== Info: Trying 69.175.95.50:80... == Info: Connected to sqlmysteries.com (69.175.95.50) port 80 (#0) => Send header, 79 bytes (0x4f) 0000: GET / HTTP/1.1 0010: Host: sqlmysteries.com 0028: User-Agent: curl/8.0.1 0040: Accept: */* 004d: <= Recv header, 17 bytes (0x11) 0000: HTTP/1.1 200 OK <= Recv header, 24 bytes (0x18) 0000: Connection: Keep-Alive <= Recv header, 32 bytes (0x20) 0000: Keep-Alive: timeout=5, max=100 <= Recv header, 62 bytes (0x3e) 0000: set-cookie: mystery=989757f0b61415056d022f27b73f7d90; path=/ <= Recv header, 40 bytes (0x28) 0000: expires: Thu, 19 Nov 1981 08:52:00 GMT <= Recv header, 52 bytes (0x34) 0000: cache-control: no-store, no-cache, must-revalidate <= Recv header, 18 bytes (0x12) 0000: pragma: no-cache <= Recv header, 40 bytes (0x28) 0000: content-type: text/html; charset=UTF-8 <= Recv header, 22 bytes (0x16) 0000: content-length: 6054 <= Recv header, 37 bytes (0x25) 0000: date: Thu, 24 Aug 2023 03:43:23 GMT <= Recv header, 29 bytes (0x1d) 0000: x-frame-options: SAMEORIGIN <= Recv header, 33 bytes (0x21) 0000: x-content-type-options: nosniff <= Recv header, 2 bytes (0x2) 0000: <= Recv data, 1052 bytes (0x41c) 0000: 0011: 0023: 002b: . 0044: . 0072: . 00cb: .SQL Mysteries 00ea: . 0135: . 0180: . 01cb: . 0244: . 02e4: . 0392: . 0338: 0347: .
036b: ..
0385: ...
039b: ....

SQL Mysteries

03b7: ....

There's been a string of crimes in Void! Can you solve th 03f7: e crimes using your SQL knowledge?

041f: ........

We currently have a total of 20 cases that can 045f: be solved.

0470: ...
047b: ..
0485: ..
049f: ...
04c4: ....

Directions

04dd: ....

Use your SQL knowledge to solve the crimes by reading the 051d: information. All the clues to each case are within the intervie 055d: ws done by the officers on the scene. You should find the relate 059d: d data, sort through suspects, and find the perpetrator of the c 05dd: rime.

05e8: ....

For security reasons, limitations are in place. The SQL l 0628: anguage used is MySQL, and only select queries are allowed.

0669: ....

Current Case

0684: ....

Date: 2021-04-05
Report: A tan Honda Fit 06c4: with a license plate of "YVS 745" was recently stolen 0704: . The owner of the vehicle stepped forward to make a statement, 0744: and one witness, Mr. Luo, came forward who has seen someone else 0784: driving the vehicle. 079b:

....

 

When you've co 07db: mpleted the case, you may use the button below to be assigned to 081b: a new case.

082d: .... 0833: ....
... 087b: .....
0887: ......

08ef: .....
08fc: ....
0909: ...
0914: ...
0939: ....

Database ERD

0954: .... 098a: ...
0995: ..
099f: ..
09c4: ...
09e0: ....

Find Clues

09f9: ....

0a79: Use the new information you discover to make new queries.
0ab8: ....Start by getting the interviews relating to the case by usin 0af8: g the case information provided. Each case is unique and will ha 0b38: ve different clues provided.

Queries must end in a semi-co 0b78: lon to be valid.

0b8e: ....
0bd9: .....
0bf8: ...... 0c63: .....
. 0c71: .....
0c7d: ...... 0d09: .....
0d16: ....
0d23: ....

0d30: ...
0d3c: ..
0d46: ..
0d60: ...
0d76: ....

Query Results

0d92: .... 0d9e: .... 0dab: ....

0db8: ...
0dc3: ..
0dcd: ..
0de7: ...
0dfd: ....

Previous Queries

0e1c: ....
....

< 0e5c: /p> 0e61: ...

0e6c: ..
0e76: ..
0e9b: ...
0eb1: ....

Your Guess

0eca: ....

When you think you have found the perpetrator, enter the 0f0a: perpetrator's perID below. The system will tell you if you are c 0f4a: orrect or not. Good Luck!

0f69: ....
0fc4: .....
0fe3: ...... 1023: ...... 1088: .....
.. 1097: .....
10a3: ...... 1133: .....
1140: ....
114d: ....

115a: ...
1165: ..
116f: ..
1194: ...
11aa: ....

Feedback

11c1: .... 11cd: .....Your guess results will display here!.... 1204: ....

1211: ....

When you've completed the case, you may use 1251: the button below to be assigned to a new case.

1285: ....
... 12cd: .....
12d9: ......

1342: .....
134f: ....
135c: ...
1367: ..
1371: .
137a: 1383: == Info: Connection #0 to host sqlmysteries.com left intact