If you're new here, you may want to subscribe to my free Email alerts. Thanks for visiting!

U.S. MILITARY AND OTHER PORTALS REPEATEDLY SHOW UP AS HACKERS IN OUR LOG

by Sharon Rondeau

The Bill of Rights was introduced to the First U.S. Congress in 1789 after it had been ratified by three-quarters of the existing states, and the U.S. Constitution was approved thereafter.

(Jun. 23, 2010) The Bill of Rights, introduced in 1789 by James Madison and instrumental in achieving the ratification of the U.S. Constitution, guarantees all Americans freedom of speech and of the press in the First Amendment, which reads:

Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble, and to petition the Government for a redress of grievances.

The Post & Email is a First Amendment electronic newspaper which seeks to discover and report the truth about our government at all levels.  We will not be silenced by critics, spammers, hackers or any government entity, as our actions are peaceful, constitutional, and lawful.

Having contacted several U.S. military bases which appear to have jurisdiction over numerous IPs and internet gateways  being used to attack The Post & Email, Inc. over several weeks, we are now publishing those IPs and identifications.  Not one military person responded back to us regarding the evidence we provided of their gateways being used to try to bring down our website.  However, none of them denied that the IPs we provided came from their locations.  The Post & Email will press charges against these installations and companies if the attacks do not stop forthwith.

We are not publishing the information from those military bases which were contacted and seem to have addressed the problem.  There are also two private companies who are handling our evidence of hack attacks very professionally and seriously, and for that reason they will not be mentioned here.

There appear to be numerous internet providers who are perhaps unknowingly involved in these attacks.  Also, the referrers, or sites from which the attempted spammers and hackers arrive at The Post & Email, have nothing to do with the attacks and are held harmless in this matter.

A hacker who shows up four times in our log this morning with an IP address of 68.171.231.xx left the following footprint:

[404] /wp-content/uploads/cache/10167_NpAdvFeaThumb.jpg
Referrer: From your blog
Hostname: 68-171-231-xx.rdns.blackberry.net
  • User Agent: BlackBerry9000/4.6.0.304 Profile/MIDP-2.0 Configuration/CLDC-1.1 VendorID/102
  • Probably hack attempt!
  • OS: WAP
  • BROWSER: BlackBerry
  • 07:18:20 ->[404] /wp-content/uploads/cache/10167_NpAdvFeaThumb.jpg
  • 07:18:21 ->[404] /wp-content/uploads/cache/8971_NpAdvFeaThumb.jpg
  • 07:18:22 ->[404] /wp-content/uploads/cache/8130_NpAdvFeaThumb.jpg
  • 07:18:23 ->[404] /wp-content/uploads/cache/8024_NpAdvFeaThumb.jpg
  • 07:18:25 ->[404] /wp-content/uploads/cache/18703_NpAdvSideFea.jpg
  • 07:18:25 ->[404] /wp-content/uploads/cache/7589_NpAdvFeaThumb.jpg
  • 07:18:26 ->[404] /wp-content/uploads/cache/18362_NpAdvSideFea.jpg
  • 07:18:28 ->[404] /wp-content/uploads/cache/18311_NpAdvSideFea.jpg

Many spam entries come from this host every day:

  • Probably SPAM!(Akismet Spam)
  • OS: WinXP
  • BROWSER: Firefox 3

Raw data:

  • Visit type: Spammer
  • IP: 173.234.27.xxx
  • Hostname: 173.234.27.xxx.rdns.ubiquityservers.com
  • Url Requested: /2010/06/19/arizona-governor-fights-back-against-the-obama-regime/
  • User Agent: Mozilla/5.0 (Windows; U; Windows NT 6.1; en-GB; rv:1.9.1.3) Gecko/20090824 Firefox/3.5.3
  • Referrer: http://www.healthandskinny.com/
  • OS: Win2008
  • Browser: Firefox 3
  • Wassup ID: d6daca7e3321e9cc8f79ec9b2d14efef
  • End timestamp: 2010-06-23 05:50:49 am ( 1277272249 )

173.234.27.xxx 2010-06-23 05:50:49 am

There are also repeated spams daily from this provider:

  • Probably SPAM!(Akismet Spam)
  • OS: WinXP
  • BROWSER: IE 6

Raw data:

  • Visit type: Spammer
  • IP: 173.224.209.xx
  • Hostname: unassigned.psychz.net
  • Url Requested: /xmlrpc.php
  • User Agent: The Incutio XML-RPC PHP Library — WordPress/3.0
  • Referrer:
  • Wassup ID: dd9f87b7fac5a139e22a6875d97676c7
  • End timestamp: 2010-06-23 03:19:14 am ( 1277263154 )

173.224.209.xx 2010-06-23 03:19:14 am
/xmlrpc.php
Referrer: Direct hit
Hostname: unassigned.psychz.net

Another frequent spammer is this one:

  • Probably SPAM!(Akismet Spam)

Raw data:

  • Visit type: Spammer
  • IP: 74.54.252.xxx
  • Hostname: gator426.hostgator.com
  • Url Requested: /xmlrpc.php
  • User Agent: The Incutio XML-RPC PHP Library — WordPress/2.9.2
  • Referrer:
  • Wassup ID: 2893cfe8b5c4e44e5575295b726ae679
  • End timestamp: 2010-06-23 12:11:36 am ( 1277251896 )

74.54.252.xxx 2010-06-23 12:11:36 am

/xmlrpc.php
Referrer: Direct hit
Hostname: gator426.hostgator.com
  • User Agent: The Incutio XML-RPC PHP Library — WordPress/2.9.2
  • SPIDER: The

There are several other spammers with variations of the “hostgator” identifier with different numbers.

Frequent attackers are constantly using the internet services of the following providers:

nycmny.fios.verizon.net
dyn.optonline.net
cumulus.customer.hvdata.net

The Post & Email is not accusing the host companies of anything; but rather, some of their users with nefarious purposes.

An entry which appeared yesterday morning in our Spam/Hacker log with the IP of 138.162.128.xx looks like this:

[404] /wp-content/uploads/cache/18600_NpAdvInnerSmall.jpg
Referrer: Direct hit
Hostname: gate22-quantico.nmci.usmc.mil

  • User Agent: Mozilla/4.0 (compatible;)
  • Probably hack attempt!
  • OS:
  • BROWSER: Netscape 4
  • 21:47:00 ->[404] /wp-content/uploads/cache/18600_NpAdvInnerSmall.jpg
  • 21:47:01 ->[404] /wp-content/uploads/cache/18637_NpAdvInnerSmall.jpg
  • 21:47:02 ->[404] /wp-content/uploads/cache/8486_NpAdvInnerSmall.jpg
  • 21:47:03 ->[404] /wp-content/uploads/cache/17281_NpAdvInnerSmall.jpg
  • 21:47:04 ->[404] /wp-content/uploads/cache/17207_NpAdvInnerSmall.jpg
  • 21:47:06 ->/2010/06/21/oklahoma-to-vote-on-banning-sharia-law/feed/
  • 21:47:07 ->[404] /wp-content/uploads/cache/8900_NpAdvInnerSmall.jpg
  • 21:47:08 ->[404] /wp-content/uploads/cache/4602_NpAdvInnerSmall.jpg
  • 21:47:08 ->[404] /wp-content/uploads/cache/7_NpAdvInnerSmall.jpg
  • 21:47:09 ->[404] /wp-content/uploads/cache/44_NpAdvInnerSmall.jpg
  • 21:47:11 ->[404] /wp-content/uploads/cache/16886_NpAdvInnerSmall.jpg
  • 21:47:12 ->[404] /wp-content/uploads/cache/17053_NpAdvInnerSmall.jpg
  • 21:48:10 ->[404] /wp-content/uploads/cache/16841_NpAdvInnerSmall.jpg
  • 21:48:51 ->[404] /wp-content/uploads/cache/3410_NpAdvInnerSmall.jpg

And two others look like this:

[404] /wp-content/uploads/cache/17238_NpAdvInnerSmall.jpg
Referrer: Direct hit
Hostname: gate23-quantico.nmci.usmc.mil

  • User Agent: Mozilla/4.0 (compatible;)
  • Probably hack attempt!
  • OS:
  • BROWSER: Netscape 4
  • 21:47:00 ->[404] /wp-content/uploads/cache/17238_NpAdvInnerSmall.jpg
  • 21:47:04 ->[404] /wp-content/uploads/cache/18624_NpAdvInnerSmall.jpg
  • 21:47:05 ->[404] /wp-content/uploads/cache/4936_NpAdvInnerSmall.jpg
  • 21:47:06 ->[404] /wp-content/uploads/cache/12241_NpAdvInnerSmall.jpg
  • 21:47:06 ->[404] /wp-content/uploads/cache/8971_NpAdvInnerSmall.jpg
  • 21:47:06 ->[404] /wp-content/uploads/cache/9018_NpAdvInnerSmall.jpg
  • 21:47:07 ->[404] /wp-content/uploads/cache/7066_NpAdvInnerSmall.jpg
  • 21:47:09 ->[404] /wp-content/uploads/cache/9229_NpAdvInnerSmall.jpg
  • 21:47:10 ->[404] /wp-content/uploads/cache/17004_NpAdvInnerSmall.jpg
  • 21:47:11 ->[404] /wp-content/uploads/cache/15214_NpAdvInnerSmall.jpg
  • 21:47:11 ->[404] /wp-content/uploads/cache/15253_NpAdvInnerSmall.jpg
  • 21:47:11 ->[404] /wp-content/uploads/cache/18362_NpAdvInnerSmall.jpg
  • 21:47:11 ->[404] /wp-content/uploads/cache/5262_NpAdvInnerSmall.jpg
  • 21:47:12 ->[404] /wp-content/uploads/cache/12091_NpAdvInnerSmall.jpg
  • 21:48:51 ->[404] /wp-content/uploads/cache/8469_NpAdvInnerSmall.jpg

Raw data:

  • Visit type: Spammer/Hacker
  • IP: 138.162.128.xx
  • Hostname: gate25-quantico.nmci.usmc.mil
  • Url Requested: [404] /wp-content/uploads/cache/16682_NpAdvInnerSmall.jpg%20
  • User Agent: Mozilla/4.0 (compatible;)
  • Referrer:
  • Browser: Netscape 4
  • Wassup ID: 443d0fa8a3c47148bc7ae9f11f78a16a
  • End timestamp: 2010-06-22 09:47:58 pm ( 1277243278 )

138.162.128.xx 2010-06-22 09:47:58 pm
[404] /wp-content/uploads/cache/16682_NpAdvInnerSmall.jpg
Referrer: Direct hit
Hostname: gate25-quantico.nmci.usmc.mil

  • User Agent: Mozilla/4.0 (compatible;)
    • Probably hack attempt!
    • OS:
    • BROWSER: Netscape 4
    • 21:47:03 ->[404] /wp-content/uploads/cache/16682_NpAdvInnerSmall.jpg
    • 21:47:05 ->[404] /wp-content/uploads/cat19_NpAdvInnerSmall.jpg
    • 21:47:06 ->[404] /wp-content/uploads/cache/11646_NpAdvInnerSmall.jpg
    • 21:47:06 ->[404] /wp-content/uploads/cache/12215_NpAdvInnerSmall.jpg
    • 21:47:06 ->[404] /wp-content/uploads/cache/12264_NpAdvInnerSmall.jpg
    • 21:47:06 ->[404] /wp-content/uploads/cache/6875_NpAdvInnerSmall.jpg
    • 21:47:06 ->[404] /wp-content/uploads/cache/8322_NpAdvInnerSmall.jpg
    • 21:47:07 ->[404] /wp-content/uploads/cache/8810_NpAdvInnerSmall.jpg
    • 21:47:08 ->[404] /wp-content/uploads/cache/12411_NpAdvInnerSmall.jpg
    • 21:47:08 ->[404] /wp-content/uploads/cache/957_NpAdvInnerSmall.jpg
    • 21:47:09 ->[404] /wp-content/uploads/cache/2240_NpAdvInnerSmall.jpg
    • 21:47:09 ->[404] /wp-content/uploads/cache/2260_NpAdvInnerSmall.jpg
    • 21:47:09 ->[404] /wp-content/uploads/cache/89_NpAdvInnerSmall.jpg
    • 21:47:11 ->[404] /wp-content/uploads/cache/17029_NpAdvInnerSmall.jpg
    • 21:47:11 ->[404] /wp-content/uploads/cache/7077_NpAdvInnerSmall.jpg
    • 21:47:12 ->[404] /wp-content/uploads/cache/18156_NpAdvInnerSmall.jpg
    • 21:47:58 ->[404] /wp-content/uploads/cache/8405_NpAdvInnerSmall.jpg

    Raw data:

    • Visit type: Spammer/Hacker
    • IP: 138.162.128.xx
    • Hostname: gate24-quantico.nmci.usmc.mil
    • Url Requested: [404] /wp-content/uploads/cache/17119_NpAdvInnerSmall.jpg%20
    • User Agent: Mozilla/4.0 (compatible;)
    • Referrer:
    • Browser: Netscape 4
    • Wassup ID: 49a9c1ea9ec758f01d2f68867e53b7b6
    • End timestamp: 2010-06-22 09:47:35 pm ( 1277243255 )

    138.162.128.xx 2010-06-22 09:47:35 pm

    [404] /wp-content/uploads/cache/17119_NpAdvInnerSmall.jpg
    Referrer: Direct hit
    Hostname: gate24-quantico.nmci.usmc.mil
    The Post & Email has spoken with both the Watch Officer and the Communications Chief at Quantico, but the IPs still show up in our hacker log periodically.
    Another hacker who appears to be from a military base with IP 160.141.34.xxx:

    [404] /wp-content/plugins/vi(…)b/v-zoom/graphics/zoomin.cur
    Referrer: http://beforeitsnews.com/n(…)ght_To_Court_Martial.html
    Hostname: mach34-xxx.benning.amedd.army.mil

    • User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
    • Probably hack attempt!

    And here is another frequent visitor:

    • Probably SPAM!(Akismet Spam)
    • OS: WinXP
    • BROWSER: Opera 8

    Raw data:

    • Visit type: Spammer
    • IP: 125.230.92.xxx
    • Hostname: 125-230-92-209.dynamic.hinet.net
    • Url Requested: /
    • User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
    • Referrer:
    • OS: WinXP
    • Browser: IE 6
    • Locale/Language: tw
    • Wassup ID: 70fba72a32906fcb502a4c93271a2c1a
    • End timestamp: 2010-06-22 08:04:35 pm ( 1277237075 )

    125.230.92.xxx 2010-06-22 08:04:35 pm
    Referrer: Direct hit
    Hostname: 125-230-92-xxx.dynamic.hinet.net

    The following is a daily visitor with nothing better to do:

    • Probably SPAM!(Akismet Spam)
    • OS: WinXP
    • BROWSER: IE 7

    Raw data:

    • Visit type: Spammer/Hacker
    • IP: 67.238.230.xxx
    • Hostname: nc-67-238-230-xxx.dhcp.embarqhsd.net
    • Url Requested: [404] /wp-content/plugins/viva-thumbzoom/lib/v-zoom/graphics/zoomin.cur
    • User Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; CPDTDF)
    • Referrer: http://beforeitsnews.com/news/77/823/Decorated_Army_Doctor_Who_Refused_To_Follow_Orders_Due_To_Doubts_About_Obamas_Eligibility_Will_Go_Straight_To_Court_Martial.html
    • OS: Win2008 x64
    • Browser: IE 8
    • Locale/Language: us
    • Wassup ID: 963254a26d9e929519892cb4a23567a7
    • End timestamp: 2010-06-22 05:54:29 pm ( 1277229269 )

    67.238.230.xxx 2010-06-22 05:54:29 pm

    [404] /wp-content/plugins/vi(…)b/v-zoom/graphics/zoomin.cur
    Referrer: http://beforeitsnews.com/n(…)ght_To_Court_Martial.html
    Hostname: nc-67-238-230-xxx.dhcp.embarqhsd.net
    And yet another apparent attack from a military IP, 147.71.155.xx:
    [404] /wp-content/uploads/cache/17882_NpAdvInnerSmall.jpg
    Referrer: From your blog
    Hostname: gtp000012gts.bliss.army.mil
    • User Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
    • Probably hack attempt!
    • OS: WinVista
    • BROWSER: IE 8
    • 17:39:52 ->/tag/lt-col-terrence-lakin/
    • 17:39:53 ->/xmlrpc.php
    • 17:39:53 ->/xmlrpc.php?rsd
    • 17:39:54 ->/wp-content/plugins/wp-spamfree/js/wpsf-js.php
    • 17:39:54 ->[404] /wp-content/uploads/cache/16032_NpAdvInnerSmall.jpg
    • 17:39:54 ->[404] /wp-content/uploads/cache/17664_NpAdvInnerSmall.jpg
    • 17:39:54 ->[404] /wp-content/uploads/cache/17882_NpAdvInnerSmall.jpg
    • 17:39:54 ->[404] /wp-content/uploads/cache/17944_NpAdvInnerSmall.jpg
    • 17:39:54 ->[404] /wp-content/uploads/cache/18545_NpAdvInnerSmall.jpg
    • 17:39:55 ->/tag/lt-col-terrence-lakin/feed/
    • 17:39:55 ->[404] /wp-content/uploads/cache/12474_NpAdvInnerSmall.jpg
    • 17:39:55 ->[404] /wp-content/uploads/cache/13828_NpAdvInnerSmall.jpg
    • 17:39:55 ->[404] /wp-content/uploads/cache/14212_NpAdvInnerSmall.jpg
    • 17:39:55 ->[404] /wp-content/uploads/cache/14580_NpAdvInnerSmall.jpg
    • 17:39:55 ->[404] /wp-content/uploads/cache/14763_NpAdvInnerSmall.jpg
    • 17:39:55 ->[404] /wp-content/uploads/cache/15863_NpAdvInnerSmall.jpg
    • 17:39:56 ->[404] /wp-content/uploads/cache/13851_NpAdvInnerSmall.jpg
    • 17:39:56 ->[404] /wp-content/uploads/cache/14332_NpAdvInnerSmall.jpg
    • 17:39:57 ->[404] /wp-content/uploads/cache/13789_NpAdvInnerSmall.jpg
    • 17:39:57 ->[404] /wp-content/uploads/cache/13878_NpAdvInnerSmall.jpg
    • 17:39:57 ->[404] /wp-content/uploads/cache/14674_NpAdvInnerSmall.jpg
    • 17:39:57 ->[404] /wp-content/uploads/cache/14743_NpAdvInnerSmall.jpg
    • 17:39:58 ->[404] /wp-content/uploads/cache/13602_NpAdvInnerSmall.jpg
    • 17:42:14 ->/wp-content/plugins/wp-spamfree/js/wpsf-js.php
    • 17:42:15 ->/wp-content/plugins/wp-spamfree/img/wpsf-img.php
    • 17:42:17 ->/xmlrpc.php
    • 17:42:18 ->/wp-content/plugins/wp-spamfree/js/wpsf-js.php
    • 17:42:18 ->/xmlrpc.php?rsd
    • 17:46:30 ->/feed/atom/
    • 17:46:30 ->/xmlrpc.php
    • 17:46:30 ->/xmlrpc.php?rsd
    • 17:46:31 ->/feed/rss/

    A prior visit from the same IP is here:

    • Probably hack attempt!
    • OS: Win2008 x64
    • BROWSER: IE 8

    Raw data:

    • Visit type: Spammer/Hacker
    • IP: 147.71.155.xx
    • Hostname: gtp000012gts.bliss.army.mil
    • Url Requested: [404] /wp-content/uploads/cache/17882_NpAdvInnerSmall.jpg%20
    • User Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0; Trident/4.0; SLCC1; .NET CLR 2.0.50727; InfoPath.2; .NET CLR 3.5.30729; .NET CLR 3.0.30729)
    • Referrer: http://www.thepostemail.com/tag/lt-col-terrence-lakin/
    • OS: WinVista
    • Browser: IE 8
    • Locale/Language: us
    • Wassup ID: 9dc193cc2779b18f34516f5b0b4c1081
    • End timestamp: 2010-06-22 05:42:18 pm ( 1277228538 )

    147.71.155.xx 2010-06-22 05:42:18 pm

    [404] /wp-content/uploads/cache/17882_NpAdvInnerSmall.jpg
    Referrer: From your blog
    Hostname: gtp000012gts.bliss.army.mil

    A visitor from IP 194.105.124.xx was serious about taking down our site but failed:

    [404] /wp-content/uploads/cache/8130_NpAdvFeaThumb.jpg
    Referrer: Direct hit
    Hostname: usaslwilp03-ext.pub-us.asml.com

    • User Agent: Mozilla/4.0 (compatible;)
    • Probably hack attempt!
    • OS:
    • BROWSER: Netscape 4
    • 16:12:49 ->/2009/10/
    • 16:12:49 ->/2010/03/
    • 16:12:49 ->/2010/04/
    • 16:12:49 ->/xmlrpc.php
    • 16:12:50 ->/2010/01/
    • 16:12:50 ->/2010/02/
    • 16:12:50 ->/2010/05/
    • 16:12:50 ->[404] /wp-content/uploads/cache/8130_NpAdvFeaThumb.jpg
    • 16:12:51 ->/2009/11/
    • 16:12:51 ->/wp-content/plugins/wp-spamfree/js/wpsf-js.php
    • 16:12:51 ->[404] /wp-content/uploads/cache/7838_NpAdvFeaThumb.jpg
    • 16:12:51 ->[404] /wp-content/uploads/cache/8971_NpAdvFeaThumb.jpg
    • 16:12:52 ->[404] /wp-content/uploads/cache/10167_NpAdvFeaThumb.jpg
    • 16:12:52 ->[404] /wp-content/uploads/cache/18176_NpAdvSideFea.jpg
    • 16:12:52 ->[404] /wp-content/uploads/cache/7838_NpAdvFeaThumb.jpg
    • 16:12:52 ->[404] /wp-content/uploads/cache/8024_NpAdvFeaThumb.jpg
    • 16:12:52 ->[404] /wp-content/uploads/cache/8971_NpAdvFeaThumb.jpg
    • 16:12:53 ->/wp-content/plugins/wp-spamfree/js/wpsf-js.php
    • 16:12:53 ->[404] /wp-content/uploads/cache/18311_NpAdvSideFea.jpg
    • 16:12:53 ->[404] /wp-content/uploads/cache/18362_NpAdvSideFea.jpg
    • 16:12:53 ->[404] /wp-content/uploads/cache/18492_NpAdvSideFea.jpg
    • 16:12:53 ->[404] /wp-content/uploads/cache/8024_NpAdvFeaThumb.jpg
    • 16:12:53 ->[404] /wp-content/uploads/cache/8130_NpAdvFeaThumb.jpg
    • 16:12:54 ->/2009/08/
    • 16:12:54 ->/xmlrpc.php?rsd
    • 16:12:54 ->[404] /wp-content/uploads/cache/10167_NpAdvFeaThumb.jpg
    • 16:12:54 ->[404] /wp-content/uploads/cache/18176_NpAdvSideFea.jpg
    • 16:12:55 ->/2009/09/
    • 16:12:55 ->/xmlrpc.php?rsd
    • 16:12:55 ->[404] /wp-content/uploads/cache/18311_NpAdvSideFea.jpg
    • 16:12:56 ->/xmlrpc.php
    • 16:12:56 ->[404] /wp-content/uploads/cache/18492_NpAdvSideFea.jpg
    • 16:12:57 ->/2009/12/
    • 16:12:58 ->[404] /wp-content/uploads/cache/18637_NpAdvSideFea.jpg
    • 16:12:59 ->[404] /wp-content/uploads/cache/18362_NpAdvSideFea.jpg
    • 16:12:59 ->[404] /wp-content/uploads/cache/18470_NpAdvSideFea.jpg
    • 16:12:59 ->[404] /wp-content/uploads/cache/7589_NpAdvFeaThumb.jpg
    • 16:13:00 ->[404] /wp-content/uploads/cache/18275_NpAdvSideFea.jpg
    • 16:13:00 ->[404] /wp-content/uploads/cache/18637_NpAdvSideFea.jpg
    • 16:13:00 ->[404] /wp-content/uploads/cache/7589_NpAdvFeaThumb.jpg
    • 16:13:01 ->[404] /wp-content/uploads/cache/18275_NpAdvSideFea.jpg
    • 16:13:01 ->[404] /wp-content/uploads/cache/18470_NpAdvSideFea.jpg
    • 16:18:11 ->/feed/rss/
    • 16:18:11 ->/xmlrpc.php
    • 16:18:11 ->[404] /wp-content/uploads/cache/10167_NpAdvFeaThumb.jpg
    • 16:18:12 ->/feed/atom/
    • 16:18:12 ->/xmlrpc.php?rsd
    • 16:18:12 ->[404] /wp-content/uploads/cache/7589_NpAdvFeaThumb.jpg
    • 16:18:12 ->[404] /wp-content/uploads/cache/8024_NpAdvFeaThumb.jpg
    • 16:18:12 ->[404] /wp-content/uploads/cache/8130_NpAdvFeaThumb.jpg
    • 16:18:13 ->[404] /wp-content/uploads/cache/18311_NpAdvSideFea.jpg
    • 16:18:13 ->[404] /wp-content/uploads/cache/18362_NpAdvSideFea.jpg
    • 16:18:13 ->[404] /wp-content/uploads/cache/7589_NpAdvFeaThumb.jpg
    • 16:18:13 ->[404] /wp-content/uploads/cache/8024_NpAdvFeaThumb.jpg
    • 16:18:13 ->[404] /wp-content/uploads/cache/8130_NpAdvFeaThumb.jpg
    • 16:18:14 ->[404] /wp-content/uploads/cache/10167_NpAdvFeaThumb.jpg
    • 16:18:14 ->[404] /wp-content/uploads/cache/18176_NpAdvSideFea.jpg
    • 16:18:14 ->[404] /wp-content/uploads/cache/18275_NpAdvSideFea.jpg
    • 16:18:14 ->[404] /wp-content/uploads/cache/18492_NpAdvSideFea.jpg
    • 16:18:14 ->[404] /wp-content/uploads/cache/7838_NpAdvFeaThumb.jpg
    • 16:18:15 ->/wp-content/plugins/wp-spamfree/js/wpsf-js.php
    • 16:18:15 ->[404] /wp-content/uploads/cache/18176_NpAdvSideFea.jpg
    • 16:18:15 ->[404] /wp-content/uploads/cache/18492_NpAdvSideFea.jpg
    • 16:18:15 ->[404] /wp-content/uploads/cache/18637_NpAdvSideFea.jpg
    • 16:18:16 ->/xmlrpc.php?rsd
    • 16:18:16 ->[404] /wp-content/uploads/cache/18637_NpAdvSideFea.jpg
    • 16:18:17 ->[404] /wp-content/uploads/cache/18470_NpAdvSideFea.jpg
    • 16:18:17 ->[404] /wp-content/uploads/cache/8971_NpAdvFeaThumb.jpg
    • 16:18:18 ->/xmlrpc.php
    • 16:18:18 ->[404] /wp-content/uploads/cache/18470_NpAdvSideFea.jpg
    • 16:18:18 ->[404] /wp-content/uploads/cache/8971_NpAdvFeaThumb.jpg
    • 16:18:19 ->[404] /wp-content/uploads/cache/7838_NpAdvFeaThumb.jpg

    Another hacker who appears to be using a military computer fromIP 160.141.34.xxx is here:
    [404] /wp-content/plugins/vi(…)b/v-zoom/graphics/zoomin.cur
    Referrer: http://beforeitsnews.com/n(…)ght_To_Court_Martial.html
    Hostname: mach34-xxx.benning.amedd.army.mil

    • User Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727; .NET CLR 3.0.04506.30; .NET CLR 3.0.04506.648; InfoPath.2; .NET CLR 3.0.4506.2152; .NET CLR 3.5.30729)
    • Probably hack attempt!
    • OS: WinXP
    • BROWSER: IE 6

    Join the Conversation

    16 Comments

    Your email address will not be published.

    This site uses Akismet to reduce spam. Learn how your comment data is processed.

    1. That you are being hacked is unequivocal confirmation that your web site is a threat to those who are hacking you — which is a very good thing! You are clearly making many very nervous. Keep up the good work!!

      Thank you for maintaining this particularly informative and well researched/documented web site.

    2. That P&E’s web-site has become a target for so many hackers serves well to underscore its effectiveness. KUDOS, Mrs, Rondeau!

      FYI: The most effective way to get the military to act in your favor is to contact your Congressional representatives and have them contact the military on your behalf.
      ——————–
      Mrs. Rondeau replies: Thank you for that suggestion.

    3. I believe that these hacking attacks from military base computers are most likely being instigated by civilian employees or civilian contract employees working on the bases with access to the military computers on the bases and that they are abusing their access privileges and illegally using the military computer systems for these attacks. Remember, it was an employee of a contractor who illegally accessed the passport records to sanitize Obama’s passport records. He was cooperating with authorities on that matter and then he showed up dead a few weeks later. If the base commander is unresponsive to requests to investigate the misuse of government computers to attack incorporated news sites and businesses and won’t or cannot stop the abuse of the government computers, move up the chain of command. Make another call to the base commander and ask for the name and contact telephone number for his superiors. Or try to contact the military’s Criminal Investigation Division (CID). Call the Pentagon for the appropriate contact name and phone number to report abuse of government property (computers) being used to launch hack attacks on your business.

      MPG
      —————–
      Mrs. Rondeau replies: Thank you for the information.

    4. Attacks from within military installations? Average soldiers have no time and probably would not want to risk hacking activities knowing that activities are closely monitored inside and outside the firewall. Most industrial firewalls will block outbound signatures of hacking as well as inbound.

      This has the stamp of John Brennan and co.
      ——————–
      Mrs. Rondeau replies: Anything is possible, because I never received any response from any of the commanders or communications officials at any of the bases, which included Army, Navy and USMC.

      1. Sharon, you may want to send a cease and desist letter to the Base or Post Commander, their Public Affairs Office, JAG, and Security Forces. Having spent most of my career around the military, you need to press hard at the highest level, as well as the PA, JAG and SF offices. All military installations have strict internet usage regs. You need to lean hard and wide and be persistent! The thing that commanders try to avoid at all costs is anything that makes them look bad. And hacking is no light matter, especially using government-owned equipment!

    5. Mrs. Rondeau,
      I admire and appreciate your courage! I firmly believe The Post & Email is the primary news source doing the ‘heavy lifting’ specifically relating to all things Obama, Potus Eligibility & criminal election fraud by this government. Godspeed to you folks. It is evident your interviews with highly decorated military men have had a tremendous effect; let us all hope the special forces background of Commander McCrystal brings him to join together with Major-General Vallely! It is great men of Courage that can save this nation from those corrupted and cowardice men that seek to destroy our Republic.
      FYI, if you have not prior made contact, the following link contains specific facts surrounding Obama election fraud and specific Texas election laws:
      http://jbjd.wordpress.com/2010/05/10/all-the-presidents-henchmen/
      —————-
      Mrs. Rondeau replies: Yes, thank you, I have read jbjd’s fine work.

    6. I could not open P&E for quite some time, not even with a proxy.
      Now it works again.
      Don’t know since when, I gave up trying after a while.

      Reminds me of the trouble Orly always had with her various blogs.
      Reminds me also that Obots are basically spoiled internet kids, who don’t respect free speech and the rights of others, just like their Guru.
      Their recently pretty unpopular Guru LOL!

    7. Not surprising, I have seen the P&E referred to as the “enemy” on an Obot /commie blog. Nice to see that The P&E is living rent free inside the Obot pea sized brain. That doesn’t leave much room for rational thought. HaHa!!!!
      ———————–
      Mrs. Rondeau replies: Absolutely!

    8. The fact that hackers are trying to disturb the site is a great thing. That means the news items presented are striking a nerve center of alinsky-ites that cannot “handle the truth”. We love what this site does in the battle for truth to be told. We are tired of lies from the white house and the liar-in-chief personally perpetuating lie upon lie to the American people.

      So, congratulations to Post&Email for the ongoing efforts for the big boys who took notice and ordered the technology hit on your site. Keep on, keepin’ on. Treason charges are right around the corner for barry soetero. More developing facts are soon coming, stay tuned to your freedom fighting sources. Lame stream media won’t tell ya the truth.

      1. Right. It means the site’s readership is large and among the readers there are at least some who, in the eyes of the opposition, count. Way to go, P&E News!

    9. Mrs. Rondeau-I was on Citizen Wells yesterday and two different bloggers stated that they could not open Postemail, so I tried and got through immediately, so I noted that on CW web-site. I’m so glad you are pursuing this and we will be anxiously awaiting the results.If you don’t know the hillbuzz guys had a similar problem, a hacker in England published all sorts of personal material re: Kevin DeJune (spelling)-Andrea Shea King has him on Radio Patriot as often as she can. Kevin is pursuing legal action in Great Britain.
      ———————
      Mrs. Rondeau replies: This is good to know!

    10. Mrs. Rondeau,

      Could the “BlackBerry” hacker be black Barry himself?

      Seriously, your site was not available for about two hours yesterday, and I feared it was a hacker trying to prevent the great article you wrote about General McChrystal and Obama from being seen.

      Hang tough, and I am mailing in a contribution today.
      ———————-
      Mrs. Rondeau replies: Thank you, Bob. Yesterday’s unavailability actually was not a hacker; our web host was doing some expected upgrading and technical work.