Short explanation: This list includes the DNS server changes for the devanholo.com domain from its creation until today.
History of devanholo.com Domain Connection to DNS Servers Before Transferring to Cloudflare
Before the devanholo.com domain was connected to Cloudflare's DNS servers on September 29, 2024 (denver.ns.cloudflare.com and noor.ns.cloudflare.com), the domain was connected to the following DNS servers:
ns1.judns.com
ns2.judns.com
These servers served as the primary connection servers for the domain before the transfer to Cloudflare, and it is likely that the domain was active on these servers.
Technical Report on Suspicious Domain: devanholo.com
The domain is under contract with ICANN and must be used for legal purposes in accordance with its regulations.
Last WHOIS Information Update: September 3, 2024
5. Important Reminder:
This domain is currently active and uses Chinese DNS servers. The registrar information is incomplete, and it may be necessary to make an official request to the registrar (HiChina) for further investigation.
Recommendations:
Conduct a thorough investigation of the domain's activities and ensure compliance with local laws.
Send an official request to the domain registrar to obtain additional information.
Sources:
WHOIS Database
ICANN EPP Status Codes
Registrar: Alibaba Cloud Computing Ltd.
DNS Server Information Report (ns1.judns.com)
1. IP Address Reviewed:
Address: 218.98.111.214
2. WHOIS Registered Information:
IP Address Domain: 218.98.111.0 to 218.98.111.255
Network Name: SANSUO-JDZB
Description: Jinan Jingdi Zhiban Company
Location: Shandong Province, China
Country: CN (China)
Status: Assigned Non-Portable
3. Network Administrator Contact Information:
Technical Contact: Kele Cao
Address: No. 12 North Baotuquan Street, Jinan, Shandong, China
Phone Number: +86-0531-83192780
Email: caokele@beelink.com
4. Abuse Information:
Abuse Report Email: wyj@wy.com.cn
5. Hosting Company:
Name: MAINT-CN-BEELINK
This information can be used for tracking internet crimes, analyzing suspicious activities, or contacting the relevant authorities. For more details, additional tools such as Reverse Lookup or IP Geolocation are available.
DNS Server Report ns2.judns.com
1. IP Information:
IP Address: 211.99.99.50
IP Range: 211.99.99.0 to 211.99.99.255
Network Name (NetName): SHANZEN--2
Description: This IP belongs to the Shandong Stock Exchange, which has been allocated to a stockbroker in Jinan, Shandong Province, China.
2. Network Administrator Information:
Network Administrator Name: Kele Cao
Address: No. 12 North Baotuquan Street, Jinan, Shandong, China
Country: China (CN)
Phone Number: +86-0531-83192780
Fax: +86-0531-86097472
Email: caokele@beelink.com
3. IP Status:
Status: This IP has been assigned as Non-Portable.
Last Update: September 4, 2008
Data Source: APNIC (Asia-Pacific Network Information Centre)
4. Abuse Reporting Contact:
Abuse Report Email: zhengkj@wy.cn
5. WHOIS Tool Usage:
The WHOIS tool is used to check ownership and management details of IP addresses. The information provided includes geographical location, the corresponding organization, and technical and administrative contacts. This tool is useful for cyber threat analysis and identifying suspicious sources.
Note: If further follow-up is needed, you can contact the network administrators or the abuse report email provided.
Purpose of this report: To provide accurate information to assist in legal or security investigations by law enforcement.
Did You Know?
The WHOIS tool can help identify suspicious sources in cyberattacks and is used to trace anonymous identities on the internet.
DNS Server Address Review Report ns2.judns.com
1. IP and Network Ownership:
The IP address 183.253.57.200 is in the range of 183.192.0.0 to 183.255.255.255, owned by China Mobile Communications Corporation, which is an internet service and mobile communication provider in China.
2. Owner Information:
Organization Name: China Mobile Communications Corporation
Abuse or Cybercrime Report Email: abuse@chinamobile.com
This email was confirmed on August 16, 2024.
4. Network Information:
Network Name: CMNET
Status: Assigned for public use
Description: This network operates as an internet service provider in China.
5. Data Source:
This data is extracted from the WHOIS service provided by APNIC, which provides registered IP address information.
Recommendation:
If suspicious or illegal use of this DNS server has been observed, you can contact the responsible parties via the email abuse@chinamobile.com to file a complaint. Additionally, law enforcement can request further information through the provided contact numbers.
Report on the Chinese Origin of a Suspicious Platform
Introduction:
Based on a thorough review of HTML code, meta tags, CSS and JavaScript files, and other technical elements, this platform is most likely associated with a Chinese service or website. The following evidence and analysis are presented to support this claim.
1. Use of Chinese-specific Meta Tags:
The code includes meta tags that are specifically designed for popular browsers in China:
These meta tags relate to browsers such as QQ Browser and 360 Browser, which are very popular in China. These tags are used to optimize the user experience in these browsers and are rarely seen outside of China.
2. Use of Chinese-native Libraries:
The code uses the Vant UI library, which is a UI toolkit developed by Chinese programming teams. This library is widely used in web and mobile applications in China and uses Chinese as its default language.
3. Caching and Security Settings Tailored for Chinese Apps:
The following meta tags are used to prevent browser caching:
This feature is common in Chinese platforms, which place a strong emphasis on data security and preventing misuse.
4. Language Culture and Design Style:
The promotional phrases used, such as:
Quick order grab, one step faster
Grab the order and make money online
These phrases refer to the online business culture in China, where concepts like the Gig Economy and quick money-making through online orders are very popular. This type of advertisement is very common in China.
5. Language and Locale Settings:
Although the code is written in English, the use of meta tags and design structure suggests a focus on the Chinese market or audiences with access to translation tools.
6. Lack of International Standards:
No references to international standards such as Content Security Policy (CSP) or GDPR are seen in the code. This is typically the case for platforms designed specifically for China due to the different privacy laws in the country.
Conclusion:
Based on the evidence provided, this platform is most likely designed and developed in China for Chinese users. The use of meta tags, native libraries, and specific language culture are clear indications supporting this claim.
Recommendations:
Request a more detailed review of this platform by the security and IT team.
Monitor online activities related to this platform to identify potential violations.
Domain History and DNS Changes Report for devanholo.com
To: Police Department and Cybercrime Section
From: [Your full name or relevant organization details]
Date: [Date of report submission]
Dear Sir/Madam,
We hereby provide the following information and documentation regarding the investigations conducted on the domain devanholo.com. This report includes the historical changes in the IP address, host, and DNS servers for this domain, which can be used in technical and legal investigations.
1. Domain IP Address and Host History
Based on the recorded logs, the domain devanholo.com has used the following IP addresses and hosts at different time intervals:
IP Address: 119.23.61.145
Host: Hangzhou Alibaba Advertising Co., Ltd
Location: Shenzhen, China
Start Date: June 2, 2022
Last Seen: November 12, 2022
IP Address: 43.138.144.98
Host: Tencent Cloud Computing Beijing Co., Ltd
Location: Guangzhou, China
Start Date: November 15, 2022
Last Seen: October 6, 2023
IP Address: 47.91.170.222
Host: Alibaba Cloud HK
Location: Hong Kong, Hong Kong
Start Date: October 14, 2023
Last Seen: December 5, 2023
2. Domain DNS Server History
The DNS servers for the domain devanholo.com have changed over different periods as follows:
October 8, 2021: dns23.hichina.com
dns24.hichina.com
October 9, 2023: expirens3.hichina.com
expirens4.hichina.com
December 8, 2023: jm1.dns.com
jm2.dns.com
September 5, 2024: ns1.judns.com
ns2.judns.com
September 29, 2024: denver.ns.cloudflare.com
noor.ns.cloudflare.com
Additional Remarks:
This report includes all registered changes for the domain devanholo.com from its creation until today. The information provided can be used for tracking suspicious activities, cybercrimes, or any related investigations.
If further information is required, we are ready to cooperate and provide additional documentation.
This report is based on information obtained from the SSL certificate of the domain devanholo.com. SSL certificates provide valuable information about domain ownership, geographic location, and hosting services, which can assist in identifying the domain owner and related security measures.
Certificate Details:
Certificate Number 15501269669 Issue Date: November 25, 2024
Expiry Date: February 23, 2025
Domains: devanholo.com, *.devanholo.com
Issuer: Google Trust Services
Certificate Subject: WE1
Country: United States
Certificate Number 14710324081 Issue Date: September 27, 2024
Expiry Date: September 27, 2025
Domains: devanholo.com, *.devanholo.com
Issuer: Sectigo Limited
Certificate Subject: Sectigo ECC Domain Validation Secure Server CA
Geographic Location: Salford, Greater Manchester, United Kingdom
Certificate Number 14710324074 Issue Date: September 27, 2024
Expiry Date: September 27, 2025
Domains: devanholo.com, *.devanholo.com
Issuer: Sectigo Limited
Certificate Subject: Sectigo ECC Domain Validation Secure Server CA
Geographic Location: Salford, Greater Manchester, United Kingdom
Certificate Number 14710313523 Issue Date: September 27, 2024
Expiry Date: December 26, 2024
Domains: devanholo.com, *.devanholo.com
Issuer: Google Trust Services
Certificate Subject: WE1
Country: United States
Analysis and Useful Information:
Country and Geographic Location: The certificates were issued by two different entities, each with specific geographic information. The certificates issued by Sectigo Limited indicate a connection to the Salford, Greater Manchester, United Kingdom area, which may offer clues to the physical location associated with the domain.
Information on Certificate Issuing Companies: One certificate issuer is Google Trust Services, and the other is Sectigo Limited. This information could help further investigate and identify the domain owner, especially if these companies have specific interactions with individuals or organizations under scrutiny.
Assistance in Investigations:
This report can aid in police investigations to identify the owner of the domain devanholo.com in several ways:
Geographic Location: The mention of Salford, Greater Manchester in the certificates could provide leads regarding the activity or physical location of the domain's hosting service.
Certificate Issuing Companies: Investigating the interactions between Sectigo Limited and Google Trust Services with the domain and identifying any potential connections could guide the investigation.
Certificate History: The issue and expiry dates of the certificates can provide information about the domain's activity over time, helping track suspicious activities.
Conclusion:
In conclusion, this report can serve as part of a broader investigation to identify the identity and location of the owner of the domain devanholo.com.
Cyber Police Report on the Role of Two Companies
Subject: The Role of Nexperian Holding Limited and Alibaba Cloud in Domain Privacy Protection Services
Respectfully, regarding the domain privacy protection services provided by the two companies Nexperian Holding Limited and Alibaba Cloud Computing Co., Ltd., the following is a brief report:
1. Nexperian Holding Limited (Service Provider):
This company is responsible for providing and managing domain privacy protection services. Nexperian complies with ICANN regulations and offers services to users for protecting domain registration contact information, including administrative, technical, and billing contact details. User information is hidden from public view in the WHOIS database to prevent data theft and spam.
This company acts as the domain registrar and is responsible for registering domains and related activities. Alibaba Cloud, as the official representative, activates the domain privacy protection services and receives commissions from service providers such as Nexperian for executing these services.
Joint Role and Cooperation:
Both companies cooperate jointly in providing domain privacy protection services. Nexperian designs and manages the privacy protection services, while Alibaba Cloud, acting as the domain registrar, activates these services for users through commissions received. This cooperation aims to protect user privacy and prevent the disclosure of personal information in the WHOIS database.
Recommendation:
It is recommended that the cyber police conduct the necessary investigations into how these two companies cooperate and ensure full compliance with privacy laws, preventing any potential violations.
Report to the Police
Respectfully,
I would like to provide information regarding an individual named Olivia Thompson, who has been introduced in a complaint related to the system and platform raised by myself.
Information Provided by Olivia Thompson:
According to her claims, she is an Australian citizen and has been residing temporarily in Germany with her mother and sister for 13 years. Her alleged residence address in Frankfurt, in the Nordend-West district, is as follows:
Address: Klettenbergstraße 18, Nordend-West, 60322 Frankfurt am Main, Germany
Considering the importance of the matter and the need to verify the claims made, I kindly request that you proceed with inquiring and investigating this information. Any further cooperation or additional information required will be provided by me.
Thank you in advance for your cooperation.
Respectfully,
[Name and details of the report submitter]
Detailed Information Regarding the IP Ranges and Servers
1. IP Address for jm1.dns.com
IP Address: 218.98.111.214
Whois Information:
Range: 218.98.111.0 - 218.98.111.255
Netname: SANSUO-JDZB
Country: China (CN)
Description: Jinan Jingdi Zhiban, Company, Jinan, Shandong Province
Server 1 (jm1.dns.com) is associated with Jinan Jingdi Zhiban, located in Shandong Province, China.
Server 2 (jm2.dns.com) includes two IPs:
183.253.57.200, registered with China Mobile Communications Corporation, located in China.
211.99.99.50, registered with Shandong Stock Exchange, located in Jinan, Shandong Province, China.
Each IP has detailed contact information for abuse and technical support, related to the respective service providers.
Official Report to the Police Regarding Attempted Intrusion into Outlook Account
Report Date: January 11, 2025
Subject: Unsuccessful Attempts to Access Email Account
Account Name: miralishahidi@outlook.com
Reporter: Mir Ali Shahidi
Reporter's Email Address: info@miralishahidi.ir
Contact Number: 00989360715710
Details of Suspicious Intrusion Attempts
This report includes suspicious activities and unsuccessful attempts to access my email account on the Outlook service. The details of these activities are as follows:
Suspicious Attempt on January 11, 2025
Time: 3 hours before this report was filed
Activity Type: Unsuccessful Login
Device/Platform: Windows
Browser: Firefox
IP Address: 113.76.42.179
Estimated Location: China
Activity Description: Incorrect password entered.
Suspicious Attempt on January 9, 2025
Time: 8:24 AM
Activity Type: Unsuccessful Login
Device/Platform: Android
Browser: Chrome
IP Address: 119.132.143.99
Estimated Location: China
Activity Description: Incorrect password entered.
Suspicious Attempt on January 8, 2025
Times: 11:10 PM, 7:43 PM
Activity Type: Unsuccessful Login
Device/Platform: Android
Browser: Chrome
IP Addresses: 171.42.101.218, 27.156.192.100
Estimated Location: China
Activity Description: Incorrect password entered.
Previous Suspicious Attempts
January 1, 2025 - 7:01 PM
Device/Platform: Android
Browser: Chrome
IP Address: 113.73.108.184
Estimated Location: China
Activity Description: Incorrect password entered.
January 3, 2025 - 1:50 AM
Device/Platform: Android
Browser: Chrome
IP Address: 49.87.0.242
Estimated Location: China
Activity Description: Incorrect password entered.
Actions Taken
The account password was immediately changed.
Two-factor authentication has been enabled for additional security.
Details of suspicious activities have been saved and included in this report.
Request
Please review this report and take appropriate actions to trace and prevent further illegal activities. The information regarding IP addresses and estimated locations is provided to help identify the intruders.
Thank you,
Mir Ali Shahidi
Email: info@miralishahidi.ir
Contact Number: 00989360715710
Report to the Police
Date: [Today's Date]
Claimant: Ms. Olivia Thompson
Claimant's Position: Chief Financial Officer at EXFILE GmbH
Description of the Issue:
Ms. Olivia Thompson claims that she works as the Chief Financial Officer at EXFILE GmbH. According to available information, she is responsible for the company's financial and accounting duties. EXFILE GmbH operates in the field of human resources consulting and is located in Frankfurt, Germany.
EXFILE GmbH Company Information:
Company Name: EXFILE GmbH
Industry: Human Resources Consulting
Main Office Address: Schumannstr. 27, 60325 Frankfurt, Germany
Second address of the company: Schumannstraße 27, 60325 Frankfurt am Main, Germany.
Requested Action:
Please verify whether Ms. Olivia Thompson is truly employed as the Chief Financial Officer at this company, and also check whether any suspicious or illegal activities have been associated with her and the company. Additionally, kindly take any necessary legal actions if required.
Contact Information:
If you require further information or assistance, please feel free to contact me via email [Your Email] or phone [Your Phone Number].
Signature:
[Your Full Name]
[Date]
Report to the Police
Subject: Telephone Harassment and Possible Connection to Fraud
Date: [Date of Report]
Report Content:
I, Mir Ali Shahidi, son of [Your Father's Name], born on [Your Date of Birth], with contact number 00989360715710, have experienced repeated telephone harassment over the past ten years from VOIP numbers, which have been calling me frequently and continuously, day and night. These calls, in the form of single rings, have never ceased. I have filed numerous complaints through the complaint systems of the Iranian operators Irancell and Hamrah Aval (as my phone number was transferred to these operators via number portability), the 195 complaint system, the Radio Communications Regulatory Authority, and the Ministry of Communications' complaint system. However, all of these efforts have been in vain.
Recently, however, all the telephone harassment that had been occurring continuously over a long period was suddenly and unexpectedly stopped. It appears that this issue may be related to a fraudulent operation that has been ongoing during this time. Specifically, as many of these single ring calls came from unknown and suspicious numbers, a detailed investigation into the connection between these harassments and potential fraud is necessary.
Based on the information I have gathered, it is suspected that this harassment is related to Chinese and African contractors who cooperate with the country's three major mobile operators (Irancell, Hamrah Aval, and RighTel). It is possible that this issue is directly connected to fraudulent activities that require thorough investigation.
Please consider this report and take the necessary action to investigate the matter.
Contact Information:
Full Name: Mir Ali Shahidi
Father's Name: [Your Father's Name]
Date of Birth: [Your Date of Birth]
Contact Number: 00989360715710
Address: [Your Full Address]
Email: info@miralishahidi.ir
Thank you,
Mir Ali Shahidi
Technical Report for Cyber Police
1. IP Addresses:
According to the nslookup search results, the domains v1.juming.com and v2.juming.com both point to the IP address 121.199.255.11.
2. Whois Information:
The IP address 121.199.255.11 belongs to the company Aliyun Computing Co., LTD, which is part of Hangzhou Alibaba Advertising Co. located in Hangzhou, Zhejiang Province, China.
The IP addresses under this organization range from 121.196.0.0 to 121.199.255.255 and belong to the network AS37963, which is owned by Hangzhou Alibaba Advertising Co.,Ltd.
3. Fraud Risk Connection:
According to the Scamalytics report, this IP address is rated with a low fraud risk, and no high-risk services have been reported from these addresses.
The overall fraud risk for these addresses is 0 out of 100, indicating a low likelihood of fraud in the web traffic from these domains.
4. Contact Information in Case of Misuse:
To report abuse or misconduct, you can contact the email address didong.jc@alibaba-inc.com, which is associated with Aliyun Computing Co., LTD.
This report, containing technical details about the IP address and its connection to potential fraud, is being submitted to the Cyber Police for further investigation if necessary.
Official Report for the Police
Subject: Report Regarding Fraud Related to the Platform in Question
Please be informed that based on the technical investigations and reviews conducted, the following information is provided regarding the structure and operations of the reported platform:
1. Technical Structure of the Database
The platform's database is decentralized and dispersed across China.
This database features Load Balancing and Fault Tolerance capabilities.
The sustainability and recovery management of this platform's data are handled through BCP (Business Continuity Planning) and DRP (Disaster Recovery Planning).
2. Data Update and Synchronization
The database information is updated in real-time through the CDN network in China.
In addition to China, similar databases of this platform in South Africa, Australia, Japan, Iceland, Singapore, Hong Kong, Malaysia, Indonesia, California (USA), and others are also connected to the main CDN network located in China and benefit from the same capabilities.
3. Domain Structure and Firewall Protection
The majority of domain registrations and transfers to the firewall network are done via Cloudflare in its autonomous center in Hong Kong.
To date, over 200 links related to this platform have been transferred to the Cloudflare firewall network through DNS servers.
4. Primary DNS Servers
The primary DNS servers of this platform are located in China.
All reported domains are directly connected to the internet from these servers and the main IPs mentioned in previous reports.
5. Platform Operators
The operators of this platform are highly specialized individuals in the following fields:
Artificial Intelligence
Computer Science
Mathematics
Physics
Electrical and Computer Engineering
The majority of these individuals are Chinese and hold advanced positions such as university professors, PhD holders, and engineering doctorate holders.
6. Conclusion and Requests
Given the advanced nature and complex technical structure of this platform, legal and technical actions are required to identify the perpetrators and prevent further operation of this fraud network.
It is recommended to:
Conduct a thorough review of the domains and IPs involved by legal authorities and the Cyber Police.
Collaborate with CDN service providers (such as Cloudflare) to obtain more precise information.
Take action to block the reported domains and servers.
If possible, coordinate with international organizations to trace the activities of this platform.
Thank you and best regards,
[Reporter’s Name]
[Contact Information]
Complete and Detailed Report for Cyber Police
Report Subject: Investigation of Suspicious Domain Connections and Database Linked to South African Servers and Chinese Networks
Introduction: This report is prepared to provide detailed technical information about a complex fraud network. Evidence indicates that there are connections between databases located in South Africa and Chinese CDN networks. This connection is established repeatedly through specified DNS servers and using advanced Synchronize methods.
1. Identified Information from IP Address
According to the conducted investigations, one of the IP addresses associated with the mentioned network is as follows:
IP Address: 168.76.253.108
IP Address Owner:
NetRange: 168.76.0.0 - 168.76.255.255
NetName: AFRINIC-168-76-0-0
NetHandle: NET-168-76-0-0-1
NetType: Transferred to AfriNIC
Organization: African Network Information Center (AFRINIC)
RegDate: 2005-02-21
This IP range is managed by AFRINIC and is assigned to an organization in South Africa called Free State Education Department.
2. Ownership and Contact Information:
Organization Owner:
Name: Free State Education Department
Address: P.O. Box 521, Bloemfontein, 9300, ZA
Technical Contact: Hannes Du Plooy
Phone: +27-51-407-4054
NIC Handle: PHD-AFRINIC
3. Network Structure and Connection with Chinese CDN:
This IP address and its associated domains are connected to the Chinese CDN network via Chinese DNS servers.
Database synchronization operations between the main servers in China and this range occur in real-time and repeatedly.
More than 200 similar domains have been identified in previous reports that have established similar connections through Chinese DNS servers to the network.
4. Technical Analysis:
IP Address Ownership: This IP is part of the Freenet network under AS18013.
Data Transfer Mechanism: Data is managed through the Chinese CDN with Load Balancing and Fault Tolerance capabilities.
Communication Protocols: The connection between the main DNS servers and Chinese servers confirms the use of advanced protocols and Synchronize technologies.
5. Recommendations:
Temporary Suspension of Connections: It is recommended to block the identified domains and IPs for further investigations.
International Investigations: Interpol should be involved to help identify and apprehend the main operators of this network.
Further Network Investigation: Analyzing network traffic and identifying algorithms used in this process to uncover similar patterns.
Conclusion:
This report indicates that the operators of this fraud network use advanced techniques in database management and network communications. Those associated with this platform are likely experts in AI and computer science and are utilizing modern technologies to obscure and distribute data. Immediate investigation and legal action are recommended to halt these operations.
Appendix:
Complete WHOIS details for the IP address
Previous reports related to DNS servers and domains
Complete Report for Cyber Police
Subject: Report on Suspicious IP Address (154.92.40.104)
Date: January 14, 2025
Subject Description:
The IP address 154.92.40.104, examined on January 14, 2025, through the whois tool, shows that it belongs to a foreign company named Digital Core Technology Co., Limited, based in Hong Kong. Although this IP address is managed by AfriNIC (the African Network Information Center), no connection to African activities or African government entities is observed.
Whois Details:
IP Address: 154.92.40.104
IP Range: 154.92.40.0 - 154.92.40.255
Network Name: Digital_Core_Technology_Co_Limited
Network Description: Belongs to Digital Core Technology Co., Limited
This IP address is managed by AfriNIC, which is responsible for assigning IP addresses to African countries. However, this IP address belongs to a company based in Hong Kong. Therefore, AfriNIC, as the Whois registry for Africa, only stores information related to IP address assignments, even if the owner is outside the African continent.
This situation may arise due to AfriNIC allocating IP resources to companies that operate outside Africa, but nonetheless, this IP address does not indicate any documented suspicious or illegal activities by an African entity.
Conclusion:
This IP address belongs to Digital Core Technology Co., Limited, based in Hong Kong. To report any violations or illegal activities related to this IP address, please contact the company's support team via email at abuse@cloudinnovation.org.
Since no information indicating illegal activities or cyber threats has been clearly extracted from this IP address, it is recommended to conduct a more detailed investigation and, if necessary, take further actions to trace and analyze the traffic associated with this address.
Recommendations:
Examine network traffic associated with this IP address to identify any suspicious behavior.
Monitor and track activities related to this address through technical and security units.
Utilize existing communication with the company's support to address potential issues.
If additional information or reporting is required, the Cyber Police team can use available resources to monitor and follow up on activities related to this IP address.
Complete and Detailed Report for Cyber Police
IP Address: 47.104.252.109
WHOIS Information:
IP Range: 47.98.0.0 - 47.112.255.255
NetName: APNIC
Net Type: Early Registrations, Transferred to APNIC
Organization: Asia Pacific Network Information Centre (APNIC)
Country: Australia (AU)
Registration Date: 2015-04-01
Organization Address: PO Box 3646, South Brisbane, QLD, 4101, Australia
This IP address is under the supervision of Alibaba Network and belongs to Aliyun Computing Co., LTD in China. In case of any security issues or harassment through this IP, reports can be made via the email didong.jc@alibaba-inc.com.
Important Notes:
This IP belongs to Alibaba's infrastructure in China.
If this IP address has been used in cyber-attacks or legal violations, the Cyber Police or APNIC can be informed.
This report identifies Australia as the registration location for the Asia Pacific Network Information Centre (APNIC). APNIC is a non-profit organization responsible for allocating and managing IP addresses in the Asia Pacific region. It is headquartered in Australia and is tasked with overseeing and allocating IP resources to various countries in the region.
Therefore, Australia plays an indirect role as the global IP address registry and is involved in registering and maintaining information for IPs like the mentioned address (47.104.252.109) due to hosting APNIC.
November 1403 Event Report
This is a complete report on the subject from me, Mir Ali Shahidi. About three weeks ago, I received a contact via WhatsApp messenger. In this contact, a 29-year-old woman of Australian origin who had migrated to Frankfurt, Germany, reached out to me. She stated that she planned to travel to Iran for 25 days during the end-of-year holidays. She claimed that through one of her relatives (referred to as "She"), I was introduced as a reliable person, and she requested that I accompany her as a trusted companion during her stay in Iran. During these conversations, she talked about her job and income and also suggested introducing me to cryptocurrency and working on the website devanholo.com. To begin, she temporarily and securely provided me with her personal account so I could familiarize myself with how this system works. Over a few days, she taught me how to use the e-commerce and online trading system. Additionally, she fully introduced me to AI software related to these activities and recommended the Transform exchange network in Iran as a secure and reputable platform for cryptocurrency transactions. When I started working with this system, I initially encountered some challenges, but they were gradually resolved. Since I am an expert in computer networks, network security, and information security management, even though I am currently unemployed, I saw this as a suitable opportunity to take advantage of and start working in this type of trade. All relevant documentation for this matter is available, but it is a very complex and extensive issue. Despite this, my communication with this person and the involved parties from their side is still ongoing.
The website devanholo.com was introduced to me for buying and selling goods. This site used three reputable stores—Amazon, Alibaba, and AliExpress—for ordering products. To complete the orders, I was required to make payments in Tether cryptocurrency, completing 25 orders determined by the company. After completing the orders, the company would pay a percentage of the profit as a commission, and the funds would become available for withdrawal. The company's condition was that all 25 orders must be fully completed for the funds to be withdrawable. Additionally, some orders contained 1 to 3 combined orders, which increased the payment amount.
I completed this process three times without any issues, but during the fourth round, I was given 4 combined orders, even though the number of combined orders should not exceed 3. Nevertheless, I completed all the orders and paid the required amount in Tether cryptocurrency. However, when I requested a withdrawal, the withdrawal system was locked, and the company demanded a 25% payment of the total principal investment and received commission as tax.
The total amount I deposited is approximately $30,000 USD or its equivalent in Tether cryptocurrency. The company has requested payment of 19,300 Tether (equivalent to $19,300 USD) as tax and stated that withdrawals will not be possible until the tax is fully paid.
The approximate total amount invested is about $30,000 USD, and the approximate profit from the commission of this investment is about $50,000 USD.
Given these conditions, there is a very high probability that I have become a victim of an online and international scam. It appears that the individuals behind this website might be from within the country and possibly from among academic elites or credible domestic figures. Screenshots and relevant documents are also available.
Claims Made by Chinese Operators
The operators of the website devanholo.com claim that they are an international business company, with their headquarters located in the financial and economic city of London. According to my research, the independent financial and economic city in London, known as The City Of London, is located in the center of London and operates autonomously from the main governance of the UK. This city has its own independent ruler and mayor, but despite these features, it is still under direct supervision of the UK’s tax authority, HMRC.
The company owning the domain devanholo.com claims that all their activities are legal. Since the domain registration of the company is verifiable with the most reputable organizations such as ICAAN and IANA, and the domain is registered with the well-known international organization Verisign, this website is considered legitimate. Additionally, the domain connection is managed by the international company Dynadot, one of the most reputable web hosting services. The company's private information is kept confidential to ensure privacy and security, and public disclosure has been prevented for various reasons. Therefore, requests for the names of the domain owners and operators can be made through legal channels and judicial orders.
Regarding the website's operations, the company claims that I, as an investor and provider of requested goods, have made investments using cryptocurrency, specifically USDT, on their platform. According to their claim, the buying and selling process will result in the exchange of money and goods through my initial investment. My role as the initial investor in the fintech system is clear, and after completing the order, the principal and commission from the sale of goods will be credited to my account and made available for withdrawal. They stated that to prevent unhealthy competition, the financing of orders is done randomly using smart algorithms to avoid favoritism and to ensure that the person placing the order is not involved in directing orders.
The condition for investment and full withdrawal of both the principal and commission depends on the completion of the orders as quickly as possible. The investment range on the platform is also clearly defined. For Amazon, it ranges from 20 USDT to 499 USDT, for Alibaba from 499 USDT to 899 USDT, and for AliExpress, it is 899 USDT and above. The total principal and commission balance are only accessible during specific periods, granting the company the right to fund and assign product orders.
Regarding account security, the company claims that all security measures are carefully followed. My problem arose when all my investments, rules, and orders were completed, and it was time to withdraw the principal and commission. When I attempted to withdraw, they claimed that I had to pay taxes. I had no obligation to pay income tax or digital currency import taxes to the UK. However, they stated that according to UK tax tables, I had to pay 25% of the total amount as a separate tax.
Since I had no authority to deduct or lock the 25% of my total assets in my account, I requested that they deduct this amount, but they claimed this would constitute tax evasion. Eventually, I was told that after paying the tax amount, a tax receipt would be sent to me, and my assets along with the commission would be returned to my account.
Given these circumstances, I have filed a legal complaint to ensure that the matter is thoroughly investigated and resolved.
Similarity Report of the Physical Addresses of Two Companies (Alibaba Cloud LLC and Dynadot) for Cyber Police
1. Introduction
This report examines the similarities and proximity of the physical addresses of two companies, Alibaba Cloud LLC and Dynadot. These companies operate in the fields of cloud services and domain registration, and considering the geographical similarities and physical locations of their offices in California, this analysis can assist in understanding issues related to networking and organizational communications.
2. Address Information of the Two Companies:
a) Alibaba Cloud LLC:
Physical Address: 400 S El Camino Real, Suite 400, San Mateo, CA 94402, USA
Registration Date: 2010-10-29
Last Update: 2024-11-25
Description: The headquarters of Alibaba Cloud LLC is located in San Mateo, California. The company is one of the largest global cloud service providers, and its activities in this region are monitored by various organizations. At this address, various services such as data processing, cloud services, and technical aspects of network communications are offered.
b) Dynadot:
Physical Address: 210 S Ellsworth Ave #345, San Mateo, CA 94401, United States
Working Hours: 9:00 AM to 6:00 PM Pacific Standard Time (PST)
Description: The headquarters of Dynadot is also located in San Mateo, California. This company, specializing in domain registration and web hosting, provides its services to global customers. At this address, services such as domain registration, web hosting, and technical support for users are provided.
3. Geographical Similarities of the Addresses:
Similar Geographical Location: Both companies are located in the city of San Mateo, California. This proximity is particularly important in cases where cybersecurity investigations need to identify suspicious servers or activities, as the physical location of these companies could be related.
Difference in Street Numbers: While the Alibaba Cloud address is located at 400 S El Camino Real, the Dynadot address is at 210 S Ellsworth Ave. This difference may indicate a difference in the exact locations of their offices, but both still lie within a similar geographical area in San Mateo.
Similar Postal Codes: Both companies have postal codes that are close to each other in San Mateo, indicating their presence in a region with similar business and internet service activities. Alibaba Cloud has the postal code 94402, and Dynadot has the postal code 94401, which belong to the same geographical area.
4. Analyzing the Importance of the Proximity of These Companies:
a) Impacts on Cyber Abuse Reports:
Since both companies are located in the same geographical region in California, there is a possibility that security issues or abuse of services may occur through similar networks or even through shared business relationships between the two companies. For reporting purposes, both companies provide similar contact methods for their technical teams and different departments.
b) Potential Business Dependencies:
The proximity of their addresses in a specific geographical area may indicate possible business collaborations between the two companies. It is also possible that these two companies leverage similar infrastructure or technical collaborations in data processing and domain registration.
c) Analysis of Technical Communications and Cyber Support:
Due to the geographical proximity and similar services, there is a possibility that the companies use similar infrastructure for their internal networks and technical communications, which can assist cybersecurity analysts. Technical contacts with similar email addresses, such as aliops-goc@list.alibaba-inc.com for Alibaba and info@dynadot.com for Dynadot, may help establish a pattern for tracking security issues and analyzing threats.
5. Conclusion:
Given the geographical proximity of the addresses of Alibaba Cloud LLC and Dynadot in San Mateo, California, and the structural similarities in their technical services and organizational communications, especially in cloud networking and domain registration, cyber police can use this information to identify, monitor, and investigate security issues and cyber abuses.
The geographical proximity of these two companies and the existence of similar patterns in abuse reporting can help quickly identify cyber threats, unauthorized business collaborations, or unauthorized access to information. For cyber police, investigating network issues and abuses of resources from these companies, while considering geographical proximity and registered information, is of great importance.
Domain Tracking Report for devanholo.com
Date: [Today's Date]
To: [Relevant Authority or Police Department]
Subject: Tracking the devanholo.com Domain via Wayback Machine
Dear Sir/Madam,
I, Mir Ali Shahidi, have investigated the domain devanholo.com through the website https://web.archive.org (Wayback Machine). The purpose of this tracking was to gather historical information about this domain and clarify its current status.
Tracking Details:
I first visited the Wayback Machine website and searched for the devanholo.com domain.
The results showed that this domain has a history of registration and various changes, which are available at specific dates.
By reviewing the history of the mentioned website, significant information was obtained regarding content changes and its activities.
Results from Wayback Machine Search:
The various dates when the pages of this domain were archived on the Wayback Machine.
The content changes on the site, including the initial domain registration information, content updates, and other details.
Conclusion:
Based on the results obtained, I request that further actions be taken to investigate the status of this domain and check its ownership status, especially regarding legal and security activities.
Kindly direct that the necessary follow-up actions be carried out, and additional information be provided if needed.
Thank you and best regards,
Mir Ali Shahidi Expertise: Senior Expert in Information Management and Network Security
Email: info@miralishahidi.ir Phone: 00989360715710
Domain Ownership Verification via ICP Code:
Using Official ICP Systems in China:
In China, websites must be registered in specific systems to obtain their ICP license. To check the details of a website and its owner, you can use the official websites listed below:
This is the official website of China's Ministry of Industry and Information Technology (MIIT), which provides domain registration information for ICPs.
Using WHOIS Services:
If the domain is officially registered in the WHOIS system, you can use WHOIS services to search for owner information.
DomainTools is an advanced service that provides more detailed information about domain history. It allows you to check ownership changes, DNS modifications, registration history, and more.
Archived WHOIS Data:
Some services, such as DomainTools, store archived WHOIS information. By using a subscription or special accounts, you can find the domain's historical changes and previous details.
Historical Archive Websites:
Some websites, like Wayback Machine, are used to store previous versions of websites.
Contacting the Domain Registrar:
If WHOIS information is private, you can contact the domain registrar mentioned in the WHOIS results to request the initial registration date.
Overall, WHOIS services and tools like DomainTools and Wayback Machine are suitable for accessing valuable domain history information.