.---.
      /     \
      \.@-@./ ->  (They're upset! You made a mistake colin!)
      /`\_/`\
     //  _  \\
    | \     )|_            
   /`\_`>  <_/ \
   \__/'---'\__/

Reason for this dox -> Impersonating, cyberbullying, racism, sending porn, inappropiate content, doxxing, ip grabbing, leaking ip addresses by his website, death threatening


Legal Name: Colin Krzemienowski
Gmail: funyfox1@gmail.com
Another Gmail: tabletcolina2007@gmail.com
Main email for youtube channels: tabletcolina2007@gmail.com
Discord Tag: Fune 360#3211
Nationality: Polish
Currently Lives In: Sheffield (A City In England)
IP ADDRESS: 84.69.205.14
Old IP ADDRESS: 84.69.202.93
ISP: Vodafone UK
GirlFriend's Legal Name: Amelia
His Old Girlfriend Pinterest Account: https://www.pinterest.com/mushiliebhaberinzwei/
A Video Of Amelia Eating A Raw Egg (Disgusting I Know): https://cdn.discordapp.com/attachments/1025792705445515385/1035250974488535090/www.mp4
His Youtube Channel: https://www.youtube.com/@itzultrascoutreal2510
Another Youtube Channel: https://www.youtube.com/channel/UCT4FyYBHHo3VW5vsQ7e3ZgQ
His Website: bonzi.lol
Website's IP Address: 185.181.8.178
The Backup server: backup.bonzi.lol
The Leaked Source Code: https://www.mediafire.com/file/uo4hxz88nxtxka4/bonzi.lol.zip/file
(A Scan On His Website)
(Scanning bonzi.lol (185.181.8.178) [1000 ports]
Discovered open port 3389/tcp on 185.181.8.178
Discovered open port 80/tcp on 185.181.8.178
Discovered open port 443/tcp on 185.181.8.178
Discovered open port 21/tcp on 185.181.8.178
Discovered open port 22/tcp on 185.181.8.178
Completed SYN Stealth Scan at 15:18, 2.16s elapsed (1000 total ports)
Initiating Service scan at 15:19
Scanning 5 services on bonzi.lol (185.181.8.178)
Completed Service scan at 15:19, 12.39s elapsed (5 services on 1 host)
Initiating OS detection (try #1) against bonzi.lol (185.181.8.178)                                                                                                     
Retrying OS detection (try #2) against bonzi.lol (185.181.8.178)                                                                                                       
Initiating Traceroute at 15:19                                                                                                                                         
Completed Traceroute at 15:19, 3.01s elapsed                                                                                                                           
Initiating Parallel DNS resolution of 12 hosts. at 15:19                                                                                                               
Completed Parallel DNS resolution of 12 hosts. at 15:19, 0.14s elapsed                                                                                                 
NSE: Script scanning 185.181.8.178.                                                                                                                                    
Initiating NSE at 15:19                                                                                                                                                
Completed NSE at 15:19, 7.42s elapsed                                                                                                                                  
Initiating NSE at 15:19                                                                                                                                                
Completed NSE at 15:19, 3.94s elapsed                                                                                                                                  
Initiating NSE at 15:19                                                                                                                                                
Completed NSE at 15:19, 0.00s elapsed                                                                                                                                  
Nmap scan report for bonzi.lol (185.181.8.178)                                                                                                                         
Host is up (0.088s latency).
Not shown: 990 closed tcp ports (reset)
PORT     STATE    SERVICE       VERSION
21/tcp   open     ftp           vsftpd 2.0.8 or later
22/tcp   open     ssh           OpenSSH 8.9p1 Ubuntu 3ubuntu0.1 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   256 d4:a9:80:77:26:cb:21:b9:19:9c:6d:01:79:54:4f:ef (ECDSA)
|_  256 39:c6:61:4f:f5:97:29:8b:41:f5:da:7f:2a:52:dc:f2 (ED25519)
25/tcp   filtered smtp
80/tcp   open     http
| fingerprint-strings: 
|   DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: 
|     HTTP/1.1 301 Moved permanently
|_    Location: https://bonzi.lol
135/tcp  filtered msrpc
139/tcp  filtered netbios-ssn
443/tcp  open     ssl/http      Node.js Express framework
|_http-title: BonziWORLD
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_ssl-date: TLS randomness does not represent time
| tls-alpn: 
|_  http/1.1
| ssl-cert: Subject: commonName=bonzi.lol
| Subject Alternative Name: DNS:bonzi.lol, DNS:www.bonzi.lol
| Issuer: commonName=ZeroSSL RSA Domain Secure Site CA/organizationName=ZeroSSL/countryName=AT
| Public Key type: rsa
| Public Key bits: 2048
| Signature Algorithm: sha384WithRSAEncryption
| Not valid before: 2023-02-04T00:00:00
| Not valid after:  2023-05-05T23:59:59
| MD5:   fd5c 51e4 23ad 87c1 ca72 a365 eb53 814e
|_SHA-1: 3c4e b8f4 72c7 504c 2797 7e0b bb21 169c 2f92 d81e
445/tcp  filtered microsoft-ds
2525/tcp filtered ms-v-worlds
3389/tcp open     ms-wbt-server xrdp
1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
SF-Port80-TCP:V=7.92%I=7%D=4/2%Time=64299CEA%P=x86_64-pc-linux-gnu%r(GetRe
SF:quest,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https:
SF://bonzi\.lol")%r(HTTPOptions,3A,"HTTP/1\.1\x20301\x20Moved\x20permanent
SF:ly\nLocation:\x20https://bonzi\.lol")%r(RTSPRequest,3A,"HTTP/1\.1\x2030
SF:1\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol")%r(X11Probe
SF:,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bon
SF:zi\.lol")%r(FourOhFourRequest,3A,"HTTP/1\.1\x20301\x20Moved\x20permanen
SF:tly\nLocation:\x20https://bonzi\.lol")%r(GenericLines,3A,"HTTP/1\.1\x20
SF:301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol")%r(RPCChe
SF:ck,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://b
SF:onzi\.lol")%r(DNSVersionBindReqTCP,3A,"HTTP/1\.1\x20301\x20Moved\x20per
SF:manently\nLocation:\x20https://bonzi\.lol")%r(DNSStatusRequestTCP,3A,"H
SF:TTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lo
SF:l")%r(Help,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20h
SF:ttps://bonzi\.lol")%r(SSLSessionReq,3A,"HTTP/1\.1\x20301\x20Moved\x20pe
SF:rmanently\nLocation:\x20https://bonzi\.lol")%r(TerminalServerCookie,3A,
SF:"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.
SF:lol")%r(TLSSessionReq,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLoc
SF:ation:\x20https://bonzi\.lol")%r(Kerberos,3A,"HTTP/1\.1\x20301\x20Moved
SF:\x20permanently\nLocation:\x20https://bonzi\.lol")%r(SMBProgNeg,3A,"HTT
SF:P/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol"
SF:)%r(LPDString,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x
SF:20https://bonzi\.lol")%r(LDAPSearchReq,3A,"HTTP/1\.1\x20301\x20Moved\x2
SF:0permanently\nLocation:\x20https://bonzi\.lol")%r(LDAPBindReq,3A,"HTTP/
SF:1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol");
Aggressive OS guesses: Linux 5.0 (95%), Linux 5.0 - 5.4 (95%), Linux 5.4 (94%), HP P2000 G3 NAS device (93%), Linux 4.15 - 5.6 (93%), Linux 5.3 - 5.4 (92%), Linux 2.6.32 (92%), Linux 5.0 - 5.3 (92%), Linux 5.1 (92%), Ubiquiti AirOS 5.5.9 (92%)
No exact OS matches for host (test conditions non-ideal).
Uptime guess: 35.835 days (since Sat Feb 25 19:16:36 2023)
Network Distance: 14 hops
TCP Sequence Prediction: Difficulty=264 (Good luck!)
IP ID Sequence Generation: All zeros
Service Info: Host: funefox.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel

TRACEROUTE (using port 80/tcp)
HOP RTT       ADDRESS
1   106.20 ms 192.168.1.1
2   15.78 ms  100.127.68.1
3   13.15 ms  10.29.41.97
4   10.77 ms  10.37.93.34
5   13.84 ms  10.29.41.94
6   ... 7
8   60.27 ms  be2780.ccr42.par01.atlas.cogentco.com (154.54.72.225)
9   75.01 ms  be12266.ccr42.ams03.atlas.cogentco.com (154.54.56.173)
10  66.30 ms  be2154.rcr22.ams06.atlas.cogentco.com (130.117.50.206)
11  75.00 ms  149.14.93.146
12  64.46 ms  be-111.cr02.ams-01.nl.leaseweb.net (81.17.32.71)
13  65.27 ms  po-1002.ce01.ams-01.nl.leaseweb.net (81.17.33.123)
14  64.57 ms  185.181.8.178

NSE: Script Post-scanning.
Initiating NSE at 15:19
Completed NSE at 15:19, 0.00s elapsed
Initiating NSE at 15:19
Completed NSE at 15:19, 0.00s elapsed
Initiating NSE at 15:19
Completed NSE at 15:19, 0.00s elapsed)

 


---
(Face pictures of colin)
1- https://cdn.discordapp.com/attachments/1082762019893170338/1092129594909401138/IMG_20230301_221347713.jpg
2-https://cdn.discordapp.com/attachments/1082762019893170338/1092086887625281628/SPOILER_image0-2-2.jpg
3- https://cdn.discordapp.com/attachments/1082762019893170338/1092776092395393105/IMG_20220423_175504_493.jpg
(Colin's voice)
(https://media.discordapp.net/attachments/1025792705445515385/1059909094049329223/bandicam_2023-01-02_16-59-29-726.mp4)
(Death threating)
(https://media.discordapp.net/attachments/1092075514358923316/1092576022408466494/Screenshot_20230404_002600_Discord.jpg?width=1025&height=282)
(Leaking IP addresses by his website)
(https://media.discordapp.net/attachments/1082762019893170338/1092777282201993216/IMG_20230328_230745.jpg?width=301&height=451)
(Racism)
1-https://cdn.discordapp.com/attachments/1082762019893170338/1092777687619215400/image.png
2-https://cdn.discordapp.com/attachments/1082762019893170338/1092777748780552282/image.png
3-https://cdn.discordapp.com/attachments/1082762019893170338/1092777825293049936/image.png
(Impersonating)
so basically he made a self-bot (self-botting is against Terms of Service in discord) and named it "kern3l"
kern3l is my friend and colin was impersonating him and making kern3l's reputation bad.
Proof: https://media.discordapp.net/attachments/1082762019893170338/1092779432588095589/image.png
The real kern3l: https://cdn.discordapp.com/attachments/1082762019893170338/1092780761305862214/image.png
Basically this bot keep sending random shit like this
(https://cdn.discordapp.com/attachments/1082762019893170338/1092781102139187251/image.png)
(him calling his members (community) slaves and shit like this)
(https://cdn.discordapp.com/attachments/1082762019893170338/1092785472113221652/image.png)
he also said i can't fuck his website?
here's what happened When i sent 32 packets and 6 pings 
My POV: https://cdn.discordapp.com/attachments/1082762019893170338/1093512222581461032/image.png
My friend's POV (kern3l): https://cdn.discordapp.com/attachments/1082762019893170338/1093512376130732113/image.png