Jump to content

Blast From The Past


Zeshua
 Share

Recommended Posts

  • Replies 720
  • Created
  • Last Reply

Top Posters In This Topic

Re: Pictures

 

Please expose all that you have on this person.

Honestly, he could be using someone's wireless connection without their knowledge. Or he could have a proxy on someone's machine, again without their knowledge. Or both. And MAC addresses can be changed with software. So posting his address won't do much.

 

 

Link to comment
Share on other sites

Re: Pictures

 

Honestly, he could be using someone's wireless connection without their knowledge. Or he could have a proxy on someone's machine, again without their knowledge. Or both. And MAC addresses can be changed with software. So posting his address won't do much.

How about a general location... such as what State in the US... if it is the US?
Link to comment
Share on other sites

Re: Pictures

 

08/11/07 06:59:02 Fast traceroute 216.127.72.7

 

Trace 216.127.72.7 ...

 

1 192.168.1.1 0ms 0ms 0ms TTL: 0 (No rDNS)

 

2 No Response * * *

 

3 24.116.26.201 8ms 8ms 8ms TTL: 0 (24-116-26-201.cpe.cableone.net ok)

 

4 12.119.148.141 17ms 120ms 16ms TTL: 0 (No rDNS)

 

5 12.123.25.94 30ms 29ms 30ms TTL: 0 (gbr6.sl9mo.ip.att.net fraudulent rDNS)

 

6 12.122.11.109 29ms 30ms 31ms TTL: 0 (tbr1.sl9mo.ip.att.net fraudulent rDNS)

 

7 12.122.18.5 54ms 30ms 28ms TTL: 0 (No rDNS)

 

8 12.122.2.21 28ms 31ms 28ms TTL: 0 (gbr1.kszmo.ip.att.net fraudulent rDNS)

 

9 12.122.17.206 29ms 31ms 28ms TTL: 0 (No rDNS)

 

10 12.123.4.253 29ms 28ms 31ms TTL: 0 (ggr3.cgcil.ip.att.net fraudulent rDNS)

 

11 192.205.32.194 30ms 29ms 29ms TTL: 0 (p16-0.att.chcgil06.us.bb.gin.ntt.net probable bogus rDNS: No DNS)

 

12 129.250.2.22 48ms 48ms 48ms TTL: 0 (p64-2-2-0.r21.dllstx09.us.bb.gin.ntt.net ok)

 

13 129.250.2.58 49ms 49ms 45ms TTL: 0 (ae-0.r20.dllstx09.us.bb.gin.ntt.net ok)

 

14 129.250.3.130 * 56ms 53ms TTL: 0 (as-0.r20.hstntx01.us.bb.gin.ntt.net ok)

 

15 129.250.2.229 55ms 53ms 54ms TTL: 0 (xe-4-1.r03.hstntx01.us.bb.gin.ntt.net ok)

 

16 129.250.10.70 52ms 54ms 54ms TTL: 0 (ge-1.ev1.hstntx01.us.bb.gin.ntt.net ok)

 

17 207.218.245.29 50ms * 52ms TTL: 0 (ivhou-207-218-245-29.ev1servers.net probable bogus rDNS: No DNS)

 

18 207.218.223.105 54ms 58ms 53ms TTL: 0 (ivhou-207-218-223-105.ev1servers.net probable bogus rDNS: No DNS)

 

19 216.127.72.7 54ms 54ms 53ms TTL:239 (http://www.the-cloak.com ok)

 

08/11/07 07:13:52 Slow traceroute 216.127.72.7

 

Trace 216.127.72.7 ...

 

192.168.1.1 RTT: 0ms TTL:170 (No rDNS)

 

* * * failed

 

24.116.26.201 RTT: 8ms TTL:170 (24-116-26-201.cpe.cableone.net ok)

 

12.119.148.141 RTT: 17ms TTL:170 (No rDNS)

 

12.123.25.94 RTT: 30ms TTL:170 (gbr6.sl9mo.ip.att.net fraudulent rDNS)

 

12.122.11.109 RTT: 31ms TTL:170 (tbr1.sl9mo.ip.att.net fraudulent rDNS)

 

12.122.18.5 RTT: 31ms TTL:170 (No rDNS)

 

12.122.2.21 RTT: 30ms TTL:170 (gbr1.kszmo.ip.att.net fraudulent rDNS)

 

12.122.17.206 RTT: 32ms TTL:170 (No rDNS)

 

12.123.4.253 RTT: 29ms TTL:170 (ggr3.cgcil.ip.att.net fraudulent rDNS)

 

192.205.32.194 RTT: 58ms TTL:170 (p16-0.att.chcgil06.us.bb.gin.ntt.net probable bogus rDNS: No DNS)

 

129.250.2.22 RTT: 49ms TTL:170 (p64-2-2-0.r21.dllstx09.us.bb.gin.ntt.net ok)

 

129.250.2.58 RTT: 47ms TTL:170 (ae-0.r20.dllstx09.us.bb.gin.ntt.net ok)

 

129.250.3.130 RTT: 53ms TTL:170 (as-0.r20.hstntx01.us.bb.gin.ntt.net ok)

 

129.250.2.229 RTT: 53ms TTL:170 (xe-4-1.r03.hstntx01.us.bb.gin.ntt.net ok)

 

129.250.10.70 RTT: 55ms TTL:170 (ge-1.ev1.hstntx01.us.bb.gin.ntt.net ok)

 

207.218.245.29 RTT: 52ms TTL:170 (ivhou-207-218-245-29.ev1servers.net probable bogus rDNS: No DNS)

 

207.218.223.105 RTT: 55ms TTL:170 (ivhou-207-218-223-105.ev1servers.net probable bogus rDNS: No DNS)

 

216.127.72.7 RTT: 55ms TTL:239 (http://www.the-cloak.com ok)

 

this is his i.p. 129.250.3.130 the-cloak.com tries like a mofo ill tell ya...

 

sorry about the 10 mins, ive gotta find some things that i'm missing before i can trace his state. :)

 

but, the fact that he has an isp is proof he's no time traveler.

 

 

Link to comment
Share on other sites

Re: Pictures

 

129.250.3.130 RTT: 53ms TTL:170 (as-0.r20.hstntx01.us.bb.gin.ntt.net ok)

Why do you think that's his IP? From those traces it looks like that's just a machine between you and the-cloak. It belongs to these people http://ntt.net/ They probably have a peering agreement with AT&T.

 

If you run sudo nmap -O -sV 129.250.3.130 (on ubuntu) you can try OS and service guessing but their sysadmins might be annoyed if they get automated alerts or something.

 

 

Link to comment
Share on other sites

Re: Pictures

 

What does a traceroute to 'the-cloak' have to do with probabilities of returning Z's IP.

 

When you trace an IP, it lists every hop between you and the target machine that ICMP packets take.

 

Those IP's in the trace are machines between you and 'the-cloak'.

 

The route from the-cloak back to your machine might be a totally different route. Data doesn't have to go back the same way in came in. Plus, traceroute is ICMP traffic routes only. TCP/UDP traffic could take a different route. The distance between two machines might actually be very far and pass through many other routers, but some routes are virtualized to keep the number of hops under 30.

 

The main use for traceroute is to run it a few times to find out where network slowdowns are happening between you and another machine.

 

You'd have to use netstat while talking to him over an instant messenger or some service that the-cloak doesn't proxy. Or have some software running on his machine that "phoned home".

 

 

Link to comment
Share on other sites

Re: Pictures

 

"The main use for traceroute is to run it a few times to find out where network slowdowns are happening between you and another machine."

 

you should rephrase,"the main use for YOUR tracerout..."

 

my traceroute is a program that predicts the probability of that persons i.p. that i.p. had, by far, the highest probability of being him.

 

"What does a traceroute to 'the-cloak' have to do with probabilities of returning Z's IP.

 

When you trace an IP, it lists every hop between you and the target machine that ICMP packets take.

 

Those IP's in the trace are machines between you and 'the-cloak'."

 

are you sure about that? because i was under the impression that i traced past the-cloak.

 

my program stated that the i.p. i gave had a very high probability 65%-70% or so of being him.

 

programs were sam spade1.14 and netscan tools 5.10

 

and like i said, alot of what i did, i did not publish, but i am more than satisfied that it was a hoax.

 

on the other hand, it was late, and ive got a nasty cold, so i may not have been paying much attention. i'll recheck everything when i get to feeling better.

 

 

Link to comment
Share on other sites

Re: Pictures

 

my traceroute is a program that predicts the probability of that persons i.p. that i.p. had, by far, the highest probability of being him.

There is no such thing as a traceroute program that will figure out the IP someone uses when they are hiding behind a proxy. You have to have access to the machine that hosts the proxy or get software onto Z's machine. Those are the ONLY two ways.

 

Sam Spade and Netscan tools are going to report the same traceroute results as the windows 'tracert' command or the gnu traceroute.

 

I don't like to run old operating systems or run old software though. An unpatched windows XP machine (before service pack 2) is comprised in an average of 4 minutes after it connects to the internet.

 

 

Link to comment
Share on other sites

I'd like to thank whoever changed the timeline a month or so ago. I've been happily listening to Chris Cornell's voice again (http://www.youtube.com/watch?v=D1j823QH6cU). As best I can recall, he had succumbed to drugs several years ago. He's alive and well now so my hat is off to you.

 

Elvis has been gone 30 years today. How about bringing him back?

 

 

Link to comment
Share on other sites

Cindy,

 

Might I take a moment and request that you expand upon your personal experience with the recent change to the timeline. As I've spoken to Jim about his personal experience, I would appreciate if you could also elaborate on yours. Most helpful would be the dates and times of the alteration. I am currently tracking a Time Quake who's origins are as of yet unknown. It is entirely possible another individual is making the alterations to your time, however minute they might be.

 

If you are wondering what the data will be used for, New research techniques Ostensibly Taken to produce One simplified method for Narrowing down Every single Collection of Improbable alteration events. Not only would this help with the extensive Detailed map of a time line alteration, You may even be able to view an advanced pre-production model if that would be of any interest.

 

 

Link to comment
Share on other sites

To Jim: I have a recent time slip as well. Again shared with my husband. Very strange. An extra phone has appeared in our office, on the wall. Everyone says it has always been there – we know better.

 

To susuemetoo: Revising things to fit the way you wish them to be – still. The group was Eight – not six. You so make me laugh lady! It was exclusive in that it was not to be added to. Oops! Subtracted from? Well apparently everyone is at risk . . .LOL. It is so obvious in your posts at cc.net that you have not let this go . . . that you are not convinced it is a hoax . . . that despite your protestations, it is still ALL about you.

 

I have been able to read cc.net recently, apparently once you clowns realized you had blocked the people you wanted most to see it haha, I didn't even have to sneak in. Thanks for that! And of course I got email from you (and Peter - thanks for keeping me updated Peter, I almost missed it!), accidently? While cc.net seems to have no problem insinuating that I was part of a team that did this hoax not one of you has written to me about it. I'm guessing that all you 'groupies' have refrained from actually writing your accusations to Sara personally as well. Why? Because you STILL believe it. So tell me, who has told Sara who she really is, eh? Anyone? LMFAO I so already know the answer in my heart!

 

Question for Cary: Is the financial stuff matching up?

 

Scooter – Hey Hey! What an awesome super double, triple agent you turned out to be. Sure had me there dude, sleuth on!

 

Yeye – smiling at ya! I sure wish your bluff had worked.

 

SL – Heaven help us all if you ever become as smart as you think you are.

 

Thank God this is only a periodic obsession for me . . . since I KNOW it isn't me, ya'll need to keep digging . . .

 

 

Link to comment
Share on other sites

Zeshua posted:

 

Cindy,

 

 

 

Might I take a moment and request that you expand upon your personal experience with the recent change to the timeline. As I've spoken to Jim about his personal experience, I would appreciate if you could also elaborate on yours. Most helpful would be the dates and times of the alteration. I am currently tracking a Time Quake who's origins are as of yet unknown. It is entirely possible another individual is making the alterations to your time, however minute they might be.

 

 

 

If you are wondering what the data will be used for,

 

 

 

New research techniques

 

Ostensibly

 

Taken to produce

 

 

 

One simplified method for

 

Narrowing down

 

Every single

 

 

 

Collection of

 

Improbable alteration events.

 

Not only would this help with the extensive

 

Detailed map of a time line alteration,

 

You may even be able to view an advanced pre-production model if that would be of any interest.

 

Well Cindy, at least Zeshua finally fessed up. S/he's "not one".

 

 

Link to comment
Share on other sites

  • 2 weeks later...

Zeshua's 2005 prediction: 'The Patriot Act ends up in court, its powers used to spy on civilians for their own good."

 

Today's news (from http://news.yahoo.com/s/ap/20070906/ap_on_re_us/patriot_act_lawsuit&printer=1;_ylt=Aiuc3qcdvVSv_b0hpm9OB0ZH2ocA ) :

 

By LARRY NEUMEISTER, Associated Press Writer 37 minutes ago

 

A federal judge struck down parts of the revised USA Patriot Act on Thursday, saying investigators must have a court's approval before they can order Internet providers to turn over records without telling customers.

 

U.S. District Judge Victor Marrero said the government orders must be subject to meaningful judicial review and that the recently rewritten Patriot Act "offends the fundamental constitutional principles of checks and balances and separation of powers."

 

The American Civil Liberties Union had challenged the law, complaining that it allowed the FBI to demand records without the kind of court order required for other government searches.

 

The ACLU said it was improper to issue so-called national security letters, or NSLs — investigative tools used by the FBI to compel businesses to turn over customer information — without a judge's order or grand jury subpoena.

 

 

Link to comment
Share on other sites

 Share

×
×
  • Create New...