Posted on 02/01/2005 11:22:09 AM PST by Peach
I did a traceroute from my location using my IP address to www.qo4.net
And I thought I was the only one...
Well it is a doll, therefore fake...but authentic.
Target Name: www.qo4.net
IP: 193.138.222.63
Date/Time: 2/1/2005 7:33:47 PM
1 161 ms 154 ms 154 ms 153 ms bc2-6.97-72.rac.wi.net [209.225.97.72]
2 187 ms 156 ms 156 ms 157 ms fe0-0.core.rac.wi.net [209.225.96.1]
3 187 ms 171 ms 171 ms 171 ms 64-199-33-117.ip.mcleodusa.net [64.199.33.117]
4 187 ms 171 ms 218 ms 171 ms CHCGILWUH53JC02-SO0-2-0-0.mcleodusa.net [64.198.101.141]
5 188 ms 171 ms 157 ms 234 ms CHCGILWUH53JC01-SO0-0-0-0.mcleodusa.net [64.198.101.137]
6 185 ms 171 ms 187 ms 218 ms CHCGILDTHBUJC01-SO0-3-0-0.mcleodusa.net [64.198.100.46]
7 187 ms 171 ms 169 ms 154 ms chi-ix.he.net [206.223.119.37]
8 186 ms 187 ms 171 ms 186 ms pos6-0.br1.nyc.he.net [64.71.157.61]
9 250 ms 249 ms 249 ms 265 ms pos2-0.gsr12012.lon.he.net [216.218.200.102]
10 265 ms 265 ms 296 ms 249 ms pos2-0.gsr12416.ams.he.net [216.66.24.158]
11 406 ms 265 ms 265 ms 265 ms welcome-at-core2.nova-ams.as34305.net [193.138.220.18]
12 609 ms 265 ms 265 ms 280 ms jointtransit.nova-ams.as34305.net [213.207.0.122]
13 639 ms 249 ms 265 ms 264 ms [193.138.222.63]
Ping statistics for www.qo4.net
Packets: Sent = 4, Received = 4, Lost = 0 (0.0%)
Round Trip Times: Minimum = 249ms, Maximum = 639ms, Average = 354ms
Hate to brust your bubble, but, have a grand daughter named Andrea Adam, Dad's name, John Adam, same name different color.
"As of 7:41pm, AP is running the story that it looks fake, but isn't sure."
Yup just saw that too. "not sure".. what a joke, it seems they need no confirmation to run with the original story but won't commit to say it's fake despite all the evidence.
I didn't see any mention of the fake mentioned at msnbc which was one of the first to run the original 'story'. Fox has the hoax story up, at least we can count on them.
They cut his head off?
and you posted it!
Is there no sanctity left?
Is there no compassion?
Is there no feeling, humanity? pity?
is there no glue? to slap that puppy back on?
Gets more interesting. First:
Registrant:
moh shahab
dammam
dammam 966
Saudi Arabia
Registered through: GoDaddy.com
Domain Name: ALMJLAH.NET
Created on: 28-Jun-04
Expires on: 28-Jun-05
Last Updated on: 29-Jun-04
Administrative Contact:
shahab, moh info@dammamhost.com
dammam
dammam 966
Saudi Arabia
508977789 Fax --
Technical Contact:
shahab, moh info@dammamhost.com
dammam
dammam 966
Saudi Arabia
508977789 Fax --
Domain servers in listed order:
DNS1.DAMMAMHOST.COM
DNS2.DAMMAMHOST.COM
The previous information has been obtained either directly from the registrant or a registrar of the domain name other than Network Solutions. Network Solutions, therefore, does not guarantee its accuracy or completeness.
Show underlying registry data for this record
Current Registrar: GO DADDY SOFTWARE, INC.
IP Address: 198.87.87.9 (ARIN & RIPE IP search)
IP Location: US(UNITED STATES)-TEXAS-ARLINGTON
Record Type: Domain Name
Server Type: Apache 1
Lock Status: REGISTRAR-LOCK
Web Site Status: Active
DMOZ no listings
Y! Directory: see listings
Secure: No
E-commerce: No
Traffic Ranking: Not available
Data as of: 08-Jun-2004
Then, we do an ARIN and RIPE search on 198.87.87.9, which yields:
ALMJLAH.NET
198.87.87.9
Record Type: IP Address
OrgName: Verio, Inc.
OrgID: VRIO
Address: 8005 South Chester Street
Address: Suite 200
City: Englewood
StateProv: CO
PostalCode: 80112
Country: US
ReferralServer: rwhois://rwhois.verio.net:4321/
NetRange: 198.87.0.0 - 198.88.255.255
CIDR: 198.87.0.0/16, 198.88.0.0/16
NetName: VRIO-198-087
NetHandle: NET-198-87-0-0-1
Parent: NET-198-0-0-0-0
NetType: Direct Allocation
NameServer: NS0.VERIO.NET
NameServer: NS1.VERIO.NET
NameServer: NS2.VERIO.NET
NameServer: NS3.VERIO.NET
NameServer: NS4.VERIO.NET
Comment: ADDRESSES WITHIN THIS BLOCK ARE NON-PORTABLE
Comment:
Comment:
NeoTrace Trace Version 3.25 - Results
Target: www.qo4.net
Date: 2/1/2005 (Tuesday), 6:36:16 PM
Nodes: 19
Node Data
Node Net Reg IP Address Location Node Name
1 1 - 192.168.1.100 --.---N, ---.---W LAPTOP
2 2 1 216.129.249.3 47.511N, 111.272W 216-129-249-3.vnet-inc.com
3 2 1 216.129.249.1 47.511N, 111.272W 216-129-249-1.vnet-inc.com
4 3 2 216.220.20.237 Seattle ag237.montanavision.com
5 4 1 65.19.239.1 48.378N, 106.617W fe0-1.fortpeck.glasgow.mt.vnet-inc.com
6 5 1 65.19.239.6 45.633N, 108.350W atm6-0-0-9.rimrock.billings.mt.vnet-inc.com
7 3 1 216.220.20.250 45.633N, 108.350W atm2-0-7.sweetgrass.ncutbank.mt.vnet-inc.com
8 6 3 66.244.207.237 51.000N, 113.750W ra1so-ge3-2-11.cg.bigpipeinc.com
9 7 4 66.163.71.141 51.000N, 113.750W rc1so-ge9-6.cg.shawcable.net
10 7 4 66.163.76.86 49.889N, 96.983W rc2nr-pos13-0.wp.shawcable.net
11 7 4 66.163.73.129 49.889N, 96.983W rc1nr-pos15-0.wp.shawcable.net
12 7 4 66.163.76.73 Montréal rc1sh-pos13-0.mt.shawcable.net
13 7 4 66.163.76.90 New York rc1hu-pos5-0.ny.shawcable.net
14 7 4 66.163.74.14 New York rc2hu-pos5-3.ny.shawcable.net
15 7 4 66.163.74.2 New York rd1ny-pos9-0.ny.shawcable.net
16 8 - 195.69.144.189 AMSTERDAM nikhef.openpeering.nl
17 9 5 194.153.154.103 AMSTERDAM euroaccess.novaxess.nl-ix.net
18 10 6 193.138.220.17 Eindhoven welcome-at-core1.nova-ams.as34305.net
19 10 7 193.138.222.63 Eindhoven www.qo4.net
NeoTrace Trace Version 3.25 - Results
Target: almjlah.net
Date: 2/1/2005 (Tuesday), 6:39:40 PM
Nodes: 12
Node Data
Node Net Reg IP Address Location Node Name
1 1 - 192.168.1.100 48.895N, 105.164W LAPTOP
2 2 1 216.129.249.3 47.511N, 111.272W 216-129-249-3.vnet-inc.com
3 2 1 216.129.249.1 47.511N, 111.272W 216-129-249-1.vnet-inc.com
4 3 2 216.220.20.237 Seattle ag237.montanavision.com
5 4 1 65.19.239.1 48.378N, 106.617W fe0-1.fortpeck.glasgow.mt.vnet-inc.com
6 5 1 65.19.239.6 45.633N, 108.350W atm6-0-0-9.rimrock.billings.mt.vnet-inc.com
7 6 3 144.223.8.57 41.128N, 104.867W sl-gw10-che-2-0-ts1.sprintlink.net
8 7 3 144.232.15.145 41.128N, 104.867W sl-bb20-che-3-0.sprintlink.net
9 7 3 144.232.18.190 Chicago sl-bb22-chi-11-1.sprintlink.net
10 7 3 144.232.20.91 Chicago sl-st21-chi-13-0.sprintlink.net
11 7 - 144.232.9.22 Chicago
12 8 4 198.87.87.9 26.356N, 80.083W server.dammamhost.com
Its Karl Rove I tell you!!!
This is a plot to get Bush Re-Elected!!!
Yeah its Haliburton!
yeah yeah thats it!
Toughen up and learn to deal with it, you big ......big ...... well, I'd call you a big wuss, but I don't know how to spell it!!
;^)
ABC news reported in April 2004 that Thomas Hammill (the contractor who was later freed) was kidnapped by the same group that claimed responsibility for today's faux kidnapping.
So they are a REAL group. I think that is a good sign that the terrorists have had to resort to this type of hoax.
http://www.abc.net.au/news/newsitems/s1085092.htm
Sew them in sow's hides...
From 2003: An audiotape purportedly from ousted Iraqi leader Saddam Hussein praised resistance against the U.S. occupation and claimed "mujahedeen" brigades were on hand to fight the "invaders."
http://edition.cnn.com/2003/WORLD/meast/07/05/sprj.nilaw.saddam.tape/
If true, then they are finished. This means that Sunday was indeed the day the war was won.
Ya know, after the weekend election this may just be our sides part in the propaganda war.
I have to agree. This is the group that Saddam bragged about in 2003.
This reminds me of the Afghan days when al queda was claiming to shoot everything down out of the skies, or baghdad bob claiming Americans were committing suicide at the baghdad airport as they were so afraid for the iraqi army.
Bottom line, not only have the terrorists been reduced to pogue status, by this time tomorrow, they'll be the laughing stock of the middle east..
Ahhhh for the days of the Carson monologues......
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.