financemiddle.com

Address lookup
canonical name financemiddle.com

aliases
addresses 50.28.50.190
Domain Whois record

Queried whois.internic.net with “dom financemiddle.com

Domain Name: FINANCEMIDDLE.COM
Registrar: GODADDY.COM, LLC
Whois Server: whois.godaddy.com
Referral URL: http://registrar.godaddy.com
Name Server: NS.LIQUIDWEB.COM
Name Server: NS1.LIQUIDWEB.COM
Status: clientDeleteProhibited
Status: clientRenewProhibited
Status: clientTransferProhibited
Status: clientUpdateProhibited
Updated Date: 24-jan-2013
Creation Date: 27-mar-2012
Expiration Date: 27-mar-2015

Last update of whois database: Tue, 19 Mar 2013 03:43:02 UTC
Queried whois.godaddy.com with “financemiddle.com

Registered through: GoDaddy.com, LLC (http://www.godaddy.com)
Domain Name: FINANCEMIDDLE.COM
Created on: 27-Mar-12
Expires on: 27-Mar-15
Last Updated on: 24-Jan-13

Registrant:
Domains By Proxy, LLC
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States

Administrative Contact:
Private, Registration FINANCEMIDDLE.COM@domainsbyproxy.com
Domains By Proxy, LLC
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
(480) 624-2599 Fax — (480) 624-2598

Technical Contact:
Private, Registration FINANCEMIDDLE.COM@domainsbyproxy.com
Domains By Proxy, LLC
DomainsByProxy.com
14747 N Northsight Blvd Suite 111, PMB 309
Scottsdale, Arizona 85260
United States
(480) 624-2599 Fax — (480) 624-2598

Domain servers in listed order:
NS.LIQUIDWEB.COM
NS1.LIQUIDWEB.COM

Network Whois record

Queried rwhois.liquidweb.com with “50.28.50.190”…

%rwhois V-1.5:003eff:00 rwhois.liquidweb.com (by Network Solutions, Inc. V-1.5.7.4)
network:Class-Name:network
network:ID:NETBLK-SOURCEDNS.50.28.0.0/18
network:Auth-Area:50.28.0.0/18
network:Network-Name:SOURCEDNS-50.28.0.0
network:IP-Network:50.28.0.0/18
network:IP-Network-Block:50.28.0.0 – 50.28.63.255
network:Organization;I:SOURCEDNS
network:Org-Name:SourceDNS
network:Street-Address:4210 Creyts Rd.
network:City:Lansing
network:State:MI
network:Postal-Code:48917
network:Country-Code:US
network:Tech-Contact;I:admin@sourcedns.com
network:Created:20040212
network:Updated:20040214
network:Updated-By:admin@sourcedns.com
network:Abuse:abuse@sourcedns.com

%ok

Queried whois.arin.net with “n 50.28.50.190″…

NetRange: 50.28.0.0 – 50.28.127.255
CIDR: 50.28.0.0/17
OriginAS: AS32244
NetName: LIQUIDWEB-10
NetHandle: NET-50-28-0-0-1
Parent: NET-50-0-0-0-0
NetType: Direct Allocation
RegDate: 2010-11-04
Updated: 2012-02-24
Ref: http://whois.arin.net/rest/net/NET-50-28-0-0-1

OrgName: Liquid Web, Inc.
OrgId: LQWB
Address: 4210 Creyts Rd.
City: Lansing
StateProv: MI
PostalCode: 48917
Country: US
RegDate: 2001-07-20
Updated: 2011-07-18
Ref: http://whois.arin.net/rest/org/LQWB

ReferralServer: rwhois://rwhois.liquidweb.com:4321

OrgAbuseHandle: ABUSE551-ARIN
OrgAbuseName: Abuse
OrgAbusePhone: +1-800-580-4985
OrgAbuseEmail: abuse@liquidweb.com
OrgAbuseRef: http://whois.arin.net/rest/poc/ABUSE551-ARIN

OrgTechHandle: IPADM47-ARIN
OrgTechName: IP Administrator
OrgTechPhone: +1-800-580-4985
OrgTechEmail: ipadmin@liquidweb.com
OrgTechRef: http://whois.arin.net/rest/poc/IPADM47-ARIN

RTechHandle: IPADM47-ARIN
RTechName: IP Administrator
RTechPhone: +1-800-580-4985
RTechEmail: ipadmin@liquidweb.com
RTechRef: http://whois.arin.net/rest/poc/IPADM47-ARIN

RNOCHandle: IPADM47-ARIN
RNOCName: IP Administrator
RNOCPhone: +1-800-580-4985
RNOCEmail: ipadmin@liquidweb.com
RNOCRef: http://whois.arin.net/rest/poc/IPADM47-ARIN

RAbuseHandle: ABUSE551-ARIN
RAbuseName: Abuse
RAbusePhone: +1-800-580-4985
RAbuseEmail: abuse@liquidweb.com
RAbuseRef: http://whois.arin.net/rest/poc/ABUSE551-ARIN

DNS records
name class type data time to live
financemiddle.com IN MX
preference: 0
exchange: financemiddle.com
72000s (20:00:00)
financemiddle.com IN NS ns.liquidweb.com 72000s (20:00:00)
financemiddle.com IN NS ns1.liquidweb.com 72000s (20:00:00)
financemiddle.com IN A 50.28.50.190 72000s (20:00:00)
financemiddle.com IN SOA
server: ns.liquidweb.com
email: admin@liquidweb.com
serial: 2013030602
refresh: 28800
retry: 7200
expire: 3600000
minimum ttl: 14400
72000s (20:00:00)
190.50.28.50.in-addr.arpa IN PTR host.armonija.com 72000s (20:00:00)
50.28.50.in-addr.arpa IN SOA
server: ns.sourcedns.com
email: admin@sourcedns.com
serial: 2013030815
refresh: 28800
retry: 7200
expire: 3600000
minimum ttl: 14400
72000s (20:00:00)
50.28.50.in-addr.arpa IN NS ns.sourcedns.com 72000s (20:00:00)
50.28.50.in-addr.arpa IN NS ns1.sourcedns.com 72000s (20:00:00)

— end —

bestbuyrwdcntr.com

Another Bestbuy Text Scams

Congrats Best Buy Shopper You Have Won A $1000 Giftcard! Go to scamalerthttp://bestbuyrwdcntr.com/a/?h and click continue to claim it NOW

 

The following A records are set to 50.97.137.50:

  1. 10dn6.comEnglish:
  2. 5os.com
  3. akiba-world.co
  4. akiba.us
  5. akibanewsworld.com
  6. bestbuysms.net
  7. bestbuybunus.net
  8. bestbuycashcards.net
  9. buggybread.com
  10. bestbuywinnet.com
  11. bestbuywinmobi.net
  12. bbdailyprizes.biz
  13. bbdailyprizes.com
  14. bbcardalert.net
  15. bbdailyprizes.com
  16. bestbuycashcards.net
  17. akibaworld.com
  18. bbcardgiveaway.net
  19. giveawayalerts.net
  20. bestbuyrwdcntr.com
  21. BestBuyNotify.net
  22. bbcardrewards.net
  23. bbcashgiveaway.net
  24. bbgiveaway.com
  25. bbrewardcard.net
  26. bbspree.net
  27. bestbuygiveaways.mobi
  28. bestbuyprizes.mobi
  29. bestbuypromo.mobi
  30. bestbuyreward.mobi
  31. bestbuyrewardcard.net
  32. bestbuyrewards.mobi
  33. bestbuysurprise.com
  34. bestbuysurprise.mobi
  35. binarycredit.net
  36. binarycredit.org
  37. bitcoin2012.com
  38. cabinet-lequart.com
  39. cc.gl
  40. club-ottomobile.com
  41. fb.gd
  42. justhookup2.net
  43. myfreebbcard.net
  44. painlessloans.net
  45. pennystocknotify.net
  46. sekaitendencies.com
  47. shibuyanews.com
  48. spacepigtv.com
  49. stephane-quarre.net
  50. superbowlspeculation.net
  51. tw.gl, viagraforcheap.net
  52. worldakiba.com
  53. zbiddyauction.net

111.123.180.92

CHASE FRAUD DEPARTMENT

scamFRAUDalert see it appropriate to issue this ALERT as scammers are impersonating J.P. MORGAN CHASE BANK FRAUD DEPARTMENTCHASE

Related articles

Facebook Samsung Galaxy S4

scamFRAUDalert see it appropriate to issue this ALERT as scammers have now begin scamalerttargeting facebook users regarding samsung galaxy.

We are giving away 5000 Samsung Galaxy S4 to 5000 Lucky Fans for FREE. All that you need to do is complete the easy steps below to participate!

samsung

http://galaxys4.claimtheprize.net/
Address lookup
canonical name galaxys4.claimtheprize.net.
aliases
addresses 199.59.57.10
Domain Whois record

Queried whois.internic.net with “dom claimtheprize.net”…

Domain Name: CLAIMTHEPRIZE.NET
Registrar: INTERNET.BS CORP.
Whois Server: whois.internet.bs
Referral URL: http://www.internet.bs
Name Server: VSP1.HOSTWINDSDNS.COM
Name Server: VSP2.HOSTWINDSDNS.COM
Status: clientTransferProhibited
Updated Date: 22-nov-2012
Creation Date: 22-nov-2012
Expiration Date: 22-nov-2013

 

DIAMOND & PDC DRILLING BITS FOR SALES

Hi,
Eleven here from Combetter company, we provide PDC bits, both steel body and matrix body, 2—7 blades, core & non-core bits, anchor shank bits for roof bolters,

Dawn of a New Day

Dawn of a New Day (Photo credit: Chester Bullock)

Impregnated diamond core bits(NQ,HQ,BQ etc.)and engineering coring bits, USED FOR MINING, GEOGOLOGY, ROCK, CONCRETE, ENGINEERING ETC.

should have any need, feel free to let me know.
Thanks&best regards,
Eleven Wang
International  Trade
#159 Jiankang Road, Zhengzhou 450000, China
Direct phone: 86-371-55672090
Mobile:  86-15036147531
Zhengzhou Combetter Superhard Material Co.,ltd
Visit COMBETTER at:
www.cbt-diamond.com

 

Brian Kerbs ~ KerbsOnSecurity Explains His Horrific Ordeal


It’s not often that one has the opportunity to be the target of a cyber and kinetic attack at the same time. But that is exactly what’s happened to me and my Web site over the past 24 hours. On Thursday afternoon, my site was the target of a fairly

English: A in Fairfax County, .

English: A in Fairfax County, . (Photo credit: Wikipedia)

massive denial of service attack. That attack was punctuated by a visit from a heavily armed local police unit that was tricked into responding to a 911 call spoofed to look like it came from my home.

Well, as one gamer enthusiast who follows me on Twitter remarked, I guess I’ve now “unlocked that level.”

Things began to get interesting early Thursday afternoon, when a technician from Prolexic, a company which protects Web sites (including KrebsOnSecurity.com) from denial-of-service attacks, forwarded a strange letter they’d received earlier in the day that appeared to have been sent from the FBI. The letter, a copy of which is reprinted in its entirety here, falsely stated that my site was hosting illegal content, profiting from cybercriminal activity, and that it should be shut down. Prolexic considered it a hoax, but forwarded it anyway. I similarly had no doubt it was a fake, and a short phone call to the FBI confirmed that fact.

Around the same time, my site came under a series of denial-of-service attacks, briefly knocking it offline. While Prolexic technicians worked to filter the attack traffic, I got busy tidying up the house (since we were expecting company for dinner). I heard the phone ring up in the office while I was downstairs vacuuming the living room and made a mental note to check my voicemail later. Vacuuming the rug near the front door, I noticed that some clear plastic tape I’d used to secure an extension cord for some outdoor lights was still straddling the threshold of the front door.

Fairfax County Police outside my home on 3/14/13

When I opened the door to peel the rest of the tape off, I heard someone yell, “Don’t move! Put your hands in the air.” Glancing up from my squat, I saw a Fairfax County Police officer leaning over the trunk of a squad car, both arms extended and pointing a handgun at me. As I very slowly turned my head to the left, I observed about a half-dozen other squad cars, lights flashing, and more officers pointing firearms in my direction, including a shotgun and a semi-automatic rifle. I was instructed to face the house, back down my front steps and walk backwards into the adjoining parking area, after which point I was handcuffed and walked up to the top of the street.

I informed the responding officers that this was a hoax, and that I’d even warned them in advance of this possibility. In August 2012, I filed a report with Fairfax County Police after receiving non-specific threats. The threats came directly after I wrote about a service called absoboot.com, which is a service that can be hired to knock Web sites offline.

One of the reasons that I opted to file the report was because I knew some of the young hackers who frequented the forum on which this service was advertised had discussed SWATting someone as a way of exacting revenge or merely having fun at the target’s expense. To my surprise, the officer who took my report said he had never heard of the phenomenon, but promised to read up on it.

One of the officers asked if it was okay to enter my house, and I said sure. Then an officer who was dressed more like a supervisor approached me and asked if I was the guy who had filed a police report about this eventuality about six months earlier. When I responded in the affirmative, he spoke into his handheld radio, and the police began stowing their rifles and the cuffs were removed from my wrists. He explained that they’d tried to call me on the phone number that had called them (my mobile), but that there was no answer. He apologized for the inconvenience, and said they were only doing their jobs. I told him no hard feelings. He told me that the problem of SWATting started on the West Coast and has been slowly making its way east.

The cop that took the report from me after the incident said someone had called 911 using a Caller ID number that matched my mobile phone number; the caller claimed to be me, reporting that Russians had broken into the home and shot my wife. Obviously, this was not the case, and nobody was harmed during the SWATing.

It’s difficult to believe the phony FBI letter that Prolexic received, the denial-of-service attack, and the SWATting were somehow the work of different individuals upset over something I’ve written. The letter to Prolexic made no fewer than five references to a story I published earlier this week about sssdob.ru, a site advertised in the cybercrime underground that sells access to Social Security numbers and credit reports. That story was prompted by news media attention to exposed.su, a site that has been posting what appear to be Social Security numbers, previous addresses and other information on highly public figures, including First Lady Michelle Obama and the director of the FBI.

Interestingly, there are strong indications that a site named booter.tw may have been involved in the denial-of-service attack on my site yesterday. For some bone-headed reason, the entire customer database file for booter.tw appears to be available for download if you happen to the know the link to the archive. A search through that record shows that on Thursday afternoon Eastern Time, someone paid booter.tw to launch a series of denial-of-service attacks against my Web site. The account that paid for the attack used the nickname “Starfall,” using the email address “starfall@gmail.com.”

Update, Mar. 16, 8:09 a.m. ET: It seems that I and several other folks who looked at the SQL file from booter.tw made the same mistake in misreading the table: The account that ordered the DDoS against KrebsOnSecurity.com was not Starfall but instead one that used the nickname “countonme,” and the email address “countonme@gmail.com.”

Full Story ~

Sonata Investment Ltd was part of RADAG

2G Scam: Sonata Investment Ltd was part of RADAG: Witness tells court
NEW DELHI: A 2G case prosecution witness today told a Delhi court that Sonata Investment Limited, allegedly involved in transfer of funds between Swan Telecom and Reliance ADA group, was a part of the latter but Anil Ambani was not on its board of directors.

“I am aware of Sonata Investment Ltd. This company is also part of Reliance ADA Group. Sonata Investment Ltd is part of Reliance Energy group. Sonata Investment Ltd is a non-banking finance company

“It is engaged in the business of investments and corporate lending,” Reliance Power Ltd’s Senior Vice President (Project and Finance) and its Chief Financial Officer Deepak Maheshwari told Special CBI Judge O P Saini.

During his cross-examination, he, however, said Reliance ADA Group Chairman Anil Ambani was “not on the board of directors of Sonata Investment Ltd.”

http://articles.economictimes.indiatimes.com/2012-02-13/news/31055426_1_delhi-court-swan-telecom-directors