Results 1 to 20 of 27

Thread: If Your I.P Traced To The Middle Of The South Australian Desert Would You Be Worried?

Hybrid View

  1. #1
    Junior Member
    Join Date
    Nov 2010
    Posts
    25

    If Your I.P Traced To The Middle Of The South Australian Desert Would You Be Worried?

    One day my I.P traced to where it should - Melbourne of Sydney CBD, and the next it was tracing here...



    There is a background to all of this but I cannot tell you it. Suffice to say I upset someone. Apparently they had a problem with something you call "encryption". It's a long story.

    Is there anyone out there who can tell me what is out there in the great sandy desert? A lone server of some sort?

    I have extensive logs that I will post.

    I do not have the knowledge base to decipher it all.

    I do not know what is normal ******** , slightly abnormal ********, very abnormal ********, **** here come the men in black.

    So any help would be good.

    My butt hurts by the way. It's like I've been....probed.

  2. #2
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    The alleged humans doing all the "pinging" seem to have a very unhealthy interest in svchost.exe and ntoskrnl.exe

    They just ping away ALL day. Especially during office hours.

    It's NOT foreign I.P's. It's like they are on my network. I.P's the same as mine but different last numbers.

    I am not using a router - mobile broadband with good software firewall - good rule list. Locked up tight. All ports blocked and opened only for specific apllications. No I.P traffic. No software like Skype running.

    I have watched these people come through Mozilla Firefox and port 80, unblock port 443 (which I had blocked for specific reasons) and then download a 2 meg file. ALL updates including certificates on Firefox were turned off.

    Whoever they were - they obviously LOVED Mozilla Firefox. When I took it away they were crying. I.P's coming from Google were being used to get in. I could have SWORN it was Google employees and I know MOzilla have a deal with Google.

    I need people with more knowlege than me to sort out what I am seeing.

    More to come.

  3. #3
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    I have a routine now where I IMAGE my O.S.

    Data partition separate.

    Data partitions encrypted and must be mounted manually.

    Despite all of my precautions they have gotten in at least once and maybe twice.

    I watch my incoming/outgoings like a hawk.

    I have nearly ALL my networking services off.

    In the end I re-image my O.S AT LEAST 3-4 times a week. Only takes me 15 minutes. Better and quicker than a malware scan.

  4. #4
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    Absolutely quiet as a mouse now.

    Elvis has knocked off for his shift and is asleep in his UFO in the deep underground bunker.

  5. #5
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    Where are all those port scans!

    Hmmmmm...maybe someone is WORRIED!

    Come on now you know who!

    Where are the port scans you little so and so?

    The cat got your tongue?

    You're coming to court by the way.

    My logs from the last year will be posted.

    [Just as I type this the pinging starts after an hour of surfing]

    This leads me to believe they have a key logger of some sort on this computer. It has been in THEIR hands twice and was clearly pulled apart.

    I once surfed for 2 solid hours everywhere I could and not a single port scan. I then sent an encrypted message to a friend laughing that my arch nemisis having the day off. Within 30 seconds the scans started. My e-mails are being decrypted in real time.

  6. #6
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    I received this "ping" and was logged off the forum immediately.


  7. #7
    Second Most EVIL YARDofSTUF's Avatar
    Join Date
    Nov 2000
    Location
    USA
    Posts
    69,911
    The images won't show because you didn't use the direct link. Make sure to copy the direct link.

  8. #8
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    Thank you Sir. You are quite correct. Now how come you ONLY have 65,000 posts?



    Are they spoofing an I.P someway to appear on my network as they do?
    Last edited by PineGap; 12-03-10 at 08:40 AM.

  9. #9
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    Quote Originally Posted by YARDofSTUF View Post
    The images won't show because you didn't use the direct link. Make sure to copy the direct link.
    They just tried the same old thing they used to do with Mozilla Firefox with Oprah...go through "updates" and port 443. I never have updates on and have never had an auto update take place in the 6 months I have been using Oprah.

    Heres the log.



    I've started recording packet logs.

    I dont have the knowledge to analyse things properly.

  10. #10
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    On one occasion, I was using Ubuntu on a Netbook. They came through the wireless card. Put a 2 gig hidden partition on the drive.

    I have the wireless off in bios and switched off manually. I tried to log off as the hard drive went crazy and the computer locked up. It said..."Unable to log off other users logged on".

    I pulled the wireless card out.

  11. #11
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    I have made complaint after complaint.

    The people doing this are the hardest core of the hardest core. They ar'nt hacking as it were. They are IN the system. They built it. They manufacture and install the routers and switching gear in the telephone exchanges.

    Google...

    Rad Group.
    AMDOCS.
    Verint.
    Guardium.

    Will I get any peace?

    Will a town meeting have to take place shortly attended by 200 people including a member of parliament?

    Will Four Corners have to do a story?

    Will a certain software and hardware installer with high security clearances have to be subpoenaed to appear in court? I hear his wife would have a nervous breakdown.

    Well, if the constant port scanning continues that is what is going to happen.

    I hear he does'nt give a stuff about his wife anyway.

  12. #12
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    Amdocs got a 600 million dollar contract with Telstra - Australia's largest telco.

    This Israeli company does billing services and database services for telco's all over the world. The company was started and is run by serving and ex israeli Military Intelligence personnel.

    The database service was/is a disaster. Sensis (Yellow Pages) is now looking to sell itself and it's database to a buyer which is most likely going to be Google.

    Google is in bed with these Israeli companies.

    With the flick of a button they have your entire life. Your banking, medical, telephone and criminal records.

    Rad Group - 24 start up companies ALL out of Israel and ALL Military Intelligence.

    Verint - data intercept and video security specialists - D.E.A wanted them OUT of the U.S because of suspicions they had hardware backdoors in their equipment.

    Airport security, Special Forces communications equipment, military electronics of every kind, control tower electronics. The list is endless. Skype. Software firewalls. Wireless chips. Intel factory in Israel - 2nd largest in world. The list is endless.

    This is how Israel controls the U.S - it knows everything that is going on.

    One more port scan? One more. Just one more.

  13. #13
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    Why am I continually logged off?

    Why do I have over 1 meg of upload when compared with only 4 meg of download? All I have done is come to this forum and upload a few small screenshots?


  14. #14
    Junior Member
    Join Date
    Nov 2010
    Posts
    25

  15. #15
    Junior Member
    Join Date
    Nov 2010
    Posts
    25

    Ping then logged off.

    And who is this guy?





  16. #16
    Junior Member
    Join Date
    Nov 2010
    Posts
    25
    I say the "TROJAN" is IN the actual usb dongle itself.

    I put in a "3" dongle and surfed for 6 hours without a SINGLE port scan or alert. Not one.

    It's not in my computer.

    Things are getting busier. Things are hotting up.

    Hopefully I will be able to surf and prepare and communicate with very important people and they will receive the important documents without Google employees and whoever else deleting them either on the server or en route.

  17. #17
    Regular Member Pettos's Avatar
    Join Date
    Oct 2006
    Location
    Sydney
    Posts
    251
    I lost interest after the 3rd post.

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •