AnonTalk was a pedophile hangout created and maintained by Kimmo Alm. He is also responsible for spamming /b/ and generally spreading his pedofaggotry all over the place. Apparently Kimmo Alm has quit the internet forever. Nothing of value was lost.
Where to report:
- Internet Watch Foundation
- Dyżurnet - Polish users can send CP complaints here
- email@example.com - Swedish police
- firstname.lastname@example.org - Swedish police
- email@example.com - Swedish police
- For Norwegian users
Table of Contents
The myriad *chan sites has a history of being free and open, not being full of moralfags and all that. A person was fed up with some of the parts of the culture that he disagreed with (*chan memes, etc.) That person, who calls himself 'Sysop' (also known as Anonymous 47ae211000a6a8.34833955) was fed up with some of the bans committed by some of the *chan sites, which he disagreed with and considered 'wrong'. He wanted to make his own anonymous textboard, that would be relatively free of chan memes and references and discuss things in more 'formal' ways. He originally was relatively slow on blocking words, and was lax in his administration. Unfortunately, due to various reasons he went fucking NAZI (over time) and banned anyone using a chan meme or reference, nimped random innocents, and began spamming several chan sites with bots advertising anontalk. Many people wondered, "Was this guy sodomized by moot as a child or something?" There have been several incidents and skirmishes between AT and *chan due to those issues, spamming on both sides. During the Chanapocalypse, anontalk was hit decently hard by 4chan's /b/ but they also inflicted losses on the /b/ raiders. The bots continued to spam *chan, though a recent addition of a Captcha has defeated most of the spam. Sysop continues to rule like a tyrant and does not relinquish control (or lessen it). Therefore, we must attack his site to prevent this threat from growing further. A raid will be commenced, lead by 4chan's /b/, as well as any /i/nsurgents who also participate in this battle.
Regarding anontalk. AnonTalk and kimmoa.se are hosted on the same computer on a high speed home connection (as opposed to professional hosting or leased servers). KimmoA is in fact a known Swedish e-mail spammer and his real name is Kimmo Alm. He resides in Stockholm.
- Update* On Dec. 13, 2008, Epic win was achieved by the collapse of anontalk.com. Have some Cake.
They are currently up again. Perhaps it's time for an 'aftershock'?
Looks like they're down again...
Nope they're up again.
Anontalk goes up and down more than a Chinese hooker.
Around March 2010, Kimmo lost his domain. He has a .se address now. Anontalk.com in itself is down, and inTrust domains is not available to comment at the moment.
In your report, explain to them that CP=child porn. Otherwise, they will not understand, and thus see only innocuous content. It has also come to my attention that AT has IP-based filters that filter out government IP addresses, along with IPs that are associated with AntiCP agencies and ISPs. That will either prevent access to AT from those addresses, or present a different site (with no CP) to those agencies. Attach a screenshot, or state that such measures are being taken, along with your report.
* Norway: https://tips.kripos.no/cmssite.asp?c=1&s=6&menu=2 * Sweden: http://www.ecpathotline.se/ also firstname.lastname@example.org * Denmark: https://www.politi.dk/da/hjaelppolitiet/itkriminalitet/ * UK: http://www.iwf.org.uk/ also https://secure.crimestoppers-uk.org/ams.form.anonymous.asp also https://www.ceop.gov.uk/ceop_report_form.aspx * Poland: http://dyzurnet.pl/ * Slovenia: https://www.spletno-oko.si/prijava/ * Latvia: http://netsafe.lv/pub/report.php?lang=lat * Greece: http://www.safeline.gr/ * Australia: http://www.acma.gov.au/WEB/STANDARD..PC/pc=PC_90103 * Italy: http://www.stop-it.org/ and also http://www.hot114.it/ * Canada: https://www.cybertip.ca/app/en/report * France: http://www.pointdecontact.net/ * Belgium: http://www.stopchildporno.be/index.php?step=1&pid=4 * Luxemburg: http://www.lisa-stopline.lu/ * Spain: http://www.protegeles.com/ * Czech republic: http://www.internethotline.cz/ * Lithuania: http://www.draugiskasinternetas.lt/en/main/reports * Hungary: http://www.internethotline.hu/ * Austria: http://www.stopline.at/index.php?id=231&L=9 * Portugal: http://linhaalerta.internetsegura.pt/ * Germany: http://www.jugendschutz.net/hotline/index.html also http://www.internet-beschwerdestelle.de/ * Ireland: http://www.hotline.ie/ * Netherlands: http://www.meldpunt-kinderporno.nl/melding/?lid=1
Some of the many DDoS tools you can to to fight this cancer is the Longcat Flooder. Longcat Flooder is a multi-protocol flooding tool written during the Subeta raids, by the same creator as the newer bandwidth raeping tool, BWRaeper.NET (Could someone please provide a list of images? Thank you). It quickly became popular amongst Anonymous due to its simplicity in use and powerful features. The protocols supported are TCP (SYN flooding), UDP and HTTP.
Research has shown that SYN and UDP provide the best results. However, using the HTTP flooder can be useful in several situations:
- Web server with limited bandwidth
- Web server with limited CPU power
- Website with search URLs
There are two different types of Longcat Flooder out there. One is a standalone version and one is a distributed version relying on a central server to provide raep information. The current version of the standalone version of the Longcat Flooder is v2.3 Final. The current version of the distributed version of the Longcat Flooder Client is 3.0 Beta. The Longcat Flooder Server has version 1.0.
To make it a little harder to trace yourself, change your MAC address, find somebody else's unprotected Wi-Fi, and attack. MAC changer in the Dangerous Kitten Pack <http://anonym.to/http://i33.tinypic.com/2diiz5s.jpg>. Details at <http://anonym.to/http://i37.tinypic.com/63ytub.jpg>. W/i/ki at <http://anonym.to/http://insurgen.info/index.php?title=Operation_AntFuck>. Make sure to keep the www, or it is useless. Newfags, read <http://anonym.to/http://insurgen.info/index.php> and <http://anonym.to/http://www.mediafire.com/?353ge2yzm2e> to learn more. AND REMEMBER RULES 1 AND 2 OF THE INTERNET, NO MATTER WHAT. kthxbye.
Anontalk runs on PostgreSQL (confirmed), and they have a deep search function. Just flood the URL for a deep search for many letters (such as "AkXjccHSddJ") in order to waste CPU time. Search results might be cached, making subsequent queries much less effective. Use a random string each time for best results. (bash script plz)
Anontalk's ban system works something like this: 1. Check for banned IP address 2. Check for banned host-name (If those checks returned false, it will continue) 3. Check to see if user is using an open proxy (see if ports serving HTTP are open, such as 80, 8080, 3128)
However open proxy detection is negated if the user's first post was made longer than a few hours ago. Making the server perform these resourceful tasks is easy, just make a post.
Use this links to send a personal message to kimmo through anontalk. For maximum lulz make a script that floods this so he can't ban actual trolls. :)
Copy and paste because anonym.to redirects autoban you.
His mother may answer and claim that he doesn't live with her. This is a lie. A different phone number has been found via whois: 0737778461
http://anonym.to/http://www.kimmoa.se/ - His Web site, often hosted on the same server as AnonTalk. The games there are malware.
http://anonym.to/http://www.pervseek.com/ - His Web site, no idea what it is.
http://anonym.to/http://www.iwantapal.com/ - His lame copy of facebook, FAIL.
http://anonym.to/http://www.frisnack.se/ - Don't know what it is, but it's his web site.
http://anonym.to/http://www.payoma.com/ - Apparently a copy of Paypal, but it's not up yet.
http://anonym.to/http://www.anontalk.se/ - His main site.
Home Computer ISP and IPs
ISP's web site: http://anonym.to/?http://www.glocalnet.se
E-mail for reporting abuse: email@example.com
Past IPs: 126.96.36.199, 188.8.131.52, (184.108.40.206 - DATE: Sunday 06 September 15:20:16 UTC) (220.127.116.11 - DATE: Friday 18 September 23:25:30 UTC), 18.104.22.168 (part of a /14 subnet (sauce), but that subnet covers all of Scandinavia. Given the IPs that we have, it's possible he's only on a /26 subnet.)
When adding IPs, add the date and time when they were active.
To see the butthurt faggot complaining go to the site bulletins.