Targeted Individual trying to whistle blow on the mob-like home grown New World Order gay mafia terrorist cell & All their activites.
Friday, August 28, 2020
Friday, December 20, 2019
Does Sunday work at all? Last night I stumbled upon an app.
With it within the app there were thousands of credit card names numbers and information email
addresses are reported as a Google but this is an app that people stalking and hacking me have
downloaded onto my through my Google Play Store and pretty sure somebody cut the bolt in my front of
my car and lost my tire and today I didn't have any oil in my car.
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
1 of 8 12/20/2019, 11:02 AM
Chris
5139549969
Get Outlook for Android
Sunday may be possible. I’ll get back with you later this week.
From: chris.rigling@icloud.com [mailto:chris.rigling@icloud.com]
Sent: Saturday, May 06, 2017 4:11 PM
To: Wooten, Donald
Cc: Wooten, Eric S.
Subject: Availability
Just want to check to see if you had any time this coming weekend days for me to stop by and talk to
you for about a half hour? I called and left a message voicemail for you last week as well as an email
thanks
Get Outlook for Android
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
2 of 8 12/20/2019, 11:02 AM
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
3 of 8 12/20/2019, 11:02 AM
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
4 of 8 12/20/2019, 11:02 AM
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
5 of 8 12/20/2019, 11:02 AM
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
6 of 8 12/20/2019, 11:02 AM
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
7 of 8 12/20/2019, 11:02 AM
iCloud Mail https://www.icloud.com/message/current/en-us/index.html
8 of 8 12/20/2019, 11:02 AM
Sent from my iPhone
Begin forwarded message:
From: Chris Rigling <riglingc81@gmail.com>
Date: November 5, 2019 at 3:40:59 PM EST
To: Detective Wooten <EWooten@columbuspolice.org>, Detective Wooten <dwooten@columbuspolice.org>
Subject: Fwd: Availability
Sent from my iPhone
Begin forwarded message:From: Chris Rigling <chris.rigling@icloud.com>
Date: November 4, 2019 at 12:41:23 PM EST
To: Rigling Chris <rigling.chris@gmail.com>, Rigling Chris <chris.rigling@icloud.com>, chris.rigling@outlook.com, Chris Scott Rigling <riglingchris.iamone@gmail.com>, Chris Rigling <riglingc81@gmail.com>, Chris Rigs <rigschris@gmail.com>, Chris Rigling <chrisrigling@yahoo.com>
Subject: Fwd: Availability
513.485.5554
Begin forwarded message:From: chris.rigling@icloud.com
Date: 5/12/2017
To: "Wooten, Eric S." <ewooten@columbuspolice.org>
Subject: RE: AvailabilityDoes Sunday work at all? Last night I stumbled upon an app.With it within the app there were thousands of credit card names numbers and information email addresses are reported as a Google but this is an app that people stalking and hacking me have downloaded onto my through my Google Play Store and pretty sure somebody cut the bolt in my front of my car and lost my tire and today I didn't have any oil in my car.
Chris5139549969On Tue, May 9, 2017 at 7:59 AM -0400, "Wooten, Eric S." <EWooten@columbuspolice.org> wrote:
Sunday may be possible. I’ll get back with you later this week.From: chris.rigling@icloud.com [mailto:chris.rigling@icloud.com]
Sent: Saturday, May 06, 2017 4:11 PM
To: Wooten, Donald
Cc: Wooten, Eric S.
Subject: AvailabilityJust want to check to see if you had any time this coming weekend days for me to stop by and talk to you for about a half hour? I called and left a message voicemail for you last week as well as an email thanks
Thursday, December 19, 2019
gangs of america streets of america POW MIA
**THIS
GROUP REPROGRAMMED & REFORMATTED KIRK WILHITE JR AFTER ZEROING OUT HIS
BRAIN.
PART OF THE
HOME GROWN TERRORIST CELL USING STOLEN MILITARY TECHNOLOGY LIKE SYNTHETIC
TELEPATHY, INVISIBILE DROWN (AIRCRAFT), VOTER FRAUD, ID THEFT, ATTEMPTED
MURDER, RAPE, KIDNAPPING, MIND CONTROL, BRAIN WASHING, SUBLIMIAL MESSAGING,
BRAIN MAPPING, TORTURE, CRIMES AGAINST HUMANITY, CRIMES AGAINST THE US
GOVERNMENT, ONE OF THE PEOPLE RESPONSIBLE FOR KIDNAPPING KIRK WILHITE JR.
WHISTLE BLOWER. ALSO ASTRIAL BODY SNATCHING, HUMAN PETS & HUMAN DRONES.
ALSO HACKING PENTAGON, AND ALL OTHER COMMUNICATIONS NETWORKS AND COMPANIES AND
MAN-IN-THE-MIDDLE ATTACKS. I HAVE PROOF AND THEY HAVE ADMITTED KILLING AND
TRAFFICKING INDIVIDUALS AS WELL.
OTHERS ARE
GARY
WELBAUM
PAUL
JENIGAR
MARK MALLET
ADAM
GARLOCK
JEFF
PRISCOTT
ANTHONY
BELLINO
ANDREW
LEVITT
MIKE NOBLE
BRETT
RICHARDS
ANDY DEVORE
ZACK FOUCH
MICHAEL
ROWLAN/SAMANTHA RAWLINGS
JAMES
ALDRIDGE
JASON
MCCARTNEY
MAXZ
TONY (ONE
KINGPINo
THEY HAVE
CONFUSED TO THE STUFF THEY HAVE DONE TO THE GOVERNMENT MILITARY AND CITIZENS,
JESSICA
DIAMOND
GRANT
CASSIDY
**THIS
GROUP REPROGRAMMED & REFORMATTED KIRK WILHITE JR AFTER ZEROING OUT HIS
BRAIN.
HOME GROWN
TERRORIST CELL USING STOLEN MILITARY TECHNOLOGY LIKE SYNTHETIC TELEPATHY,
INVISIBILE DROWN (AIRCRAFT), VOTER FRAUD, ID THEFT, ATTEMPTED MURDER, RAPE,
KIDNAPPING, MIND CONTROL, BRAIN WASHING, SUBLIMIAL MESSAGING, BRAIN MAPPING,
TORTURE, CRIMES AGAINST HUMANITY, CRIMES AGAINST THE US GOVERNMENT, ONE OF THE
PEOPLE RESPONSIBLE FOR KIDNAPPING KIRK WILHITE JR. WHISTLE BLOWER. ALSO ASTRIAL
BODY SNATCHING, HUMAN PETS & HUMAN DRONES. ALSO HACKING PENTAGON, AND ALL
OTHER COMMUNICATIONS NETWORKS AND COMPANIES AND MAN-IN-THE-MIDDLE ATTACKS. I
HAVE PROOF AND THEY HAVE ADMITTED KILLING AND TRAFFICKING INDIVIDUALS AS WELL.
THEY HAVE
ACCESS AND HAVE CHANGED MEDICAL RECORDS, POLICE REPORTS, SWAYED THE JUDGES
DISSISIONS, POSED AS FEDERAL AGENTS AND LAW ENFORCEMENT PERSONAL TO REMOVE
PEOPLE FROM THE PRISONS AND SELL THEM OR TO HAVE THEM AS PETS, DRONES, AND TO
END THEIR LIFE CYCLE.
THEY HAVE
BLACKMAILED AND FRAMED INDIVIDUALS, DARIN PERKINS AND CHAD MONTGOMERY, KIRK
WILHITE JR AND DYLAN GILREATH. THEY PURCHASED OLIVIA W(PRICEHILL) THEY HAVE
CORRUPTED AND MANIPULATED LOCL STATE AND FEDERAL AGENCIES DESTROYED 1,000'S OF
DOCUMENTS OF EVIDENCE, TAMPERED WITH VEHICHLES (JEFF RINEHART-COLUMBUS OHIO=
JEEP ON RAILROAD TRACK I BELIEVE) THEY HAVE FRAUDULENT TELECOMMUNICATIONS
COMP[ANTIES POSING AS FRONTS TO ALLOW THEM ACCESS TO THE TELCO AND UTILITY
LOGISTICS AND SKEMATICS, PUT ON A ORANGE VEST AND HARD HAT TO GAIN ACCESS TO
RESTRICTED SPACE. STOLEN MILITARY TECHNOLOGY (CLOAKING DRONE) AND SYMATIC
TELEPATHY AND USING THESE TO TORTURE INDIVIDUALS AS WELL AS STEAL DATA AND
INFORMATION ON PEOPLE. THEY BEGAN THE MIND READING-COMMUNICATION BOTH WAYS ON
ME IN 2010..... AND PUT ME INTO 7 MENTAL HEALTH REHAB FACILITIES AS WELL AS
DESTROYED JOBS, RELATIONSHIPS,HOMES, AND MY FAMILY. THEY ATTEMPTED TO CRASH
PLANE-CABO.
rfob perry
jr.4260 Chicken Coop Hill Rd SE, Sugar Grove, OH 43155
stolen
military tech "synthetic telepathy" they have told me they are
housing kidnapped kirk wilhite jr at the above location there are other
locations possible throughout the usa and elsewhere they have told me about.
this is a terrorist /cyber terrorist cell responsible for al lthe
man-in-the-middle attacks worldwide. they are torturing people, slavery, made
into pets, blackmailed, put in prison, kidnapped, brain washed, mind
controlled, brain mapped, taken over raped and taken advantage of. i have vhs sound
recordings, digital recordings, 8 years worth of documents. they kidnapped kirk
from prison because he had proof that this group can see out of peoples eyes
and that they are reading an drecording everything out of peoples heads. they
had someone id theft kirk, and pose as him, Stephen......., from gay columbus
ohio and go into a bank where wilhite had a safety deposit box and remove the
contents dvd ) as well as club flex cleveland, and somewhere else then they
zeroed him out

Official
Website of the Department of Homeland Security

·
OMB Control
Number: 1653-0049
Expiration Date: 12/31/2020
Expiration Date: 12/31/2020
U.S.
Immigration and Customs Enforcement (ICE) investigates more than 400 violations
of criminal law, ranging from child exploitation to transnational gangs. Use
this form to report suspected criminal activity.
Be as
specific and as detailed as possible. You are encouraged to provide any
additional identifying details such as places of birth, countries of
citizenship, and any numeric identifiers in the below narrative text box. The
detailed information you provide will assist investigators as they look into
reported violations.
We do not
provide status updates for tip information provided. If you provide
information, you can be assured that it will be promptly forwarded to the
responsible office for follow up action as deemed appropriate.
Do NOT
send the same information more than once, and do NOT file a duplicate
report by calling the HSI Tip Line.
Although
there is absolutely no guarantee that tip information provided will result in
monetary payments, ICE has the discretion and statutory authorization to pay
for information and/or evidence that is used in support of criminal
investigations.
Anonymous
tips may be reported on this form and may also be reported to ICE via the
toll-free HSI Tip Line, (866) 347-2423
TTY for hearing impaired only: || TTY para personas con discapacidad auditiva solamente: (802) 872-6196
TTY for hearing impaired only: || TTY para personas con discapacidad auditiva solamente: (802) 872-6196
If this is an emergency, call 911.
* =
Required Fields
I. Your information
First name:
Last name:
Email:
Phone
number:
Where are
you reporting from? *
Inside the
U.S.
Outside of
the U.S.
Street
Address
Street
Address:
(line 1):
(line 2):
City:
State:
Zip code:
II. Suspected Violation
Please
check the violation that best applies *
Benefit/Marriage
Fraud
Bulk Cash
Smuggling/Financial Crimes
Child
Exploitation/Pornography
Cyber
Crimes
Employment/Exploitation
of Unlawful Workers
F/M Student
Violations, Including OPT
Fugitive
Criminal Alien
Gang
Related
Human
Rights Violators
Human
Smuggling
Human
Trafficking (Forced Labor/Slavery)
Immigration
Telefraud
Intellectual
Property Rights
Narcotics
Smuggling
Terrorism
Related
Trade
Exportation Violation
Trade
Importation Violation
Weapons
Smuggling
Other
Location of Criminal Activity (if known)
Street
Address:
(line 1):
(line 2):
City:
State: *
Zip code:
III. Violator Information
The
complaint involves a *
Business/Company
Individual
Both
Information about the individual
Information
about the individual
First name:
*
Last name:
*
Choose One
Option: *
Date of
Birth
Approximate
Age
Approximate
age: *
Individual's
Street Address
Street
Address:
(line 1): *
(line 2):
City: *
State: *
Zip code:
Have you
previously submitted this information to any law enforcement or government
agency? *
Yes
No
Please
provide a summary of the criminal activity (limit 1,000 characters). *
3
characters remaining
stolen
military tech "synthetic telepathy" they have told me they are
housing kidnapped kirk wilhite jr at the above location there are other
locations possible throughout the usa and elsewhere they have told me about.
this is a terrorist /cyber terrorist cell responsible for al lthe
man-in-the-middle attacks worldwide. they are torturing people, slavery, made into
pets, blackmailed, put in prison, kidnapped, brain washed, mind controlled,
brain mapped, taken over raped and taken advantage of. i have vhs sound
recordings, digital recordings, 8 years worth of documents. they kidnapped kirk
from prison because he had proof that this group can see out of peoples eyes
and that they are reading an drecording everything out of peoples heads. they
had someone id theft kirk, and pose as him, Stephen......., from gay columbus
ohio and go into a bank where wilhite had a safety deposit box and remove the
contents dvd ) as well as club flex cleveland, and somewhere else then they
zeroed him out
Did you
have additional businesses/individuals to report on? *
Yes
No
PRIVACY
NOTICE
Authority: The collection of
information that you provide in this web form is authorized by the following: 6
U.S.C. § 202; 8 U.S.C. § 1103; 8 U.S.C. § 1357, 8 U.S.C. § 1360; Title 18,
United States Code; 19 U.S.C. § 1589a; 31 CFR Chapter X, 5 U.S.C. § 552a; 5 U.S.C.
§ 301; and 44 U.S.C. § 3101. Please also see the privacy policies for ICE's
public website, available at www.ice.gov/site-policies.
Purpose: ICE may use the
information you provide to initiate and/or support a law enforcement
investigation. ICE may use your personal information, if provided, to contact
you for additional details about your tip, or to arrange monetary payment, if
applicable.
Agency
Disclosure of Information: The information you provide may be shared internally within DHS for
any appropriate official purpose. The information you provide may also be
shared with federal, state, local, tribal, territorial, and foreign law
enforcement agencies in order to refer reports of suspicious activity, tips,
potential violations of law and other relevant information to those agencies
with appropriate jurisdiction, authorities, and need-to-know concerning the
matter(s) you report, or as otherwise required by law.
If you are
a United States Citizen, lawful permanent resident, or are an individual whose
records are covered by the Judicial Redress Act of 2015 (5 U.S.C. § 552a note),
your information may be disclosed in accordance with the Privacy Act of 1974, 5
U.S.C. § 552a(b), including pursuant to the routine uses published in the
DHS/ICE-016 FALCON Search and Analysis System of Records Notice (SORN), which
can be viewed at https://www.dhs.gov/system-records-notices-sorns.
Disclosure:
Providing
your name or other personal information on this web form is voluntary. If you
do not provide the requested information, ICE may not be able to take action on
your tip. Anonymous tips may be reported to ICE via the toll-free HSI Tip Line,
(866) 347-2423.
Public
Reporting Burden: U.S. Immigration and Customs Enforcement is collecting this
information as a part of its agency mission under the Department of Homeland
Security. The estimated average time to review the instructions, search
existing data sources, gather and maintain the data needed and completing and
reviewing this collection of information is 10 minutes (0.166 hours) per
response. An agency may not conduct or sponsor, and a person is not required to
respond to, an information collection unless it displays a currently valid OMB
Control Number. Send comments regarding this burden estimate or any other
aspect of this collection of information, including suggestions for reducing
this burden, to: Office of the Chief Information Officer, Forms Management
Office, 801 I Street NW, Washington, DC
20536-5800, ATTN: PRA Officer. Do not return the completed form to this
address.
WARNING
REGARDING KNOWINGLY PROVIDING FALSE INFORMATION
The
information I've provided on this form is correct to the best of my knowledge.
I understand that providing false information could subject me to fine,
imprisonment, or both. (Title 18, U.S.C. § 1001).
Last
Reviewed/Updated: 08/23/2018
May 21,2017/August 14, 2017
Governor Kasich & President
Trump & other Elected Officials
Something that I need to bring to
your attention, it's a crucial event that is happening worldwide. There are
groups of people that are playing a game here in The United States, so called
"crimes against humanity," they are taking control of people's mind
sort of cult like, manipulating minds, brainwashing,mind control,
hypnotized,(they also reformat the minds and as they like to say “take over
people's personalities,” and they are
also able to read everybody's minds due to what I’m guessing is transferring
our brain waves and thoughts via the electricity that we have running in our
bodies. On this note I’m not 100% sure, I’m not a scientist or a doctor.
I know they are doing this because
it started happening to me online I’m guessing about 2001, if not earlier but
this seems about the right time. 2001-02 received a threat or two online, but
don't recall anything more than that. 2008, Christmas Eve, during a sexual
engagement there was another incident of the mind control absence of
personality. Like someone took him out and placed someone else's mind set in
there for a time period.
There were odd events that happened
online as well as just day to day life 2006 till today. Well today, they are
out of control and it is a cult. They are reading my mind as I type this as
well as they have hacked into my computer and seeing it being broadcast onto
their screens wherever II
here is a traceroute from my home
to google.com
Tracing route to google.com
[172.217.6.110]
over a maximum of 30 hops:
1 <1 ms <1 ms <1
ms 192.168.0.1
2 9 ms 12 ms 8
ms 142.254.144.125
3 27 ms 31 ms 29
ms 69.23.13.65
4 12 ms 17 ms 15
ms be32.blasohdp01r.midwest.rr.com
[65.29.38.28]
5 22 ms 15 ms 14
ms be28.clmkohpe01r.midwest.rr.com
[65.29.1.44]
6 27 ms 31 ms 29
ms bu-ether15.chctilwc00w-bcr00.tbone.rr.com
[66.109.6.68]
7 39 ms 31 ms 30
ms
bu-ether11.chcgildt87w-bcr00.tbone.rr.com [66.109.6.20]
8 24 ms 27 ms 23
ms 0.ae4.pr1.chi10.tbone.rr.com
[66.109.1.66]
9 25 ms 22 ms 22
ms
ix-ae-27-0.tcore2.CT8-Chicago.as6453.net [64.86.79.97]
10 25
ms 24 ms 23 ms 72.14.219.82
11 22
ms 23 ms 23 ms 108.170.244.1
12 22
ms 23 ms 22 ms 108.170.238.89
13 22
ms 25 ms 23 ms
ord37s03-in-f14.1e100.net [172.217.6.110]
They are using tunnels, Hurricane
Electric, and loopback networks to bounce things around. I'm not a computer
technician so i'm not sure my lingo is accurate or not. the SSL certificates on
numerous sites are incorrect also. they have hacked into 1,000's of electronics
and "stamped" them backups and all with their version of the software
that no matter what give them access to the info contained there on. Cell
phones even when on Airplane mode are still receiving data in and out, i was
on a trip back from Cabo, and we left a
day later due to "hydraulic computer" issues.
They are also using the
"waves" (sound, light, air, wind, rain, electrical, magnetic, etc) to
broadcast their voices and actually communicate (yell and try to control me).
this has been 2009 that i was able to hear their voices it was no longer a
subliminal thing being done to me. They have said to have "built me up to
break me down." they don't built up but they have assisted in numerous
events to break me down, and blame it on a drug addiction or drug use mainly,
but have also since moving to Cincinnati blamed it on my family, trying to
convince me to give in and just let them come in and pretty much submit to
their cult/mafia/gang.
Columbus, Cincinnati, Cleveland,
Chicago, Pittsburgh, Miami, California, Dallas, Atlanta, Colorado, and Oklahoma
City are some of the main cities.
They have the ability to, whether
they know it or not, of causing forgive me for using movies and television as
reference points but Red Dawn, The Revolution, the net, and a couple others that
I can't think of right now. I feel that it's a huge deal, and i know that there
are people that are helping me and have helped me to understand what is going
on, the whole ordeal contains, recording through people's eyes, recording
thoughts as speech, seeing backwards through tele and monitors, telco and
infrastructure infiltration, electromagnetic fields being random around cities
where they are able to control cell signals, wifi, and other electronics as
well. My house they have manipulated the electrical system and wiring so badly
that at times it has smelled like it was melting or burning, fans on HVAC
running at higher and louder speeds than meant, personal fans as well.
I can hear their voices both with
my ears open as well as with earplugs in and that scares the hell out of me.
I've done 6 rehabs, dual diagnosis and single diagnosis, drug of choice crystal
meth. It's one thing that does block them out were I can't hear them and can
function and live my life as much as i can. The first doctor diagnosed me paranoid schizophrenic and prescribed
seroquel, this comatosed me and I didn't continue taking it. Illegal or not the
crystal meth does stop them from penetrating my head fully. Another one of
those things i can't explain, except dopamine receptors block their voices when
using.
Other websites that need checked
buckeye.com, xo.net, whitehouse.gov, lexisnexis, norton, symantec, 360,
360safe, facebook, twitter, and i have others but I'll get them to you if you
need/want them.
I believe there are some missing as
well, but not able to speak absolute on that topic at this time. I can only go
by at this time what i can find on the internet and from what they are
communicating and telling me. Hopefully they are just saying things to threaten
me, and not actual truths but I fear the worst in most cases. Lyle Cochran, Tim
Robinson, Kirk Wilhite, Tyler Duncan, would be some of the names.
I now have a new iphone 6se and
this weekend I turned off cell data and turned on wifi and my GPS still
maintained and operated correctly. Also this weekend, my GPS had me turn onto
one way streets the wrong direction x2, it was being manipulated constantly,
the volume on my cell phone when playing music through the aux port was
lowered. These terrorists keep telling me that they want me to kill myself or
admit myself to a mental asylum. And i Am NOT going to do that. Especially when
there is proof (ryan foltz-cannot locate death certificate, though now that i
wrote this i’m sure one will pop up). They keep creating “truth” out of nowhere
lying to people and covering up their own bullshit and illegal activities and
think they are going to get away with it. I’m not into sci fi at all. They have
hacked OrderUp Uber UberEats Amazon Facebook, Facebook Messenger, and most
other apps and companies for one reason….MERCHANT CREDIT CARD PAYMENTS….. Write
in the code of the merchant credit card processing an invisible code taking a
certain percentage of each sale and depositing it into their checking accounts.
This is written into code in a way so that it wouldn’t be missed and would not
show up on the monthly statements either. (i’m guessing)
I know it's off the wall and crazy
sounding, i have had problems for years with telling people, and when i do, no
one believes me. Please know that I am telling the truth, Governor Kasich, I
sent a copy of a letter that was sent to an attorney Curt Hartman OH, via
signature and certified mail that were both signed for by someone for you and
the lt. Governor. With the threats they are making and potential terrorist
attacks they could possibly make on any number of buildings, to The United
States of America’s infrastructure, utilities, homes, buildings, schools,
society as a whole, I felt this was a
dire need to get the information to you, just in case you were not aware
Sincerely,
Christopher S Rigling
2493 Knorr Ave
Cincinnati, OH 45214
513.485.5554
Governor Kasich and President Trump
I am currently being stalked and
pursued by a mob/gang of people here in Ohio Toledo,Columbus, and Cincinnati
area that are forcing people into their cult or they are causing them harm.
They have been doing this to me
since I guess about 2006 and have forced me to move from Columbus to
Cincinnati, as well as continuously harassing and stalking myself and my family.
They are using unconventional means
of this including mind control, read people's thoughts, essentially hypnotizing
them.
They have also told me about people
they blackmailed, lied too, corrupted, etc.
This group has links to ID theft,
ID creation, tampering with medical records, tampering with evidence, cyber
terrorism, telecommunications harassment, telco fraud, and have admitted to
other crimes throughout this ordeal. I did have recordings of these events but
they have been erased or deleted. I have hand written notes of these events and
occurrences.
I have contacted the local police,
sheriff, State Highway Patrol, 6 IC3 reports, and contacted the Cincinnati FBI
6 or 7 times and the Washington D.C. FBI 1 time where they hung up on me after
saying something about contacting the BIS.
I do know the names of certain
people that are in knowledge of these events, but will not say for certain
without talking one on one with you, exact names as they have already
threatened my life.
I am not sure what else to do or
how to exactly proceed from here as they are gang banging their way around the
world doing the same thing or using innocent individuals who do now know they
are adding these liars cheats and thieves with their data rape and other
endeavours.
It is a national security issue but
not one that can really be made public, in fear of the collapse of everything
from economic to commercial to family and home.
Sincerely,
Chris Rigling
513.485.5554
(SIMILAR LETTER WAS SENT TO
GOVERNOR’S AS WELL AS ATTORNERY/JUDGE CURT HARTMAN TOWARDS END OF 2016- ALSO
HAD INFO ON REAL ESTATE ISSUE- COPY ON SUBWAY DRIVE-THRU TERMINAL BP-SUBWAY
UNION CENTER)
BELOW IS THE TEXT THAT WAS USED
PRINTED OFF AND TAKEN TO THE LOCAL NEWS STATIONS AFTER NUMEROUS ATTEMPTS OF
EMAILING NEWS DESKS AND REPORTERS DIRECTLY. TODD DYKES, AND OTHERS WERE EMAILED
NUMEROUS TIMES DIRECTLY, EMAILS TO NEWS STATIONS AND MEDIA OUTLETS X75-100
EMAILS WITH NO RESPONSE EVER) I DID CALL ONE OF THE STATIONS AFTER EMAILING
THEM THE NIGHT/MORNING BEFORE AND THEY VERIFIED THAT THEY RECEIVED A EMAIL
REQUEST ASKING IF THEY RECEIVED THE FIRST INFORMATIONAL EMAIL. BUT THEY DID NOT
RECEIVE THE INFORMATIONAL EMAIL ABOUT THE EVENTS AND WHISTLEBLOWING.
Attached are copies of voicemails left for the governor as
well as the US District attorney’s office in Cincinnati as well as the US
witness victims line asking for help with a major issue.
The issue occurring is some group taking over the telecommunications networks and having access to them whenever and however they want/need. This includes internet and websites as well. I have sent 60x to the Whitehouse, 8x email and fax to the governor’s office, numerous other emails to .gov employees and had no response. Big issue is these individuals are broadcasting their voices out through static electricity on voice over static IP, and have been doing so for years. They seem to have also established a serval mesh similar to Australia’s, but using Bluetooth, peoples home cable and Wi-Fi, optic, networks, satellite dishes, home phone lines, and other electronics. Zyxel networks you can see across town showing up identical signals as another WIFI connection. These seem to usual becoming from the same location (they split the signal).
They seem to be able to access anywhere and anything electronic, i.e. insurance, medical, hvac, cable dvr, etc. cell phones home computers and other personal computing devices are being reconfigured once on their “network” providing them access whenever they want, without anyone really noticing. Even after factory resetting these devices have the “hacked” version. Configure.sys and .sys files.
This isn’t limited to Ohio, seems to be going anywhere the power lines can carry power. It’s essentially data over power(lines) or power cord. My home computers without Bluetooth or WIFI connections still have active connections, also with the reconfigured system files airplane mode is obsolete as you can still turn on cell data, WIFI, Bluetooth and connect.
Using the cell phones and the all-time network seems like they are storing information on the SIM card for network connectivity as I’ve had a couple SIM cards stolen. Only SIM cards. There is more cellular network information, but this is getting to be a lengthy email.
On their network it seems to be a loop back “network” where they have duplicated sites and the device being used checks their network first for the site, if site exists stays there (sites are very hard to tell apart but have invaded SSL’s . I am not a techie or anything close but there is something to do with certificates that are stored in the security section of cell phones and PCs. My cell phone and pc have 30+ certificates that all seem to be from a SSL testing site. I’m not sure what this does exactly I haven’t been able to get a straight answer if I give access and let it pass by as a normal website, or if this causes a red flag. Most sites I visited it hasn’t caused an issue but I have noticed a huge in discrepancies on the website like the templates being used have a different company name and logo on the top then the bottom footer. Normally this be a normal occurrence but this is a little weird.
This group of individuals having access to all the.gov as well as pretty much anything electronic anywhere have seen be able to create fake profiles fake IDs as well as fake payroll for businesses and government agencies. This group of individuals having access to all the.gov as well as pretty much anything electronic anywhere have said be able to create fake profiles fake IDs as well as fake payroll for businesses and government agencies. They have it down to an automated process it seems using banks like aspire Summit checking, online banking.
The individuals responsible for this our group of United States citizens seminar in Ohio, so Ohio Cincinnati Ohio. They also claiming to have dabbled in if not still participate in human trafficking gun smuggling murder kidnapping extortion and organized crime.
The issue occurring is some group taking over the telecommunications networks and having access to them whenever and however they want/need. This includes internet and websites as well. I have sent 60x to the Whitehouse, 8x email and fax to the governor’s office, numerous other emails to .gov employees and had no response. Big issue is these individuals are broadcasting their voices out through static electricity on voice over static IP, and have been doing so for years. They seem to have also established a serval mesh similar to Australia’s, but using Bluetooth, peoples home cable and Wi-Fi, optic, networks, satellite dishes, home phone lines, and other electronics. Zyxel networks you can see across town showing up identical signals as another WIFI connection. These seem to usual becoming from the same location (they split the signal).
They seem to be able to access anywhere and anything electronic, i.e. insurance, medical, hvac, cable dvr, etc. cell phones home computers and other personal computing devices are being reconfigured once on their “network” providing them access whenever they want, without anyone really noticing. Even after factory resetting these devices have the “hacked” version. Configure.sys and .sys files.
This isn’t limited to Ohio, seems to be going anywhere the power lines can carry power. It’s essentially data over power(lines) or power cord. My home computers without Bluetooth or WIFI connections still have active connections, also with the reconfigured system files airplane mode is obsolete as you can still turn on cell data, WIFI, Bluetooth and connect.
Using the cell phones and the all-time network seems like they are storing information on the SIM card for network connectivity as I’ve had a couple SIM cards stolen. Only SIM cards. There is more cellular network information, but this is getting to be a lengthy email.
On their network it seems to be a loop back “network” where they have duplicated sites and the device being used checks their network first for the site, if site exists stays there (sites are very hard to tell apart but have invaded SSL’s . I am not a techie or anything close but there is something to do with certificates that are stored in the security section of cell phones and PCs. My cell phone and pc have 30+ certificates that all seem to be from a SSL testing site. I’m not sure what this does exactly I haven’t been able to get a straight answer if I give access and let it pass by as a normal website, or if this causes a red flag. Most sites I visited it hasn’t caused an issue but I have noticed a huge in discrepancies on the website like the templates being used have a different company name and logo on the top then the bottom footer. Normally this be a normal occurrence but this is a little weird.
This group of individuals having access to all the.gov as well as pretty much anything electronic anywhere have seen be able to create fake profiles fake IDs as well as fake payroll for businesses and government agencies. This group of individuals having access to all the.gov as well as pretty much anything electronic anywhere have said be able to create fake profiles fake IDs as well as fake payroll for businesses and government agencies. They have it down to an automated process it seems using banks like aspire Summit checking, online banking.
The individuals responsible for this our group of United States citizens seminar in Ohio, so Ohio Cincinnati Ohio. They also claiming to have dabbled in if not still participate in human trafficking gun smuggling murder kidnapping extortion and organized crime.
COPY OF ONE SET OF ACTIVE INTERNET
CONNECTIONS
Active Internet connections (including servers)
Proto Recv-Q Send-Q
Local Address Foreign
Address (state)
tcp4 0 0
100.111.6.234.57418
17.249.73.246.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57417 ESTABLISHED
tcp4 0 0
localhost.57417
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57415
a23-213-212-52.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57414 ESTABLISHED
tcp4 0 0
localhost.57414
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57413
a23-213-212-52.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
100.111.6.234.57412
a23-213-212-52.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57411 ESTABLISHED
tcp4 0 0
localhost.57411
localhost.12443 ESTABLISHED
tcp4 0
0 localhost.12443 localhost.57410 ESTABLISHED
tcp4 0 0
localhost.57410
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57408 FIN_WAIT_2
tcp4 0 0
localhost.57408
localhost.12443 CLOSE_WAIT
tcp4 0 0
100.111.6.234.57406
a23-213-212-52.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57405 ESTABLISHED
tcp4 0
0 localhost.57405 localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57402
104.20.78.43.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57401 ESTABLISHED
tcp4 0 0
localhost.57401
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57400
c2.f0.a86c.ip4.static.sl-reverse.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57399 ESTABLISHED
tcp4 0 0
localhost.57399
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57398
c2.f0.a86c.ip4.static.sl-reverse.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57397 ESTABLISHED
tcp4 0 0
localhost.57397
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57394
a-0001.a-msedge.net.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57393 ESTABLISHED
tcp4 0 0
localhost.57393 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57386
ec2-54-225-178-149.compute-1.amazonaws.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57385 ESTABLISHED
tcp4 0 0
localhost.57385
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57384
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57383
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57382 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57381 ESTABLISHED
tcp4 0 0
localhost.57382
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.57381 localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57380
xx-fbcdn-shv-01-lax3.fbcdn.net.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57379 ESTABLISHED
tcp4 0 0
localhost.57379 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57378
xx-fbcdn-shv-01-lax3.fbcdn.net.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57377 ESTABLISHED
tcp4 0 0
localhost.57377 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57376
a23-60-228-54.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57375 ESTABLISHED
tcp4 0 0
localhost.57375
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57374
a23-213-132-117.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57373 ESTABLISHED
tcp4 0 0
localhost.57373
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57372
104.20.19.28.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57371 ESTABLISHED
tcp4 0 0
localhost.57371 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57370
c2.f0.a86c.ip4.static.sl-reverse.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57369 ESTABLISHED
tcp4 0 0
localhost.57369
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57366
ord30s25-in-f194.1e100.net.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57365 ESTABLISHED
tcp4 0 0
localhost.57365 localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57348 FIN_WAIT_2
tcp4 31 0
localhost.57348
localhost.12443 CLOSE_WAIT
tcp4 0 0
100.111.6.234.57347
208.81.233.64.https ESTABLISHED
tcp4 0 0
100.111.6.234.57346
216.244.123.25.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57344 ESTABLISHED
tcp4 0 0
localhost.57344
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57343 ESTABLISHED
tcp4 0 0
localhost.57343
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57318
a184-51-126-105.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57317 FIN_WAIT_2
tcp4 0 0
localhost.12080
localhost.57316 ESTABLISHED
tcp4 414 0
localhost.57317
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.57316
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57311
199.16.156.52.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57310 ESTABLISHED
tcp4 0
0 localhost.57310 localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57304 FIN_WAIT_2
tcp4 31 0
localhost.57304
localhost.12443 CLOSE_WAIT
tcp4 0 0
100.111.6.234.57301
192.229.163.25.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57299 ESTABLISHED
tcp4 0 0
localhost.57299
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12080 localhost.57298 FIN_WAIT_2
tcp4 0 0
localhost.57298
localhost.12080 CLOSE_WAIT
tcp4 0 0
100.111.6.234.57297
a23-61-58-28.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57296 ESTABLISHED
tcp4 0 0
localhost.57296
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57295
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57294
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57293 ESTABLISHED
tcp4 0 0
localhost.57293
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443 localhost.57292 ESTABLISHED
tcp4 0 0
localhost.57292
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57289
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
localhost.12443 localhost.57288 ESTABLISHED
tcp4 0 0
localhost.57288
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57282
ec2-52-3-45-52.compute-1.amazonaws.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57281 ESTABLISHED
tcp4 0 0
localhost.57281
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57278
a23-0-160-74.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57277 ESTABLISHED
tcp4 0 0
localhost.57277
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57276
198.41.215.68.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57275 ESTABLISHED
tcp4 0 0
localhost.57275
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57274
198.41.215.68.https ESTABLISHED
tcp4 0 0
100.111.6.234.57273 198.41.215.68.https ESTABLISHED
tcp4 0 0
100.111.6.234.57272
198.41.215.68.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57271 ESTABLISHED
tcp4 0 0
localhost.57271
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57270 ESTABLISHED
tcp4 0 0
localhost.57270
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57269 ESTABLISHED
tcp4 0 0
localhost.57269
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57265
173.205.10.40.http ESTABLISHED
tcp4 0 0
100.111.6.234.57266
173.205.10.40.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57264 ESTABLISHED
tcp4 0 0
localhost.57264
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57263 ESTABLISHED
tcp4 0 0
localhost.57263 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57262
ec2-54-173-180-181.compute-1.amazonaws.com.http ESTABLISHED
tcp4 0 0
100.111.6.234.57260
ec2-52-8-186-159.us-west-1.compute.amazonaws.com.http ESTABLISHED
tcp4 0 0
100.111.6.234.57259
ec2-54-209-104-176.compute-1.amazonaws.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57258 ESTABLISHED
tcp4 0 0
localhost.57258
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57256 ESTABLISHED
tcp4 0 0
localhost.57256
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57255 ESTABLISHED
tcp4 0
0 localhost.57255 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57246
a23-61-65-197.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57245 ESTABLISHED
tcp4 0 0
localhost.57245
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57242
104.20.77.43.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57241 ESTABLISHED
tcp4 0
0 localhost.57241 localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57240
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57239
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57238
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57237
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57236 ESTABLISHED
tcp4 0 0
localhost.57236
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57235 ESTABLISHED
tcp4 0 0
localhost.57235
localhost.12443 ESTABLISHED
tcp4 0
0 localhost.12443 localhost.57234 ESTABLISHED
tcp4 0 0
localhost.57234
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57233 ESTABLISHED
tcp4 0 0
localhost.57233
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57232
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57231 ESTABLISHED
tcp4 0 0
localhost.57231
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57230
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57229 ESTABLISHED
tcp4 0 0
localhost.57229
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57217
ec2-52-9-31-153.us-west-1.compute.amazonaws.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57216 ESTABLISHED
tcp4 0 0
localhost.57216
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57215
192.229.163.25.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57214 ESTABLISHED
tcp4 0 0
localhost.57214
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57211
192.0.76.3.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57210 ESTABLISHED
tcp4 0 0
localhost.57210 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57209
a23-61-70-242.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57208 ESTABLISHED
tcp4 0 0
localhost.57208
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57205
69.172.216.111.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57204 ESTABLISHED
tcp4 0 0
localhost.57204 localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57203
69.172.216.111.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57202 ESTABLISHED
tcp4 0 0
localhost.57202
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57193
198.41.214.186.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57192 ESTABLISHED
tcp4 0 0
localhost.57192
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57191
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57190
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57189
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57188
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57187
xx-fbcdn-shv-01-lax3.fbcdn.net.https
ESTABLISHED
tcp4 0 0
100.111.6.234.57186 xx-fbcdn-shv-01-lax3.fbcdn.net.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57185 ESTABLISHED
tcp4 0 0
localhost.57185
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443 localhost.57184 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57183 ESTABLISHED
tcp4 0 0
localhost.57184
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57182 ESTABLISHED
tcp4 0 0
localhost.57183
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57181 ESTABLISHED
tcp4 0 0
localhost.57182
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.57181
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57180 ESTABLISHED
tcp4 0 0
localhost.57180
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57179
edge-atlas-shv-01-lax3.facebook.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57178 ESTABLISHED
tcp4 0 0
localhost.57178
localhost.12443 ESTABLISHED
tcp4 0 0 100.111.6.234.57177 mail.discoverbing.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57176 ESTABLISHED
tcp4 0 0
localhost.57176
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57174 FIN_WAIT_2
tcp4 0 0
localhost.57174
localhost.12080 CLOSE_WAIT
tcp4 0 0
100.111.6.234.57172
a184-51-126-91.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57170 ESTABLISHED
tcp4 0 0
localhost.57170
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57166
173.205.10.50.http ESTABLISHED
tcp4 0 0
localhost.12080 localhost.57165 ESTABLISHED
tcp4 0 0
localhost.57165
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57164
sta-204-144-140-28.rockynet.com.http
ESTABLISHED
tcp4 0 0
localhost.12080 localhost.57163 ESTABLISHED
tcp4 0 0
localhost.57163
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57160
a23-61-2-136.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57159 ESTABLISHED
tcp4 0 0
localhost.57159
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57158 ec2-54-84-241-73.compute-1.amazonaws.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57156 ESTABLISHED
tcp4 0 0
localhost.57156
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57154
a23-61-75-27.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57153 ESTABLISHED
tcp4 0 0
localhost.57153
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57152
sc.iasds01.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57151 ESTABLISHED
tcp4 0 0
localhost.57151
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57150 ec2-54-69-131-51.us-west-2.compute.amazonaws.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57149 ESTABLISHED
tcp4 0 0
localhost.57149
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57146
ec2-54-236-167-56.compute-1.amazonaws.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57145 ESTABLISHED
tcp4 0 0
localhost.57145
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57140
176.32.103.190.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57139 ESTABLISHED
tcp4 0 0
localhost.57139
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57138 104.16.24.216.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57137 ESTABLISHED
tcp4 0 0
localhost.57137
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57136
104.16.24.216.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57135 ESTABLISHED
tcp4 0 0
localhost.57135
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57132
ad-dc6.mediaplex.com.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57130 ESTABLISHED
tcp4 0 0
localhost.57130
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57126
sta-204-144-141-22.rockynet.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57125 ESTABLISHED
tcp4 0 0
localhost.57125
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57124
104.16.27.235.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57123 ESTABLISHED
tcp4 0 0
localhost.57123
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57122
ec2-52-5-123-170.compute-1.amazonaws.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57121 ESTABLISHED
tcp4 0 0
localhost.57121
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57120
8.43.72.71.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57119 ESTABLISHED
tcp4 0 0
localhost.57119
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57117
server-52-84-25-162.sea32.r.cloudfront.net.http ESTABLISHED
tcp4 0 0
100.111.6.234.57116
server-52-84-25-162.sea32.r.cloudfront.net.http ESTABLISHED
tcp4 0 0
100.111.6.234.57115
server-52-84-25-162.sea32.r.cloudfront.net.http ESTABLISHED
tcp4 0 0
100.111.6.234.57114
server-52-84-25-162.sea32.r.cloudfront.net.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57113 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57112 ESTABLISHED
tcp4 0 0
localhost.57113
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57111 ESTABLISHED
tcp4 0 0
localhost.57112
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57110 ESTABLISHED
tcp4 0 0
localhost.57111
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.57110
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57109
edge-star-mini-shv-03-atn2.facebook.com.https ESTABLISHED
tcp4 0 0
100.111.6.234.57108
edge-star-mini-shv-03-atn2.facebook.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57107 ESTABLISHED
tcp4 0 0
localhost.57107
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57106 ESTABLISHED
tcp4 0 0
localhost.57106
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57104 FIN_WAIT_2
tcp4 0 0
localhost.57104
localhost.12080 CLOSE_WAIT
tcp4 0 0
100.111.6.234.57059
edge-atlas-shv-03-atn2.facebook.com.https ESTABLISHED
tcp4 0 0
100.111.6.234.57058
69.172.216.56.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57057 ESTABLISHED
tcp4 0 0
localhost.57057
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443 localhost.57056 ESTABLISHED
tcp4 0 0
localhost.57056
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57046
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57044 ESTABLISHED
tcp4 0 0
localhost.57044
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57043
69.172.216.56.https ESTABLISHED
tcp4 0 0
100.111.6.234.57042
69.172.216.56.https ESTABLISHED
tcp4 0 0
100.111.6.234.57041
a184-51-126-91.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57040 ESTABLISHED
tcp4 0 0
localhost.57040
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57039 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.57038 ESTABLISHED
tcp4 0 0
localhost.57039
localhost.12443 ESTABLISHED
tcp4 0
0 localhost.57038 localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.57037
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57036 ESTABLISHED
tcp4 0 0
localhost.57036
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57035
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57034 ESTABLISHED
tcp4 0 0
localhost.57034 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57033
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57032 ESTABLISHED
tcp4 0 0
localhost.57032
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57031
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57030 ESTABLISHED
tcp4 0 0
localhost.57030
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57029
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57028 ESTABLISHED
tcp4 0 0
localhost.57028
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57024
176.32.103.183.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57022 ESTABLISHED
tcp4 0 0
localhost.57022
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.57005
a23-61-75-27.deploy.static.akamaitechnologies.com.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.57004 ESTABLISHED
tcp4 0 0
localhost.57004
localhost.12080 ESTABLISHED
tcp4 0
0 100.111.6.234.56997 69.172.216.111.https ESTABLISHED
tcp4 0 0
100.111.6.234.56996
69.172.216.111.https ESTABLISHED
tcp4 0 0
100.111.6.234.56995
69.172.216.111.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56994 ESTABLISHED
tcp4 0 0
localhost.56994
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56993 ESTABLISHED
tcp4 0 0
localhost.56993 localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56992 ESTABLISHED
tcp4 0 0
localhost.56992
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.56977
server-52-84-25-134.sea32.r.cloudfront.net.http ESTABLISHED
tcp4 0 0
100.111.6.234.56976
192.0.76.2.https ESTABLISHED
Traceroute has started…
traceroute to 192.0.76.2 (192.0.76.2), 64 hops max, 72 byte
packets
1 chi81-028.ff.avast.com (174.34.185.242) 25.505 ms
26.954 ms 28.773 ms
2 v117.er01.chi.ubiquity.io
(64.120.26.209) 33.214 ms 37.072 ms
25.684 ms
3 23.111.249.1.rdns.as15003.net
(23.111.249.1) 26.750 ms 29.913 ms
25.879 ms
4 te0-19-0-17.ccr41.ord03.atlas.cogentco.com
(38.122.180.153) 27.418 ms 27.311 ms
27.782 ms
5 telia.ord03.atlas.cogentco.com
(154.54.12.34) 29.226 ms 28.606 ms
39.561 ms
6 automattic-ic-310140-chi-b21.c.telia.net
(213.248.88.162) 30.124 ms 28.741 ms
28.602 ms
7 192.0.76.2 (192.0.76.2) 37.298 ms
81.599 ms 26.826 ms
tcp4 0 0
100.111.6.234.56975
edge-star-mini-shv-03-atn2.facebook.com.https ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56974 ESTABLISHED
tcp4 0 0
localhost.56974
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56972
176.32.98.118.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56971 ESTABLISHED
tcp4 0 0
localhost.56971
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56970 ESTABLISHED
tcp4 0 0
localhost.56970
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56968 ESTABLISHED
tcp4 0 0
localhost.56968
localhost.12443 ESTABLISHED
tcp4 0 0
100.111.6.234.56967
hosted-by.leaseweb.com.http
ESTABLISHED
tcp4 0 0
localhost.12080 localhost.56966 ESTABLISHED
tcp4 0 0
localhost.56966
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56965
hosted-by.leaseweb.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56964 ESTABLISHED
tcp4 0 0
localhost.56964
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56963
a.tribalfusion.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56962 ESTABLISHED
tcp4 0 0
localhost.56962
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56961
192.0.76.2.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56960 ESTABLISHED
tcp4 0 0
localhost.56960
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56957
hosted-by.leaseweb.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56956 ESTABLISHED
tcp4 0 0
localhost.56956
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56955
hosted-by.leaseweb.com.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56954 ESTABLISHED
tcp4 0 0
localhost.56954
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56953
par03s15-in-f100.1e100.net.http
ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56952 ESTABLISHED
tcp4 0 0
localhost.56952
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56951
204.11.109.77.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56950 ESTABLISHED
tcp4 0 0
localhost.56950 localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56949
hosted-by.leaseweb.com.http
ESTABLISHED
tcp4 0 0
100.111.6.234.56948
hosted-by.leaseweb.com.http
ESTABLISHED
tcp4 0 0
localhost.12080 localhost.56947 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56946 ESTABLISHED
tcp4 0 0
localhost.56947
localhost.12080 ESTABLISHED
tcp4 0 0
localhost.56946
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56945
173.205.10.40.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56944 ESTABLISHED
tcp4 0 0
localhost.56944
localhost.12080 ESTABLISHED
tcp4 0
0 100.111.6.234.56942 104.166.76.19.http ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56939 ESTABLISHED
tcp4 0 0
localhost.56939
localhost.12080 ESTABLISHED
tcp4 0 0
100.111.6.234.56937
r-69-44-234-77.ff.avast.com.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56936 ESTABLISHED
tcp4 0 0
localhost.56936
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56881 FIN_WAIT_2
tcp4 0 0
localhost.56881
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56870 FIN_WAIT_2
tcp4 0 0
localhost.56870
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56868 FIN_WAIT_2
tcp4 0 0
localhost.56868
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080 localhost.56866 FIN_WAIT_2
tcp4 0 0
localhost.56866
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56864 FIN_WAIT_2
tcp4 0 0
localhost.56864
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56862 FIN_WAIT_2
tcp4 0 0
localhost.56862
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56860 FIN_WAIT_2
tcp4 0
0 localhost.56860 localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56848 FIN_WAIT_2
tcp4 0 0
localhost.56848
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56846 FIN_WAIT_2
tcp4 0 0
localhost.56846
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56844 FIN_WAIT_2
tcp4 0 0
localhost.56844 localhost.12443 CLOSE_WAIT
tcp4 0 0
100.111.6.234.56843
a23-201-26-5.deploy.static.akamaitechnologies.com.https ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56842 ESTABLISHED
tcp4 0 0
localhost.56842
localhost.12443 ESTABLISHED
tcp4 0 0
localhost.12080
localhost.56840 FIN_WAIT_2
tcp4 0 0
localhost.56840
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080 localhost.56838 FIN_WAIT_2
tcp4 0 0
localhost.56838
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56836 FIN_WAIT_2
tcp4 0 0
localhost.56836
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56834 FIN_WAIT_2
tcp4 0 0
localhost.56834
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56832 FIN_WAIT_2
tcp4 0 0
localhost.56832
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56828 FIN_WAIT_2
tcp4 0 0
localhost.12080
localhost.56827 FIN_WAIT_2
tcp4 0 0
localhost.56828
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56826 FIN_WAIT_2
tcp4 0 0
localhost.56827
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.56826 localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56824 FIN_WAIT_2
tcp4 0 0
localhost.56824
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12080
localhost.56822 FIN_WAIT_2
tcp4 0 0
localhost.56822
localhost.12080 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56809 FIN_WAIT_2
tcp4 0 0
localhost.12443
localhost.56808 FIN_WAIT_2
tcp4 0 0
localhost.56809
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56807 FIN_WAIT_2
tcp4 0 0
localhost.56808
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.56807
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56806 FIN_WAIT_2
tcp4 0 0
localhost.56806
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56803 FIN_WAIT_2
tcp4 0 0
localhost.56803
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56802 FIN_WAIT_2
tcp4 0 0
localhost.56802 localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56797 FIN_WAIT_2
tcp4 0 0
localhost.56797
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56796 FIN_WAIT_2
tcp4 0 0
localhost.56796
localhost.12443 CLOSE_WAIT
tcp4 0 0
100.111.6.234.56748
par03s15-in-f100.1e100.net.https
ESTABLISHED
tcp6 0 0
localhost.12993 *.* LISTEN
tcp4 0 0
localhost.12993 *.* LISTEN
tcp6 0 0
localhost.12995 *.* LISTEN
tcp4 0 0
localhost.12995 *.* LISTEN
tcp6 0 0
localhost.12143 *.* LISTEN
tcp4 0 0
localhost.12143 *.* LISTEN
tcp6 0 0
localhost.12110 *.* LISTEN
tcp4 0 0
localhost.12110 *.* LISTEN
tcp6 0 0
localhost.12443 *.* LISTEN
tcp4 0 0
localhost.12443 *.* LISTEN
tcp6 0 0
localhost.12080 *.* LISTEN
tcp4 0 0
localhost.12080 *.* LISTEN
tcp4 0 0
100.111.6.234.56745
sea16.ff.avast.com.http
ESTABLISHED
tcp4 0 0
100.111.6.234.56737
ord36s01-in-f1.1e100.net.https
ESTABLISHED
tcp4 0 0
localhost.12443
localhost.56730 FIN_WAIT_2
tcp4 0 0
localhost.56730
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56728 FIN_WAIT_2
tcp4 0 0
localhost.56728
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.56684 FIN_WAIT_2
tcp4 0 0
localhost.56684
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.55808 FIN_WAIT_2
tcp4 0 0
localhost.55808
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.55807 FIN_WAIT_2
tcp4 0 0
localhost.55807 localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.55766 FIN_WAIT_2
tcp4 0 0
localhost.55766
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.55726 FIN_WAIT_2
tcp4 0 0
localhost.55726
localhost.12443 CLOSE_WAIT
tcp4 0 0
localhost.12443
localhost.55708 FIN_WAIT_2
tcp4 0 0
localhost.55708
localhost.12443 CLOSE_WAIT
tcp4 0 0
100.111.6.234.55667
io-in-f188.1e100.net.5228
ESTABLISHED
tcp4 0 0
100.111.6.234.55154
17.172.238.201.5223 ESTABLISHED
tcp4 0 0
100.111.6.234.55153
17.143.163.23.5223 ESTABLISHED
tcp4 0 0
192.168.0.6.54520
ord08s11-in-f10.1e100.net.https
CLOSE_WAIT
tcp4 0 0
192.168.0.6.54445
ord08s11-in-f10.1e100.net.https
CLOSE_WAIT
tcp4 0 0
192.168.0.6.53484
ord36s02-in-f13.1e100.net.https
CLOSE_WAIT
tcp4 0 0
192.168.0.6.53483
ord31s21-in-f10.1e100.net.https
CLOSE_WAIT
tcp4 0 0
192.168.0.6.50675
ord30s22-in-f13.1e100.net.https
CLOSE_WAIT
tcp6 0 0
*.daap *.* LISTEN
tcp4 0 0
*.daap *.* LISTEN
tcp4 0 0
*.50615 *.* LISTEN
tcp4 0 0
192.168.0.6.49955
ji-in-f125.1e100.net.jabber-client
ESTABLISHED
tcp4 0
0 192.168.0.6.49953 ji-in-f125.1e100.net.jabber-client ESTABLISHED
tcp4 0 0
192.168.0.6.49350
ord08s13-in-f10.1e100.net.https
CLOSE_WAIT
tcp4 0 0
192.168.0.6.49349
ord08s13-in-f10.1e100.net.https
CLOSE_WAIT
tcp4 0 0
*.49295 *.* LISTEN
tcp4 0 0
*.49170 *.* LISTEN
tcp4 0 0
*.49167 *.* LISTEN
tcp4 0 0
*.49161 *.* LISTEN
tcp4 0 0
*.ipp *.* LISTEN
tcp6 0 0
*.ipp *.* LISTEN
udp4 0 0
100.111.6.234.60797
ord30s25-in-f195.1e100.net.https
udp46 0 0
*.54434 *.*
udp4 0 0
*.54433 *.*
udp4 0 0
100.111.6.234.64859 ord30s26-in-f6.1e100.net.https
udp4 0 0
100.111.6.234.ntp *.*
udp4 0 0
100.111.6.234.63650
ord30s25-in-f14.1e100.net.https
udp4 0 0
*.56430 *.*
udp6 0 0
*.59891 *.*
udp4 0 0
*.59891 *.*
udp6 0 0
*.53834 *.*
udp4 0 0
*.53834 *.*
udp6 0 0
*.63795 *.*
udp4 0 0
*.63795 *.*
udp6 0 0
*.57723 *.*
udp4 0 0
*.57723 *.*
udp6 0 0
*.54757 *.*
udp4 0 0
*.54757 *.*
udp4 0 0
100.111.6.234.ipsec-msft *.*
udp4 0 0
100.111.6.234.isakmp *.*
udp4 0 0
192.168.0.6.ntp *.*
udp6 0 0
localhost.ipsec-ms *.*
udp6 0 0
localhost.isakmp *.*
udp4 0 0
localhost.ipsec-msft *.*
udp4 0 0
localhost.isakmp *.*
udp6 0 0
fe80::1%lo0.ipsec-ms *.*
udp6 0 0
fe80::1%lo0.isakmp *.*
udp6 0 0
christopher-rigl.ipsec *.*
udp6 0 0
christopher-rigl.isakm *.*
udp4 0 0
192.168.0.6.ipsec-msft *.*
udp4 0 0
192.168.0.6.isakmp *.*
udp6 0 0
*.57208 *.*
udp4 0 0
*.57208 *.*
udp46 0 0
*.* *.*
udp6 0 0
christopher-rigl.ntp *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.50747 *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp6 0 0
fe80::1%lo0.ntp *.*
udp4 0 0
localhost.ntp *.*
udp6 0 0
localhost.ntp *.*
udp6 0 0
*.ntp *.*
udp4 0 0
*.ntp *.*
udp46 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp46 0 0
*.* *.*
udp4 0 0
*.* *.*
udp6 0 0
*.mdns *.*
udp4 0 0
*.mdns *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.* *.*
udp4 0 0
*.netbios-ns *.*
udp4 0 0
*.netbios-dgm *.*
icm4 0 0
*.* *.*
Active Multipath Internet connections
Proto/ID Flags Local Address Foreign Address (state)
icm6 0 0
*.* *.*
Active LOCAL (UNIX) domain sockets
Address
Type Recv-Q Send-Q Inode Conn Refs Nextref Addr
af666598d3ec09bd stream
0 0 0 af666598d017675d 0 0 /var/run/mDNSResponder
af666598d017675d stream
0 0 0 af666598d3ec09bd 0 0
af666598d450b3dd stream
0 0 0 af666598d450acd5 0 0 /private/var/run/cupsd
af666598d450acd5 stream
0 0 0 af666598d450b3dd 0 0
af666598d3ec037d stream
0 0 0 af666598d16ff9b5 0 0
af666598d16ff9b5 stream
0 0 0 af666598d3ec037d 0 0
af666598d0177315 stream
0 0 0 af666598d450b0bd 0 0
af666598d450b0bd stream
0 0 0 af666598d0177315 0 0
af666598d3ebeff5 stream
0 0 0 af666598ce53d055 0 0
af666598ce53d055 stream
0 0 0 af666598d3ebeff5 0 0
af666598d20c1c6d stream
0 0 0 af666598d1700ecd 0 0
af666598d1700ecd stream
0 0 0 af666598d20c1c6d 0 0
af666598d16fec6d stream
0 0 0 af666598ce53cdfd 0 0
af666598ce53cdfd stream
0 0 0 af666598d16fec6d 0 0
af666598d017788d stream
0 0 0 af666598d450aff5 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d450aff5 stream
0 0 0 af666598d017788d 0 0
af666598d1700635 stream
0 0 0 af666598d170150d 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d170150d stream
0 0 0 af666598d1700635 0 0
af666598d4d72e65 stream
0 0 0 af666598d170105d 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d170105d stream
0 0 0 af666598d4d72e65 0 0
af666598d450af2d stream
0 0 0 af666598d0178125 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d0178125 stream
0 0 0 af666598d450af2d 0 0
af666598d3ebec0d stream
0 0 0 af666598d4d72f2d 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d4d72f2d stream
0 0 0 af666598d3ebec0d 0 0
af666598d20c405d stream
0 0 0 af666598d20c243d 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d20c243d stream
0 0 0 af666598d20c405d 0 0
af666598d4d73185 stream
0 0 0 af666598d01777c5 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d01777c5 stream
0 0 0 af666598d4d73185 0 0
af666598d0176055 stream
0 0 0 af666598d1700955 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d1700955 stream
0 0 0 af666598d0176055 0 0
af666598d0176375 stream
0 0 0 af666598d4d7388d 0 0 /Library/Application
Support/Avast/run/api.sock
af666598d4d7388d stream
0 0 0 af666598d0176375 0 0
af666598d01765cd stream
0 0 0 af666598d0176695 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d0176695 stream
0 0 0 af666598d01765cd 0 0
af666598d0176c0d stream
0 0 0 af666598d01762ad 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d01762ad stream
0 0 0 af666598d0176c0d 0 0
af666598d3ec0445 stream
0 0 0 af666598d450ab45 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d450ab45 stream
0 0 0 af666598d3ec0445 0 0
af666598d450ae65 stream
0 0 0 af666598d1700d3d 0 0 /Library/Application
Support/Avast/run/service.sock
af666598d1700d3d stream
0 0 0 af666598d450ae65 0 0
af666598ce53d11d stream
0 0 0 af666598d20c2055 0 0 /var/run/mDNSResponder
af666598d20c2055 stream
0 0 0 af666598ce53d11d 0 0
af666598cb8bcf95 stream
0 0 0 af666598d0177185 0 0 /Library/Application
Support/Avast/run/service.sock
af666598d0177185 stream
0 0 0 af666598cb8bcf95 0 0
af666598d3ec082d stream
0 0 af666598d1b14add 0 0 0 /Library/Application
Support/Avast/run/service.sock
af666598d170056d stream
0 0 af666598d1b1561d 0 0 0 /Library/Application
Support/Avast/run/api.sock
af666598d20c3ae5 stream
0 0 af666598d1b3216d 0 0 0 /Library/Application
Support/Avast/run/scan.sock
af666598d4d73315 stream
0 0 0 af666598d4d730bd 0 0 /var/run/mDNSResponder
af666598d4d730bd stream
0 0 0 af666598d4d73315 0 0
af666598d0176a7d stream
0 0 0 af666598d0177c75 0 0 /var/run/mDNSResponder
af666598d0177c75 stream
0 0 0 af666598d0176a7d 0 0
af666598d4d72cd5 stream
0 0 0 af666598d4d72c0d 0 0 /Library/Application
Support/AvastSecureLine/run/elevation/501/privileged.sock
af666598d4d72c0d stream
0 0 0 af666598d4d72cd5 0 0
af666598d450b56d stream
0 0 0 af666598ce53cd35 0 0
af666598ce53cd35 stream
0 0 0 af666598d450b56d 0 0
af666598d01761e5 stream
0 0 0 af666598ce53f69d 0 0
af666598ce53f69d stream
0 0 0 af666598d01761e5 0 0
af666598d1700f95 stream
0 0 0 af666598d17012b5 0 0 /var/run/mDNSResponder
af666598d17012b5 stream
0 0 0 af666598d1700f95 0 0
af666598d17011ed stream
0 0 0 af666598d16fed35 0 0
af666598d16fed35 stream
0 0 0 af666598d17011ed 0 0
af666598d1700c75 stream
0 0 0 af666598d16ff11d 0 0 /var/run/mDNSResponder
af666598d16ff11d stream
0 0 0 af666598d1700c75 0 0
af666598ce53cec5 stream
0 0 0 af666598d16feba5 0 0
af666598d16feba5 stream
0 0 0 af666598ce53cec5 0 0
af666598d1701125 stream
0 0 0 af666598d16ff055 0 0
af666598d16ff055 stream
0 0 0 af666598d1701125 0 0
af666598d3ec05d5 stream
0 0 0 af666598d4d7324d 0 0
af666598d4d7324d stream
0 0 0 af666598d3ec05d5 0 0
af666598d170137d stream
0 0 0 af666598d017850d 0 0
af666598d017850d stream
0 0 0 af666598d170137d 0 0
af666598d0175dfd stream
0 0 0 af666598d16feec5 0 0
af666598d16feec5 stream
0 0 0 af666598d0175dfd 0 0
af666598d450b315 stream
0 0 0 af666598d450b24d 0 0
af666598d450b24d stream
0 0 0 af666598d450b315 0 0
af666598d450ad9d stream
0 0 0 af666598d450b185 0 0
af666598d450b185 stream
0 0 0 af666598d450ad9d 0 0
af666598d4d733dd stream
0 0 0 af666598d450ac0d 0 0
af666598d450ac0d stream
0 0 0 af666598d4d733dd 0 0
af666598ce53d2ad stream
0 0 0 af666598d20c482d 0 0
af666598d20c482d stream
0 0 0 af666598ce53d2ad 0 0
af666598d01788f5 stream
0 0 0 af666598d3ebfd3d 0 0
af666598d3ebfd3d stream
0 0 0 af666598d01788f5 0 0
af666598d3ec0125 stream
0 0 0 af666598d20c2e65 0 0
af666598d20c2e65 stream
0 0 0 af666598d3ec0125 0 0
af666598d3ebef2d stream
0 0 0 af666598d01789bd 0 0
af666598d01789bd stream
0 0 0 af666598d3ebef2d 0 0
af666598d20c21e5 stream
0 0 af666598d0032f8d 0 0 0
/var/folders/xt/wrzl0wss3wxfx828ngqlhb_m0000gn/T/chrome-9YDnsp/Socket
af666598d3ebeb45 stream
0 0 af666598ccb4870d 0 0 0
/var/folders/xt/wrzl0wss3wxfx828ngqlhb_m0000gn/T/.com.google.Chrome.hY89l9/SingletonSocket
af666598d20c3a1d stream
0 0 0 af666598d20c275d 0 0
af666598d20c275d stream
0 0 0 af666598d20c3a1d 0 0
af666598d16ff375 stream
0 0 0 af666598d16ff1e5 0 0
af666598d16ff1e5 stream
0 0 0 af666598d16ff375 0 0
af666598d0176f2d stream
0 0 0 af666598d4d72b45 0 0 /var/run/vpncontrol.sock
af666598d4d72b45 stream
0 0 0 af666598d0176f2d 0 0
af666598d01785d5 stream
0 0 0 af666598ce53eecd 0 0 /var/run/mDNSResponder
af666598ce53eecd stream
0 0 0 af666598d01785d5 0 0
af666598d20c2375 stream
0 0 af666598ce9389dd 0 0 0 /Library/Application
Support/AvastSecureLine/run/elevation/501/privileged.sock
af666598d0176505 stream
0 0 0 af666598d017611d 0 0 /var/run/mDNSResponder
af666598d017611d stream
0 0 0 af666598d0176505 0 0
af666598d0176b45 stream
0 0 af666598d07ee34d 0 0 0 /Library/Application
Support/Avast/run/update//501.sock
af666598d4d734a5 stream
0 0 af666598cb4facbd 0 0 0 /Library/Application Support/AvastSecureLine/run/update//501.sock
af666598d3ebf4a5 stream
0 0 0 af666598d01774a5 0 0 /var/run/mDNSResponder
af666598d01774a5 stream
0 0 0 af666598d3ebf4a5 0 0
af666598d20c28ed stream
0 0 0 af666598d16ff695 0 0 /var/run/mDNSResponder
af666598d16ff695 stream
0 0 0 af666598d20c28ed 0 0
af666598d3ebed9d stream
0 0 0 af666598d017869d 0 0 /var/run/mDNSResponder
af666598d017869d stream
0 0 0 af666598d3ebed9d 0 0
af666598d20c4445 stream
0 0 0 0 0 0
af666598d3ebff95 stream
0 0 0 af666598d0177955 0 0 /var/run/mDNSResponder
af666598d0177955 stream
0 0 0 af666598d3ebff95 0 0
af666598d3ec005d stream
0 0 0 af666598d0176d9d 0 0 /var/run/mDNSResponder
af666598d0176d9d stream
0 0 0 af666598d3ec005d 0 0
af666598d3ebee65 stream
0 0 0 af666598d017724d 0 0 /Users/thebc1/Library/Group
Containers/google_drive/tmpHTCwUq
af666598d017724d stream
0 0 0 af666598d3ebee65 0 0
af666598d017882d stream
0 0 0 af666598d0178765 0 0 /var/run/mDNSResponder
af666598d0178765 stream
0 0 0 af666598d017882d 0 0
af666598d0175add stream
0 0 0 af666598d0175c6d 0 0 /var/run/mDNSResponder
af666598d0175c6d stream
0 0 0 af666598d0175add 0 0
af666598ce53d375 stream
0 0 0 af666598d3ebf6fd 0 0 /var/run/usbmuxd
af666598d3ebf6fd stream
0 0 0 af666598ce53d375 0 0
af666598d20c2695 stream
0 0 0 af666598d3ebfae5 0 0 /var/run/usbmuxd
af666598d3ebfae5 stream
0 0 0 af666598d20c2695 0 0
af666598d20c22ad stream
0 0 0 af666598d17006fd 0 0 /var/run/mDNSResponder
af666598d17006fd stream
0 0 0 af666598d20c22ad 0 0
af666598cb8bd05d stream
0 0 0 af666598d20c29b5 0 0 /var/run/mDNSResponder
af666598d20c29b5 stream
0 0 0 af666598cb8bd05d 0 0
af666598d20c3185 stream
0 0 0 af666598d3ebfa1d 0 0 /var/run/mDNSResponder
af666598d3ebfa1d stream
0 0 0 af666598d20c3185 0 0
af666598d1700ae5 stream
0 0 0 af666598d20c3c75 0 0 /var/run/mDNSResponder
af666598d20c3c75 stream
0 0 0 af666598d1700ae5 0 0
af666598d16ff2ad stream
0 0 0 af666598d1700bad 0 0 /var/run/mDNSResponder
af666598d1700bad stream
0 0 0 af666598d16ff2ad 0 0
af666598d3ec02b5 stream
0 0 0 af666598d3ec01ed 0 0 /var/run/mDNSResponder
af666598d3ec01ed stream
0 0 0 af666598d3ec02b5 0 0
af666598ce53d505 stream
0 0 0 af666598ce53ebad 0 0 /var/run/usbmuxd
af666598ce53ebad stream
0 0 0 af666598ce53d505 0 0
af666598d0178445 stream
0 0 0 af666598d0175d35 0 0 /var/run/usbmuxd
af666598d0175d35 stream
0 0 0 af666598d0178445 0 0
af666598d3ec0765 stream
0 0 0 af666598d20c4125 0 0 /var/run/mDNSResponder
af666598d20c4125 stream
0 0 0 af666598d3ec0765 0 0
af666598ce53f1ed stream
0 0 0 af666598d3ebf0bd 0 0 /var/run/mDNSResponder
af666598d3ebf0bd stream
0 0 0 af666598ce53f1ed 0 0
af666598d3ebfc75 stream
0 0 0 af666598d20c3bad 0 0 /var/run/mDNSResponder
af666598d20c3bad stream
0 0 0 af666598d3ebfc75 0 0
af666598d3ebf24d stream
0 0 af666598d033c61d 0 0 0
/var/folders/xt/wrzl0wss3wxfx828ngqlhb_m0000gn/T/ics813
af666598d20c4765 stream
0 0 0 af666598d20c1dfd 0 0 /var/run/mDNSResponder
af666598d20c1dfd stream
0 0 0 af666598d20c4765 0 0
af666598d20c1ec5 stream
0 0 af666598d28c07fd 0 0 0 /Users/thebc1/Library/Group
Containers/google_drive/tmpHTCwUq
af666598d20c1d35 stream
0 0 0 af666598d20c1add 0 0 /var/run/mDNSResponder
af666598d20c1add stream
0 0 0 af666598d20c1d35 0 0
af666598d170182d stream
0 0 0 af666598d17018f5 0 0 /var/run/mDNSResponder
af666598d17018f5 stream
0 0 0 af666598d170182d 0 0
af666598d17019bd stream
0 0 0 af666598d20c30bd 0 0 /var/run/mDNSResponder
af666598d20c30bd stream
0 0 0 af666598d17019bd 0 0
af666598d20c2c0d stream
0 0 0 af666598d20c2cd5 0 0 /var/run/mDNSResponder
af666598d20c2cd5 stream
0 0 0 af666598d20c2c0d 0 0
af666598d20c356d stream
0 0 0 af666598d20c34a5 0 0 /var/run/mDNSResponder
af666598d20c34a5 stream
0 0 0 af666598d20c356d 0 0
af666598d3ebf56d stream
0 0 0 af666598d20c48f5 0 0 /var/run/mDNSResponder
af666598d20c48f5 stream
0 0 0 af666598d3ebf56d 0 0
af666598d20c45d5 stream
0 0 af666598d351952d 0 0 0
/var/folders/xt/wrzl0wss3wxfx828ngqlhb_m0000gn/T/icdd501
af666598d16ffcd5 stream
0 0 0 af666598d17003dd 0 0 /var/run/mDNSResponder
af666598d17003dd stream
0 0 0 af666598d16ffcd5 0 0
af666598d16ffe65 stream
0 0 af666598d17e8e9d 0 0 0
/var/folders/xt/wrzl0wss3wxfx828ngqlhb_m0000gn/T/ics369
af666598d170024d stream
0 0 0 af666598d1700185 0 0 /var/run/mDNSResponder
af666598d1700185 stream
0 0 0 af666598d170024d 0 0
af666598d16fff2d stream
0 0 0 af666598d17000bd 0 0 /var/run/mDNSResponder
af666598d17000bd stream
0 0 0 af666598d16fff2d 0 0
af666598ce53f8f5 stream
0 0 0 af666598ce53cadd 0 0 /var/run/mDNSResponder
af666598ce53cadd stream
0 0 0 af666598ce53f8f5 0 0
af666598d16ffff5 stream
0 0 0 af666598ce53f9bd 0 0 /var/run/mDNSResponder
af666598ce53f9bd stream
0 0 0 af666598d16ffff5 0 0
af666598ce53cc6d stream
0 0 0 af666598ce53f82d 0 0 /var/run/mDNSResponder
af666598ce53f82d stream
0 0 0 af666598ce53cc6d 0 0
af666598ce53f5d5 stream
0 0 0 af666598ce53f50d 0 0 /var/run/mDNSResponder
af666598ce53f50d stream
0 0 0 af666598ce53f5d5 0 0
af666598ce53f445 stream
0 0 0 af666598ce53f37d 0 0 /var/run/mDNSResponder
af666598ce53f37d stream
0 0 0 af666598ce53f445 0 0
af666598ce53f2b5 stream
0 0 0 af666598ce53cf8d 0 0 /var/run/mDNSResponder
af666598ce53cf8d stream
0 0 0 af666598ce53f2b5 0 0
af666598ce53d8ed stream
0 0 0 af666598ce53d825 0 0 /var/run/mDNSResponder
af666598ce53d825 stream
0 0 0 af666598ce53d8ed 0 0
af666598ce53e955 stream
0 0 0 af666598ce53e88d 0 0 /var/run/mDNSResponder
af666598ce53e88d stream
0 0 0 af666598ce53e955 0 0
af666598ce53e7c5 stream
0 0 0 af666598ce53d9b5 0 0
af666598ce53d9b5 stream
0 0 0 af666598ce53e7c5 0 0
af666598ce53da7d stream
0 0 0 af666598ce53e6fd 0 0
af666598ce53e6fd stream
0 0 0 af666598ce53da7d 0 0
af666598ce53e635 stream
0 0 0 af666598ce53db45 0 0
af666598ce53db45 stream
0 0 0 af666598ce53e635 0 0
af666598ce53dc0d stream
0 0 0 af666598ce53e56d 0 0
af666598ce53e56d stream 0
0 0
af666598ce53dc0d 0 0
af666598ce53dd9d stream
0 0 0 af666598ce53de65 0 0 /var/run/mDNSResponder
af666598ce53de65 stream
0 0 0 af666598ce53dd9d 0 0
af666598ce53e4a5 stream
0 0 0 af666598ce53dcd5 0 0 /var/run/mDNSResponder
af666598ce53dcd5 stream
0 0 0 af666598ce53e4a5 0 0
af666598ce53df2d stream
0 0 0 af666598ce53dff5 0 0 /var/run/mDNSResponder
af666598ce53dff5 stream
0 0 0 af666598ce53df2d 0 0
af666598ce53e315 stream
0 0 0 af666598ce53e24d 0 0 /var/run/mDNSResponder
af666598ce53e24d stream
0 0 0 af666598ce53e315 0 0
af666598cb8baba5 stream
0 0 af666598ce58116d 0 0 0
/private/tmp/com.apple.launchd.jImNKGI4a7/ServiceProcessSocket
af666598cb8bd9bd stream
0 0 af666598ce54ccbd 0 0 0
/private/tmp/com.apple.launchd.URsmLccgoK/Listeners
af666598cb8bb375 stream
0 0 af666598ce54d7fd 0 0 0
/private/tmp/com.apple.launchd.rwBPnLOoth/Render
af666598cb8bd125 stream
0 0 af666598ce1159dd 0 0 0 /var/tmp/filesystemui.socket
af666598ce53e185 stream
0 0 0 af666598cb8baadd 0 0 /var/run/mDNSResponder
af666598cb8baadd stream
0 0 0 af666598ce53e185 0 0
af666598cb8bd69d stream
0 0 0 af666598cb8bd50d 0 0 /var/run/mDNSResponder
af666598cb8bd50d stream
0 0 0 af666598cb8bd69d 0 0
af666598cb8bd37d stream
0 0 0 af666598cb8bd445 0 0 /var/run/mDNSResponder
af666598cb8bd445 stream
0 0 0 af666598cb8bd37d 0 0
af666598cb8bd2b5 stream
0 0 0 af666598cb8bb2ad 0 0 /var/run/mDNSResponder
af666598cb8bb2ad stream
0 0 0 af666598cb8bd2b5 0 0
af666598cb8bb5cd stream
0 0 0 af666598cb8bb695 0 0 /var/run/mDNSResponder
af666598cb8bb695 stream
0 0 0 af666598cb8bb5cd 0 0
af666598cb8bba7d stream
0 0 af666598cca8e07d 0 0 0 /var/run/pppconfd
af666598cb8bbcd5 stream
0 0 0 af666598cb8bbd9d 0 0
af666598cb8bbd9d stream
0 0 0 af666598cb8bbcd5 0 0
af666598cb8bbe65 stream
0 0 af666598cba8ff8d 0 0 0
/var/run/com.barebones.textwrangler.socket
af666598cb8bbf2d stream
0 0 af666598cba7b34d 0 0 0 /private/var/run/cupsd
af666598cb8bcae5 stream
0 0 af666598cba658ed 0 0 0 /var/run/usbmuxd
af666598cb8bbff5 stream
0 0 af666598cba5861d 0 0 0 /var/run/systemkeychaincheck.socket
af666598cb8bca1d stream
0 0 af666598cba46dad 0 0 0 /var/run/portmap.socket
af666598cb8bc955 stream
0 0 af666598cba419dd 0 0 0 /var/run/vpncontrol.sock
af666598cb8bc0bd stream
0 0 af666598cba2443d 0 0 0 /var/rpc/ncacn_np/wkssvc
af666598cb8bc185 stream
0 0 af666598cba23f8d 0 0 0 /var/rpc/ncalrpc/wkssvc
af666598cb8bc88d stream
0 0 af666598cba2407d 0 0 0 /var/rpc/ncacn_np/srvsvc
af666598cb8bc24d stream
0 0 af666598cba2434d 0 0 0 /var/rpc/ncalrpc/srvsvc
af666598cb8bc315 stream
0 0 af666598cba2416d 0 0 0 /var/rpc/ncalrpc/NETLOGON
af666598cb8bc7c5 stream
0 0 af666598cba1d8ed 0 0 0 /var/rpc/ncacn_np/mdssvc
af666598cb8bc3dd stream
0 0 af666598cba1cbcd 0 0 0 /var/rpc/ncacn_np/lsarpc
af666598cb8bc4a5 stream
0 0 af666598cba1ccbd 0 0 0 /var/rpc/ncalrpc/lsarpc
af666598cb8bc56d stream
0 0 af666598cba179dd 0 0 0 /var/run/mDNSResponder
af666598d017805d dgram
0 0 0 af666598d0177a1d
af666598d0177a1d 0
af666598d0177a1d dgram
0 0 0 af666598d017805d
af666598d017805d 0
af666598d1700e05 dgram
0 0 0 af666598d16fef8d
af666598d16fef8d 0
af666598d16fef8d dgram
0 0 0 af666598d1700e05
af666598d1700e05 0
af666598d0175ec5 dgram
0 0 0 af666598d0177ecd
af666598d0177ecd 0
af666598d0177ecd dgram
0 0 0 af666598d0175ec5
af666598d0175ec5 0
af666598d4d737c5 dgram
0 0 0 af666598cb8bc6fd 0 af666598d3ebf185
af666598d01768ed dgram
0 0 0 af666598d0177ae5
af666598d0177ae5 0
af666598d0177ae5 dgram
0 0 0 af666598d01768ed
af666598d01768ed 0
af666598d017643d dgram
0 0 0 af666598d01781ed af666598d01781ed 0
af666598d01781ed dgram
0 0 0 af666598d017643d
af666598d017643d 0
af666598d3ec069d dgram
0 0 0 af666598d017756d
af666598d017756d 0
af666598d017756d dgram
0 0 0 af666598d3ec069d
af666598d3ec069d 0
af666598d20c388d dgram
0 0 0 af666598d3ec08f5
af666598d3ec08f5 0
af666598d3ec08f5 dgram
0 0 0 af666598d20c388d
af666598d20c388d 0
af666598d0175f8d dgram
0 0 0 af666598d0175ba5
af666598d0175ba5 0
af666598d0175ba5 dgram
0 0 0 af666598d0175f8d af666598d0175f8d 0
af666598ce53ee05 dgram
0 0 0 af666598d20c3ecd
af666598d20c3ecd 0
af666598d20c3ecd dgram
0 0 0 af666598ce53ee05
af666598ce53ee05 0
af666598d20c2a7d dgram
0 0 0 af666598d3ebecd5
af666598d3ebecd5 0
af666598d3ebecd5 dgram
0 0 0 af666598d20c2a7d
af666598d20c2a7d 0
af666598d3ebfbad dgram
0 0 0 af666598d3ebf3dd
af666598d3ebf3dd 0
af666598d3ebf3dd dgram
0 0 0 af666598d3ebfbad
af666598d3ebfbad 0
af666598d3ebf185 dgram
0 0 0 af666598cb8bc6fd 0 af666598d3ebf955
af666598d3ebf955 dgram
0 0 0 af666598cb8bc6fd 0 af666598d20c1f8d
af666598d3ebf88d dgram
0 0 0 af666598d3ebf315
af666598d3ebf315 0
af666598d3ebf315 dgram
0 0 0 af666598d3ebf88d
af666598d3ebf88d 0
af666598d20c1f8d dgram
0 0 0 af666598cb8bc6fd 0 af666598d20c469d
af666598d20c2d9d dgram
0 0 0 af666598d3ebf7c5
af666598d3ebf7c5 0
af666598d3ebf7c5 dgram
0 0 0 af666598d20c2d9d
af666598d20c2d9d 0
af666598d20c37c5 dgram
0 0 0 af666598d20c324d
af666598d20c324d 0
af666598d20c324d dgram
0 0 0 af666598d20c37c5
af666598d20c37c5 0
af666598d20c36fd dgram
0 0 0 af666598d20c3635
af666598d20c3635 0
af666598d20c3635 dgram
0 0 0 af666598d20c36fd af666598d20c36fd 0
af666598d20c2505 dgram
0 0 0 af666598ce53d5cd
af666598ce53d5cd 0
af666598ce53d5cd dgram
0 0 0 af666598d20c2505
af666598d20c2505 0
af666598d20c3d3d dgram
0 0 0 af666598d20c2b45
af666598d20c2b45 0
af666598d20c2b45 dgram
0 0 0 af666598d20c3d3d
af666598d20c3d3d 0
af666598d20c1ba5 dgram
0 0 0 af666598d20c41ed
af666598d20c41ed 0
af666598d20c41ed dgram
0 0 0 af666598d20c1ba5
af666598d20c1ba5 0
af666598d20c25cd dgram
0 0 0 af666598d20c3e05 af666598d20c3e05 0
af666598d20c3e05 dgram
0 0 0 af666598d20c25cd
af666598d20c25cd 0
af666598d20c33dd dgram
0 0 0 af666598d20c3315
af666598d20c3315 0
af666598d20c3315 dgram
0 0 0 af666598d20c33dd
af666598d20c33dd 0
af666598d17015d5 dgram
0 0 0 af666598d170169d
af666598d170169d 0
af666598d170169d dgram
0 0 0 af666598d17015d5
af666598d17015d5 0
af666598d16feadd dgram
0 0 0 af666598d1701765
af666598d1701765 0
af666598d1701765 dgram
0 0 0 af666598d16feadd
af666598d16feadd 0
af666598d20c2f2d dgram
0 0 0 af666598d20c2ff5
af666598d20c2ff5 0
af666598d20c2ff5 dgram
0 0 0 af666598d20c2f2d
af666598d20c2f2d 0
af666598d3ebf635 dgram
0 0 0 af666598d20c49bd
af666598d20c49bd 0
af666598d20c49bd dgram
0 0 0 af666598d3ebf635
af666598d3ebf635 0
af666598d20c469d dgram
0 0 0 af666598cb8bc6fd 0 af666598ce53eae5
af666598d20c211d dgram
0 0 0 af666598d20c450d
af666598d20c450d 0
af666598d20c450d dgram
0 0 0 af666598d20c211d
af666598d20c211d 0
af666598d20c42b5 dgram
0 0 0 af666598d20c437d
af666598d20c437d 0
af666598d20c437d dgram
0 0 0 af666598d20c42b5
af666598d20c42b5 0
af666598d20c2825 dgram
0 0 0 af666598d20c3955
af666598d20c3955 0
af666598d20c3955 dgram
0 0 0 af666598d20c2825
af666598d20c2825 0
af666598d16ff5cd dgram
0 0 0 af666598d16ff505
af666598d16ff505 0
af666598d16ff505 dgram
0 0 0 af666598d16ff5cd
af666598d16ff5cd 0
af666598d16ffa7d dgram
0 0 0 af666598d16ff43d
af666598d16ff43d 0
af666598d16ff43d dgram
0 0 0 af666598d16ffa7d
af666598d16ffa7d 0
af666598d16ff825 dgram
0 0 0 af666598d17007c5
af666598d17007c5 0
af666598d17007c5 dgram
0 0 0 af666598d16ff825
af666598d16ff825 0
af666598d170088d dgram
0 0 0 af666598d16ff75d
af666598d16ff75d 0
af666598d16ff75d dgram
0 0 0 af666598d170088d
af666598d170088d 0
af666598d16ffb45 dgram
0 0 0 af666598d16ffc0d
af666598d16ffc0d 0
af666598d16ffc0d dgram
0 0 0 af666598d16ffb45
af666598d16ffb45 0
af666598d16ffd9d dgram
0 0 0 af666598d1700315 af666598d1700315 0
af666598d1700315 dgram
0 0 0 af666598d16ffd9d
af666598d16ffd9d 0
af666598ce53cba5 dgram
0 0 0 af666598ce53f765
af666598ce53f765 0
af666598ce53f765 dgram
0 0 0 af666598ce53cba5
af666598ce53cba5 0
af666598ce53d43d dgram
0 0 0 af666598ce53ed3d
af666598ce53ed3d 0
af666598ce53ed3d dgram
0 0 0 af666598ce53d43d
af666598ce53d43d 0
af666598ce53f05d dgram
0 0 0 af666598ce53ef95
af666598ce53ef95 0
af666598ce53ef95 dgram
0 0 0 af666598ce53f05d af666598ce53f05d 0
af666598ce53ec75 dgram
0 0 0 af666598ce53ea1d
af666598ce53ea1d 0
af666598ce53ea1d dgram
0 0 0 af666598ce53ec75
af666598ce53ec75 0
af666598ce53eae5 dgram
0 0 0 af666598cb8bc6fd 0 af666598cb8bb505
af666598ce53d695 dgram
0 0 0 af666598ce53d75d
af666598ce53d75d 0
af666598ce53d75d dgram
0 0 0 af666598ce53d695
af666598ce53d695 0
af666598ce53e0bd dgram
0 0 0 af666598ce53e3dd
af666598ce53e3dd 0
af666598ce53e3dd dgram
0 0 0 af666598ce53e0bd
af666598ce53e0bd 0
af666598cb8bd8f5 dgram
0 0 0 af666598cb8bac6d
af666598cb8bac6d 0
af666598cb8bac6d dgram
0 0 0 af666598cb8bd8f5
af666598cb8bd8f5 0
af666598cb8bb43d dgram
0 0 0 af666598cb8bad35
af666598cb8bad35 0
af666598cb8bad35 dgram
0 0 0 af666598cb8bb43d
af666598cb8bb43d 0
af666598cb8bd82d dgram
0 0 0 af666598cb8bb1e5
af666598cb8bb1e5 0
af666598cb8bb1e5 dgram
0 0 0 af666598cb8bd82d
af666598cb8bd82d 0
af666598cb8bb11d dgram
0 0 0 af666598cb8bb055 af666598cb8bb055 0
af666598cb8bb055 dgram
0 0 0 af666598cb8bb11d
af666598cb8bb11d 0
af666598cb8badfd dgram
0 0 0 af666598cb8bd765
af666598cb8bd765 0
af666598cb8bd765 dgram
0 0 0 af666598cb8badfd
af666598cb8badfd 0
af666598cb8bb505 dgram
0 0 0 af666598cb8bc6fd 0 af666598cb8bd5d5
af666598cb8bd5d5 dgram
0 0 0 af666598cb8bc6fd 0 af666598cb8bc635
af666598cb8bd1ed dgram
0 0 0 af666598cb8bb75d
af666598cb8bb75d 0
af666598cb8bb75d dgram
0 0 0 af666598cb8bd1ed af666598cb8bd1ed 0
af666598cb8baec5 dgram
0 0 0 af666598cb8baf8d
af666598cb8baf8d 0
af666598cb8baf8d dgram
0 0 0 af666598cb8baec5
af666598cb8baec5 0
af666598cb8bbb45 dgram
0 0 0 af666598cb8bbc0d
af666598cb8bbc0d 0
af666598cb8bbc0d dgram
0 0 0 af666598cb8bbb45
af666598cb8bbb45 0
af666598cb8bcecd dgram
0 0 0 af666598cb8bb825
af666598cb8bb825 0
af666598cb8bb825 dgram
0 0 0 af666598cb8bcecd
af666598cb8bcecd 0
af666598cb8bb8ed dgram
0 0 0 af666598cb8bb9b5
af666598cb8bb9b5 0
af666598cb8bb9b5 dgram
0 0 0 af666598cb8bb8ed
af666598cb8bb8ed 0
af666598cb8bce05 dgram
0 0 0 af666598cb8bcd3d
af666598cb8bcd3d 0
af666598cb8bcd3d dgram
0 0 0 af666598cb8bce05
af666598cb8bce05 0
af666598cb8bcc75 dgram
0 0 0 af666598cb8bcbad
af666598cb8bcbad 0
af666598cb8bcbad dgram
0 0 0 af666598cb8bcc75 af666598cb8bcc75 0
af666598cb8bc635 dgram
0 0 0 af666598cb8bc6fd 0 0
af666598cb8bc6fd dgram
0 0 af666598cb8b0f8d 0 af666598d4d737c5 0 /private//var/run/syslog
Registered kernel control modules
id flags pcbcount rcvbuf sndbuf
name
1 9
0 131072 8192 com.apple.flow-divert
2 1
1 16384 2048 com.apple.nke.sockwall
3 9
0 524288 524288 com.apple.content-filter
4 9
0 8192 2048 com.apple.packet-mangler
5 1
3 65536 65536 com.apple.net.necp_control
6 1
1 65536 65536 com.apple.net.netagent
7 9
1 524288 524288 com.apple.net.utun_control
8 1
0 65536 65536 com.apple.net.ipsec_control
9 0
23 8192 2048 com.apple.netsrc
a 18 4
8192 2048
com.apple.network.statistics
b 5
0 8192 2048 com.apple.network.tcp_ccdebug
c 1
1 8192 2048 com.apple.network.advisory
d 1
0 8192 2048 com.avast.PacketForwarder
e 1
1 8192 2048 com.avast.AvastFileShield.kext
Active kernel event sockets
Proto Recv-Q Send-Q vendor
class subcla
kevt 0 0
1 6 1
kevt 0 0
1 6 1
kevt 0
0 1 1
10
kevt 0 0
1001 5 11
kevt 0 0
1 1 2
kevt 0 0
1 1 7
kevt 0 0
1 1 1
kevt 0 0
1 1 9
kevt 0 0
1 1 8
kevt 0 0
1 6 1
kevt 0 0
1 1 2
kevt 0 0
1 1 2
kevt 0 0
1 6 1
kevt 0 0
1 6 1
kevt 0 0
1 6 1
kevt 0 0
1 1 0
Active kernel control sockets
Proto Recv-Q Send-Q
unit id name
kctl 0 0
1 2 com.apple.nke.sockwall
kctl 0 0
1 5
com.apple.net.necp_control
kctl 0 0
2 5
com.apple.net.necp_control
kctl 0 0
3 5
com.apple.net.necp_control
kctl 0 0
1 6 com.apple.net.netagent
kctl 0 0
1 7
com.apple.net.utun_control
kctl 0 0
1 9 com.apple.netsrc
kctl 0 0
2 9 com.apple.netsrc
kctl 0 0
3 9 com.apple.netsrc
kctl 0 0
4 9 com.apple.netsrc
kctl 0 0
5 9 com.apple.netsrc
kctl 0 0
6 9 com.apple.netsrc
kctl 0 0
7 9 com.apple.netsrc
kctl 0 0
8 9 com.apple.netsrc
kctl 0 0
9 9 com.apple.netsrc
kctl 0 0
10 9 com.apple.netsrc
kctl 0 0
11 9 com.apple.netsrc
kctl 0 0
12 9 com.apple.netsrc
kctl 0 0
13 9 com.apple.netsrc
kctl 0 0
14 9 com.apple.netsrc
kctl 0 0 15
9 com.apple.netsrc
kctl 0 0
16 9 com.apple.netsrc
kctl 0 0
17 9 com.apple.netsrc
kctl 0 0
18 9 com.apple.netsrc
kctl 0 0
19 9 com.apple.netsrc
kctl 0 0
20 9 com.apple.netsrc
kctl 0 0
21 9 com.apple.netsrc
kctl 0 0
22 9 com.apple.netsrc
kctl 0 0
23 9 com.apple.netsrc
kctl 0 0
1 10 com.apple.network.statistics
kctl 0 0
2 10
com.apple.network.statistics
kctl 0 0
3 10
com.apple.network.statistics
kctl 0 0
4 10
com.apple.network.statistics
kctl 0 0
1 12
com.apple.network.advisory
kctl 0 0
1 14
com.avast.AvastFileShield.kext
Routing tables
Internet:
Destination
Gateway Flags Refs Use
Netif Expire
default
link#8 UCS 114 0
utun0
default 192.168.0.1 UGScI 2 0
en1
ad-dc6.mediaplex.c link#8 UHW3I 0 26
utun0 93
8.43.72.71
link#8 UHWIi 1 12
utun0
17.134.126.213
link#8 UHW3I 0 14
utun0 17
17.143.163.23
link#8 UHWIi 1 24
utun0
17.154.65.206
link#8 UHW3I 0 15
utun0 30
17.158.28.43
link#8 UHW3I 0 228
utun0 5
17.172.238.201
link#8 UHWIi 1 15
utun0
17.249.73.246
link#8 UHW3I 0 66
utun0 58
time.apple.com
link#8 UHWIi 1 1
utun0
a23-0-160-74.deplo link#8 UHWIi 1 6
utun0
a23-60-228-54.depl link#8 UHWIi 1 11
utun0
a23-61-2-136.deplo link#8 UHWIi 1 54
utun0
a23-61-58-28.deplo link#8 UHW3I 0 13
utun0 66
a23-61-65-197.depl link#8 UHWIi 1 29
utun0
a23-61-70-242.depl link#8 UHWIi 1 26
utun0
a23-61-75-27.deplo link#8 UHW3I
0 206 utun0
65
a23-193-18-72.depl link#8 UHW3I 0 21
utun0 59
a23-201-26-5.deplo link#8 UHW3I 0 290
utun0 60
a23-201-79-8.deplo link#8 UHW3I 0
14 utun0 56
a23-213-132-117.de link#8 UHWIi 1 6
utun0
a23-213-212-52.dep link#8 UHWIi 4 86
utun0
edge-atlas-shv-01- link#8 UHW3I 0 28
utun0 42
xx-fbcdn-shv-01-la link#8 UHW3I 0 636
utun0 54
ec2-52-3-45-52.com link#8 UHW3I 0 18
utun0 58
ec2-52-5-123-170.c link#8 UHW3I 0 37
utun0 31
ec2-52-8-186-159.u link#8 UHW3I 0 14
utun0 50
ec2-52-9-31-153.us link#8 UHWIi 1 6
utun0
server-52-84-24-17 link#8 UHW3I 0 32
utun0 17
server-52-84-25-13 link#8 UHW3I 0 89
utun0 89
server-52-84-25-16 link#8 UHW3I 0 25
utun0 91
ec2-54-69-131-51.u link#8 UHW3I 0 6
utun0 33
ec2-54-84-241-73.c link#8 UHW3I 0
10 utun0
35
ec2-54-173-180-181 link#8 UHW3I 0 6
utun0 42
ec2-54-209-104-176 link#8 UHW3I 0 7
utun0 57
ec2-54-225-178-149 link#8 UHW3I 0 16
utun0 81
ec2-54-236-167-56. link#8 UHW3I 0 7
utun0 33
63.241.108.111
link#8 UHW3I 0 33
utun0 16
ce-in-f94.1e100.ne link#8 UHWIi 3 41
utun0
ja-in-f95.1e100.ne link#8 UHW3I 0 5
utun0 92
69.172.216.56
link#8 UHW3I 0 101
utun0 33
69.172.216.58
link#8 UHW3I 0 31
utun0 16
69.172.216.111
link#8 UHW3I 0 106
utun0 39
72.21.91.29
link#8 UHW3I 0 13
utun0 1
io-in-f188.1e100.n link#8 UHWIi 1 36
utun0
r-79-40-234-77.ff. link#8 UHW3I 0 687
utun0 89
sea16.ff.avast.com link#8 UHWIi 1 9
utun0
r-69-44-234-77.ff. link#8 UHWIi 2 94
utun0
100.111.6.234
100.111.6.234 UH 0 11
utun0
104.16.24.216
link#8 UHW3I 0 16
utun0 16
104.16.27.235
link#8 UHW3I 0 6
utun0 16
104.20.19.28
link#8 UHW3I 0 6
utun0 33
104.20.77.43
link#8 UHW3I 0 49
utun0 31
104.20.78.43
link#8 UHW3I 0 35
utun0 40
104.166.76.19
link#8 UHW3I 0 21
utun0 55
hosted-by.leaseweb link#8 UHW3I 0 165
utun0 30
c2.f0.a86c.ip4.sta link#8 UHWIi 1 21
utun0
127
localhost UCS 0 0
lo0
localhost
localhost UH 122 27196
lo0
169.254
link#5 UCS 0 0
en1
ord08s13-in-f2.1e1 link#8 UHW3I 0 42
utun0 14
ord08s10-in-f13.1e link#8 UHWIi 1
24 utun0
ord08s10-in-f14.1e link#8 UHW3I 0 336
utun0 16
a172-225-225-179.d link#8 UHW3I 0 133
utun0 54
jb-in-f189.1e100.n link#8 UHWIi 2 110
utun0
173.205.10.40
link#8 UHWIi 3 52
utun0
173.205.10.50
link#8 UHW3I 0 10
utun0 62
edge-atlas-shv-03- link#8 UHW3I 0 14
utun0 32
edge-star-mini-shv link#8 UHW3I 0 171
utun0 58
chi81-028.ff.avast 192.168.0.1 UGHS 4 51
en1
176.32.98.118
link#8 UHWIi 1 15
utun0
176.32.103.183
link#8 UHWIi 1
14 utun0
176.32.103.190
link#8 UHWIi 1 6
utun0
a184-51-126-91.dep link#8 UHWIi 2 16
utun0
a184-51-126-105.de link#8 UHWIi 1 9
utun0
a184-51-126-130.de link#8 UHW3I 0 62
utun0 27
a184-51-126-131.de link#8 UHW3I 0 63
utun0 27
a184-51-126-137.de link#8 UHW3I 0 88
utun0 27
a184-51-126-152.de link#8
UHW3I 0 15
utun0 27
a184-51-126-168.de link#8 UHW3I 0 99
utun0 26
a184-51-126-169.de link#8 UHW3I 0 62
utun0 26
a184-51-126-187.de link#8 UHW3I 0 55
utun0 26
192.0.76.2
link#8 UHW3I 0 21
utun0 24
192.0.76.3
link#8 UHW3I 0 7
utun0 34
192.168.0
link#5 UCS 5 0
en1
192.168.0.1/32
link#5 UCS 1 0
en1
192.168.0.1
0:0:ca:0:0:3 UHLWIir 5
1060 en1 734
192.168.0.2
30:52:cb:73:9a:7d UHLWI 0 146
en1 1188
192.168.0.3
0:24:81:b7:d1:4a UHLWI 0 38
en1 587
192.168.0.4
f8:cf:c5:e1:7b:56 UHLWI 0 17
en1 674
192.168.0.6/32
link#5 UCS 1 0
en1
192.168.0.6
90:84:d:f5:6c:f8 UHLWI 0 156
lo0
192.168.0.7
88:32:9b:1:2a:b UHLWI 0 17
en1 678
192.168.0.255
ff:ff:ff:ff:ff:ff UHLWbI 0 26
en1
192.229.163.25
link#8 UHWIi 1 47
utun0
198.41.214.186
link#8 UHW3I 0 6
utun0 18
198.41.215.68
link#8 UHW3I 0 98
utun0 28
199.16.156.52
link#8 UHWIi 1 13
utun0
sc.iasds01.com
link#8 UHW3I 0 16
utun0 30
a.tribalfusion.com link#8 UHWIi 1 12
utun0
a.tribalfusion.com link#8 UHWIi 6 103
utun0
204.11.109.77
link#8 UHWIi 1 8
utun0
a-0001.a-msedge.ne link#8 UHW3I 0 4
utun0 49
sta-204-144-140-28 link#8 UHWIi 1 5
utun0
sta-204-144-141-22 link#8
UHWIi 1 7
utun0
204.154.111.242
link#8 UHW3I 0 29
utun0
sa.ia9.scorecardre link#8 UHW3I 0 36
utun0 11
mail.discoverbing. link#8 UHW3I 0
28 utun0
40
208.81.233.48
link#8 UHW3I 0 46
utun0 24
208.81.233.64
link#8 UHWIi 1 12
utun0
jd-in-f189.1e100.n link#8 UHWIi 2 35
utun0
ord36s01-in-f1.1e1 link#8 UHW3I 0 41
utun0 76
ord36s01-in-f131.1 link#8 UHW3I 0 83
utun0 87
ord36s01-in-f10.1e link#8 UHWIi 1 20
utun0
ord36s02-in-f1.1e1 link#8 UHWIi 4 82
utun0
ord30s25-in-f194.1 link#8 UHWIi 2 49
utun0
ord30s25-in-f195.1 link#8 UHWIi 1 368
utun0
ord30s25-in-f14.1e link#8 UHWIi 8 471
utun0
ord30s26-in-f3.1e1 link#8 UHWIi 1
1082 utun0
ord30s26-in-f6.1e1 link#8 UHW3I 0 222
utun0 63
ord30s26-in-f14.1e link#8 UHWIi 11 171
utun0
par03s15-in-f100.1 link#8
UHWIi 2 585
utun0
ord30s21-in-f14.1e link#8 UHWIi 2 51
utun0
ord30s22-in-f110.1 link#8 UHWIi 4 73
utun0
ord31s21-in-f14.1e link#8 UHWIi 1
1446 utun0
ord31s22-in-f238.1 link#8 UHWIi 2 91
utun0
any-in-201b.1e100. link#8 UHW3I 0 14
utun0 11
216.244.123.25
link#8 UHWIi 1 10
utun0
all-systems.mcast. link#8 UHmW3I 0
102 utun0 83
224.0.0.251
link#8 UHmW3I 0 0
utun0 56
255.255.255.255/32 link#8 UCS 0 0
utun0
255.255.255.255/32 link#5 UCSI 0 0
en1
Internet6:
Destination
Gateway Flags Netif Expire
localhost
localhost UHL lo0
fe80::%lo0
fe80::1%lo0 UcI lo0
fe80::1%lo0
link#1 UHLI lo0
fe80::%en1
link#5 UCI en1
fe80::21d:d5ff:fe2 0:0:ca:0:0:3 UHLWIi en1
christopher-riglin 90:84:d:f5:6c:f8 UHLI lo0
ff01::%lo0
localhost UmCI lo0
ff01::%en0
link#4 UmCI en0
ff01::%en1
link#5 UmCI en1
ff02::%lo0
localhost UmCI lo0
ff02::%en0
link#4 UmCI en0
ff02::%en1
link#5 UmCI en1
Port Scanning host: 192.168.0.1
Open TCP Port: 5540
ing has started…
PING par03s15-in-f100.1e100.net (216.58.211.100): 56 data
bytes
64 bytes from 216.58.211.100: icmp_seq=0 ttl=53 time=131.728
ms
64 bytes from 216.58.211.100: icmp_seq=1 ttl=53 time=123.313
ms
64 bytes from 216.58.211.100: icmp_seq=2 ttl=53 time=119.147
ms
64 bytes from 216.58.211.100: icmp_seq=3 ttl=53 time=120.512
ms
64 bytes from 216.58.211.100: icmp_seq=4 ttl=53 time=117.242
ms
64 bytes from 216.58.211.100: icmp_seq=5 ttl=53 time=122.863
ms
64 bytes from 216.58.211.100: icmp_seq=6 ttl=53 time=119.046
ms
64 bytes from 216.58.211.100: icmp_seq=7 ttl=53 time=121.228
ms
64 bytes from 216.58.211.100: icmp_seq=8 ttl=53 time=121.580
ms
64 bytes from 216.58.211.100: icmp_seq=9 ttl=53 time=119.838
ms
--- par03s15-in-f100.1e100.net ping statistics ---
10 packets transmitted, 10 packets received, 0.0% packet
loss
round-trip min/avg/max/stddev =
117.242/121.650/131.728/3.782 ms
ONE EXAMPLE OF ONE SSL CERTIFICATE
SSL Report: www.fbem.org (74.208.155.199)
Summary
Overall Rating
A
0
20
40
60
80
100
Certificate
Protocol Support
Key Exchange
Cipher Strength
Visit our documentation page for more information,
configuration guides, and books. Known issues are documented here.
Certificate #1: RSA 2048 bits
(SHA256withRSA)
Server Key and Certificate #1
|
|
Subject
|
www.fbem.org
Fingerprint SHA256:
812cc1428432c98d84aad5a7ecf7533e2efe9f93d090229d157b505bf2b705dc
Pin SHA256:
BEhxEEgTI/dMGHQ/TahTOXstvInjB/saAwsOL+lboYE=
|
Common names
|
www.fbem.org
|
Alternative names
|
www.fbem.org fbem.org
|
Serial Number
|
00b149ddecb5c4e8dd5fd07f559a69d18f
|
Valid from
|
Sat, 17 Dec 2016 00:00:00
UTC
|
Valid until
|
Sun, 17 Dec 2017 23:59:59
UTC (expires in 29 days, 17 hours)
|
Key
|
RSA 2048 bits (e 65537)
|
Weak key (Debian)
|
No
|
Issuer
|
COMODO RSA Domain
Validation Secure Server CA
AIA:
http://crt.comodoca.com/COMODORSADomainValidationSecureServerCA.crt
|
Signature algorithm
|
SHA256withRSA
|
Extended Validation
|
No
|
Certificate Transparency
|
No
|
OCSP Must Staple
|
No
|
Revocation information
|
CRL, OCSP
CRL:
http://crl.comodoca.com/COMODORSADomainValidationSecureServerCA.crl
OCSP:
http://ocsp.comodoca.com
|
Revocation status
|
Good (not revoked)
|
DNS CAA
|
|
Trusted
|
Yes
|
Additional Certificates (if supplied)
|
|
Certificates provided
|
4 (5380 bytes)
|
Chain issues
|
Incorrect order, Contains anchor
|
#2
|
|
Subject
|
AddTrust External CA
Root In trust store
Fingerprint SHA256:
687fa451382278fff0c8b11f8d43d576671c6eb2bceab413fb83d965d06d2ff2
Pin SHA256:
lCppFqbkrlJ3EcVFAkeip0+44VaoJUymbnOaEUk7tEU=
|
Valid until
|
Sat, 30 May 2020 10:48:38
UTC (expires in 2 years and 6 months)
|
Key
|
RSA 2048 bits (e 65537)
|
Issuer
|
AddTrust External CA
Root Self-signed
|
Signature algorithm
|
SHA1withRSA Weak, but no impact on root
certificate
|
#3
|
|
Subject
|
COMODO RSA Certification
Authority
Fingerprint SHA256: 4f32d5dc00f715250abcc486511e37f501a899deb3bf7ea8adbbd3aef1c412da
Pin SHA256:
grX4Ta9HpZx6tSHkmCrvpApTQGo67CYDnvprLg5yRME=
|
Valid until
|
Sat, 30 May 2020 10:48:38
UTC (expires in 2 years and 6 months)
|
Key
|
RSA 4096 bits (e 65537)
|
Issuer
|
AddTrust External CA Root
|
Signature algorithm
|
SHA384withRSA
|
Subject
|
COMODO RSA Domain
Validation Secure Server CA
Fingerprint SHA256:
02ab57e4e67a0cb48dd2ff34830e8ac40f4476fb08ca6be3f5cd846f646840f0
Pin SHA256: klO23nT2ehFDXCfx3eHTDRESMz3asj1muO+4aIdjiuY=
|
Valid until
|
Sun, 11 Feb 2029 23:59:59
UTC (expires in 11 years and 2 months)
|
Key
|
RSA 2048 bits (e 65537)
|
Issuer
|
COMODO RSA Certification
Authority
|
Signature algorithm
|
SHA384withRSA
|
HTTP Requests
|
1 https://www.fbem.org/
(HTTP/1.1 200 OK)
|
Certificate #1: RSA 2048 bits (SHA1withRSA)
Server Key and Certificate #1
|
|
Subject
|
www.fbem.org
Fingerprint
SHA256: c76df3dae25f6e85dcbe216489d34a4a8318bcfb3876123fc5d970cf46fa41c3
Pin
SHA256: qdB7+5S2F7fF7KwjpmK7XJ0Zb9cpZjWhaDKxYIt2DVs=
|
Common names
|
www.fbem.org
|
Alternative names
|
www.fbem.org MISMATCH
|
Serial Number
|
3a8a88d500313aa37c473e49b51e1c4b
|
Valid from
|
Tue,
12 Nov 2013 00:00:00 UTC
|
Valid until
|
Mon, 19
Jan 2015 23:59:59 UTC (expired 2 years and 9 months ago) EXPIRED
|
Key
|
RSA
2048 bits (e 65537)
|
Weak key (Debian)
|
No
|
Issuer
|
Thawte
SSL CA
AIA:
http://svr-ov-aia.thawte.com/ThawteOV.cer
|
Signature algorithm
|
SHA1withRSA INSECURE
|
Extended Validation
|
No
|
Certificate Transparency
|
No
|
OCSP Must Staple
|
No
|
Revocation information
|
CRL,
OCSP
CRL:
http://svr-ov-crl.thawte.com/ThawteOV.crl
OCSP:
http://ocsp.thawte.com
|
Revocation status
|
Unchecked
(only trusted certificates can be checked)
|
DNS CAA
|
|
Trusted
|
Subject
|
Thawte
SSL CA
Fingerprint
SHA256: 0855414af5f5fd7e264f8b002a39cced67e5952e89b61b680cc847baa34944de
Pin
SHA256: J0HK633IekUIMgCxADcUXWl3I+wr1XIbHkr038xIyRk=
|
Valid until
|
Fri,
07 Feb 2020 23:59:59 UTC (expires in 2 years and 2 months)
|
Key
|
RSA
2048 bits (e 65537)
|
Issuer
|
thawte
Primary Root CA
|
Signature algorithm
|
SHA1withRSA INSECURE
|
#3
|
|
Subject
|
thawte
Primary Root CA
Fingerprint
SHA256: c99157df28d28ebd87b8b041aaccf023cf1c9ad0d21fd7116149d7f96484fa51
Pin
SHA256: HXXQgxueCIU5TTLHob/bPbwcKOKw6DkfsTWYHbxbqTY=
|
Valid until
|
Wed,
30 Dec 2020 23:59:59 UTC (expires in 3 years and 1 month)
|
Key
|
RSA
2048 bits (e 65537)
|
Issuer
|
Thawte
Premium Server CA
|
Signature algorithm
|
SHA1withRSA INSECURE
|
Certification Paths
|
Click
here to expand
Certificate #2: RSA 2048 bits (SHA1withRSA)
Server Key and Certificate #1
|
|
Subject
|
plesk
Fingerprint
SHA256: 915931b7d6af6932d00d0971a17dcec1a609fee8afa0cd119581e5d93e9c6172
Pin
SHA256: 5ufvt90xjDwPdGus1moyWDvpVltpviaJWC1Wo2XaIEE=
|
HTTP Requests
|
1 https://www.oryan.com/ (HTTP/1.1 301 Moved
Permanently)
|
Miscellaneous
|
|
Test date
|
Sat,
18 Nov 2017 06:01:03 UTC
|
Test duration
|
292.15
seconds
|
HTTP status code
|
301
|
HTTP forwarding
|
https://oryan.com
|
HTTP server signature
|
nginx
|
Server hostname
|
asgard.oryanx.com
|
Why
is my certificate not trusted?
There are many reasons why a certificate may not be trusted.
The exact problem is indicated on the report card in bright red. The problems
fall into three categories:
- Invalid certificate
- Invalid
configuration
- Unknown
Certificate Authority
1.
Invalid certificate
A certificate is invalid if:
● It
is used before its activation date
● It
is used after its expiry date
● Certificate
hostnames don't match the site hostname
● It
has been revoked
● It
has insecure signature
● It
has been blacklisted
2.
Invalid configuration
In some cases, the certificate chain does not contain all
the necessary certificates to connect the web server certificate to one of the
root certificates in our trust store. Less commonly, one of the certificates in
the chain (other than the web server certificate) will have expired, and that
invalidates the entire chain.
3.
Unknown Certificate Authority
In order for trust to be established, we must have the root
certificate of the signing Certificate Authority in our trust store. SSL Labs
does not maintain its own trust store; instead we use the store maintained by
Mozilla.
If we mark a web site as not trusted, that means that the
average web user's browser will not trust it either. For certain special groups
of users, such web sites can still be secure. For example, if you can securely
verify that a self-signed web site is operated by a person you trust, then you
can trust that self-signed web site too. Or, if you work for an organisation
that manages its own trust, and you have their own root certificate already
embedded in your browser. Such special cases do not work for the general
public, however, and this is what we indicate on our report card.
4.
Interoperability issues
In some rare cases trust cannot be established because of
interoperability issues between our code and the code or configuration running
on the server. We manually review such cases, but if you encounter such an
issue please feel free to contact us. Such problems are very difficult to
troubleshoot and you may be able to provide us with information that might help
us determine the root cause.
SSL Report v1.29.
IC3 REPORT CUBMITTED TO THE FBI VIA WEB. THIS IS THE 11TH
OR 12TH COMPLETED WITHIN THE PAST 3.5 YEARS.

Complaint Referral Form
Internet Crime Complaint Center
Thank you
for submitting your complaint to the IC3. Please save or print a copy for your
records. This is the only time you will have to make a copy of your complaint.
Victim InformationName:
chris
rigling
Business
Name:
US
GOVERNMENT CITIZENS AND BUSINESSES ALSO WORLDWI
Age:
30
- 39
Address:
2493
KNORR AVE
Address
(continued):
Suite/Apt./Mail
Stop:
City:
CINCINNATI
County:
HAMILTON
Country:
United
States of America
State:
Ohio
Zip
Code/Route:
45214
Phone
Number:
5134855554
Email
Address:
RIGLING.CHRIS@GMAIL.COM
Business
IT POC, if applicable:
US
GOVERNMENT CITIZENS AND BUSINESSES ALSO WORLDWI
Other
Business POC, if applicable:
US
GOVERNMENT CITIZENS AND BUSINESSES ALSO WORLDWI
Financial Transaction(s)
Transaction
Type:
Debit
Card/Credit Card
If
other, please specify:
Transaction
Amount: $
2500
Transaction
Date:
02/02/2018
Did
you send the money?
No
Victim
Bank Name:
Victim
Bank Address:
Victim
Bank Address (continued):
Victim
Bank Suite/Mail Stop:
Victim
Bank City:
Victim
Bank Country:
[None]
Victim
Bank State
[None]
Victim
Bank Zip Code/Route:
Victim
Name on Account:
Victim
Account Number:
Recipient
Bank Name:
Recipient
Bank Address:
Recipient
Bank Address (continued):
Recipient
Bank Suite/Mail Stop:
Recipient
Bank City:
Recipient
Bank Country:
[None]
Recipient
Bank State
[None]
Recipient
Bank Zip Code/Route:
Recipient
Name on Account:
Recipient
Bank Routing Number:
Recipient
Account Number:
Recipient
Bank SWIFT Code:
Description of IncidentProvide a
description of the incident and how you were victimized. Provide information
not captured elsewhere in this complaint form.
https://docs.google.com/document/d/1ZkdqN0yVyYg_MiBWGI-wwA7ep0Z1VJazgyAy8v9HE2Q
* Provide a description of the incident and how you were victimized. Provide information not captured elsewhere in this complaint form.
This is not only happening to me but it's also happening to everybody and every business it seems in the United States of America and every other country. These hackers and stalkers called games of America streets of America or the gay Mafia have infiltrated penetrated and set up home in each and every internet location at out there they have taken over the black lab and they are popping the regular internet they are running off a serval mesh Network that's being run off the people's Wi-Fi at homes their cell phones Bluetooth wireless speakers electrical lines power poles anything and everything that can conduct electricity and the signal Cincinnati Ohio making single band routers dual band and splitting the signal from home taking control of their signals from home also they are able to control their HVAC and electrical anything and everything that has electricity running through it they can manipulate and take control of I have seen them change medical records accident reports police reports medical reports they have proved beyond a shadow of a doubt that people can see through your laptop monitor TV computer monitor cell phones install new operating systems on cell phones computers system files Verizon Metro PCS u.s. cellular T-Mobile boost governor of Ohio California to California to Ohio. Computers their credit card merchant card services Uber Uber Uber Eats there are brainwashing mind control people you think that's technology responding to the White House in Washington DC
THESE INDIVIDUALS LIVE IN DIFFERNET PARTS OF THE USA BUT I KN OW CINCINNATI AND COLUMBUS AS WELL AS CLEVELAND. THEY ARE USING DATA OVER POWER AND WIFI NETWORKS TO HACK INTO ALL SYSTEMS, PHONES, SATELITES, AND CARRYING PEOPLES BRAIN WAVES, OR THOUGHTS. THEY ARE ALSO SUBLIMINATIALLY MESSAGING PEOPLE MESSING WITH THEM HACKERING STALKING AND BULLYING.
THEY HAVE STOLEN REAL ESTATE FROM THE COUNTY AUDITORS OF EACH COUNTY (FORECLOSED) CHURCH OF MARTINI ON SAFFIN AVE. CINCINNATI OHIO AND OTHERS RIGHT AROUND MY HOME,
* Provide a description of the incident and how you were victimized. Provide information not captured elsewhere in this complaint form.
This is not only happening to me but it's also happening to everybody and every business it seems in the United States of America and every other country. These hackers and stalkers called games of America streets of America or the gay Mafia have infiltrated penetrated and set up home in each and every internet location at out there they have taken over the black lab and they are popping the regular internet they are running off a serval mesh Network that's being run off the people's Wi-Fi at homes their cell phones Bluetooth wireless speakers electrical lines power poles anything and everything that can conduct electricity and the signal Cincinnati Ohio making single band routers dual band and splitting the signal from home taking control of their signals from home also they are able to control their HVAC and electrical anything and everything that has electricity running through it they can manipulate and take control of I have seen them change medical records accident reports police reports medical reports they have proved beyond a shadow of a doubt that people can see through your laptop monitor TV computer monitor cell phones install new operating systems on cell phones computers system files Verizon Metro PCS u.s. cellular T-Mobile boost governor of Ohio California to California to Ohio. Computers their credit card merchant card services Uber Uber Uber Eats there are brainwashing mind control people you think that's technology responding to the White House in Washington DC
THESE INDIVIDUALS LIVE IN DIFFERNET PARTS OF THE USA BUT I KN OW CINCINNATI AND COLUMBUS AS WELL AS CLEVELAND. THEY ARE USING DATA OVER POWER AND WIFI NETWORKS TO HACK INTO ALL SYSTEMS, PHONES, SATELITES, AND CARRYING PEOPLES BRAIN WAVES, OR THOUGHTS. THEY ARE ALSO SUBLIMINATIALLY MESSAGING PEOPLE MESSING WITH THEM HACKERING STALKING AND BULLYING.
THEY HAVE STOLEN REAL ESTATE FROM THE COUNTY AUDITORS OF EACH COUNTY (FORECLOSED) CHURCH OF MARTINI ON SAFFIN AVE. CINCINNATI OHIO AND OTHERS RIGHT AROUND MY HOME,
Which of the following were used in this incident? (Check all
that apply.)☐ Spoofed
Email☑ Similar
Domain☐ Email
Intrusion
☑
OtherPlease specify:
WWW.BUCKEYE.COM, XO.COM, APPLYALOE.COM
Law enforcement or regulatory agencies may desire copies of
pertinent documents or other evidence regarding your complaint.
Originals should be retained for use by law enforcement agencies.
Other InformationIf an
email was used in this incident, please provide a copy of the entire email
including full email headers.
[No
response provided]
Are
there any other witnesses or victims to this incident?
SENT
INFORMATION TO THE COUNTY AUDITOR, ATTORNEYS, GOVERNNOR, LRT GOV AND PRESIDENT
If
you have reported this incident to other law enforcement or government
agencies, please provide the name, phone number, email, date reported, report
number, etc.
TRANSLUCENT
CODE TRANSPARENT CODE,
☐ Check
here if this an update to a previously filed complaint:Who Filed the ComplaintWere you the victim
in the incident described above?
Yes
Digital Signature
By digitally signing this document, I affirm that the information
I provided is true and accurate to the best of my knowledge. I understand that
providing false information could make me subject to fine, imprisonment, or
both. (Title 18, U.S. Code, Section 1001)
Digital
Signature:
CHRIS
RIGLING
Thank you
for submitting your complaint to the IC3. Please save or print a copy for your
records. This is the only time you will have to make a copy of your
complaint.
Subscribe to:
Posts (Atom)