Bitcoin Forum
May 07, 2024, 06:39:54 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Economy / Reputation / Lost My Telegram on: January 22, 2024, 05:01:41 AM
Hello everyone! I am not really active on Bitcointalk for a long time specially after getting a lot of death threats. I guess my account has had somewhat ethical rules to abide by always except the time I abused the rule of DT 2 by painting a lot of scammers with red. This account still belongs to me but sadly in recent weeks I somehow got banned from Telegram along with the phone number it was assigned with. My telegram that has been banned was @invincible49 which is very precious to me and I am trying to reach out to them but for weeks now there has been no response at all. The username itself now shows as "Invalid", so I gather none can claim the username now. Nonetheless since I made a lot of enemies here, some might disguise themselves as me to fool people. So kindly take note of this. I will update if I get back my telegram in here. If someone asks for money, loan, advertise scams by tweaking some character to the username, know this I never take loan, neither promote scams. Be safe!

Kind regards,
Invincible49
2  Economy / Reputation / Ban evasion and Possibility of Bounty cheating with alts! on: May 10, 2022, 05:21:33 PM
Reporting Ban evasion:

1. sykt62 (Archived)
2. wtsimis
3. Chitar123
4. Abdullah56

My account sykt62 was banned for publishing a plagiarized article. For my clarification, first of all I am a crypto blogger, so I write articles and publish them on different platforms like publish0x.
Some days ago, I was banned for publishing an article titled: "What Is Your Ultimed Goal In Crypto?"
This article was published long ago from my leofinance and publish0x profile.
You can verify them. https://www.publish0x.com/saikots-blog/what-is-your-ultimed-goal-in-crypto-xlyplwd
or https://leofinance.io/@sykt/what-is-your-ultimed-goal-in-crypto
For more verification: https://imgur.com/lemciel
https://imgur.com/4H3cBRP
Please verify and release sykt62

Archive: https://archive.ph/wHwyz#msg57895934
https://archive.ph/wip/iEbBn
https://archive.ph/wip/bMLov



https://archive.ph/IGXpC#msg58137971

প্রথমেই ভুল স্বিকার করে নিচ্ছি, কারন এক সাথে দুটি পোস্ট করা উচিত ছিলো না, কিন্ত মিম কনটেস্ট এর ডেট মনে হয় শেষ করে দিতে পারে, এর জন্য বাধ্য হয়েই এক সাথে দুটী পোষ্ট এক সাথে করছি।
1.আমার তৈরিকৃত মিম: কখনো আশা হত হবেন না
মিমটির লিংক : https://twitter.com/MdxCrypto4/status/1446181207394291728/photo/1
মিমটি তৈরির করার কাহিনি: ক্রিপ্টো মার্কেট আপ্স ডাউন থাকবেই, কিন্ত হ্লোডিং একদিন না একদিন আপনাকের সময়ের দাম দিবে।
2.আমার তৈরিকৃত মিম: জ্ঞান বিলানো
মিমটির লিংক: https://twitter.com/AaravCarrel/status/1446195619316461574?s=20
মিমটি তৈরির করার কাহিনি: প্রতিবার কাউকে যখন ক্রিপ্টো ব্যপারে প্রথম বলি
3. আমার তৈরিকৃত মিম: পোর্টফোলিও
মিমটির লিংক: https://twitter.com/AaravCarrel/status/1446181555076927503?s=20
মিমটি তৈরির করার কাহিনি: যার হ্লোডিং আছে, তার স্ক্রিনশট নেওয়ার প্রবনতা বেশি থাকে  Smiley
4. আমার তৈরিকৃত মিম: কাকতালীয়
মিমটির লিংক: https://imgur.com/Jf4l3uC
মিমটি তৈরির করার কাহিনি: কাকতালীয় ভাবে মিলে গেছে। কিন্ত মন্দ হবে না যদি ক্রিপ্টো বাংলাদেশে ওপেন সোর্স ভাবে ব্যাবহার করা হয়।
কোনো মিম তেই লোগো বা কোনো ওয়াটারর্মাক ব্যাবহার করা হয়নি, যেকেউ চাইলে,যেকোনো জায়গয়ায় ব্যবহার করতে পারেন। আর উত্থসাহ পেলে আরো বানাবো Grin

Translation:


That posted twitter accounts which were clearly written by wtsimis lead to twitter accounts with changed username after clicking!

https://twitter.com/AaravCarrel/status/1446195619316461574?s=20 leads to this https://archive.ph/wip/Pnrf3 with Username Crypt311 which is actively being used by BTT user Chitar123.

Twitter Url:https://mobile.twitter.com/Crypt311
Archive: https://archive.ph/wip/ecXe1

And, https://twitter.com/MdxCrypto4/status/1446181207394291728/photo/1 leads to https://archive.ph/wip/Llg0U with Username San8123 which is actively being used by BTT user user Abdullah56.

Quote from: Abdullah56 link=topic=5393406.msg59886304#msg59886304
Proof of authentication
Bitcointalk name:Abdullah56
Join Campaign:Twitter
Telegram:@Abdullah314
Bsc Address : 0x4D34B56DFF0f36e444a94Fdd6eE2D689AfA812F8
Archive: https://archive.ph/oaA0S#msg59886304


According to UCT bounty rules users will be banned from campaign if found using multiple accounts! And we can see wtsimis used both of his twitters and Bitcointalk altaccounts to enroll in the same campaign.







Related Addresses:
Code:
BEP-20 Wallet Address: 0x4D34B56DFF0f36e444a94Fdd6eE2D689AfA812F8
BEP-20 Wallet Address: 0x7cD31AAD15734C631b99c335f0b583B0A35e33aC


Related Social accounts:
Code:
https://leofinance.io/@sykt
https://www.publish0x.com/saikots-blog
https://twitter.com/MdxCrypto4
https://twitter.com/AaravCarrel/
https://mobile.twitter.com/Crypt311
3  Alternate cryptocurrencies / Tokens (Altcoins) / [ANN] MODA Dao-Defining the future of music ownership, distribution & publishing on: July 24, 2021, 07:05:51 PM

















Disclaimer: I am not part of the MODA Dao team. I am just posting this ANN on their behalf. If you have questions about this project- kindly contact them on Telegram.
4  Alternate cryptocurrencies / Tokens (Altcoins) / [ANN] World Mobile - Connect billions of people in Africa and beyond on: June 10, 2021, 02:45:22 PM






















Disclaimer: I am not part of the World Mobile team. I am just posting this ANN on their behalf. If you have questions about this project, kindly contact them on Telegram
5  Other / Archival / Ann testing on: June 08, 2021, 04:10:59 PM
Will be used again!
6  Alternate cryptocurrencies / Tokens (Altcoins) / [ANN] IDEXO- NFT API & the easiest way to integrate features from any blockchain on: May 18, 2021, 05:49:48 PM
























Disclaimer: I am not part of the Idexo team. I am just posting this ANN on their behalf. If you have questions about this project, kindly contact them on Telegram
7  Alternate cryptocurrencies / Tokens (Altcoins) / [ANN] ⚡ Partisia Blockchain: A neutral WEB 3.0 platform ⚡ on: February 15, 2021, 04:48:13 PM



















Disclaimer: I am not part of the Partisia Blockchain team. I am just posting this ANN on their behalf. If you have questions about this project, kindly contact @PartisiaAdmin who is the admin of this project's telegram group.
8  Economy / Scam Accusations / Potential Scam Project Keep Calm and Hodl (KCH) By Previously Dumped Project IRC on: January 02, 2021, 01:45:34 AM
***This is not a scam accusation FOR NOW!***
What happened: Possibly A Project Trying to Dump 999b+ Tokens On Users, Hunters, Liquidity Providers on Uniswap.

OP of ANN's (Not proven scammer as of now) Profile Link: https://bitcointalk.org/index.php?action=profile;u=1754554
ANN Thread: https://bitcointalk.org/index.php?topic=5293623.0
Archive: https://archive.is/wip/JHDIA

Website: https://keepcalm.finance/
Archive: https://archive.is/wip/1JBYJ
Whitepaper: https://github.com/Keep-Calm-and-Hodl/Whitepaper/blob/main/Whitepaper.pdf
Archive: https://archive.is/wip/xCUsf

Domain Information:
Quote
Domain Name: keepcalm.finance
Registry Domain ID: 014d2a247436407ab8792ef32ad080c8-DONUTS
Registry Expiration: 2021-11-20 12:29:06 UTC
Updated: 2020-11-25 12:29:50 UTC
Created: 2020-11-20 12:29:06 UTC

KCH Bounty Thread: https://bitcointalk.org/index.php?topic=5300981
Archive: https://archive.vn/wip/r6Skq
Bounty Manager: https://bitcointalk.org/index.php?action=profile;u=357369

Team Members: None mentioned on the website or in the whitepaper.

GitHub: https://github.com/Keep-Calm-and-Hodl
Archive: https://archive.is/wip/c2DPD

Announcement of First Project by the same OP in 2018: https://bitcointalk.org/index.php?topic=2858369.msg42697006#msg42697006
Archive: https://archive.vn/WqcsY

KCH contract creator also created this shit called Ironcoin (IRC) at this transaction https://etherscan.io/tx/0x01b1e77d95e41be2f41f484a7f814f3d8562f98144764b721020a431ec95c349 back in late January of 2018 during the Etherdelta's glory days, dumped a billion IRC tokens. Then abandoned updating the community, project etc.
Link: https://forkdelta.app/#!/trade/IRC-ETH

Now the same guy has come up with almost 100B tokens named KCH during Uniswap hype days. Just see from this contract creator's wallet transaction history on how he previously dumped his shittoken IRC.
Token Transaction ID: https://etherscan.io/tokentxns?a=0x31650fb3f2af06999b5e9f51fab8390443e72c62&p=3



This guy named Edrahil67 created ANN of Ironcoin and then deleted all contents from the opening page. Thankfully someone quoted the ANN and I have archived in here: https://archive.vn/WqcsY so that users can know what type of game the OP is playing here. This in my opinion is another project to make this team a couple of Ethereum or other crypto assets by dumping on noobs or even experienced users.

His current KCH whitepaper is full of HODL definition and some other mumbo jumbo, also website has no product listed apart from a misleading link that redirects user to provide his shittoken's liquidity on Uniswap but it's under the section of Staking!!
Uniswap Link for Providing Liquidity but they are lying it as a Staking link: https://app.uniswap.org/#/add/ETH/0xdb80734b094a3f964dedfd10e8946753ae0ac04c

Keep Calm and Hodl Ticker: KCH
Contract Address: 0xdB80734b094a3F964DEdfD10e8946753aE0AC04c
Contract Creator: 0x31650fB3F2af06999b5e9f51fAb8390443e72c62


Ironcoin Ticker: IRC
Contract Address: 0x1F21d8395655fb262251897df7CB3c9358BEc6a2
Contract Creator: 0x31650fB3F2af06999b5e9f51fAb8390443e72c62
9  Alternate cryptocurrencies / Tokens (Altcoins) / [ANN] ⚡ OnX Finance, The First DeFi Hub For Collateralized Tokens ⚡ on: December 27, 2020, 07:19:52 AM






















Disclaimer: I am not part of the OnX Finance team. I am posting this ANN on their behalf. If you have questions about this project, kindly contact @OnXMike who is the founder of this project but wants to remain anon with his other team members.
10  Alternate cryptocurrencies / Marketplace (Altcoins) / I want to buy your Amepay Token on: December 21, 2020, 08:36:18 AM
I am interested in buying Amepay Tokens. If anyone is interested in selling can contact me. I can pay in BTC, USDT or Eth. I have not found anyone to escrow the fund but I am willing to make a deal if you find escrow and wants to proceed.
My offer is only and non-negotiable one which is 0.0065 USDT per token.

After going through the Tokenomics of AMEPay, airdrop distribution schedule, number of holders and IEO schedule and seeing  scammer Shohel as their adviser I have a bad feeling on this. Now I need to averaging down my investment.

So my new offer and non-negotiable which is 0.0015 USDT per token.

Token Name: AME
Contract Address: 0x12513335ffd5dafc2334e98625d27c1ca84bff86
Decimal: 18

Official Site: https://amepay.io/

My ERC20 Wallet for receiving AME: 0x0f67e5867b72a8e8802d7a509a7b8f64ae5a5db3
11  Economy / Scam Accusations / Possibly Phishing Haircomb Wallet & Using of Stock Image on: May 31, 2020, 08:43:22 AM
***This is not a scam accusation FOR NOW!***
What happened: Possibly Phishing, Malicious Tools inside Haircomb Wallet. Along with Stealing One Person Team Identity/Picture.

Dev's (Not proven scammer as of now) Profile Link: https://bitcointalk.org/index.php?action=profile;u=2701336
ANN Thread: https://bitcointalk.org/index.php?topic=5195815.0
Archive: http://archive.is/wip/mls8X

Website: None
Archive: http://archive.is/nmmGy#msg52875759
Whitepaper: https://raw.githubusercontent.com/natasha-otomoski/haircomb/master/WhyTheCombOfNatashaOtomoskiHas21Teeth.txt

Haircomb Bounty Thread: https://bitcointalk.org/index.php?topic=5251391
Archive: http://archive.is/wip/3pjFK

Team Member: The Dev who uses "Natasha Otomoski"as alias works alone for his project.
Second most contributor to the ANN thread: kelozar

Stock Image used in ANN thread as Team Member:



Original Picture:


Reference: https://hrexpert.com.au/marketing-2/

Github: https://github.com/natasha-otomoski/haircomb
Archive: http://archive.is/wip/7GF23

Announcement of First releasing of Windows Wallet: https://bitcointalk.org/index.php?topic=5195815.msg52892009#msg52892009
Archive: http://archive.is/enQZc#msg52892009

First releasing of Windows Wallet on Github: https://github.com/natasha-otomoski/haircomb/commit/7922f6175b22b6a9f410b2586d308764a059be75#diff-48f11ca61784018b735166490c862694
Archive: http://archive.is/wip/Qeosw

I have downloaded the combfullui.exe which he/she submitted on Oct 27, 2019 a few hours ago and used VirusTotal to see if there is any malicious tool existing in the wallet or not. It showed that someone already checked it out months ago and the result is below.


Reference: https://www.virustotal.com/gui/file/d998e6a3a532e6a099d0a3ba31640526d9eb67dd07714e4b3b63c48227dce54e/detection

It shows that some engines found a couple of viruses of the first version of Haircomb wallet including Trojan.Multi.Generic.4!c
which is a very dangerous malicious tool and has been warned by Lafu previously.


Trojan.Multi.Generic.4!c
Trojan.Multi.Generic.4!c has been considered as one of the most dangerous OS threat.
It usually infect all famous browser by attaching add-ons, plug-ins and other suspicious code.
By modifying browser setting and attacking your browser, it will lead you to the third-party site and start to cause interruption while surfing the web.
Trojan.Multi.Generic.4!c will brings lots of serious problems to you.
Encrypts your files , Opens the System backdoor and allow hackers to access PC remotely.Collects victims all sensitive data and send them to the scammers.
Archive: http://archive.is/wip/xmR2I

After a couple of days the dev instructed how to sync Haircomb wallet. I am just quoting the summarize version of original post.

Syncing guide - windows.
  • Are you expecting a haircomb payment and want to receive it to your own wallet?
  • Do you want to pay with your haircombs?
  • Do you want to create commits.db file yourself, so that you don't need to trust others to give you the correct file?
  • Do you want to monitor people claiming combs in real time?
Then you need synced haircomb core wallet. Learn how to do this using this guide.
Prerequisites. You should have more than 250GB free disk space. Should have reliable electricity supply, with no planned power loss.
1. Download combfullui.exe from github and place it to it's own folder
2. Download btc.zip (the modified bitcoin qt 0.18.1) and unzip it.
Archive: http://archive.is/BSkqY#msg53030389

The dev has recently uploaded the latest version of the wallet 0.3.2 for both Windows and Linux.
Github Upload: https://github.com/natasha-otomoski/haircomb
Archive: http://archive.is/7GF23

I've again used VirusTotal to scan the Windows wallet file and found the following result.


Reference: https://www.virustotal.com/gui/file/fe39f430cb93118326b3417499c77641d6b7e1345573e5dfbbd4681af59c3679/detection

According to Microsoft - Worm.Bereb.i is from the category of Worm.Bereb malicious virus that does the below thing along with other similar viruses from Worm.Bereb.

Quote
This threat tries to use the Windows Autorun function to spread through removable drives, like USB flash drives.
Reference: https://www.microsoft.com/en-us/wdsi/threats/malware-encyclopedia-description?Name=Worm%3AWin32%2FBereb.B&ThreatID=-2147464970
12  Economy / Scam Accusations / Tradez IEO SCAM - Fake Team, stealing people's identity + Plagiarized Whitepaper on: May 11, 2020, 06:14:55 AM
What happened: Fake Team, stealing people's identity.

Ann Thread 1: https://bitcointalk.org/index.php?topic=5247251
Archived: http://archive.is/wip/JYgPO
Ann Thread 2: https://bitcointalk.org/index.php?topic=5246726.
Archived: http://archive.is/wip/AS2NV


Tradez Bounty: https://bitcointalk.org/index.php?topic=5247308
Archived Bounty: http://archive.is/wip/GHNZ6
OP of the ANN Thread 1: https://bitcointalk.org/index.php?action=profile;u=2804751
OP of the ANN Thread 2: https://bitcointalk.org/index.php?action=profile;u=2347750

Flags on both OPs:
https://bitcointalk.org/index.php?action=trust;flag=1807
https://bitcointalk.org/index.php?action=trust;flag=1808


Tradez website: https://tradez.xyz/
Archived: http://archive.is/XlcMR

Domain Information:
Quote
Domain Name: TRADEZ.XYZ
Registry Domain ID: D184146329-CNIC
Registrar WHOIS Server: whois.hostinger.com
Expires: 2021-04-25
Registered: 2020-04-25
Updated: 2020-04-25

IEO status: https://bamboorelay.com/trade/TRZ-WETH


Plagiarized Whitepaper:
They have copied most of the contents from Evos.One's whitepaper for creating their whitepaper. Also plagiarized contents from a thesis paper on Bitcoin published on academia.edu.

Tradez whitepaper: https://github.com/TrzTradez/Tradez-Whitpaper/blob/master/WP%20TRADEZ.pdf
Archived whitepaper: http://archive.is/wip/EjKUm

Evos.One's whitepaper: https://evos.one/whitepaper-evos-1.2.pdf
https://www.academia.edu/31278940/BITCOIN_AS_A_PARALLEL_CURRENCY_AN_ECONOMIC_VISION_AND_MULTIPLE_LEGAL_CONSEQUENCES

They are using stock images, stealing other people's identity. From random Spurs fan to Real estate advisor to musician!  Grin






https://www.compass.com/listing/5-duston-lane-acton-ma-01720/423685593493517937/




https://www.huffpost.com/entry/musician-mark-stoney-on-a_b_4597318
https://www.youtube.com/channel/UC0fTQkvS5Ci9sVMztiCQvMQ



https://www.pxfuel.com/en/search?q=entrepreneur&page=4


13  Economy / Reputation / DT-members Attention Is Needed! Cheater With So Many High Ranked Accounts! on: April 03, 2020, 12:30:47 PM
Multiple Accounts Including 6 Full Member Accounts, 4 Sr Member Accounts, 1 Hero Member Account Connected to Previously Exposed/Tagged Bounty Cheater

For Complete List of This Bounty Cheater's Accounts and Supporting added Flags on Accounts CLICK HERE


User RBF has recovered his account and mentioned in about it in his thread in here https://bitcointalk.org/index.php?topic=5261401. So the FLAG on his account has been opposed by me and I am no longer listing his account as an altaccount of Pacman7331's countless alts and removing from the list of needing for Flag supporting, removing my tag on his account.

Newly found Connected Accounts to each others and to the Previously Banned/Tagged Ones!

1. pacman7331 (Full Member)
2. redbunny (Newbie)
3. DUBYAO (Newbie) (Actively Participating in bounties) (Possible alt.)
4. hirngespenst (Hacked/Bought account) (Full Member)
5. kickdapa (Hacked/Bought account, Actively enrolling in Bounties!) (Full Member)
6. novusordo (Red Trusted & User Not Active Since July 2019) (Sr. Member)
7. shakeelaijaz (User Not Active Since February 2019)
8. akonrupom (Banned)

Updating the connected list on 7th April, 2020

9. RBF (Hacked & Actively enrolling in Bounties!) (Full Member)
10 thisnewcoin (Hacked & Actively enrolling in Signature Campaigns) (Full Member)
11 RanaMoko (Red Trusted) (Newbie)
Newly found connected accounts to Pgbit and previous Ones on 9th April, 2020
13. K4C (Full Member & Compromised/Bought)
14. key4co.in (Hero Member & Compromised)
15. adjed (Sr. Member & Compromised)
16. Drai (Sr. Member & Compromised)


Connected Accounts to Previously Banned/Tagged Ones!

1. AshikurRahmanKhan16 (Banned)
2. rezveekhan (Banned) (Newbie)
3. pictsidhe (user banned for using multiple accounts, plagiarism, ban evasion) (Pretty strong guess of mine is that this was a bought account!)
4. polyballz (user banned for using multiple accounts, plagiarism, ban evasion) (Pretty strong guess of mine is that this was another bought account just by looking at the post history!)
5. Family2930(Red Trusted)
6. akashark(Red Trusted)
7. ashikerrez(Red Trusted)
8. iqbalrozi(Red Trusted)
9. sagufran (Red Trusted & User Not Active Since September 2019) (Newbie)
10. Ferris419 (Hacked/Bought Account, Red Trusted & Still active on the forum- participating in various bounties!) (Hero Member)
11. Kick (Hacked/Bought Account, Red Trusted & Still active on the forum- participating in various bounties!) (Member)
12. Ashking94(Active)
13. Spider A4(Auto Banned)



References:

Quote from: coinlocket$
Quote from: suchmoon
The OP has been banned for plagiarism and is now apparently trying to figure out how to avoid detection with their next alt.
https://bitcointalk.org/index.php?topic=5043370.msg46659912#msg46659912

Code:
0x5b7371be93f4276c0d367d1675999dcf3e0f4272
Archive: http://archive.is/zKojb#msg44112021

Accounts is linked whit this addresses/accounts
Code:
0x5b7371be93f4276c0d367d1675999dcf3e0f4272
0x4638110c2bd8089ea2f5afc31a25e3795b8918a7 UNKNOW
0x0c3c4b59330284989d16f6c2574511e6807c825a UNKNOW
0x48c24cb19f9ff1a9ce004c3b8422d8a61ec9a301
0x5674beb9845d921a4f399ac8761c990228782391
0xa1dc91d3b6d49be417bc268ff507a04d67eaf264
0x09b46b98a73b3de5aabf4d8b463f6956c2084306
0x3f5db1bc57c3b762bed995de5bb97ad78ef0d235


ACCOUNT
AshikurRahmanKhan16 (Banned)
Family2930(Red Trusted)
akashark(Red Trusted)
ashikerrez(Red Trusted)
iqbalrozi(Red Trusted)
Archived: http://archive.is/wip/7f2s0

Ferris419      Hero Member
Kick             Member
sagufran      Newbie
rezveekhan  Newbie    banned bpip

Conclusion: Ferris419, Kick, sagufran, rezveekhan are controlled by one abuser that evades the ban.
Archived: http://archive.is/yRawd#msg53224257

Accounts Connected:
ashikerrez

Archived: http://archive.is/bKmkf#msg53229329

Extraction:
This guy has been exposed as bounty cheaters/account buyer/hacker/scammer with a lots of altaccounts and hacked account previously by KTChampions and YOSHIE. Some respectful members already talked a lot about this person in this thread where Yoshie provided a couple of more altaccounts of Akashark/Ferris419.


Proof:

ETH address: 0xFCeE7547D17b09b99c1d825BC0e32efB711A9df4
Telegram username: @Pacpok94
Instagram profile link: https://www.instagram.com/Pacmana94/
Facebook: https://www.facebook.com/Pacman094
Twitter: https://www.twitter.com/Pacman094
Linkedin: https://www.linkedin.com/in/shohagkhan94/

Archived: http://archive.is/uuRht#msg53404912

Bitcointalk username: Redbunny
Rank:  full Member
ETH address: 0x23CB67CAA90cDF9EEB02ddB2231e436459359C32
Telegram username: @shakeelaijaz1
Instagram profile link: https://www.instagram.com/shakeelaijaz9/
Facebook: https://www.facebook.com/Pacman094
Twitter: https://mobile.twitter.com/shakeelaijaz1

Archived: http://archive.is/6MBCM


telegram : @shakeelaijaz
twitter: @alizaijaz5
redit: kilaijaz

Archived: http://archive.is/OG6qr#msg51861951

Telegram Username: @shakeelaijaz
Twitter Username: @alizaijaz5

Archived: http://archive.is/17dLP#msg49320647

Now if we look at the post history of this user we can see a sudden change of his pattern. From a regular poster on Speculation from Economy board (Specially the topic "Wall Observer BTC/USD - Bitcoin price movement tracking & discussion"), Trading Sections to Altcoins and Bitcoin Discussion sections after June, 2018. Ironically the owner of this account changed the password of this account on 30th June 2018.



I'm working in China. I'm a US Citizen. I need to buy crypto.

Archived: http://archive.is/wip/xkr64

But judging by this user's recent social media accounts it can be said that this user is not a US citizen which may lead one to think that this might be another bought account of this user.

Now we need to see what wallet address hacked account Kick used for bounties.

Username at Bitcoitnalk; Kick
ETH wallet address; 0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571

Archived: http://archive.is/SUVbz#msg53259777

How about the YouTube channel that already been exposed account Akashark used for participating in various bounties?



Archived: http://archive.is/mcKAg#msg47662736


Archived: http://archive.is/XhAD9#msg52189807

Now if we take a look at the pacman7331's history of participating in various YouTube bounty campaigns then we see the same YouTube channel that he used for bounty with his previous accounts still is being used.


Archived: http://archive.is/oHv0x#msg53991681
Video Archived: http://archive.is/nC5wK




Archived: http://archive.is/Qd9Hs#msg53747793
Video link 1's Archived: http://archive.is/wip/TNlBw

Now if we click on the channel's name then we can go to its profile link which is https://www.youtube.com/channel/UCvJVT8UkgS2v7LwE83bsurQ




Connection between previous accounts and the bought ones:

Now we have to go back to one of the Ethereum address this user used for his pictsidhe and akashark account.

Quote from: coinlocket$
Code:
0x5b7371be93f4276c0d367d1675999dcf3e0f4272

Archived: http://archive.vn/nGge6



Archived: https://archive.is/zKojb#msg44112021

Ledger ETH Address: 0x02D84A866f6Ad6F8DB78617e16DA76c401e59d37


Archived: https://archive.is/fVtx9#msg51457911

Now we have to see whether hirngespenst is connected to all of those accounts. It's a tricky one because the user probably hacked/bought this account sometime in May, 2018 for only one purpose which was to enroll in various Signature campaigns. We can see this account was registered in 2015, the original owner used to be a miner from Germany.



Archived 1: https://archive.is/wip/0gn6U
Archived 2: http://archive.is/wip/kRNgx
Archived 3: http://archive.is/HqFz0

After 2 months of sleeping this account woke up on 16th of May, 2018 and ironically on the same day current user changed the password and started posting on Altcoin section, Bitcoin Discussion. No more post in the German section since then.!

ETH Address: 0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb

Archived: http://archive.is/QvVlI#msg46702520



TX between 0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb and 0x820e459e9181d0d00a97df64c6b7fffb42ba3f13 for WPP tokens.



TX ID: https://etherscan.io/tx/0xec204b362fc1c3abafe7966d619a25b83a72d8bb936e2f23d6274b5b6debf811
WPP Holder: https://etherscan.io/token/0x056dd20b01799e9c1952c7c9a5ff4409a6110085?a=0x820e459e9181d0d00a97df64c6b7fffb42ba3f13

Now if we click on that 0x2b50a28e3d2df8b4f4287b716ea6b225fe1f4599 address then we find that 3 wallet addresses of this proven bounty cheater’s which are 0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571 (Used by Kick) and 0x5b7371be93f4276c0d367d1675999dcf3e0f4272 (Used by pictsidhe)) present in here.



From that tokens balance we see 0x820e459e9181d0d00a97df64c6b7fffb42ba3f13 and 0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571 account sent a lot of different tokens to 0x2b50a28e3d2df8b4f4287b716ea6b225fe1f4599 which I presume was being used for stacking up different bounty reward tokens that this user earned from various bounties.

Tokens Balance: https://etherscan.io/address/0x2b50a28e3d2df8b4f4287b716ea6b225fe1f4599#tokentxns


0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb is connected with 0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1 which is the wallet address of user novusordo.

Wallet address: 0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1.

Archived: http://archive.is/8OvFg#msg51905384

This wallet was fueled by user hirngespenst’s little Ethereum and also hirngespenst sent PPT tokens to that wallet.



TX ID: https://etherscan.io/tx/0x8b383d2e3aa2506cb5707b27eb8e1abb8aaeb0bd075dd306e1f75c965a56f1ab

Now things getting interesting because we see this user with a habit of buying hacked or old BTT accounts has another active bounty accounts which is surely a hacked or bought account. This user sent exactly the same amount of PPT tokens to that 0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1 at the same time of our previous proof of that Transaction happened.



TX ID: https://etherscan.io/tx/0x350893daf93a6b9c26022cefefced2cb74f84e0ebc19d50e09f58615b75f0a0c

Then after a few minutes he dumped or sent all the earning PPT to another wallet.  



TX ID: https://etherscan.io/tx/0x1cd7f46666fb242f7b8d64bc760eca2a3d3d9e20c9671602af50d4d046399609


[/b]ETH Address: 0xaD62278702602e2D36f92B335BBFD942F4E61bE2

Archived: http://archive.is/kqgAw#msg46702967

Now if we see the post history of kickdapa, we can see this guy was one of the active miners back in the days and then his account went to sleep in 2016 and woke up after 2 years in 2018, started posting a lot one liners, shitposts in alt-sections mainly.

Now we can find out how much he has tried to bypass his cheating way into different bounties using the same Twitter account but changing the Twitter username from time to time!!!  Cool Cool


Archived: https://archive.is/c7S94#msg51434864

If we click on that twitter profile we see the profile does not exist!



But if we click one of the tweet links from the quoted post then we see it redirects to https://twitter.com/pacman094 which is already being used by a couple of other Bitcointalk accounts as shown in this thread!!!!



Archived https://twitter.com/somarahman94/status/1138583561915682816: https://archive.is/VFBzx

Now if were to judge where this guy is from after seeing the mentioned location he put in his twitter and LinkedIn bio we could say this guy is neither an American nor a German but he owns which proved that the owners were from USA and Germany.


Archived: https://archive.is/Jh9eQ

Now if we revisit to our proven cheater’s wallet 0x5b7371be93f4276c0d367d1675999dcf3e0f4272 then we can find out more connection with Kickdapa’s wallet 0xad62278702602e2d36f92b335bbfd942f4e61be2.



TX ID: https://etherscan.io/tx/0x4925d6e2962cc1d31a723cc7f0c26c2a9ad0ad5e87c9647286d7766eb3eda898
For More proofs: https://etherscan.io/tx/0xca95f700a84a4a98aac0d2011a64f9453b40ba2627e1d8f6b7c460ea3b6ebf1d

Now to further prove that Kickdapa is indeed the alt of this user we can see how he started stacking a couple of more ETC-20 tokens in 0xb6214F03087f2E25A8894F553da600132F6A31E5 wallet along with sending from 0x02D84A866f6Ad6F8DB78617e16DA76c401e59d37 which wallet he previously used for other accounts including akashark.



Tokens TXs: https://etherscan.io/address/0xb6214f03087f2e25a8894f553da600132f6a31e5#tokentxns

Ironically this account has so many connections to 0x5b7371be93f4276c0d367d1675999dcf3e0f4272 which was/is a proven wallet address of bounty cheater.

Again see: https://bitcointalk.org/index.php?topic=5046375.msg46666193#msg46666193

This guy is already enrolling in different bounties using his alts. For one example we can see that he has enrolled in BestChange signature campaign and social media campaigns.

BTC Address: 3P14PQ47zWyaNyUfTWqQYh7JnWZe2PtUL7
I am joining: Signature & Twitter Campaign
Twitter Profile: https://twitter.com/Hironges90

Archived: https://archive.is/8xsay#msg53594818

BTC Address: 3NbmxihW2yqLxZ1Vg7voHn5QBYbNYi2oVC
Twitter Profile: https://www.twitter.com/Pacman094

Archived: https://archive.is/j0Jib#msg53594281

Signature Sheet: https://docs.google.com/spreadsheets/d/1S-Z93LYB6lQ9Rgn3ElcVvlo2xnXC-XGNE5rLQmiPr4g/edit#gid=0
Social media Sheet: https://docs.google.com/spreadsheets/d/1r1O54dOYCooQOIfVO9oo3WYEzkmIwYqi5cQlJ4-TVJ4/edit#gid=0


Merit Abuse:

An inactive Legendary member named Jayjay04 suspiciously gave pacman7331 a staggering 50 Merits for this post though the pictures he posted there are no longer available to see.

6k is bottom. Gonna just go out on a limb and say we won’t see sub 6k coins.

Some buy volume coming in.
Hit the edge of the descending wedge




Archived: https://archive.is/STbsi#msg40069338

This user sent Merit from his known alt Ferris419 to Hirngespenst for bounty related very post.



Archived: https://archive.is/wip/FJ1Ia

Again this user sent Merit from his known alt Ferris419 to Hirngespenst for bounty related very post.



Archived: https://archive.is/wip/2Zi1M


Now, this guy is one of the most talented bounty cheaters/hackers on the forum because he has tried so hard to enroll in different bounties with his countless hacked/bought accounts. My guess would be that he has not probably missed any bounty since Fall, 2017! Now we can see he tries to clean his tracks by wiping out or deleting his bounty reports on the forum or every time one of his accounts gets banned/red trust, he changes his social sites credentials. But a little thing here and there and an hour of digging took me back to his already exposed account iqbalrozi. He used to enroll with https://www.linkedin.com/in/iqbalrozi account, after he got red trusted with so many other bitcointalk accounts he since then deleted almost all the LinkedIn reports from that iqbalrozi BTT account and then changed the username to https://www.linkedin.com/in/shohagkhan94 and sometime it is https://www.linkedin.com/in/ashikkhan094. Neat trick if you ask me but can't hide anymore. If you click on iqbalrozi's LinkedIn and pacman7331's LinkedIn profile shohagkhan94 you will see they redirect to the same LinkedIn profile.




Archived: http://archive.is/uuRht#msg53404912

Quote from: iqbalrozi

Archived: https://archive.is/hWw7P#msg50121206
Linkedin post archived: https://archive.is/Lp02v,

He has been using this LinkedIn for participating in various bounties till today.



Bitwings bounty sheet from 2019: https://docs.google.com/spreadsheets/d/1n7S2BhO4SacDQkIhjjpWTGb4_q3EtPg2C9lUAwekMJc/edit#gid=1906941467

ETH (ERC20) Address: 0xFCeE7547D17b09b99c1d825BC0e32efB711A9df4
Linkedin: https://www.linkedin.com/in/shohagkhan94



Archived: https://archive.is/oHv0x#msg53991681

Spyce bounty sheet from March, 2020: https://docs.google.com/spreadsheets/d/1yk2hd1NrXsB1cz6gol5LMWZE700otHqR7i912okO228/edit#gid=1821524638



Miscellaneous:
Account buyers are not to be trusted. There are enough proofs in this post that indicates that this guy is using all of those active accounts currently which are connected to previously busted altaccounts of his. He has also broken the ban evasion rule so many times. It looks like whether DT members or reputable bounty managers tag him or not, this guy will again start using another hacked/bought account because he knows how to get those Bitcointalk accounts so easily and we can't do anything about it tbh. But I hope he will have his conscience back and work towards something good which can benefit the forum or him or the people around him.

Related Addresses:
Code:
0xFCeE7547D17b09b99c1d825BC0e32efB711A9df4
0xA136DBdDAD3Bcf0499a13B1C181B45F0290A181f
0x5b7371bE93f4276c0d367D1675999dcf3E0F4272
0x23CB67CAA90cDF9EEB02ddB2231e436459359C32
0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571
0x02D84A866f6Ad6F8DB78617e16DA76c401e59d37
0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb
0xaD62278702602e2D36f92B335BBFD942F4E61bE2
0x0ab9f6a3d5b46f3ec909d86015fbf4a8e6f843a3
0x4429128EdEe19eBaD7A8970De248319C9329dF4C
0x07D04c9b6933db16F83121C407B946d58B4643Cf
0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1
0x4928faD9eeD76BC91C87B336852d7318cb701272

BTC Wallets:
3P14PQ47zWyaNyUfTWqQYh7JnWZe2PtUL7
3NbmxihW2yqLxZ1Vg7voHn5QBYbNYi2oVC

Social Sites:
YouTube 1: https://www.youtube.com/channel/UCvJVT8UkgS2v7LwE83bsurQ
YouTube 2: https://www.youtube.com/channel/UCRRL7wS4Ktt-UNLgZ9StMug
Facebook: https://www.facebook.com/Pacman094
Twitter: https://twitter.com/pacman094
Linkedin:
https://www.linkedin.com/in/shohagkhan94/
https://www.linkedin.com/in/iqbalrozi/
https://www.linkedin.com/in/ashikkhan094
https://www.linkedin.com/in/akashark94/
Telegram: @Pacpok94
Ashking94
14  Economy / Reputation / Kakatua Bounty Manager With His 41 Altaccounts! on: March 19, 2020, 06:14:51 PM
41 Accounts connected including Kakatua bounty manager's

Update:
Unfortunately, there are more alts of this user which have been found and reported in here: https://bitcointalk.org/index.php?topic=2544574.msg54075994#msg54075994

For Complete List of This Scammer's Accounts and Supporting added Flags on Accounts CLICK HERE

Lauda has created a flag against kakatua based on the findings mentioned in this thread: https://bitcointalk.org/index.php?action=trust;flag=1474

There has been some talks about the bounty manager Kakatua among the bounty hunters communities after experiencing his very low quality bounty projects in recent times and then he has been tagged by some trusted members on the forum.
References:
1. https://bitcointalk.org/index.php?topic=5229914
2. https://bitcointalk.org/index.php?topic=5230077.msg53956003#msg53956003
3. https://bitcointalk.org/index.php?topic=5230005.0

Now I noticed the guy behind the account has Farid/Jahid/Alex/ in his username and then started to dig deep. Now please bear with me before I  get into details about the Kakatua guy.

Before that let's find out some Bitcointalk accounts which can be later proven as connected  


1. cryptofarid10 2. ALEX JAHID 3. jljahid1020 4. saddam83 5. Adegokemufu 6. Jentamicing 7. Miosekogba 8.
Miztasnow 9. rashedul74064 10. alamin173020 11. saju8090 12. Motin9 13. fannyaslam9 14. alex@ismail 15. ismail2270 16. ArickAslam0
17. JSRJ4 18. kakatua






Let's first look into Clickgem bounty campaign by Kakatua. We can see the requirement for the Twitter campaign is at least to have 500 minimum followers but Cryptofarid10's twitter used for this campaign had/has less than 30 followers.


500 - 1500 Followers : 1 Stakes per Week
1501 - 3000 Followers : 2 Stakes per Week
3001 - 5000 Followers : 4 Stakes per Week
5000+ Followers : 6 Stakes per Week

http://archive.is/wip/SyXPu

Twitter used: https://twitter.com/wahidyousofzy
Even though he submitted another twitter for the authentication post and still with less than 10x of the minimum required followers he got approved by Kakatua and this is very odd to find out that only 7 twitter participants were accepted out of 1818 applicants as shown in the spreadsheet !  

Proof of authentication
- Campaigns applied for: Facebook, Twitter, LinkedI,   Telegram, Signature
- Telegram link: https://t.me/alexhasanjahid
- Facebook link: https://www.facebook.com/cryptofarid10
- Twitter link : https://www.twitter.com/lima9882
http://archive.is/mestZ

Ethereum Address used: 0x086d85d1AEBc7dd3B26493F267B0f8e01bC9de4b

Spreadsheet for reference: https://docs.google.com/spreadsheets/d/1RLrinqIunUoXTQJXjUxqQRVjtS8jpzpuHrvsrk7WuNQ/edit#gid=1353884078
 



Now the next one is very serious cheating attempt by Kakatua, the Fred Energy bounty manager (http://archive.is/wip/2E5oY) where cryptofarid10 submitted other people's work as his own Translation works, and mentioned Hindi as his Language but he is most definitely a Bangladeshi guy whose native language is Bengali.



This cheater posted the User welovedcrypto work using that person's portfolio link which is https://docs.google.com/spreadsheets/d/108kbGPMovqothYU8tv0ZTWrJ1VvQdO7E4vRFJhtuoqU/edit

And Kakatua still accepted him in the campaign and gave him full stakes for the Translation job! The Ethereum address used for this bounty was 0x7f9b9dfe29c1d7ec426567c116e021b419b19788



 
Spreadsheet for reference: https://docs.google.com/spreadsheets/d/1YStMlJIrEtSXmJBwrOGftgNa47yuFNuPsk5o6-ueaC8/edit?usp=sharing

The mentioned wallet address 0x7f9b9dfe29c1d7ec426567c116e021b419b19788 is connected to the user named Alex Jahid.



http://archive.vn/fUXtD#msg43127314

Alex Jahid's Ethereum address: 0xab8b6803e61c82a773582cb45d313fd903562958

We can find out the transaction between Alex Jahid and Cryptofarid10's wallets.


TX ID: https://etherscan.io/tx/0x4a8c00e7bcdf14b4e3ed5977bad3d1e3fb4130fd06374cedc42d4d318cae77eb

Ironically Cryptofarid10's telegram ID used to be https://t.me/alexhasanjahid.  So we can see the common words like Alex and Jahid in both of those connected accounts.

I need a good trader from Brazil country people only...I give him salary 100$ perday.  If anyone here massage me telegram : https://t.me/alexhasanjahid

Archived: http://archive.vn/wip/4ysab

We can find out the user jljahid1020 used the same Ethereum address for a MB8Coin bounty.

jljahid1020's Ethereum address: 0xab8b6803e61c82a773582cb45d313fd903562958



Ether Wallet: 0xab8B6803E61c82a773582CB45d313FD903562958


Archived: http://archive.vn/N8PAl#msg40142603


This scum in here wrote that he was a native Arabic Speaker who's also fluent in Hindi and Bengali!!?  Huh He posted others works as his own in the MB8Coin bounty thread.

Reserve Arabic translation
I am a professional English to Arabic ICOs translator
- Native language: Arabic language

- Translation previous experience :
https://drive.google.com/drive/folders/1g-pbQPHonbNrdMc21mzTCbxV7_m4hXzd?usp=sharing
.
.
.
.
.

Email: jh259818@gmail.com
- I have excellent English to Arabic translation experience and vice versa as I write and/or translate articles in both
- I am a surgeon so, I had more than 24 years of learning totally in English
- Bitcointalk username: jljahid1020
- Bitcointalk profile URL: https://bitcointalk.org/index.php?action=profile;u=1484489
- Twitter username: @jahid349203
- Twitter profile link: https://twitter.com/Jahid349203?s=09
- Twitter audit score link: https://www.twitteraudit.com/Jahid349203
- Facebook profile URL: https://www.facebook.com/profile.php?id=100013518917321
- Youtube profile: https://www.youtube.com/channel/UCPCl2kSE3tLgSKRMgrA6j3A
- My Telegram account link: https://t.me/jahid349203
- ERC20 wallet address: 0xab8B6803E61c82a773582CB45d313FD903562958

- Bitcoin wallet : 1FWvXTTHxMrwFRXzsiFaX2rsB3d1hSs5c9


Archived: http://archive.vn/wip/SvqTi



http://archive.vn/T4i63

Now just after a couple of days of acting as a fluent Arabic, Hindi translator, this filth applied as Filipino translator! Like WTF!!!!

Native language: Filipino
Part of bounty you apply for (ANN/Telegram): ANN
Translation/moderation experience (if any):
.
.
.

Bitcointalk username: jljahid1020
ERC-20 wallet address: 0xab8B6803E61c82a773582CB45d313FD903562958


Archived: http://archive.vn/wip/7Ln3H

His posts in the Bengali thread proves that he is in fact with only one native language which is Bengali.
 
এটা বাঙালি থ্রেড এখানে সবাই বাংলায় কথা বলতে পারেন। বিটকয়েন টক একটি ফরম সাইট এটা বিটকয়েন ডিস্কাসনের যায়গা। আমি মনে করি এখানে যারা কাজ করে তাদের মদ্দে বিটকয়েন সম্পর্কে জ্ঞান আছে, যাদের মদ্দে এটির সম্পর্কে বেশি জ্ঞান আছে তারা অন্যদের সাহায্য করুন। এটা  ফেসবুক, টুইটারের মোত কোনো সামাজিক মিডিয়া নয় যে এখানে, হাই, হেলো, কেমন আছো, কি করো, শুভ সকাল, শুভ রাত্রি, লিখবে, এইগুলা লিখলে তাকে রিপোর্ট দেওয়া হবে।তাই কেও এখানে কোনো অমুলক কথা লিখবেন না।

Archived: http://archive.is/dpTY9

jljahid1020 is Connected to saddam83

Bitcointalk Username: Saddam83
Your Twitter Account Link: https://twitter.com/BitcoinMaster9?s=09,
Bitcointalk profile link: https://bitcointalk.org/index.php?action=profile;threads;u=1789235;sa=showPosts,
ETH Address : 0x8735Df8be03b3E454028F7375e7a4e5eDC478612


Archived: http://archive.vn/xCrck#msg41209725

We can see from the wallet's TX history that it's connected to jljahid1020's wallet.
saddam83's Ethereum address: 0x8735Df8be03b3E454028F7375e7a4e5eDC478612

TX ID: https://etherscan.io/tx/0xc5a7fa06f3c2353603d69523d5f3b8e7c7214c0a2d14f133e57f5b6575ef2479




Now this saddam83 account is directly connected with our Scammer Hero Cryptofarid10/Kakatua which can be proven from the following transaction of Equitybase (BASE) token and proof of authentication posts by Cryptofarid10.

#Prof
Twitter profile: https://twitter.com/cryptofarid10?s=09
Telegram username: @cryptofarid10
ETH address: 0x66cb2fbb2809d42cc84077914db8d05a66c0f78e


Archived: http://archive.vn/AST12#msg43858760



TX ID: https://etherscan.io/tx/0x775878038972f057324af265cb0010e069cd98438392c189af668e02beb7d049



Now again Cryptofarid10 is connected to another account Adegokemufu.
Ethereum Address used: 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0

 


Archived: http://archive.vn/wip/Nr1yH



TX ID: https://etherscan.io/tx/0x6b3757ca787476b699e61c489ea0b397f47fbd8c95c9fc092339cfce329aef31


Now Adegokemufu is conncected with Jentamicing because both used same Eth address for bounties!

I passed kyc and I've not yet recieve my token.
My email : bodundedre@gmail.com
Wallet ; 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0


Archived: http://archive.vn/wip/8AgRt

Jentamicing is connected to another account named Miosekogba which shows the same wallet address was being used!

Week 8
Facebook campaign
facebook link : https://m.facebook.com/funmilola.ajayi.deborah
Number of friends :5000
Facebook username : Funmilola Deborah ajayi
Eth address : 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0



User Miztasnow also used the same Ethereum address for different bounties.

#proof of ownership
Telegram username : miztasnow
Twitter username :@iamhenny1
Wallet : 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0


The user rashedul74064 with eth address 0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E is connected to user
alamin173020 with eth address 0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018.




TX ID: https://etherscan.io/tx/0x0b8aadd949406263198809ba6d2adc0fb9586a111845a469979f7ef5271d06a6


★Proof of authentication post *
BTT user name : alamin173020
Telegram username : @btctaker
ETH address : 0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018

Archived: http://archive.vn/wip/yHV3v


This user rashedul74064 sent to his altaccount saju8090 a little gas fee for withdrawing StiB tokens that he received from StiB bounty campaign. In the spreadsheet of this bounty we can see in the download campaign User Saju8090, spreadsheet number 162 used 0xe40e76b981e40de1ac4044c479e1e34a695a00c2 address which is connected to rashedul74064’s eth address 0x5ac09f199b321ca92310148901ae3b0ce6622b0e.


Now the user rashedul74064 also participated in the StiB campaign.


Reference: https://docs.google.com/spreadsheets/d/1GFC0KJ5woVzPvRZK4IkIQh7vPjpvK0VYVUtwQh4vVOk/edit#gid=0



TX ID: https://etherscan.io/tx/0x97d6654aff0133dc712dc98351939e32c55b6696cd63fae3a7a1a8608f1f7a88

Now rashedul74064 is the altaccount of Motin9.
Ethereum Address: 0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5


##Join&PROOF OF AUTHENTICATION##
Bitcointalk Username: motin9
Mail: fannyaslam9@gmail.com
bitcointalk profile link: https://bitcointalk.org/index.php?action=profile;u=2367176
Facebook URL: https://www.facebook.com/nusratjahan.sumi.7140
Linkedin: https://www.linkedin.com/in/moom-tuch-39a609184
Twitter url: https://twitter.com/AslamArick?s=09
Telegram Username : @onyka73
Ethereum Wallet Address : 0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5



Archived: http://archive.vn/a4Dgf#msg51322769


Now Motin9 is the same user named fannyaslam9 with same same wallet address address.

Twitter profile link: https://twitter.com/ArickAslam?s=096
Telegram usear name:@cryptolover73
bitcoin profile link: https://bitcointalk.org/index.php?action=profile;u=2150901;sa=account

my ether address : 0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5


Archived: http://archive.vn/m9mwA#msg41392755


Now it’s already proven by YOSHIE that this Motin9 has several accounts on this forum. I wonder why it has not been tagged already!


Accounts Connected:

2. Motin9
3. MOOMTUCH
4. fannyaslam9


Now we can again trace back alamin173020 connection to the user rashedul74064 by tracking the wallets transaction.



TX ID: https://etherscan.io/tx/0x0b8aadd949406263198809ba6d2adc0fb9586a111845a469979f7ef5271d06a6

We can again see the use of ALEX in another connected account!



Archived: http://archive.vn/OLl6r#msg48410002

Now my mind is really starting to feel crazy with all of those connected accounts and then I find out that user rashedul74064 connected
to
another account alex@ismail.



TX ID: https://etherscan.io/tx/0xbf74d076d325adc4b00dc115028bbb95f08bdfe17cc65ccbf79f0c08b3139ac1

Ethereum Wallet Address:     0xD16fC5fC14F6f629f07441ece92f7C264c9be70a



Archived: http://archive.vn/0jwBR#msg52287231

This time we can discover that alex@ismail is from the same person who is behind BTT account ismail2270 using same Ethereum address for various bounties


Bitcointalk Username: ismail2270
Bitcointalk Profile Link:
https://bitcointalk.org/index.php?action=profile;u=2254584
Facebook Profile Link:
https://www.facebook.com/mdkhorshed.alommamun
Number of Facebook Friends: 1600
Your ERC20 Ethereum Address: 0xD16fC5fC14F6f629f07441ece92f7C264c9be70a


Archived: http://archive.vn/157yT#msg43058032


Now let us go back to our Hero ALEX JAHID with Ethereum address 0xab8B6803E61c82a773582CB45d313FD903562958 and as we have already found out rashedul74064’s eth address which is 0x5ac09f199b321ca92310148901ae3b0ce6622b0e connected to each other.

Archived: http://archive.vn/jXQyj#msg42783206



TX ID: https://etherscan.io/tx/0xbf9653aa0d8695da5d88600f5118ef3d06a37ce069dc4dfb464a1a36b31457ea


Special mention for this wallet 0x510088496ebd87ef4783ea3175d1ee88cd121a8d which has been used by user Motin9 and another newly found altaccount of the same user named ArickAslam0 .

Bitcointalk Username: ArickAslam0
Email: arickaslam0@gmai.com
bitcointalk profile link: https://bitcointalk.org/index.php?action=profile;u=2583700
Facebook URL: https://m.facebook.com/fanny.aslam.50
Twitter url: https://twitter.com/arick0?s=09
Reddit: https://www.reddit.com/u/Moomtuch?utm_medium=android_app&utm_source=share
Telegram Username : @onyka7
Ethereum Wallet Address : 0x510088496ebd87ef4783ea3175d1ee88cd121a8d


Archived: http://archive.vn/AMUw2#msg50834911

Bitcointalk Username: motin9
bitcointalk profile link: https://bitcointalk.org/index.php?action=profile;u=2367176
Facebook URL: https://m.facebook.com/bountyking28
Twitter url: https://twitter.com/MOOMTUCH?s=09
Telegram Username : @bountyking7
Linkin: https://www.linkedin.com/in/moom-tuch-39a609184
Ethereum Wallet Address : 0x510088496ebd87ef4783ea3175d1ee88cd121a8d



Archived: http://archive.vn/lSViY#msg51406763

Now here we can see- all of those Bitcointalk accounts are connected to each other, have connected wallets and all of this can be traced back to cryptofarid10.

Now we can see this user loves the name ALEX so much that he has used it in many places for the creation of various username and another giveaway by him is the over use of both ALEX and JAHID on so many occasions.

Proof of authentication
- Telegram link: https://t.me/alexhasanjahid
 

Archived: http://archive.vn/wip/VrMte

Now if we go deep into the Cryptofarid10’s eth transaction details then we can find out that his wallet received some eth from 0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa.




TX ID: https://etherscan.io/tx/0x919b19308a81403b3f3d46a09264d60b204bb5f1bd13c8fd035243faf5f7f487
 
Now we find that the wallet address 0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa is actually connected to Motin9.



TX ID: https://etherscan.io/tx/0x1edc976f20e634bb23962ba3aeb96fcd84d4eb44bec3afb6eea31099f8da289d

 
I can provide more transactions between those two wallets like the following ones:
1. https://etherscan.io/tx/0x17df6d509e6e434762c2bb8255de691c52ea0a979238c992ab41baa384b799ec
2. https://etherscan.io/tx/0x79aa6972338fdfecbf50d7596843f5aa3cc17232a3fa5bba5a57882f28e1d71e
3. https://etherscan.io/tx/0xe6b488d76065fba689d2dddd84ceb1a6c51b7984651cda2bc6f38676e730626d
4. https://etherscan.io/tx/0x86896990276eae55d6205a4b957a57d477b93caa1ce9eae65342861e5b0c6117
5. https://etherscan.io/tx/0x77df08ef324563e2c4b386495f3831dbf37f36ed7945e7f75ceff28c0a09b6ef

This CryptoFarid10 guy even dared to cheat in one of Yahoo62278’s campaign called StiB with another newly found altaccount (oh man I am getting tired now!)
JSRJ4.



We can find out that he sent StiB tokens from his 0x7f9b9dfe29c1d7ec426567c116e021b419b19788 wallet to this wallet 0x335FB382b5A151b55E09bFAC9f20D5F2937D272E which he used for staking up all of his rewards from StiB campaigns.



TX ID: https://etherscan.io/tx/0x7e925249bde6f3a87d1dcb6287381e11231e76518dab3403f6ac819ca86232a4

 
We can see that another wallet which he used for cheating in Yahoo62278’s campaign is 0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a and he sent 9600 StiB to the 0x335FB382b5A151b55E09bFAC9f20D5F2937D272E wallet.



TX ID: https://etherscan.io/tx/0x57696e47680ca6b5b0df98d33a2886b4cc96c7008cd003fd3a3e497bfa6feea5

For Reference: https://docs.google.com/spreadsheets/d/1GFC0KJ5woVzPvRZK4IkIQh7vPjpvK0VYVUtwQh4vVOk/edit#gid=0

Now as I have previously mentioned how much this cheating scum loves the name ALEX and JAHID that he has used one or both names in almost all of his altaccounts.

We can quote his post from JSRJ4 for further proof!

WEEK#15 (26/06-02/07)
Facebook campaign
Facebook Link: https://mobile.facebook.com/alexhasanjahid

Twitter campaign
Twitter Link: https://www.twitter.com/alex_jahid
#Tweets:
1. https://twitter.com/alex_jahid/status/1132128826404855808?s=19




Now let’s see if we can prove that the Kakatua guy is indeed the owner of all of those accounts! I remember there was a guy with username @cryptofarid begged me for Merit on Telegram back in October, 2018 and then I saw the Kakatua bounty manager had almost identical pattern of using alex as username when he first launched his bounty management group and then I PM’d him on telegram. I remembered Cryptofarid10 was so happy in late 2018 when he got merit for a merit worthy post in Bengali local board from LoyceV. I dm'd this Kakatua guy on telegram and I called out him as Farid and then he acknowledged to that, confessed to me that he is the the owner of Cryptofarid10 account which we can see now is connected to so many other Bitcointalk accounts.
The following screenshot is the conversation between me and him in Bengali language.    



Here he is admitting that he was very happy when LoyceV gave him merit and the main reason for his happiness was that he was a newbie.


সকল bitcointalk ইউজারদের  উদ্দেশ্যে বলছি।
জুনিয়র মেম্বার হতে ১ টি মেরিট সিস্টেম করার পর থেকে মেরিটেড করার পরিমান বেড়েছে। কেও হয়তো ১ টি মেরিট কিনে জুনিয়র হচ্ছে। কেও হয়তো কারো সাথে চুক্তি করে মেরিট নিয়ে জুনিয়র হচ্ছে, আবার কেও হয়তো তার অন্য কোনো বড় অ্যাকাউন্ট থেকে নতুন অ্যাকাউন্ট করে সেখানে মেরিট নিয়ে পজিশন আপ করে রাখছে। আমি আপনাদের ভালোর জন্য বলছি এইসব বন্ধ করেন যদি আপনার অ্যাকাউন্ট রক্ষা করতে চান। কারন ইতিমধ্যে ইনভেস্টিগেশন শুরু হয়ে গেছে। প্রতিটা অ্যাকাউন্ট এর ইনভেস্টিগেশন করতেছে। মেরিট সোর্স ও লেজেন্ডারি মেম্বার LoyceV ও আরও কিছু ক্ষমতাশালী লেজেন্ডারী মেম্বার ও মডারেটর। LoyceV এর ইনভেস্টিগেশন তালিকা]
নোট সবাই শেভ থাকার চেষ্টা করুন।  কারো মাথায় যদি কোনো রকম চালাকি  বুদ্ধি থেকে থাকে তাহলে সেগুলো ভূলে যান, যদি আপনি আপনার অ্যাকাউন্ট বাচাতে চান। কারন এটা ব্লকচেয়িন সিস্টেম যা শিকলের মতো আপনার একটা কাজ অন্য আরেকটা কাজের সাথে যুক্ত হয়ে থাকে। আপনি কোনো ডকুমেন্ট  কোনো রকম ভাবে মুছতে পাড়বেন না। ভূল কিছু করলে সেটা অবশ্যই ধড়া খাবেন।  তাহলে সবাই ভালো থাকুন এবং সতর্ক থাকুন।
ধন্যবাদ..

Archived: http://archive.vn/wip/T8ySM

For Reference: The above quoted post which Kakatua (Telegram username: @Jahid902) and me was talking about!



Now, we can see that this Kakatua/cryptofarid10 used his Kakatua account to cheat in the SitB bounty too!



The wallet address 0x6173d37f0292327ebe607f650d5b08c0ae104d57 belongs to Kakatua and the following TX proves that he received 8M Bitcollar tokens for managing the Bitcollar bounty campaign.
https://etherscan.io/tx/0x46c9f16a101979e8d6f1d122c02ea499bb24340b8511ae9c97c27043fa7f2d95

Now we have finally got the ultimate proof that Kakatua’s wallet address is directly connected to all of those above mentioned wallets by showing one single TX between already mentioned cheating wallet 0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a for enrolling in the SitB campaign and Kakatua’s 0x6173D37f0292327eBe607F650d5b08C0AE104D57.




TX ID: https://etherscan.io/tx/0x9fd4820d7f1259099c88ec9a64e0bd3e3a64051aaf3131f79fac61c5ccd3ca9d
 
Then he transferred all of the SitB tokens to his 0x335FB382b5A151b55E09bFAC9f20D5F2937D272E wallet address.



TX ID: https://etherscan.io/tx/0x57696e47680ca6b5b0df98d33a2886b4cc96c7008cd003fd3a3e497bfa6feea5


Miscellaneous:
Even this filthy scammer whose Kakatua account has been painted in red because of managing or launching many fraudulent, scam projects on the forum and there are a couple of threads against him already and to be honest the communioty is getting rekt because of those kind of cheaters with massive number of altaccounts, the space is becoming a place for scammers and dishonestly, many newbies are joining in his campaigns and without even doing own diligence they are indirectly helping scammers to promote scams and many people are losing funds, times for being involved with such scam projects. I have a hunch that this guy is the centre of creating some of the scam projects that he has managed as bounty manager. It’s probably up for the debate but what I can express from those proofs is that this guy deserve to be get ban hammer by the DT members, community and should never be allowed to return on the forum. But it's up for the respectful members of the forum to decide what to do.


Related Addresses:
Code:
0x086d85d1AEBc7dd3B26493F267B0f8e01bC9de4b
0x7f9b9dfe29c1d7ec426567c116e021b419b19788
0xab8b6803e61c82a773582cb45d313fd903562958
0x8735Df8be03b3E454028F7375e7a4e5eDC478612
0x66cb2fbb2809d42cc84077914db8d05a66c0f78e
0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018
0xe40e76b981e40de1ac4044c479e1e34a695a00c2
0x5ac09f199b321ca92310148901ae3b0ce6622b0e
0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5
0xD16fC5fC14F6f629f07441ece92f7C264c9be70a
0x510088496ebd87ef4783ea3175d1ee88cd121a8d
0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa
0x335FB382b5A151b55E09bFAC9f20D5F2937D272E
0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a
0x6173d37f0292327ebe607f650d5b08c0ae104d57


Edit: Changing the Title of this thread from "Kakatua Bounty Manager With His 17 Other Altaccounts" to Kakatua Bounty Manager With His 34 Altaccounts!"
15  Economy / Scam Accusations / Aceh Coin - Plagiarized Whitepaper on: December 21, 2019, 10:34:58 PM
What happened: Aceh Coin Project plagiarized Reserve Protocol's Whitepaper.

Aceh Ann: Not Created

Aceh Bounty: https://bitcointalk.org/index.php?topic=5208313.0
Archived Bounty: https://web.archive.org/web/20191221203827/https://bitcointalk.org/index.php?topic=5208313.0
Bounty Manager's Profile: https://bitcointalk.org/index.php?action=profile;u=1146060

Aceh website:  https://acehcoin.pro/
Archived:  https://web.archive.org/web/20191221203827/https://bitcointalk.org/index.php?topic=5208313.0

Domain Information:
Quote
Domain Name: ACEHCOIN.PRO
Registry Domain ID: D503300001182233678-LRMS
Registrar WHOIS Server: whois.publicdomainregistry.com
Registrar URL: http://publicdomainregistry.com/whois
Updated Date: 2019-11-11T06:12:49Z
Creation Date: 2019-11-11T06:12:49Z
Registry Expiry Date: 2020-11-11T06:12:49Z

ICO status: Private Sale through Google form is Live

Aceh Coin whitepaper: https://acehcoin.pro/wp-content/uploads/2019/12/White-Paper-V1.pdf
Archived whitepaper:  https://web.archive.org/web/20191221201204/https://acehcoin.pro/wp-content/uploads/2019/12/White-Paper-V1.pdf

Reserve Protocol whitepaper: https://reserve.org/whitepaper.pdf


Contents that Aceh Coin copied from Reserve Protocol's whitepaper is on the left side and original Reserve Protocol's is on the right side.




They did not even change the Reserve token's name to theirs when they copied from Reserve Protocol's whitepaper.




Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!