8/11/2023 0 Comments Ip locator address![]() ![]() I have recently have been a victim of id theft. Their microsoft365 for enterprises is recklessly insecure, and no guard rails nor even a number to call to complain!! ![]() Would be nice if Microsoft would actually honor their promise to provide security. I am tracking down as many as I can, attempting to triangulate from locations the identities. I am now gone several months, and STILL, I find unknown IP addresses accessed my personal microsoft account twice, my adobe cloud, and LinkedIn AGAIN. The IT department provides super administrator privileges to bad actors, one of whom is a convicted felon - with access to K-12 students!! Not surprisingly after I blew whistle on the fraud one or more of these individuals, using mobile device management software, coupled with LinkedIn (a microsoft data sharing partner, microsoft azure and sharepointe, to load spearware on my home computer and phone, and have accessed my passwords and emptied my personal drives of evidence. This is an educational institution engaging in fraudulent diversion of public funds. Microsoft365 for enterprise is a disaster. I have no neighbors close no storage that I could go and use the phone and no one to help me with what’s happening if there’s anything that you know about this situation at appreciate anything at all thank you so much. I’m almost certain that as he was jailbroken or hacked in someway because it didn’t work I was unable to get into it because I forgot the pass code or so it said I did and then the next morning, it was like a brand new phone I was able to choose a country and all of that and treat it like a brand new phone. I’m currently using a 13 universal got an SE. I just know that something is seriously wrong and I’m going to start reaching out and trying to help find somebody to help me Because our home Internet is in his name as well as my cell phone and I’m completely dependent on him and starting to get really scared. I did some thing called a trace route on the target host and it said that it had 40 hops whatever that means but it was unreachable. All I did was use an app called fing and got the up address of his printer which as something called a aMAC VENDEr-Hon Hai Precision a net bios name of BRWC48E8F20E33B and snmp description of Brother NC-330w, Firmware Ver.0.01 ,MID 8CA-T17-001. ![]() Please buy me a coffee or donate to help with hosting if you find it useful.Hey there, I know very little about all of this stuff but I keep seeing the name Brian, which is the name of my boyfriend, who I believe is stalking me with the computers and everything else. Mostly it's free because I wish this existed for free when I needed it. You can filter out certain countries to raise the SNR (say, removing all US IPs when hunting for traffic that doesn't make sense to your Montana business's website). It then checks them against an IP-to-geolocation database and returns results. takes any text input and combs through looking for patterns that match valid IPv4 addresses. Suddenly it was easy to see the botnet poking at logins from all across the world - and drop traffic from them. Instead, I put this tool together to take raw output from netstat, fail2ban logs, or any other copy/paste text source and not only clean it for me, but do a fast lookup to see where these IPs were coming from. Email accounts were being compromised regularly, but I didn't have the budget (either cash or man hours) to really fix the problem. I was supporting an old system that ran email for several thousand users, had no password policies, and generally had no support. they want you to copy paste IP addresses into a web form, one by one? Don't they know you have tens, hundreds, maybe thousands of entries to check? There isn't time for this nonsense. So you take the output from the powerful CLI tool and put it in your choice of power-text editor, spend precious minutes cleaning it up, and then. Things get hectic, and the tools avaialble don't always help narrow down malicious connections, let alone format their output in a prepackaged way to highlight strange connections Frustration! Being on the receiving end of a distributed penetration probe - whether it is aimed at your email system, shell login, or any other public-facing service - can be a harrowing experience.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |