Skibidi Farms / NoLimitsPedia / Gnarpedia / Totencord / Hutucord / Spawnism / Goyswats / Kastle / UCS / Kiliverse / Dwinny / Thugchan / Zukencord - you will NEVER GUESS what the "IRONIC" PEDOPHILE RING openly admitted to distributing!!!!! 😱😱😱

One more update regarding that UCS-sock account that alleged to have info on Gaterud: it's been brought to my attention that the claimed prior aliases of Gaterud that the sock had posted, as well as some alleged info on his activity prior to UCS, has been posted to his SNCApedia page.

Screenshot_20251228_132637_Brave.jpg
(https://ghostarchive.org/archive/VRPqD)

I should note that the claims in the "microbaby.mp4" and "Miscellaneous Exploits" sections of the article are extremely questionable, as they were originally added by a user marked as a TroopieHarold sock by SNCApedia mods, were later removed in the same edit that the Caleb Munroe face pic was added (by a user marked as an alt of the aforementioned alleged TroopieHarold sock), and then later again re-added by a user that has only edited UCS articles and accused the alleged TroopieHarold sock of attempting to downplay Gaterud's actions, yet somehow also had access to the list of Gaterud's prior aliases that was only publicly available in the UCS-sock's post for a few hours before the account was nuked for CSAM, indicating this user is also UCS and is drawing from the same behind-the-scenes info cache as the UCS-sock. Very bizarre edit history.

Anyway, here are the alleged prior aliases of Gaterud. I haven't done any searches on these aliases yet, so I encourage others to look into them if they so choose:
  • raw
  • yona
  • kkatmane
  • saint
  • sxint

The SNCApedia article also makes mention of a group called FMKUP, which I had totally forgotten the name of but have heard of before, during the aforementioned raid of the VRChat thread by Bubblebowl Tech members posting their own videos to self-promote.

I'm not sure if mods are able to reinstate the FMKUP video that got swept, but my memory of it was a naked fat autistic guy being told by the Discord pedo-gallery to smear shit on himself and write FMKUP on his wall with it, and his mom and/or caretaker comes in at the end to ask wtf he was doing. The FMKUP shitsign was used as a watermark for the group in the intro of the video, which I think also included a Bubblebowl watermark, indicating the video was a collab between the two groups (if I'm not misremembering).

Searching FMKUP brings up this SoundCloud page:
Screenshot_20251228_143255_Brave.jpg
(https://ghostarchive.org/archive/MQEVZ)

The YouTube channel linked in the SoundCloud bio:
Screenshot_20251228_143547_Brave.jpgScreenshot_20251228_143607_Brave.jpg
(https://megalodon.jp/2025-1229-0534-54/https://www.youtube.com:443/channel/UCT95NY7uRNK0Mmy7Sx5lN0w)

This video is interesting, as @sebunsan, one of the users from the Bubblebowl raid in the VRChat thread, is seen within it:
Screenshot_20251228_145822_YouTube.jpg

It also appears a now-privated video on their channel had been saved on PreserveTube in 2024, albeit in very low quality. Why might this have been privated? 🤔

"Samuel Morgan's Myg0t Adventure"​


Screenshot_20251228_144138_Brave.jpg
>catsik

From discussion about the Mao's Destruction video in the Soyjak.Party thread:
Are you steroid or catsik? Aren't you supposed to be grooming kids into murdering their pets and pouring hot wax over their vaginas?
please name the people involved and responsible for the Mao Incident
the people who were involved in the actual grooming part were steroid, catsik, and semen sipper.
I can identify steroid and catsik in the vc.

Very interesting. It seems more and more likely that the person who DM'd me was correct that Bubblebowl and Myg0t appear to be connected, both which each other and with Mao's Destruction.

I, for one, am absolutely shocked that a CSAM distribution group allegedly took inspiration from groups like Bubblebowl and FMKUP. Who could have possibly foreseen that socially engineering children and other vulnerable people into doing destructive and depraved shit on camera would attract people that enjoy abusing children and vulnerable people, like wtf no way how could anybody have guessed that??? 🤯
 
alleged prior alias of Gaterud: kkatmane
SNCApedia Article said:
Originating from Roblox Audio "Com" under the alias kkatmane
Apparently bro was a fucking Roblox larp rapper* :story:
* or whatever the textual equivalent of a lip-syncer is
Screenshot_20251228_224822_Brave.jpgScreenshot_20251228_224903_Brave.jpg

"Kkatmane" is also credited a couple times on this tongue-in-cheek "Thug Hunter Clique" rap album from 2022 made by some Roblox audio-bypass channel:


Track list
1. Intro 0:00
2. SHE FROM MEMPHIS FT PSYCHICMANE, REMYMANE, DIRSA, KKATMANE, JOEHDAH, & PILGRIM (PROD PSYCHICMANE) 0:07
3. IM A GAY ASS FAGGOT (PROD.DJ ORGAZM) 1:52
4. DICK IN MA MOUF (PROD.DJ ORGAZM) 4:25
5. ME & DJ ORGAZM (PROD.DJ ORGAZM) 4:47
6. IF U DIDNT KNO BITCH FT GUNSH0TZ (PROD.ISVVC) 5:06
7. GAY TYPE NIGGA FT COLDPHONK (PROD.???) 7:22
8. FUKK MA BUTT FT GUNSH0TZ (PROD.DJ.SACRED) 10:21
9. ALL MA NIGGAZ GAY (PROD KKATMANE) 12:38
10. GRAB HIS AZZ FT GUNSH0TZ (PROD.SLICKKILLA) 13:58
11. MANIAC FT GUNSH0TZ (PROD.???) 15:15
12. BUTCHASHOP FT GUNSHOTS (PROD.SLICKKILLA) 16:53
13. FUCK ANAKIN (PROD ???) 18:37
14. RAPING BITCHES (EPIK AND GUNSH0TS) (PROD ???) 20:14
15. WHERE AM I? FT EPIK (PROD KEVINTHECREEP) 21:36
16. Outro

If you want a better idea of what a "Roblox audio-bypass" even is, this 2021 video shows off many examples, many of which were done in part by Kkatmane and contain his own audio watermark:


7251266237 - With a Choppa | NASCARALOE | 1CXYYY | GARZIES | ELK_JXMES
7251459341 - Last Friday Night | BUBIS MUM | BUBI | 1CXYYY | TRIPSZ | 4MILKU | ALXNYARDS | GOTHICSLASHA
7436033075 - Troll EMOS | 1CXYYY | KKATMANE
7315643043 - Drop Out | 1CXYYY | ELK_Jxmes
7315796414 - Regular Show *REALLY LOUD* | 1CXYYY | ELK_Jxmes
7471586972 - Just the two of us REMIX | 1CXYYY | KKATMANE
7477807403 - Didn't Ask, Don't Care, Plus You're White | 1CXYYY
7484771063 - Love nwantiti Remix | 1CXYYY
7510771490 - Cat s song LOL | 1CXYYY |KKATMANE | ROTTENLEO

7254867039 - Wasted DIGGA D | 1CXYYY | ELK_Jxmes
7685133488 - FRAUDD DISS | 1CXYYY | KKATMANE
7746779053 - Wonderwall Remix | 1CXYYY (LOUDED CLEAN I THINK)
8050957192 - You'll Get Over It | 1CXYYY + KKATMANE
8074206967 - LOUDEST ISLAND BOY AUDIO | 1CXYY
8152817332 - FNAF 2 SONG LOL | 1CXYYY | KKATMANE
8144517057 - Whatuworried4? | 1CXYYY | ELK_JXMES | KKATMANE (QUIET BUT STILL LOUD ENOUGH)
8169379004 - Drama P4RKR & Come IDK | Puppylover58 | Movieman223
8195321130 - Dancing in the moonlight | 1CXYYY | KKATMANE | ELK_JXMES
8205101208 X MADE BY KANEYMANE AND ABSTRACTMANE X PALASLAMPIC BY UZIKILLA
8141548653
8141855934
8150022025 - Apashe - Lacrimosa (linistra x 4Supra x Jul0x) LOUD AF
8150431407
8150615834
8150784293 - Pandora - Unicorn on keta (linistra x 4Supra x Rasmuds) LOUD AF
8150920627 - Rare Phonk (linistra x 4Supra x Cynicamane)
8151111209
8151243698
8151557856
8092491333 - maglonia roblax
6813322158 - sofaygo
5194271353 - turutururururu
5528845476 - shorty
4734410902 - rave
6986115938 - castaways
7267157432 - SICKO MODE
7260091963 - rere
4471266332
4925609885
7883534664
7976208074 - 1nonly x lilbubblegum - ash kaashh
8151473633 - best friend - essenceisdead (linistra x 4Supra x skylinekits) LOUD AF BYPASSED

From the sampling of Kkatmane bypasses in the above list, it seems like he was friends (or at least frequent collaborators) with another bypasser by the name of 1CXYYY. Curious if he knows what his friend went on to get involved in, if Kkatmane is indeed Gaterud.

I ran across this YouTube documentary about Roblox audio bypassing, which the description says is a reupload from someone else who took it down, so I'm gonna archive it here for posterity's sake.

 
Last edited:
Apparently bro was a fucking Roblox larp rapper* :story:
* or whatever the textual equivalent of a lip-syncer is
Looks like there's an old (and most likely inaccurate) dox of Kkatmane posted on November 13, 2021. The listed address is in the UK though.
1766997279168.png

There's also this Vimeo account which is the original source of the supposed picture of him that's been going around.
1766996713582.png

EDIT:
Makes you think...
Screenshot 2025-12-28 11.56.14 PM.png
 
Last edited:
Anyway, here are the alleged prior aliases of Gaterud. I haven't done any searches on these aliases yet, so I encourage others to look into them if they so choose:
  • raw
  • yona
  • kkatmane
  • saint
  • sxint
I've been lurking in this thread awhile, decided to research Gaterud's "kkatmane" alias. Searching breaches for that username, I found an OGUser marketplace account with his username and email. The associated email "asspoop700@gmail.com" has been involved in some other breaches on Deezer and stressing.ninja, the former lists his location as GB aka Great Britain. Notice that OGU and stressing.ninja are both com related.
1766986578247.png
=== Results for username: kkatmane ===
# Definitive Matches (1)

source: OGU
categories: com,hacking
uid: 441628
username: kkatmane
email: asspoop700@gmail.com
ip: 86.9.33.10
domain: gmail.com
|
| source: Deezer
| categories: music,media
| country: GB
| email: asspoop700@gmail.com
| username: Poop.Ass
| firstname: Poop
| lastname: Ass
| gender: M
| language: en
| registration_date: 2018-08-04 00:00:00.0000000
| name: Poop Ass
| domain: gmail.com
|
| source: stressing.ninja
| categories: hacking,com
| uid: 6951
| username: Dx6X
| email: asspoop700@gmail.com
| password: f06cbba25338ccf482cee6f8a39dce6
| domain: gmail.com

The IP for OGU points to England, which lines up with the Deezer breach and the fact that he's British. Searching for this IP presented some more interesting information, emails with "kkatmane" in the address: "kkatmanekkatmane@gmail.com" and "bnotkkatmane@gmail.com". Interestingly enough, the results included 2 Discord accounts from a RestoreCord breach. Servers that are prone to getting banned (such as com servers or ones involving anything illegal) often use RestoreCord to preserve their userbase in case their server is ever terminated, something Gaterud would probably use.
1766988888739.png
=== Results for ip: 86.9.33.10 ===
# Definitive Matches (14)

source: e.rip
categories: social,com
uid: 23138
email: kkatmanekkatmane@gmail.com
username: ??????
ip: 86.9.33.10
domain: gmail.com

source: Restorecord
categories: discord,gaming,restorecord
discordid: 914277700695363667
username: rawington
tag: 0
ip: 86.9.33.10
date: 2023-11-15T19:27:58.092Z

source: RestoreCord.com (IPs - 2) 2024
categories: discord
no: 200863
discordid: 518147375877849118
discordname: eqrt#0
ip: 86.9.33.10
date: 2023-06-29

source: RestoreCord (2024)
categories: gaming,discord
id: 818762
discordid: 914277700695363667
username: rawington
discriminator: 0
ip: 86.9.33.10
date: 2023-11-15T19:27:58.092Z

source: RestoreCord (2024)
categories: gaming,discord
id: 187911
discordid: 914277700695363667
username: fastestpitbull23
discriminator: 0
ip: 86.9.33.10
date: 2023-08-05T04:52:38.153Z

source: Restorecord
categories: discord,gaming,restorecord
discordid: 914277700695363667
username: fastestpitbull23
tag: 0
ip: 86.9.33.10
date: 2023-08-05T04:52:38.153Z

source: breached.vc
categories: com,hacking
uid: 222272
username: regi
email: bnotkkatmane@gmail.com
password: $argon2id$v=19$m=65536,t=4,p=1$YmF1dTJrZEo2TWk3RWpkUA$n1PeHzayE7idYviDPcL4zT7HM5qf+IGs5FnDTZb2oeQ
salt: Mr4VXRIF
ip: 185.195.232.249,86.9.33.10
domain: gmail.com

source: RestoreCord (2024)
categories: gaming,discord
id: 200863
discordid: 518147375877849118
username: eqrt
discriminator: 0
ip: 86.9.33.10
date: 2023-06-29T00:39:38.068Z

source: RestoreCord.com (IPs - 2) 2024
categories: discord
no: 818762
discordid: 914277700695363667
discordname: rawington#0
ip: 86.9.33.10
date: 2023-11-15

source: e.rip
categories: social,com
uid: 23137
email: kkatmanekkatmane@gmai.com
username: ??????
ip: 86.9.33.10
domain: gmai.com

source: Restorecord
categories: discord,gaming,restorecord
discordid: 518147375877849118
username: eqrt
tag: 0
ip: 86.9.33.10
date: 2023-06-29T00:39:38.068Z

source: OGU
categories: com,hacking
uid: 441628
username: kkatmane
email: asspoop700@gmail.com
ip: 86.9.33.10
domain: gmail.com

source: RestoreCord.com (IPs - 2) 2024
categories: discord
no: 187911
discordid: 914277700695363667
discordname: fastestpitbull23#0
ip: 86.9.33.10
date: 2023-08-05

source: Restorecord.com (IPs) 2023
categories: discord,private
username: rawington
ip: 86.9.33.10
isvpn: False
timestamp: 2023-11-15
discordid: 914277700695363667

One of the Discord accounts (ID: 914277700695363667) went by the username "fastestpitbull23" in August of 2023, but then later went by "rawington" in November, the latter username could be related to his "raw" alias. Another thing to note is that the IP address of these accounts (86.9.33.10) is in or near Warrington, England, which is similar to the "rawington" username. The other Discord account (ID: 518147375877849118 ) goes by the username "eqrt".

I managed to find another email containing kkatmane from a wildcard search, "kkatmanekksssatmane@gmail.com", which was part of a Doxbin breach.
1766993337213.png
=== Results for email: kkatmanekksssatmane@gmail.com ===
# Definitive Matches (2)

source: doxbin.com
categories: hacking,com
id: 50396
username: clickerclicker
email: kkatmanekksssatmane@gmail.com
password: $2y$10$i2DYF1Z/nguD6otEQCTN4exzYJ.23rieFbveoP9PpsyYrRYD8FDDK
session: d6862c3eb87bfec4bbf51a5ae18ecc53
sess_end: 1641026288981
comments: 0
pastes: 1
joindate: 1640421488981
last_seen: 1640421488981
role: 0
admin: 0
profile_pic: NULL
has_small_profile_pic: 0
mod: 0
bio: NULL
council: 0
followers: 0
following: 0
tfa_enabled: 0
tfa_forced: 0
tfa_secret: NULL
tfa_auth: 0
tfa_session: NULL
tfa_timestamp: NULL
tfa_added: NULL
tfa_locked: 0
has_name_color: 0
name_color: NULL
name_css: NULL
name_changes: 0
profilesync: 1
likes_given: 0
likes_received: 0
dislikes_given: 0
dislikes_received: 0
domain: gmail.com

source: DoxBin Users (2025)
categories: doxing,com,hacking
id: 50396
username: clickerclicker
email: kkatmanekksssatmane@gmail.com
domain: gmail.com

The username for the Doxbin account was "clickerclicker", and the single paste on it is interesting:
AUDIO MAKER 1CXYYY DOX _ Doxbin.png
Link
░█████╗░██╗░░░░░██╗░█████╗░██╗░░██╗███████╗██████╗░
██╔══██╗██║░░░░░██║██╔══██╗██║░██╔╝██╔════╝██╔══██╗
██║░░╚═╝██║░░░░░██║██║░░╚═╝█████═╝░█████╗░░██████╔╝
██║░░██╗██║░░░░░██║██║░░██╗██╔═██╗░██╔══╝░░██╔══██╗
╚█████╔╝███████╗██║╚█████╔╝██║░╚██╗███████╗██║░░██║
░╚════╝░╚══════╝╚═╝░╚════╝░╚═╝░░╚═╝╚══════╝╚═╝░░╚═╝
██████╗░░█████╗░██╗░░██╗██╗░░██╗███████╗██████╗░
██╔══██╗██╔══██╗╚██╗██╔╝╚██╗██╔╝██╔════╝██╔══██╗
██║░░██║██║░░██║░╚███╔╝░░╚███╔╝░█████╗░░██║░░██║
██║░░██║██║░░██║░██╔██╗░░██╔██╗░██╔══╝░░██║░░██║
██████╔╝╚█████╔╝██╔╝╚██╗██╔╝╚██╗███████╗██████╔╝
╚═════╝░░╚════╝░╚═╝░░╚═╝╚═╝░░╚═╝╚══════╝╚═════╝░
██╗░░░██╗░█████╗░██╗░░░██╗
╚██╗░██╔╝██╔══██╗██║░░░██║
░╚████╔╝░██║░░██║██║░░░██║
░░╚██╔╝░░██║░░██║██║░░░██║
░░░██║░░░╚█████╔╝╚██████╔╝
░░░╚═╝░░░░╚════╝░░╚═════╝░
1CXY DOX SHIT ON








IP : 45.61.167.23
HOUSE : 59 The Chase, Seven Arches Rd, Brentwood CM14 4JJ
MOTHERS NAME : CHIO TOCKS
DADS NAME : PAUL TOCKS
HIS NAME : JOSH TOCKS



HIS DISCORD 1CXYYY#0001
GET DOXXED KID

Despite collaborating often, it seems Kkatmane and 1CXYYY had a falling out and Kkatmane decided to dox him.

A month prior, someone posted a fake dox on Kkatmane (GGs @spitefulmutant for posting about it before me), none of the info seems to line up (not sure about the Discord username or terminated Roblox account) and the Facebook links are all obvious jokes leading to random Africans and Indians.
kkatmane audiomaker dox _ Doxbin.png
Link
lives at : 3 Andrew Cl
his facebook: https://www.facebook.com/friends/suggestions/?profile_id=100040213293070
mother :https://www.facebook.com/ama.dapaah.758
roblox name : kkatmane
best friends are 1cxy and leo and elk_jxmes
and more
(reason for dox)
(he said i was a newgen)
his ip :89.02.21.64
his brother : https://www.facebook.com/profile.ph...udDoyNzg5NjcyMzcxMDk3NDBfMjc5MzM2NDgwNDA2MTQ5
gender : male (i think)
roblox avatar : https://www.roblox.com/users/112981308/profile
mom works at : Market Pl, Braintree CM7 1ES
dad works at : Chadwick Dr, Braintree CM7 2AL
░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░
░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒
░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒
░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒
░░░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒
░░░░░░░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒
░░░░░░ ░░ ░░ ░░ ░░░░░░░░░░▒▒▒▒▒▒░░░░▒▒▒▒▒▒
░░░░░░░░▓▓██▓▓▒▒░░░░ ░░ ░░▒▒▓▓▓▓██▓▓▓▓▓▓██▓▓▒▒▒▒▒▒
░░▒▒░░░░░░░░▒▒▒▒░░░░░░ ░░████████░░░░░░░░░░░░░░▒▒▒▒▒▒
░░░░░░░░ ░░▒▒▓▓▓▓ ▓▓██▒▒░░ ░░░░░░░░░░░░░░▒▒▒▒▒▒
▒▒░░░░ ░░░░▓▓ ▓▓░░░░ ░░░░ ░░░░░░░░▒▒▒▒▒▒
▒▒░░░░ ░░░░ ░░░░ ░░░░░░░░░░░░░░▒▒▒▒▒▒
▒▒░░░░░░ ░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒
░░░░░░░░░░ ░░░░░░░░ ░░░░░░░░░░▓▓██████▓▓░░░░▒▒▒▒▒▒▒▒
░░░░░░░░▒▒██████████░░ ░░░░░░████████████████░░▒▒▒▒▒▒▒▒
░░░░░░░░██████████▓▓▓▓ ░░░░░░██████████████▓▓░░░░░░▒▒▒▒
░░░░░░░░░░▓▓██▓▓▒▒░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒
░░░░░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒
░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒
░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒
░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░░░░░░░▒▒▓▓
░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▓▓
░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒▒▒
░░░░░░░░░░░░ ░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒▒▒
░░░░░░░░░░░░ ░░░░░░░░░░░░░░░░░░░░░░▒▒▒▒░░▒▒
▒▒ ▒▒▒▒░░ ░░ ░░░░░░░░░░░░░░░░░░░░░░██░░▒▒▒▒
▒▒░░░░██░░ ░░░░░░ ░░░░▒▒░░░░░░░░░░░░░░░░▓▓▓▓░░▒▒▒▒
░░░░░░▓▓▒▒ ░░██▓▓▓▓▓▓▓▓░░░░░░░░░░░░░░▒▒██▒▒░░▒▒
░░░░ ░░██▒▒ ░░▒▒▓▓▓▓▒▒░░▓▓▓▓▓▓░░░░░░░░░░▓▓██▒▒▒▒▒▒▒▒
░░░░ ░░▓▓▓▓▓▓▒▒▓▓▓▓▒▒▓▓░░░░▒▒▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓▓░░▒▒░░▒▒▒▒
░░░░ ░░░░▓▓▓▓▓▓▓▓▓▓▓▓░░ ░░██▒▒▓▓▓▓▓▓▒▒░░░░▒▒░░▒▒▒▒
░░░░░░ ░░ ░░░░██▒▒▒▒▒▒▒▒▓▓▓▓▓▓░░░░░░░░░░▒▒░░░░▒▒▒▒
░░░░░░ ░░░░ ░░░░░░░░░░░░▒▒▒▒▒▒░░▒▒▒▒
░░░░░░░░░░░░░░░░ ░░░░░░▒▒░░▒▒▒▒░░▒▒▒▒
░░░░░░░░░░ ▒▒▓▓▓▓██▒▒░░░░░░░░▒▒░░▒▒▒▒
░░░░░░░░░░░░░░ ██████░░░░░░░░▒▒░░▒▒▒▒
░░░░░░░░ ▓▓██▓▓░░░░░░░░▒▒▒▒▒▒▒▒
░░░░░░░░ ░░▓▓████░░░░░░░░▒▒▒▒▒▒
░░░░░░░░░░▓▓██▓▓░░░░░░▒▒▒▒░░
░░░░░░░░██████░░░░░░▒▒
░░░░░░▓▓████▒▒░░▒▒
░░░░▒▒████▒▒▒▒
░░██▓▓░░

his discord : kkat#3937

age : 19

Some notable info that could be accurate is the claim that his "best friends are 1cxy and leo and elk_jxmes".

Upon searching the email kkatmanekkatmane@gmail.com, I found some good info, but more importantly a familiar face...
kkatmanekkatmane@gmail.com2025-12-28 - 20_15_11 - OSINT _ Reverse Email Lookup.png
{
"checker": {
"battle.net": true,
"ubisoft.com": true,
"pixlr.com": true,
"vimeo.com": true,
"fiverr.com": true,
"replit.com": true,
"twitter.com": true,
"dehashed.com": true,
"codeacademy.com": true,
"eneba.com": true
},
"github": [
{
"Login": "realassog",
"Id": "137887625",
"Profile Image": "https://avatars.githubusercontent.com/u/137887625?v=4",
"Profile Link": "https://github.com/realassog",
"Names": [
"realassog"
],
"Created On": "2023-06-27T10:20:17Z",
"Updated On": "2023-06-27T10:20:17Z",
"Followers": "0",
"Following": "0"
}
],
"google": [
{
"Full Name": "jack green",
"Profile Image": "https://lh3.googleusercontent.com/a-/ALV-UjXxWzV9WIrLfJ5kWQnSDGcF4EuOQzgl0pVM5fjXPUc891QWYwE",
"Last Updated": "2025/01/17 05:20:44 (UTC)",
"Id": "112274135200265365546",
"Google Maps": "https://www.google.com/maps/contrib/112274135200265365546",
"Google Plus": "https://web.archive.org/web/*/plus.google.com/112274135200265365546*"
}
],
"chesscom": [
{
"Username": "kkat22",
"Country": "United Kingdom",
"First Name": "kkatmane",
"Last Name": "kkatmane",
"Created on": "2023-02-03 18:34:48",
"Last Login": "2023-02-03 18:34:49",
"Is Premium?": "False",
"Verified?": "False",
"Profile Image": "https://images.chesscomfiles.com/uploads/v1/user/238593981.9ba72ee2.200x200o.394ee3f6ea77.jpg",
"Points": "0"
}
],
"dropbox": [
{
"Display Name": "Jack Green",
"Familiar Name": "Jack",
"Id": "dbid:AADsh3n83uyb04UHQrEDmqrZNeM37BPpmF4",
"Disabled": "False",
"Email Verified": "True"
}
]
}

The supposed facedox of Gaterud that is up on SNCApedia is the same profile picture for Kkatmane's Chess.com account, which hasn't been touched since early 2023 (same picture that @spitefulmutant found on his Vimeo account which is probably the one linked to this email) . Oddly enough, the name "Jack Green" appears multiple times, both from Dropbox and Google, which does not match up with the supposed Caleb Munroe name. His Github has a single forked project (a) which is a BetterDiscord theme, I don't know if there are any screen captures that Gaterud took of his Discord but if it matches this theme then it could be a link.

A search on the "bnotkkatmane@gmail.com" email doesn't yield as much:
bnotkkatmane@gmail.com OSINT _ Reverse Email Lookup.png
{
"checker": {
"amazon.com": true
},
"google": [
{
"Full Name": "Ashton Green",
"Profile Image": "https://lh3.googleusercontent.com/a-/ALV-UjVks5w_8lMUlp2mCFTTxwIZaFTii8GHF-28Cfa7iapM_KWXKw",
"Last Updated": "2024/12/01 01:39:57 (UTC)",
"Id": "110825491969022749646",
"Google Maps": "https://www.google.com/maps/contrib/110825491969022749646",
"Google Plus": "https://web.archive.org/web/*/plus.google.com/110825491969022749646*"
}
],
"private_lookup": [
{
"Email": "bnotkkatmane@gmail.com",
"Username": "regi (BreachForums.to)"
}
]
}

This email has "Ashton Green" listed under the name for Google, different first name but same last name as Jack Green from the previous email.

Search for the "asspoop700@gmail.com" led to some other info:
assOSINT _ Reverse Email Lookup.png
{
"checker": {
"ea.com": true,
"battle.net": true,
"replit.com": true,
"twitter.com": true,
"activision.com": true,
"amazon.com": true
},
"google": [
{
"Full Name": "Oliver Harris",
"Profile Image": "https://lh3.googleusercontent.com/a-/ALV-UjVA8MhGWR7Bw5WQZXDRVpLJTBW3_xLTEDalt7ok8kC3ZRoGtvQ",
"Last Updated": "2025/03/19 09:07:02 (UTC)",
"Id": "108837825501442502508",
"Google Maps": "https://www.google.com/maps/contrib/108837825501442502508",
"Google Plus": "https://web.archive.org/web/*/plus.google.com/108837825501442502508*"
}
],
"private_lookup": [
{
"First Name": "Poop (Deezer)",
"Last Name": "Ass (Deezer)",
"Language": "English",
"Country": "United Kingdom",
"Ips": "_binary V !\\ ",
"Email": "asspoop700@gmail.com",
"Username": [
"Poop.Ass (Deezer)",
"kkatmane (OGUsers 2022)",
"Dx6X (StressingNinja)"
],
"Gender": "Male",
"Name": "kkatmane (Trello)"
}
],
"apple": [
{
"emails": [
"asspoop700@gmail.com"
],
"phones": [
"••••• ••••17"
]
}
],
"ea": [
{
"Display Name": "qetqteq23",
"Unique Name": "qetqteq23",
"Nickname": "xxfire256xx",
"User ID": "1005808248119",
"Profile Image": "https://eaavatarservice.akamaized.net/production/avatar/prod/userAvatar/49468479/208x208.PNG",
"Owned Games": [
"Plants vs. Zombies Garden Warfare 2"
],
"Friends": [
"Tylermcfc200"
]
}
],
"github": [
{
"Login": "p1xxxxx12",
"Id": "76916687",
"Profile Image": "https://avatars.githubusercontent.com/u/76916687?v=4",
"Profile Link": "https://github.com/p1xxxxx12",
"Names": [
"p1xxxxx12"
],
"Created On": "2021-01-03T18:24:20Z",
"Updated On": "2023-11-02T15:46:40Z",
"Followers": "0",
"Following": "0"
}
]
}

This email has an entirely new name under the Google account, "Oliver Harris". Their Google maps account is active, but not public.
1767005202368.png

The most interesting part, however, is the Github username "p1xxxxx12", let me explain why. Kkatmane has a Minecraft account (a) with a long history of names:
xoxoxoxoxoxoxooo Minecraft Player Profile — Crafty.png
14. xoxoxoxoxoxoxooo | September 11th 2024
13. Ethereum_Edward | June 25th 2024
12. TheTransGoddes | February 13th 2024
11. rawington | October 30th 2023
10. rarararawraw | August 27th 2023
9. fagb | June 14th 2022
8. kkatmane | April 28th 2022
7. i_snog_boys | March 5th 2022
6. k_kat | September 29th 2021
5. fagd | June 26th 2021
4. ttqa | May 9th 2021
3. p1xxxx | February 2nd 2021
2. p1x69 | December 23rd 2020
1. p1x_MC | First Username

This isn't a complete history of names, he's hidden his name history on NameMC and Laby which have more names, but it's still most of them. Nonetheless, this account has gone by kkatmane, k_kat, rrarararawraw, and rawington, all connected to the alleged Gaterud aliases. If you look at the third name, "p1xxxx", it's very similar to the Github username p1xxxxx12 on the asspoop email.

Asspoop email is also connected to a Trello account by the name of kkatmane, I don't see any activity on it though.
trello.png
"Trello": {
"Data": [
{
"Avatar": "https://trello-members.s3.amazonaws.com/61b349599ee31d5ad7de9f1a/ed727a5583a3579816657628149b3574",
"Email": "asspoop700@gmail.com",
"Full Name": "kkatmane",
"Username": "kkatmane",
"Url": "https://trello.com/kkatmane"
}
],
"Description": "Trello is a cloud service for managing teams and projects. At the beginning of 2024, the base of this service containing more than 15 million users was laid out at one of the forums. Data includes the name, mail, user nicknames and links to their profiles. The data was probably obtained using parsing."
}

Hopefully I've provided some information of value, I admire the effort everyone puts into this thread, especially Sprate Header and Jonkinator.
 
After your post I was curious so I also ran the 'kkatmane' username for breach data and located a few potentially new-ish usernames associated with it on another site. However, these results were for an IP in France in October, 2023. (Hudson Rock data)

1767042118483.png
email: nolanzazoui@gmail.com
Roblox login: v1963v4624v1337v0101
usernames: nnolan, GatoTapesII, GatoTapesI, GatoTapesW, GatoGGz, GatoTapesIV, GatoTapesIII, GatoTapesV
 
Last edited:
Fellas Farm was online for a brief moment, so I was able to capture one of the recent threads there. Apparently the downtime is caused by a DDoS.
They are still hosted with iHostART in Romania, latest IP 45.137.99.45. I suspect it's not directly with Calin (iHostART) operator, but rather through a reseller Kyun.host, where historically these freaks ran their operations from.

1767053436455.png
1767055225316.png

They have moved to TFD for now, which also has a thread dedicated to Fellas Farm downtime
1767053484730.png
 
Last edited:
The SNCApedia article also makes mention of a group called FMKUP, which I had totally forgotten the name of but have heard of before, during the aforementioned raid of the VRChat thread by Bubblebowl Tech members posting their own videos to self-promote.
A little bit more regarding this FMKUP group's alleged involvement with Mao's Destruction.


Back in December 2024, one month after this thread was created, raidz (@plusone) and Wickerkid (@Stalker Cell) both shared exported chatlogs from their Discord server via their sock accounts:
Private chats of NoLimitsPedia or Gnarpedia
Here's the the downloadable catbox file, which contains the bulk of the messages
(relevant export also attached at bottom of post)

Within this export, there was the following conversation about Mao's Destruction:
Screenshot_20251231_221314_Brave.jpgScreenshot_20251231_221334_Brave.jpgScreenshot_20251231_221408_Brave.jpg

The important part, between raidz and Boymoder764:
Screenshot_20251231_221551_Brave.jpg

That $FMKUP$ YouTube channel link that raidz shares is the same as the "Fob's Family" channel discussed previously:
Screenshot_20260101_210654_Brave.jpg
(https://archive.ph/cK0Em)

Additionally, the user that DM'd me following the UCS-sock attempting to spam CSAM, made the claim that the fake "sprate header" BitChute channel (formerly "sharty degenerates") was not just owned by Vladicrez / Maximus Attilus / Solomon Henderson (the Antioch shooter), but that Solomon was also part of the group behind Mao's Destruction:
Another thing you guys haven't figured out is Vladicrez / Maximus Atillus, the guy who actually orchestrated Mao's Destruction and made it known to the sharty is Solomon Henderson, the Antioch Shooter. You can compare his voice with the Sprate Bitchute owned by Vladicrez and also this. Someone apperanlty has never released VCs of Solomon talking about the Mao shit and even him in call with Foodistzen but i can't confirm if they exist or not.

Now while I haven't fully looked into the claims about Solomon specifically, I can safely say this channel was certainly affiliated with the Mao's Destruction group:
Screenshot_20260101_211942_Brave.jpg (a)
Screenshot_20260101_212031_Brave.jpg (a)

And hey, would you look at that!
Screenshot_20260101_212207_Brave.jpg
>Fob's Family
>FMKUP


This is the video in question, and besides a distinct similarity to the tactics used in the Bubblebowl videos (and the voices in the VC sounding very similar to those in BBT's videos, tho idc to actually go and do a direct comparison to double check), there isn't anything within the video itself that's relevant to the sharty or 764 or SF that I can tell:


That's all for now, just highlighting some more evidence of the Myg0t sphere's connection to the Skibidi Farms orbit.
 

Attachments

After your post I was curious so I also ran the 'kkatmane' username for breach data and located a few potentially new-ish usernames associated with it on another site. However, these results were for an IP in France in October, 2023. (Hudson Rock data)

View attachment 8350851
email: nolanzazoui@gmail.com
Roblox login: v1963v4624v1337v0101
usernames: nnolan, GatoTapesII, GatoTapesI, GatoTapesW, GatoGGz, GatoTapesIV, GatoTapesIII, GatoTapesV
Can you clarify how GatoGGz is connected to kkatmane? The asspoop700@gmail.com email actually has results on Hudson Rock, and they do not line up with the data for GatoGGz. The usernames, passwords, IP, OS, and computer names are completely different.
{
"message": "This email address is associated with a computer that was infected by an info-stealer, all the credentials saved on this computer are at risk of being accessed by cybercriminals. Visit https://www.hudsonrock.com/free-tools to discover additional free tools and Infostealers related data.",
"stealers": [
{
"total_corporate_services": 0,
"total_user_services": 7,
"date_compromised": "1978-07-22T06:24:06.343Z",
"computer_name": "DESKTOP-29I2JBF",
"operating_system": "Windows 10 Pro",
"malware_path": "Not Found",
"antiviruses": "Not Found",
"ip": "86.9.**.**",
"top_passwords": [
"c*********9",
"c************9",
"c*********8",
"C*********9",
"0************D"
],
"top_logins": [
"",
"a*********@gmail.com",
"x**x",
"l****z",
"p****x"
]
}
],
"total_corporate_services": 0,
"total_user_services": 7
}
Link | Archive

The fact that this data is on Hudson Rock means the uncensored stealer logs are probably out there, so I started searching and found something interesting on Leakcheck:
calebmunro9.png
{""password"":""calebmunro9"",""source"":{""name"":""Stealer Logs"",""breach_date"":null,""unverified"":0,""passwordless"":0,""compilation"":1},""origin"":[""accounts.google.com"",""discord.com"",""www.facebook.com""],""email"":""asspoop700@gmail.com"",""fields"":[""password"",""origin"",""email""]}]}

One of the passwords in the stealer logs from the Hudson Rock data is "calebmunro9", and Caleb Munroe is allegedly Gaterud's real name. While it's only one password, if you look back at the Hudson Rock data most of the passwords are variations of a string of characters starting with "c" and ending in a number. I'll keep digging for additional stealer log data, but I think it's going to be more of the same.

I did find one more unique breach while searching the asspoop email from the Plutonium forum, which is for a Call of Duty mod launcher by the same name:
kkatmanezombies.png
{""id"":""QTMDN4wYsioyXSbHHasI_forum.plutonium.pw"",""email"":""asspoop700@gmail.com"",""password"":"""",""full_name"":"""",""username"":""kkatmane"",""ip_address"":""86.9.33.10"",""phone_number"":"""",""hash"":"""",""other_fields"":null,""sensitive_fields"":null,""source"":{""name"":""forum.plutonium.pw"",""date"":""""}}]}

Also, I noticed that the hashed out username in the Hudson Rock data "p****x" is probably his old Minecraft username "p1xxxx", so I searched it and got more results from a different set of stealer logs, and they seem more likely to be related.
{
"message": "This username is associated with a computer that was infected by an info-stealer, all the credentials saved on this computer are at risk of being accessed by cybercriminals. Visit https://www.hudsonrock.com/free-tools to discover additional free tools and Infostealers related data.",
"stealers": [
{
"total_corporate_services": 1,
"total_user_services": 74,
"date_compromised": "2024-05-28T17:22:45.000Z",
"stealer_family": "StealC",
"computer_name": "PC",
"operating_system": "Windows 10 Pro",
"malware_path": " C:\\Windows\\SysWOW64\\explorer.exe",
"antiviruses": [],
"ip": "95.70.***.**",
"top_passwords": [
"8********c",
"8**********.",
"1**********.",
"8**********r",
"a********9"
],
"top_logins": [
"v********@gmail.com",
"v*******m",
"s*********@gmail.com",
"s********e",
"b***********@gmail.com"
]
},
{
"total_corporate_services": 0,
"total_user_services": 7,
"date_compromised": "1978-07-22T06:24:06.343Z",
"stealer_family": "UNKNOWN",
"computer_name": "DESKTOP-29I2JBF",
"operating_system": "Windows 10 Pro",
"malware_path": "Not Found",
"antiviruses": "Not Found",
"ip": "86.9.**.**",
"top_passwords": [
"c*********9",
"c************9",
"c*********8",
"C*********9",
"0************D"
],
"top_logins": [
"",
"a*********@gmail.com",
"x**x",
"l****z",
"p****x"
]
}
],
"total_corporate_services": 1,
"total_user_services": 74
}
Link | Archive

While the only connecting characteristics are the p1xxxx username and OS type, the logs could be related as they were (more than likely) from different malware and collected at separate times. A search on Leakcheck for p1xxxx gave some interesting info:
p1xxxx.png
Results:
leakcheck:
success:
Yes
quota: 999999
found: 2
result:
password:
852456123c
source:
name:
Stealer Logs
breach_date: Not available
unverified: 0
passwordless: 0
compilation: 1
username: p1xxxx
origin:
holliganbet914.com
fields:
password
username
origin
source:
name:
Stealer Logs
breach_date: Not available
unverified: 0
passwordless: 0
compilation: 1
username: p1xxxx
password: 0551caleb0551D
origin:
users.nexusmods.com
fields:
username
password
origin

Not entirely sure what to think about the holliganbet914.com log, it's some random Turkish casino (might've been something else, didn't put too much research into it). The more interesting log is for Nexus Mods, where the p1xxxx account has the password "0551caleb0551D", another password containing the name Caleb.
 
Last edited:
I’ve investigated a bit further.

It seems that Caleb/Gaterud isn’t very imaginative, I’ll blame that on the autism. You mentioned a name he used ‘Ashton Green’.

Ashton’s Green is an area of St Helen’s. St Helen’s is midway almost between Manchester and Liverpool.

You say his IP address points to the Warrington area. Well, Ashton’s Green/St Helen’s is approximately only 9 miles from Warrington.

The amount of clues Caleb is giving about where he lives is ludicrous to the point where I could eventually knock on the door and show his mum some of the evidence I’ve gathered of his grooming antics.
 
Pretty damn solid confirmation this is him.
Bad news is that now he's probably wiping as much info as he can. Since his previous password "calebmunro9" was leaked, I ran a breach search on it:
calebmunro9search.png
{
"Alien TxtBase": {
"Data": [
{
"Email": "calebmunro992@gmail.com",
"Password": "[NOT_SAVED] "
},
{
"Email": "calebmunro992@gmail.com",
"Password": "[NOT_SAVED] ",
"Url": "accounts.google.com/signin/v2/challenge/pwd"
},
{
"Email": "calebmunro992@gmail.com",
"Password": "calebmunro9 "
},
{
"Email": "calebmunro992@gmail.com",
"Password": "calebmunro9 ",
"Url": "accounts.google.com/signin/v2/challenge/pwd"
}
],
"Description": "At the beginning of 2025, a huge collection of logs was published in the ALEN TXTBASE telegram channel. The data in it were collected using stylers - viruses stolen by login and passwords stored in browsers. The collection contained 23 billion lines, but among them there were many duplicates, as well as signs of generation. After removing duplicates and notes from NAZ.api and other similar leaks, 2.8 billion unique records remained. They contain mail, phones, nicknames, IP addresses, passwords in open form and the name of sites or installed applications in which they were used."
},
"Unique emails by Addka": {
"Data": [
{
"Email": "calebmunro992@gmail.com "
}
],
"Description": "In September 2024, the user with the nickname Addka72424 posted a list of e -mail at the BreachForums forum, which were collected by him from many different leaks. The 70GB base contained 3.2 billion unique mail, however, more than 90% of them had previously found in the largest leaks and collections. After their removal, about 270 million addresses remained, which were indexed for search."
}
}

This presented another potential email, "calebmunro992@gmail.com", which can be confirmed as his by running another search:
calebmunro992@gmail.com.png
{
"checker": {
"battle.net": true,
"ea.com": true,
"spotify.com": true,
"activision.com": true
},
"ea": [
{
"Display Name": "p1xx_xx"
}
],
"private_lookup": [
{
"Email": [
"calebmunro992@gmail.com",
"calebmunro992@gmail.com "
],
"Password": [
"[NOT_SAVED] ",
"calebmunro9 "
]
}
]
}

The display name for the EA account appears to be a variation of the "p1xxxx" username that he seems to often use. The associated Gmail account for this email was deleted, no results for a Google account despite Gmail being the email provider. At the least, this email does have Hudson Rock data:
{
"message": "This email address is associated with a computer that was infected by an info-stealer, all the credentials saved on this computer are at risk of being accessed by cybercriminals. Visit https://www.hudsonrock.com/free-tools to discover additional free tools and Infostealers related data.",
"stealers": [
{
"total_corporate_services": 1,
"total_user_services": 90,
"date_compromised": "1980-11-29T23:00:00.000Z",
"computer_name": "FiercePC",
"operating_system": "Windows 11 Home (10.0.22631) x64",
"malware_path": " C:\\Windows\\Installer\\Razer\\Installer\\1616400465TlKqDEvyRazerCentral_v7.3.32.173.exe",
"antiviruses": [
"Windows Defender"
],
"ip": "67.208.**.**",
"top_passwords": [
"[*********]",
"R***********@",
"R***********6",
"R**********@",
"R**********6"
],
"top_logins": [
"t*************@gmail.com",
"t***********0",
"t**********0",
"t*******c",
"l*********@gmail.com"
]
}
],
"total_corporate_services": 1,
"total_user_services": 90
}
Link | Archive

Now while the data in this result doesn't line up with the previously connected Hudson Rock data, this data does seem to be much more recent given you ignore the often incorrect "date compromised" line. The OS is a newer version of Windows than previous data, and searching for the email on IntelX reveals stealer logs strictly from late September 2024 to early July 2025 (I don't have access to IntelX rn, if someone else does please send the txt files). The uncensored IP (67.208.52.64) can also be found from IntelX simply by the title of the resulting txt files:
Intelligence X.png
Link | Archive

Wasn't able to find any relevant breaches from the IP, it is geolocated in England however just like the previous 2 IPs. This'll have to wait until I or someone else gets access to these logs.

Based off the asspoop700@gmail.com Hudson Rock data, I assumed one of the other censored passwords was "calebmunro8", so I searched it and got an intriguing result:
hojzd.png
"Alien TxtBase": {
"Data": [
{
"Username": "hojzd",
"Password": "calebmunro8 ",
"Url": "roblox.com"
}
],
"Description": "At the beginning of 2025, a huge collection of logs was published in the ALEN TXTBASE telegram channel. The data in it were collected using stylers - viruses stolen by login and passwords stored in browsers. The collection contained 23 billion lines, but among them there were many duplicates, as well as signs of generation. After removing duplicates and notes from NAZ.api and other similar leaks, 2.8 billion unique records remained. They contain mail, phones, nicknames, IP addresses, passwords in open form and the name of sites or installed applications in which they were used."
}

Upon searching this username on Roblox, I got confirmation from the search cache that this was Kkatmane even though the account is terminated:
Roblox.png
Link: https://www.roblox.com/users/1711701592/profile
Roblox UserID: 1711701592

Note that the username doesn't match the one from the Roblox UK drill larping videos (ripkkatmane), and the userID doesn't match the one from the Kkatmane fakedox either.
 
It also appears a now-privated video on their channel had been saved on PreserveTube in 2024, albeit in very low quality. Why might this have been privated? 🤔
>Fob's Family
there's a video on the fake sprate header channel with this title Fob's Family Tech Support, with the hashtags #soyjak and #trihard and from the little I can tell from the video it seems to be a bunch of skiddies related to soycords at the time.
 
From discussion about the Mao's Destruction video in the Soyjak.Party thread:
adding onto the current information on the 'farms about Catsik, he also went by tobbex764
1767677781198.png
along with that uploading DD audio to youtube
Catsik is a janjan of the nuQAFE
1767678080204.png
1767678214990.png
he was probably bullied offline both due to threats of being arrested and getting 'oxxed, the only really "unthumbnailed" image of this that still exists is this
1767678166972.png
he was also responsible for cucking LUCKY, owner of Hamoodbox (whose soysphere antics potentially predate Hamoodbox's existence) who would spam the sharty with pro-kuz shit in 2021, of his discord e-kitten known as k3k who later doxxed Catsik potentially.
1767678530513.png
Something to note about is the whole groomcord tosses released on May 14 along with the imgur stuff, it was all a slapfight between butthurt LUCKY after all his online friends abandoned him along with his girlfriend.
1767678673783.png.webp
1767678701350.png
more about lvcky and hamoodbox can be found here
if you want to go down the rabbithole of groomercord heavily implore you look at the /test/ board of the sharty on archive.today and this link
 
They are still hosted with iHostART in Romania, latest IP 45.137.99.45. I suspect it's not directly with Calin (iHostART) operator, but rather through a reseller Kyun.host, where historically these freaks ran their operations from.
im uninterested in this 175 page long dramafag thread but please email abuse@kyun.host and/or dm me personally at @naph777 on telegram or @naphtha:kyun.host on matrix if any illegal content is being hosted on kyun. iirc this specific website has been terminated before for not moderating their content (leaving illegal content up for days)
 
Back
Top Bottom