____________________________________ Information Provided By: defcon.pharaoh ____ Date Created: 2021-07-22 Time Created: 10:21:53.705 Elapsed Time: None ____ Last Updated At: 2021-07-25 16:11:15 UTC ____ Reason(s) for Information being Leaked: - Cheating.. - Sends her nudes around. - Likes male attention. (hoe) ____________________________________ ______________________________ > cat basic_information.txt ______________________________ - Name: Meghan Fay Holcombe - First Name: Meghan - Middle Initial: F. - Last Name: Holcombe - Sex/Gender: - Birth Month: May (05) - Birth Year: 2004 - Birth Day: 18 - Age: 18 - Age Range: 18-24 - S.S.N: null - Phone Number: +1-470-547-5448 - Email: meghanholcombe@gmail.com - Mothers Name: Kimberly Sage Wold-Holcombe ~ Phone Number: +1-478-294-9884 - Wireless ~ Emails: mxmyownsummer@worldnet.att.net mxmyownsummer@hotmail.com kimberlybrackett@hotmail.com ~ Prior Addresses: 4962 Valley Lake Rd; Austell, GA 30106-2822 6035 Highview SE Dr; Mableton, GA 30126-3612 5341 Northside Dr; Macon, GA 31210-1500 101 Brett Ave; Warner Robins, GA 31088-4150 3512 Woodcrest Rd; Macon, GA 31206-3640 ~ Prior Phone Numbers: +1-478-321-7294 - Wireless +1-478-319-5556 - Wireless +1-478-755-9059 - LandLine ______________________________ ______________________________ > cat location_information.txt ______________________________ - Full Address: 2040 Lyda Lane; Loganville, GA 30052-2769 - Street Line #1: 2040 Lyda Lane - Street Line #2: null - City: Loganville - Postal Code: 30052 - State Name: Georgia - State Code: GA - ZIP4: 2769 - Country Name: United States of America - Country Code: U.S. ______________________________ ______________________________ > cat home_information.txt ______________________________ - Year Built: 1989 - Home Type: Single Family Residence - Bedrooms: 5.0 - Bathrooms: 4.0 - Full Bathrooms: 3.0 - 1/2 Bathrooms: 1.0 - Heating Feature(s): 'Natural Gas' - Cooling Feature(s): 'Ceiling Fan(s) | Central Air' - Parking Feature(s): 'Garage | Garage Door Opener | Garage Faces Side | 2 Garage Spaces' - Lot Size: 0.83 Acres - Lot Feature(s): 'Back-Yard | Cul-De-Sac | Front-Yard | Level | Private' - Squarefeet: 4,410 - Last Sold On: 2021-05-03 - Sold Price: $384,000 - Rent Price: (Possibly) $1,783/mo. - Basement [Level]: Completed | Completed Bath - Flooring Type: Carpet | Ceramic Tile | Hardwood - Special Conditions: Standard - Parcel Number: R5062-038 - Accessibility Feature(s): None ______________________________ ______________________________ > cat phone_number_information.txt ______________________________ National Number: 4705475448 Country Code: 1 International Number: +14705475448 E164 Form: (470) 547-5448 Location: Atlanta, Georgia, U.S. Carrier: null Line Type: Mobile/Wireless Is Valid: True Is Possible Number: True ______________________________ ______________________________ > cat ip_information.txt ______________________________ - IP Address: 73.106.20.49 - Local IP Address: 192.168.86.62 - Hostname: c-73-106-20-49.hsd1.ga.comcast.net - ISP: Comcast Cable Communications, LLC - Organization: Comcast IP Services, L.L.C. - AS: AS7922 Comcast Cable Communications, LLC - AS Name/Network: COMCAST-7922 - AS Number: 7922 - Open Ports: ["8000/tcp/http-proxy","8080/tcp/http-proxy"] - Route: ["73.0.0.0/8 via AS7922","73.106.0.0/16 via Abuse Report"] - Protocols: no publicly accessible services {"status":"success","country":"United States","countryCode":"US","region":"GA","regionName":"Georgia","city":"Loganville","zip":"30052","lat":33.878,"lon":-83.8923,"timezone":"America/New_York","isp":"Comcast Cable Communications, LLC","org":"Comcast IP Services, L.L.C.","as":"AS7922 Comcast Cable Communications, LLC","query":"73.106.20.49"} ______________________________ _______________________________________________ > cat device_information.txt ______________________________ - Orientation: portrait-primary - Time Zone: America/New_York EDT - User Time [When Info Was Recorded]: Sun Jul 25 2021 12:11:17 GMT-0400 (Eastern Daylight Time) - Language: en-US - Incognito/Private Window: No - Ad Blocker: No - Screen Size: 600 x 1024 - Local IP: 192.168.86.62 - GPU: Mali-T720 - Browser: Instagram App (192.0.0.35.123) - Operating System: Android 9 - Device: Amazon Fire 7" (2019) - Touch Screen: Yes (5 touch points) - User Agent: 'Mozilla/5.0 (Linux; Android 9; KFMUWI Build/PS7319; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0 Chrome/90.0.4430.91 Safari/537.36 Instagram 192.0.0.35.123 Android (28/9; 160dpi; 600x976; Amazon; KFMUWI; mustang; mt8163; en_US; 298419552)' - Platform: Linux armv7l - Referring URL: https://l.instagram.com/ _______________________________________________ _________________________________________________________________ > cat nmap_scan_report1.txt _________________________________________________________________ Starting Nmap 7.80 ( https://nmap.org ) at 2021-08-10 11:08 CDT NSE: Loaded 151 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 11:08 Completed NSE at 11:08, 0.00s elapsed Initiating NSE at 11:08 Completed NSE at 11:08, 0.00s elapsed Initiating NSE at 11:08 Completed NSE at 11:08, 0.00s elapsed Initiating Parallel DNS resolution of 1 host. at 11:08 Completed Parallel DNS resolution of 1 host. at 11:09, 13.00s elapsed Initiating SYN Stealth Scan at 11:09 Scanning 73.106.20.49 [1000 ports] Discovered open port 8080/tcp on 73.106.20.49 Increasing send delay for 73.106.20.49 from 0 to 5 due to 11 out of 13 dropped probes since last increase. Increasing send delay for 73.106.20.49 from 5 to 10 due to 11 out of 12 dropped probes since last increase. SYN Stealth Scan Timing: About 55.00% done; ETC: 11:10 (0:00:30 remaining) SYN Stealth Scan Timing: About 68.80% done; ETC: 11:10 (0:00:30 remaining) Discovered open port 8000/tcp on 73.106.20.49 Completed SYN Stealth Scan at 11:11, 125.04s elapsed (1000 total ports) Initiating Service scan at 11:11 Scanning 2 services on 73.106.20.49 Completed Service scan at 11:11, 11.16s elapsed (2 services on 1 host) Initiating OS detection (try #1) against 73.106.20.49 Initiating Traceroute at 11:11 Completed Traceroute at 11:11, 0.02s elapsed Initiating Parallel DNS resolution of 2 hosts. at 11:11 Completed Parallel DNS resolution of 2 hosts. at 11:12, 13.00s elapsed NSE: Script scanning 73.106.20.49. Initiating NSE at 11:12 Completed NSE at 11:13, 83.41s elapsed Initiating NSE at 11:13 Completed NSE at 11:13, 2.01s elapsed Initiating NSE at 11:13 Completed NSE at 11:13, 0.00s elapsed Nmap scan report for 73.106.20.49 Host is up (0.0044s latency). Not shown: 998 filtered ports PORT STATE SERVICE VERSION 8000/tcp open http-proxy Squid http proxy 2.5.STABLE14 | http-open-proxy: Potentially OPEN proxy. |_Methods supported: GET HEAD CONNECTION 8080/tcp open http-proxy Squid http proxy 2.5.STABLE14 | http-open-proxy: Potentially OPEN proxy. |_Methods supported: GET HEAD CONNECTION Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.23 - 2.6.38 Uptime guess: 67.028 days (since Fri Jun 4 10:33:45 2021) Network Distance: 2 hops TCP Sequence Prediction: Difficulty=195 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE (using port 8080/tcp) HOP RTT ADDRESS 1 0.76 ms defcon.mshome.net (172.30.144.1) 2 5.45 ms 73.106.20.49 NSE: Script Post-scanning. Initiating NSE at 11:13 Completed NSE at 11:13, 0.00s elapsed Initiating NSE at 11:13 Completed NSE at 11:13, 0.00s elapsed Initiating NSE at 11:13 Completed NSE at 11:13, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 283.66 seconds Raw packets sent: 2143 (96.812KB) | Rcvd: 24 (1.180KB) _________________________________________________________________ _________________________________________________________________ > cat nmap_scan_report2.txt _________________________________________________________________ Starting Nmap 7.80 ( https://nmap.org ) at 2021-08-10 11:17 CDT NSE: Loaded 149 scripts for scanning. NSE: Script Pre-scanning. Initiating NSE at 11:17 Completed NSE at 11:17, 10.06s elapsed Initiating NSE at 11:17 Completed NSE at 11:17, 0.00s elapsed Initiating Parallel DNS resolution of 1 host. at 11:17 Completed Parallel DNS resolution of 1 host. at 11:18, 13.00s elapsed Initiating SYN Stealth Scan at 11:18 Scanning 73.106.20.49 [1000 ports] Discovered open port 8080/tcp on 73.106.20.49 Increasing send delay for 73.106.20.49 from 0 to 5 due to 11 out of 12 dropped probes since last increase. SYN Stealth Scan Timing: About 35.00% done; ETC: 11:19 (0:00:58 remaining) Increasing send delay for 73.106.20.49 from 5 to 10 due to 11 out of 12 dropped probes since last increase. SYN Stealth Scan Timing: About 64.00% done; ETC: 11:20 (0:00:51 remaining) SYN Stealth Scan Timing: About 77.80% done; ETC: 11:20 (0:00:35 remaining) Completed SYN Stealth Scan at 11:20, 160.98s elapsed (1000 total ports) Initiating Service scan at 11:20 Scanning 1 service on 73.106.20.49 Completed Service scan at 11:21, 10.34s elapsed (1 service on 1 host) Initiating OS detection (try #1) against 73.106.20.49 Initiating Traceroute at 11:21 Completed Traceroute at 11:21, 0.02s elapsed Initiating Parallel DNS resolution of 2 hosts. at 11:21 Completed Parallel DNS resolution of 2 hosts. at 11:21, 13.00s elapsed NSE: Script scanning 73.106.20.49. Initiating NSE at 11:21 Completed NSE at 11:26, 304.39s elapsed Initiating NSE at 11:26 Completed NSE at 11:26, 8.04s elapsed Nmap scan report for 73.106.20.49 Host is up (0.013s latency). Not shown: 999 filtered ports PORT STATE SERVICE VERSION 8080/tcp open http-proxy Squid http proxy 2.5.STABLE14 |_clamav-exec: ERROR: Script execution failed (use -d to debug) |_http-server-header: squid/2.5.STABLE14 |_http-vuln-cve2014-3704: ERROR: Script execution failed (use -d to debug) | vulners: | cpe:/a:squid-cache:squid:2.5.stable14: | CVE-2014-6270 6.8 https://vulners.com/cve/CVE-2014-6270 | CVE-2005-2917 5.0 https://vulners.com/cve/CVE-2005-2917 |_ CVE-2021-31807 4.0 https://vulners.com/cve/CVE-2021-31807 Warning: OSScan results may be unreliable because we could not find at least 1 open and 1 closed port Device type: general purpose Running: Linux 2.6.X OS CPE: cpe:/o:linux:linux_kernel:2.6 OS details: Linux 2.6.23 - 2.6.38 Uptime guess: 68.427 days (since Thu Jun 3 01:10:58 2021) Network Distance: 2 hops TCP Sequence Prediction: Difficulty=195 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE (using port 8080/tcp) HOP RTT ADDRESS 1 1.04 ms ... 2 4.17 ms 73.106.20.49 NSE: Script Post-scanning. Initiating NSE at 11:26 Completed NSE at 11:26, 0.00s elapsed Initiating NSE at 11:26 Completed NSE at 11:26, 0.00s elapsed Read data files from: /usr/bin/../share/nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 529.01 seconds Raw packets sent: 2170 (98.000KB) | Rcvd: 26 (1.268KB) _________________________________________________________________ ______________________________ > cat social_media_accounts.txt ______________________________ - Instagram Account #1: mj_love_12 - Instagram Account #2: mj_bad_bitch - Instagram Account #3: love_mj_m - Instagram Account #4: null - Snapchat Account #1: meghan_768c - Facebook Account #1: https://www.facebook.com/meghan.holcombe.3 - Facebook Account #2: null - Discord Account #1: null ______________________________ ______________________________ > cat relatives.txt ______________________________ - Candace Rogers - Charles Brackett - Eugene Wold - Heather Reid - Holly Alford - Lorengene Wold - Amanda Josey - Andrea Clark - Annie Allen - [and 1 more available] ______________________________ ______________________________ > cat associated_people.txt ______________________________ - Richard Thigpen - Jeremy Nagorka - Kaleb Halligan - Lynwood Rogers - Walter Reid - Harriet Boswell ______________________________