0
0

[–] slickleg64 ago  (edited ago)

@Sheilaaliens

Youtube Here is your guy from >Evem ,pre.jpg

This is his attempt at proving his innocence.

@Millennial_Falcon deleted the thread before anyone saw it "rule 1" lol smh

0
1

[–] think_whatif 0 points 1 point (+1|-0) ago 

http://73.178.176.232/ is timing out now.

Was anyone able to archive /down/wc/dta.mp4, the one with the kid (who might be the same kid in the fatherhood.webm) and his brother?

0
0

[–] Chatman ago 

Its in her explainer video towards the end

0
1

[–] cr2 0 points 1 point (+1|-0) ago 

New account here; I only recently became interested after a friend brought up the recent videos and asked me to do some analysis on them.

If you did indeed obtain this information in the way described then it is very likely the consumer grade IP for whoever is behind the worldcorp site. This idea is corroborated by the presence of other unfiltered services on the network which would be unlikely in any other scenario. These are namely:

monopd 0.9.7 Platinum UPnP 1.0.4.11 (UPnP/1.0 DLNADOC/1.50)

You can run a simple nmap scan and obtain the information yourself to confirm.

1
-1

[–] cerber 1 point -1 points (+0|-1) ago 

wow you can use nmap. RU A HACKERMAN?????????????

0
0

[–] cr2 ago 

An asinine comment made in response to constructive input; so very novel. And from someone naming themselves after some mediocre ransomware. Hilarious.

0
0

[–] slickleg64 ago  (edited ago)

"Evem ,pre.jpg".

This could be the guy in the "even" video

0
0

[–] wehaveyouremails ago 

worldcorpo has an active Twitter??

https://twitter.com/WorldCorpEnt

Posted 4 hours ago, uploading a video onto the site by midnight tonight. Joined in June 2015, before we all started digging. What the fuck?