So after watching the Mike Lindell documentary, I decided to do a bit of digging into the sources IP's shown on the spreadsheet of data captured on the Dominion voting machines. Now, the cyber experts that obtained the Dominion data probably already know this stuff that I have listed below but to my knowledge it hasn't been presented to the public in such explicit detail. If it has then I apologize and this is a redundant post!
Now lets get into the meat and potatoes.
Leftist fraud deniers could possibly watch the documentary and say some nonsense like "He just made up those IP's! There's no proof they're even real!", well this information shuts that stupid argument down, beats it relentlessly, and buries it next to the economic theories of Karl Marx.
I used the tracert in command prompt (anyone can do this) on several of the source IP's listed in Mike's video to see what other addresses the packets would pass through and if they very well indeed lead to China. (Of course they did) I also used a tool called Whois Ultra to find more detailed information on the companies, people, addresses, and e-mails associated with those IP's.
Note:
Whois Ultra is used commonly in the networking field to find out which ISP owns a circuit, among other things, because they're always trying to get out of paying to fix them for their clients lol.
Exabit A.
**Source IP 219.133.0.1 **
Tracing route to 219.133.0.1 over a maximum of 30 hops
1 3 ms 2 ms 2 ms 10.0.0.1 2 16 ms 15 ms 16 ms 96.120.5.181 3 19 ms 16 ms 18 ms 68.86.111.65 4 17 ms 23 ms 18 ms ae-106-ar01.b0atlanta.ga.atlanta.comcast.net [162.151.0.85] 5 19 ms 19 ms * be-33021-cs02.56marietta.ga.ibone.comcast.net [96.110.43.69] 6 15 ms * 20 ms be-1213-cr13.56marietta.ga.ibone.comcast.net [96.110.34.230] 7 19 ms 18 ms 16 ms be-302-cr11.doraville.ga.ibone.comcast.net [96.110.39.50] 8 19 ms 19 ms 29 ms be-1411-cs04.doraville.ga.ibone.comcast.net [96.110.34.173] 9 17 ms 14 ms 21 ms be-1413-cr13.doraville.ga.ibone.comcast.net [96.110.34.206] 10 31 ms 29 ms 32 ms be-301-cr11.ashburn.va.ibone.comcast.net [96.110.32.2] 11 30 ms 31 ms 33 ms be-1411-cs04.ashburn.va.ibone.comcast.net [96.110.32.117] 12 32 ms 36 ms 30 ms be-2401-pe01.ashburn.va.ibone.comcast.net [96.110.37.126] 13 34 ms 33 ms 29 ms 173.167.56.150 14 89 ms * 83 ms 202.97.49.229 15 260 ms 244 ms 247 ms 202.97.98.182 16 238 ms * 235 ms 202.97.12.26 17 240 ms 255 ms 258 ms 202.97.94.121 18 248 ms 244 ms 240 ms 183.56.65.53 19 * * * Request timed out. 20 242 ms * 241 ms 219.133.0.1
Trace complete.
IP 202.97.49.229 is where my packets first hit China.
Whois for 202.97.49.229:
Source: whois.apnic.netIP Address: 202.97.49.229 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.97.32.0 - 202.97.63.255'
% Abuse contact for '202.97.32.0 - 202.97.63.255' is '[email protected]'
inetnum: 202.97.32.0 - 202.97.63.255 netname: CHINANET-BB descr: CHINANET backbone network descr: Data Communication Division descr: China Telecom country: CN admin-c: CH93-AP tech-c: CH93-AP abuse-c: AC1573-AP status: ALLOCATED PORTABLE mnt-by: APNIC-HM mnt-lower: MAINT-CHINANET mnt-routes: MAINT-CHINANET mnt-irt: IRT-CHINANET-CN last-modified: 2020-10-20T01:01:05Z source: APNIC
irt: IRT-CHINANET-CN address: No.31 ,jingrong street,beijing address: 100032 e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CH93-AP tech-c: CH93-AP auth: # Filtered mnt-by: MAINT-CHINANET last-modified: 2010-11-15T00:31:55Z source: APNIC
role: ABUSE CHINANETCN address: No.31 ,jingrong street,beijing address: 100032 country: ZZ phone: +000000000 e-mail: [email protected] admin-c: CH93-AP tech-c: CH93-AP nic-hdl: AC1573-AP remarks: Generated from irt object IRT-CHINANET-CN abuse-mailbox: [email protected] mnt-by: APNIC-ABUSE last-modified: 2020-05-11T23:59:03Z source: APNIC
person: Chinanet Hostmaster nic-hdl: CH93-AP e-mail: [email protected] address: No.31 ,jingrong street,beijing address: 100032 phone: +86-10-58501724 fax-no: +86-10-58501724 country: CN mnt-by: MAINT-CHINANET last-modified: 2014-02-27T03:37:38Z source: APNIC
And finally Whois info for source IP 219.133.0.1:
Source: whois.apnic.netIP Address: 219.133.0.1 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.133.0.0 - 219.133.0.63'
% Abuse contact for '219.133.0.0 - 219.133.0.63' is '[email protected]'
inetnum: 219.133.0.0 - 219.133.0.63 netname: SHENZHEN-HUAWEI-CO country: CN descr: SHENZHEN HUAWEI TECHNOLOGY CO. admin-c: CH158-AP tech-c: CH158-AP status: ASSIGNED NON-PORTABLE mnt-by: MAINT-CHINANET-GD last-modified: 2008-09-04T06:54:15Z source: APNIC
person: CAI HAINING nic-hdl: CH158-AP e-mail: [email protected] address: HUAWEI FOUNDATION,BANTIAN country: CN phone: +86-755-28781363 fax-no: +86-755-28782144 mnt-by: MAINT-CHINANET-GD last-modified: 2008-09-04T07:31:34Z source: APNIC
Exabit B
IP Source 123.125.71.46
Tracing route to baiduspider-123-125-71-46.crawl.baidu.com [123.125.71.46] over a maximum of 30 hops:
1 2 ms 2 ms 3 ms 10.0.0.1 2 20 ms 20 ms 16 ms 96.120.5.181 3 19 ms 20 ms 18 ms 68.86.111.65 4 16 ms 17 ms 19 ms ae-106-ar01.b0atlanta.ga.atlanta.comcast.net [162.151.0.85] 5 19 ms 18 ms * be-33041-cs04.56marietta.ga.ibone.comcast.net [96.110.43.77] 6 24 ms * 26 ms be-1414-cr14.56marietta.ga.ibone.comcast.net [96.110.34.254] 7 36 ms 30 ms 34 ms be-301-cr12.houston.tx.ibone.comcast.net [96.110.32.218] 8 32 ms 32 ms 32 ms be-1412-cs04.houston.tx.ibone.comcast.net [96.110.46.149] 9 35 ms 28 ms 34 ms be-1413-cr13.houston.tx.ibone.comcast.net [96.110.46.154] 10 59 ms 59 ms 56 ms be-302-cr12.losangeles.ca.ibone.comcast.net [96.110.37.190] 11 64 ms 58 ms 57 ms be-1112-cs01.losangeles.ca.ibone.comcast.net [96.110.45.165] 12 63 ms 59 ms 58 ms be-2101-pe01.losangeles.ca.ibone.comcast.net [96.110.44.98] 13 311 ms 304 ms 304 ms 219.158.33.209 14 289 ms 286 ms * 219.158.98.85 15 * 297 ms * 219.158.103.37 16 * 284 ms 283 ms 219.158.8.121 17 293 ms * * 219.158.7.17 18 299 ms 301 ms 289 ms 125.33.186.86 19 * * * Request timed out. 20 * * * Request timed out. 21 * * * Request timed out. 22 * * * Request timed out. 23 * * * Request timed out. 24 * * * Request timed out. 25 * * * Request timed out. 26 * * * Request timed out. 27 * * * Request timed out. 28 * * * Request timed out. 29 * * * Request timed out. 30 * * * Request timed out.
Trace complete.
My pings died at 125.33.186.86 and did not make it all the way there (could be firewalls) but here is the Whois info for that address.
Source: whois.apnic.netIP Address: 125.33.186.86 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '125.33.0.0 - 125.33.255.255'
% Abuse contact for '125.33.0.0 - 125.33.255.255' is '[email protected]'
inetnum: 125.33.0.0 - 125.33.255.255 netname: UNICOM-BJ descr: China Unicom Beijing province network descr: China Unicom country: CN admin-c: CH1302-AP tech-c: SY21-AP mnt-by: APNIC-HM mnt-lower: MAINT-CNCGROUP-BJ mnt-routes: MAINT-CNCGROUP-RR status: ALLOCATED PORTABLE mnt-irt: IRT-CU-CN last-modified: 2013-08-08T23:38:40Z source: APNIC
irt: IRT-CU-CN address: No.21,Financial Street address: Beijing,100033 address: P.R.China e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CH1302-AP tech-c: CH1302-AP auth: # Filtered mnt-by: MAINT-CNCGROUP last-modified: 2017-10-23T05:59:13Z source: APNIC
person: ChinaUnicom Hostmaster nic-hdl: CH1302-AP e-mail: [email protected] address: No.21,Jin-Rong Street address: Beijing,100033 address: P.R.China phone: +86-10-66259764 fax-no: +86-10-66259764 country: CN mnt-by: MAINT-CNCGROUP last-modified: 2017-08-17T06:13:16Z source: APNIC
person: sun ying address: fu xing men nei da jie 97, Xicheng District address: Beijing 100800 country: CN phone: +86-10-66030657 fax-no: +86-10-66078815 e-mail: [email protected] nic-hdl: SY21-AP mnt-by: MAINT-CNCGROUP-BJ last-modified: 2009-06-30T08:42:48Z source: APNIC
% Information related to '125.33.0.0/16AS4808'
route: 125.33.0.0/16 descr: China Unicom Beijing Province Network country: CN origin: AS4808 mnt-by: MAINT-CNCGROUP-RR last-modified: 2016-05-20T01:44:02Z source: APNIC
Whois info for 123.125.71.46
Source: whois.apnic.netIP Address: 123.125.71.46 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '123.125.71.0 - 123.125.71.255'
% Abuse contact for '123.125.71.0 - 123.125.71.255' is '[email protected]'
inetnum: 123.125.71.0 - 123.125.71.255 netname: SADF descr: YBV country: CN admin-c: PLQ15-AP tech-c: PLQ15-AP mnt-by: MAINT-CNCGROUP-BJ status: ASSIGNED NON-PORTABLE last-modified: 2010-08-06T05:48:45Z source: APNIC
person: Pan li qunli address: wu country: CN nic-hdl: PLQ15-AP phone: +86-010-82602212 fax-no: +86-010-84471439 e-mail: [email protected] mnt-by: MAINT-CNCGROUP-BJ last-modified: 2010-08-06T05:48:18Z source: APNIC
% Information related to '123.112.0.0/12AS4808'
route: 123.112.0.0/12 descr: China Unicom Beijing Province Network country: CN origin: AS4808 mnt-by: MAINT-CNCGROUP-RR last-modified: 2016-05-20T01:24:03Z source: APNIC
That's about all I can fit in here due to character limits, but there are THOOOUUUSSAANNNDS more like this and I can't get through them all by myself, but I do plan to do as many as I can. If anyone or any data organization experts know of a cleaner way I can put this together, I would greatly appreciate any help or suggestions if you feel this information would be useful to present to anybody.
God bless!
I saved it as a CSV rather than excel so everyone can view and there would be no worry of macros/malicious files.
https://ufile.io/8qb70gbu
Working on parsing out a script to achieve the OP's goal, but stickying this in case someone who is better than me can do some cooler transforms.
Thank you so much man! This is where I was getting the info associated with the source IP's and can be used to look up the target IP's too to prove they are where Mike and experts are saying they are from. It's just awesome because it lists the companies, potential people, and phone numbers associated with those IP's. https://www.ultratools.com/tools/ipWhoisLookup
you need to use linux, but MacOS will work as well since it is unix. Basically you need a terminal.
Launch a terminal and follow these steps.
navigate to the Desktop directory: type "pwd" hit enter and see where you are you can type "ls" to see what files/sub directories are within the present working directory then type cd ./<path to desktop> [will look something like /Users/<yourusername>/Desktop]
You need to navigate to the Desktop (or location of your choice) to save the output file to that location.
next type "script"
This will save everything you type and the subsequent output into a text file that will be located in the present working directory.
Use the commands "whois <ip address or domain name>" to do a lookup in terminal and also "tracert <ip/domain>" or "traceroute <ip/domain>".
Type "exit" when you are done. The file should then appear on the desktop/wherever you are.
Here's an output example with some stuff removed-
Script started on ******
bash-3.2$ whois 1.1.1.1
% IANA WHOIS server % for more information on IANA, visit http://www.iana.org % This query returned 1 object
refer: whois.apnic.net
inetnum: 1.0.0.0 - 1.255.255.255 organisation: APNIC status: ALLOCATED
whois: whois.apnic.net
changed: 2010-01 source: IANA
whois.apnic.net
% [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '1.1.1.0 - 1.1.1.255'
% Abuse contact for '1.1.1.0 - 1.1.1.255' is '[email protected]'
inetnum: 1.1.1.0 - 1.1.1.255 netname: APNIC-LABS descr: APNIC and Cloudflare DNS Resolver project descr: Routed globally by AS13335/Cloudflare descr: Research prefix for APNIC Labs country: AU org: ORG-ARAD1-AP admin-c: AR302-AP tech-c: AR302-AP abuse-c: AA1412-AP status: ASSIGNED PORTABLE remarks: --------------- remarks: All Cloudflare abuse reporting can be done via remarks: [email protected] remarks: --------------- mnt-by: APNIC-HM mnt-routes: MAINT-AU-APNIC-GM85-AP mnt-irt: IRT-APNICRANDNET-AU last-modified: 2020-07-15T13:10:57Z source: APNIC
irt: IRT-APNICRANDNET-AU address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia e-mail: [email protected] abuse-mailbox: [email protected] admin-c: AR302-AP tech-c: AR302-AP auth: # Filtered remarks: [email protected] was validated on 2020-08-10 mnt-by: MAINT-AU-APNIC-GM85-AP last-modified: 2020-08-10T06:42:59Z source: APNIC
organisation: ORG-ARAD1-AP org-name: APNIC Research and Development country: AU address: 6 Cordelia St phone: +61-7-38583100 fax-no: +61-7-38583199 e-mail: [email protected] mnt-ref: APNIC-HM mnt-by: APNIC-HM last-modified: 2017-10-11T01:28:39Z source: APNIC
role: ABUSE APNICRANDNETAU address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia country: ZZ phone: +000000000 e-mail: [email protected] admin-c: AR302-AP tech-c: AR302-AP nic-hdl: AA1412-AP remarks: Generated from irt object IRT-APNICRANDNET-AU abuse-mailbox: [email protected] mnt-by: APNIC-ABUSE last-modified: 2020-04-20T22:59:46Z source: APNIC
role: APNIC RESEARCH address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia country: AU phone: +61-7-3858-3188 fax-no: +61-7-3858-3199 e-mail: [email protected] nic-hdl: AR302-AP tech-c: AH256-AP admin-c: AH256-AP mnt-by: MAINT-APNIC-AP last-modified: 2018-04-04T04:26:04Z source: APNIC
% Information related to '1.1.1.0/24AS13335'
route: 1.1.1.0/24 origin: AS13335 descr: APNIC Research and Development 6 Cordelia St mnt-by: MAINT-AU-APNIC-GM85-AP last-modified: 2018-03-16T16:58:06Z source: APNIC
% This query was served by the APNIC Whois Service version 1.88.15-SNAPSHOT (WHOIS-US4)
bash-3.2$ tracert [K[Koute 1.1.1.1
traceroute to 1.1.1.1 (1.1.1.1), 64 hops max, 52 byte packets
1 ****** 2.407 ms 0.921 ms 1.234 ms
2 ******
3 ******
4 ******
5 ******
6 one.one.one.one (1.1.1.1) 14.014 ms 33.082 ms 16.217 ms
bash-3.2$ exit exit
Script done on ******
Here's what I found from some of the target IP associations. Some of these don't make sense to me but there's a few that line up with the counties on the list. I've only gone over a fraction of it but here's what I have so far. Would paste in notepad or something cause it comes out looking crazy here.
Target IP's associations
gaslight media go daddy microsoft Pima county AZ Gwinnett county, ga Source: whois.arin.netIP Address: 74.174.32.228Name: BLS-74-174-32-0-24-1006165205Handle: NET-74-174-32-0-1Registration Date: 6/16/10Range: 74.174.32.0-74.174.32.255Customer: GWINNETT COUNTY GOVERNMENT 75 Langley Dr NW AEP - LANCustomer Handle: C02521905Address: 3065 Main Street City: East PointState/Province: GAPostal Code: 30344Country: United States
Icon enterprise AON
Rapid city, MI Source: whois.arin.netIP Address: 216.245.224.78Name: TORCHLAKE-COMHandle: NET-216-245-224-0-1Registration Date: 3/26/08Range: 216.245.224.0-216.245.239.255Org: Chain O' Lakes InternetOrg Handle: CHAINOAddress: 7280 Rapid City Rd. NW PO BOX 100 City: Rapid CityState/Province: MIPostal Code: 49684Country: United States
Cloudflare Indurance international group Amazon technologies, seattle WA Google, mountain view, CA Wiscnet AWS Paantheon A2 Hosting
Clark County, WI Source: whois.arin.netIP Address: 68.185.163.98Name: CLRK-68-185-163-96Handle: NET-68-185-163-96-1Registration Date: 3/24/16Range: 68.185.163.96-68.185.163.111Customer: Clark County CourthouseCustomer Handle: C06076711Address: 517 Court St City: NeillsvilleState/Province: WIPostal Code: 54456Country: United States
I also tried to look up the OUI's for the target MACs and get no results which is odd. It would be helpful if we knew who they belonged to.. but I hit a brick wall there.
This is definitely a case of work smarter, not harder.
We need to get some code-fags up in here to automate this workload.
Good work on the first batch though!
this might help idk but GitHub has all kinds of stuff- recommend getting linux it's a million times better than windows and less spywarish than both windows and macOS.
https://pythonawesome.com/look-up-ip-addresses-registered-and-owned-by-a-specific-organization-for-reconnaissance-purposes/
scanning ports though, if you point that at a .gov and scan those ports you will probably get some attention. AFAIK port scanning is not illegal but it's a first step that a lot of hackers take. When you port scan gov IPs you can expect some level of "wtf is this guy doing" imo.
OK, this requires someone more sober and smarter than me.
I love it! Send me a list of IP addresses and I'll write the script.
I'm just typing down source IP's listed in Mike's video. I don't know where the spreadsheet is that he used in the video so I have to do it the hard way. :p I will work to compile a larger list from the video.
Sounds good - the script is ready. It's crude, but it will collect all the data. I have to crash for the night, but will run the script against whatever IPs you find after church tomorrow.
The data will look like this on the output: "sourceip","netname","country","descr","person","e-mail","address","country","descr" "219.133.0.1","202.97.25.133","CHINANET-BB","CN","CHINANET backbone network","Chinanet Hostmaster","[email protected]","No.31 ,jingrong street,beijing 100032","CN","" "123.125.71.46","219.158.3.29","ChinaUnicom-BACKBONE","CN","Backbone of China Unicom","CNCGroup Hostmaster","[email protected]","No.21,Financial Street Beijing,100033,P.R.China","CN","China Unicom China169 Network"
Well, turns out to be not so great. If you tracert on the Chinese 1.8.x.x IPs, then they stop tracing after the US.
We already have the country of origin of the IP itself. I think the whois on the last good hop won't get us that much after all.
that's common, china has a pretty restrictive firewall. One good way to find a path into china is to look for bot traffic hitting your firewall and checking for CN origin or a chinese company that operates in the US- They do crawl our servers. Those are places you can use to find a route.
For fuck sake, I can barely find the on/off button on my laptop, can't help you folks, lol.
I do apologize, this pasted all wrong D: Please copy and paste into Notepad or Notepad++ so it doesn't look like a jumbled mess.
No apologies necessary. Thank you for doing this.
This can be done in cmd/bash/powershell pretty easily. Do you have a csv with the IPs? I can help.
I found the list here https://www.electionrecords.com/scorecard/vault/r2.htm
Seeing what i can do.
Holy shit this. Okay I think this is it. It just looked a little different from in the video.
Did a bit of digging, found on deepcapture.com which I think is owned by Patrick M. Byrne
This looks like the same dataset used in documentary, with timestamps, intrusion method, etc.
https://www.deepcapture.com/wp-content/uploads/US-Election-Fraud-2020_General.xlsx
NOTE: Did a visual check against documentary, and their "Votes changed" column differs to the file I've linked to, but rest of the data looks good.
I do not have a csv unfortunately. I was pausing Mike's video at intervals where he shows the list of source IP's that attacked and typed some of those down to use as samples. I don't know where the spreadsheet he showed in the video is. D:
built out a csv will sticky it inside here.
Hey guys, just my 2 cents
I think you'll find that nearly all of these trace back to ISPs and not necessarily the actual hackers.
I don't want to dismiss the info but I think the more important info is whether the target IPs correspond to the election hardware (Dominion, ES&S etc.). That would prove that the machines were connected to the internet and were accessed.
Could be grounds for an audit of the machines.
If you don’t get a response, repost this tomorrow when more people are on. This is awesome. I’ve been wanting independent verification.
I think you need a position on Trumps team!
Just feed this list into Nmap (zenmap for you windows users). You can load up a script that will do traceroutes, port scans, read headers and banners and output to csv/xml/grep/text.
protip: Ditch windows.
LOOKS Awesome! Thanks for the Effort!!
Definitely a large undertaking... sorry I cannot help, but wish you luck on this endeavor. Looking forward to more results!!!!
Any target IPs?
u/#Timebomb
Fantastic work by you all here. Great to see all the techfags pulling together !!
Try hitting those IPs on a browser, or ssh or ftp
If FTP works you might be able to log in as ‘anonymous’
“Pede’s Whois Audit of Mike Lindell Election Fraud Evidence IPs”
This is awesome work!
God bless you dear pede!
Nice work.
While I may use a computer to document, I am of no use to help. However, if you need to verbally process your frustration and anxiety related to all of this - I can help with that. Looking forward to a simplified version for those of us who need " Dummies for Understanding Computer program"
it's not that hard we all start somewhere.
Good initial digging, and great follow-up!
Basically this shows, even apart from endpoint data, that IP's listed in Mike's documentary either originate from, or at least travel through, the network space of China -- all of which is at least officially under China's autocratic control.
Understand source IP's are important, but given all the talk about voting machines not being accessible via internet, I'd say the target IP's also need to be validated.
Here's what I found from some of the target IP associations. Some of these don't make sense to me but there's a few that line up with the counties on the list. I've only gone over a fraction of it but here's what I have so far.
Target IP's associations
gaslight media go daddy microsoft Pima county AZ Gwinnett county, ga Source: whois.arin.netIP Address: 74.174.32.228Name: BLS-74-174-32-0-24-1006165205Handle: NET-74-174-32-0-1Registration Date: 6/16/10Range: 74.174.32.0-74.174.32.255Customer: GWINNETT COUNTY GOVERNMENT 75 Langley Dr NW AEP - LANCustomer Handle: C02521905Address: 3065 Main Street City: East PointState/Province: GAPostal Code: 30344Country: United States
Icon enterprise AON
Rapid city, MI Source: whois.arin.netIP Address: 216.245.224.78Name: TORCHLAKE-COMHandle: NET-216-245-224-0-1Registration Date: 3/26/08Range: 216.245.224.0-216.245.239.255Org: Chain O' Lakes InternetOrg Handle: CHAINOAddress: 7280 Rapid City Rd. NW PO BOX 100 City: Rapid CityState/Province: MIPostal Code: 49684Country: United States
Cloudflare Indurance international group Amazon technologies, seattle WA Google, mountain view, CA Wiscnet AWS Paantheon A2 Hosting
Clark County, WI Source: whois.arin.netIP Address: 68.185.163.98Name: CLRK-68-185-163-96Handle: NET-68-185-163-96-1Registration Date: 3/24/16Range: 68.185.163.96-68.185.163.111Customer: Clark County CourthouseCustomer Handle: C06076711Address: 517 Court St City: NeillsvilleState/Province: WIPostal Code: 54456Country: United States
Seems this is a copy of the data: https://www.deepcapture.com/wp-content/uploads/US-Election-Fraud-2020_General.xlsx
The spreadsheet is good, but really you need access to the raw logs, and most importantly, some kind of verification that they're authentic. It's a shame this information wasn't released alongside the documentary. If we had all the raw data, then I certainly could've done something with it.
Within the spreadsheet, if you look at the "SOURCE OWNER" column, you'll see that it will match with the whois description for that IP, so obviously all the work you're trying to do has already been done. May be worth randomly checking a few more to compare, but from the couple I checked, they're correct.
Also, maybe I'm wrong, but I think the trace route output is superfluous. I think the whois details is sufficient. Additionally, you'd need to anonymise/delete your own location there too to avoid giving your own location away.
Don't want to dissuade you, but the only extra value you're getting is the additional whois info that isn't in the spreadsheet....and that's probably already collected by the forensics team Mike Lindell paid for.
Oh I'm sure his cyber forensics team has it all but this was more so to help combat fraud deniers and giving some people the tools to help shove it in their stupid faces if they ever get into an argument with a dumb leftist over it. It's irrefutable proof with names, phone numbers, company associations and locations. The only thing I haven't been able to find is who the OUI's on those MACs belong to. I get no results on the 3 lookup sites I tried. Wonder if they're spoofs or something? Idk
Some of those names in your reply:
Gaslight Media???
Torchlake???
[they] really are gaslighting us. These names can't be a coincidence.
Those were the names associated with some of the target IP's that made no sense to me. Some of the source IP's say stuff like "chinaabusenet" like really? wow
They may say there is no wifi card etc that's fine, but even a bluetooth chip could put a machine online.
Example- use BT to connect voting machine to another machine that has a internet capabilities. It's all the same at the end of the day, radio signals and protocols.
Countries that successfully changed Trump votes:
China -123,907, Germany -18,409, Great Britain -67,033, India -27,909, Sweden -1,116, Switzerland -29,704, Thailand -13,044.
Apparently Russia tried to change -18,445, but was unsuccessful.
Per this list
It shows 859 unique Source_Owners that are tied to 6191 out of 14016 IP addresses from the csv stickied at the top.
If someone gets a good spreadsheet built up, might be able to tie some more together.
I can't help you...but YOU are AWESOM! Not AWESOME cuz thats for the Lord, but you are GREAT...at any rate...THANK YOU Patriot for your diligence! God Bless