This is ABSOLUTELY for informational purposes ONLY. attackvector.org nor I will be held responsible for how you choose to use the information that I post on my blog. This individual, though he is a douche for sending spam, is a real person with a real life. By misusing the information found here, you have the power to potentially destroy someones real life. There’s a fine line between a legal hack and a felony. Information gathering is not illegal so long as it’s obtained through legal means. Using the information, however, is quite another story.

UPDATE: Because of something that one of my readers brought up, I want to clarify. The email that I received was not the run of the mill malware/spambot/whatever style email. The email was coming from his email address, using his business’s name, and advertising his business. I would have never posted this had I had any doubt that this may not have actually been sent, by him, in some fashion.

I use spammers and pedophiles as test subjects when I’m working on something. This is mostly because it’s unlikely that they would go to the authorities and point the finger at me, knowing that I could easily turn around and say something to the effect of, “Well, yes I did pwn his box.. but you should have seen all the child porn I found on it.” owned x 2.

I happened to receive a piece of spam at the exact moment as I was going to start a post about privacy and anonyminity on the internet. I will consider this to be a sign from God that this dude needed to be set straight. Okay, maybe not. I’m not sure what the bible says about spam.. but if I were God, it would be into the pits of hell for them. So, since I cannot cast people into eternal suffering in a firey pit, I will have to settle for second best. Pwnage!

Whats even better, none of what I’m about to do is illegal. It’s a serious, serious invasion of privacy, and you definitely don’t want it to happen to you, but all of it can be harvested through public record, social networks, forum posts, etc etc etc.

First, lets take a look at the email that I received.

Received: from unknown (HELO p3pismtp01-017.prod.phx3.secureserver.net) ([])
(envelope-sender )
by p3plsmtp09-04.prod.phx3.secureserver.net (qmail-1.03) with SMTP
for ; 7 May 2010 01:05:53 -0000
X-IronPort-Anti-Spam-Result: AjYCAOP/4kvYI8QXnGdsb2JhbACeChUBAQEBAQgLCAkRIrxZgmCCMwSDQQ
Received: from server299.com ([])
by p3pismtp01-017.prod.phx3.secureserver.net with ESMTP; 06 May 2010 17:58:47 -0700
Received: (qmail 10509 invoked by uid 3287); 7 May 2010 00:58:46 -0000
Received: from
(SquirrelMail authenticated user steve)
by www.barteritemsfortrade.com with HTTP;

Ok, so, his email address is steve@barteritemsfortrade.com.. he’s sending email through server299.com.. and his real IP address is All we really need is his email address and his IP. Lets see what we can find.

Non-authoritative answer: name = c-67-185-122-64.hsd1.wa.comcast.net.

Now we know that he’s connecting from Washington (wa.comcast.net). Lets see what Geo IP location says. I use this service, but there are many others. I’ve also written a few tools to do this as well, but we’re going to use what the average Joe has access to.

Just put the IP address in the box and hit “search”. Here’s what we find.

Region: Washington
City: Spokane
Postal code: 99205

So, we’re narrowing it down.. we now know that it’s Spokane, Washington. Now we’re going to take a look at his email address. First, obviously, just google the email address. This will bring up information for virtually anything that the person has ever used their email on. Forums, social networks, etc.

In this case, however, nothing came up on google. We must dig deeper. Enter, whois!

PO Box 8421
Spokane, Washington 99203
United States

Biz two? Does that mean there is a Biz One and a Biz Three, perhaps? Also, he’s using a PO Box.. blah.

Administrative Contact:
Nicholas, Steve steve@bestimpressionz.com
(509) 283-7030 Fax — (509) 456-3813

Jackpot! We now have a last name and a phone number. We also have an additional email address/domain.

Administrative Contact:
Your Logo Here snicho@juno.com
139 west 30th Avenue
Spokane, WA 99203
509-456-3813 fax: 509-456-3813

Hmm.. a real address.. no PO box on this domain. Is that an office? A house? Is it his house? I can assume that ‘snicho’ is short for ‘steve nicholas’, and it’s the administrative contact, which means he owns the domain.. so the address has something to do with him.

Enter.. Google Maps. :-)

Well, it’s definitely not an office building, so at this point I’m going to assume that it’s his house until I find out differently. We can further verify this by googling his name + city + state.

That address looks rather familiar… oh yeah, it’s the address that was associated with his domain. We can be virtually certain at this point that that is his real address and house. Lets see who else lives in the house with him – just google the phone number listed.

Ok, so, Nancy has the same last name as Steve, so I think we can safely say that this is his wife.

We’ll come back to her later. Lets see what else we can find about Steve.. I’m really starting to feel like family at this point. :-)

Back when I googled his name + city + state, I noticed that below the address result, there was a LinkedIn page.. lets check that out.

Ok, so there’s all sorts of useful information.. but I found another email address.. steve.nicholas@itex.net Not often do I meet someone with as many email addresses as me.. lol.

So, back up to the top, we google for steve.nicholas@itex.net.

Some interesting stuff, but nothing really useful for my purposes. Lets check out Facebook and see if he’s a social butterfly. I log in and “search for friends” and enter his email address(es). His account is registered with the itex.net email address.

He doesn’t have his Facebook stuff set to private, so he’s kind of letting it all hang out. Thanks, Steve!

Yawn. The only thing interesting there, is that we’ve now definitely verified that that address is correct and that his wife’s name is definitely Nancy. Maybe her page is more interesting.. lets look

Note: Passwords.. by building a profile of someone, you begin to get a feel of who they really are. I’m willing to bet that at least one of Steve’s passwords has something to do with fishing, trout, or cutthroats (type of trout – according to his facebook page).

Nancy’s Facebook:

I teach 7th & 8th graders at Salk Middle School in Spokane WA. I married Steve 27 years ago and we have 2 daughters, Susanne and Rachael. Susanne married Dan Wadkins 2 years ago and they are expecting their first child in March. Dan is an attorney and Susanne is a special education teacher. Rachael is living in Las Vegas where she teaches special education to preschoolers and kindergarten. We have an awesome family!!!!

Here’s something to take a mental note of. Women are generally more open about their personal lives and love to share with others. In one paragraph, we learn that she teaches at Salk Middle School, they’ve been married for 27 years, they have 2 daughters, Susanne and Rachael, Susanne is married to Dan Wadkins (note – this probably means that Susanne is no longer Susanne Nicholas, she’s probably Susanne Wadkins). Rachael lives in Vegas.

How ever would we find out more information about Susanne and Rachael? Oh yeah, friends lists. If the parents have Facebook, the kids most certainly have Facebook.. and barring any family drama, they’ll all be on each others friends lists. And, of course, I’m right.. found Rachael, Dan, and Susanne.

Also, going through her wall posts gave up some information. They’re new grandparents.. their grandaughter Lola was born on March 15th.. this was Dan and Susanne’s daughter.

Now, lets see what Intelius says about Nancy (note – I skipped Steve on Intelius because his entry is all screwed up.)

Now we have ages, too. It’s interesting that there’s a “Ralph Steve Nicholas” listed, who has the same age as the other two Steve’s listed. Could Steve’s real name be Ralph??

Ok, anyway, lets see what I can find out about their house. Just about every county in the country allows you to view property tax records on the internet. I googled “spokane washington property tax records”. What you’re looking for is like, the assessor’s home page then just punch in the address and you can find a wealth of information.

What this record tells us, is that Nancy actually owns the home.. Steve isn’t even listed. She’s also the sole person listed paying the property taxes. Interesting.. I wonder why?

Also, further down on the report, there’s two documents. A quit claim deed, and a statutory warranty deed. A warranty deed is issued in some states when a house is sold. It protects the buyer from having third parties come after them for unpaid debts and whatever. So, it appears as though they bought the house in 2001 for $110,000? Seems awfully low.

Now, lets look at the quit claim deed. First thing I notice. R Steve Nicholas is listed as “Husband of Grantee” I think Steve’s real name is Ralph. lol.

This is interesting.. quit claim deeds are used after a divorce to switch the owner of a property from one party to another at the county level. But they’re still married. The other times that I’ve seen quit claim deeds used is when people encounter serious financial trouble and need to file bankruptcy. They file independently and deed the house to their spouse.

Lets find out!

I am not going to tell you what service I use to obtain this information because I don’t want it to get abused and taken away. Also, I don’t think everyone should have access to it. SO.

91-40727 Ralph Steven Nicholas and Nancy Lynn Nicholas
Case type: bk Chapter: 7 Asset: No Vol: v Judge: John C. Minahan Jr.
Date filed: 05/08/1991 Date of last filing: 02/11/1993
Date terminated: 02/11/1993

Ok, so they did a joint bankruptcy in ’91 and it was discharged in ’93. I also have a list of their creditors.. no wonder they filed bankruptcy. Ouch.

One other piece of information that this offers, is previous addresses and the last 4 digits of their social security numbers. Keep in mind, a lot of people use the last 4 digits of their social for pin numbers.. because most pin numbers are limited to 4 digits. Stupid.

UPDATE: I’ve decided to X out the social security numbers because this post is starting to receive a ton of traffic and I’m not sure I want everyone visiting it to have this information. My intention of this article is not to make it easy to steal this guys identity.. it’s to point out a vulnerability. If you really want to find his social security number, lets just say.. it’s available via the internet. :-)

Ralph Steven Nicholas
6747 Crooked Creek Dr.
Lincoln, NE 68516
SSN / ITIN: xxx-xx-xxxx

Nancy Lynn Nicholas
6747 Crooked Creek Dr.
Lincoln, NE 68516
SSN / ITIN: xxx-xx-xxxx

Here’s something to really think about.. I was able to obtain all of the information in this post for 16 cents and by just using an email and IP address from a piece of spam.

Family members, ages, schools, anniversary dates, marriage lengths, hobbies, interests, phone numbers, addresses, property records, property taxes, pictures of their house, pictures of them, pictures of their children and grandchildren, deeds on their house, bankruptcies, employment history, previous addresses, previous creditors, and bits of social security numbers.

I’m pretty sure I’d be able to fake my way through one of those password reset forms.. you know, where you set up a “secret question” asking what your dogs name was, or where you went to school?

Beyond that, I’m fairly confident that at this point, if I were to call his bank and pretend to be him, I could easily pass when they asked me personal questions.

In closing.. you really need to pay close attention to what you’re posting on the internet. If I were a douche, I could ruin this guys life using this information. There are a lot of douches out there that are doing this type of stuff right now. Given an email address, phone number, or whatever, they build profiles on people which can be used to exploit them and steal identities.

The other thing that I’ve actually fallen victim to, is the speed of Google’s spiders and the fact that they index Craigslist. Lets say you run a business.. Catholic Charities R Us and in this post, you include an email address, phone number, something. Lets say you also make a post, days, weeks, whatever, later looking for whores, or something. Both of those posts will come up when Googling for your phone number.

Also, consider what you’re sending in this email. What if this guy had sent me an email trying to extort me, threaten me, whatever? I could turn this over to the authorities and they’d have their work cut out for them.

Not to try to scare people too much, but think about single women in the dating scene. They make a post somewhere with their email address and someone comes across it and is able to determine the same amount of information about them as what I did above? What if that person was more interested in something other than identity theft?

I think you get the idea.. essentially.. guard your personal information with your life. Never post your phone number on the internet (unless you’re using a proxy number, which is what I do), and make sure no personal information is associated with your email address before you go firing off emails to strangers.


If you enjoyed this post, make sure you subscribe to my RSS feed!

Also, if you think others would find this article useful, why not share it using the Share/Save button below? Thanks!

No related posts.

  1. Lee Lee says:

    awesome and insightful write up!

  2. g g says:

    How do you know that this guy hasn’t got spambot malware on his machine or having his credentials stolen? Is by http and squirrel mail all you are working from?

    just wondering, because claiming he is a spammer and posting this much information about someone could really, as you yourself state, ruin someones life.

  3. Matt Matt says:

    I appreciate your comment and understand the concern. I’ll elaborate a bit.

    1) The email address that was used was his. Generally when someone has malware, the malware will use his SMTP server, so I would have seen his IP, but the address used will be something random – ie someguy1234@yahoo.com, or whatever

    2) There’s a certain “feel” to malware spam. Misspellings, links to tinyurl.com to mask true url’s, odd quirks in headers, etc. Plus, the content, depending on the botnet used, will usually be about drugs, products, male enhancement, etc. None of these were the case in this email

    3) The email that I received was spamming about his barter network – this wasn’t included in the post because I didn’t think it was really relevant. So, the idea of being infected by malware that is sending out emails on his behalf, without him knowing, but spamming for his company is.. well, unlikely.. :-)

    I understand where you’re coming from, though. Had I had any doubts that the spam that I received wasn’t specifically coming from him, I wouldn’t have posted this. Having the ability to obtain all of this information is kind of like using a gun.. you want to make damn sure of your target before you pull the trigger.

    A good example of malware spam is one that I received yesterday. My email address was harvested in the same way that Steve harvested mine (via craigslist).. and it was coming from the guys AOL email account.. but the ‘originating-ip:’ header was an IP address in Italy. When I began to research the email address, nothing had any ties to Italy and the dude lived in like, Indiana.. so I sent him an email letting him know that his account had been hacked and provided him with the headers/IP address of the person using his account.

    Thanks again for your comment. I hope this answered your question

  4. Don Don says:

    Amazing, Matt. I had no idea how vulnerable we are to internet shenanigans.I’m sure glad you’re on my side.

  5. g g says:

    Thank you for clarifying. I’m well aware of the feel of spam emails, as is most people with an email address :) but, the nature of the email was unknown to me, as was the subject, the fact that it was about his company and even his email address (you mention it, but I did not see it in the “data” you posted from the email. So for all I and the rest of your readers knew, this could very well be a run of the mill, malware-spam email using his address (which is not unusual). I think you should give a bit more information in the top of your post, making it easier to follow on you decision. I understand your reasoning now that I have the information. (I re-read the first part to see if I perhaps missed the information.)

    And btw., as I was unsure at first, Thank you for an interesting post. :-)

  6. Matt Matt says:

    That’s probably a good idea.. I don’t want people to think that I’m just randomly targeting people. :-)

    Glad you enjoyed the post.. I’m kind of surprised at the traffic it’s seeing.. apparently I’ve struck a chord.

  7. Scott Scott says:

    I am amazed at the amount of information gathered by everyday tools. This is an excellent write-up. As Don said, I too am glad you are on my side.

  8. Andy Andy says:

    Excellent post as usual, one question though. How do you collate, organize and search through all of the data you’ve collected? I’ve briefly used Maltego before, but I was wondering if you’d used anything else or had any specific method?

  9. Matt Matt says:

    I wish that I could say that I had some super elite method for managing the data, but to be honest, I used gedit. lol.

    I’ve used Maltego, and while I like the interface and everything, I find it somewhat limiting. This may just be due to ignorance, though. Maybe if I could use more than 75 conversions a day, I would use it more often.

    Actually, what I SHOULD do, is perform this same audit using Maltego and see if I find anything more than what I found by doing it by hand.

    If I come across anything amazing to organize audit data, I’ll do a post on it. Also, if you find anything, let me know!

  10. Andy Andy says:

    lol i’m the same and just use Textwrangler on Mac. It’s more of a ‘dump’ of data for later analysis, usually just in order of what i’ve found.

    Agreed with Maltego, the limit on the community edition does stop me using it more. Maybe I should fork out for a commercial license :)

    That would be an interesting comparison to see if Maltego could find the same data (or more) and if it was faster.

    Great, i’ll do the same. I might try to develop something online that could be used to collate this kind of thing… my thinking cap is now on!

  11. Matt Matt says:

    Something done online using a backend db would be pretty awesome. I would imagine you could design it to resemble an address book (almost).. name, dob, address, phone number, etc etc etc.. plus a large area for notes. Let me know what you come up with.. I’d totally use something like that.. especially if it would export the data into some fancy looking report type of thing! :-)

  12. Andy Andy says:

    I’ll see what I can do, it’d be fairly easy to knock together a php based web app with a DB that could store that kind of data.

    Fire me over an email and i’ll let you know what i come up with :)

  13. [...] Here’s how it’s done. And this is the easy stuff, the stuff you can do for free in a few minutes. There are much more powerful tools than what this article shows. [...]

  14. [...] my first “Invasion of Privacy” post, I used email header information to find out the real IP address of Steve, the guy who [...]

  15. busy ze Szczecina do Holandii busy ze Szczecina do Holandii says:

    This is the best site i’ve ever seen, bookmarked

  16. [...] for how long, names of your children, name of your spouse, full names, etc. If you read my “Invasion of Privacy” post, you’ll see what little information is needed in order to steal someones [...]

  17. Cassie Cassie says:

    Thank you for writing this. (: My dad sent me this through an email telling me I had my address on my hotmail profile. (I got the hotmail address when I was way younger, I was not aware of stalkers/pedos and such) So after I read this I took my phone number and address off. Thank you! (:


  18. This is pretty cool stuff man. Like how easy it is for the authorities to find internet criminals. I think one of the bigger culprits here is Facebook’s open profiles. I don’t think that should be an option, and I don’t quite get their intensions of this yet. The people I am most worried about this with is young, single girls. Posting provocative profile images (Which many of them do without thinking – it’s part of culture, ya know?), posting their feelings, even things like their relationship status has guys all over that. I hope there is a privacy revolution one of these days – like people just having a better sense of how much they put online and what it could turn into.

    Thanks for the post =)

  19. Blake Blake says:

    It is pretty crazy how much information is out there. Especially for free! One interesting thing I like about Clear Wireless internet is my IP says I’m in Washington State. Proxies rule too!

  20. Aran Aran says:

    Hi, Im wondering how you got his IP address from the email you received?

    I tried to do it on myself seeing as one of my email address’ is sending spam to my friends and yet nothing is showing up in my sent box so I have a feeling something bad happened.

    Do you have any advice?

  21. TS TS says:

    Very well explained. Many people don’t realize how much of their information is actually out there. And a lot of stuff that Google doesn’t turn up can be found via pipl.com and other similar dark web search engines :(

    Even though I’m in my early 30s I long for the simplicity of days past.

  22. Matt Matt says:

    @Aran: Take a look at the headers of an email that you receive from, say, a Yahoo account. Within those emails, you’ll probably see a header that says “Originating IP”, or something similar. If you do a DNS lookup on that IP address, you’ll most likely see that it’s a dynamic IP address and not the IP address of Yahoo. This would be the senders real IP address, or, the IP address of the proxy that they bounced through, if they were smart.

  23. Matt Matt says:

    @Blake: Yeah, there are a lot of ways to protect yourself, but, honestly, not many people are willing to put forth the effort.

  24. Kris Kris says:

    I for one found this absolutely terrifying! :D Just how truly insecure we are. I do my best to protect myself and my family but after reading this I suddenly feel woefully inadequate. I’ll definitely be reading more here. I’m also sending this article out to my networks, I hope that people will start to realise that they need to be so much more careful with their information.

  25. Mike Mike says:

    Have I got a GREAT new business opportunity for you, Matt!!! Just kidding, please don’t pwn me. Great post BTW.

  26. Matt Matt says:

    @Mike: Haha.. classic!

  27. Pete Pete says:


    First time here, was referred from lifehacker.com (I think). I’ll be using this post as evidence to family and friends that it isn’t paranoia that makes me cautious, it’s education. I’ve wanted to write a post like this for years, and didn’t have to guts or the determination. A heartfelt thank you.

    As a follow-up to your article… I determined that Steve (Ralph) and Nancy, are just trying to make their way in the world. They weren’t that good with money, but in general nice people, and he has dreams of making a few bucks while in retirement. He doesn’t understand this stuff, and he probably saw some questionable software or “business” service or whatever, that reads:
    “These emails addresses were collected FREE from the internet. These people posted their e-mail addresses so you could contact them. Email them and see if there’s a fit for your business”.
    I have consulted small businesses for 13 years now, and have seen more than one of the my clients either buy that stuff or ask me my opinion about it. They are naive and innocent. Or at least my clients were. Poor Steve and Nancy. I prefer to think the best of them.

    I don’t mind you used Steve as an example though. Real examples drive the point home. I’m just hoping that someone let him know about this post so he can start working on reducing his vulnerability, and will stop using that software/whatever he’s doing.

    Again, thank you for the article.


  28. Matt Matt says:

    @Pete: Yeah, people always think we’re nuts for being so paranoid until they have their social security number plastered on someones blog.. ;-)

    I understand that Ralph was not trying to act maliciously, but, whether naive or not, if you’re on the internet today, you understand that spam and UCE are major no-no’s. The fact of the matter is, I’ve run businesses and have felt the allure of spam, but have chosen not to use that method to advertise for the simple fact that I don’t want to contribute to the overwhelming problem that we have on the internet right now.

    So, if you choose to put ethics and morals aside and let greed get the best of you, you shouldn’t be too surprised when you face some consequences. Thankfully, for Ralph (and Nancy), I’m not a complete dink and left out some critical information that would have allowed people to completely steal his identity and/or ruin their lives. Did I want to? Yeah.. but I had to stick to my own ethics. If I screwed up on the internet and did something like this, sure.. I’d be pissed, but I’d face up to what I did and just be thankful that the person who wrote the article didn’t give away everything.

    Now, that being said.. if I can get the info, so can everyone else.. I didn’t really use anything fancy to get this info, so it’s out there for the taking. Ralph represents a huge number of individuals who could easily fall victim to this same attack.

    And.. I’m certain someone informed him.. his Facebook account got real tight after this post, though his wifes didn’t. lol. Also, when googling for his website, my website shows up before his.. so I he’s probably found the article himself.. :-)

    - matt

  29. Bill G Bill G says:

    who cares about what you can find on the web?

  30. Matt Matt says:

    @Bill G: Apparently everyone but you..

  31. Zack Zack says:

    wow! i never realized what information is available from various sources! thank you so much for the insight!

  32. Russ Greene Russ Greene says:

    So you know, probably the reason for the upswing in traffic is that this page is posted on StumbleUpon. That’s how I came across it.

  33. James James says:

    I’ve used similar techniques to find debtors.

  34. Hal G Hal G says:

    And people wonder why I secure my traffic with VPN, secure all the data I am sending and use a proxy for my IP.

  35. Elle Elle says:

    Wow… this is really scary… I’ve had my identity stolen twice in the last YEAR… over $2000 of charges made in my name (all eventually refunded by my bank thankfully).

    I’ve been really stressed about it, thinking, “How can this happen to me? I’m young, in-touch, and tech-savvy… I only buy from reputable web sites… I’m careful with where I use my credit card IRL… surely there’s no way for anyone to get my info….” Now I see how mistaken I was. A quick search using some of your methods turned up boatloads of info on me. :(

    Thank you for posting this. It was really eye-opening.

  36. leonette leonette says:

    I grew up with you MOM! WOW! great post!
    What do you think this new thing about putting all health records on digital access so they can be sent to you or anyone else? I think this is very dangereous.
    all companies who sell this for hospitals and Doctor’s office say their sites are “secure” what ever that means!

  37. Thanks for the intresting research.
    I hope you wouldn’t mind if I would make a translation to Russian for our project http://defendium.info
    Ofcourse with all the links to the original blog.

  38. June Cleaver June Cleaver says:

    It would be a real shame if Steve was just another innocent user who had his email password compromised and the real spammer was just abusing Steve’s account. But I know that’s not the point of the article.

  39. Matt Matt says:

    @June Cleaver: Yep, it would be.. but as I stated in the post (which you read in its entirety before posting a comment, right? RIGHT??), he’s not. The spam I received was for HIS business..

  40. Matt Matt says:

    @ScratchyClaws: Nope, feel free.. the more people who read this, the better.. I think everyone should be aware of whats out there.

  41. Matt Matt says:

    @leonette: I think that the companies offering it have the best intentions (hopefully), but, as with anything on the internet, there’s no way to guarantee security. The first person who does come up with a way to secure something 100% will wind up very, very rich.

    I’m mildly frightened by it.. if stuff about me gets out there, though, due to the lack of caution and care taken by the maintainers of my information.. I, too, will wind up very, very rich. :-)

  42. Matt Matt says:

    @Elle: Ugh. Hopefully by you searching for yourself and finding out whats out there, you can do something about it.. though, honestly, there really isn’t much that can be done once it’s available.

  43. Matt Matt says:

    @Hal G: Everyone thinks that people who are paranoid are cynical, nuts, crazy, whatever…. until they become victims themselves. Then they bombard the crazies with questions about how to secure themselves. *shrug*. At least you can always say, “I told you so.” :-)

    PS: You must have forgotten to use your proxy when visiting this website. ;-)

  44. Matt Matt says:

    @Russ Greene: Thanks a lot! I was actually wondering.. though, Lifehacker carried it first, which caused an explosion in traffic to this article.. I’m sure StumbleUpon has just carried the traffic further.

  45. Josh Josh says:

    This is fantastic, but how did you get the information from the email you received?

  46. Matt Matt says:

    @Josh: Depending on the email client that you’re using, just “view headers” or “view original” or “view source” (different lingo depending on client.) It’s all in the header info.

  47. I use a freeware thing called Sam Spade for this type of thing and I’m amazed at
    what that turns up when I give it an IP address or a web site URL. You can get
    right down to a person’s name and geographic address and other stuff.

    It takes ca 10 seconds to do it all. Scary?

  48. [...] of anonymity in a network. It not manual for invasion,this is for informational purposes. SOURCE WOT – GREEN DISCLAIMER: This is ABSOLUTELY for informational purposes ONLY. attackvector.org [...]

Spam Protection by WP-SpamFree