[SELECT ALL] Code:
// Name: KevblazeHMG
// Date: 27/01/2015
// Reason: Hax jump exploit
// Server: <> Bang Splat
// Proof: http://demo.waka.ac/bs/20150127_2225_waka.ac_CTF_ac_tripoli.dmo
68.67.247.x
setmr 9
I didnt know that the whois command show the full ip on that server. I got it with the geoip script :P sorry about that.
[SELECT ALL] Code:
// Name: FotherMucker
// Date: 28/01/2015
// Reason: Flyhack
// Server: some xW
// Proof: http://fs.aox-ac.net/uploads/146232833.20150128_FotherMucker%20-%20flyhack_ac_desert_10min_OSOK.dmo (demo)
101.191.52.124
setmr 9 Demo