So after watching the Mike Lindell documentary, I decided to do a bit of digging into the sources IP's shown on the spreadsheet of data captured on the Dominion voting machines. Now, the cyber experts that obtained the Dominion data probably already know this stuff that I have listed below but to my knowledge it hasn't been presented to the public in such explicit detail. If it has then I apologize and this is a redundant post!
Now lets get into the meat and potatoes.
Leftist fraud deniers could possibly watch the documentary and say some nonsense like "He just made up those IP's! There's no proof they're even real!", well this information shuts that stupid argument down, beats it relentlessly, and buries it next to the economic theories of Karl Marx.
I used the tracert in command prompt (anyone can do this) on several of the source IP's listed in Mike's video to see what other addresses the packets would pass through and if they very well indeed lead to China. (Of course they did) I also used a tool called Whois Ultra to find more detailed information on the companies, people, addresses, and e-mails associated with those IP's.
Note:
Whois Ultra is used commonly in the networking field to find out which ISP owns a circuit, among other things, because they're always trying to get out of paying to fix them for their clients lol.
Exabit A.
**Source IP 219.133.0.1 **
Tracing route to 219.133.0.1 over a maximum of 30 hops
1 3 ms 2 ms 2 ms 10.0.0.1 2 16 ms 15 ms 16 ms 96.120.5.181 3 19 ms 16 ms 18 ms 68.86.111.65 4 17 ms 23 ms 18 ms ae-106-ar01.b0atlanta.ga.atlanta.comcast.net [162.151.0.85] 5 19 ms 19 ms * be-33021-cs02.56marietta.ga.ibone.comcast.net [96.110.43.69] 6 15 ms * 20 ms be-1213-cr13.56marietta.ga.ibone.comcast.net [96.110.34.230] 7 19 ms 18 ms 16 ms be-302-cr11.doraville.ga.ibone.comcast.net [96.110.39.50] 8 19 ms 19 ms 29 ms be-1411-cs04.doraville.ga.ibone.comcast.net [96.110.34.173] 9 17 ms 14 ms 21 ms be-1413-cr13.doraville.ga.ibone.comcast.net [96.110.34.206] 10 31 ms 29 ms 32 ms be-301-cr11.ashburn.va.ibone.comcast.net [96.110.32.2] 11 30 ms 31 ms 33 ms be-1411-cs04.ashburn.va.ibone.comcast.net [96.110.32.117] 12 32 ms 36 ms 30 ms be-2401-pe01.ashburn.va.ibone.comcast.net [96.110.37.126] 13 34 ms 33 ms 29 ms 173.167.56.150 14 89 ms * 83 ms 202.97.49.229 15 260 ms 244 ms 247 ms 202.97.98.182 16 238 ms * 235 ms 202.97.12.26 17 240 ms 255 ms 258 ms 202.97.94.121 18 248 ms 244 ms 240 ms 183.56.65.53 19 * * * Request timed out. 20 242 ms * 241 ms 219.133.0.1
Trace complete.
IP 202.97.49.229 is where my packets first hit China.
Whois for 202.97.49.229:
Source: whois.apnic.netIP Address: 202.97.49.229 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.97.32.0 - 202.97.63.255'
% Abuse contact for '202.97.32.0 - 202.97.63.255' is '[email protected]'
inetnum: 202.97.32.0 - 202.97.63.255 netname: CHINANET-BB descr: CHINANET backbone network descr: Data Communication Division descr: China Telecom country: CN admin-c: CH93-AP tech-c: CH93-AP abuse-c: AC1573-AP status: ALLOCATED PORTABLE mnt-by: APNIC-HM mnt-lower: MAINT-CHINANET mnt-routes: MAINT-CHINANET mnt-irt: IRT-CHINANET-CN last-modified: 2020-10-20T01:01:05Z source: APNIC
irt: IRT-CHINANET-CN address: No.31 ,jingrong street,beijing address: 100032 e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CH93-AP tech-c: CH93-AP auth: # Filtered mnt-by: MAINT-CHINANET last-modified: 2010-11-15T00:31:55Z source: APNIC
role: ABUSE CHINANETCN address: No.31 ,jingrong street,beijing address: 100032 country: ZZ phone: +000000000 e-mail: [email protected] admin-c: CH93-AP tech-c: CH93-AP nic-hdl: AC1573-AP remarks: Generated from irt object IRT-CHINANET-CN abuse-mailbox: [email protected] mnt-by: APNIC-ABUSE last-modified: 2020-05-11T23:59:03Z source: APNIC
person: Chinanet Hostmaster nic-hdl: CH93-AP e-mail: [email protected] address: No.31 ,jingrong street,beijing address: 100032 phone: +86-10-58501724 fax-no: +86-10-58501724 country: CN mnt-by: MAINT-CHINANET last-modified: 2014-02-27T03:37:38Z source: APNIC
And finally Whois info for source IP 219.133.0.1:
Source: whois.apnic.netIP Address: 219.133.0.1 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.133.0.0 - 219.133.0.63'
% Abuse contact for '219.133.0.0 - 219.133.0.63' is '[email protected]'
inetnum: 219.133.0.0 - 219.133.0.63 netname: SHENZHEN-HUAWEI-CO country: CN descr: SHENZHEN HUAWEI TECHNOLOGY CO. admin-c: CH158-AP tech-c: CH158-AP status: ASSIGNED NON-PORTABLE mnt-by: MAINT-CHINANET-GD last-modified: 2008-09-04T06:54:15Z source: APNIC
person: CAI HAINING nic-hdl: CH158-AP e-mail: [email protected] address: HUAWEI FOUNDATION,BANTIAN country: CN phone: +86-755-28781363 fax-no: +86-755-28782144 mnt-by: MAINT-CHINANET-GD last-modified: 2008-09-04T07:31:34Z source: APNIC
Exabit B
IP Source 123.125.71.46
Tracing route to baiduspider-123-125-71-46.crawl.baidu.com [123.125.71.46] over a maximum of 30 hops:
1 2 ms 2 ms 3 ms 10.0.0.1 2 20 ms 20 ms 16 ms 96.120.5.181 3 19 ms 20 ms 18 ms 68.86.111.65 4 16 ms 17 ms 19 ms ae-106-ar01.b0atlanta.ga.atlanta.comcast.net [162.151.0.85] 5 19 ms 18 ms * be-33041-cs04.56marietta.ga.ibone.comcast.net [96.110.43.77] 6 24 ms * 26 ms be-1414-cr14.56marietta.ga.ibone.comcast.net [96.110.34.254] 7 36 ms 30 ms 34 ms be-301-cr12.houston.tx.ibone.comcast.net [96.110.32.218] 8 32 ms 32 ms 32 ms be-1412-cs04.houston.tx.ibone.comcast.net [96.110.46.149] 9 35 ms 28 ms 34 ms be-1413-cr13.houston.tx.ibone.comcast.net [96.110.46.154] 10 59 ms 59 ms 56 ms be-302-cr12.losangeles.ca.ibone.comcast.net [96.110.37.190] 11 64 ms 58 ms 57 ms be-1112-cs01.losangeles.ca.ibone.comcast.net [96.110.45.165] 12 63 ms 59 ms 58 ms be-2101-pe01.losangeles.ca.ibone.comcast.net [96.110.44.98] 13 311 ms 304 ms 304 ms 219.158.33.209 14 289 ms 286 ms * 219.158.98.85 15 * 297 ms * 219.158.103.37 16 * 284 ms 283 ms 219.158.8.121 17 293 ms * * 219.158.7.17 18 299 ms 301 ms 289 ms 125.33.186.86 19 * * * Request timed out. 20 * * * Request timed out. 21 * * * Request timed out. 22 * * * Request timed out. 23 * * * Request timed out. 24 * * * Request timed out. 25 * * * Request timed out. 26 * * * Request timed out. 27 * * * Request timed out. 28 * * * Request timed out. 29 * * * Request timed out. 30 * * * Request timed out.
Trace complete.
My pings died at 125.33.186.86 and did not make it all the way there (could be firewalls) but here is the Whois info for that address.
Source: whois.apnic.netIP Address: 125.33.186.86 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '125.33.0.0 - 125.33.255.255'
% Abuse contact for '125.33.0.0 - 125.33.255.255' is '[email protected]'
inetnum: 125.33.0.0 - 125.33.255.255 netname: UNICOM-BJ descr: China Unicom Beijing province network descr: China Unicom country: CN admin-c: CH1302-AP tech-c: SY21-AP mnt-by: APNIC-HM mnt-lower: MAINT-CNCGROUP-BJ mnt-routes: MAINT-CNCGROUP-RR status: ALLOCATED PORTABLE mnt-irt: IRT-CU-CN last-modified: 2013-08-08T23:38:40Z source: APNIC
irt: IRT-CU-CN address: No.21,Financial Street address: Beijing,100033 address: P.R.China e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CH1302-AP tech-c: CH1302-AP auth: # Filtered mnt-by: MAINT-CNCGROUP last-modified: 2017-10-23T05:59:13Z source: APNIC
person: ChinaUnicom Hostmaster nic-hdl: CH1302-AP e-mail: [email protected] address: No.21,Jin-Rong Street address: Beijing,100033 address: P.R.China phone: +86-10-66259764 fax-no: +86-10-66259764 country: CN mnt-by: MAINT-CNCGROUP last-modified: 2017-08-17T06:13:16Z source: APNIC
person: sun ying address: fu xing men nei da jie 97, Xicheng District address: Beijing 100800 country: CN phone: +86-10-66030657 fax-no: +86-10-66078815 e-mail: [email protected] nic-hdl: SY21-AP mnt-by: MAINT-CNCGROUP-BJ last-modified: 2009-06-30T08:42:48Z source: APNIC
% Information related to '125.33.0.0/16AS4808'
route: 125.33.0.0/16 descr: China Unicom Beijing Province Network country: CN origin: AS4808 mnt-by: MAINT-CNCGROUP-RR last-modified: 2016-05-20T01:44:02Z source: APNIC
Whois info for 123.125.71.46
Source: whois.apnic.netIP Address: 123.125.71.46 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '123.125.71.0 - 123.125.71.255'
% Abuse contact for '123.125.71.0 - 123.125.71.255' is '[email protected]'
inetnum: 123.125.71.0 - 123.125.71.255 netname: SADF descr: YBV country: CN admin-c: PLQ15-AP tech-c: PLQ15-AP mnt-by: MAINT-CNCGROUP-BJ status: ASSIGNED NON-PORTABLE last-modified: 2010-08-06T05:48:45Z source: APNIC
person: Pan li qunli address: wu country: CN nic-hdl: PLQ15-AP phone: +86-010-82602212 fax-no: +86-010-84471439 e-mail: [email protected] mnt-by: MAINT-CNCGROUP-BJ last-modified: 2010-08-06T05:48:18Z source: APNIC
% Information related to '123.112.0.0/12AS4808'
route: 123.112.0.0/12 descr: China Unicom Beijing Province Network country: CN origin: AS4808 mnt-by: MAINT-CNCGROUP-RR last-modified: 2016-05-20T01:24:03Z source: APNIC
That's about all I can fit in here due to character limits, but there are THOOOUUUSSAANNNDS more like this and I can't get through them all by myself, but I do plan to do as many as I can. If anyone or any data organization experts know of a cleaner way I can put this together, I would greatly appreciate any help or suggestions if you feel this information would be useful to present to anybody.
God bless!
I saved it as a CSV rather than excel so everyone can view and there would be no worry of macros/malicious files.
https://ufile.io/8qb70gbu
Working on parsing out a script to achieve the OP's goal, but stickying this in case someone who is better than me can do some cooler transforms.
Thank you so much man! This is where I was getting the info associated with the source IP's and can be used to look up the target IP's too to prove they are where Mike and experts are saying they are from. It's just awesome because it lists the companies, potential people, and phone numbers associated with those IP's. https://www.ultratools.com/tools/ipWhoisLookup
you need to use linux, but MacOS will work as well since it is unix. Basically you need a terminal.
Launch a terminal and follow these steps.
navigate to the Desktop directory: type "pwd" hit enter and see where you are you can type "ls" to see what files/sub directories are within the present working directory then type cd ./<path to desktop> [will look something like /Users/<yourusername>/Desktop]
You need to navigate to the Desktop (or location of your choice) to save the output file to that location.
next type "script"
This will save everything you type and the subsequent output into a text file that will be located in the present working directory.
Use the commands "whois <ip address or domain name>" to do a lookup in terminal and also "tracert <ip/domain>" or "traceroute <ip/domain>".
Type "exit" when you are done. The file should then appear on the desktop/wherever you are.
Here's an output example with some stuff removed-
Script started on ******
bash-3.2$ whois 1.1.1.1
% IANA WHOIS server % for more information on IANA, visit http://www.iana.org % This query returned 1 object
refer: whois.apnic.net
inetnum: 1.0.0.0 - 1.255.255.255 organisation: APNIC status: ALLOCATED
whois: whois.apnic.net
changed: 2010-01 source: IANA
whois.apnic.net
% [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '1.1.1.0 - 1.1.1.255'
% Abuse contact for '1.1.1.0 - 1.1.1.255' is '[email protected]'
inetnum: 1.1.1.0 - 1.1.1.255 netname: APNIC-LABS descr: APNIC and Cloudflare DNS Resolver project descr: Routed globally by AS13335/Cloudflare descr: Research prefix for APNIC Labs country: AU org: ORG-ARAD1-AP admin-c: AR302-AP tech-c: AR302-AP abuse-c: AA1412-AP status: ASSIGNED PORTABLE remarks: --------------- remarks: All Cloudflare abuse reporting can be done via remarks: [email protected] remarks: --------------- mnt-by: APNIC-HM mnt-routes: MAINT-AU-APNIC-GM85-AP mnt-irt: IRT-APNICRANDNET-AU last-modified: 2020-07-15T13:10:57Z source: APNIC
irt: IRT-APNICRANDNET-AU address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia e-mail: [email protected] abuse-mailbox: [email protected] admin-c: AR302-AP tech-c: AR302-AP auth: # Filtered remarks: [email protected] was validated on 2020-08-10 mnt-by: MAINT-AU-APNIC-GM85-AP last-modified: 2020-08-10T06:42:59Z source: APNIC
organisation: ORG-ARAD1-AP org-name: APNIC Research and Development country: AU address: 6 Cordelia St phone: +61-7-38583100 fax-no: +61-7-38583199 e-mail: [email protected] mnt-ref: APNIC-HM mnt-by: APNIC-HM last-modified: 2017-10-11T01:28:39Z source: APNIC
role: ABUSE APNICRANDNETAU address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia country: ZZ phone: +000000000 e-mail: [email protected] admin-c: AR302-AP tech-c: AR302-AP nic-hdl: AA1412-AP remarks: Generated from irt object IRT-APNICRANDNET-AU abuse-mailbox: [email protected] mnt-by: APNIC-ABUSE last-modified: 2020-04-20T22:59:46Z source: APNIC
role: APNIC RESEARCH address: PO Box 3646 address: South Brisbane, QLD 4101 address: Australia country: AU phone: +61-7-3858-3188 fax-no: +61-7-3858-3199 e-mail: [email protected] nic-hdl: AR302-AP tech-c: AH256-AP admin-c: AH256-AP mnt-by: MAINT-APNIC-AP last-modified: 2018-04-04T04:26:04Z source: APNIC
% Information related to '1.1.1.0/24AS13335'
route: 1.1.1.0/24 origin: AS13335 descr: APNIC Research and Development 6 Cordelia St mnt-by: MAINT-AU-APNIC-GM85-AP last-modified: 2018-03-16T16:58:06Z source: APNIC
% This query was served by the APNIC Whois Service version 1.88.15-SNAPSHOT (WHOIS-US4)
bash-3.2$ tracert [K[Koute 1.1.1.1
traceroute to 1.1.1.1 (1.1.1.1), 64 hops max, 52 byte packets
1 ****** 2.407 ms 0.921 ms 1.234 ms
2 ******
3 ******
4 ******
5 ******
6 one.one.one.one (1.1.1.1) 14.014 ms 33.082 ms 16.217 ms
bash-3.2$ exit exit
Script done on ******
Here's what I found from some of the target IP associations. Some of these don't make sense to me but there's a few that line up with the counties on the list. I've only gone over a fraction of it but here's what I have so far. Would paste in notepad or something cause it comes out looking crazy here.
Target IP's associations
gaslight media go daddy microsoft Pima county AZ Gwinnett county, ga Source: whois.arin.netIP Address: 74.174.32.228Name: BLS-74-174-32-0-24-1006165205Handle: NET-74-174-32-0-1Registration Date: 6/16/10Range: 74.174.32.0-74.174.32.255Customer: GWINNETT COUNTY GOVERNMENT 75 Langley Dr NW AEP - LANCustomer Handle: C02521905Address: 3065 Main Street City: East PointState/Province: GAPostal Code: 30344Country: United States
Icon enterprise AON
Rapid city, MI Source: whois.arin.netIP Address: 216.245.224.78Name: TORCHLAKE-COMHandle: NET-216-245-224-0-1Registration Date: 3/26/08Range: 216.245.224.0-216.245.239.255Org: Chain O' Lakes InternetOrg Handle: CHAINOAddress: 7280 Rapid City Rd. NW PO BOX 100 City: Rapid CityState/Province: MIPostal Code: 49684Country: United States
Cloudflare Indurance international group Amazon technologies, seattle WA Google, mountain view, CA Wiscnet AWS Paantheon A2 Hosting
Clark County, WI Source: whois.arin.netIP Address: 68.185.163.98Name: CLRK-68-185-163-96Handle: NET-68-185-163-96-1Registration Date: 3/24/16Range: 68.185.163.96-68.185.163.111Customer: Clark County CourthouseCustomer Handle: C06076711Address: 517 Court St City: NeillsvilleState/Province: WIPostal Code: 54456Country: United States
I also tried to look up the OUI's for the target MACs and get no results which is odd. It would be helpful if we knew who they belonged to.. but I hit a brick wall there.