Un pederasta que se cree hacker y que se hace llamar Ian 

Nombre: Ian Gabriel Rojas Sequeira
Ubicación estimada: San José (cantón), Costa Rica
		    Es de Heredia (cantón), Costa Rica

IP: 190.113.110.30
Puertos abiertos:  445, 53, 139, 443, 80, 6969

Teléfono:  +506 8612 8601
Email: iansolano417@gmail.com

--------------
Redes sociales
--------------
LinkedIn:

Link: https://www.linkedin.com/in/ian-rojassq/


--------------
Pinterest (posiblemente)
--------------

Link: https://www.pinterest.es/gabsequeira2k4/
User: gabsequeira2k4

--------------
HelpMeCovid
--------------

Link: https://www.helpmecovid.com/cr/103672_ruta506-cartago
User: (nombre personal)


--------------
Github
--------------

Link de Github: https://github.com/ianrojas19
User: ianrojas19

Página web (usada para phishing de su trabajo):
https://ianrojas19.github.io





---------------
Trabajo
---------------

Link de LinkedIn: https://www.linkedin.com/in/ian-rojassq/
Trabajo: Wordpress Developer 
Tipo de contrato: Contrato temporal
		  Heredia, Costa Rica · En remoto



Scan en NMmap del pederasta conocido como Ian Gabriel Rojas Sequeira

SF:on\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x12\x11nstelecab
SF:lecr\.com\xc0\x0c\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c");
Device type: general purpose
Running: Linux 2.6.X|3.X
OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3
OS details: Linux 2.6.32 - 3.13
Uptime guess: 14.567 days (since Mon May  6 12:05:35 2024)
Network Distance: 19 hops
TCP Sequence Prediction: Difficulty=262 (Good luck!)
IP ID Sequence Generation: All zeros

TRACEROUTE (using port 554/tcp)
HOP RTT       ADDRESS
1   5.00 ms   #############
2   ...
3   8.00 ms   ############
4   20.00 ms  ############
5   18.00 ms  ############
6   ... 7
8   88.00 ms  port-channel1.core2.orf2.he.net (184.104.197.94)
9   ...
10  109.00 ms port-channel1.core2.jax1.he.net (184.104.198.70)
11  113.00 ms asurnet-inc.e0-33.core2.jax1.he.net (216.66.37.246)
12  110.00 ms 69.79.100.24
13  169.00 ms 69.79.100.147
14  153.00 ms xe-1-0-0.0-san-jose-costa-rica.csr-sjopm-mx03.cwc.com (63.245.106.244)
15  169.00 ms 190.242.134.94
16  ... 18
19  185.00 ms rev21.97.nstelecablecr.com (190.113.97.21)

NSE: Script Post-scanning.
Initiating NSE at 01:41
Completed NSE at 01:41, 0.00s elapsed
Initiating NSE at 01:41
Completed NSE at 01:41, 0.00s elapsed
Initiating NSE at 01:41
Completed NSE at 01:41, 0.00s elapsed
Read data files from: C:\Program Files (x86)\Nmap
OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 38.00 seconds
           Raw packets sent: 1079 (48.334KB) | Rcvd: 1065 (44.415KB)