GoFuckYourself.com - Adult Webmaster Forum

GoFuckYourself.com - Adult Webmaster Forum (https://gfy.com/index.php)
-   Fucking Around & Business Discussion (https://gfy.com/forumdisplay.php?f=26)
-   -   Wupfile - does anyone know what hosting provider is hosting them? (https://gfy.com/showthread.php?t=1345612)

DirtyHarold 06-06-2021 01:16 PM

Wupfile - does anyone know what hosting provider is hosting them?
 
Lot of stolen content on their site so I want to try contacting their hosting provider but who are they?

baddog 06-06-2021 01:21 PM

Check their IP

sarettah 06-06-2021 01:21 PM

Quote:

Originally Posted by DirtyHarold (Post 22869953)
Lot of stolen content on their site so I want to try contacting their hosting provider but who are they?

Is it your content?

.

sarettah 06-06-2021 01:26 PM

Quote:

Originally Posted by baddog (Post 22869954)
Check their IP

They are behind cloudflare it appears.

.

DirtyHarold 06-06-2021 01:29 PM

Quote:

Originally Posted by sarettah (Post 22869955)
Is it your content?

.

Yes and also LegalPorn, Evil Angel etc

DirtyHarold 06-06-2021 01:30 PM

Quote:

Originally Posted by sarettah (Post 22869958)
They are behind cloudflare it appears.

.

Yes that's the problem.... how do I figure out who is hosting them?

sarettah 06-06-2021 01:32 PM

Quote:

Originally Posted by DirtyHarold (Post 22869961)
Yes and also LegalPorn, Evil Angel etc

Well the only stuff you can report via dmca is your own content. You can tell legalporn and evil angel but they have to take care of it themselves.

.

DirtyHarold 06-06-2021 01:39 PM

Quote:

Originally Posted by sarettah (Post 22869964)
Well the only stuff you can report via dmca is your own content. You can tell legalporn and evil angel but they have to take care of it themselves.

.

I know.... I've already messaged them.

sarettah 06-06-2021 01:48 PM

Quote:

Originally Posted by DirtyHarold (Post 22869966)
I know.... I've already messaged them.

cool, I have nothing further to offer.

Hope you find out what you need.

.

baodb 06-06-2021 04:17 PM

You can track if they issued any SSL certs under the domain and with a bit of luck they did it from their actual origin server.

Also look at where their email is hosted, some are smart enough to leave it with the place where the rest is hosted as well.

Last check the DNS history, they might have switched to cloudflare only recently.

RycEric 06-06-2021 05:14 PM

Data for wupfile.com

isla.ns.cloudflare.com
josh.ns.cloudflare.com nameserver search: isla josh

A direct-connect IP address was found: wupfile.com 46.166.151.123 NETHERLANDS

A page was fetched from this IP address, using curl with the -H Host: option, and that page has this title: Apache HTTP Server Test Page powered by CentOS

Previous lookups for this domain:

2021-06-06: wupfile.com 46.166.187.80 NETHERLANDS
2021-05-26: wupfile.com 46.166.151.123 NETHERLANDS
2021-05-25: wupfile.com 46.166.187.25 NETHERLANDS
2021-05-14: wupfile.com 46.166.187.8 NETHERLANDS
2020-12-27: wupfile.com 46.166.142.122 NETHERLANDS
2019-07-05: wupfile.com 185.107.80.212 NETHERLANDS

The direct-connect IP addresses listed above may point to a server that hosts more than one domain. Click below to see other domains from our database with the same direct-connect IP. This information might provide additional clues for experienced researchers.

46.166.151.123 46.166.187.80 46.166.187.25 46.166.187.8 46.166.142.122 185.107.80.212

Could be nforce: https://whois.domaintools.com/46.166.187.80
Use this: https://www.cloudflare.com/abuse/form Choose infringement, wait for the real host from CloudFlare. If it is Nforce, Nforce will auto-respond to you with a confirmation.

sarettah 06-06-2021 10:10 PM

Quote:

Originally Posted by RycEric (Post 22870070)
Data for wupfile.com

isla.ns.cloudflare.com
josh.ns.cloudflare.com nameserver search: isla josh

A direct-connect IP address was found: wupfile.com 46.166.151.123 NETHERLANDS

A page was fetched from this IP address, using curl with the -H Host: option, and that page has this title: Apache HTTP Server Test Page powered by CentOS

Previous lookups for this domain:

2021-06-06: wupfile.com 46.166.187.80 NETHERLANDS
2021-05-26: wupfile.com 46.166.151.123 NETHERLANDS
2021-05-25: wupfile.com 46.166.187.25 NETHERLANDS
2021-05-14: wupfile.com 46.166.187.8 NETHERLANDS
2020-12-27: wupfile.com 46.166.142.122 NETHERLANDS
2019-07-05: wupfile.com 185.107.80.212 NETHERLANDS

The direct-connect IP addresses listed above may point to a server that hosts more than one domain. Click below to see other domains from our database with the same direct-connect IP. This information might provide additional clues for experienced researchers.

46.166.151.123 46.166.187.80 46.166.187.25 46.166.187.8 46.166.142.122 185.107.80.212

Could be nforce: https://whois.domaintools.com/46.166.187.80
Use this: https://www.cloudflare.com/abuse/form Choose infringement, wait for the real host from CloudFlare. If it is Nforce, Nforce will auto-respond to you with a confirmation.


And there you have it :thumbsup

.

k0nr4d 06-06-2021 11:36 PM

Try downloading a file and check the DNS of the subdomain hosting the actual file. Cloudflare doesn't host video files so the IP won't be hidden.

DukeSkywalker 06-06-2021 11:47 PM

Quote:

Originally Posted by RycEric (Post 22870070)
Data for wupfile.com

isla.ns.cloudflare.com
josh.ns.cloudflare.com nameserver search: isla josh

A direct-connect IP address was found: wupfile.com 46.166.151.123 NETHERLANDS

A page was fetched from this IP address, using curl with the -H Host: option, and that page has this title: Apache HTTP Server Test Page powered by CentOS

Previous lookups for this domain:

2021-06-06: wupfile.com 46.166.187.80 NETHERLANDS
2021-05-26: wupfile.com 46.166.151.123 NETHERLANDS
2021-05-25: wupfile.com 46.166.187.25 NETHERLANDS
2021-05-14: wupfile.com 46.166.187.8 NETHERLANDS
2020-12-27: wupfile.com 46.166.142.122 NETHERLANDS
2019-07-05: wupfile.com 185.107.80.212 NETHERLANDS

The direct-connect IP addresses listed above may point to a server that hosts more than one domain. Click below to see other domains from our database with the same direct-connect IP. This information might provide additional clues for experienced researchers.

46.166.151.123 46.166.187.80 46.166.187.25 46.166.187.8 46.166.142.122 185.107.80.212

Could be nforce: https://whois.domaintools.com/46.166.187.80
Use this: https://www.cloudflare.com/abuse/form Choose infringement, wait for the real host from CloudFlare. If it is Nforce, Nforce will auto-respond to you with a confirmation.

You da man bro


All times are GMT -7. The time now is 01:47 PM.

Powered by vBulletin® Version 3.8.8
Copyright ©2000 - 2024, vBulletin Solutions, Inc.
©2000-, AI Media Network Inc