Page 1 of 2 12 LastLast
Results 1 to 25 of 49

Thread: Feds profiling opencarry.org surfers

  1. #1
    Regular Member LovesHisXD45's Avatar
    Join Date
    Jul 2008
    Location
    , Utah, USA
    Posts
    580

    Feds profiling opencarry.org surfers

    This is definitely a little off-topic, but still has a lot to do with OCDO. I have been running some experiments and tests regarding web traffic and packets through my router specifically when I visit opencarry.org, and other sites affiliated with firearms and freedom, etc... So what, you may say.

    Well, my logs will show no intrusion activity against my network most of the day with maybe a few blocked UDP packets and incoming tcp requests here and there, but mysteriously, when I visit this site, and others like it, my logs go ballistic with blocked intrusion attempts against a specific port number from another source that randomly changes its IP address. The attacked port will change from time to time to a different number, but the intrusion is always the same type, and it's blazing fast and many times per minute.

    Does anyone else see this same behavior with your network when you come here, or is it just me? If so, why would that be, and what would be the motive? Maybe the super computer farms of the NSA in Langley are working overtime, aye? Who knows? Makes me uneasy to say the least, however. Where did I put my tin foil hat?
    If it isn't broke, then don't fix it, or you'll fix it until it's broke.

  2. #2
    Regular Member HandyHamlet's Avatar
    Join Date
    Nov 2010
    Location
    Terra, Sol
    Posts
    2,779
    Quote Originally Posted by LovesHisXD45 View Post
    Does anyone else see this same behavior with your network when you come here, or is it just me?
    No need to see it.
    http://www.nytimes.com/2012/02/23/us...ial-media.html



    DHS | March 1, 2012
    Words to get your website on a government watch list - Social media monitoring!


    Angel Clark
    Wilmington Civil Rights Examiner

    Continue reading on Examiner.com Words to get your website on a government watch list - Social media monitoring! - Wilmington Civil Rights | Examiner.com http://www.examiner.com/civil-rights...#ixzz1nxhpqE9G
    "Don't interfere with anything in the Constitution. That must be maintained, for it is the only safeguard of our liberties."
    Abraham Lincoln

    "Some time ago, a bunch of lefties defied the law by dancing at the Jefferson Memorial, resulting in their arrests. Last week, a bunch of them pulled the same stunt and - using patented Lefist techniques - provoked the Park Police into having to use force to arrest them."
    Alexcabbie

  3. #3
    Regular Member Stanley's Avatar
    Join Date
    Feb 2012
    Location
    Reston, VA
    Posts
    375
    Quote Originally Posted by LovesHisXD45 View Post
    Does anyone else see this same behavior with your network when you come here, or is it just me? If so, why would that be, and what would be the motive? Maybe the super computer farms of the NSA in Langley are working overtime, aye? Who knows? Makes me uneasy to say the least, however. Where did I put my tin foil hat?
    From which IP's are these attacks originating? Can you post them?

  4. #4
    Regular Member Contrarian's Avatar
    Join Date
    Sep 2009
    Location
    Seattle,WA, , USA
    Posts
    266

    Question Fbi ?

    Quote Originally Posted by Stanley View Post
    From which IP's are these attacks originating? Can you post them?
    As a sidenote, what port monitoring s/w are you using?

  5. #5
    Campaign Veteran slapmonkay's Avatar
    Join Date
    May 2011
    Location
    Montana
    Posts
    1,267
    Do a reverse look up on the source IP address for the owner information, this can be done from multiple sites (for example: http://ip-lookup.net/).
    I Am Not A Lawyer, verify all facts presented independently.

    It's called the "American Dream" because you have to be asleep to believe it. - George Carlin

    I carry a spare tire, in case I have a flat. I carry life insurance, in case I die. I carry a gun, in case I need it.

  6. #6
    Regular Member Fallschirmjäger's Avatar
    Join Date
    Sep 2007
    Location
    Georgia, USA
    Posts
    3,915
    If I knew how to tell, I'd tell you.

  7. #7
    Regular Member LovesHisXD45's Avatar
    Join Date
    Jul 2008
    Location
    , Utah, USA
    Posts
    580

    More info

    Quote Originally Posted by Contrarian View Post
    As a sidenote, what port monitoring s/w are you using?
    This is also for a response to Stanley.

    The software is Packet Sniffer. http://packet-sniffer.net/
    I also use the freeware edition of packet monitor: http://www.windows7download.com/win7.../gonucnco.html

    Also, I use my router logs a lot. Here is a snip from just a few minutes of being here just to post this reply. The IP address of the attacking host changes on the fly more often than this log capture, almost as if other valid computers are being used by the attacker to "sniff" me out. Every time I try to reverse lookup one of these IP addresses, they are invalid, or the information does me no good because they are most likely DHCP assignments to nodes on a network somewhere and will change on a variable timetable or have been routed through a DNS server. That makes it nearly impossible to determine the actual source. There is no way you are going to track this back the the originator. It's just not going to happen.


    [INFO] Fri Mar 02 13:37:38 2012 Blocked incoming TCP connection request from 192.168.202.99:51470 to 192.168.202.164:80
    [INFO] Fri Mar 02 13:37:35 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:36:59 2012 Blocked incoming UDP packet from 192.168.202.99:52448 to 192.168.202.164:1900
    [INFO] Fri Mar 02 13:36:50 2012 Blocked incoming TCP connection request from 192.168.202.99:51405 to 192.168.202.164:445
    [INFO] Fri Mar 02 13:36:47 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:36:41 2012 Blocked incoming UDP packet from 192.168.202.99:52387 to 192.168.202.164:137
    [INFO] Fri Mar 02 13:36:35 2012 Blocked incoming TCP connection request from 192.168.202.99:51343 to 192.168.202.164:80
    [INFO] Fri Mar 02 13:36:32 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:35:57 2012 Blocked incoming UDP packet from 192.168.202.99:60978 to 192.168.202.164:1900
    [INFO] Fri Mar 02 13:35:46 2012 Blocked incoming TCP connection request from 192.168.202.99:51278 to 192.168.202.164:445
    [INFO] Fri Mar 02 13:35:43 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:35:37 2012 Blocked incoming UDP packet from 192.168.202.99:60917 to 192.168.202.164:137
    [INFO] Fri Mar 02 13:35:31 2012 Blocked incoming TCP connection request from 192.168.202.99:51216 to 192.168.202.164:80
    [INFO] Fri Mar 02 13:35:28 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:34:52 2012 Blocked incoming UDP packet from 192.168.202.99:56715 to 192.168.202.164:1900
    [INFO] Fri Mar 02 13:34:44 2012 Blocked incoming TCP connection request from 192.168.202.99:51151 to 192.168.202.164:445
    [INFO] Fri Mar 02 13:34:41 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:34:34 2012 Blocked incoming UDP packet from 192.168.202.99:56654 to 192.168.202.164:137
    [INFO] Fri Mar 02 13:34:31 2012 Blocked incoming TCP connection request from 192.168.202.99:51089 to 192.168.202.164:80
    [INFO] Fri Mar 02 13:34:28 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:33:53 2012 Blocked incoming UDP packet from 192.168.202.99:64033 to 192.168.202.164:1900
    [INFO] Fri Mar 02 13:33:44 2012 Blocked incoming TCP connection request from 192.168.202.99:51024 to 192.168.202.164:445
    [INFO] Fri Mar 02 13:33:41 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:33:35 2012 Blocked incoming UDP packet from 192.168.202.99:63972 to 192.168.202.164:137
    [INFO] Fri Mar 02 13:33:32 2012 Blocked incoming TCP connection request from 192.168.202.99:50962 to 192.168.202.164:80
    [INFO] Fri Mar 02 13:33:29 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:32:53 2012 Blocked incoming UDP packet from 192.168.202.99:53681 to 192.168.202.164:1900
    [INFO] Fri Mar 02 13:32:44 2012 Blocked incoming TCP connection request from 192.168.202.99:50896 to 192.168.202.164:445
    [INFO] Fri Mar 02 13:32:41 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:32:35 2012 Blocked incoming UDP packet from 192.168.202.99:53620 to 192.168.202.164:137
    [INFO] Fri Mar 02 13:32:07 2012 Blocked incoming TCP connection request from 192.168.202.99:50830 to 192.168.202.164:80
    [INFO] Fri Mar 02 13:32:04 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:31:29 2012 Blocked incoming UDP packet from 192.168.202.99:62943 to 192.168.202.164:1900
    [INFO] Fri Mar 02 13:31:20 2012 Blocked incoming TCP connection request from 192.168.202.99:50729 to 192.168.202.164:445
    [INFO] Fri Mar 02 13:31:17 2012 Above message repeated 1 times
    [INFO] Fri Mar 02 13:31:11 2012 Blocked incoming UDP packet from 192.168.202.99:57250 to 192.168.202.164:137
    [INFO] Fri Mar 02 13:30:44 2012 Blocked incoming TCP connection request from 192.168.202.99:50667 to 192.168.202.164:80

    Kevin
    If it isn't broke, then don't fix it, or you'll fix it until it's broke.

  8. #8
    Regular Member Stanley's Avatar
    Join Date
    Feb 2012
    Location
    Reston, VA
    Posts
    375
    192.168.0.0 is an internal ip range. That's your network. Are you behind a router? Are you on your own network or someone else's? Multiple computers on the network?

    That's all the same IP so I'd check devices on that network and applications. Many handle their own port assignments and even change ports. My torrent program switches ports every 2 minutes so that the ISP can't throttle me.

    As an aside when I, in my youth, port scanned and later during "security tests" we were on rotating IPs. I doubt the NSA would scan from 1 ip.

    Private IPv4 ranges.
    http://en.m.wikipedia.org/wiki/Private_network


    ---
    I am here: http://tapatalk.com/map.php?dkyyhv
    Last edited by Stanley; 03-02-2012 at 04:29 PM.
    "The alternate domination of one faction over another, sharpened by the spirit of revenge, natural to party dissension, which in different ages and countries has perpetrated the most horrid enormities, is itself a frightful despotism. But this leads at length to a more formal and permanent despotism." - George Washington, Farewell Address, 1796

  9. #9
    Regular Member Stanley's Avatar
    Join Date
    Feb 2012
    Location
    Reston, VA
    Posts
    375
    ...
    Last edited by Stanley; 03-02-2012 at 04:27 PM.
    "The alternate domination of one faction over another, sharpened by the spirit of revenge, natural to party dissension, which in different ages and countries has perpetrated the most horrid enormities, is itself a frightful despotism. But this leads at length to a more formal and permanent despotism." - George Washington, Farewell Address, 1796

  10. #10
    Regular Member Motofixxer's Avatar
    Join Date
    May 2010
    Location
    Somewhere over the Rainbow
    Posts
    974
    Uh oh...call the police the Hacker.....IS IN YOUR HOUSE I don't know just trying to through a lil humor into the situation.
    Click Here for New to WI Open Carry Legal References and Informational Videos--- FAQ's http://Tinyurl.com/OpenCarry-WI

    The Armed Badger A WI site dedicated to Concealed Carry in WI

    "To disarm the people... was the best and most effectual way to enslave them." -- George Mason, Speech of June 14, 1788

    http://Tinyurl.com/New-To-Guns to DL useful Info

  11. #11
    Regular Member Michigun's Avatar
    Join Date
    May 2010
    Location
    Michigan
    Posts
    139
    Quote Originally Posted by HandyHamlet View Post
    No need to see it.
    http://www.nytimes.com/2012/02/23/us...ial-media.html



    DHS | March 1, 2012
    Words to get your website on a government watch list - Social media monitoring!


    Angel Clark
    Wilmington Civil Rights Examiner

    Continue reading on Examiner.com Words to get your website on a government watch list - Social media monitoring! - Wilmington Civil Rights | Examiner.com http://www.examiner.com/civil-rights...#ixzz1nxhpqE9G
    It's all in the words lol..


  12. #12
    Regular Member bigdaddy1's Avatar
    Join Date
    May 2009
    Location
    Southsider der hey
    Posts
    1,320
    All joking aside, most people know that the government monitors this site and MANY others. In fact State and Local PD monitor the state postings and some have said that quotes from this site have been used in the courts.

    Thats why spellcheck is so important
    What part of "shall not be infringed" don't you understand?

  13. #13
    Regular Member Fallschirmjäger's Avatar
    Join Date
    Sep 2007
    Location
    Georgia, USA
    Posts
    3,915
    "Hey, you know that thing we were talking about the other day? You know with that guy, and what we were gonna do? Yeah, it's been moved up.
    We're now going to deliver the gift basket while bandit is going for the 18 instead of when he's hooking the fish."

  14. #14
    Regular Member VW_Factor's Avatar
    Join Date
    Nov 2010
    Location
    Leesburg, GA
    Posts
    1,098
    lulz
    Quote Originally Posted by Beretta92FSLady
    I am no victim, just a poor college student who looks to the day where the rich have the living piss taxed out of them.

  15. #15
    Regular Member FMJ 911's Avatar
    Join Date
    Dec 2011
    Location
    People's Republic of Snohomishia
    Posts
    351

    I do funny things!

    When I talk to my friends on Failbook, I talk to the DHS (or whoever they are) in brackets, I say nasty things for them to read, and I play word games! My friends get a huge laugh out of it! They join in as well, and soon, we're having a great one-way conversation with DHS (or whoever reads the stuff).
    "May God have mercy upon my enemies, because I won't." — George Patton

  16. #16
    Regular Member TechnoWeenie's Avatar
    Join Date
    Jul 2007
    Location
    , ,
    Posts
    2,086
    Quote Originally Posted by Fallschirmjäger View Post
    "Hey, you know that thing we were talking about the other day? You know with that guy, and what we were gonna do? Yeah, it's been moved up.
    We're now going to deliver the gift basket while bandit is going for the 18 instead of when he's hooking the fish."
    The package is ready to be delivered.
    Evangelical lessons are provided upon request. Anyone wishing to meet Jesus can just kick in my door.

  17. #17
    Regular Member Fallschirmjäger's Avatar
    Join Date
    Sep 2007
    Location
    Georgia, USA
    Posts
    3,915
    Quote Originally Posted by TechnoWeenie View Post
    The package is ready to be delivered.
    Does the package include pomegranates?

  18. #18
    Banned
    Join Date
    Jan 2012
    Location
    earth's crust
    Posts
    17,838
    April 19 ........ ooooohhhh noooooooooo they're a comin' for me

  19. #19
    Activist Member swinokur's Avatar
    Join Date
    Jun 2009
    Location
    Montgomery County, MD
    Posts
    984
    The CIA is in Langley
    NSA is located at Ft. Meade, MD

  20. #20
    Regular Member Curmudgeon's Avatar
    Join Date
    Jul 2009
    Location
    York, Pennsylvania, USA
    Posts
    306
    [The chair is against the wall.]
    While many claim to support the right to keep and bear arms, precious few support the practice.

  21. #21
    Regular Member LovesHisXD45's Avatar
    Join Date
    Jul 2008
    Location
    , Utah, USA
    Posts
    580

    This is more the stuff I get.

    Quote Originally Posted by Stanley View Post
    192.168.0.0 is an internal ip range. That's your network. Are you behind a router? Are you on your own network or someone else's? Multiple computers on the network?

    That's all the same IP so I'd check devices on that network and applications. Many handle their own port assignments and even change ports. My torrent program switches ports every 2 minutes so that the ISP can't throttle me.

    As an aside when I, in my youth, port scanned and later during "security tests" we were on rotating IPs. I doubt the NSA would scan from 1 ip.

    Private IPv4 ranges.
    http://en.m.wikipedia.org/wiki/Private_network


    ---
    I am here: http://tapatalk.com/map.php?dkyyhv
    [INFO] Sat Mar 03 02:54:29 2012 Blocked incoming UDP packet from 151.70.125.75:31561 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:54:25 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:54:03 2012 Blocked incoming UDP packet from 75.47.2.134:41697 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:53:10 2012 Blocked incoming UDP packet from 151.76.150.130:13339 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:53:06 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:52:38 2012 Blocked incoming UDP packet from 218.238.152.89:61423 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:52:35 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:51:58 2012 Blocked incoming UDP packet from 76.7.23.121:20354 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:51:57 2012 Blocked incoming UDP packet from 83.11.111.5:36261 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:51:55 2012 Blocked incoming UDP packet from 76.7.23.121:20354 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:51:54 2012 Blocked incoming UDP packet from 83.11.111.5:36261 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:50:58 2012 Blocked incoming UDP packet from 94.71.148.21:13701 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:50:55 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:50:55 2012 Blocked incoming UDP packet from 80.116.14.54:18385 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:50:42 2012 Blocked incoming UDP packet from 66.61.105.27:62292 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:50:39 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:49:52 2012 Blocked incoming UDP packet from 151.70.125.75:31561 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:49:48 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:49:11 2012 Blocked incoming UDP packet from 84.229.84.134:22310 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:49:08 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:49:03 2012 Blocked incoming UDP packet from 85.136.227.43:54666 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:49:00 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:48:28 2012 Blocked incoming UDP packet from 151.76.150.130:13339 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:48:25 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:48:06 2012 Blocked incoming UDP packet from 151.70.125.75:31561 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:48:04 2012 Blocked incoming UDP packet from 218.238.152.89:61423 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:48:02 2012 Blocked incoming UDP packet from 151.70.125.75:31561 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:48:01 2012 Blocked incoming UDP packet from 218.238.152.89:61423 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:47:36 2012 Blocked incoming UDP packet from 213.171.51.170:1072 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:47:33 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:47:32 2012 Blocked incoming UDP packet from 83.11.111.5:36261 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:47:29 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:46:51 2012 Blocked incoming UDP packet from 62.198.63.194:34492 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:45 2012 Blocked incoming UDP packet from 218.238.152.89:61423 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:43 2012 Blocked incoming UDP packet from 80.116.14.54:18385 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:42 2012 Blocked incoming UDP packet from 218.238.152.89:61423 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:40 2012 Blocked incoming UDP packet from 80.116.14.54:18385 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:28 2012 Blocked incoming UDP packet from 151.76.150.130:13339 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:25 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:46:05 2012 Blocked incoming UDP packet from 66.61.105.27:62292 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:02 2012 Blocked incoming UDP packet from 218.238.152.89:61423 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:46:02 2012 Blocked incoming UDP packet from 66.61.105.27:62292 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:57 2012 Blocked incoming UDP packet from 83.11.111.5:36261 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:54 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:45:53 2012 Blocked incoming UDP packet from 66.61.105.27:62292 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:48 2012 Blocked incoming UDP packet from 178.128.89.159:12171 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:45 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:45:35 2012 Blocked incoming UDP packet from 83.11.111.5:36261 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:34 2012 Blocked incoming UDP packet from 85.72.153.115:12868 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:31 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:45:06 2012 Blocked incoming UDP packet from 87.1.52.194:20807 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:04 2012 Blocked incoming UDP packet from 80.116.14.54:18385 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:45:03 2012 Blocked incoming UDP packet from 87.1.52.194:20807 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:44:53 2012 Blocked incoming UDP packet from 80.116.14.54:18385 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:44:42 2012 Blocked incoming UDP packet from 66.61.105.27:62292 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:44:39 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:44:03 2012 Blocked incoming UDP packet from 85.136.227.43:54666 to 192.168.202.164:58908
    [INFO] Sat Mar 03 02:44:00 2012 Above message repeated 1 times
    [INFO] Sat Mar 03 02:43:55 2012 Blocked incoming UDP packet from 94.71.148.21:12362 to 192.168.202.164:58908
    If it isn't broke, then don't fix it, or you'll fix it until it's broke.

  22. #22
    Banned
    Join Date
    Jan 2012
    Location
    earth's crust
    Posts
    17,838
    I have a red pencil box

  23. #23
    Regular Member GuidoZ's Avatar
    Join Date
    Jun 2011
    Location
    Skagit County, WA
    Posts
    192
    Yeah, that first capture doesn't mean a bunch by itself, but might after the answers to the following:

    Do you have a BitTorrent client running? The IPs are from many places (TX to Italy to Poland), but all heading to the same UDP port (58908). Also, what operating system are you using?

    It would be good to see what, if anything, is listening on that port. I can help you figure that out, but need to know your OS. (Professional "computer guy" here.)

    --
    Peace. ~G
    Carry weapon: SA XDm .40 SC + 11rd Ranger SXT 180gr

  24. #24
    Regular Member
    Join Date
    Apr 2009
    Location
    , ,
    Posts
    1,187
    Just for the mundane solution, might it be an ad attack? OCDO is like others where you need to watch where you click on the page to duck the sponsors' banners and popups. Could it be a data mining firm tracking traffic to sell statistics to Cabela's?

  25. #25
    Campaign Veteran MSG Laigaie's Avatar
    Join Date
    Jan 2011
    Location
    Philipsburg, Montana
    Posts
    3,137
    john has a long mustache.
    "Firearms stand next in importance to the Constitution itself. They are the people's liberty teeth (and) keystone... the rifle and the pistol are equally indispensable... more than 99% of them by their silence indicate that they are in safe and sane hands. The very atmosphere of firearms everywhere restrains evil interference .When firearms go, all goes, we need them every hour." -- George Washington

Page 1 of 2 12 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •