0
0

[–] sallyhansen ago 

Last week thru the original worldcorpo .net website, I was invited into the discord chat website. All I had to do was enter a username to get in. In the specific text chat room that world corp enterprises uses, I think it was labeled "aol chat" or something like that, there ARE cp pics on that site. Also lots of graphic anime sex pics. There were also several pictures of a overweight naked man laying on a bed, holding his wille. He looked similar to the man in the world corp videos, drinking the urine, matchstick in his willie, feather duster up his butt. I have no clue who is connected to what. But there IS cp on the discord website that wce uses. I wish someone would find the person who put it there & if the children are still being harmed.

0
0

[–] slickleg64 ago  (edited ago)

@Sheilaaliens

Youtube Here is your guy from >Evem ,pre.jpg

This is his attempt at proving his innocence.

@Millennial_Falcon deleted the thread before anyone saw it "rule 1" lol smh

0
0

[–] wehaveyouremails ago 

worldcorpo has an active Twitter??

https://twitter.com/WorldCorpEnt

Posted 4 hours ago, uploading a video onto the site by midnight tonight. Joined in June 2015, before we all started digging. What the fuck?

0
1

[–] think_whatif 0 points 1 point (+1|-0) ago 

http://73.178.176.232/ is timing out now.

Was anyone able to archive /down/wc/dta.mp4, the one with the kid (who might be the same kid in the fatherhood.webm) and his brother?

0
0

[–] Chatman ago 

Its in her explainer video towards the end

0
8

[–] Sheilaaliens [S] 0 points 8 points (+8|-0) ago 

Here is the explainer video I made: https://youtu.be/p8LXJdIYtC8

0
0

[–] Chatman ago 

I noticed the gmail address was originally used for people to send their videos to. We need to find the details of the guy who sent fatherhood and each to worldcorpo OR get fbi to get into his email, I think chasing the owner of worldcorpo might be a pg dead end.

0
0

[–] thisHoCwilltumble ago 

John J Callanan is the name of the man in the one photo. Here is a youtube video he did that I am about to watch. https://www.youtube.com/watch?v=NvZRQuAzG3E

0
1

[–] cerber 0 points 1 point (+1|-0) ago  (edited ago)

This is from a website that was from one of those personal OSX web design servers.
https://www.lifewire.com/use-your-mac-to-share-web-site-2260400
They are automatically run, and the user generally has no idea that it is public.

Also, what do you hope to achieve by shooting the messenger? Why target worldcorp? How do you know they produced the videos?

0
3

[–] think_whatif 0 points 3 points (+3|-0) ago 

Even if ultimately not related to PG your sleuthing skills are quite Impressive. Thank you for your efforts.

0
1

[–] cr2 0 points 1 point (+1|-0) ago 

New account here; I only recently became interested after a friend brought up the recent videos and asked me to do some analysis on them.

If you did indeed obtain this information in the way described then it is very likely the consumer grade IP for whoever is behind the worldcorp site. This idea is corroborated by the presence of other unfiltered services on the network which would be unlikely in any other scenario. These are namely:

monopd 0.9.7 Platinum UPnP 1.0.4.11 (UPnP/1.0 DLNADOC/1.50)

You can run a simple nmap scan and obtain the information yourself to confirm.

1
-1

[–] cerber 1 point -1 points (+0|-1) ago 

wow you can use nmap. RU A HACKERMAN?????????????

0
0

[–] cr2 ago 

An asinine comment made in response to constructive input; so very novel. And from someone naming themselves after some mediocre ransomware. Hilarious.

1
1

[–] Sheilaaliens [S] 1 point 1 point (+2|-1) ago 

You know what folks, I guess I understand the concern. Don't click anything, I will make a video showing everything and how I got the IP address and everything. Don't worry about it I'll post it today. For the record nothing happened to my computer when I was browsing that site and it does belong to Worldcorp.

0
0

[–] ZalesMcMuffin ago 

Just FYI, you're one of my favorite sexy disembodied voices. <3

0
0

[–] Tapp3d ago 

http://whois.domaintools.com/73.178.176.232

Looks like a Comcast Static IP in New Jersey

load more comments ▼ (5 remaining)