Let them know what you think about this.
WIKILEAKS.COM
Registrant:
Wikia, Inc.
500 3rd St.
Suite 405
San Francisco, California 94107
United States
Registered through: GoDaddy.com, Inc. (http://www.godaddy.com)
Domain Name: WIKILEAKS.COM
Created on: 03-Jan-07
Expires on: 04-Jan-09
Last Updated on:
Administrative Contact:
Davis, Michael domains@wikia.com
Wikia, Inc.
500 3rd St.
Suite 405
San Francisco, California 94107
United States
6505480800
Technical Contact:
Davis, Michael domains@wikia.com
Wikia, Inc.
500 3rd St.
Suite 405
San Francisco, California 94107
United States
6505480800
If you notice the information posted at the Wikilieaks site, they generally provide a public service most of the time.
They are an anonymous site for leaked government documents from around the world that may serve a good purpose to those who wish to keep liberty personal. Especially if your government happens to be corrupt or fascist.
WIKILEAKS.COM
It's wikileaks.org, not .com.
The site is supposedly in Nairobi, Kenya:
Domain ID:D130035267-LROR Domain Name:WIKILEAKS.ORG Created On:04-Oct-2006 05:54:19 UTC Last Updated On:01-Mar-2008 01:15:18 UTC Expiration Date:04-Oct-2008 05:54:19 UTC Sponsoring Registrar:Dynadot, LLC (R1266-LROR) Status:OK Registrant ID:C-13000 Registrant Name:John Shipton Registrant Street1:c/o WLK PO Box 8098-00200 Registrant Street2: Registrant Street3: Registrant City:Nairobi Registrant State/Province: Registrant Postal Code:none Registrant Country:KE Registrant Phone:+1.2026576222 Registrant Phone Ext.: Registrant FAX: Registrant FAX Ext.: Registrant Email:an1984@hush.com Admin ID:C-13000 Admin Name:John Shipton Admin Street1:c/o WLK PO Box 8098-00200 Admin Street2: Admin Street3: Admin City:Nairobi Admin State/Province: Admin Postal Code:none Admin Country:KE Admin Phone:+1.2026576222 Admin Phone Ext.: Admin FAX: Admin FAX Ext.: Admin Email:an1984@hush.com Tech ID:C-13000 Tech Name:John Shipton Tech Street1:c/o WLK PO Box 8098-00200 Tech Street2: Tech Street3: Tech City:Nairobi Tech State/Province: Tech Postal Code:none Tech Country:KE Tech Phone:+1.2026576222 Tech Phone Ext.: Tech FAX: Tech FAX Ext.: Tech Email:an1984@hush.com Name Server:NS1.EVERYDNS.NET Name Server:NS2.EVERYDNS.NET Name Server:NS3.EVERYDNS.NET Name Server:NS4.EVERYDNS.NET
But the server is in Sweden:
$ whois 88.80.13.160 OrgName: RIPE Network Coordination Centre OrgID: RIPE Address: P.O. Box 10096 City: Amsterdam StateProv: PostalCode: 1001EB Country: NL ReferralServer: whois://whois.ripe.net:43 NetRange: 88.0.0.0 - 88.255.255.255 CIDR: 88.0.0.0/8 NetName: 88-RIPE NetHandle: NET-88-0-0-0-1 Parent: NetType: Allocated to RIPE NCC NameServer: NS-PRI.RIPE.NET NameServer: NS3.NIC.FR NameServer: SEC1.APNIC.NET NameServer: SEC3.APNIC.NET NameServer: SUNIC.SUNET.SE NameServer: TINNIE.ARIN.NET NameServer: NS.LACNIC.NET Comment: These addresses have been further assigned to users in Comment: the RIPE NCC region. Contact information can be found in Comment: the RIPE database at http://www.ripe.net/whois RegDate: 2004-04-01 Updated: 2004-04-06 # ARIN WHOIS database, last updated 2008-09-16 19:10 # Enter ? for additional hints on searching ARIN's WHOIS database. % This is the RIPE Whois query server #3. % The objects are in RPSL format. % % Rights restricted by copyright. % See http://www.ripe.net/db/copyright.html % Note: This output has been filtered. % To receive output for a database update, use the "-B" flag. % Information related to '88.80.12.0 - 88.80.13.255' inetnum: 88.80.12.0 - 88.80.13.255 netname: PRQ-NET-INT descr: prq Inet - Access descr: Customer / link addresses country: SE admin-c: pIN7-RIPE tech-c: pIN7-RIPE status: ASSIGNED PA mnt-by: MNT-PRQ source: RIPE # Filtered role: prq Inet NOC address: prq Inet Box 1206 SE 11479 Stockholm Sweden phone: +46 (0)8 50003150 remarks: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! remarks: !! Abuse reports should ONLY be sent to abuse@prq.se !! remarks: !! Do NOT call unless it's very urgent !! remarks: !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! admin-c: PW1115-RIPE tech-c: PW1115-RIPE nic-hdl: pIN7-RIPE mnt-by: MNT-PRQ source: RIPE # Filtered abuse-mailbox: abuse@prq.se % Information related to '88.80.0.0/19AS33837' route: 88.80.0.0/19 descr: prq Inet aggregated route origin: AS33837 mnt-by: MNT-PRQ source: RIPE # Filtered
Also, I note the hackers used ctunnel.com to hide their tracks when they accessed the Yahoo account.