____________________________________
Information Provided By: defcon.pharaoh
____
Date Created: 2021-07-22
Time Created: 10:21:53.705
Elapsed Time: None
____
Last Updated At: 2021-07-25 16:11:15 UTC
____
Reason(s) for Information being Leaked: 
- Cheating..
- Sends her nudes around.
- Likes male attention. (hoe)
____________________________________


______________________________
> cat basic_information.txt
______________________________
- Name: Meghan Fay Holcombe
- First Name: Meghan
- Middle Initial: F.
- Last Name: Holcombe
- Sex/Gender: <F>
- Birth Month: May (05)
- Birth Year: 2004
- Birth Day: 18
- Age: 18
- Age Range: 18-24
- S.S.N: null
- Phone Number: +1-470-547-5448
- Email: meghanholcombe@gmail.com
- Mothers Name: Kimberly Sage Wold-Holcombe
~ Phone Number: +1-478-294-9884 - Wireless
~ Emails:
mxmyownsummer@worldnet.att.net

mxmyownsummer@hotmail.com

kimberlybrackett@hotmail.com

~ Prior Addresses:
4962 Valley Lake Rd; Austell, GA 30106-2822
6035 Highview SE Dr; Mableton, GA 30126-3612
5341 Northside Dr; Macon, GA 31210-1500
101 Brett Ave; Warner Robins, GA 31088-4150
3512 Woodcrest Rd; Macon, GA 31206-3640

~ Prior Phone Numbers:
+1-478-321-7294 - Wireless
+1-478-319-5556 - Wireless
+1-478-755-9059 - LandLine
______________________________


______________________________
> cat location_information.txt
______________________________
- Full Address: 2040 Lyda Lane; Loganville, GA 30052-2769
- Street Line #1: 2040 Lyda Lane
- Street Line #2: null
- City: Loganville
- Postal Code: 30052
- State Name: Georgia
- State Code: GA
- ZIP4: 2769
- Country Name: United States of America
- Country Code: U.S.
______________________________


______________________________
> cat home_information.txt
______________________________
- Year Built: 1989
- Home Type: Single Family Residence
- Bedrooms: 5.0
- Bathrooms: 4.0
- Full Bathrooms: 3.0
- 1/2 Bathrooms: 1.0
- Heating Feature(s): 'Natural Gas'
- Cooling Feature(s): 'Ceiling Fan(s) | Central Air'
- Parking Feature(s): 'Garage | Garage Door Opener | Garage Faces Side | 2 Garage Spaces'
- Lot Size: 0.83 Acres
- Lot Feature(s): 'Back-Yard | Cul-De-Sac | Front-Yard | Level | Private'
- Squarefeet: 4,410
- Last Sold On: 2021-05-03
- Sold Price: $384,000
- Rent Price: (Possibly) $1,783/mo.
- Basement [Level]: Completed | Completed Bath
- Flooring Type: Carpet | Ceramic Tile | Hardwood
- Special Conditions: Standard
- Parcel Number: R5062-038
- Accessibility Feature(s): None
______________________________


______________________________
> cat phone_number_information.txt
______________________________
National Number: 4705475448
Country Code: 1
International Number: +14705475448
E164 Form: (470) 547-5448
Location: Atlanta, Georgia, U.S.
Carrier: null

Line Type: Mobile/Wireless
Is Valid: True
Is Possible Number: True
______________________________


______________________________
> cat ip_information.txt
______________________________
- IP Address: 73.106.20.49
- Local IP Address: 192.168.86.62
- Hostname: c-73-106-20-49.hsd1.ga.comcast.net
- ISP: Comcast Cable Communications, LLC
- Organization: Comcast IP Services, L.L.C.
- AS: AS7922 Comcast Cable Communications, LLC
- AS Name/Network: COMCAST-7922
- AS Number: 7922

- Open Ports: ["8000/tcp/http-proxy","8080/tcp/http-proxy"]
- Route: ["73.0.0.0/8 via AS7922","73.106.0.0/16 via Abuse Report"]
- Protocols: no publicly accessible services

{"status":"success","country":"United States","countryCode":"US","region":"GA","regionName":"Georgia","city":"Loganville","zip":"30052","lat":33.878,"lon":-83.8923,"timezone":"America/New_York","isp":"Comcast Cable Communications, LLC","org":"Comcast IP Services, L.L.C.","as":"AS7922 Comcast Cable Communications, LLC","query":"73.106.20.49"}
______________________________


_______________________________________________
> cat device_information.txt
______________________________
- Orientation: portrait-primary
- Time Zone: America/New_York EDT
- User Time [When Info Was Recorded]: Sun Jul 25 2021 12:11:17 GMT-0400 (Eastern Daylight Time)
- Language: en-US
- Incognito/Private Window: No
- Ad Blocker: No
- Screen Size: 600 x 1024
- Local IP: 192.168.86.62
- GPU: Mali-T720
- Browser: Instagram App (192.0.0.35.123)
- Operating System: Android 9
- Device: Amazon Fire 7" (2019)
- Touch Screen: Yes (5 touch points)
- User Agent: 'Mozilla/5.0 (Linux; Android 9; KFMUWI Build/PS7319; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/90.0.4430.91 Safari/537.36 Instagram 192.0.0.35.123 Android (28/9; 160dpi; 600x976; Amazon; KFMUWI; mustang; mt8163; en_US; 298419552)'
- Platform: Linux armv7l

- Referring URL: https://l.instagram.com/
_______________________________________________


_________________________________________________________________
> cat nmap_scan_report1.txt
_________________________________________________________________
Starting Nmap 7.80 ( https://nmap.org ) at 2021-08-10 11:08 CDT
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 11:08
Completed NSE at 11:08, 0.00s elapsed
Initiating NSE at 11:08
Completed NSE at 11:08, 0.00s elapsed
Initiating NSE at 11:08
Completed NSE at 11:08, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 11:08
Completed Parallel DNS resolution of 1 host. at 11:09, 13.00s elapsed
Initiating SYN Stealth Scan at 11:09
Scanning 73.106.20.49 [1000 ports]
Discovered open port 8080/tcp on 73.106.20.49
Increasing send delay for 73.106.20.49 from 0 to 5 due to 11 out of 13 dropped probes since last increase.
Increasing send delay for 73.106.20.49 from 5 to 10 due to 11 out of 12 dropped probes since last increase.
SYN Stealth Scan Timing: About 55.00% done; ETC: 11:10 (0:00:30 remaining)
SYN Stealth Scan Timing: About 68.80% done; ETC: 11:10 (0:00:30 remaining)
Discovered open port 8000/tcp on 73.106.20.49
Completed SYN Stealth Scan at 11:11, 125.04s elapsed (1000 total ports)
Initiating Service scan at 11:11
Scanning 2 services on 73.106.20.49
Completed Service scan at 11:11, 11.16s elapsed (2 services on 1 host)
Initiating OS detection (try #1) against 73.106.20.49
Initiating Traceroute at 11:11
Completed Traceroute at 11:11, 0.02s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 11:11
Completed Parallel DNS resolution of 2 hosts. at 11:12, 13.00s elapsed
NSE: Script scanning 73.106.20.49.
Initiating NSE at 11:12
Completed NSE at 11:13, 83.41s elapsed
Initiating NSE at 11:13
Completed NSE at 11:13, 2.01s elapsed
Initiating NSE at 11:13
Completed NSE at 11:13, 0.00s elapsed
Nmap scan report for 73.106.20.49
Host is up (0.0044s latency).
Not shown: 998 filtered ports
PORT     STATE SERVICE    VERSION
8000/tcp open  http-proxy Squid http proxy 2.5.STABLE14
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported: GET HEAD CONNECTION
8080/tcp open  http-proxy Squid http proxy 2.5.STABLE14
| http-open-proxy: Potentially OPEN proxy.
|_Methods supported: GET HEAD CONNECTION
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.23 - 2.6.38
Uptime guess: 67.028 days (since Fri Jun  4 10:33:45 2021)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=195 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 8080/tcp)
HOP RTT     ADDRESS
1   0.76 ms defcon.mshome.net (172.30.144.1)
2   5.45 ms 73.106.20.49

NSE: Script Post-scanning.
Initiating NSE at 11:13
Completed NSE at 11:13, 0.00s elapsed
Initiating NSE at 11:13
Completed NSE at 11:13, 0.00s elapsed
Initiating NSE at 11:13
Completed NSE at 11:13, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 283.66 seconds
           Raw packets sent: 2143 (96.812KB) | Rcvd: 24 (1.180KB)
_________________________________________________________________


_________________________________________________________________
> cat nmap_scan_report2.txt
_________________________________________________________________
Starting Nmap 7.80 ( https://nmap.org ) at 2021-08-10 11:17 CDT
NSE: Loaded 149 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 11:17
Completed NSE at 11:17, 10.06s elapsed
Initiating NSE at 11:17
Completed NSE at 11:17, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 11:17
Completed Parallel DNS resolution of 1 host. at 11:18, 13.00s elapsed
Initiating SYN Stealth Scan at 11:18
Scanning 73.106.20.49 [1000 ports]
Discovered open port 8080/tcp on 73.106.20.49
Increasing send delay for 73.106.20.49 from 0 to 5 due to 11 out of 12 dropped probes since last increase.
SYN Stealth Scan Timing: About 35.00% done; ETC: 11:19 (0:00:58 remaining)
Increasing send delay for 73.106.20.49 from 5 to 10 due to 11 out of 12 dropped probes since last increase.
SYN Stealth Scan Timing: About 64.00% done; ETC: 11:20 (0:00:51 remaining)
SYN Stealth Scan Timing: About 77.80% done; ETC: 11:20 (0:00:35 remaining)
Completed SYN Stealth Scan at 11:20, 160.98s elapsed (1000 total ports)
Initiating Service scan at 11:20
Scanning 1 service on 73.106.20.49
Completed Service scan at 11:21, 10.34s elapsed (1 service on 1 host)
Initiating OS detection (try #1) against 73.106.20.49
Initiating Traceroute at 11:21
Completed Traceroute at 11:21, 0.02s elapsed
Initiating Parallel DNS resolution of 2 hosts. at 11:21
Completed Parallel DNS resolution of 2 hosts. at 11:21, 13.00s elapsed
NSE: Script scanning 73.106.20.49.
Initiating NSE at 11:21
Completed NSE at 11:26, 304.39s elapsed
Initiating NSE at 11:26
Completed NSE at 11:26, 8.04s elapsed
Nmap scan report for 73.106.20.49
Host is up (0.013s latency).
Not shown: 999 filtered ports
PORT     STATE SERVICE    VERSION
8080/tcp open  http-proxy Squid http proxy 2.5.STABLE14
|_clamav-exec: ERROR: Script execution failed (use -d to debug)
|_http-server-header: squid/2.5.STABLE14
|_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug)
| vulners:
|   cpe:/a:squid-cache:squid:2.5.stable14:
|       CVE-2014-6270   6.8     https://vulners.com/cve/CVE-2014-6270
|       CVE-2005-2917   5.0     https://vulners.com/cve/CVE-2005-2917
|_      CVE-2021-31807  4.0     https://vulners.com/cve/CVE-2021-31807
Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port
Device type: general purpose
Running: Linux 2.6.X
OS CPE: cpe:/o:linux:linux_kernel:2.6
OS details: Linux 2.6.23 - 2.6.38
Uptime guess: 68.427 days (since Thu Jun  3 01:10:58 2021)
Network Distance: 2 hops
TCP Sequence Prediction: Difficulty=195 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 8080/tcp)
HOP RTT     ADDRESS
1   1.04 ms ...
2   4.17 ms 73.106.20.49

NSE: Script Post-scanning.
Initiating NSE at 11:26
Completed NSE at 11:26, 0.00s elapsed
Initiating NSE at 11:26
Completed NSE at 11:26, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 529.01 seconds
           Raw packets sent: 2170 (98.000KB) | Rcvd: 26 (1.268KB)
_________________________________________________________________


______________________________
> cat social_media_accounts.txt
______________________________
- Instagram Account #1: mj_love_12
- Instagram Account #2: mj_bad_bitch
- Instagram Account #3: love_mj_m
- Instagram Account #4: null
- Snapchat Account #1: meghan_768c
- Facebook Account #1: https://www.facebook.com/meghan.holcombe.3
- Facebook Account #2: null
- Discord Account #1: null
______________________________


______________________________
> cat relatives.txt
______________________________
- Candace Rogers
- Charles Brackett
- Eugene Wold
- Heather Reid
- Holly Alford
- Lorengene Wold
- Amanda Josey
- Andrea Clark
- Annie Allen
- [and 1 more available]
______________________________


______________________________
> cat associated_people.txt
______________________________
- Richard Thigpen
- Jeremy Nagorka
- Kaleb Halligan
- Lynwood Rogers
- Walter Reid
- Harriet Boswell
______________________________