Loading...

Vittima: whafh.com

ID: 12648 rilevato il 22-12-2023 19:17:46 dal gruppo blackbasta
Descrizione: Wolf Haldenstein Adler Freeman & Herz LLP has decades of experience in complex litigation, with an emphasis on securities and shareholder derivative litigation, antitrust litigation, copyright litigation, business litigation, and consumer protection. The Firm has recovered more than $9 billion for its clients, including defrauded shareholders and investors, antitrust victims, victims of copyright infringement, and injured consumers. Wolf Haldenstein has earned global acclaim for its many groundbreaking achievements.SITE: www.whafh.com Address 270 Madison Avenue New York, New York 10016 UNITED STATES (212) 545-4600Symphony Towers 750 B Street, Suite 1820 San Diego, California 92101 UNITED STATES (619) 239-4599111 West Jackson, Suite 1700 Chicago, IL 60604 UNITED STATES (312) 984-00001008 17th Ave South Nashville, TN 37212 UNITED STATES (615) 270-8111FULL DATA SIZE: 452gb 1. I-9 forms 2. ConfidentialityNETWORK: WHAFHGROUP-------------------------DOMAIN ADMINS------------------------- admin Administrator Avada citrix cyberdocs dbagent discovery dm docs eqt_controller fusion gateway gjata gwweb hal2000 ldap legalkey mail mann monitor newwinny newwinsd NYDC2DHCP scheduler summation2 whafhapps whafhch whafhny whafhsd whafhsql whafhweb wolf1WHAFHGROUP\Administrator !w0lf1888!son-------------------------DC------------------------- whafhny.whafh.com 10.1.3.2 Windows Server 2008 R2 Standard WHAFHSD.whafh.com 10.3.1.2 Windows Server 2012 R2 Standard NYDC1.whafh.com 10.1.3.3 Windows Server 2008 R2 Standard SDDC1.whafh.com 10.3.1.2 Windows Server 2012 R2 Standard-------------------------SERVERS------------------------- Tabsny.whafh.com Windows Server 2019 Standard WIN-19.whafh.com Windows Server 2019 Standard tabs.whafh.com 10.1.3.4 Windows Server 2019 Standard CTX4.whafh.com 10.1.3.20 Windows Server 2012 R2 Standard WStorefront.whafh.com 10.1.3.69 Windows Server 2012 R2 Standard VWNY.whafh.com 10.1.3.150 Windows Server 2012 R2 Standard WSUS.whafh.com 10.1.3.120 Windows Server 2012 R2 Standard CTX2.whafh.com 10.1.3.19 Windows Server 2012 R2 Standard CTX1.whafh.com 10.1.3.33 Windows Server 2012 R2 Standard DMNY.whafh.com 10.1.3.24 Windows Server 2012 R2 Standard DMSD.whafh.com 10.3.1.18 Windows Server 2012 R2 Standard whafhapps.whafh.com 10.1.3.12 Windows Server 2012 R2 Standard mailny1.whafh.com 10.1.3.7 Windows Server 2012 R2 Standard wolf1.whafh.com 10.1.0.8 Windows Server 2012 R2 Standard equitrac.whafh.com 10.1.1.18 Windows Server 2008 R2 Standard NYSQL.whafh.com 10.1.3.30 Windows Server 2008 R2 Standard SUMMATION.whafh.com 10.1.3.26 Windows Server 2008 R2 Standard DISCOVERY.whafh.com 10.1.3.32 Windows Server 2008 R2 Standard MONITOR.whafh.com Windows Server 2008 R2 Standard HP2.whafh.com Windows Server 2008 R2 Standard SQL.whafh.com 10.1.3.22 Windows Server 2008 R2 Standard HP1.whafh.com Windows Server 2008 R2 Standard NYPRT.whafh.com 10.1.3.16 Windows Server 2008 R2 Standard WHAFHCA2.whafh.com 10.1.3.77 Windows Server 2008 R2 Standard CITRIX1.whafh.com 10.1.3.19 Windows Server 2008 R2 Standard WEB.whafh.com 10.1.0.15 Windows Server 2008 R2 Standard FUSION.whafh.com 10.1.3.5 Windows Server 2008 R2 Standard DM.whafh.com Windows Server 2008 R2 Standard mailny.whafh.com Windows Server® 2008 Standard

Hash di rilevamento: 0f8150e080a7751797b8bf3c9d217915bba84ad98e3b9ba4e2535a1651a0132f
Vittima localizzata in: USA
Sito web: N/D
Settore lavorativo: Citizens

Questo script colleziona ogni rivendicazione criminale esattamente come esposta dalle fonti (modello "As Is"), in un database SQL per creare un feed permanente, che può anche essere seguito con tecnologia RSS.
Il motore è basato sul progetto ransomFeed, fork in GitHub.