Related thread: https://voat.co/v/pizzagate/1527919
As you can see, I'm a first-time poster and please correct me, if I did something wrong while posting and of course if I missed some information.
It did basicly makes "sense" to me, that those organizations act the way they want and don't even try to hide their identity and it would be an interesting coincidence, but it seems like it is, because those IPs should be VPN IPs (of course it's possible, that they use the VPN provider to attack the wiki).
So I started researching the IP ranges the suspicious IPs are in. As pointed out before[1] the IPs belong to CachedNet LLC. A lot of those ranges are banned by several Anti Spam services[2], which is typical for VPN/Proxy-Providers.
After more research, since this is just speculation yet, I ended up in the support forum[3] of a VPN-Provider called "privateinternetaccess". There are multiple threads, in which people are complaining about the VPN, because it's not working that well. People, who use the VPN, get IPs (in Delaware) of CachedNet LLC, because the VPN-Provider probably bought them from CachedNet. You can also find a reference about the IPs status in spam databases like Spamhaus. The IPs are used for a lot of spam.
Quote from the forum user:
This doesn't appear to be working, when I connect via the New Zealand location. I have checked the IP location, and it comes up as Delaware U.S.A.
So, as I said at the beginning, DYNCORP might use the VPN to attack the Wiki, but the IPs location in Delaware is no evidence itself. Correct me, if I missed a fact.
[1] https://voat.co/v/pizzagate/1527919/7433447
[2] http://www.spambotsecurity.com/forum/viewtopic.php?f=7&t=3874
https://stopforumspam.com/ipcheck/162.212.171.37
https://cleantalk.org/blacklists/162.212.171.37
etc. etc.
[3] https://www.privateinternetaccess.com/forum/discussion/18802/new-zealand-vpn-not-working
Archive in case of deletion: http://archive.is/ACcDs
view the rest of the comments →
DarkMath ago
"VPN-Provider"....A VPN "provider" doesn't give you an ip address the company that's using that VPN software does. That's why all these attacks are coming from Dyncorp. Basically what I'm saying is I don't understand the point you're trying to make. Care to help me understand?
tazytale ago
The main points are included in Edit #1 and #2. Those are typical automated bot attacks. Important is, that the bots are randomly chosing targets to spam at and those IPs are known spamers on WordPress Blogs, MediaWiki (pizzagate.wiki's software) & more.
I don't really get what you are saying and asking to be honest. A lot of people call the business, where you pay for the (mostly) shared server capacity and (mostly) shared IPs VPN provider. In this case: privateinternetaccess. It's Business-to-Customer. That provider has to buy the IPs the websites will see, when a user connects to them with the server-structures (and their IPs) of the provider as a middleman. privateinternetaccess as a provider is using the suspected IPs from CachedNet LLC for their customers (they probably rented or bought them). So a user's computer (a bot in this particular case) connects to the VPN-servers of privateinternetaccess, chooses a server (they are categorized by the country/ip) and will connect to every third party over the VPN-servers now, so they will see the CachedNet LLC IPs at the end.
Those IPs are located in locations like Delaware, where the company related to DYNCORP is located. That's the only reason they thought it's DYNCORP (and they are mostly directly visiting the /DynCorp page of the wiki, the bots might have found this page first while searching for targets on Google or something else). The fact it's VPN IPs, this is typical bot behaviour and those IPs are known for attacking sites like this, says it all.
DarkMath ago
I think the issue is VPN is too general a term. My experience with VPNs is through work. So if I was working from home one day I'd start up my companies VPN software which would create a secure IP tunnel from my computer to the companies network. My IP address would then change to one given to my by my company. From then on while I was logged into the VPN and say I went to cnn or foxnews or wherever they would see my IP as coming from the company I work for not from my own IP address originally given to me from Comcast(in my case). I think you're talking about a different type of VPN basically, one that I'm not familiar with. When I read this thread for the first time my immediate thought was "Oh, some people working for Dyncorp are working from home this weekend and after they joined the Dyncorp VPN that day they then went and did X, Y or Z thing like try to hijack the PizzaGate Wiki or delete valid posts on voat as NumbChuck did." Does that make anymore sense?
tazytale ago
Okay, now I get the point. Replace the company you are working at with a commerical service, where you just pay for using their VPN-servers and IPs. That's basicly it. They provide it to give some privacy and a bit of anonymity to the user. The people, wo are running those spambots, don't want their real IP in the website's owner hand, so they use a VPN.
DarkMath ago
But Dyncorp doesn't sell that VPN service. I don't get it.
tazytale ago
That's it. That's my point. DYNCORP has nothing to do with the company (privateinternetaccess), which is providing the suspicious IPs to their users. It's not DYNCORP trying to spam to the wiki. Look at my two edits in the post, those IPs attack a lot of random websites which run the software (MediaWiki) the pizzagate wiki uses. They are just a random target of an idiotic kid (or not) which is running a bot over a VPN by privateinternetaccess.
DarkMath ago
Here's the post from RebelSkum where they say the IP was from Raytheon/Dyncorp in Waltham MA: https://voat.co/v/pizzagate/1528966
"I have evidence that an IP, 162.212.171.37, accessed our DynCorp page and proceeded to create the same spam attack situation which had brought down the Pizzagate Review but was unsuccessful this second time."
tazytale ago
The IP he posted is located in Delaware, is a VPN as far as we know, and known for spam and doing those attacks on a regular base.
Location: 162.212.171.37 -> https://www.iplocation.net/
VPN: See my post.
DarkMath ago
I asked this lower down but I'm still stuck on why RebelScum would say this: "was being accessed by Waltham, MA"? Do you think he's a LARPer or something?
tazytale ago
Sorry for answering that late, I had a cooldown, I reached 10 comments/24 hours if I remember that right.
Read my other comment, we kinda split our talk into two trees.
And no, there is no good reason for me to say or think he is a LARPer. I think he is not a tech at all, doesn't know about those bots, which just do this kind of spam at a daily base and he didn't know, that those where just VPN IPs. Not his fault at all. Actually @RebelSkum would be a good idea, so he sees it, since nearly nobody upvoated the thread, but people are still upvoating his thread.
RebelSkum ago
I'm honestly an average guy who's done whatever my skills will allow me to help with Pizzagate:
https://www.reddit.com/user/CatacystFPV
https://voat.co/user/RebelSkum
I understand skepticism and would probably be doing the same thing if I was DarkMath, but I am not in this for money or any reason other than the rare chance I have to enact positive social change. I absolutely refuse to accept money for this project and all of my personal projects (contributed to UFOdetector for Raspberry Pi, develop open source Raspberry Pi robots, AI, and sensors, as well as contributions to QTCSDR for Raspberry Pi 3 and BetaFlight for Naze32 flight controllers for quadcopters).
See for more: http://pizzagate.wiki/Pizzagate.Wiki_Mission,_Rules,_and_Guidelines#Mission_Statement
tazytale ago
I can relate, posts like this are my contribution to the whole thing. I also want to underline my last comment in this comment chain again, it was just about the information I could find on the web, not about you in particular.
RebelSkum ago
No hard feelings all around. Thanks for the support!