NEVER GET BLOCKED AGAIN!
  • Fastest USA IPs in the industry
  • Unrivaled connection strength
  • All application compatible
  • Easy to use software
  • Anonymous browsing

IP tracking gives first lead

Investigators have mainly reasoned that Saturday’s assaults were carried out by six individuals, broken up into two groups, on bloggers and publishers.

This was done by tracking the IP addresses of the Facebook Twitter and Google reports that claimed responsibility for the assaults.

Seeking anonymity, an information technology (IT) specialist who’s helping the investigation team, disclosed this info to the Dhaka Tribune yesterday.

The assailants around 2:30pm hacked Ahmedur Rashid Tutul, owner of publication house Shuddhashar, and his buddies, blogger Ranadipam Basu and poet Tareq Rahim at Tutul’s Lalmatia office in Dhaka on Saturday.

The hacked dead body owner of some other publication of Faisal Arefin Dipan,

House Jagriti, was found in his office room around 6pm in the Aziz Super Market in Shahbagh.

Predicated on autopsy reports that indicated Dipan might have been killed several hours before that, investigators conclude that the two assaults may have taken place round the exact same time.

The IT pro said that militant groups have claimed responsibility within 10 minutes to one hour of assaults and such homicides previously.

Right after authorities got the news that Tutul’s buddies and he were assaulted, teams of IT specialists began tracking the 14 web portals in the nation. Every single web action – beginning to tweets to e-mails from Facebook status updates – must pass through these gateways. They used key words like “claim” and “obligation” for filtering the web action passing through the gateways.

Interestingly, the first duty claim didn’t come before 8pm on Saturday, around six hours following the assault on Tutul. The tweet was accompanied by the picture of an intricate leaflet that described Dipan and Tutul were assaulted.

Around 15 minutes after another tweet came with the same words, yet this time accompanied by a Bangla variant of the exact same leaflet.

The IT expert couldn’t say for certain which apparatus it’s originated from, but it was powered by Android Kitkat 4.4 operating system.

Android Kitkat 4.4 operating systems are located on smartphones and tablet computers.

In the very first level of tracking, an IP address situated in Syria came up.

“Nevertheless, it was merely after secondary evaluation of the accessible data that we understood the tweets were really made from Bangladesh using proxy servers and VPN,” the expert said.

The investigators narrowed four IP address of the similar devices down from where the claims were made. Subsequently the investigators monitored these IP addresses back and discovered that these devices were active close to both crime scenes – Shahbagh and Lalmatia – during the time of the assaults.

Researchers also have found actions utilizing the instant messaging program Viber from these devices and therefore reason the killers may have conveyed with each other using this software too.

“These devices were last discovered on-internet in the capital’s Jatrabari and Wari places on Saturday evening. Afterward the investigators went off-grid from the electronic map. We don’t understand not or whether the investigators continue to be in Dhaka.

Investigators also guess the killers have come from outside Dhaka, likely a week past. All this time the investigators were likely keeping eye on the motion of their goals.

by admin on November 8th, 2015 in IP Address

There are no comments.

Name: Website: E-Mail:
XHTML: You can use these tags:
<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>