Server Attack against StopICE.net traced to local CBP Agents Personal Server -- StopICE Server Attack against StopICE.net traced to local CBP Agents Personal Server
by Stop ICE Alerts Network JAN 31, 2026


On Jan 30, a server attack attempted to target stopice.net and queue false text alerts from our downstream carrier to our platform. The attack was quickly isolated and neutralized.

We’ve also traced the source of this attack back to a personal server associated with a CBP agent here in SoCal. 

(he did not do a good job covering his tracks, nor did his associates.)

Leaked names and addresses of subscribers?

No, stopice.net does not store this information, nor does it ever ask or request this information from users. Anyone claiming to have breached such information is spreading is attempting to spread rumors in attempt to gain social media fame and clout.

Over 500 DDOS attempts in a single day (and counting), and stopice.net remains online and alerts are still going out to communities across the country.

We have traced the source of the attack.

Apparently, these “hackers” are aren’t too well versed in how to navigate even a basic attack, either that or they are just too sloppy. Or both. It was easy to throw them bait (garbage data, fake API keys, etc) which they immediately grabbed revealing plenty of information related to their location, networks, phone numbers, names, and so forth.

Additionally, we are providing a list of IP’s and networks (including various VPN’s and servers) used by several attackers here, https://www.stopice.net/counterattack
This is a public log that is updated daily. Feel free to use it for your own follow-up how you see fit, and your own traffic containment strategies.

We will also be including phone numbers, names and profiles of those who’ve attempted to attack and flood our system, along with those who have attempted to send multiple death threats to the developer.

We are also aware of several posts circulating online claiming others have written bots to submit fake reports to the alert system and plate tracker. We were well aware of this before the “attackers” publicly posted online about it once again looking for fame and clout. None of these attempts were successful. But they can keep trying. We appreciate the free pentesting ;)

Was the developer “Doxxed?”

No. Information about the developer, Sherman Austin has been widely public for some time. A simple 30 second google search will reveal this. However that didn’t stop self-proclaimed “hackers” along with a weird cult of MAGA twitter trolls from somehow claiming victory for “exposing” the founder and developer.

Several claims of “DOXXING” the founder / developer of stopice.net were made online when in fact all these people did was repost public information hat has been on google for years, even decades.

A temporary list of filenames were revealed, how did this happen?

Before yesterday’s attack there was an automatic update on our web server back-end management tool (WHM). After this update, certain application-header settings were automatically overwritten which was found to be a little suspicious, but also suspected as a horrible discrepancy with WHM. These settings were not critical security components but a layer to prevent unwanted snooping on temporary garbage file names that get purged from the server each hour. It’s expected some of these file names were viewable but also very limited compared to the overall database of well over half a million users behind encryption. We are still looking into why these settings were removed, but this is where the short snowball in the attack started, which was quickly neutralized.

What if someone gains access to my Stopice.net account? Can they see my location and personal information?

No. Stopice.net does not store nor request any addresses, names or personal information from subscribers. Additionally, anyone who might happen to log into your account (including yourself) cannot view the number associated with that account. Stopice.net does not track users GPS locations, as explained on our site, StopICE calculates polar coordinate distances between zip codes verses exact locations.


Stopice.net remains online & functional, and has not been “overrun.”  Please be aware of false rumors being spread by MAGA trolls, and others looking for a “hot moment” to generate clicks and views through spreading misinformation.

Yesterday’s attack was confirmed to originate from the same source last month that attempted to disrupt alerts (unsuccessfully) on Stopice.net moments before CBP agents arrived and raided a nearby Home Depot.




Every day we neutralize a variety of DDOS, brute-force, and flooding attacks against our server. At the same time increasing rhetoric from DOJ and DHS is threatening come after us to stop the effective work we and others do.

But we are still here.

Stopice.net remains online , and we intend to keep it that way.  

Stopice does not utilize or store GPS tracking details for users, but instead calculates polar coordinate distances between zip codes to determine how alerts are sent and received to an area. An additional “location assist” option is available for those who want to share their current location when in an unfamiliar area, but this is optional.

These functions are in place to prevent users potentially leaking their location and to protect anonymity. Additionally, you do not need to sign up for an account to send an alert, view real-time feeds, comment feedback, search plates or view real-time alert maps. 

While practicing good opesec can help preserve user privacy and anonymity, it’s important to remember platforms such as Instagram, FB, Google, and TikTok do not. These platforms store and routinely share your geolocation data and other user details with third-parties and law enforcement upon request.

Always be mindful about what you post, and how you handle and carry information between platforms. Utilizing end-to-end encrypted email providers such as Protonmail and messaging apps such as Signal and Briar can help secure your day-to-day communications.  

Remember: 
You have a constitutional right to videotape, photograph and report on the activities of law enforcement. This includes police, federal agents, and whoever these masked “secret police” claim to be. 

StopICE.net will continue to operate as a nationwide alert system. With over a half-million subscribers and counting, we continue to scale up this work, both digitally and directly on the ground in the community. 

Stay aware, stay alert, be vigilant. 
Report ICE activity directly from your phone at WWW.STOPICE.NET / @stopicenet 
Text “JOIN” to 877-322-2299 to get local alerts
Text “REPORT” to send an alert
Text “RADAR” w/ zipcode to check ICE activity nearby


commenting as GUEST3506

Server Attack against StopICE.net traced to local ..
0 comments | 1249 views
Trump Border Czar Wants to Create Database of Anti..
2 comments | 1429 views
Trump threatens to invoke the Insurrection Act in ..
0 comments | 664 views
Armed Black Panthers Protect Anti-ICE Rally..
10 comments | 1639 views
Venezuela Defense Minister Says Armed Forces Will ..
1 comments | 730 views
Trump Withdraws National Guard After Loss to Supre..
0 comments | 847 views
DOJ Says Filming ICE Raids is 'Domestic Terrorism'..
3 comments | 1019 views
32 Year Anniverary of Zapatista Uprising..
3 comments | 614 views

RaiseTheFist Network
Stop ICE Alerts | Contact | Donate
system status
(v2.2)
Are you a current or former immigration enforcement officer who was instructed to take part in, or witnessed illegal / unconstitutional operations from your unit? Share anonymously.

DISCLAIMER
StopICE.net operates in the interest of free speech and is protected under the First Amendment. Information shared on this platform, including mobile alerts dispatched to subscribers, reports shared on StopICE.net, The Stop ICE Mobile Alert System, and connected social media accounts is intended for reporting purposes only in the interest of upholding transparency, and not intended to encourage or promote illegal activity of any kind.
Questions? Contact