Update: Restorecord was in on it the whole time. They added the code that allowed people to get IPs from users github.com/restorecord-oss/restorecord-new edit: Restorecord DMCA'd the repo to try and prevent people from seeing it. Here's an archive archive.is/DhUUT Also the IP ping statement: I made it a joke because cordkiller's first video didn't show them open up any tool, it was IP straight to command prompt. In their later ads they actually show them putting the IP into a tool and using command prompt to monitor if the IP is down.
@InfinityDBL10 ай бұрын
First?
@SpectacularAustin10 ай бұрын
That is insane! Discord should’ve done something about this a long time ago since only scammers use this service.
@hi-bk5fe10 ай бұрын
hi
@Mr45Rabbit10 ай бұрын
dang
@s1nt3r10 ай бұрын
@@InfinityDBL i liked the comment first then
@nohalo3forme10 ай бұрын
My favorite bit is that the “lifetime” subscription only lasts 9,999 days
@TheFloridaMonkey10 ай бұрын
thats infosecs lifetime, the owner has smoker lungs
@nothomebutnotreally378210 ай бұрын
@@kserrataI’d imagine they’d assassinate you so *technically* it lasted a lifetime
@Kero-zc5tc10 ай бұрын
@@kserratawhich someone could actually get through
@piberaroo10 ай бұрын
They will kill you on day 10k
@Arctis100010 ай бұрын
@@TheFloridaMonkeyyour hopes are too high
@hooting-ton521510 ай бұрын
Inf0sec: "Pay us so we will blacklist your IP from our 'service'." Me: *Files an information takedown notification*
@shedingleonmyberry10 ай бұрын
bro graduated
@Harry-f6p10 ай бұрын
I dont think that will work, as inf0sec does’nt store any data, it just grabs it from restorecord.
@Cyber_Official10 ай бұрын
just like that one RUST game website that tracks users and want them to pay like 5 dollans to remove the tracker
@TheColonThree10 ай бұрын
Nah, let's just send them a cease and desist letter.
@authgg10 ай бұрын
They’re just going to ignore it, these types of people never follow laws
@Signupking10 ай бұрын
Sage is the winner in this situation, not only is he the main character of this story but he also got paid for snitching everyone involved.
@isaac_marcus9 ай бұрын
Reminds me of Let's Game It Out's playthrough of Tech Support Error Unknown, where he just said yes to everything, forwarded all the emails to each of the other factions, blackmailed all the customers, got in serious trouble, got repeatedly promoted, and I think in the end saved the day.
@SauceyRedHN5 ай бұрын
@@isaac_marcusNever heard of the channel or game, but I’ll check them out.
@Note_Cubes4 ай бұрын
Sage is not a winner he would never be one and if he was one he would be a lousy lazy unloved winner with no friends why because he ate them
@dimsumboy222 ай бұрын
@@isaac_marcuswild legs game it out reference
@Plantera2electricboogaloo16 күн бұрын
from scammer to snitch to secret hero what an arc we all love you sage
@matt_hart10 ай бұрын
the database view at 15:30 is for planetscale and that screenshot doesn't show how many passwords exist. they'd have to click on the highlighted dropdown to view the existing passwords. in fact, i'd say that screenshot is proof that there are multiple passwords because the name of the password includes the date it was created, and unless restorecord started november 2023, that's not their first password. and not only that, but it's also pretty good reason to believe that they intentionally gave a password to inf0sec, if inf0sec started around november
@Wildcard6510 ай бұрын
Actually, if Zeb had access to the web server's code or configuration, they could pull the credentials for the DB and reuse them somewhere else.
@keithharvey63310 ай бұрын
@@Wildcard65 Not to mention they could also easily make a duplicate record for every record put in the restorecord db going into another db, easily making a "live clone" of the database to a separate db, if for some reason they couldn't access the actual db creds. (such as if a 3rd party handler was being used for db read/writes)
@user-xl5kd6il6c9 ай бұрын
@@Wildcard65 tbh, this is more likely than anything else
@user_mycatWaffle7 ай бұрын
a little late, but i did a little bit of research and restorecord founded in 2020, so if the password was created in 2023 then how could they access it before? so i think you are right. edit: i don't know if this is just a coincidence the website was updated on the 25th of november 2023.
@SOS-BFV10 ай бұрын
I already know my ip address. Sorry scammers, better luck next time!
@SMG5RO_old10 ай бұрын
o ma gaaaa@mugitude
@mirozo10 ай бұрын
so true, cuz like what can they do with it. its just IP edit: any1 who will comment some bs, please restrain yourself, most of u dont have a clue what reu talkin about
@MemphisShyt10 ай бұрын
i agree, please NEVER EVER comment again
@user_x603710 ай бұрын
Proof Tell me your ip
@mosti7210 ай бұрын
@@kserrata general location depends a lot on ISPs Some ISPs have an IP block range that is so generalized, you're at least 50 miles away from the IP location
@TabouletShorts10 ай бұрын
Sage : "Don't make a video about it" Ntts : "Nuh uh"
@icevaIk10 ай бұрын
Nutts! 😂
@wxyvrnthe110 ай бұрын
fr and nice pfp
@Lezm10 ай бұрын
Based
@kipchickensout10 ай бұрын
@@wxyvrnthe1 I agree
@TabouletShorts10 ай бұрын
@@wxyvrnthe1 Yeahh
@Anatloe10 ай бұрын
damn that sage guy is literally a double agent lmfao
@abc-qj7ve10 ай бұрын
And he didn't even know
@discouragements10 ай бұрын
i know him on discord hes a little kid who uses tools and tries his best being dangerous lololol
@currentlycam10 ай бұрын
you dont know him u clown, theres no way this nigga just said that, would be unfortunate if you got EDR'd@@discouragements
@satie710 ай бұрын
gotta give it to lil bro tho, he gave this video lots of content
@RandomFlyInTheInternet10 ай бұрын
Bro played both sides and still Lost☠️
@wChris_10 ай бұрын
Not disclosing a data breach can get you a pretty hefty fine in the EU under the GDPR, if someone where to report them.
@_BangDroid_10 ай бұрын
And everything else they're doing can get them not just fines but criminal indictments in most jurisdictions. I don't think they care about GDPR compliance.
@authgg10 ай бұрын
the owner xenos and admin zebratic both are commit fraud so they don't care anyways
@codegeek9810 ай бұрын
I can't wait for 16:43 on this very video to become a court exhibit where he stopped stonewalling and admitted finding out about the breach
@66622233311110 ай бұрын
Yeah good luck with that. I tried reporting so many website for a bunch of shit and never gotten anywhere with it.
@authgg10 ай бұрын
@@666222333111 who did you report to though? the OP is talking about reporting to the government for GDPR violations. Since EU supposedly takes that seriously, and the operators of website are also in EU
@phanto-6410 ай бұрын
Fun fact: your IP adress AT BEST just gives them the location of the nearest data center and not where you live, getting your IP leaked isnt the end of the world
@authgg10 ай бұрын
not always. If you're in the US, your name + ip can lead to your address. Because there's a lot of public information directories like whitepages here
@trxsyn2 ай бұрын
the point of this was to ddos them
@dukelelawАй бұрын
@@authgg it also works in very few european countries
@authggАй бұрын
@@dukelelaw Yeah and restorecord logged emails, and there's 100s of services to lookup email address and see data breaches with full address. The email thing applies to ANY European country
@authggАй бұрын
@@dukelelaw Yeah and restorecord saves email, and you can lookup email and see data breaches with exact home location. The email thing applies to ANY European country
@Xoremak10 ай бұрын
xenos: "It is impossible for 2 people to possess a sigular password" 😑
@Noicer_wastaken10 ай бұрын
Just copy paste. 😂
@mcfixer950310 ай бұрын
he might have meant that it's a single-use code like when u get a text and it's like "228708"
@supperEisMan10 ай бұрын
Also all databases have activity logs which show all active sessions.... So he is either completely incompetent or complicit...
@mlgbeeler42010 ай бұрын
Hell isnt that how everyone was using netflix? lol
@dimitralex189210 ай бұрын
@@supperEisManprobably disabled logging for "security reasons"... obviously on the same day the ip leakers went online
@niceoneam012as10 ай бұрын
At this point it's not the fact that this feature needs to be removed it's just that RestoreCord needs to be replaced with a legit backup service lmao.
@McFlare10 ай бұрын
true the backing up your server is a good idea but when it's used to get ip's of your members and sell your members data that is way to much
@attempting776610 ай бұрын
@McFlare I heard that there bot called vaultcord that doesn't log your ip i might use that instead of restorecord now since these allegations are pretty heavy 😂
@niceoneam012as10 ай бұрын
@@McFlare True
@schwingedeshaehers10 ай бұрын
@@McFlaresome things you can backup using templates
@maselitoamazigh138510 ай бұрын
i feel like its worse than a databreach , if it was the owner cant just turn it off like that , the sites would still have the data from the breach , feels more like the owner was in on it .
@gmanoffury10 ай бұрын
"I have ur ip" Me with a dynamic IP: *Router goes off then back on*
@mycelia_ow10 ай бұрын
Prob wouldn't be too hard guessing your new IP, since only a part of it changes from doing that. A simple range search and you're back in their grasp. People rely too much on dynamic IPs 😭
@MetheusBatanir10 ай бұрын
Thats sounds useful. Any help or advice how to make my UP adress more dynamic?
@uhhno84110 ай бұрын
me with 3 Ip's thru a alternative method, "what one?"
@gmanoffury10 ай бұрын
@@MetheusBatanir your ISP provides it, you just have to ask them, you can set up a dynamic DNS through windows tho
@Ozzianman10 ай бұрын
@@mycelia_ow Meh, I can do resets all day. Or hell, even go dark for a good while. Whoever is trying to scam me will just move on.
@HGStyleOfficiel10 ай бұрын
something people often forgets is that an ip address is designed to be a public info, else it would not be shared with websites. the problem is not the ip address itself but your internet provider, because they may sell a database containing all the ips and their locations so people buying it can see people's location. some internet providers only tells the city, some tells the street, and maybe some (never seen this case) gaves the full address to your home. i have a friend who lives in france but has an internet provider that locates him in germany for some reason.
@eftarabicАй бұрын
im happy that my IP shows im in other city xD it never shows the right City, sometimes its annoying on tinder because its showing me people from a city that im not living there xD
@ölkörvmedkorvstråganof5 күн бұрын
@@eftarabic Its a VPN
@resied46209 ай бұрын
sorry discord gangsters but i already know where i live.
@Im_0BBYFR0G4 күн бұрын
😂😂😂
@ccost10 ай бұрын
this leak has a more diverse and entertaining plotline than most movies
@authgg10 ай бұрын
fr I'm glad I'm using vaultcord and dodged this bullet lol
@NoFailer10 ай бұрын
I have to be a sweaty nerd about this: DDoS - Distributed Denial of Service - Multiple networks with multiple machines DoS - Denial of Service - one machine When people say the first one, they usually mean the second one.
@kuba4ful10 ай бұрын
🤓 ☝ No but I'm with you on this one, it annoys me when people say DDoS when they mean DoS, and how they proceed to 🤓 ☝🤓 ☝🤓 ☝ you when you point it out 😭
@reallyneptune10 ай бұрын
thanks a whole lot google searcher bot
@Yilmaz410 ай бұрын
and even then, the ping command makes requests so slowly that you have to be completely ignorant to call it a DoS
@skilledcamman475210 ай бұрын
chill
@maskettaman148810 ай бұрын
@@Yilmaz4 I sort of think the ping in the video was just a demonstration of the target going offline, not the attack itself
@ThatOneMfFrFr10 ай бұрын
Hey everyone Just want to let you know having your ip leaked is not dangerous at all The locations are not very accurate and most of you guys have a dynamic ip address like myself which means your ip changes time to time so dont worry about it Edit: if someone somehow is ddosing your ip you can just call your isp and change your ip
@reallyneptune10 ай бұрын
no shit sherlock..
@Rocksy710 ай бұрын
this is simply false you can definitely get things like home address and phone numbers just from an IP using OSINT tools i got someone's phone number just as a test and the facts are changing your ip doesn't change the fact ur phone number is now floating around the internet brother you have to start using logic and brains how the fuck you think people get doxxed and swatted? Not from the person typing out their home address surely enough lmao
@cscscscss10 ай бұрын
someone got access to my home's cctv and posted some passwords and emails from it, and took down my router multiple times yeahhh sure buddy
@aYTcommenter10 ай бұрын
@@cscscscssthats insane
@Ransomwave210 ай бұрын
@css that is because your home's cctv password was not secure enough. they probably just bruteforced their way in because you guys didn't change the default password!
@fmoney10 ай бұрын
I did not know that you suffer from incontinence No Text To Speech 5:06, very brave of you to make that joke.
@Darkslyyer9 күн бұрын
4:12 I do not understand the people who hate you , I saw 2 of your Videos and instantly subscribed, now I watched like 20 allready and I love every single one of them! 😂 Your one of the most entertaining KZbinrs that I know at the moment.Please keep doing what you're doing 💪🏼💪🏼
@burkino704610 ай бұрын
Wait, it happened AGAIN?? I have a message from 12/22/2023 that talks about IPs being leaked. My friend said that "apparently it's from restorecord" Now 2 months later the same thing is being brought up
@Arctic-axe10 ай бұрын
Bro I knew restore cord is sus I never trust that stupid thing it's so bad and easy to exploit
@authgg10 ай бұрын
yeah vaultcord exposed them last year it was just never admitted before now
@fusedqyou10 ай бұрын
If Zebratic did all this then it is perfectly possible they have a backup of the database lying around. Xenos is a total moron and nobody should use these services anymore.
@erikkonstas10 ай бұрын
Because there was ever a legitimate reason to use such a service 😂 If you're a server owner and want your members to automatically join a new server in case the old one goes for some reason, just self-host something... which does not even have to be online most of the time, only while you're doing the switch.
@trinex6410 ай бұрын
nobody should be trusting them in the first place lmfao, rep is already ass as it is
@NFSHeld10 ай бұрын
If you mean Zeb was using the backup then how would the PW change to the original DB stop the breach?
@erikkonstas10 ай бұрын
@@NFSHeld Remember that these people are not exactly the most logical beings on Earth...
@mow_cat10 ай бұрын
@@NFSHeld 1. zeb could have found out people were looking into it (maybe xenus told them) and disabled the service temporarily 2. zeb could have really lost access to the database, disabling the service, while still having a backup of the database somewhere zeb would have to be pretty dumb not have made a backup at any point im ngl
@zekrodev10 ай бұрын
I honestly think restorecord should be banned for this. I verified my own discord bot a while ago and I needed to disclose every bit where user sensitive information is stored for what purpose and for how long it is stored. I believe that is for GDPR reasons, but therefore, because RestoreCord can be accessed in the EU as well, this should result in a ban. Whyever would someone log IP addresses in a database together with user IDs. There is literally no way this is necessary ,especially not for reasons they mentioned (like the VPN blocking).
@applmango10 ай бұрын
I think the website would only get banned in the EU
@erikkonstas10 ай бұрын
"Whyever would someone log IP addresses in a database together with user IDs." The only reason would be to answer the question "WHO was it whose alt tried to join my server?", but... that's not its job here...
@Lezm10 ай бұрын
Fr
@joecooldoo10 ай бұрын
Developers log your IP address and associate it with an account so if they see you are doing something malicious they can blacklist your entire network.
@zekrodev10 ай бұрын
@@joecooldoo This makes no sense, because most ISPs rotate residential IP addresses on a regular basis. That’s why long term IP banning is effectively useless unless you have a static IP, which is very expensive in most cases.
@Insignia_8 ай бұрын
Man I couldn't care less about what 15 year olds do on Discord, but this almost documentary-like presentation is really catchy. You make it worth watching, great job.
@L-812 күн бұрын
It depends on the ISP, but even if someone discovers your IP and associates it with you, all they can know is your general location, and that can mean VERY general. For example, literally every Telstra IP address in NSW, Australia locates to a specific point in the Sydney CBD.
@Boyga_Official10 ай бұрын
"room temperature iq" gotta be the smoothest insult I've seen
@NicoBille10 ай бұрын
Question that remains: roomtemperature IQ in °F or °C?
@julian9136 ай бұрын
@@NicoBilleKelvin
@shinysands5 ай бұрын
@@julian913room temperature iq in kelvin would be 295iq....
@permacoo37605 ай бұрын
@@shinysands they are very smart, obviously
@U_niquey5 ай бұрын
overused insult.
@Maximus2706410 ай бұрын
I hope Discord take notice of this instead of being a headless chicken
@VeiTheOne10 ай бұрын
Bet you they won't. It'll probably hurt their revenue, and we all know these big fat CEOs care about money, not people.
@fatsausage-animaatioita471710 ай бұрын
discord did nothing wrong here?
@erikkonstas10 ай бұрын
@@fatsausage-animaatioita4717 They still have the "Join servers for you" thing...
@numnut151610 ай бұрын
Lmao
@n00bxl7110 ай бұрын
Discord had literally nothing to do with this. Did you even watch the video. Even if they do take notice, there is nothing that discord is able to do, again, because it's not their issue.
@yammerttv10 ай бұрын
There is actually a way to terminate someone's account. It has to do with Discords API guidelines. If you somehow get a hold of someone's Discord token (what you use to communicate with Discord's API); You can essentially just self-bot using their token and get their account terminated. It is quite literally that easy to do so, the hardest part is getting someone's token.
@GetZootedSkid10 ай бұрын
I remember my account being termed for self botting because a program I had auto-joined their discord every time it launched and there was no way for me to turn it off at the time. No chance for appeal. Very cool.
@FellowCanadian0110 ай бұрын
Actually@@GetZootedSkid if you go to settings and authorizes apps and try to find the one you did and deactivate it
@gan110 ай бұрын
@@FellowCanadian01 he meant an external program joining it, not a bot app
@yammerttv10 ай бұрын
@@GetZootedSkid Very simple fix. Change your password. The way that Discord tokens work is a hash of your username, password, the date you joined, and a random salt value. If you change your password your token (hash) will be changed to a whole new value and thus their system won't work on you.
@GetZootedSkid10 ай бұрын
@@yammerttv buddy, it was an external program, it was technically a self bot, it was an exe file, not a discord app, not a website, not a token grabber, it was a program file on my desktop that when ran, launched, would also join their discord server. There was quite literally no way of turning it off, and the account is gone. Anyone tryna give me a fix absolutely did not get what I said.
@БогданРука10 ай бұрын
11:43 an anime PFP and a Hellenistic statue PFP. Perfect duo😂
@Akab10 ай бұрын
10:35 funfact: every website on this planet logs your ip address, don't need any feature for that. A webserver needs your ip to serve you information 👍
@kai-o-kai10 ай бұрын
Maybe the server logs it, but you do need a feature to actually record it somewhere.
@Tom-fy8lw10 ай бұрын
Very often websites doesn't log the IP (that can get very expensive in the EU), but only saves it temporarily
@boxmantherandom10 ай бұрын
sage being a snitch literally helped lol
@halfsine10 ай бұрын
sage was the anti-hero of the story
@accountname773810 ай бұрын
Nice video! However, the reason why they were pinging the person was not as a DOS attack, it was so that the people watching the video can see when the target goes offline.
@TanyaTulip10 ай бұрын
Shouldn't ever "verify" using links, ever. So many large trusted servers have remote verification when users join them, and it normalizes this concept of verifying externally, which opens you to the epic DDOS threads CordKiller was doing (plus IP leak and shit). It frustrates me, we don't want people to fall for this stuff, and yet we make it super easy by turning it into the norm. Like, wow, what a surprise, clicking an external link may bite you in the back! "well how was I supposed to know r/deltarune requires similar verifiation so i didn't expect any problems!"
@erikkonstas10 ай бұрын
See, the thing is that there are valid uses for this... the mistake is when things get leaked...
@heroslippy666610 ай бұрын
I've seen some of these "verify" tools that requires full access to your account to scan it. ngl this stuff is sus from all directions. I do like the ones that require users to verify inside of minecraft. Pretty cool.
@chistinelane2 ай бұрын
@erikkonstas there really aren't and people should boycott groups that use them
@marionascimento45010 ай бұрын
Haven't finished the video yet (7:55) but this is something I (we) have been doing in multiple servers for many years now (at least 3), discord bots disguised as verification bots, among other things, which get not just your IP but the user-agent, your email and connected servers, etc. depending on the scopes, as you verify or log in or authorize it all goes into a database. This in dozens of servers with dozens of thousands of people. EDIT: After watching a bit more, it is confirmed, but this is by no means the only bot stealing data, there are hundreds. Also: Zebratic doesn't need access to the database. Xenos said he had access to the servers, if that's true, he can get the IP/User-Agent, etc. anyway and send it to another database he controls, in addition to Restorecord's, without ever having access to their db. On the other hand, he also said only the servers have access to the DB and Zebraic only had access to the servers so it's also possible depending on the exact permissions he has that he can see the whole credential to connect to the DB. In any case, it wouldn't be necessary and not even desirable, you want to be more stealthy than that and if you're not managing the db you don't want logs accessing all the records. EDIT 2: It seems this was really RC db or he was in on it somehow. It was done in a very poor way, hence why it was discovered so easily. Anyway, it's a good thing for everyone's privacy, good job you and bad job RC!
@Nyxar-207710 ай бұрын
16:13 bro cooked too much 🔥💀
@EliseyzScripts10 ай бұрын
Thanks for clearing many peoples paranoia about gettin their ip's stolen out of blue! You're the best
@redo112210 ай бұрын
Firefox has container tabs, which is like a per tab profile. Also there is a program called ferdium, that just lets you login into tons of stuff, including multiple discord accounts. Chrome profiles sound pretty tedious.
@ThatMattWhite10 ай бұрын
Not really tedious, especially since you're not limited to one tab.
@redo112210 ай бұрын
@@ThatMattWhite can you open multiple tabs in multiple profiles?
@mcfixer950310 ай бұрын
@@redo1122in chrome? yes, each profile is a different window. I have 3 windows open with about 2-5 tabs each, for different emails and websites and such
@josandg10 ай бұрын
@@redo1122 Chrome is better cause he also needs an email for every alt so it's more manageable and more separate that way
@jaden892310 ай бұрын
@@ThatMattWhite?
@unotheguy610 ай бұрын
I was confused this had 155k views but i saw this was uploaded 6h ago. This deserves 1M+ views
@abgmurrell407410 ай бұрын
16:30 "42 megaton missle - my obese ass, pointed directly at him" God damn that made me laugh harder than it should've.
@luvxharuka9 ай бұрын
5:18 "Tampons! I use that as well." WHAT.
@nino123wtf72 ай бұрын
its femboy
@suuper_sam10 ай бұрын
this is def one of the most craziest things you discovered. everything had so much plot twist
@_VULTAR_10 ай бұрын
This guy is seriously like a superhero for discord
@YesSpeechFromText10 ай бұрын
its spiderman guys!!!!
@_VULTAR_10 ай бұрын
@@YesSpeechFromText what
@mycelia_ow10 ай бұрын
@@YesSpeechFromText It's YSFT guys!!!!
@D9fjg10 ай бұрын
@@YesSpeechFromText Where's MaybeSpeechForText
@notrhythm10 ай бұрын
is there another channel like this, that talks about new scams, leaks, or exploits but not just limited to discord?
@illumi174910 ай бұрын
why was that whole "sage" ark so much more interesting than all your other videos combined
@w3w3w310 ай бұрын
$age was funny af hahaha
@inqmusician210 ай бұрын
I checked the 192.44 IP and it's the P&G IP. And finding the exact person using the IP is very difficult if you're not an ISP. Because there can be hundreds in your neighbourhood using the same IP as you. Location is more reliable than IP lookup.
@TheMAZZTer10 ай бұрын
Without looking at the context it's hard to say, but the ping thing could just be a way to check if a target has gone down or not (and if not how badly they're lagging).
@shawn35615 ай бұрын
it looked like the IP actually was DDoSed considering that it was pinging then the request timed out
@AmIBlee10 ай бұрын
The fact that he actually called the file "Snitch-7" at 17:01 is just funny and i don't know why
@kxlmn110 ай бұрын
Daily dose of ntts helping me learn more about discord than the actual scammers on yt ❤
@dylanharding572010 ай бұрын
Every single website you visit needs to know your IP - consider a web request as sending a letter. If you don't include a return address, the server has no idea where to send the response to. Your IP being leaked is nothing to worry about, and if you are worried, just restart your router. IP based geolocation is inaccurate, most people have dynamic IPs, DoSing is not a major concern for anyone, and more and more people are ending up behind CGNAT (tldr shared IPs) anyway.
@erikkonstas10 ай бұрын
Er... try visiting your public IP address, it will most likely lead you to your router's login page (DO NOT LOGIN FROM THERE).
@collared10 ай бұрын
false. entering ur public ip WILL NOT bring up your routers login, unless ur ISP doesnt know what theyre doing lol@@erikkonstas
@lunlunnnnn10 ай бұрын
@@erikkonstasif your public IP leads to your router's login page, it's misconfigured and you should change its firewall to block this. also, even if you left it publicly accessible, it'd only be a problem if you kept the default password which you should never do for obvious reasons
@undefinedchannel991610 ай бұрын
@@erikkonstasI think you misunderstand. Try accessing that IP outside of your network (on your phone with mobile data). It will only be accessible when you are connected to your network.
@tomtomi9310 ай бұрын
@@erikkonstas as people Said, you should reconfig your router If you can Access it from outside networks
@gambl3rtv2610 ай бұрын
At 2:50 he's showing that he's pinging the victim's IP successfully, and then when he sends the attack, the IP fails to respond because the victim's internet goes down
@cinderwolf3210 ай бұрын
5:10 is the most chaotic sequence of deadpan narration I think I have ever heard in so little time
@teleportor10 ай бұрын
2:06 is crazy
@obiotwastaken10 ай бұрын
fr 😭
@haaxxx910 ай бұрын
That's hot!
@Ниггерфиш10 ай бұрын
@@haaxxx9Fr i couldn't even edge to that, I exploded immediately
@Lezm10 ай бұрын
@@haaxxx9😩
@mycelia_ow10 ай бұрын
@@Ниггерфиш bro?
@Heroas_Hamseros10 ай бұрын
5:53 GmbH is meant for a German company. GmbH stands for "Gesellschaft mit beschränkter Haftung" translated as "Limited liability company"
@MsHojat10 ай бұрын
GmbH = Ltd.
@Heroas_Hamseros10 ай бұрын
@@MsHojatLike that.
@Dann.y10 ай бұрын
"because theres no way to magically terminate someone on discord" says the person that magically terminated that scammer's account a few weeks ago.
@dr1nkndr1ve10 ай бұрын
these things get patched quickly, or he knows a discord admin personally
@simonnt10 ай бұрын
He had access to that guy's bot, it may have something to do with that
@WAZZZAAAP110 ай бұрын
lmao
@erikkonstas10 ай бұрын
Uh that happened because the scammer was stupid enough to leak his bot token...
@Xudmud10 ай бұрын
8:40 Lucky it was in the last 90 days, given Chrome (and Chromium-based browsers) don't retain browsing history locally longer than that.
@chapichapo10 ай бұрын
Amazing video - this channel is turning into real investigative journalism!
@lpoki889710 ай бұрын
It's so wild how many of these websites are made by absolute idiots. They know just enough to make systems talk to each other and pull some data. And use a website template, and if you said the words "best practises" to them they'd just drool and blink with both eyes. And in this case add some maliciousness and greed.
@williamdrum989928 күн бұрын
Reminds me of the exploit where you could use emojis to steal spotify accounts
@lpoki889727 күн бұрын
@@williamdrum9899 IT is wild man.
@klafbang10 ай бұрын
You actually used to be able to DoS people using ping. Send a "Ping of Death" to a Windows 95 machine, and it will BSOD.
@orangejjay10 ай бұрын
The ping of death was not a ping. It was a specific packet that was sent and it was actually called "nuking." There were fun tools called WinNuke that could do this and made IRC vey fun.
@SuperBloopie9 ай бұрын
@@orangejjaythe good ‘ol days of IRC channels 😅
@Vsnozu.10 ай бұрын
Bro put my ip in the thumbnail
@MODSLabs-j2u8 ай бұрын
uh
@desmeon8 ай бұрын
Check your windows tonight lil bro 😼
@Nyxar-20778 ай бұрын
Oil up, I'll be there in 5
@PurpleMonkVR48 ай бұрын
@@Nyxar-2077same
@ciclo69198 ай бұрын
Ty
@kilobytedemonАй бұрын
What’s hilarious to me is that he says, “See? Only one password,” as if you couldn’t log into the server with that password if you knew it. I didn’t get a good look at the screenshot admittedly so I could be missing something but still. Absolutely insane logic.
@PhantomDevelopment8 ай бұрын
As a cyber security student I can say that finding someone's IP is the same as looking at the door of a house to break in, attack is depends on how secure the door is, if the door is secure enough you have nothing, attack by only IP is same thing
@SyntaxErr40410 ай бұрын
16:31 i love this man
@fIammable10 ай бұрын
How about 5:15 😂
@CMM4710 ай бұрын
13:40 Nah I think they had an under the blanket exchange 💀
@synexiasaturnds727yearsago73 ай бұрын
Mouth-to-mouth exchange
@Idknlandwh1233 ай бұрын
3:06
@captheobbyist643410 ай бұрын
a lot of people are worrying about their ip getting leaked but it's not that bad at all. first of all your ip can only show approximate location second of all ip change from time to time when for example router reloads so they are dynamic and third of all, your ip is being sent EVERY time you access ANYTHING on internet. even just turning on your computer or mobile, you send thousands of requests to various domains.
@erikkonstas10 ай бұрын
This "Your IP is sent every time you connect" argument is nonsense, yes it's true but that's not why we worry about IP leaks at all. The problem is when your IP ends up *in the wrong hands!* And, if you happen to be actively running the thing that leaks your IP, you'd end up doing reboot after reboot to your router, because it will be getting leaked every time... and no, your location is not what they want, your DoS-ability is what they want.
@collared10 ай бұрын
its not even approximate but very innacurate. the location ip lookup gives me is about 300km away from my actual location lol
@lunlunnnnn10 ай бұрын
@@collaredit depends, I have multiple public IPv4s at home, and with one of them you can get the town I live in, and with the others you can get an exact address if you know the right tools. but I will admit that my setup is unusual, and for most people this isn't something they should worry about, like who the hell has an entire /29 block assigned to them
@SioxerNikita10 ай бұрын
@@erikkonstas Getting an IP is not that hard if the person is doing anything multiplayer. Most fast paced games will use some peer-to-peer data along with a server to speed up player interaction speeds. If you play a video game, everyone there has your IP... Your IP being leaked is 99.9% not an issue, especially if someone has genuine hacking skills to leetz0rz hack you, the IP is not going to be the limiting factor... If you have a secure network without shitty unsecured smart devices, then it is very limited what someone can do with your IP... Most people also don't have a static IP, so turning off the router will give you a new one... Denial of Service is the only semi relevant thing you can really do with an IP these days on a decently secured network
@SioxerNikita10 ай бұрын
IP doesn't even show location. The IP geolocation is third party companies linking IPs to areas.
@milnertechnologies955610 ай бұрын
2:50 The ping command while not normally executed in CMD is actually the exact way DDoS works (given with multiple users hence the "Distriuted" Denial of Service). That's why blocking ICMP on your router will completely mitigate the attack as your devices will no longer respond to ping requests.
@Vaqul10 ай бұрын
they were pinging the IP to show when they went offline, it was nothing to do with the actual attack lol
@pseudo.Random-KF4 ай бұрын
11:25 It is possible to DoS someone through pinging someone, but you cannot physically type it fast enough to send enough volume to cause problems. You'd need a script for that, and the fact they weren't using one suggests they cannot code.
@fxturist853410 ай бұрын
assuming restorecord is based in the US or EU, they have up to 72 hours to report a data breach before facing legal consequences
@user-uo8ny1kj4c10 ай бұрын
It's probably based in India we all know how good they are with technology
@spgaming127210 ай бұрын
it's not a data breach, the owner just gave the creds to the idiot that runs Inf0sec
@randomidiot13410 ай бұрын
@@spgaming1272 And he accessed the data, which means that data was breached, which means its a data breach...
@Ozzianman10 ай бұрын
@@spgaming1272So it is a data breach.
@fxturist853410 ай бұрын
2:48 ermm actually 🤓 (nerd note) this is DOS and not DDOS (also on one of my classes we did a little funny DOS attack on my city's website to see views counter go up on one of the posts lmao)
@undefinedchannel991610 ай бұрын
they DDoS it in the background while using ping to check if it’s still up
@Lezm10 ай бұрын
Thanks man, it’s a relief I don’t use discord often enough to ever come across this bot, your doing gods work, appreciate you bb ❤
@Lezm10 ай бұрын
@yx-su5qf yeah, I heard of it it because of this channel, if it wasn’t for him I wouldn’t have heard of it at all
@spectronimo79646 ай бұрын
the "his tone changed because i was now looking at him" went so hard i had to throw it on rewind and watch it back
@itstheV01D8 ай бұрын
17:04 i love how you named the file on your computer "snitch"
@nyanolive10 ай бұрын
3:20 who the heck is Dura and why are we attacking them? ;w;
@luxploit10 ай бұрын
4:48 i know this guy from another discord, he really has the IQ of an antarctic thermostat
@Stickuni6 ай бұрын
2:01 what. Is. This.
@notlark6506 ай бұрын
The "there is no such thing as a coincidence" clip fuckin sent me
@bleakaddict10 ай бұрын
Literally the first 24 characters of your token is your UserID encoded in base64. Thats why they didn't show all of his token in 6:06
@BrTem-cy6wbАй бұрын
You used to be able to get epoch (secomd part of token) through avatar timestamp leaving only hmac to be unknoqn
@Tetroner10 ай бұрын
I think NTTS lied in 5:58 he doesn't have any friends 😔
@TabbedOutLOL10 ай бұрын
3:45 they fr be making mee6 look like a good deal
@JonnygamingTv10 ай бұрын
1:55 DDoS services work pretty similar 💀
@prohax13 ай бұрын
!??
@multibrandan5 ай бұрын
I don’t know what it is but you are cracking me up! The way you go about your videos I just hilarious I mean by far what made me laugh aside for the many scenarios you have in this video was the “and oh my goodness” lol 😆
@Grape_Rush_Goat7 ай бұрын
$age- the hero we didn’t ask for, nor the hero we wanted
@LoganWasHere22410 ай бұрын
If you think your useless, remember the blur in the thumbnail.
@CyborgLikeDucks10 ай бұрын
3:05 alright bro
@dxvzera10 ай бұрын
4:04 bro doxxed me 💀
@Zertontom5 ай бұрын
"i stole your ip" "ok" "i know your location" "actually it's not a precise location" "i uhh have your cookies" "im lactose intolerant" "i hate you" "have a good day too"
@jared-mc6 күн бұрын
"no text to speeech i have your ipee im gonna torture you for the rest of your lifeee" accent is crazy and funny
@synx77306 ай бұрын
2:08 im traumatized
@anonyone883410 ай бұрын
As an indian livung under 1000s of NATs what can you possibly do with my ip?💀💀
@nanopi10 ай бұрын
That's what they get for only working with IPv4.
@_BangDroid_10 ай бұрын
NAT is not a firewall even if you have 1000, plenty of ways you can traverse NAT
@anonyone883410 ай бұрын
@@_BangDroid_ i mean not 1000 but isps here don't give a different ipv4 to every single connection, i don't even know how many nats i am behind.
@unknownuser99310 ай бұрын
Oh man, as an SRE supporting a service in India, that hit home. That routing really causes pain .😭. Sometimes traceroutes show 20-30 even more hops. Shit gets crazy.
@anonyone883410 ай бұрын
@@unknownuser993 I know man, port forwarding etc here is the hardest thing
@jakeblum90710 ай бұрын
7:29 WOMP WOMP
@GenjiPrime10 ай бұрын
In where I live, having my IP address is pretty useless since it only point you to the server's address which almost never within your city lol
@reallyeasyname2 ай бұрын
9:12, Lethal Ape is a VR Game that uses gorilla tag locomotion. it also is a horror game. and i sadly dont know anything more about it.
@firesoul275910 ай бұрын
6:20 OOH MA GAWD 🤣 that got me good
@BeanSnatcher717 ай бұрын
The payment proof 💀
@Ten3br0us10 ай бұрын
2:08 buddy
@MicahBernat_27 ай бұрын
ayo
@Ren-lSNl6 ай бұрын
you should be a cyber detective or something wtf bro this is cool as hell🏆 new sub!
@薹6 ай бұрын
is this sarcasm
@Uglier.23 күн бұрын
its pretty funny how nonchalantly you converse back and forth with hackers who hate you
@Azn910 ай бұрын
The biggest issue there is: "WHY RC needs your IP" ??? There is absolutely no reason to store such information except than to use it for malicious reasons
@user_null514710 ай бұрын
pretty much every website tracks and records your IP I think
@Hyper0void10 ай бұрын
Kind of their "anti raiding" system ? Since raiders could create multiple accounts and if they get ban just use an VPN. Restorecord prevent that by getting user IP and check if they're using VPN or possibly raiding the server. Correct me if I'm wrong.
@dylanharding572010 ай бұрын
Every single website you visit needs to know your IP - consider a web request as sending a letter. If you don't include a return address, the server has no idea where to send the response to.
@erikkonstas10 ай бұрын
There is a legit use for that, but *only for a set period of time!* For example, if you attempted to DDoS RC yourself, they would be very justified in looking through the IPs and banning them all.
@erikkonstas10 ай бұрын
@@Hyper0void That shouldn't be their job tho... "automated server rejoining" and "alt account prevention" are two very different things.
@Gooberter5 ай бұрын
$age is literally the winner in this situation, he was the double agent, snitching everyone out and not only getting out unscathed but also walking away with 100 dollars
@KaijuSheeley8 ай бұрын
8:09 How did you do this i wana do it too
@OverAndOverAndOver10 ай бұрын
2:53 he was trying to ping the guy to show that when the DDoS finally kicked in he could no longer get a response from the IP address, to prove that the DDoS actually occurred
@yusufkhahin11910 ай бұрын
They're obviously not trying to DDoS using command prompt, it's a way of pinging an ip to see responses.