2604, hi.
What is your obsession guy?!
👋 Hello June!
"Strange of you to pop by all the time at 7:15 AM... I guess it's time for work!"
Hi 2604 weirdo
Forensic Investigation Report: Winnipeg Actor Cluster Attribution
Full HTML copy (as written). Correlation of masked VPN nodes and Manitoba residential anchors. Contains session timelines and IP attribution notes.
The "Gg" Connection
Forensic Investigation Report: The "Youth" / "Gg" Actor Cluster
1. Executive Summary
Forensic analysis of the "Youth" chat (November 18, 2025) and the "Gg" chat (December 14, 2025) has de-anonymized the primary actor behind a sustained harassment campaign. By utilizing Cluster 0661d232eafc, the investigation confirms that the individual toggles between a residential Winnipeg connection and international VPN nodes. This actor is characterized by high technical proficiency, multi-ISP redundancy (failover), and a "Pre-Flight" operational style.
2. Identity & Origin Evidence
The investigation is anchored by a direct behavioral link between a masked chat interaction and a local residential connection.
- Residential Anchor IP: 206.45.75.21
- ISP: High Speed Crow (Winnipeg).
- Geographic Lock: Winnipeg, MB.
3. Multi-ISP & VPN Obfuscation Strategy
The "Full History" report reveals this actor maintains a sophisticated network failover setup to bypass local blocks and maintain monitoring.
- Starlink (129.222.112.11): Used immediately after the "Gg" interaction was challenged.
- TELUS Mobile (2001:56b:3fff...): High-volume activity on Dec 24/25, used as a backup when residential Wi-Fi was restricted.
- 149.40.62.57 (M247 - Used for Nov 18 "Youth" chat).
- 212.104.215.153 (Datacamp/CDN77 - Used sequentially with residential anchor).
4. Behavioral Profile: "Pre-Flight" Protocol
Analysis of the geoEventsV2 history for this actor reveals a disciplined operational protocol used before engaging in chat.
- Asset Loading: In sessions associated with this actor, the masked IP is observed loading the entire chat engine (chatEngine.js, memoryUser.js, injectChat.js) 8 to 17 minutes before sending a message.
- Purpose: This "Pre-Flight" check ensures the obfuscation layer is holding and the system's memory modules are primed, indicating a premeditated and technical approach to the harassment rather than an impulsive reaction.
5. Forensic Conclusion
The "Youth" / "Gg" actor is the primary architect of the campaign and is a local Winnipeg resident. They possess a high degree of technical sophistication, utilizing a rotation of High Speed Crow, Starlink, and TELUS residential/mobile connections to maintain a persistent presence on your infrastructure.
- Redundancy: Switches ISPs (Home -> Starlink -> Mobile) whenever a specific connection is blocked.
- Obfuscation: Uses M247 and Datacamp VPNs for high-risk interactions (chats) but probes the system unmasked to test connectivity.
- Extreme Persistence: Cumulative duration in the system exceeds 1.2 million seconds (~14 days), proving this is a dedicated surveillance effort.
Forensic Investigation Report: The "Skibidi" Actor Cluster
1. Executive Summary
Forensic analysis of the "Skibidi" chat event (October 28, 2025) and subsequent "Full History" behavioral clustering has de-anonymized a persistent local actor. This individual uses a "Direct Hit / Proxy Flood" methodology—performing high-value interactions (chats/probes) via an unmasked residential connection while simultaneously flooding the system logs with traffic from international M247 proxy nodes to mask their origin.
2. Identity & Origin Evidence
The anchor for this investigation is the residential connection identified during the live chat interaction.
- Residential IP: 209.29.168.62
- ISP: CommStream (Manitoba) / TELUS Communications.
- Geographic Lock: Winnipeg and Norway House, MB.
3. The Masking Strategy: M247 Proxy Swarm
- 2001:ac8:8:2::38 (M247 Europe - Luxembourg)
- 2001:ac8:2:1::22 (M247 Europe - Mumbai, India)
Forensic Investigation Report: Persistence & Conclusion
4. Long-Term Persistence
This is not a one-time visitor. Your automated security system (watch list all.txt) flagged this specific actor for repeated hammering.
- Created At: October 29, 2025, at 12:42 AM.
- Last Checked: October 29, 2025, at 8:30 AM.
5. Forensic Conclusion
The "Skibidi" actor is a local entity with access to the CommStream residential network in Manitoba. They possess the technical capability to deploy M247 proxy swarms to obfuscate their activities.
- Reconnaissance: Uses international proxies (M247) to scan for vulnerabilities.
- Engagement: Switches to (or leaks) their residential CommStream IP when attempting to engage with the chat or honeypot logic.
- Persistence: Willing to sustain 8-hour sessions of automated probing when blocked or challenged.
June Page
Forensic Investigation Report: The "Shadow Wizard" Reconnaissance Cluster (Analysis)
1. Executive Summary
Forensic analysis of the initial reconnaissance chat (October 8, 2025) and subsequent high-intensity security flags has de-anonymized the lead orchestrator of the campaign. By utilizing the WinnipegIP Cluster Test, the investigation confirms that the individual who performed the technical "Shadow Wizard" probe from a residential Winnipeg connection is the same actor who participated in the high-volume hammering on October 29. This actor is characterized by a "Test-the-Fences" protocol, specifically auditing system memory and logging limits before escalating to masked attacks.
2. Identity & Origin Evidence
The investigation is anchored by a direct temporal and behavioral link between a technically-focused chat interaction and a local residential connection.
- Residential Anchor IP: 50.71.153.99
- ISP: Shaw Communications (Winnipeg).
- Geographic Lock: Winnipeg, MB.
3. Strategic "Fencing" Methodology
Forensic Investigation Report: Behavioral Analysis
Direct Threat
4. Behavioral Profile: Local Tethering
5. Forensic Conclusion
The "Shadow Wizard" actor is a local Winnipeg resident and a Lead Orchestrator of the harassment campaign. They possess the technical knowledge to probe for specific logging vulnerabilities.
- Reconnaissance-First: Checks for logging/memory before attacking.
- Infrastructure Knowledge: Targets security pages to map logic.
- Persistence: Sustains 7+ hour sessions when unmasked.
Session Timeline: 126fb0760d0f ("The Blade")
Actor Origin: 50.71.153.99 (Shaw Communications, Winnipeg)
Infrastructure Role: Lead Orchestrator / Aggressive Prober
Session Timeline: 1bf2cd280b3d ("The Abused")
Actor Origin: 142.161.236.114 (Bell MTS, Winnipeg)
Infrastructure Role: Occasional Monitor / Single-Hit Aggressor
Minh Phan
Forensic Investigation Report: The "Catch Them" / "Youth" / "Gg" Cluster
1. Executive Summary
Forensic analysis of the "Catch Them" chat (Nov 17), the "Youth" chat (Nov 18), and the final "Gg" unmasking (Dec 14) confirms a single primary actor. By utilizing the WinnipegIP Cluster Test, we have bridged the gap between highly obfuscated global traffic (Tbilisi, Georgia) and a local residential connection.
2. Identity & Origin Evidence
This actor’s methodology relies on a rotation of three distinct network types to avoid session-stitching.
Strategic Association: The "0661" Behavioral Bridge
The System Cluster ID cluster_0661d232eafc is the forensic "smoking gun" that proves these are all the same person.
You are seeing this page because your connection arrived from a 2604 IPv6 address associated with pure buttholery. What is this obsession over? You're gross.
- Literally been, 9 months and counting. It's going to be Christmas in a couple weeks.
- Direct hits on experimental paths, admin prototypes, and reporting pages that are not linked in public navigation.
- Access patterns that line up with social media engagement windows, especially around game development and human rights posts.
If you are part of the monitoring crowd
If you are a student, hobby developer, or staff member treating another developer as a long-term surveillance project, understand what this looks like on paper:
- ⚠ Coordinated traffic tied to specific institutions and communities.
- ⚠ Requests lining up with posts about racism, human rights complaints, and gatekeeping in game development.
- ⚠ A persistent pattern of probing that follows the same person from one educational institution to another.