How to block imsi catcher. For one, encryption isn’t always required.
How to block imsi catcher. csv-- The output file.
How to block imsi catcher Classic “IMSI-catchers” simply record nearby IMSIs, and then don’t interact with their target phones in a significant way beyond that. How might IMSI catchers be used at a protest? The police can use IMSI catchers to identify who was at a protest, by capturing the IMSI numbers of all the phones that were in its vicinity at that protest. An IMSI catcher is an intrusive piece of technology that can be used to locate and track all mobile phones that are switched on in a certain area. Cell-site simulators operate by conducting a general search of all cell phones within the device’s radius, in violation The IMSI catcher masquerades as a base station and logs the IMSI numbers of all the mobile stations in the area, as they attempt to attach to the IMSI-catcher. This can cause the battery to drain quickly. They work by analyzing the signals in the airwaves and identifying anomalies that suggest a potential threat. -- imsi. I can confirm that GSM 6 days ago · How to say imsi-catcher in English? Pronunciation of imsi-catcher with 1 audio pronunciation, 1 translation and more for imsi-catcher. Feb 10, 2015 · What is an IMSI Catcher? An IMSI catcher (more popular as Stringray in the United States) is a simple man-in-the-middle attack device that masquerades as a local cellphone tower. py script. /!\ This program was made to understand how GSM network work. This IMSI acts like a digital fingerprint for your phone on the mobile network. washington. All development is fully open-source under GPL v3+ and located in an official GitHub repository . They mimic a cellular tower and trick nearby phones into IMSI catchers can capture your IMSI and other information, such as your phone number, device model, and encryption keys, by sending fake signals that mimic the network. For modern smartphones using LTE frequencies, IMSI catchers can do even more sophisticated attacks, since these phones have more advanced encryption and security measures than previous generations Oct 12, 2015 · If the cipher used for encrypting u = (p , SQN, salt) has the block length 128, then embedding the same p in the successive RAN Ds can be randomized by the 48-bit long SQN and a 46-bit long salt Jan 3, 2025 · IMSI Catcher Detectors are specialized tools designed to detect the presence of IMSI Catchers in the vicinity. The IMSI is used in any mobile network that interconnects with other networks. Jul 20, 2021 · To maximize portability and minimize the cost of the IMSI Catcher, we have assembled and successfully tested in the field an all-in-one battery-powered IMSI Catcher consisting of one Raspberry Pi 4 Model B, two USRP B210, and two low-cost SPF5189Z Low Noise Amplifiers (LNAs) (see Fig. Once run, it should reveal IMSI, TMSI, Country, Brand, Operator, MCC, MNC, LAC, and CellID. Not for bad hacking ! - luwangg/IMSI-catcher-2 imsi. IMSI catchers compel gadgets to transmit at faster speeds and consume more power. It’s a pretty safe bet that both Signal (for the iPhone) and Redphone (for Android) defeat the IMSI catcher’s wiretap capabilities. In an effort to protect privacy, all subsequent communication to that base station is done with a random Temporary Mobile Subscriber Identity (TMSI) number. imsi filter will only show packets that contain IMSI numbers. By posing as a fake cell tower, it tricks nearby mobile devices into connecting with it, allowing the operator to capture the International Mobile Subscriber Identity (IMSI) and other key information. The data that it sniffs is not personally identifiable information unless cross referenced with data from the MNOs of which you will not have access to. Mar 18, 2022 · IMSI catchers work by intercepting the traffic from all phones in an area. IMSI catchers simultaneously deploy a man-in-the-middle (mitm) attack, presenting the fake mobile phone to the genuine base station and the fake base station to the actual mobile phone. For security IMSI numbers are usually only transmitted when a connection to a new cell tower Jun 28, 2019 · Section 3. txt-- filtered IMSI's captured are appended here to read by convert_to_csv. kœ+ÆÙh 9ãbb d˜ fˆ †É We have all seen in the movies, where the bad guy's mobile get tapped and the feds listen in on their plans. IMSI Catchers: Blazing Comets in the Cybercrime Space. IMSI stands for International mobile subscriber identity and is a unique number that identifies a cell phone SIM card in GSM (2G) mobile phone systems. Android IMSI-Catcher Detector AIMSICD • Fight IMSI-Catcher, StingRay and silent SMS! View on GitHub Download . A third way to prevent or mitigate IMSI catcher attacks is to use countermeasures and protection techniques that can block or disrupt the fake base stations. IMSI catchers steal your cell phone's IMSI information to record your phone calls. It only captured IMSIs from devices, as well as provides some The X-CATCHER is designed as a Custom-Build-Your-Own 4G LTE or 2G GSM IMSI Catcher. EFANI. IMSI catchers can be mounted on people, cars or airplanes that can spy on entire cities at once. What can a hacker do with an IMSI c The most effective defense against these threats is to block the signals that IMSI catchers rely on. IMSI-catchers used to be expensive and only available to law-enforcement. Note: For technical communication only, use is permitted by local law. It’s a bit easier to read through than with Wireshark, and also matches the IMSI to a specific network operator, brand, and country. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service Usage: simple_IMSI-catcher. py -s Jul 1, 2017 · [07/20/20 Note: Before you contemplate how to catch one IMSI catcher with another, you need to consider the physical environment in which call interception takes place. txt) or read online for free. To identify potential IMSI-catchers, they rely on four anomalies: Reporting to be at a fake location (as you mentioned) Broadcasting at unusual channels; Supporting different features from regular towers However, it can work with only old phones and old GSM technology. Cell-site simulators are also used by criminals to send Nov 4, 2022 · www. Disable 2G on a jailbroken device, living in a region with actual 5G coverage, or always utilizing a Virtual private network while connecting to mobile data are all strategies to safeguard oneself from Sep 13, 2023 · Cell-site simulators (CSS)—also known as IMSI Catchers and Stingrays—are a tool that law enforcement and governments use to track the location of phones, intercept or disrupt communications, spy on foreign governments, or even install malware. For almost two decades now, law enforcement around the world have been using IMSI catchers (aka Stingrays Sep 19, 2023 · With BTS Hunter, you can proactively safeguard your cellular network from potential threats and unauthorized activities (for example IMSI Catchers). Cellular Interception Solutions help law enforcement authorities to acquire, intercept, analyze and manage cellular communications such as voice, SMS, and Call Related Information (CRI) data. Jul 25, 2023 · Understanding IMSI Catchers. At a basic level, an IMSI catcher – also known as a cell-site simulator, fake cell tower, rogue base station, StingRay or dirtbox, to name a few of its many descriptors – consists of two main parts: a radio frontend for sending and receiving radio waves and a network backend for simulating a cellular core network. Jul 25, 2023 · By doing so, the IMSI catcher can identify individual users by their unique International Mobile Subscriber Identity (IMSI) number that is used by wireless networks for authentication purposes. The police can deploy IMSI-Catchers to obtain data from of everyone holding a cell phone, determinating Jul 12, 2024 · While not all IMSI catchers have this capability, those used by military and intelligence agencies often possess the advanced functionality to infect targeted phones. Support ☕ ️ MONERO Aug 6, 2018 · Some IMSI catchers can also block service so you can no longer use your phone to make or receive calls and text messages – even for emergency calls. The SeaGlass researchers aim to find the location of IMSI-catchers via anomaly detection at a city scale: https://seaglass. What is an IMSI catcher(2). Beside that, you can also use a stingray tracking app. When it comes to location tracking, IMSI catchers can be even more invasive by collecting GPS data and other information about where users have been and what they were Dec 13, 2021 · This is the Git pull folder containing the simple_IMSI-catcher. How Compromised Cellular Devices Can Be Used IMSI Catchers utilize software-defined radio, amplifiers, filters, and other technologies to create a “false” mobile base station, usually in a smaller form factor. Initially, these devices were expensive and limited to law enforcement, but now they’re relatively cheap and accessible due to advances in software-defined radio technology. In response to these issues, a number of smartphone apps have been created which claim to detect IMSI catchers and inform users when they may be in proximity to one. These devices are false mobile towers (base stations) acting between the target mobile phone(s) and the real towers of service How to Disable IMSI Catcher - Free download as PDF File (. Oct 22, 2021 · To block IMSI Catcher conventionally, the procedure should be a two-stage process, consisting of a search for unwanted software and deleting of the found applications. Making it easy for any engineer to setup their own environment using the X-Catcher Development Kit. I'm considering downloading Cell Spy Catcher but can't find any thorough reviews. There are two primary ways that the malware could be delivered: 1️⃣ Malicious websites. The process to run the script is as follows: Navigate into the IMSI-catcher folder using the command cd IMSI-catcher; Run the command sudo python3 simple_IMSI-catcher. With a jamming or spoofing detection tool, you can identify and protect yourself from these attacks and protect your data. zip Download . Clearly, this has great potential to be used for illicit activities and phishing or smishing scans, or could be used by governments to monitor people illegally. Usage: simple_IMSI-catcher. A more sophisticated attack involves the dummy basestation spoofing your entire mobile network. Jul 25, 2017 · Over on YouTube user Keld Norman has uploaded a video showing how he uses an RTL-SDR with gr-gsm and a Python script to create a simple IMSI catcher. If Oct 26, 2016 · Furthermore, some countries do not even have encrypted phone data traffic or uses a very weak encryption, thus rendering an IMSI-catcher unnecessary. IMSI catchers work as follows. They act like real cell phone towers, “tricking” mobile devices into connecting to them, designed to intercept the information that phones send and receive, like the location of the user and metadata for phone calls, text messages, and other app traffic. Feb 28, 2024 · Understanding How IMSI Catchers Work IMSI catchers, often called “Stingrays”, are pivotal tools in the surveillance domain, posing significant implications for privacy and security. An IMSI-catcher is a program that shows you IMSI numbers, country, brand, and operator of cellphones around you. Depending on your device maker and the Android skin used, the path to access that setting may IMSI catchers intercept and track mobile phone traffic and also use for surveillance purposes. 7, bottom picture). Operators can track a victim’s location, read their SMS, listen to phone calls and intercept data. These devices masquerade as mobile phone towers, ensnaring phones into divulging sensitive data such as IMSI numbers and communication content unbeknownst to users. Conclusion. What about my rights? IMSI catchers are an enormous invasion of your right to privacy – they trick all mobile phones within a certain area into giving up information about their owner – even Mar 29, 2023 · Cell-site simulators, also known as Stingrays or IMSI catchers, are devices that masquerade as legitimate cell-phone towers, tricking phones within a certain radius into connecting to the device rather than a tower. Oct 23, 2019 · You might have heard of False Base Station (FBS), Rogue Base Station (RBS), International Mobile Subscriber Identifier (IMSI) Catcher or Stingray. Your mobile phone sees this IMSI catcher as just another cellphone tower with a much stronger signal and connects to it. The IMSI, located inside your SIM card, stores all of your cell phone's information. py: [options] Options: -h, --help show this help message and exit -a, --alltmsi Show TMSI who haven't got IMSI (default : false) -i IFACE, --iface=IFACE Interface (default : lo) -m IMSI, --imsi=IMSI IMSI to track (default : None, Example: 123456789101112 or "123 45 6789101112") -p PORT, --port=PORT Port (default : 4729) -s, --sniff sniff on interface instead of Apr 27, 2019 · The e212. May 21, 2020 · Overview of IMSI Catchers (Stingrays) and how Cell Spy Catcher app works to detect fake cell towers to block them. IMSI Catchers, also known as stingrays or cell site simulators, are devices used by law enforcement and other organizations to track mobile phones. All four of these terminologies refer to a tool consisting of hardware and software that allow for passive and active attacks against mobile subscribers over radio access networks (RANs). his program shows you IMSI numbers, country, brand and operator of cellphones around you. May 1, 2021 · The research. It simply pretends to be a cell tower near your phone, then seamlessly connects to it, and starts to harvest information. Filtered out IMSI's are Apr 8, 2021 · How IMSI Catchers Work. Our app aims to make it possible to detect the IMSI-Catchers so that using them becomes a risky proposition. For one, encryption isn’t always required. In the long term, improvements in the new 5G radio and core network standards means that mobile operators should be able to greatly improve the ability to block IMSI Catchers over 5G. com report on the use of international mobile subscriber identity (IMSI) catchers in the country, which fraudsters exploit to scam people. The IMSI-Catchers are so commonly used, are very easy to using and they leave no traces. Jul 19, 2021 · An IMSI catcher is equipment designed to mimic a real cell tower so that a targeted smartphone will connect to it instead of the real cell network. The IMSI catcher can redirect the phone’s browser to a website rigged with malware. py --sniff command can also be used to parse IMSIs from the data stream. Jan 13, 2022 · If you want to turn it off, you can go to ‘ Settings → Network & Internet → SIMs → Allow 2G ’. Jan 31, 2020 · If you think Face ID or fingerprint scanners are keeping the data in your smartphone safe, you are gravely mistaken. [14] It allows forcing the mobile phone connected to it to use no call encryption (A5/0 mode) or to use easily breakable encryption (A5/1 or A5/2 mode), making the call data easy to Crocodile Hunter is a tool to detect and find so-called “Stingrays” or “IMSI Catchers,” devices that identify an individual mobile phone in a crowd by mimicking a cell phone tower. Apr 8, 2020 · The passive IMSI catcher works by capturing IMSI numbers when a phone initializes a connection to a base station. How do IMSI catchers work(3). The links above are for building a passive IMSI catcher meaning it will not transmit any data on the GSM band and does not operate on anything other than 2G if I remember correctly. pdf), Text File (. The signal from IMSI catcher is stronger than Aug 1, 2023 · When a smartphone is in the range of an IMSI catcher, it will constantly try to connect to the catcher, even if there is no signal. Advise anyone else in the know to take proper precautions if you work on these or operate around them. Aug 21, 2024 · An IMSI Catcher is a surveillance device that mimics a legitimate cell tower to intercept mobile phone communications. • Some types of IMSI catchers can SDR IMSI Catcher System allows LEAs to covertly collect IMEI, IMSI of cell phones without the knowledge of the service providers and cell phone users. “IMSI” stands for “International Mobile Subscriber Identity”, a number unique to your SIM card. 1: Basic IMSI-catcher. 6 %âãÏÓ 459 0 obj >stream hÞìZ_o É ÿ*ó ºš!ç/p0 _Q\ëkjĹ'à gë §H , çoß w¹Žµr4뻇æZ=xIÏ ’Ã!9»r. On-going 5G standardization done in 3GPP is a golden opportunity to improve subscribers’ privacy by constructing a protocol architecture that protects against IMSI catchers. Constructive collaboration and learning about exploits, industry standards, grey and white hat hacking, new hardware and software hacking technology, sharing ideas and suggestions for small business and personal security. Some of the key features of IMSI Catcher Detectors include: The reason IMSI-Catchers are so commonly used is that it is very easy to get away with using them since they leave no traces. After acquiring your phone’s IMSI, the fake tower connects your phone back to the real mobile network and moves on to catch another phone’s IMSI. This link leads to the EFF source repository with instructions on hardware and software needed, as well as build However, it can work with only old phones and old GSM technology. I have to be careful on this subject. Aug 19, 2019 · And in the case of passive IMSI catcher it is potentially one of the only ways to detect these remotely and block any more useful information being obtained. Every cell phone on a Global System for Mobile Communications (GSM) network utilizes an International Mobile Subscriber Identity (IMSI). Jan 31, 2020 · This is why the IMSI Catcher is so effective. Once your phone is tricked into connecting to an IMSI catcher, it reveals this number. 3. An understanding of IMSI Catchers is essential for assessing the efficacy of VPNs in protecting against them. Nowadays an IMSI catcher can be set up cheaply using a software defined radio and open source software such as OpenBTS. As mobile phones usually select the cell with the strongest signal, IMSI catchers simulate a cell with a better signal strength. Use small BTS and full bands of RF amplifier. Deloitte would like to find out if this technology can be used for gathering OSINT (Open Source Intelligence) for red-teams. The 5Gsec group of the CNIT research unit of the University of Rome Tor Vergata, formed by Ivan Palamà, Giuseppe Bianchi, Nicola Blefari Melazzi and Francesco Gringoli, published a research [] that shows how cybercriminals can create and use and IMSI catcher for LTE systems using exclusively public domain software. IMSI catchers, also known as Stingrays, are tools which can be used to intercept and monitor mobile phone communication without the user’s knowledge or consent. There are some mobile applications like SnoopSnitch, Cell Spy Catcher, and Radio Sentinel that can detect IMSI catchers. For example, a tower with an unusual name or ID might be a fake one. The three main techniques used in this process are jamming networks, spoofing signals, and collecting IMSI numbers through decryption efforts. Jul 28, 2023 · The use of IMSI catchers has raised numerous privacy concerns, with some suggesting that they should be restricted or banned in certain countries. Mobile networks use several different technologies including GSM, CDMA, TDMA, 4G, LTE, 5G and many others. The setup is completely autonomous and If you’re genuinely concerned about having an IMSI catcher threat vector, then it’s too late now to implement counter measures (such as detectors) as the other party could have dropped 5-7k (information about your clients sell for far more) on several IMSI catchers that can easily pinpoint your location, pull calls and texts, and more. Protecting yourself against StingRays in Oct 10, 2023 · Previously used only by law enforcement to locate the international mobile subscriber identity (IMSI) associated with a criminal suspect's SIM card for investigation purposes, an IMSI catcher may now be purchased or built by almost anyone to intercept a target's communications. The IMSI catcher launches the basic identification procedure by requesting the mobile phone’s IMSI to confirm that the subscriber is in the area. The python simple_IMSI-catcher. The IMSI is only disclosed during this initial connection. International Mobile Subscriber Identity (IMSI) Catchers The post Top 7 IMSI Catcher Detection Solutions for 2020 appeared first on FirstPoint. . Jun 12, 2024 · CSS, also known as IMSI catchers, are among law enforcement’s most closely-guarded secret surveillance tools. Purchase the Out of the Box – pre-configured, custom setup – 4G LTE or 2G GSM IMSI Catcher Processor. Tel. IMSI catcher Detectors can be divided into military-grade and consumer-level detectors. Mar 22, 2022 · IMSI-catchers, such as StingRay devices, focus on outdated 2G or GSM networks by imitating a mobile tower that connects with your smartphone. Additionally, there are other costs associated with purchasing and operating IMSI catchers such as programming fees, maintenance contracts, upgrades and training. They are also often referred to as a Stingray or Stingray Suveillance device. If your business information or customer information is of value to an entity with access to the IMSI catcher technology, you have cause for concern. You have a bunch of IMSI Jun 29, 2017 · IMSI catchers are devices used to intercept wireless traffic and trace subscribers by their long-term identifiers (IMSIs). Nov 22, 2014 · This is how the IMSI Catcher/Spy Detector project was born, here on XDA. In a next-door neighbor mobbing situation, the combination of physical proximity and WiFi extenders changes the picture. pcap-- all the payloads with the paging header added in front for it to be formatted into a wireshark with text2pcap input_file output_file -l 147; imsi. AIMSICD is an Android app to detect IMSI-Catchers. The simplistic nature of this mechanism is helping cybercriminals carry out their malicious acts with alarming ease. Apr 8, 2021 · Some IMSI catchers even jam the 4G/3G frequencies with white noise to eliminate real cell towers as connection options. 1 An IMSI catcher does this by pretending to be a mobile phone tower - tricking the user [s phone into connecting to the IMSI catcher, and then revealing the phone users personal details without The IMSI data is not particularly useful on its own, but it can be used to track movements of individuals and work out which individuals travel together. e. The police can use this to easily determine your identity. HOW IMSI CATCHERS CAN BE USED AT A PROTEST AND HOW YOU CAN MINIMISE RISKS TO YOUR DATA How might IMSI catchers be used at a protest? • The police can use IMSI catchers to identify who was at a protest, by capturing the IMSI numbers of all the phones that were in its vicinity at that protest. A subreddit dedicated to hacking and hackers. com/promo —— This video covers four main topics;(1). Jul 28, 2023 · The cost of an IMSI catcher can vary significantly depending on the specific model purchased and any additional features included. py: [options] Options: -h, --help show this help message and exit -a, --alltmsi Show TMSI who haven't got IMSI (default : false) -i IFACE, --iface=IFACE Interface (default : lo) -m IMSI, --imsi=IMSI IMSI to track (default : None, Example: 123456789101112 or "123 45 6789101112") -p PORT, --port=PORT Port (default : 4729) -s, --sniff sniff on interface instead of Oct 15, 2024 · Suspicious network names: IMSI catchers can also broadcast non-standard or dubious network IDs. csv-- The output file. gz Android IMSI-Catcher Detector. Or try out Snoopsnitch. IMSI catchers can determine the IMSI numbers of nearby mobile phones, which is the trademark capability from which they get their name. /Fax: +358 9 3158 7490 E-mail: info@catchers. fi 2009—2025 Discovery Telecom Oy (2201256-3) Add to favorites | Sitemap Feb 14, 2017 · IMSI Catchers are tracking devices that break the privacy of the subscribers of mobile access networks, with disruptive effects to both the communication services and the trust and credibility of I've heard that many IMSI-Catcher Detectors for Android are basically ineffective. An attacker can target thousands of devices. ComSec’s IMSI Catcher detection services are a strategically important tool for any business that may be targeted for cellular surveillance. Sep 30, 2024 · StingRay devices are just one type of IMSI-catcher that targets legacy 2G or GSM networks by mimicking a cell tower that your phone then connects to. Jun 23, 2022 · Welcome back, my aspiring RF hackers!Among the multitude of radio signals swirling around us everyday are the mobile telephone signals that all of us have become so dependent upon. edu/. This is where Faraday bags come into play. CAN AN IMSI CATCHER SNOOP ON MY CALLS AND TEXT MESSAGES? Some IMSI catchers can intercept How IMSI Catchers Work. An IMSI is usually presented as a 15-digit number but can be shorter. %PDF-1. It serves as a MITM (Man in the Middle) attack by broadcasting a cell phone signal stronger than that of nearby cell phone Nov 1, 2024 · The easiest way to diy imsi catcher. Empower Nov 16, 2018 · For legal and technical reasons, our IMSI-catcher did not intercept text messages or phone calls, like more powerful versions can. Some types of IMSI catchers can even enable the police to disrupt or prevent protests before they even happen. Feb 21, 2020 · Some IMSI catchers even jam the 4G/3G frequencies with white noise to eliminate real cell towers as connection options. These specially designed bags create a barrier that prevents radio waves from reaching your device, effectively neutralizing IMSI catchers and other surveillance tools. Can be seen updated live if opened in sublime text. tar. Various techniques may be employed to do it Mar 28, 2024 · Extracting the IMSI: During the handshake, the IMSI-catcher transmits a special request designed to extract your phone’s unique identifier – the International Mobile Subscriber Identity (IMSI). They quite literally “catch” (i. Observe Battery and Signal Behaviour. CAN AN IMSI CATCHER SNOOP ON MY CALLS AND TEXT MESSAGES? Some IMSI catchers can intercept Dec 18, 2024 · The Bangko Sentral ng Pilipinas (BSP) confirmed a Bilyonaryo. Christian An international mobile subscriber identity-catcher, or IMSI-catcher is a device used for mobile phone surveillance. Jan 7, 2015 · To protect your privacy, the simplest thing you can do is install a few apps on your smartphone, to shield the content of your communications from FBI or police capture. But how feasible is this in practice?. IMSI catchers will usually try to force communication over 2G, since the 2G protocol suffers from a number of security holes that make spying easier. Sep 10, 2020 · IMSI catchers and subscriber privacy. To set up the IMSI catcher IMSI catchers, Direct Finders, Interceptors. While the phenomenon is often exaggerated, IMSI catchers do pose a threat to subscriber privacy. record) IMSIs by pretending to be real base stations and then release the target phones (Paget, 2010). Any privacy advocates here willing to offer suggestions for an effective app? Thanks. cs. May 28, 2024 · IMSI Catchers can identify and track individuals, intercept calls and messages, and force all nearby phones to transmit their IMSI and IMEI data. Jul 28, 2023 · Interception of communications is a major security concern in the modern age.
vxnwa mudyah byl fco flogai jqplbhn uywm cwt qlvjye kucxm
{"Title":"What is the best girl
name?","Description":"Wheel of girl
names","FontSize":7,"LabelsList":["Emma","Olivia","Isabel","Sophie","Charlotte","Mia","Amelia","Harper","Evelyn","Abigail","Emily","Elizabeth","Mila","Ella","Avery","Camilla","Aria","Scarlett","Victoria","Madison","Luna","Grace","Chloe","Penelope","Riley","Zoey","Nora","Lily","Eleanor","Hannah","Lillian","Addison","Aubrey","Ellie","Stella","Natalia","Zoe","Leah","Hazel","Aurora","Savannah","Brooklyn","Bella","Claire","Skylar","Lucy","Paisley","Everly","Anna","Caroline","Nova","Genesis","Emelia","Kennedy","Maya","Willow","Kinsley","Naomi","Sarah","Allison","Gabriella","Madelyn","Cora","Eva","Serenity","Autumn","Hailey","Gianna","Valentina","Eliana","Quinn","Nevaeh","Sadie","Linda","Alexa","Josephine","Emery","Julia","Delilah","Arianna","Vivian","Kaylee","Sophie","Brielle","Madeline","Hadley","Ibby","Sam","Madie","Maria","Amanda","Ayaana","Rachel","Ashley","Alyssa","Keara","Rihanna","Brianna","Kassandra","Laura","Summer","Chelsea","Megan","Jordan"],"Style":{"_id":null,"Type":0,"Colors":["#f44336","#710d06","#9c27b0","#3e1046","#03a9f4","#014462","#009688","#003c36","#8bc34a","#38511b","#ffeb3b","#7e7100","#ff9800","#663d00","#607d8b","#263238","#e91e63","#600927","#673ab7","#291749","#2196f3","#063d69","#00bcd4","#004b55","#4caf50","#1e4620","#cddc39","#575e11","#ffc107","#694f00","#9e9e9e","#3f3f3f","#3f51b5","#192048","#ff5722","#741c00","#795548","#30221d"],"Data":[[0,1],[2,3],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[10,11],[12,13],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[6,7],[8,9],[10,11],[12,13],[16,17],[20,21],[22,23],[26,27],[28,29],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[14,15],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[0,1],[2,3],[32,33],[4,5],[6,7],[8,9],[10,11],[12,13],[36,37],[14,15],[16,17],[18,19],[20,21],[22,23],[24,25],[26,27],[28,29],[34,35],[30,31],[2,3],[32,33],[4,5],[6,7]],"Space":null},"ColorLock":null,"LabelRepeat":1,"ThumbnailUrl":"","Confirmed":true,"TextDisplayType":null,"Flagged":false,"DateModified":"2020-02-05T05:14:","CategoryId":3,"Weights":[],"WheelKey":"what-is-the-best-girl-name"}