? Hi Russell, below are the four URL links I found on Bes Vending (company) Google Apps, Sites web page. I added the web page hearder details and two internal URL address that when I query seached I obtained internal IP adddress (1) Company Intranet Internet Explorer---- --Home%22=20 Type---Company Intranet URL Address File:///C:/Documents%20and%20Settings/Teresa/Desktop/3D%22http://sites.google.com/a/organic-city.com/intranet/Home%22=20 Internet Explorer-----COM/INTRANET/HOME%22=20 File File Protocol ---- --Protocol (2) Employee Profile Intranet Explorer---- --Home%22=20 Type---COM/JKRAUS/HOME%22=20 File Protocol--------Protocol ADDRESS URL --- File:///C:/Documents%20and%20Settings/Teresa/Desktop/3D%22http://sites.google.com/a/altostrat.com Below URL describes Bes Vendng compromising folder from my desktop vsllrf "FBI" (3) File://C:\Documents and Settings\Teresa\Desktop\FBI\3D%22http:\sites.google.com\a\besvending.com%22 Ctrl+Click to follow link URL Link describes my desktop as Be’s Google Apps Domain Contact—suggesting my desktop is the domain owner of Be’s Web site (4) Mhtl:file//C:\Documents and Settings\Teresa\Desktop\Google Apps bes.mht!https//www.google.com/a/besvending.com/Domain Contact?CPanel Ctrl+Click to follow link Below Google Apps Web Site "Header" details Subject: Emailing: Google Apps. From: Subject: Google Apps Date: Mon, 30 Apr 2012 16:48:06 -0500 MIME-Version: 1.0 Content-Type: multipart/related; type="text/html"; boundary="----=_NextPart_000_0000_01CD26F1.04280D80" X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.6157 This is a multi-part message in MIME format. ------=_NextPart_000_0000_01CD26F1.04280D80 Content-Type: text/html; charset="utf-8" Content-Transfer-Encoding: quoted-printable Content-Location: https://www.google.com/a/besvending.com/ServiceLogin?service=CPanel&continue=https%3A%2F%2Fwww.google.com%2Fa%2Fbesvending.com%2FManageAccount&cpbps=1&passive=true =EF=BB=BF Query Search below URL "Host" server found in header details, I also obtain Bes Google Apps IP address many pages further below I find additional internal IP addrseses and corresponding URL addreses http://urlquery.net/index.php (1) www.google.com/a/besvending.com/ServiceLogin?service Second URL address I find in the Google Web Site "View Source" I capture Google sites URL (2) http://sites.google.com/a/besvending.com" ----------------------------------------- Russell when we discussed those two IP address that were static corporate Google IP address and conclusion they were most likely Google Apps business IP addresses--- one was my daughters, one was my Ex’s It’s my Ex’s company. My Ex is tracking me and my two girls using Google Apps sites, hiding behind our Gmail addresses/identity When my daughter entered my AOL with a Gmail address she said Dad gave it to her--that when I checked the IP and sure enough oit was static Corproate--I just needed reasurance it was Google Apps and you answered my question, yes it is. As far as obtaining my Ex's Google Sites web site---one day I was reviewing a document on my desktop and it suddenly prompted to my desktop and I saved in a saved as web page. And on it I find the URL address I described How he stated all this--At divorce I sold my 50% company to my Ex. Without my knowledge he took corporate control of my Gmail, computer and cell phone and as I purchased the marital home he was able to take control of my Time Warner with an Overlay Network (Telephony) -- Technically it is called Cyberstalking--rather dreadful way to have to live--but most as a Mom it’s important this stop these crimes and know my girls are internet safe, webcam, audio, GPS I now understand with the "Overlay" network his abilities are enormouse in tracking whatever, whenever and whereever we are. How I found the Overlay Network? I purchased a new computer, router and disallowed all port 443 connections. One night my internet shut down. When it came back up I used my computer command prompt "Netstat” command prompt -ano | find ":443" 1000's of 443 IP established connections stated to run--it ran steady for three days--Interesting of all the IP addresses, there were only 10 actual IP's They ran in very distant patterns, sequences. One IP was Northern Telecom defining to the Overlay network referred as "Backstage" Overlay network is running over my Time Warner" so Time Warner would never pick it up on their side. I first knew March 2011--After studied every day and I learned the technology, took me long time but eventually I knew where to look and I knew how to take screen shot pictures as static evidence--so much is running within network browsers--usually private log-in browser--Gmail, Ao, even my Netflix Computer Log-in page. I used my computer F12 Development tool--you can actually see the web apps, a Mobile cloud Device pushing static data--in my case to a Company “Face Book Cross Domain Proxy Server” my ex’s third party content provider Google Apps accepts. Over time I have a four year chronological report untangling the web--it is amazing how the cloud works-- I didn’t find the Overlay Network until this past November 2015 (4 ½ years later). When I talked to Wis DOJ they asked why my Ex would have such sophisticated technology--it is beyond normal--well so is cyberstalking--I simply stated “You would have to ask him.”