So after watching the Mike Lindell documentary, I decided to do a bit of digging into the sources IP's shown on the spreadsheet of data captured on the Dominion voting machines. Now, the cyber experts that obtained the Dominion data probably already know this stuff that I have listed below but to my knowledge it hasn't been presented to the public in such explicit detail. If it has then I apologize and this is a redundant post!
Now lets get into the meat and potatoes.
Leftist fraud deniers could possibly watch the documentary and say some nonsense like "He just made up those IP's! There's no proof they're even real!", well this information shuts that stupid argument down, beats it relentlessly, and buries it next to the economic theories of Karl Marx.
I used the tracert in command prompt (anyone can do this) on several of the source IP's listed in Mike's video to see what other addresses the packets would pass through and if they very well indeed lead to China. (Of course they did) I also used a tool called Whois Ultra to find more detailed information on the companies, people, addresses, and e-mails associated with those IP's.
Note:
Whois Ultra is used commonly in the networking field to find out which ISP owns a circuit, among other things, because they're always trying to get out of paying to fix them for their clients lol.
Exabit A.
**Source IP 219.133.0.1 **
Tracing route to 219.133.0.1 over a maximum of 30 hops
1 3 ms 2 ms 2 ms 10.0.0.1 2 16 ms 15 ms 16 ms 96.120.5.181 3 19 ms 16 ms 18 ms 68.86.111.65 4 17 ms 23 ms 18 ms ae-106-ar01.b0atlanta.ga.atlanta.comcast.net [162.151.0.85] 5 19 ms 19 ms * be-33021-cs02.56marietta.ga.ibone.comcast.net [96.110.43.69] 6 15 ms * 20 ms be-1213-cr13.56marietta.ga.ibone.comcast.net [96.110.34.230] 7 19 ms 18 ms 16 ms be-302-cr11.doraville.ga.ibone.comcast.net [96.110.39.50] 8 19 ms 19 ms 29 ms be-1411-cs04.doraville.ga.ibone.comcast.net [96.110.34.173] 9 17 ms 14 ms 21 ms be-1413-cr13.doraville.ga.ibone.comcast.net [96.110.34.206] 10 31 ms 29 ms 32 ms be-301-cr11.ashburn.va.ibone.comcast.net [96.110.32.2] 11 30 ms 31 ms 33 ms be-1411-cs04.ashburn.va.ibone.comcast.net [96.110.32.117] 12 32 ms 36 ms 30 ms be-2401-pe01.ashburn.va.ibone.comcast.net [96.110.37.126] 13 34 ms 33 ms 29 ms 173.167.56.150 14 89 ms * 83 ms 202.97.49.229 15 260 ms 244 ms 247 ms 202.97.98.182 16 238 ms * 235 ms 202.97.12.26 17 240 ms 255 ms 258 ms 202.97.94.121 18 248 ms 244 ms 240 ms 183.56.65.53 19 * * * Request timed out. 20 242 ms * 241 ms 219.133.0.1
Trace complete.
IP 202.97.49.229 is where my packets first hit China.
Whois for 202.97.49.229:
Source: whois.apnic.netIP Address: 202.97.49.229 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '202.97.32.0 - 202.97.63.255'
% Abuse contact for '202.97.32.0 - 202.97.63.255' is '[email protected]'
inetnum: 202.97.32.0 - 202.97.63.255 netname: CHINANET-BB descr: CHINANET backbone network descr: Data Communication Division descr: China Telecom country: CN admin-c: CH93-AP tech-c: CH93-AP abuse-c: AC1573-AP status: ALLOCATED PORTABLE mnt-by: APNIC-HM mnt-lower: MAINT-CHINANET mnt-routes: MAINT-CHINANET mnt-irt: IRT-CHINANET-CN last-modified: 2020-10-20T01:01:05Z source: APNIC
irt: IRT-CHINANET-CN address: No.31 ,jingrong street,beijing address: 100032 e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CH93-AP tech-c: CH93-AP auth: # Filtered mnt-by: MAINT-CHINANET last-modified: 2010-11-15T00:31:55Z source: APNIC
role: ABUSE CHINANETCN address: No.31 ,jingrong street,beijing address: 100032 country: ZZ phone: +000000000 e-mail: [email protected] admin-c: CH93-AP tech-c: CH93-AP nic-hdl: AC1573-AP remarks: Generated from irt object IRT-CHINANET-CN abuse-mailbox: [email protected] mnt-by: APNIC-ABUSE last-modified: 2020-05-11T23:59:03Z source: APNIC
person: Chinanet Hostmaster nic-hdl: CH93-AP e-mail: [email protected] address: No.31 ,jingrong street,beijing address: 100032 phone: +86-10-58501724 fax-no: +86-10-58501724 country: CN mnt-by: MAINT-CHINANET last-modified: 2014-02-27T03:37:38Z source: APNIC
And finally Whois info for source IP 219.133.0.1:
Source: whois.apnic.netIP Address: 219.133.0.1 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '219.133.0.0 - 219.133.0.63'
% Abuse contact for '219.133.0.0 - 219.133.0.63' is '[email protected]'
inetnum: 219.133.0.0 - 219.133.0.63 netname: SHENZHEN-HUAWEI-CO country: CN descr: SHENZHEN HUAWEI TECHNOLOGY CO. admin-c: CH158-AP tech-c: CH158-AP status: ASSIGNED NON-PORTABLE mnt-by: MAINT-CHINANET-GD last-modified: 2008-09-04T06:54:15Z source: APNIC
person: CAI HAINING nic-hdl: CH158-AP e-mail: [email protected] address: HUAWEI FOUNDATION,BANTIAN country: CN phone: +86-755-28781363 fax-no: +86-755-28782144 mnt-by: MAINT-CHINANET-GD last-modified: 2008-09-04T07:31:34Z source: APNIC
Exabit B
IP Source 123.125.71.46
Tracing route to baiduspider-123-125-71-46.crawl.baidu.com [123.125.71.46] over a maximum of 30 hops:
1 2 ms 2 ms 3 ms 10.0.0.1 2 20 ms 20 ms 16 ms 96.120.5.181 3 19 ms 20 ms 18 ms 68.86.111.65 4 16 ms 17 ms 19 ms ae-106-ar01.b0atlanta.ga.atlanta.comcast.net [162.151.0.85] 5 19 ms 18 ms * be-33041-cs04.56marietta.ga.ibone.comcast.net [96.110.43.77] 6 24 ms * 26 ms be-1414-cr14.56marietta.ga.ibone.comcast.net [96.110.34.254] 7 36 ms 30 ms 34 ms be-301-cr12.houston.tx.ibone.comcast.net [96.110.32.218] 8 32 ms 32 ms 32 ms be-1412-cs04.houston.tx.ibone.comcast.net [96.110.46.149] 9 35 ms 28 ms 34 ms be-1413-cr13.houston.tx.ibone.comcast.net [96.110.46.154] 10 59 ms 59 ms 56 ms be-302-cr12.losangeles.ca.ibone.comcast.net [96.110.37.190] 11 64 ms 58 ms 57 ms be-1112-cs01.losangeles.ca.ibone.comcast.net [96.110.45.165] 12 63 ms 59 ms 58 ms be-2101-pe01.losangeles.ca.ibone.comcast.net [96.110.44.98] 13 311 ms 304 ms 304 ms 219.158.33.209 14 289 ms 286 ms * 219.158.98.85 15 * 297 ms * 219.158.103.37 16 * 284 ms 283 ms 219.158.8.121 17 293 ms * * 219.158.7.17 18 299 ms 301 ms 289 ms 125.33.186.86 19 * * * Request timed out. 20 * * * Request timed out. 21 * * * Request timed out. 22 * * * Request timed out. 23 * * * Request timed out. 24 * * * Request timed out. 25 * * * Request timed out. 26 * * * Request timed out. 27 * * * Request timed out. 28 * * * Request timed out. 29 * * * Request timed out. 30 * * * Request timed out.
Trace complete.
My pings died at 125.33.186.86 and did not make it all the way there (could be firewalls) but here is the Whois info for that address.
Source: whois.apnic.netIP Address: 125.33.186.86 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '125.33.0.0 - 125.33.255.255'
% Abuse contact for '125.33.0.0 - 125.33.255.255' is '[email protected]'
inetnum: 125.33.0.0 - 125.33.255.255 netname: UNICOM-BJ descr: China Unicom Beijing province network descr: China Unicom country: CN admin-c: CH1302-AP tech-c: SY21-AP mnt-by: APNIC-HM mnt-lower: MAINT-CNCGROUP-BJ mnt-routes: MAINT-CNCGROUP-RR status: ALLOCATED PORTABLE mnt-irt: IRT-CU-CN last-modified: 2013-08-08T23:38:40Z source: APNIC
irt: IRT-CU-CN address: No.21,Financial Street address: Beijing,100033 address: P.R.China e-mail: [email protected] abuse-mailbox: [email protected] admin-c: CH1302-AP tech-c: CH1302-AP auth: # Filtered mnt-by: MAINT-CNCGROUP last-modified: 2017-10-23T05:59:13Z source: APNIC
person: ChinaUnicom Hostmaster nic-hdl: CH1302-AP e-mail: [email protected] address: No.21,Jin-Rong Street address: Beijing,100033 address: P.R.China phone: +86-10-66259764 fax-no: +86-10-66259764 country: CN mnt-by: MAINT-CNCGROUP last-modified: 2017-08-17T06:13:16Z source: APNIC
person: sun ying address: fu xing men nei da jie 97, Xicheng District address: Beijing 100800 country: CN phone: +86-10-66030657 fax-no: +86-10-66078815 e-mail: [email protected] nic-hdl: SY21-AP mnt-by: MAINT-CNCGROUP-BJ last-modified: 2009-06-30T08:42:48Z source: APNIC
% Information related to '125.33.0.0/16AS4808'
route: 125.33.0.0/16 descr: China Unicom Beijing Province Network country: CN origin: AS4808 mnt-by: MAINT-CNCGROUP-RR last-modified: 2016-05-20T01:44:02Z source: APNIC
Whois info for 123.125.71.46
Source: whois.apnic.netIP Address: 123.125.71.46 % [whois.apnic.net] % Whois data copyright terms http://www.apnic.net/db/dbcopyright.html
% Information related to '123.125.71.0 - 123.125.71.255'
% Abuse contact for '123.125.71.0 - 123.125.71.255' is '[email protected]'
inetnum: 123.125.71.0 - 123.125.71.255 netname: SADF descr: YBV country: CN admin-c: PLQ15-AP tech-c: PLQ15-AP mnt-by: MAINT-CNCGROUP-BJ status: ASSIGNED NON-PORTABLE last-modified: 2010-08-06T05:48:45Z source: APNIC
person: Pan li qunli address: wu country: CN nic-hdl: PLQ15-AP phone: +86-010-82602212 fax-no: +86-010-84471439 e-mail: [email protected] mnt-by: MAINT-CNCGROUP-BJ last-modified: 2010-08-06T05:48:18Z source: APNIC
% Information related to '123.112.0.0/12AS4808'
route: 123.112.0.0/12 descr: China Unicom Beijing Province Network country: CN origin: AS4808 mnt-by: MAINT-CNCGROUP-RR last-modified: 2016-05-20T01:24:03Z source: APNIC
That's about all I can fit in here due to character limits, but there are THOOOUUUSSAANNNDS more like this and I can't get through them all by myself, but I do plan to do as many as I can. If anyone or any data organization experts know of a cleaner way I can put this together, I would greatly appreciate any help or suggestions if you feel this information would be useful to present to anybody.
God bless!
Understand source IP's are important, but given all the talk about voting machines not being accessible via internet, I'd say the target IP's also need to be validated.
Here's what I found from some of the target IP associations. Some of these don't make sense to me but there's a few that line up with the counties on the list. I've only gone over a fraction of it but here's what I have so far.
Target IP's associations
gaslight media go daddy microsoft Pima county AZ Gwinnett county, ga Source: whois.arin.netIP Address: 74.174.32.228Name: BLS-74-174-32-0-24-1006165205Handle: NET-74-174-32-0-1Registration Date: 6/16/10Range: 74.174.32.0-74.174.32.255Customer: GWINNETT COUNTY GOVERNMENT 75 Langley Dr NW AEP - LANCustomer Handle: C02521905Address: 3065 Main Street City: East PointState/Province: GAPostal Code: 30344Country: United States
Icon enterprise AON
Rapid city, MI Source: whois.arin.netIP Address: 216.245.224.78Name: TORCHLAKE-COMHandle: NET-216-245-224-0-1Registration Date: 3/26/08Range: 216.245.224.0-216.245.239.255Org: Chain O' Lakes InternetOrg Handle: CHAINOAddress: 7280 Rapid City Rd. NW PO BOX 100 City: Rapid CityState/Province: MIPostal Code: 49684Country: United States
Cloudflare Indurance international group Amazon technologies, seattle WA Google, mountain view, CA Wiscnet AWS Paantheon A2 Hosting
Clark County, WI Source: whois.arin.netIP Address: 68.185.163.98Name: CLRK-68-185-163-96Handle: NET-68-185-163-96-1Registration Date: 3/24/16Range: 68.185.163.96-68.185.163.111Customer: Clark County CourthouseCustomer Handle: C06076711Address: 517 Court St City: NeillsvilleState/Province: WIPostal Code: 54456Country: United States
Seems this is a copy of the data: https://www.deepcapture.com/wp-content/uploads/US-Election-Fraud-2020_General.xlsx
The spreadsheet is good, but really you need access to the raw logs, and most importantly, some kind of verification that they're authentic. It's a shame this information wasn't released alongside the documentary. If we had all the raw data, then I certainly could've done something with it.
Within the spreadsheet, if you look at the "SOURCE OWNER" column, you'll see that it will match with the whois description for that IP, so obviously all the work you're trying to do has already been done. May be worth randomly checking a few more to compare, but from the couple I checked, they're correct.
Also, maybe I'm wrong, but I think the trace route output is superfluous. I think the whois details is sufficient. Additionally, you'd need to anonymise/delete your own location there too to avoid giving your own location away.
Don't want to dissuade you, but the only extra value you're getting is the additional whois info that isn't in the spreadsheet....and that's probably already collected by the forensics team Mike Lindell paid for.
Oh I'm sure his cyber forensics team has it all but this was more so to help combat fraud deniers and giving some people the tools to help shove it in their stupid faces if they ever get into an argument with a dumb leftist over it. It's irrefutable proof with names, phone numbers, company associations and locations. The only thing I haven't been able to find is who the OUI's on those MACs belong to. I get no results on the 3 lookup sites I tried. Wonder if they're spoofs or something? Idk
Some of those names in your reply:
Gaslight Media???
Torchlake???
[they] really are gaslighting us. These names can't be a coincidence.
Those were the names associated with some of the target IP's that made no sense to me. Some of the source IP's say stuff like "chinaabusenet" like really? wow
They may say there is no wifi card etc that's fine, but even a bluetooth chip could put a machine online.
Example- use BT to connect voting machine to another machine that has a internet capabilities. It's all the same at the end of the day, radio signals and protocols.