.---. / \ \.@-@./ -> (They're upset! You made a mistake colin!) /`\_/`\ // _ \\ | \ )|_ /`\_`> <_/ \ \__/'---'\__/ Reason for this dox -> Impersonating, cyberbullying, racism, sending porn, inappropiate content, doxxing, ip grabbing, leaking ip addresses by his website, death threatening Legal Name: Colin Krzemienowski Gmail: funyfox1@gmail.com Another Gmail: tabletcolina2007@gmail.com Main email for youtube channels: tabletcolina2007@gmail.com Discord Tag: Fune 360#3211 Nationality: Polish Currently Lives In: Sheffield (A City In England) IP ADDRESS: 84.69.205.14 Old IP ADDRESS: 84.69.202.93 ISP: Vodafone UK GirlFriend's Legal Name: Amelia His Old Girlfriend Pinterest Account: https://www.pinterest.com/mushiliebhaberinzwei/ A Video Of Amelia Eating A Raw Egg (Disgusting I Know): https://cdn.discordapp.com/attachments/1025792705445515385/1035250974488535090/www.mp4 His Youtube Channel: https://www.youtube.com/@itzultrascoutreal2510 Another Youtube Channel: https://www.youtube.com/channel/UCT4FyYBHHo3VW5vsQ7e3ZgQ His Website: bonzi.lol Website's IP Address: 185.181.8.178 The Backup server: backup.bonzi.lol The Leaked Source Code: https://www.mediafire.com/file/uo4hxz88nxtxka4/bonzi.lol.zip/file (A Scan On His Website) (Scanning bonzi.lol (185.181.8.178) [1000 ports] Discovered open port 3389/tcp on 185.181.8.178 Discovered open port 80/tcp on 185.181.8.178 Discovered open port 443/tcp on 185.181.8.178 Discovered open port 21/tcp on 185.181.8.178 Discovered open port 22/tcp on 185.181.8.178 Completed SYN Stealth Scan at 15:18, 2.16s elapsed (1000 total ports) Initiating Service scan at 15:19 Scanning 5 services on bonzi.lol (185.181.8.178) Completed Service scan at 15:19, 12.39s elapsed (5 services on 1 host) Initiating OS detection (try #1) against bonzi.lol (185.181.8.178) Retrying OS detection (try #2) against bonzi.lol (185.181.8.178) Initiating Traceroute at 15:19 Completed Traceroute at 15:19, 3.01s elapsed Initiating Parallel DNS resolution of 12 hosts. at 15:19 Completed Parallel DNS resolution of 12 hosts. at 15:19, 0.14s elapsed NSE: Script scanning 185.181.8.178. Initiating NSE at 15:19 Completed NSE at 15:19, 7.42s elapsed Initiating NSE at 15:19 Completed NSE at 15:19, 3.94s elapsed Initiating NSE at 15:19 Completed NSE at 15:19, 0.00s elapsed Nmap scan report for bonzi.lol (185.181.8.178) Host is up (0.088s latency). Not shown: 990 closed tcp ports (reset) PORT STATE SERVICE VERSION 21/tcp open ftp vsftpd 2.0.8 or later 22/tcp open ssh OpenSSH 8.9p1 Ubuntu 3ubuntu0.1 (Ubuntu Linux; protocol 2.0) | ssh-hostkey: | 256 d4:a9:80:77:26:cb:21:b9:19:9c:6d:01:79:54:4f:ef (ECDSA) |_ 256 39:c6:61:4f:f5:97:29:8b:41:f5:da:7f:2a:52:dc:f2 (ED25519) 25/tcp filtered smtp 80/tcp open http | fingerprint-strings: | DNSStatusRequestTCP, DNSVersionBindReqTCP, FourOhFourRequest, GenericLines, GetRequest, HTTPOptions, Help, Kerberos, LDAPBindReq, LDAPSearchReq, LPDString, RPCCheck, RTSPRequest, SMBProgNeg, SSLSessionReq, TLSSessionReq, TerminalServerCookie, X11Probe: | HTTP/1.1 301 Moved permanently |_ Location: https://bonzi.lol 135/tcp filtered msrpc 139/tcp filtered netbios-ssn 443/tcp open ssl/http Node.js Express framework |_http-title: BonziWORLD | http-methods: |_ Supported Methods: GET HEAD POST OPTIONS |_ssl-date: TLS randomness does not represent time | tls-alpn: |_ http/1.1 | ssl-cert: Subject: commonName=bonzi.lol | Subject Alternative Name: DNS:bonzi.lol, DNS:www.bonzi.lol | Issuer: commonName=ZeroSSL RSA Domain Secure Site CA/organizationName=ZeroSSL/countryName=AT | Public Key type: rsa | Public Key bits: 2048 | Signature Algorithm: sha384WithRSAEncryption | Not valid before: 2023-02-04T00:00:00 | Not valid after: 2023-05-05T23:59:59 | MD5: fd5c 51e4 23ad 87c1 ca72 a365 eb53 814e |_SHA-1: 3c4e b8f4 72c7 504c 2797 7e0b bb21 169c 2f92 d81e 445/tcp filtered microsoft-ds 2525/tcp filtered ms-v-worlds 3389/tcp open ms-wbt-server xrdp 1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service : SF-Port80-TCP:V=7.92%I=7%D=4/2%Time=64299CEA%P=x86_64-pc-linux-gnu%r(GetRe SF:quest,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https: SF://bonzi\.lol")%r(HTTPOptions,3A,"HTTP/1\.1\x20301\x20Moved\x20permanent SF:ly\nLocation:\x20https://bonzi\.lol")%r(RTSPRequest,3A,"HTTP/1\.1\x2030 SF:1\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol")%r(X11Probe SF:,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bon SF:zi\.lol")%r(FourOhFourRequest,3A,"HTTP/1\.1\x20301\x20Moved\x20permanen SF:tly\nLocation:\x20https://bonzi\.lol")%r(GenericLines,3A,"HTTP/1\.1\x20 SF:301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol")%r(RPCChe SF:ck,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://b SF:onzi\.lol")%r(DNSVersionBindReqTCP,3A,"HTTP/1\.1\x20301\x20Moved\x20per SF:manently\nLocation:\x20https://bonzi\.lol")%r(DNSStatusRequestTCP,3A,"H SF:TTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lo SF:l")%r(Help,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20h SF:ttps://bonzi\.lol")%r(SSLSessionReq,3A,"HTTP/1\.1\x20301\x20Moved\x20pe SF:rmanently\nLocation:\x20https://bonzi\.lol")%r(TerminalServerCookie,3A, SF:"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\. SF:lol")%r(TLSSessionReq,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLoc SF:ation:\x20https://bonzi\.lol")%r(Kerberos,3A,"HTTP/1\.1\x20301\x20Moved SF:\x20permanently\nLocation:\x20https://bonzi\.lol")%r(SMBProgNeg,3A,"HTT SF:P/1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol" SF:)%r(LPDString,3A,"HTTP/1\.1\x20301\x20Moved\x20permanently\nLocation:\x SF:20https://bonzi\.lol")%r(LDAPSearchReq,3A,"HTTP/1\.1\x20301\x20Moved\x2 SF:0permanently\nLocation:\x20https://bonzi\.lol")%r(LDAPBindReq,3A,"HTTP/ SF:1\.1\x20301\x20Moved\x20permanently\nLocation:\x20https://bonzi\.lol"); Aggressive OS guesses: Linux 5.0 (95%), Linux 5.0 - 5.4 (95%), Linux 5.4 (94%), HP P2000 G3 NAS device (93%), Linux 4.15 - 5.6 (93%), Linux 5.3 - 5.4 (92%), Linux 2.6.32 (92%), Linux 5.0 - 5.3 (92%), Linux 5.1 (92%), Ubiquiti AirOS 5.5.9 (92%) No exact OS matches for host (test conditions non-ideal). Uptime guess: 35.835 days (since Sat Feb 25 19:16:36 2023) Network Distance: 14 hops TCP Sequence Prediction: Difficulty=264 (Good luck!) IP ID Sequence Generation: All zeros Service Info: Host: funefox.com; OS: Linux; CPE: cpe:/o:linux:linux_kernel TRACEROUTE (using port 80/tcp) HOP RTT ADDRESS 1 106.20 ms 192.168.1.1 2 15.78 ms 100.127.68.1 3 13.15 ms 10.29.41.97 4 10.77 ms 10.37.93.34 5 13.84 ms 10.29.41.94 6 ... 7 8 60.27 ms be2780.ccr42.par01.atlas.cogentco.com (154.54.72.225) 9 75.01 ms be12266.ccr42.ams03.atlas.cogentco.com (154.54.56.173) 10 66.30 ms be2154.rcr22.ams06.atlas.cogentco.com (130.117.50.206) 11 75.00 ms 149.14.93.146 12 64.46 ms be-111.cr02.ams-01.nl.leaseweb.net (81.17.32.71) 13 65.27 ms po-1002.ce01.ams-01.nl.leaseweb.net (81.17.33.123) 14 64.57 ms 185.181.8.178 NSE: Script Post-scanning. Initiating NSE at 15:19 Completed NSE at 15:19, 0.00s elapsed Initiating NSE at 15:19 Completed NSE at 15:19, 0.00s elapsed Initiating NSE at 15:19 Completed NSE at 15:19, 0.00s elapsed) --- (Face pictures of colin) 1- https://cdn.discordapp.com/attachments/1082762019893170338/1092129594909401138/IMG_20230301_221347713.jpg 2-https://cdn.discordapp.com/attachments/1082762019893170338/1092086887625281628/SPOILER_image0-2-2.jpg 3- https://cdn.discordapp.com/attachments/1082762019893170338/1092776092395393105/IMG_20220423_175504_493.jpg (Colin's voice) (https://media.discordapp.net/attachments/1025792705445515385/1059909094049329223/bandicam_2023-01-02_16-59-29-726.mp4) (Death threating) (https://media.discordapp.net/attachments/1092075514358923316/1092576022408466494/Screenshot_20230404_002600_Discord.jpg?width=1025&height=282) (Leaking IP addresses by his website) (https://media.discordapp.net/attachments/1082762019893170338/1092777282201993216/IMG_20230328_230745.jpg?width=301&height=451) (Racism) 1-https://cdn.discordapp.com/attachments/1082762019893170338/1092777687619215400/image.png 2-https://cdn.discordapp.com/attachments/1082762019893170338/1092777748780552282/image.png 3-https://cdn.discordapp.com/attachments/1082762019893170338/1092777825293049936/image.png (Impersonating) so basically he made a self-bot (self-botting is against Terms of Service in discord) and named it "kern3l" kern3l is my friend and colin was impersonating him and making kern3l's reputation bad. Proof: https://media.discordapp.net/attachments/1082762019893170338/1092779432588095589/image.png The real kern3l: https://cdn.discordapp.com/attachments/1082762019893170338/1092780761305862214/image.png Basically this bot keep sending random shit like this (https://cdn.discordapp.com/attachments/1082762019893170338/1092781102139187251/image.png) (him calling his members (community) slaves and shit like this) (https://cdn.discordapp.com/attachments/1082762019893170338/1092785472113221652/image.png) he also said i can't fuck his website? here's what happened When i sent 32 packets and 6 pings My POV: https://cdn.discordapp.com/attachments/1082762019893170338/1093512222581461032/image.png My friend's POV (kern3l): https://cdn.discordapp.com/attachments/1082762019893170338/1093512376130732113/image.png