiteers directly contribute to suicidal ideation. This should be no surprise. But there is something far more sinister at work here.

It is suspected that the US Military deployed secret “Beyond-black” technology in their vaccinations which provided nano particles of magnetic material which would cross the blood brain barrier and migrate to certain parts of the brain.

This could then be flashed by ultra high tech psychotronics (pulsed beam microwave, Wi-Fi, cell phone tower emissions, ground generated ELF waves forms, or nuclear powered satellite based scalar emissions aimed at specific geographical target areas. It is suspected that these covert emission can be used to entrain the Soldiers or Vet brains and stimulate strong suicidal ideation which can then lead to suicide.

In the months to come you will see many millions of American vets organizing and beginning to apply massive pressure to get the VA medical care they deserve. Well known and respected CIA whistle-blower Gene Chip Tatum has just started a new organization for Vets called Veterans Against VA Corruption (7). www.vatva.org. Stay tuned because there has been overwhelming interest by many vets in joining just such an organization that will work to help them.

And do not be surprised in the suggestion by noted VT Financial Editor and Radio Show Host Mike Harris is followed. Mike has been suggesting for some years now that the VA budget be transferred into the DOD as a line item. He believes that this change is necessary in order to make Vet’s health needs a major and urgent priority. I think he is right.

Since all recent American wars are World Zionist Bankster wars for profiteering and as proxy wars for Israel, the Department of Defense should have its name changed back to the Department of War the way it was during WW2.

________________________

The WZs and their IZCS has access to unlimited funds through multiple sources to buy almost any politician they want or to finance numerous illegal covert operations.

The IZCS gets its horsepower to function from the massive amounts of money “created from nothing with the flick of a pen” by their brothers in crime the Zionists City of London Central Banksters and their associated franchisee the American federal Reserve and the large banks on Wall Street.

But they also have been able to amass astoundingly large amounts of “off the books” unaccountable cash through their illegal USG approved illegal drug Trafficking into America and partnership with the major drug cartels.

________________________

For the last 50 years the WZ/IZCS has been able to cover up all their massive crimes against “We the People” by controlling the Major Mass Media.

Since the IZCS either owns or control all of the six major News Corporations that comprise the Controlled Major Mass Media (CMMM), they have been able to dispense their massive lies, propaganda, deceit and duplicity for over 50 years and have kept most Americans dumbed-down and ignorant of their true agenda. But alas, all this in now in process of changing thanks to the instant truth transmitted around the world at the speed of light by the Internet.

It is high time that the mass, serial crimes of the IZCS get fully exposed to all Americans and dealt with out in the open. These parasitical scum need to be brought to justice and their grip on America and much of the world needs to be broken.

________________________

The WZ Gladio-style, False-Flag attack of 9/11 has created a major change in the prevailing winds and has so far triggered a reluctance by the current US Military High Command to fight any more Proxy Wars for the WZs and Israel.

Israeli was set up to function as the main action agent for the WZs centered in the City of London. It was designed to provide all the Intel functions and to infiltrate and hijack American Intel and the US Military. And up until now it has been very successful. But the IZCS went way to far in staging the 9/11 Gladio-style False-flag attack. The IZCS was so arrogant in staging this 9/11 attack that they assumed they could never be exposed for this.

________________________

Professor James Fetzer was the first investigative journalist to organize efforts with top experts to disassemble almost every single major WZ related USG criminal conspiracy.

Professor Fetzer’s efforts to associate with top experts in fields necessary to completely disassemble these major criminal conspiracies such as the JFK Assassination, the 9/11 Gladio-style, inside-job, False-flag attack on America, the Boston Bombing Hoax and the Sandy Hook Hoax, have been ultra successful, despite his numerous detractors who become offended by his level of detail explored and his extreme conclusions, many of which have already turned out to be true.

Whether you like Professor Fetzer’s work and the work of the other experts he associates with or not, it must be pointed out that Professor Fetzer has actually started a whole new social fad among thousands of Web surfers who can no longer accept the boiler plate WZ lies dispensed in the controlled American Major Mass Media, three of which are major defense Contractors and the other three are also part of the “WZ club”.

The fact is that he and those other researchers he has associated with have cracked almost every single major criminal conspiracy by the USG and the SSG.

Thanks to Professor Fetzer’s group approach to the research of all these major events, it has now become a major new fad and new social sport to utilize the numerous Internet accessible resources now available to debunk the WZ/USG/SSG lies dispensed by the Controlled Major Mass Media (CMMM) and expose what really happened in these WZ staged events.

Yes, thanks to the efforts of Professor Jim Fetzer, many more like him that are now emerging, hard-core investigative journalism in the alternative Media published on the worldwide Internet has become a new past-time and social sport. The credit for this is predominantly due to the energetic efforts of Professor Jim Fetzer going all the way back to 1992.

Professor Fetzer has been the true pioneer in this group approach to research using the application of rules of logic and scientific reasoning. And this new fad is now starting to diffuse to mainstream and even is becoming a normal social convention and institution. And all this as you are now seeing the CMMM being displaced by the Alternative News on the worldwide Internet, where Truth spreads like lightning as it resonates in the hearts and minds of all who wish to live without government tyranny and oppression.

________________________

A serious racial delusion has been used by WZ’s to motivate a fair number of non-zionist Judaics who are unknowing of the massive criminality of the WZs to provide them with support and assistance.

There has been a very sinister lie and deception serving as the motivating force for so many Judaics who have been conned into supporting the IZCS and Apartheid Israel. It is the racial delusion that Israeli Judaics are of Hebrew descent and therefore entitled to taking land away from Palestinians and claiming at their own.

And this claim that Israeli Judaics are of Hebrew descent has been shown to be false. After all, respected, peer reviewed genetic research has now shown has shown that very few so-called “Israeli Jews” who claim to descendents of Abraham actually carry any Hebrew Blood at all, and therefore have no right to title of any Palestinian lands whatsoever. The same respected genetic research has also shown that most Palestinians are actually of ancient Hebrew bloodlines.

What this means in practical terms is that these most of Israelis claiming to be of ancient Hebrew Blood are actually the “fake Jews” of Revelation 2:9 & 3:9 (KJB) and have absolutely no right to take or occupy any Palestinian lands whatsoever.

And it is now becoming quite clear that the blatant abuses and serial crimes against Palestinians ordered by these WZ leaders of these fake-Hebrews in Israeli has now become the WZ’s Achilles Heel. They should have seen it coming but the depth of their arrogance associated with their deep belief in the racial delusion they created has blocked any rational perception for these world parasites.

Now isn’t it interesting that the very term “Holocaust” means “fiery sacrifice” and this is exactly what the WZs set up in Nazi Germany in the 1930′s. naturally this is a hard fact to accept for many but it certainly makes it easier if folks understand that Hitler was a British Agent from the getgo, fully Mind-kontrolled and completely prepared for his demonic role in history at the Tavistock Institute in 1921 & 1922 (5). This use of the so-called “Holocaust” has been synthetically created and managed from the very start in the City of London by World Zionists (WZs). It has been a major tool used to effectively limit any criticism against their Cutouts, espionage fronts and syanims deployed inside America.

The discovery that the WZs and Israel did 9/11 was the first major turning point. This alone has generated a great deal of attention to other blatant Israeli abuses and crimes against American Soldiers such as their attack on the USS Liberty which they did as an attempt to drag America into their war against Egypt. And now major attention has been triggered by the Europeans turning against Israel over its Apartheid against Palestinians and major illegal land theft of Palestinian owned land and tyranny, oppression and mass-murder against Palestinians.

Payback is always a bitch and this time it’s going to be a super-bitch.

It was the abject arrogance of the WZs and their belief that their control was so total over American institutions of Government that they could never be exposed or challenged. They drastically underestimated the American human spirit and innate intelligence of many Americans and will eventually pay a very big price for all they have done murdering Americans and for using American Soldiers as cannon-fodder in their Proxy Wars for profit and acquisition. Payback is now on its way and it will be a real bitch for these WZ/IZCS international criminals and anti-human scum.

Are the Intel Cowboys back at it, and are they going at the true source of all major world conflicts this time instead of attacking the symptoms such as Nazi fascism, Japanese Imperialism, or Communism, etc.?

As you ponder these important issues just ask yourself if the recent European attention focused to the blatant, extreme injustices of Israeli Apartheid against Palestinians was just a coincidence. Just maybe it was the covert handiwork of the Intel Cowboys who are now doing the impossible to take the hell caused by 9/11 back to the originators of it all. Maybe someday, sooner than later as secrecy ends and everything becomes known, you will find out for sure. Could it be that the grip of the World Zionists has been so complete, so total that the only way to get at them is through covert means? And are we seeing that in progress now as their whole system is starting to unravel worldwide and come apart at the seams?
References:

(1) http://www.bibliotecapleyades.net/sociopolitica/esp_sociopol_911_154.htm

(2) http://www.veteranstoday.com/2014/05/20/too-classified-to-publish-bush-nuclear-piracy-exposed/

(3) http://www.veteranstoday.com/2014/05/20/nuke-cancer-from-911-revealed/

(4) http://www.veteranstoday.com/2014/06/02/vt-nuclear-education-undeniable-proof-of-911-as-a-nuclear-event/

(5) Hitler Was A British Agent, Greg Hallet, World’s Top Muckraker,http://www.theworldoftruth.net/HallettReport/index.html

(6) http://www.stewwebb.com/

(7) http://www.vatva.org/
Additional References:

Gordon Duff on Mike Harris Show on the use of stolen nukes to demo the Twin Towers on 9/11/01 by Israeli operatives, https://www.youtube.com/watch?feature=player_detailpage&v=PrYU9Do89Dc

www.rense.com

www.whatreallyhappened.com

Israel Did 9/11, All the Proof in the World, http://theinfounderground.com/smf/index.php?topic=5367.0

Background Articles by Preston James:

http://www.veteranstoday.com/2012/05/11/the-intel-cowboys/

http://www.veteranstoday.com/2012/06/23/why-so-many-recent-intel-leaks/

http://www.veteranstoday.com/2013/02/02/the-abuse-abandonement-and-planned-replacement-of-the-american-soldier/

http://www.veteranstoday.com/2013/02/09/the-great-imposition/

http://www.veteranstoday.com/2013/02/17/robocops/

http://www.veteranstoday.com/2013/02/20/the-new-american-gestapo/

http://www.veteranstoday.com/2013/03/07/killing-america/

http://www.veteranstoday.com/2013/03/10/belt-way-whoppers/

http://www.veteranstoday.com/2013/03/17/breaking-the-spell/

http://www.veteranstoday.com/2013/03/31/bye-bye-banksters-hello-bric/

http://www.veteranstoday.com/2013/04/21/money-for-nuttin-debt-for-free/

http://www.veteranstoday.com/2013/05/12/the-big-split/

http://www.veteranstoday.com/2013/05/17/the-chumps-r-us-club/

http://www.veteranstoday.com/2013/06/09/turning-america-into-gaza/

http://www.veteranstoday.com/2013/09/02/35-things-the-ruling-cabal-does-not-want-you-to-know/

http://www.veteranstoday.com/2013/09/22/inside-the-beltway-part-ii-its-gangsters-r-us/

http://www.veteranstoday.com/2013/09/30/inside-the-beltway-iii-creating-cover-for-the-big-shift/

http://www.veteranstoday.com/2013/10/10/inside-beltway-iv-left-behind-treason-beyond-measure/

http://www.veteranstoday.com/2013/11/10/was-ronald-reagan-the-last-duly-elected-president/

http://www.veteranstoday.com/2013/12/08/why-didnt-we-learn-from-vietnam/

http://www.veteranstoday.com/2013/12/12/reality-check-for-american-tyrants/

http://www.veteranstoday.com/2014/01/22/six-eyes/

http://www.veteranstoday.com/2014/02/01/urban-war-zones-in-america/

http://www.veteranstoday.com/2014/02/09/you-are-the-enemy/

http://www.veteranstoday.com/2014/02/25/murder-by-cop-new-state-sanctioned-zio-sport-in-america/

Original Article

http://www.veteranstoday.com/2014/05/31/911-israeli-apartheid-the-kiss-of-death-for-world-zionism/

1) “The report below is taken from an intelligence dump by Russian sources. As the origin is from an intelligence agency in the form of a “leak,” there are always questions.”
http://www.veteranstoday.com/2014/05/20/too-classified-to-publish-bush-nuclear-piracy-exposed/

2) “A new and terrifying 9/11 conspiracy has hit the news. We are now confronted, not only with startling proof that 9/11 was a “nuclear event,” but that there have been thousands of unreported deaths in New York….”
http://www.veteranstoday.com/2014/05/20/nuke-cancer-from-911-revealed/
3) “The document below was submitted with many others to support the hypothesis of the World Trade Center being destroyed by nuclear weapons. In a previous submission outlining intelligence on 9/11 and other issues, a detailed explanation for the effects seen on 9/11 is made, one we find compelling.
Of the documents submitted, this one is in public domain. “

http://www.veteranstoday.com/2014/05/21/doc-submitted-by-russian-intel/

4) “This represents one extreme of the weapon design spectrum – nuclear devices intend to make “small” explosions. Low yield in this context generally means yields much less than the 20 kts of a nominal fission weapon – say, 1-1000 tons.”
http://www.veteranstoday.com/2014/05/22/constructing-the-nuclear-child/

5)“We now believe that recent revelations received from Russian intelligence were based on the Edward Snowden leak of the highly classified (Q) Sandia Labs Investigation on Nuclear Weapons Use on 9/11.”
http://www.veteranstoday.com/2014/05/31/vt-nuclear-education-series/

6)“Veterans Today is putting “out there” enough “non damaging” nuclear weapons facts to undo the obfuscation that allows nuclear terrorism to be covered up by a complicit press.”
http://www.veteranstoday.com/2014/06/01/nuclear-education-series-dimona-classified/

7) “Recent reports and massive documentation from Russian intelligence sources has supported a hypothesis involving nuclear terrorism.”
http://www.veteranstoday.com/2014/06/01/vt-nuclear-terrorism-education-series/

8) “The documentary evidence below was available to all years ago. Some used it, what they could find of it. The entire NNP community always knew 9/11 was a nuclear event.”
http://www.veteranstoday.com/2014/06/02/vt-nuclear-education-undeniable-proof-of-911-as-a-nuclear-event/

9) “Many of us awoke today, checked our email hoping for more of InforWars amusing reports of how Israel was going to save the world….”
http://www.veteranstoday.com/2014/06/04/the-real-manhattan-nuclear-testing-district/

10) “As usual, the biggest story in America is suppression of news. There has never been a time when the media has taken such an aggressive position, not even after 9/11.
http://www.veteranstoday.com/2014/06/09/ordered-suppressed-the-other-cold-war/

11) “Three Ukranian special forces affiliated with groups working in concert with the US embassy in Kiev were arrested in Texas after crossing over from Mexico.”
http://www.veteranstoday.com/2014/06/18/vt-nuclear-education-as-the-hammer-drops/

12) “The materials below were selected from a huge archive I have been given, some public, some less so, to publish. In general, minimally, it exposes the US government as dangerous, incompetent and deceitful in its handling of both nuclear materials and our national defense.”
http://www.veteranstoday.com/2014/06/24/vt-nuclear-education-mossadn-korea-links-mox/

13) “Below are responses to questions and statements made in a roundtable. These are in answer to a US Navy nuclear weapons officer’s comments and questions.”
http://www.veteranstoday.com/2014/06/24/nuclear-roundtable-americas-nuclear-arsenal/

14) “The United States possesses and may well have used a devastating weapon designed to emulate terror attacks and even natural disasters.”
http://www.veteranstoday.com/2014/07/07/officials-site-thermo-nuke-in-911-demo/
15) “A Nuclear Thermobaric Weapon is a type of enhanced radiation weapon that utilizes boosted plasma from the nuclear fire ball to generate an intense, high-temperature explosion, and in practice the blast wave produced is typically larger and longer in duration than in a conventional explosive weapon design.”
http://www.veteranstoday.com/2014/07/08/vt-nuclear-education-fission-based-thermobaric-weapons/

16) “The following article will, to those who can guess at what is withheld/classified and why we are including this, has much to offer. To many, it will answer questions to 9/11 as a nuclear event.”
http://www.veteranstoday.com/2014/07/13/vt-nuclear-education-anti-gravity/

17) “The current set of affairs, the brutal attacks on Gaza using American aircraft and American supplied chemical and cluster munitions is being staged for a reason. A massive terror attack in America, staged by right wing extremists, aided by Israel, is getting near. The evidence is overwhelming. It is becoming increasingly hard for them to suppress.”
http://www.veteranstoday.com/2014/07/14/gaza-neocons-and-israel-constructing-a-new-911/
18) “Below is the unclassified discussion not only on warfare, but human survival as well as seen from good people inside the advanced weapons research community.”
http://www.veteranstoday.com/2014/08/14/neo-mini-nukes-and-m16-the-economy-of-war/

19) “The following text was submitted by two groups. One is the IAEA, the United Nations nuclear watchdog group and scientists at one of our nuclear weapons labs.”
http://www.veteranstoday.com/2014/08/15/vt-nuclear-education-nukes-in-iraq-confirmation/

20) “Everything we are told about nuclear weapons, who makes them, how they work and what they do is a lie. Truth is an orphan.”
http://www.veteranstoday.com/2014/08/24/vt-flexing-its-nuclear-muscle/
21) “For two months now, we have published the most advanced weapons physics papers ever to be made available to the public.”
http://www.veteranstoday.com/2014/08/28/nuclear-911-revealed-theories-and-disinformation-the-misguided-and-the-inhuman/

22) “Declassified 1970 report on Tactical Nuclear Warfare based on the tenets of the “Kissinger Doctrine.”
http://www.veteranstoday.com/2014/08/30/vt-nuclear-education-tactical-nuclear-warfare/
23) “This article outlines how early nuclear reactors long bypassed by larger and yet lesser technologies offer hope for the future.”
http://www.veteranstoday.com/2014/08/30/vt-nuclear-education-early-reactors/
24) “Hiding what really happened on 9-11has put the US and the rest of the world in more danger than the threat all the real terrorist groups put together a 100 fold.”
http://www.veteranstoday.com/2014/09/01/iaea-investigators-audit-reveals-us-not-iran-the-problem/
25) “The following evidence clearly shows a mini yield semi-pure hydrogen bomb existed in 1958 and that it has had 40 years of refinement.”
http://www.veteranstoday.com/2014/09/03/vt-nuclear-education-history-of-mini-nukes/
26) “Today you get a look at more boring science, boring to some at least. What do the guys who make those secret UFO’s seen over Nevada or those pocket nuclear weapons think about some of the questions Dr. James had to ask? Then again, it is for him to tell you the ones that got no answers. Some went to “the labs,” others go to “the reading group.” For those who live with a burning curiosity and would rather die informed than “safe,” reviewing our recent archive and writing your own little tiny book might be worthwhile. I sure as hell won’t be writing it as to me, the movie never ends.g”
http://www.veteranstoday.com/2014/09/08/vt-nuclear-education-answering-the-hype/

Read more in Gordon Articles:

http://www.veteranstoday.com/author/gordonduff




flagususmcflag france_flag
stewwebbradionetwork-com-2015-09-24

You can Mute the Audio

AudioNow

StewWebb-RadioNetwork-Store
Stew Webb Radio Store

Bush Illuminati Human Sacrifice Denver June 20-21 2018

REAL NEWS PRESIDENT TRUMP DOESN’T WANT YOU TO MISS

President Trump Twitter feed

FBI Raids Satanic Human Sacrifice Video

Letter to Kansas City US Attorney Timothy Garrison purpose to Prosecute Cyber Terrorism April 18 2010

SEE: PROOF (Exhibits 1-22 below) Attemped murder of Stew Webb Federal Whistle blower and Grandview, Missouri Police Covered up the car crash.

March 26, 2018 Letter to President Trump Stop NSA NAZI Espionage

Please email or twitter to President Trump


Letter to President Trump 2017-02-23 from Whistle blowers How to Drain the Swamp Monsters

President Trump Stop Cyber Terrorism against Stew Webb Whistle blower

George Bush High Treason Illegal Sale of F-16s, Apache Helicopters, M-1 Tanks

AIPAC and Abramoff Operate Child Sex Blackmail Ring

Breaking News

Archives


Stew Webb 34 Years a Federal Whistle blower
Stew Webb served in the United States Marine Corps and was Honorable Discharge. Stew was a General Contractor-Home Builder until 3 car crashes in one year and is now disabled. Stew turned Federal Whistle blower – Activist of 31 years and has been a guest on over 3,000 Radio and TV Programs since September 18, 1991 and now has his own Radio and TV Network http://www.stewwebb.com Stew was responsible for the Congressional Investigations and hearings that lead to the Appointment of Independent Prosecutor Arlin Adams in the 1989 HUD Hearings, the Silverado Savings and Loan Hearings, the Denver International Airport Frauds hearings, the MDC Holdings, Inc. (MDC-NYSE) Illegal Political Campaign Money Laundering Colorado’s biggest case aka Keating 5 hearings and the information provided that lead to the 2008 Illegal Bank Bailout.
Stew was held as a Political Prisoner from 1992-1993 to silence his exposure by Leonard Millman his former in law with illegal charges of threatening harassing telephone calls charges which were dismissed with prejudice. Leonard Millman, George HW Bush, George W Bush, Jeb Bush, Neil Bush, Bill Clinton, Hillary Clinton, Larry Mizel, Phil Winn, Norman Brownstein, John McCain and Mitt Romney to name a few are all partners in what is known as the Bush-Millman-Clinton Organized Crime Syndicate. Leonard Millman (Deceased 2004) was member of the “Illuminati Council of 13”