WhoIs Perfect-ED-Store.com

Buying Prescription Drugs Online Scam Alert 1
May Be Dangerous
Says Drug Enforcement Administration


DEA Logo - Buying Proscription Drugs

Click Here
National Association of Boards of Pharmacy (NABP)

Warning

“The Canadian Pharmacy, Canadian/European Pharmacy”, “Canadian Healthcare” and “US Drugstore” are brands of one of the most disgusting illegal online pharmacy group well organized CRIMINAL OPERATION of all times. “GREED” is the driving force behind this operation. Don’t let them fool you. They will never send you any genuine drugs. If they ever send anything at all, it may consist of literally anything from sugar to wall plaster, and they certainly don’t care that you will endanger your health by taking those dangerous counterfeit drugs.

Behind The Online Pharmacy

Today a shadowy, transnational network of illicit drug manufacturers, traders, doctors, Web site operators, spammers and criminals makes up the online pharmacy world.

Buying Medication Online Can Be Safe

There are many options out there when it comes to buying medication online. We have looked at websites after websites. Some sites feature offshore pharmacies that do not require a prior prescription. Others feature licensed pharmacies that do require a prescription from your doctor.
Before making a purchase that can effect your health, we strongly recommend that you consult your physician & DO NOT self-medicate. Ordering medication online can be a safe, money-saving experience. When done through licensed online pharmacies that require a prescription, you can be assured that the medication you get is exactly what you need to treat your ailments.

Department of Justice – Ryan Haight Act
Read More Health Canada


  • Generic-Pharmacy.net
  • Directpharma.net
  • TrustedTabs.com
  • EDSelection.com
  • Topills.com
  • 4rx.com
  • Half-Price-Pharmacy.com
  • BMPharmacy.com
  • XLPharmacy.com
  • Usonlinerx.net

Address lookup

canonical name perfect-ed-store.com.
aliases
addresses 193.104.12.109

Domain Whois record

Queried whois.internic.net with “dom perfect-ed-store.com”…
Domain Name: PERFECT-ED-STORE.COM
Registrar: REALTIME REGISTER BV
Whois Server: whois.yoursrs.com
Referral URL: http://www.realtimeregister.com
Name Server: NS1.STIMUL-MEDIA.COM
Name Server: NS2.STIMUL-MEDIA.COM
Status: clientTransferProhibited
Updated Date: 13-aug-2010
Creation Date: 02-sep-2008
Expiration Date: 02-sep-2012

Last update of whois database: Thu, 30 Sep 2010 06:52:05 UTC
Queried whois.yoursrs.com with “perfect-ed-store.com”…

Domain Name:perfect-ed-store.com
Name Server:ns1.stimul-media.com
Name Server:ns2.stimul-media.com
Created On:2010-08-13
Last Updated On:2010-08-13
Expiration Date:2012-09-02
Dealer:stimul

Registrant ID:stimul
Registrant Name:Vitaly Petrov
Registrant Organization:STIMUL-MEDIA.COM
Registrant Street1:Petrozavodskaya st, 16
Registrant Street2:
Registrant Street3:
Registrant City:Moscow
Registrant State/Province:
Registrant Postal Code:125414
Registrant Country:RU
Registrant Phone:+7.9160248086
Registrant Fax:
Registrant Email:vitalypetrov76@yahoo.com

Admin ID:stimul
Admin Name:Vitaly Petrov
Admin Organization:STIMUL-MEDIA.COM
Admin Street1:Petrozavodskaya st, 16
Admin Street2:
Admin Street3:
Admin City:Moscow
Admin State/Province:
Admin Postal Code:125414
Admin Country:RU
Admin Phone:+7.9160248086
Admin Fax:
Admin Email:vitalypetrov76@yahoo.com

Billing ID:stimul
Billing Name:Vitaly Petrov
Billing Organization:STIMUL-MEDIA.COM
Billing Street1:Petrozavodskaya st, 16
Billing Street2:
Billing Street3:
Billing City:Moscow
Billing State/Province:
Billing Postal Code:125414
Billing Country:RU
Billing Phone:+7.9160248086
Billing Fax:
Billing Email:vitalypetrov76@yahoo.com

Tech ID:stimul
Tech Name:Vitaly Petrov
Tech Organization:STIMUL-MEDIA.COM
Tech Street1:Petrozavodskaya st, 16
Tech Street2:
Tech Street3:
Tech City:Moscow
Tech State/Province:
Tech Postal Code:125414
Tech Country:RU
Tech Phone:+7.9160248086
Tech Fax:
Tech Email:vitalypetrov76@yahoo.com

Network Whois record

Queried whois.ripe.net with “-B 193.104.12.109″…
Information related to ‘193.104.12.0 – 193.104.12.255’

inetnum: 193.104.12.0 – 193.104.12.255
netname: Aprel
descr: PP “Aprel”
descr: United Panama-Netherlands analytic center “Aprel”
descr: The Netherlands route point
country: PA
org: ORG-PA341-RIPE
remarks: Abuse notifications to: gucci@aprelcenter.org
admin-c: TW1930-RIPE
tech-c: AG1829-RIPE
status: ASSIGNED PI
mnt-by: RIPE-NCC-END-MNT
mnt-lower: RIPE-NCC-END-MNT
mnt-by: APREL-MNT
mnt-routes: APREL-MNT
mnt-routes: CAPITAL-MNT
mnt-domains: APREL-MNT
changed: gucci@aprelcenter.org 20090930
changed: info@aprelcenter.org 20091103
source: RIPE

organisation: ORG-PA341-RIPE
org-name: PP “Aprel”
abuse-mailbox: abuse@s49873.org
org-type: OTHER
address: El cangrejo, 60, Panama city, Panama
e-mail: info@s49873.org
admin-c: DS935-RIPE
tech-c: DS935-RIPE
mnt-ref: APREL-MNT
mnt-by: APREL-MNT
changed: info@s49873.org 20090929
changed: info@s49873.org 20100804
source: RIPE

person: Thomas Wouder
address: NL-2585 AA Naaldwijk, Postbus 50, The Netherlands
e-mail: info@aprelcenter.org
mnt-by: APREL-MNT
phone: +31 175 641440
nic-hdl: TW1930-RIPE
changed: info@aprelcenter.org 20091103
source: RIPE

person: Adriano Gucci
address: Panama city, Panama
address: El cangrejo, 60
mnt-by: APREL-MNT
abuse-mailbox: gucci@aprelcenter.org
phone: +507-841-35-46
nic-hdl: AG1829-RIPE
changed: gucci@aprelcenter.org 20091008
source: RIPE

% Information related to ‘193.104.12.0/24AS49829’

route: 193.104.12.0/24
descr: CAPITAL-COM
origin: AS49829
mnt-by: CAPITAL-MNT
changed: admin@expertz.ro 20100515
source: RIPE

DNS records

DNS query for 109.12.104.193.in-addr.arpa failed: WouldBlock

name class type data time to live
perfect-ed-store.com IN A 193.104.12.109 600s (00:10:00)
perfect-ed-store.com IN SOA
server: ns1.stimul-media.com
email: root.stimul-media.com
serial: 2010763161
refresh: 3600
retry: 900
expire: 604800
minimum ttl: 1200
600s (00:10:00)
perfect-ed-store.com IN NS ns1.stimul-media.com 600s (00:10:00)
perfect-ed-store.com IN NS ns2.stimul-media.com 600s (00:10:00)

— end —

WhoIs Salezhelp.com

Buying Prescription Drugs Online May Be Dangerous Says
Drug Enforcement Administration
Scam Alert 1

DEA Logo - Buying Proscription Drugs

National Association of Boards of Pharmacy (NABP)
Warning

“The Canadian Pharmacy, Canadian/European Pharmacy”, “Canadian Healthcare” and “US Drugstore” are brands of one of the most disgusting illegal online pharmacy group well organized CRIMINAL OPERATION of all times. “GREED” is the driving force behind this operation. Don’t let them fool you. They will never send you any genuine drugs. If they ever send anything at all, it may consist of literally anything from sugar to wall plaster, and they certainly don’t care that you will endanger your health by taking those dangerous counterfeit drugs.

Who's Behind Online Pharmacy 

Today a shadowy, transnational network of illicit drug manufacturers, traders, doctors, Web site operators, spammers and criminals makes up the online pharmacy world.

Buying Medication Online Can Be Safe

There are many options out there when it comes to buying medication online. We have looked at websites after websites. Some sites feature offshore pharmacies that do not require a prior prescription. Others feature licensed pharmacies that do require a prescription from your doctor.
Before making a purchase that can effect your health, we strongly recommend that you consult your physician & DO NOT self-medicate. Ordering medication online can be a safe, money-saving experience. When done through licensed online pharmacies that require a prescription, you can be assured that the medication you get is exactly what you need to treat your ailments.


They cheated on me. Took myhe money and never sent any thing.
I am gonna do whatever it takes to damage their website sending emails to discredit them

They have got 3 websites all with the same numbers
They run it from India

all fake

they will answer your email
they have online customer service
they pick up the phone

But they will cheat you in the end all fake

866-417-5821

Thats Fraud !!!


 

salezhelp.com Cy Erlend heimil online pharmacy Internet

I went to an online Pharmacy I’ve used in the past with no problems what so ever, I noted while online to my credit union debit card account the next day the company I’m complaining about had debited over $205. from my checking account. I have NEVER been on the salezhelp.com website, I’m not even sure what they sell.

I logged onto their site to send them an email asking just what this unauthorized debit was for “no response”. I noted while exploring their website searching for a physical address and phone number, I stumbled across 5-7 letters from customers complaining about this very same event, only difference was the debit amounts were all different.

I suspected at this moment in time either salezhelp hacked onto my legitimate pharmacy website or my legitimate pharmacy site sold my debit card info to salezhelp.com.

It has been 3 days now with no reply to my email.

Clearly this is a front operation for creditcard debit card rip offs.

 



Address lookup

 

canonical name salezhelp.com.
aliases
addresses 82.103.130.171

Domain Whois record

Queried whois.internic.net with “dom salezhelp.com
Domain Name: SALEZHELP.COM
Registrar: KEY-SYSTEMS GMBH
Whois Server: whois.rrpproxy.net
Referral URL: http://www.key-systems.net
Name Server: ALPHA.DNSSKI.COM
Name Server: BETA.DNSSKI.COM
Name Server: OMEGA.DNSSKI.COM
Status: ok
Updated Date: 05-may-2010
Creation Date: 25-jan-2008
Expiration Date: 25-jan-2014

Last update of whois ddatabase: Thu, 30 Sep 2010 06:25:07 UTC
Queried whois.rrpproxy.net with “salezhelp.com”…
DOMAIN: WWW.SALEZHELP.COM

RSP: domaindiscount24.com
URL: http://www.dd24.net

nameserver: alpha.dnsski.com
nameserver: beta.dnsski.com
nameserver: omega.dnsski.com

Network Whois record

Queried whois.ripe.net with “-B 82.103.130.171″…
Information related to ‘82.103.128.0 – 82.103.143.255’

inetnum: 82.103.128.0 – 82.103.143.255
netname: EASYSPEEDY-NETWORK
remarks: In case of abuse please contact abuse@easyspeedy.com
descr: EASYSPEEDY external network
country: DK
admin-c: LL1129-RIPE
tech-c: PL3462-RIPE
status: ASSIGNED PA
notify: hostmaster@easyspeedy.com
mnt-by: easyspeedy
mnt-lower: easyspeedy
mnt-routes: easyspeedy
changed: lise@easyspeedy.com 20040519
changed: lise@easyspeedy.com 20061213
source: RIPE

person: Lise Lerche
address: H.sterk.bvej 33
phone: +45 45 94 14 01
fax-no: +45 48 48 03 35
e-mail: lise@easyspeedy.com
nic-hdl: LL1129-RIPE
notify: hostmaster@easyspeedy.com
changed: lise@easyspeedy.com 20031219
source: RIPE

person: Peter Lerche
address: Hoesterkoebvej 33
phone: +45 45 94 14 01
nic-hdl: PL3462-RIPE
changed: Lise@easyspeedy.com 20061213
source: RIPE

Information related to ‘82.103.128.0/18AS30736’

route: 82.103.128.0/18
descr: EasySpeedy ApS
origin: AS30736
notify: hostmaster@easyspeedy.com
mnt-lower: easyspeedy
mnt-routes: easyspeedy
mnt-by: easyspeedy
changed: lise@easyspeedy.com 20040225
source: RIPE

DNS records

DNS query for 171.130.103.82.in-addr.arpa failed: WouldBlock

 

name class type data time to live
salezhelp.com IN MX
preference: 10
exchange: mail.salezhelp.com
600s (00:10:00)
salezhelp.com IN TXT v=spf1 +ip4:91.199.112.0/24 +ip4:82.103.130.174/32 +ip4:82.103.129.188/32 +ip4:82.103.130.171 +ip4:82.103.135.35 -all 600s (00:10:00)
salezhelp.com IN SOA
server: omega.dnsski.com
email: root.dnsski.com
serial: 2010763082
refresh: 3600
retry: 900
expire: 604800
minimum ttl: 1200
600s (00:10:00)
salezhelp.com IN NS beta.dnsski.com 600s (00:10:00)
salezhelp.com IN NS omega.dnsski.com 600s (00:10:00)
salezhelp.com IN NS alpha.dnsski.com 600s (00:10:00)
salezhelp.com IN A 82.103.130.171 600s (00:10:00)

— end —

UK Daily Mail Online Reports 19 Cyber criminals Arrested

Arrest of Hackers that Netted up to £20m from British Accounts

A multi-million pound internet banking fraud which drained thousands of pounds from the UK accounts of innocent victims was cracked by police yesterday.

A gang of Eastern Europeans made £2 million a month from online accounts by stealing victims log-in details using sophisticated software which can be bought for just £300 over the internet.
They made £6 million in just three months and detectives believe they could have reaped as much as £20 million in the highly organised scam.

The mastermind, who detectives believe is an adept IT expert, was among 19 arrested yesterday in a series of dawn raids across London.
He and his team targeted hundreds of victims who had weak security on their computers and accessed their user names and passwords despite tight security systems put in place by the banks on their internet sites.

Police were alerted by high street banks who were alarmed a sudden surge in fraud.

Investigators from Scotland Yard’s e-Crime Unit discovered that the gang were hitting vulnerable computers using software which is described in the industry as a ‘Trojan horse’ because it infiltrates the computer without the user realising.
The system called ‘Zeus’ or ‘Zbot’ infects victims’ personal computers, waits for them to log onto a list of specifically targeted banks and financial institutions and then steals their personal credentials, forwarding the data to a server controlled by criminals.

It can also manipulate web browsing sessions including creating an additional page requesting the victim to reveal more personal information, such as payment card number, PIN, and passwords.
Users have no idea they are being defrauded because they think they are still on their secure internet banking site.
Unbeknown to the owner, computers infected with Zeus become part of a network where they fall under the remote control of computer criminals.
It is being used increasingly by cyber criminals across the globe.

After the gang had taken over victims’ online bank accounts, they would take out several thousands pounds and place it in a ‘drop’ account before withdrawing the cash.
They recruited dozens of ‘mules’ who would allow them to use their accounts to pay the money into in return for payment.
By using scores of different bank accounts to deposit the money, they hoped to evade being caught.
Detectives have so far pinpointed over 600 British bank accounts which were defrauded but believe hundreds have been targeted.

The ringleader, in his 20s, and his wife, an accomplice in the scam, were arrested in an unremarkable third-floor flat in Chingford, Essex, yesterday morning.
Another couple, also part of the gang, were also arrested at the property.
The ‘nerve centre’ where the ringleader ran his empire from was simply a laptop on a desk in his front room. In front of it lay a notebook where figures of money had been carefully written in pencil.
In all, officers arrested 15 men and four women aged between 23 and 47 on suspicion of the Computer Misuse Act, Proceeds of Crime Act and Fraud Act offences . Inquiries are ongoing to ascertain whether they are in the country illegally.
Among them, two were also arrested on suspicion of possession of a firearm found at one of the properties. They are all in custody for questioning.
Detective Chief Inspector Terry Wilson, who led the investigation said: ‘We’ve worked closely with UK banks through our Virtual Taskforce approach to gather information and evidence which has resulted in today’s arrests.
We believe we have disrupted a highly organised criminal network, which has used sophisticated methods to siphon large amounts of cash from many innocent peoples’ accounts, causing immense personal anxiety and significant financial harm – which of course banks have had to repay at considerable cost to the economy.

‘Online banking customers must make sure their security systems are up to date and be alert to any unusual or additional security features requested which is at variance with their normal log-on experience. Greater public awareness and education will make it harder for personal details to be compromised and for this type of fraud to be carried out.’
Martin Muirhead, chairman of the Virtual Task Force, said: ‘This is an excellent example of how to bring to bear the resources and expertise of multiple agencies and public / private organisations in the UK. This is pioneering work led by the Metropolitan Police Service.”

Read more

List of Name Servers Used By Money Mule Recruiters

A comprehensive narratives can be found at Dancho Danchev’s Blog

Here’s the list of the related ASs and their occurrences:

  • AS34305, EUROACCESS Global Autonomous System – The Netherlands – 11 name servers
  • AS38356, TimeNet – China – 11 name servers
  • AS46664, VolumeDrive – United States – 11 name servers
  • AS30517, Great Lakes Comnet, Inc. – United States – 9 name servers
  • AS32097, RoadRunner RR-RC-Wholesale Internet, Inc.-KansasCity – United States – 9 name servers
  • AS29182, ISPSYSTEM-AS ISP system Autonomous System – Belgium – 8 name servers
  • AS31103, KEYWEB-AS Keyweb AG – Germany – 1 name servers

List of Name Servers Used By Money Mule Recruiters

  • @5mx.ru
  • @qx8.ru
  • @maillife.ru
  • @bigmailbox.ru
  • @fastermail.ru

Name Servers

  • ns1.kalipso19.cc
  • ns2.mamacholi.net
  • ns3.solojumper.com
  • ns1.liberationx.cc
  • ns2.qunetsilc.net
  • ns3.liramuson.com
  • ns1.sheetship.cc
  • ns2.quixsimple.net
  • ns3.learbeer.com
  • NS2.SKOTINKO.NET
  • NS1.RUNLESRUN.CC
  • NS3.RJEVSKI.COM
  • NS3.MAMACHOLI.NET
  • NS1.RJEVSKI.COM
  • NS2.KALIPSO19.CC
  • ns1.skotinko.net
  • ns2.rjevski.com
  • ns3.kalipso19.cc

Listing of Domains

  • 1. Atg-grouptech.net = SCAM FRAUD
  • 2. Business-arenaltd.net = SCAM FRAUD
  • 3. Dnngroup-inc.com = SCAM FRAUD
  • 4. Dowsongroupsvc.net = SCAM FRAUD
  • 5. Eagleton-programmingsvc.net = SCAM FRAUD
  • 6. Finconsult-uk.net = SCAM FRAUD
  • 7. Instant-netgroup.net = SCAM FRAUD
  • 8. Jbigroupsvc.net = SCAM FRAUD
  • 9. Mccohen-ltd.net = SCAM FRAUD
  • 10. Mckeanster-groupsvc.net = SCAM FRAUD
  • 11. Mckeanstergroup-inc.cc = SCAM FRAUD
  • 12. Plug-groupinc.cc = SCAM FRAUD
  • 13. Precise-group.net = SCAM FRAUD
  • 14. Tmggroupinc.net = SCAM FRAUD
  • 15. Uk-middlemengroup.net = SCAM FRAUD
  • 16. Us-middlemengroup.net = SCAM FRAUD
  • 17. Delta-groupsvc.com = SCAM FRAUD
  • 18. Deltagroup-inc.com = SCAM FRAUD
  • 1. Atg-usagroup.net = SCAM FRAUD
  • 2. Cvg-groupinc.net = SCAM FRAUD
  • 3. Lime-groupusa.net = SCAM FRAUD
  • 4. Margell-groupsvc.net = SCAM FRAUD
  • 5. Plug-groupsvc.net = SCAM FRAUD
  • 6. Solutiontransfer-inc.com = SCAM FRAUD
  • 7. Staffords-groupsvc.net = SCAM FRAUD
  • 8. Tmg-groupusa.net = SCAM FRAUD
  • 9. Uk-certegroup.net = SCAM FRAUD
  • 10. Us-metaphorgroup.net = SCAM FRAUD
  • 11. It-financecorp.net = SCAM FRAUD
  • 1. Eagleton-inc.cc = SCAM FRAUD
  • 2. Margell-groupinc.com = SCAM FRAUD
  • 3. Olston-firstgroup.net = SCAM FRAUD
  • 4. Preciseusa-inc.net = SCAM FRAUD
  • 5. Rating-webgroup.net = SCAM FRAUD
  • 6. Ratliff-groupsvc.net = SCAM FRAUD
  • 7. Us-certegroup.net = SCAM FRAUD
  • 1. Cvg-grouplead.net = SCAM FRAUD
  • 2. Eandh-inc.net = SCAM FRAUD
  • 3. Finconsult-ltd.net = SCAM FRAUD
  • 4. Instagroup-usa.net = SCAM FRAUD
  • 5. Mccohen-uk.net = SCAM FRAUD
  • 6. Quartzite-groupusa.net = SCAM FRAUD
  • 7. Ratliff-groupinc.com = SCAM FRAUD
  • 8. Thelime-groupinc.net = SCAM FRAUD
  • 9. Us-luckystar.net = SCAM FRAUD
  • 10. Worldtransfer-inc.net = SCAM FRAUD
  • 11. Secureit-business.net = SCAM FRAUD
  • 1. Business-arena.net = SCAM FRAUD
  • 2. Dnngroupsvc.com = SCAM FRAUD
  • 3. Jbigroup-inc.com = SCAM FRAUD
  • 4. Metaphor-usainc.net = SCAM FRAUD
  • 5. Moneyplat-ltd.net = SCAM FRAUD
  • 6. Moneyplat-uk.net = SCAM FRAUD
  • 7. Olston-groupusa.net = SCAM FRAUD
  • 8. Rating-groupinc.net = SCAM FRAUD
  • 9. Solution-transfersvc.net = SCAM FRAUD
  • 10. Us-quartzitegroup.net = SCAM FRAUD
  • 1. Monet-ukgroup.net = SCAM FRAUD
  • 2. Profiuk-group.net = SCAM FRAUD
  • 3. Uk-indigogroup.net = SCAM FRAUD
  • 1. High-fivegroup.net = SCAM FRAUD
  • 2. Highfive-group.net = SCAM FRAUD
  • 3. Pluto-groupltd.net = SCAM FRAUD
  • 4. Uk-mercurygroup.net = SCAM FRAUD
  • 5. Us-sohogroup.net = SCAM FRAUD
  • 1. Indigouk-group.net = SCAM FRAUD
  • 2. Mercury-groupllc.net = SCAM FRAUD
  • 3. Sidelineusa-group.net = SCAM FRAUD
  • 4. Sohousa-inc.net = SCAM FRAUD
  • 1. Invincible-group.net = SCAM FRAUD
  • 2. Uk-monetgroup.net = SCAM FRAUD
  • 3. Uk-profigroup.net = SCAM FRAUD
  • 4. Us-sidelinegroup.net = SCAM FRAUD
  • 1. Uk-invinciblegroup.net = SCAM FRAUD
  • 2. Uk-plutogroup.net = SCAM FRAUD
  • 1. Dnngroup-inc.com = SCAM FRAUD
  • 2. Dnngroupsvc.com = SCAM FRAUD
  • 3. Dowsongroupsvc.net = SCAM FRAUD
  • 4. Jbigroup-inc.com = SCAM FRAUD
  • 5. Jbigroupsvc.net = SCAM FRAUD
  • 6. Secureit-business.net = SCAM FRAUD
  • 7. Solution-transfersvc.net = SCAM FRAUD
  • 8. Staffords-groupsvc.net = SCAM FRAUD
  • 9. Thelime-groupinc.net = SCAM FRAUD
  • 10. Uk-certegroup.net = SCAM FRAUD
  • 11. Uk-middlemengroup.net = SCAM FRAUD
  • 12. Us-luckystar.net = SCAM FRAUD
  • 13. Us-metaphorgroup.net = SCAM FRAUD
  • 1. Cvg-groupinc.net = SCAM FRAUD
  • 2. Eagleton-programmingsvc.net = SCAM FRAUD
  • 3. Lime-groupusa.net = SCAM FRAUD
  • 4. Margell-groupsvc.net = SCAM FRAUD
  • 5. Mckeanstergroup-inc.cc = SCAM FRAUD
  • 6. Olston-groupusa.net = SCAM FRAUD
  • 7. Plug-groupinc.cc = SCAM FRAUD
  • 8. Precise-group.net = SCAM FRAUD
  • 9. Preciseusa-inc.net = SCAM FRAUD
  • 10. Rating-groupinc.net = SCAM FRAUD
  • 11. Solutiontransfer-inc.com = SCAM FRAUD
  • 12. Us-quartzitegroup.net = SCAM FRAUD
  • 13. Worldtransfer-inc.net = SCAM FRAUD
  • 1. Business-arena.net = SCAM FRAUD
  • 2. Eandh-inc.net = SCAM FRAUD
  • 3. Finconsult-ltd.net = SCAM FRAUD
  • 4. Instagroup-usa.net = SCAM FRAUD
  • 5. It-financecorp.net = SCAM FRAUD
  • 6. Mccohen-ltd.net = SCAM FRAUD
  • 7. Mccohen-uk.net = SCAM FRAUD
  • 8. Rating-webgroup.net = SCAM FRAUD
  • 9. Ratliff-groupinc.com = SCAM FRAUD
  • 10. Ratliff-groupsvc.net = SCAM FRAUD
  • 11. Us-middlemengroup.net = SCAM FRAUD
  • 1. Mondexgroup-llc.com = SCAM FRAUD
  • 2. Moutengroup-inc.com = SCAM FRAUD
  • 3. Silverton-groupnet.com = SCAM FRAUD
  • 4. Silverton-international.net = SCAM FRAUD
  • 1. Mta-internationalsvc.net = SCAM FRAUD
  • 2. Cybergroup-inc.com = SCAM FRAUD
  • 3. Tyco-networkssvc.net = SCAM FRAUD
  • 1. Opalgroup-inc.com = SCAM FRAUD
  • 2. Global-networkssvc.net = SCAM FRAUD
  • 3. Softwaregroup-inc.com = SCAM FRAUD
  • 1. Gnb-inc.com = SCAM FRAUD
  • 2. Mondex-internationalinc.net = SCAM FRAUD
  • 3. Mtagroupinc.com = SCAM FRAUD
  • 4. Opal-programmingsvc.net = SCAM FRAUD
  • 5. Stockfusion-hostinc.net = SCAM FRAUD
  • 6. Cyber-groupsvc.net = SCAM FRAUD
  • 7. Globalgroupsvc.com = SCAM FRAUD
  • 8. Shakogroup-inc.com = SCAM FRAUD
  • 9. Software-solutionssvc.net = SCAM FRAUD
  • 1. E-fundstransfer.net = SCAM FRAUD
  • 2. Eftgroupinc.com = SCAM FRAUD
  • 3. Gnb-programmingsvc.net = SCAM FRAUD
  • 4. Impeccable-groupsvc.net = SCAM FRAUD = Catholic Diocese of Des Moines MULE
  • 5. Impeccablegroup-inc.com = SCAM FRAUD
  • 6. Mouten-groupsvc.net = SCAM FRAUD
  • 7. Stockfusion-inc.com = SCAM FRAUD
  • 8. Gdi-groupinc.com = SCAM FRAUD
  • 9. Gdi-groupsvc.net = SCAM FRAUD
  • 10. Shako-outsourcesvc.net = SCAM FRAUD
  • 11. Tycogroup-inc.com = SCAM FRAUD
  • 1. Mondexgroup-llc.com = SCAM FRAUD
  • 2. Moutengroup-inc.com = SCAM FRAUD
  • 3. Silverton-groupnet.com = SCAM FRAUD
  • 4. Silverton-international.net = SCAM FRAUD
  • 1. Mta-internationalsvc.net = SCAM FRAUD
  • 2. Cybergroup-inc.com = SCAM FRAUD
  • 3. Tyco-networkssvc.net = SCAM FRAUD
  • 1. Opalgroup-inc.com = SCAM FRAUD
  • 2. Global-networkssvc.net = SCAM FRAUD
  • 3. Softwaregroup-inc.com = SCAM FRAUD
  • 1. Gnb-inc.com = SCAM FRAUD
  • 2. Mondex-internationalinc.net = SCAM FRAUD
  • 3. Mtagroupinc.com = SCAM FRAUD
  • 4. Opal-programmingsvc.net = SCAM FRAUD
  • 5. Stockfusion-hostinc.net = SCAM FRAUD
  • 6. Cyber-groupsvc.net = SCAM FRAUD
  • 7. Globalgroupsvc.com = SCAM FRAUD
  • 8. Shakogroup-inc.com = SCAM FRAUD
  • 9. Software-solutionssvc.net = SCAM FRAUD

OrgName: InterWeb Media
OrgId: INTER-280
Address: 2617 Lippe
City: Montreal
StateProv: QC
PostalCode: H4R-1L9
Country: CA

network:Network-Name:Add 8 IP’s (5 Usable)
network:IP-Network:76.76.116.48/29
network:IP-Network-Block:76.76.116.48 – 76.76.116.55
network:Org-Name:krutikservers
network:Street-Address:yeni yasamal 1 house 4 app 207
network:City:Baku
network:State:NA
network:Postal-Code:az1012
network:Country-Code:AZ
network:Tech-Contact:MAINT-829.76.76.116.48/29
network:Created:20100521134045000
network:Updated:20100521134045000

krutikservers
=======================
Nickname: Ochen_Krutoy
Name: Raxman musayev
Country: Azerbajan
e-mail: Raxman001@hotmail.com = SCAM FRAUD
=======================

Diamond Group Inc (not live yet)
US-DIAMONDGROUP.NET

Idae Group Inc (not live yet)
US-IDAEGROUP.NET

Veritas Group Inc (not live yet)
US-VERITASGROUP.NET

Vidi Group Inc (not live yet)
US-VIDIGROUP.NET

These sites use a brand-new set of name servers (NS1, NS2 and NS3 in each domain):

NS1.FINDINGZEROWASTE.CC
NS1.SPACEGRAVITY.CC
NS1.URLNAME.CC
NS1.URLNAMED.CC
NS1.URL-NAME.CC
NS1.ZERO-GRAVITY.CC

Address lookup

canonical name ns1.urlnamed.cc.
aliases
addresses 64.85.174.209

Domain Whois record

Queried whois.nic.cc with “dom urlnamed.cc”…
Domain Name: URLNAMED.CC
Registrar: WEB COMMERCE COMMUNICATIONS LIMITED DBA WEBNIC.CC
Whois Server: whois.webnic.cc
Referral URL: http://www.webnic.cc
Name Server: NS1.URLNAMED.CC
Name Server: NS2.URLNAMED.CC
Name Server: NS3.URLNAMED.CC
Status: CLIENT-XFER-PROHIBITED
Status: CLIENT-UPDATE-PROHIBITED
Status: CLIENT-DELETE-PROHIBITED
Updated Date: 10-sep-2010
Creation Date: 10-sep-2010
Expiration Date: 10-sep-2011

Last update of whois database: Wed, 29 Sep 2010 08:00:11 EDT
Queried whois.webnic.cc with “urlnamed.cc”…

Domain: urlnamed.cc
Status: Protected

DNS:
	ns1.urlnamed.cc
	ns2.urlnamed.cc
	ns3.urlnamed.cc

Created: 2010-09-10 17:18:17
Expires: 2011-09-10 17:18:17
Last Modified: 2010-09-10 17:18:17

Registrant Contact:
	Boris Valinurov
	Boris Valinurov rugs@fastermail.ru
	13-ij Mikrorayon d.37 kv.12
	Nefteyugansk, Khanty-Mansijskij AO, RU 628311
	P: +7.3463217999 F: +7.3463217999

Administrative Contact:
	Boris Valinurov
	Boris Valinurov  rugs@fastermail.ru
	13-ij Mikrorayon d.37 kv.12
	Nefteyugansk, Khanty-Mansijskij AO, RU 628311
	P: +7.3463217999 F: +7.3463217999

Technical Contact:
	Boris Valinurov
	Boris Valinurov  rugs@fastermail.ru
	13-ij Mikrorayon d.37 kv.12
	Nefteyugansk, Khanty-Mansijskij AO, RU 628311
	P: +7.3463217999 F: +7.3463217999

Billing Contact:
	Boris Valinurov
	Boris Valinurov rugs@fastermail.ru
	13-ij Mikrorayon d.37 kv.12
	Nefteyugansk, Khanty-Mansijskij AO, RU 628311
	P: +7.3463217999 F: +7.3463217999

Network Whois record

Queried whois.arin.net with “n 64.85.174.209″…
NetRange: 64.85.128.0 – 64.85.175.255
CIDR: 64.85.128.0/19, 64.85.160.0/20
OriginAS:
NetName: NET-GLC-3
NetHandle: NET-64-85-128-0-1
Parent: NET-64-0-0-0-0
NetType: Direct Allocation
NameServer: NS.UFCOM.COM
NameServer: NS2.UFCOM.COM
RegDate: 2005-07-14
Updated: 2008-05-29
Ref: http://whois.arin.net/rest/net/NET-64-85-128-0-1

OrgName: Great Lakes Comnet, Inc.
OrgId: GLC-30
Address: 1515 Turf Lane
Address: Suite 100
City: East Lansing
StateProv: MI
PostalCode: 48823
Country: US
RegDate: 2003-08-26
Updated: 2008-08-20
Ref: http://whois.arin.net/rest/org/GLC-30

OrgTechHandle: IPADM202-ARIN
OrgTechName: IP Admin
OrgTechPhone: +1-517-664-1600
OrgTechEmail: ipadmin@glcom.net
OrgTechRef: http://whois.arin.net/rest/poc/IPADM202-ARIN

RAbuseHandle: NAD40-ARIN
RAbuseName: Network Abuse Department
RAbusePhone: +1-517-664-1600
RAbuseEmail: abuse@glcom.net
RAbuseRef: http://whois.arin.net/rest/poc/NAD40-ARIN

RTechHandle: IPADM202-ARIN
RTechName: IP Admin
RTechPhone: +1-517-664-1600
RTechEmail: ipadmin@glcom.net
RTechRef: http://whois.arin.net/rest/poc/IPADM202-ARIN

DNS records

DNS query for 209.174.85.64.in-addr.arpa returned an error from the server: NameError

name class type data time to live
ns1.urlnamed.cc IN A 64.85.174.209 172800s (2.00:00:00)
urlnamed.cc IN SOA
server: ns1.urlnamed.cc
email: root.ns1.urlnamed.cc
serial: 2010090901
refresh: 3600
retry: 1200
expire: 604800
minimum ttl: 60
172800s (2.00:00:00)
urlnamed.cc IN NS ns1.urlnamed.cc 172800s (2.00:00:00)
urlnamed.cc IN NS ns3.urlnamed.cc 172800s (2.00:00:00)
urlnamed.cc IN NS ns2.urlnamed.cc 172800s (2.00:00:00)

— end —

Address lookup

canonical name ns1.zero-gravity.cc.
aliases
addresses 64.85.174.211

Domain Whois record

Queried whois.nic.cc with “dom zero-gravity.cc”…
Domain Name: ZERO-GRAVITY.CC
Registrar: BIZCN.COM, INC.
Whois Server: whois.bizcn.com
Referral URL: http://www.bizcn.com
Name Server: NS1.ZERO-GRAVITY.CC
Name Server: NS2.ZERO-GRAVITY.CC
Name Server: NS3.ZERO-GRAVITY.CC
Status: CLIENT-XFER-PROHIBITED
Status: CLIENT-DELETE-PROHIBITED
Updated Date: 10-sep-2010
Creation Date: 10-sep-2010
Expiration Date: 10-sep-2011

>>> Last update of whois database: Wed, 29 Sep 2010 08:00:11 EDT
Queried whois.bizcn.com with “zero-gravity.cc”…
Domain name: zero-gravity.cc

Registrant Contact:
Sergej Gmyzov
Sergej Gmyzov thud@qx8.ru
+73822520343 fax: +73822520343
per.Sergeya Lazo d.10-2 kv.12
Tomsk Tomskaya oblast 634063
RU

Administrative Contact:
Sergej Gmyzov thud@qx8.ru
+73822520343 fax: +73822520343
per.Sergeya Lazo d.10-2 kv.12
Tomsk Tomskaya oblast 634063
RU

Technical Contact:
Sergej Gmyzov thud@qx8.ru
+73822520343 fax: +73822520343
per.Sergeya Lazo d.10-2 kv.12
Tomsk Tomskaya oblast 634063
RU

Billing Contact:
Sergej Gmyzov thud@qx8.ru
+73822520343 fax: +73822520343
per.Sergeya Lazo d.10-2 kv.12
Tomsk Tomskaya oblast 634063
RU

DNS:
ns1.zero-gravity.cc
ns3.zero-gravity.cc
ns2.zero-gravity.cc

Created: 2010-09-10
Expires: 2011-09-10

ns1.spacegravity.cc IP:
64.85.174.207
ns1.spacegravity.cc server location:
Seattle in United States
ns1.spacegravity.cc ISP:
Great Lakes Comnet

Network Whois record

Queried whois.arin.net with “n 64.85.174.211″…

NetRange: 64.85.128.0 – 64.85.175.255
CIDR: 64.85.128.0/19, 64.85.160.0/20
OriginAS:
NetName: NET-GLC-3
NetHandle: NET-64-85-128-0-1
Parent: NET-64-0-0-0-0
NetType: Direct Allocation
NameServer: NS.UFCOM.COM
NameServer: NS2.UFCOM.COM
RegDate: 2005-07-14
Updated: 2008-05-29
Ref: http://whois.arin.net/rest/net/NET-64-85-128-0-1

OrgName: Great Lakes Comnet, Inc.
OrgId: GLC-30
Address: 1515 Turf Lane
Address: Suite 100
City: East Lansing
StateProv: MI
PostalCode: 48823
Country: US
RegDate: 2003-08-26
Updated: 2008-08-20
Ref: http://whois.arin.net/rest/org/GLC-30

OrgTechHandle: IPADM202-ARIN
OrgTechName: IP Admin
OrgTechPhone: +1-517-664-1600
OrgTechEmail: ipadmin@glcom.net
OrgTechRef: http://whois.arin.net/rest/poc/IPADM202-ARIN

RAbuseHandle: NAD40-ARIN
RAbuseName: Network Abuse Department
RAbusePhone: +1-517-664-1600
RAbuseEmail: abuse@glcom.net
RAbuseRef: http://whois.arin.net/rest/poc/NAD40-ARIN

RTechHandle: IPADM202-ARIN
RTechName: IP Admin
RTechPhone: +1-517-664-1600
RTechEmail: ipadmin@glcom.net
RTechRef: http://whois.arin.net/rest/poc/IPADM202-ARIN

DNS records

DNS query for 211.174.85.64.in-addr.arpa returned an error from the server: NameError

name class type data time to live
ns1.zero-gravity.cc IN A 64.85.174.211 172800s (2.00:00:00)
zero-gravity.cc IN SOA
server: ns1.zero-gravity.cc
email: root.ns1.zero-gravity.cc
serial: 2010090901
refresh: 3600
retry: 1200
expire: 604800
minimum ttl: 60
172800s (2.00:00:00)
zero-gravity.cc IN NS ns1.zero-gravity.cc 172800s (2.00:00:00)
zero-gravity.cc IN NS ns2.zero-gravity.cc 172800s (2.00:00:00)
zero-gravity.cc IN NS ns3.zero-gravity.cc 172800s (2.00:00:00)

— end —

 


With our IP locator you can track IP addresses, hosts and websites. We probably use the most accurate IP address location database to determine any IP address location. Moreover you will find out the ISP, the Netspeed and more info after the tracing.

 

Examples: 213.86.83.116 (IP address) or google.com (Website)
Related Links:
Webhosting Reviews
Hosting Solution
IP Address Management
Remote IP Address
ns.ufcom.com IP address location & more:
Host of the IP: ns.ufcom.com [Whois] [Reverse IP]
Host IP [?]: 209.165.240.227 [Whois] [Reverse IP]
IP country code: US
IP address country: United States
IP address state: Michigan
IP address city: East Lansing
IP postcode: 48823
IP address latitude: 42.7627
IP address longitude: -84.4427
ISP of this IP [?]: Great Lakes Comnet
Organization: Great Lakes Comnet
Local time in United States: 2010-09-29 11:19

WhoIs Ericjames-online.com

Address lookup

canonical name ericjames-online.com.
aliases
addresses 210.48.158.217

Domain Whois record

Queried whois.internic.net with “dom ericjames-online.com

Domain Name: WWW.ERICJAMES-ONLINE.COM
Registrar: DIRECTI INTERNET SOLUTIONS PVT. LTD. D/B/A PUBLICDOMAINREGISTRY.COM
Whois Server: whois.PublicDomainRegistry.com
Referral URL: http://www.PublicDomainRegistry.com
Name Server: NS3.3UHOSTING.COM
Name Server: NS4.3UHOSTING.COM
Status: clientTransferProhibited
Updated Date: 18-sep-2010
Creation Date: 18-sep-2010
Expiration Date: 18-sep-2011

Last update of whois database: Wed, 29 Sep 2010 14:16:30 UTC

Queried whois.publicdomainregistry.com with “ericjames-online.com”

Registration Service Provided By: EZZYDOMAIN REGISTRATION
Contact: +006.1300884678
Website: http://www.ezzydomain.com

Domain Name: ERICJAMES-ONLINE.COM

Registrant:
PrivacyProtect.org
Domain Admin contact@privacyprotect.org
P.O. Box 97
Note – All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676

Creation Date: 18-Sep-2010
Expiration Date: 18-Sep-2011

Domain servers in listed order:
ns4.3uhosting.com
ns3.3uhosting.com

Administrative Contact:
PrivacyProtect.org
Domain Admin contact@privacyprotect.org
P.O. Box 97
Note – All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676

Technical Contact:
PrivacyProtect.org
Domain Admin contact@privacyprotect.org
P.O. Box 97
Note – All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676

Billing Contact:
PrivacyProtect.org
Domain Admin contact@privacyprotect.org
P.O. Box 97
Note – All Postal Mails Rejected, visit Privacyprotect.org
Moergestel
null,5066 ZH
NL
Tel. +45.36946676

Status:LOCKED


Network Whois record
Queried whois.apnic.net with “210.48.158.217”…
inetnum: 210.48.144.0 – 210.48.159.255
netname: TM-IDC
descr: TM NET SDN BHD
country: MY
admin-c: AA125-AP
tech-c: MS283-AP
tech-c: AA125-AP
status: ALLOCATED PORTABLE
mnt-by: APNIC-HM
mnt-lower: MAINT-MY-EASTGATE
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
remarks: This object can only be updated by APNIC hostmasters.
remarks: To update this object, please contact APNIC
remarks: hostmasters and include your organisation’s account
remarks: name in the subject line.
remarks: -+-+-+-+-+-+-+-+-+-+-+-++-+-+-+-+-+-+-+-+-+-+-+-+-+-+
changed: hm-changed@apnic.net 20060626
source: APNIC

person: Azman Ali
address: 20th Floor, Wisma Celcom Semarak
address: Jalan Raja Muda Abdul Aziz
address: 50400 Kuala Lumpur
country: MY
phone: +603-26812075
fax-no: +603-26810186
e-mail: gatekeeper@eastgate.net.my
nic-hdl: AA125-AP
mnt-by: MAINT-MY-EASTGATE
changed: gatekeeper@eastgate.net.my 20050202
source: APNIC

person: mohd Ghazali Sabri
address: 3rd Floor, TM IT Complex
address: 3300 Lingkaran Usahawan 1 Timur
address: 63000 Cyber Jaya Selangor
country: MY
phone: +603-83180322
fax-no: +603-83188061
e-mail: m_ghaza@tm.net.my
nic-hdl: MS283-AP
mnt-by: MAINT-MY-EASTGATE
changed: gmen@tm.net.my 20011126
source: APNIC

DNS records

DNS query for 217.158.48.210.in-addr.arpa returned an error from the server: NameError

name class type data time to live
ericjames-online.com IN MX
preference: 0
exchange: ericjames-online.com
14400s (04:00:00)
ericjames-online.com IN SOA
server: ns3.3uhosting.com
email: admin.ezzyhosting.com
serial: 2010091802
refresh: 86400
retry: 7200
expire: 3600000
minimum ttl: 86400
86400s (1.00:00:00)
ericjames-online.com IN NS ns4.3uhosting.com 86400s (1.00:00:00)
ericjames-online.com IN NS ns3.3uhosting.com 86400s (1.00:00:00)
ericjames-online.com IN A 210.48.158.217 14400s (04:00:00)

— end —