I’m going to toss a second on this, if anyone can track a message inside their systems its going to be the ISP. They will be able to tell the police the exact business/accunt the message originated from, police call business. Even a pretty large business can be whittled down to a handful of people with access and on duty at the time. I would be willing to bet the IT people at her employer might start logging her if for no other reason but to cover their own ass and fire her if she is sending the messages via company computers.
Okay, it just seems like too much of a coincidence that my stalker is using the same hotel wireless connection where my boyfriend’s ex-girlfried (and biggest suspect) happens to work…
Blocking all restricted numbers doesn’t work b/c I have friends who like having restricted numbers I also think she’s too smart to call any 1-800 number I give her…
But I will contact the abuse line of the ISP and see what they can do for me. I’ll also look into a restraining order. Thanks guys!!!
You haven’t answered the question of how he/she is blocking your emails.
How is he/she hiding his/her tracks? How did you find out his/her IP address?
You said yourself that the IP comes from a general service, how do you know it comes from the same hotel your suspect works at?
Someone who is clever enough to cover all of their tracks - this sounds like a technician, not someone who works at a hotel.
How does this person know any of your personal information? If it is your boyfriend’s ex, how she have gotten it? How would she know your phone number and email address? How would she know what you look like?
When this person calls your cell phone, do they talk?
Perhaps this is a male person following you, someone you may even know.
What is your boyfriend’s reaction to all of this?
Maybe this is bs?
Occurred to me when my question didn’t get answered.
-Joe
I tried a traceroute to 72.255.3.118, and got to 208.254.24.169 before it hit a firewall.
Here’s the results from a couple of locations:
traceroute to 72.255.3.118 (72.255.3.118), 30 hops max, 38 byte packets
1 POD-C-VL4.GW.CMU.NET (128.2.4.1) 0.286 ms 0.773 ms 0.397 ms
2 CORE0-POD-C-CYH.GW.CMU.NET (128.2.0.186) 0.242 ms 0.171 ms 0.170 ms
3 POD-I-CYH-VL940.GW.CMU.NET (128.2.0.205) 0.294 ms 0.217 ms 0.182 ms
4 bar-cmu-ge-4-0-0-1.3rox.net (192.88.115.181) 86.194 ms * 83.075 ms
5 grill-ge-0-0-0-0.3rox.net (192.88.115.6) 3.983 ms 2.830 ms 2.712 ms
6 208.30.197.13 (208.30.197.13) 2.923 ms 2.072 ms 1.387 ms
7 144.232.13.147 (144.232.13.147) 17.854 ms 17.977 ms 17.467 ms
8 sl-bb20-nyc-15-0.sprintlink.net (144.232.13.10) 17.170 ms 17.646 ms 16.913 ms
9 0.so-0-0-2.BR2.NYC4.ALTER.NET (204.255.174.225) 17.446 ms 16.527 ms 16.775 ms
10 0.ge-5-2-0.XL3.NYC4.ALTER.NET (152.63.3.165) 16.587 ms 18.885 ms 20.627 ms
11 0.so-4-0-3.XT1.DCA6.ALTER.NET (152.63.1.117) 28.521 ms 28.619 ms 25.797 ms
12 0.so-6-0-0.WR1.IAD6.ALTER.NET (152.63.39.113) 30.117 ms 25.630 ms 25.694 ms
13 so-0-0-0.ur1.iad6.web.wcom.net (157.130.59.70) 25.489 ms 26.321 ms 25.242 ms
14 206.112.64.6 (206.112.64.6) 25.444 ms 24.665 ms 25.573 ms
15 208.254.24.169 (208.254.24.169) 27.474 ms 28.565 ms 26.982 ms
16 * * *
17 * * *
18 * * *
traceroute to 72.255.3.118 (72.255.3.118), 30 hops max, 40 byte packets
1 gigagate1 (128.112.128.114) 0.823 ms 0.302 ms 0.340 ms
2 vgate1 (128.112.12.22) 0.403 ms 0.320 ms 0.335 ms
3 209.92.72.201 (209.92.72.201) 1.509 ms 1.352 ms 1.570 ms
4 169.130.105.19 (169.130.105.19) 2.157 ms 1.971 ms 1.675 ms
5 169.130.80.50 (169.130.80.50) 3.496 ms 3.435 ms 3.389 ms
6 GigabitEthernet3-0.GW9.NYC1.ALTER.NET (63.111.120.177) 3.631 ms 3.521 ms 3.419 ms
7 0.so-3-1-0.XL1.NYC1.ALTER.NET (152.63.9.26) 3.868 ms 4.489 ms 3.634 ms
8 0.so-4-0-3.XT1.DCA6.ALTER.NET (152.63.1.117) 8.047 ms 8.152 ms 8.471 ms
9 0.so-6-0-0.WR1.IAD6.ALTER.NET (152.63.39.113) 11.832 ms 11.195 ms 10.813 ms
10 so-0-0-0.ur1.iad6.web.wcom.net (157.130.59.70) 10.916 ms 10.948 ms 11.249 ms
11 206.112.64.6 (206.112.64.6) 11.762 ms 10.662 ms 12.898 ms
12 208.254.24.169 (208.254.24.169) 12.165 ms 10.987 ms 10.884 ms
13 * * *
From dnsstuff.com:
IP address: 208.254.24.169
Reverse DNS: [No reverse DNS entry per auth111.ns.uu.net.]
Reverse DNS authenticity: [Unknown]
ASN: 11486
ASN Name: WAN
IP range connectivity: 4
Registrar (per ASN): ARIN
Country (per IP registrar): US [United States]
Country Currency: USD [United States Dollars]
Country IP Range: 208.192.0.0 to 208.255.255.255
Country fraud profile: Normal
City (per outside source): Hyde Park, Massachusetts
Country (per outside source): US [United States]
Private (internal) IP? No
IP address registrar: whois.arin.net
Known Proxy? No
Link for WHOIS: 208.254.24.169
Hyde Park, Massachusetts. Getting warmer?
I smell a very big rat here, nothing here adds up. Check out some previous posts.
from I pit my new boyfriend for not buying me a Xmas present! - The BBQ Pit - Straight Dope Message Board
“I have to admit, I’m mystified. It’s our first christmas together, we’ve been seeing eachother for almost a year. You’ve never expressed an anti-gift philosophy. I’ve seen you give great gifts to others. In fact, the birthday gift to your ex-girlfriend was spectacular, and taking her to see that concert was a wonderful idea. I’m not usually one to compare gifts between girlfriends but… the comparison between a concert and… nothing… is almost impossible not to notice.”
or from this thread http://boards.straightdope.com/sdmb/showthread.php?t=405630&page=1&pp=50
In addition, even if this whole story were true, there’s no evidence that this “ex-girlfriend” called Nogoog from work. It would be wrong to try to get her fired on such scanty information, plus I imagine “Nogoog” could be sued for slander. The police have no reason to get involved, since no one was threatened at any point.
Amateur Dectective Night at the Dope is over. Closed.
samclem GQ moderator
This has gone wa-a-ay past the design of this board.