Un pederasta que se cree hacker y que se hace llamar Ian Nombre: Ian Gabriel Rojas Sequeira Ubicación estimada: San José (cantón), Costa Rica Es de Heredia (cantón), Costa Rica IP: 190.113.110.30 Puertos abiertos: 445, 53, 139, 443, 80, 6969 Teléfono: +506 8612 8601 Email: iansolano417@gmail.com -------------- Redes sociales -------------- LinkedIn: Link: https://www.linkedin.com/in/ian-rojassq/ -------------- Pinterest (posiblemente) -------------- Link: https://www.pinterest.es/gabsequeira2k4/ User: gabsequeira2k4 -------------- HelpMeCovid -------------- Link: https://www.helpmecovid.com/cr/103672_ruta506-cartago User: (nombre personal) -------------- Github -------------- Link de Github: https://github.com/ianrojas19 User: ianrojas19 Página web (usada para phishing de su trabajo): https://ianrojas19.github.io --------------- Trabajo --------------- Link de LinkedIn: https://www.linkedin.com/in/ian-rojassq/ Trabajo: Wordpress Developer Tipo de contrato: Contrato temporal Heredia, Costa Rica · En remoto Scan en NMmap del pederasta conocido como Ian Gabriel Rojas Sequeira SF:on\x04bind\0\0\x10\0\x03\xc0\x0c\0\x10\0\x03\0\0\0\0\0\x12\x11nstelecab SF:lecr\.com\xc0\x0c\0\x02\0\x03\0\0\0\0\0\x02\xc0\x0c"); Device type: general purpose Running: Linux 2.6.X|3.X OS CPE: cpe:/o:linux:linux_kernel:2.6 cpe:/o:linux:linux_kernel:3 OS details: Linux 2.6.32 - 3.13 Uptime guess: 14.567 days (since Mon May 6 12:05:35 2024) Network Distance: 19 hops TCP Sequence Prediction: Difficulty=262 (Good luck!) IP ID Sequence Generation: All zeros TRACEROUTE (using port 554/tcp) HOP RTT ADDRESS 1 5.00 ms ############# 2 ... 3 8.00 ms ############ 4 20.00 ms ############ 5 18.00 ms ############ 6 ... 7 8 88.00 ms port-channel1.core2.orf2.he.net (184.104.197.94) 9 ... 10 109.00 ms port-channel1.core2.jax1.he.net (184.104.198.70) 11 113.00 ms asurnet-inc.e0-33.core2.jax1.he.net (216.66.37.246) 12 110.00 ms 69.79.100.24 13 169.00 ms 69.79.100.147 14 153.00 ms xe-1-0-0.0-san-jose-costa-rica.csr-sjopm-mx03.cwc.com (63.245.106.244) 15 169.00 ms 190.242.134.94 16 ... 18 19 185.00 ms rev21.97.nstelecablecr.com (190.113.97.21) NSE: Script Post-scanning. Initiating NSE at 01:41 Completed NSE at 01:41, 0.00s elapsed Initiating NSE at 01:41 Completed NSE at 01:41, 0.00s elapsed Initiating NSE at 01:41 Completed NSE at 01:41, 0.00s elapsed Read data files from: C:\Program Files (x86)\Nmap OS and Service detection performed. Please report any incorrect results at https://nmap.org/submit/ . Nmap done: 1 IP address (1 host up) scanned in 38.00 seconds Raw packets sent: 1079 (48.334KB) | Rcvd: 1065 (44.415KB)