Bitcoin Forum
January 18, 2026, 05:57:49 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: « 1 [2]
21  Bitcoin / Hardware / Lketc: New 5Th-Miner real? on: August 10, 2015, 06:12:26 PM
Has anybody any information about this gear:

http://www.lketc.com

Actually, had bought some Dragons from Lketc in the past - and after I changed the PSU, they are still hashing today. So this may be an interesting new machine...?
22  Other / Off-topic / My personal and very unexpected investment plan on: August 08, 2015, 01:53:48 AM
Okay, folks, it's been 40 years now that I've started to smoke cigarettes.

Currently, I smoke two packs a day. Which is a daily expense of 16.20 Swiss Francs. Unless I work more - then it's a bit more.

There are only few cigis left in my package. And once I've smoked them - I quit.

Well, at least that's my plan. A plan I had a couple of times before. This time, it is different. At the end of every month, I'll invest the money I would have spent for cigarettes in Bitcoins. Here's the wallet address:

1AEADz9tqeSzut47C5v293ioACv1TbBDt7

Currently, this would be about two BTC a month - depending where the price goes. So let's see how much I'll have at the end of the year...
23  Economy / Scam Accusations / Scammers behind cloudminr.io on: July 06, 2015, 06:36:58 AM
Hi all,

now that you have been ripped off by cloudminr.io, it is about time to gather some information about the people behind it.

Actually, from the very beginning on, many people - me included - posted valid evidence that this "company" does not exist and that it is most likely a scam. However, they had their supporters and co-workers, and it makes sense to start to list them here.

The chances for the victims to get back ANY tiny little part of their investment is small. The cloudminr-admin never reveald ANY information in this board about his identity. But there were some people who did. There were people who fiercly defended cloudminr.io. They, too, are responsible.

So take this thread to start to reveal who was part of this ponzi.

I start with this fellow guy who should answer a couple of questions:

https://bitcointalk.org/index.php?action=profile;u=223338

He wrote the following post:
Quote
CLOUDMINR.IO will be back within 1 hour. We are taking the site down temporarily due to performance issues which do not let the automatic payout to take place.

This week's payout will be made in time - 314 BTC will be sent within the 1 hour.

Obviously, he is deeply involved in cloudminr.io. So if anybody has more information about him and his role in cloudminr.io, just post it here.
24  Bitcoin / Mining speculation / Mongolia on: April 17, 2015, 02:29:06 PM
Seems a lot of mining facilities are located in Mongolia where the earthquake was. Has anybody any information about the impact on these?
25  Economy / Goods / Amazing Fantasy 15 - CGC 1.5 - 30 BTC on: April 05, 2015, 02:24:53 PM
I'm selling some parts of my comic book collection. One of the books is Amazing Fantasy 15.

Publisher: Marvel Comics
CGC Universal Grade [Blue Label]: 1.5 FR/GD
Cream to Off-White Pages
This comic book is history as it shows the origin and 1st Appearance of Spider-Man (Peter Parker).

Here's a picture of the comic book's front page:



The price for the book is 30 Bitcoins. This offer is valid until April 30, 2015. Payment through an escrow is okay.

The book will be shipped to the buyer from Switzerland by priority mail.

It is a unique possibility to buy this comic book. Often you find restored examples which look better,  but haven't got such a big potential in gaining value as an unrestored one.

If you need more information about the book: Let me know.

I've got tons of other historic comic books which will go to an auction by mid-May. If this book won't be sold here for Bitcoins, it'll go to the auction, too.

Here's a picture of the CGC-label, for those who are interested:

26  Economy / Services / Looking for html5 guy/gal on: March 28, 2015, 06:04:23 PM
For a couple of smaller and bigger projects, I'm looking for someone with html5-knowledge who would be willing to do some work - paid in BTC. Please PM me.
27  Bitcoin / Hardware / New Dual-Miner? on: March 20, 2015, 11:02:27 PM
Stumbled upon the following site:

http://www.gammatecnology.ch/announcing-a-revolution-in-the-mining

Has anybody an idea what miner this should be?
28  Local / Biete / Bitmain Antminer S3 on: February 02, 2015, 11:54:36 PM
Biete vier Bitmain Antminer S3. Preis pro Gerät: 0.65 Bitcoin plus Versandkosten. Die Geräte befinden sich gegenwärtig in der Schweiz, würden aber aus Deutschland heraus versandt, d.h., dass keine Mehrwertsteuer anfällt.

Alternativ können sie auch bei uns gehostet werden für 12 Rappen pro kw/h (gegenwärtig: 0.11 Euro).

Am liebsten würde ich natürlich alle vier in einem Stück verkaufen, wer jedoch nur einen möchte: Einfach PM.
29  Bitcoin / Mining speculation / Could ASIC-producers perform a block withholding attack? on: January 25, 2015, 01:46:34 PM
Hi all,

first of all: I am not a tech guy like so many people here in the board. I'm not a mathematican or engineer, therefore, I lack some basic technical understanding when reading several posts and whitepapers.

What I am: A Bitcoin-enthusiast since years. I'm mining with some lousy 40 Th. I'm involved in a mine in Switzerland. I'm working on several Bitcoin-related projects. And I'm a profound enemy of conspiracy theories – i leave them for the nutties.

However, lately, I'm asking myself a couple of questions, and maybe, some savvy people here in the board will be able to explain me why my theories are totally wrong.

First two sentences which summarize my theories:

a) ASIC-producers could be behind withholding attacks
b) ASIC-producers could influence the difficulty

Let me explain.

Today, most of us rely on ASIC-producers. And a lot – if not most - of these ASIC-producers are also mining. This is not only intransparent, it is also a possible threat to the mining-sector of the Bitcoin-economy.

In the past, we have seen some withholding attacks. There was the one on Eligius. Wizkid wrote back then:

Quote
So, after some investigation over the past month or so, it turns out a couple of clients/addresses were involved in a “block withholding attack” against Eligius which has cost us an estimated 300 BTC, and likely miners of other pools as well. A block withholding attack is where a miner submits low difficulty shares but does not submit block solutions— so they appear to be working for the pool and continue to get paid while not actually doing useful work for the pool.

It is unknown how many other pools they’ve executed this attack against. While withholding attacks are detectable, they are not possible to prevent: the risk of block withholding is inherent in how Bitcoin pooling works. Since the attacker does not gain any direct benefit by performing the attack it is usually assumed to not be a serious risk. A withholding attacker can’t profit, except through indirect effects like making a pool look less “lucky” and driving miners to other pools.

So block withholding attacks are real. The question is: cui bono?

Producers of mining equipment who also are mining, for example, could take their profit out of this.

Just as a theorie:
A producer of ASIC-miners could produce two kinds of miners. Normal working miners and some which are not working correctly. What could they do with these miners?

a) They could sell these defetive miners and use them for a basically undetectable because widely distributed withholding attack. Alternatively, by using a closed-source software, they could remote control the behavior of some miners and switch them into „withholding mode“ at their will. Both scenarios would basically be undetectable.

b) They could stash such manipulated miners in their own premises and use them from time to time for a withholding attack against one or several pools. Again, this would be basically undetectable.

What would be the benefits of such an attack? First, they could steer miners to their own pools or pools they are working with. Or they could make sure that their own pools get profits while the attacked pools don't.

At the same time, they make two times profits: With their pools and with selling equipment.

Furthermore, the difficulty could be manipulated. A lot of worthless hashrate drives the difficulty up and could be used for manipulating it. If I look at the BTC-price and the posts of many miners who just switch off or underclock their equipment, while the hashrate is only going down a tiny little bit, the question arises why. If some ASIC-producers would be manipulating the hashrate, it would – in my laymans's understanding – make sense.

As mentioned before: I do not have any evidence that such an attack is taking place, nor do I blame any producer of such a behavior. But the fact that ASIC-producers are selling their equipment and some are using closed source software and also set up their own pools is making me suspicious.
30  Local / Mining (Deutsch) / Miner nach Deutschland importieren on: December 20, 2014, 06:46:46 PM
Hallo zusammen,

kann mir jemand mitteilen, welche Gebühren beim Import eines Miners aus China nach Deutschland anfallen? Mehrwertsteuer und dergleichen?
Besten Dank.
31  Local / Mining (Deutsch) / Unmanaged Hosting in den Schweizer Alpen on: December 01, 2014, 10:14:53 PM
Hallo zusammen,

ursprünglich hatte ich gehofft, bereits vor einer Weile in der Schweiz ein Mining-Datencenter fertigzustellen. Leider hat es etwas länger gedauert, aber ab Anfangs 2015 sollte alles bereit sein.

Was ich anbieten kann:

- Unmanaged Hosting: Die Rechner werden vorkonfiguriert in die Schweiz gesandt, also plug-and-play-fertig. Sie werden ins Zentrum gestellt, angeschlossen und laufen.
- Preis pro kW/h: 12 Rappen plus 8% MwSt, also 0.1296 Franken pro kW/h. Umgerechnet in Euro nach heutigem Kurs: 0.11 Euro pro kW/h. In diesem Preis ist die Miete inbegriffen.
- Gegenwärtig ist dies hobbymässig, das heisst, dass ich lediglich zwei bis drei Mal pro Woche vor Ort sein kann. Läuft ein Rechner nicht, kann ich ihn also erst nach einigen Tagen wieder anstellen.
- Es wird lediglich Strom aus Wasserkraft verwendet. Die Abwärme soll in einem weiteren Schritt in das Fernwärmenetz eingespiesen werden.
- Bezogen werden kann der Strom in 1/-kW/h-Schritten. Wenn ein Gerät also 1.8 kw/h verbraucht, werden 2 kw/h verrechnet. Verbraucht es 1.35, werden 1.5 verrechnet.
- Mindestdauer für die Miete sind drei Monate. Mindestens der 1. Monat muss vorausbezahlt werden. Hier ein Rechenbeispiel: Ein SP35 mit 5.5 Th/s und einem Verbrauch 3650 W käme pro Stunde auf 44 Cent zu stehen, pro Tag also auf 10.56 Euro. Die Bezahlung kann entweder in Euro, Schweizer Franken oder - natürlich - Bitcoin erfolgen.

Selbstverständlich kann das Zentrum, sobald es läuft, auch besucht werden. Und wenn alles gut läuft, kann man bis anfangs Jahr auch in einem lokalen Hotel mit Bitcoin bezahlen.

Und jetzt: Los mit den Fragen :-)
32  Economy / Economics / Enemies of Bitcoin on: November 19, 2014, 06:29:44 PM
Many of us have had this experience: You go to a bank for opening an account regarding a Bitcoin-business - and the bank refuses you as a client. Or you want to rent office space - and the landlord hears "Bitcoin" and shreds the contract.

However, I'm sure that all those who cry now "Bitcoin is a crime" will try to make the big business in the future. So it may be worth to note who was against Bitcoin in the beginning...

I, for example, established a company in Switzerland. I was in need of a bank account. The following bank accepted my money for setting up the company: Zürcher Kantonalbank. But once the company was set up, the bank refused to give back the money. Their opinion: Bitcoins are illegal. So I should find another bank for the day-to-day business, and they would transfer the money to this other bank. However, every time I contacted a bank, they refused to open an account because of Bitcoin. Here's the list of those banks:
- Postfinance Switzerland
- UBS Switzerland
- Credit Suisse
- Berner Kantonalbank
- Basler Kantonalbank
- Coop-Bank
- Deutsche Bank

Funny, though, that UBS has since started to work on some Bitcoin-studies and Zürcher Kantonalbank has set up a "Task Force Bitcoin"....

33  Economy / Services / Looking for programmer on: November 06, 2014, 10:58:20 AM
Hi all,

for several projects, I'm looking for a programmer with either pythong or C skills...

Details if you PM me with some of your background.

Thanks
34  Economy / Goods / Amazing Fantasy 15 - first appearance of Spider-Man on: October 05, 2014, 11:22:34 AM
For sale: Amazing Fantasy # 15 from August 1962. First appearance of "Spider-Man". Cover by Jack Kirby, drawings by Steve Ditko, story by Stan Lee. CGC-rating is 1.5, although when compared to other CGC-rated Amazing Fantasy 15, I'd rate it a 2.5.

It is sealed in a CGC-box and will be shipped from Switzerland.

Escrow welcome.

Only offers in Bitcoin.
35  Local / Mining (Deutsch) / Kashra-Serversysteme on: July 02, 2014, 08:00:25 AM
Hallo,

gibt es noch jemanden, der bei Kashra-Serversysteme in Celle einen Miner bestellt hat? Auf E-Bay postete Kashra zum Beispiel dieses Inserat:

Quote
Wir bieten hier den X-3 2000 GH/s Bitcoin Miner an.

Wir haben für unser firmeninternes Projekt mehrere X-3 2000 GH/s Miner mit Lieferdatum Ende Februar 2014 bestellt, wechseln jetzt jedoch die Cryptowährung
in unserem Projekt auf Litecoin.

Wir wechseln, da unser Rechenzentrum bereits betriebsbereit eingerichtet ist und der Strom beim Versorger als Mengen-Paket vorab bezahlt wurde.
Wenn wir nun bis Ende Februar das Energie-Kontingent nicht vollständig nutzen können, müssen wir den Strom dennoch bezahlen und daher haben wir uns
entschlossen aktuell unser Projekt mit GPUs auf Basis von Litecoin langfristig zu betreiben und die Bitcoin Miner wieder abzugeben.
Dies nur als Erklärung warum wir die Geräte hier bei Ebay anbieten.

Gleichzeitig wurden die Geräte auf der Kashra-Homepage angeboten.

Nur: Nachdem Blackarrow nicht liefert, spielt auch Kashra "Toter Mann", reagiert nicht auf Mails, reagiert nicht auf Anrufe. Ich überlege mir, gegen die Firma eine Anzeige wegen Betruges einzureichen.

Gibt es ausser mir noch jemanden, der hier geschädigt wurde?
36  Bitcoin / Pools / Some few findings regarding the recent attacks on: May 22, 2014, 09:45:25 PM
As most ouf you are aware, several mining pools were under DdoS-attacks during the last couple of weeks. Some of these pools still are being attacked.

At the same time, several miners reported in Bitcointalk about a hack which cost them Bitcoins. Here some examples:


Quote
March 31, 2014, 11:36:51 PM
Thanks Frank.  I'm using BAMT from a usb stick and nothing else has ever been installed on this.  Furthermore, because we were on vacation, other computers in the local network were shut down, and my home router is tiered with a second home router, so to get access to this machine someone would have had to have hacked through two routers/firewalls....  My miner is currently resolving us.clevermining.com fine, but its possible that dns was poisoned temporarily at the ISP level to trick my miner into resolving to a different IP.  I found
using netstat that the only connection to an external IP was to 46.28.205.80:3333 from Zurich ( http://www.iplookup.ca/46.28.205.80 ).  Clearly they somehow tricked the miner into connecting to that IP address.  I have tons to catch up on after being out for almost 2 weeks so I haven't read up all the thread on this, but the speculation that it was some malicious software we downloaded is simply not possible.  It had to be either a DNS hijacking, or the BAMT software has a backdoor, or possibly clevermining purposely resolved us to this new IP.   No other possibility in my mind.  Very suspicious of BAMT as well as clevermining... Since the dns is hosted by cloudflare, it could have been someone at cloudflare too.  I may start specifying the IP in my cgminer.conf rather than the us.clevermining.com address.  That should eliminate the DNS hijacking possibility.

Anyways, thanks for pointing me to the beginning of that thread.

Rob



Quote
April 26, 2014, 05:44:40 PM
This jumping to 46.28.205.80 happens on ghash too... And every time at same time... So it might be something automatic...

17 rigs, 3 locations



Quote
April 27, 2014, 10:54:18 AM
Not sure if your issue is the same but if you are redirected to ip 46.28.205.80 it is a "pirate" pool that somehow redirect you to them... It is happening to me too on 4 different pools with 19 rigs 4 locations and 2 ISP (BTCGuild, ScryptGuild, Ghesh and Eligius).


Quote
April 26, 2014, 03:23:53 PM
Pool users should check their connections to Slush. I noticed with two miners that I hadn't submitted a share in the last ten minutes. My miners were showing that they were still connected to pool 0, but 46.28.205.80 instead of the normal address. There is talk on Eligius about a malicious player doing a man in the middle attack, it's worth reading up on.



Quote
May 04, 2014, 03:59:35 PM
My both miners were redirected to 46.28.205.80 again. I hate thieves. I received nothing from last round because of them... Someone should do something about that.


Quote
April 26, 2014, 01:41:12 AM
Redirected clients show "Connected to 46.28.205.80..." in the miner.
This seems to be a scrypt "Worldcoin" mining server, and it seems likely they are just automatically MITM'ing any stratum connections they can inject into, regardless of the destination pool.


Quote
May 05, 2014, 06:38:41 PM
YES! I have a jalapeno and it's happened to me twice this week. I find my miner heads off to IP 46.28.205.80 .



These are only some statements, and it is likely that several miners haven't even realized that they were being pirated.

However: The IP mentioned in these posts and the connection to DdoS-attacks leads me first back into the past.


Dragonara
Some of you may know dragonara.net. Most not.

I stumbled upon this domain many times in the past. First, some comments on them from third parties.

„Spamhouse“, for example, just calls the „Dragonara Alliance“ a „Cybercrime hub“:

If you search for them in connection with DdoS-attacks, you will see that they offer protection against this. However, several users report a bad experience: Instead of protection against this kind of attack, they received such an attack.

Furthermore, Dragonara is known as source for spam.

But who is behind Dragonara? This is not fully known.

Interesting is what you find in the whois-data: While most of the whois-information is fake, they list the following e-mail address as a tech-contact: "Registrant Email: tech@dragonara.ch"

".ch" is the TDL for Switzerland.

But this is not the single lead to Switzerland. Beside some marketing speak you find - on older versions of their homepage - a text, saying that they are located in Switzerland: „Dedicated server with DdoS-protection, Colocation, DdoS-Protection up to 14 Gbit/s. Datacenter located in Switzerland, Zurich, 99.9% uptime SLA guaranteed.“

On their homepage, they listed three partner-companies:
- prodecor.ch
- init7.net
- cogentco.com



Pecunix
And then there is Pecunix. „Digital currency operator. Pecunix is backed by gold, and offers an advanced and secure API for merchants and users“, as they used to claim on their homepage.

Today, the site looks different. However, Pecunix was often mentioned in connection with illegal activities. This doesn't necessary mean a lot, for Bitcoin, too, is often mentioned. But there is a strong connection between Pecunix and Dragonara: Pecunix was for a long time hosted by Dragonara.

And Swiss authorities should know Dragonara, too, for Dragonara hosts a lot of „High Yield Investment Programs“ - or financial scammer sites. One of these programs was run by a Swiss fraudster, and Finma, the Swiss Financial Market Authority, shut down the company. So Finma should know about them and have them on their radar.

But before I go further, let me take a look at prodecor.ch, one of the listed partners of Dragonara. Prodecor produces and promotes some financial software for small enterprises. The persons behind the company, according to the Swiss registry of corporations:
- Pascal Andre Wenger
- Erich Rieder
- Michael Fuchs

Erich Rieder is listed on the homepage as founder of Prodecor.

One of Rieders other sites is prowebnet.ch. In the past, he promoted on this site web hosting – in Russian.


Solar Communications
Now that you know a bit about Dragonara, let me go back to the hack of Bitcoin-miners.

The IP to which the miners were directed:  46.28.205.80.

This IP is in the range of the Swiss company „Solar Communication“.

They basically offer the same services as Dragonara: Hosting, collocation, DdoS-protection – and are also based in Zurich, Switzerland.

Owner of the company are two Russians:
- Alexey Dengin
- Vitaly Ilin

But manager of the company is Erich Rieder. Right: The guy who's company is a partner of Dragonara.

„Solar Communication“ claims to have a couple of partners:
- server-cloud.com, Switzerland
- incloudibly.com, Switzerland
- cloudc.me, Spain
- coinshost.com, Switzerland
- swisshosters.com, Switzerland
- atomdrive.net, Switzerland
- true-cloud.com, Switzerland
- antiddos.es, Spain

Some of these names may sound familiar, for they are users in Bitcointalk and are even offering rewards if you promote their services on reddit.

Just look at the domain coinshost.com:

coinshost is registered by

Registrant Name: Marcus Schwarzenberg
Registrant Organization:
Registrant Street: Badenerstr. 569
Registrant City: Zurich
Registrant State/Province: Zurich
Registrant Postal Code: 8048
Registrant Country: Switzerland
Registrant Phone: 41791033365
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: dipodex@gmail.com


I could not find any person by this name in Switzerland and especially not at this address.

The same is true for atomdrive.net:

Registrant Name: Tim Keller
Registrant Organization:
Registrant Street: Badenerstr. 569
Registrant City: Zurich
Registrant State/Province: Zurich
Registrant Postal Code: 8048
Registrant Country: Switzerland
Registrant Phone: +41.41791033365
Registrant Phone Ext:
Registrant Fax:
Registrant Fax Ext:
Registrant Email: atomdrivetim@gmail.com



No Tim Keller at this address.

No wonder, for the address is the one of the data center of Solar Communications.

This company also accepts payments in Litecoin and Nxt – and, of course, Bitcoin.

This is puzzling. Trading with Bitcoins, especially as a company, is tricky in Switzerland. Finacial Market Authority threats to let you arrest if you do not check the identity of every single client. So it is not possible to sell Bitcoin-debit cards, Bitcoin-credit-cards, Bitcoin-vouchers, not even one with a value of 50 Swiss Francs. Just guess what would happen if you run, as a company, a Bitcoin-related service for offering fully anonymous hosting. You would be busted.

But these laws do not seem to work for Solar Communications and its affiliates. Even worse: As a hoster in Switzerland, you have to check who your client is. But Solar Communication's „partner“ atomdrive even writes:

"All information about our clients is kept in the strictest confidence, however, even more anonymity can be achieved by using payment systems such as Bitcoin.
After making an anonymous payment, you will receive a unique key without having to release any personal information."

A simple test showed that it is no problem at all to create an account with totally fake information. This is like a blue print for money laundering. Which should be fought by Finma.

However, let's go back to Pecunix, this alternative money-system of which Dragonara hosted the homepage in the past.

Guess who's hosting Pecunix today? Right: Solar Communication.

If you go to the Pecunix-site, you will see the following text:
"Pecunix will soon be changing! Payments will no longer be possible within the Pecunix system, rather they will be made with the state of the art open source Voucher-Safe System that has been developed and tested over the past 3 years. Please prepare yourself if you are a Pecunix customer or prospective customer. Go to www.voucher-safe.com and set up a voucher-safe for yourself... it's FREE."

In a story about Voucher-Safe, one can read:
Quote
"Voucher-Safe is a secure cloud based system. Unlike Bitcoin, “there is nothing actually on your phone or on your computer. If your phone should get lost or stolen or arrested by authorities, there is nothing for them to find.” All of the information in the system is encrypted, sometimes twice. “What that means is that no one, including the voucher Publisher, can see what value somebody has. They might see that there are so many rows in the table at this hash for that particular safe, but there is no way to know what those rows represent, or whether they are simply payment receipts.”
[...]
The idea behind voucher-safe is that money can be anything that people value and want to exchange.  Money can be national fiat currencies, silver or gold and increasingly, Bitcoin. Bitcoins can be exchanged via the Voucher-Safe system with the creation of Bitcoin backed Vouchers."

So here we go: Payments, but totally anonymous. Something the Swiss Financial Market Authority surely would not accept for it would basically violate every law against money laundering.

But yes, it is the Internet. And the Internet is not in Switzerland. But: Pecunix is hosted in Switzerland. Voucher-Safe is hosted in Switzerland. By Solar Communications. Which offers through an obviously non-existing partner anonymous hosting.

And now, out of the blue, comes an attack against miners from the same network?

Now take a look at thebitcoinaffiliate.com - a site also hosted by Solar Communications.

If you click on the Merchants-link on this site, you land at http://bitcoinsarl.fr/. Also hosted by Solar Communications.

They list a whole range of Bitcoin-related businesses:
TheBitcoinNews.co.uk (hosted by Solar Communications)
Bitcoin Börse (hosted by Solar Communications)
Bitcoin Card (part of Bitcoin Börse)
Cryptobourse.com (hosted by Solar Communications)
(Cryptobourse tries to sell you their shares for 0.001 BTC  and lists a whole lot of other domains which are hosted by.... make an educated guess!)
Cryptotu.be (hosted by Solar Communications)
trustedbitcoinstores.com  (hosted by Solar Communications)
cryptohashingpool.com (hosted by Solar Communications  and currently hashing with amazing 1 Gh/s, but selling shares through Cryptobourse.com – no, the 1 Gh/s is NOT a typo!)
asic-scrypt-mining-hardware.com  (hosted by Solar Communications. Look what they are selling and what prices. 17 Euro for 100 Kh/s cloud mining. 19999 Euro for a scrypt-miner which doesn't even exist. 12999 Euro for a 6 Th/s-miner – which doesn't exist).

So after all, this smells like scam. Like a huge scam.

I still don't know who is behind the hack of the miners. But I do know now a bit about the background of the persons and the domains behind the network. And frankly: I will avoid every service and miner which is being sold by any of the affiliated companies.

However, one journalist contacted the guys in Russia who are behind Solar Communication. They claim that one of their clients is running a mining pool on this IP address and was hacked. So he, basically, is painted as the victim.

Well, if I were running a mining pool and would be hacked and then would have more Bitcoins than before, I wouldn't really call me a victim.

On Blockchain (I know, not the most reliable source) there are a couple of transactions that were relayed first by the ip 46.28.205.80. The records start 2014-04-08 04:04:19 and end 2014-05-14 22:57:16. So in this time, a little bit more than a month, amounts ranging from a view Satoshis up to more than 200 BTC were relayed on this address. But where's the pool? Never heard of it. So if anybody ever has heard of them: Post it here.

Maybe some of you find more information and would like to post. The more that becomes known, the more likely it is that we find out who's behind the attacks.

And especially the guys who are posting here in Bitcointalk representing the partners of Solar Communications are more than welcome to give some explanations...

If this information has been helpful, please don't hesitate to make a donation :-)

17Ab6X6kLDfs5TD353vZN5hQ5W6e79pufp

One of the attacked miners added this information:

Quote
Two days they were using P2Poll node we can see they hijacked average of 130TH and at the max they got over 370TH. In only this two days they got about 9000$. http://p2pool.jir.dk/stats/btc/46.28.205.80/

After that they still were using IP 46.28.205.80 but probably only as a proxy to different address. They are also running Worldcoin pool for scryptmining. http://bitinfocharts.com/worldcoin/nodes/switzerland/unknown.html

Since heartbleed bug was only 2 weeks away it might happened that attacked did find some internet infrastructure that was compromised and used it for Man In The Middle attack. Since attacks stopped it might get patched.

Attacker somehow send correct package over TCP stratum connection that asked miner to reconnect from current stratum server to 46.28.205.80. This is a command in stratum protocol used for load balancing and DDoS protection but was misused when injected into connection as a hijacked function.
37  Local / Mining (Deutsch) / Miner in der Gegend von Zürich? on: May 16, 2014, 09:58:38 PM
Hallo zusammen,
der Sommer kommt - und deshalb habe ich in einer Fabrik in der Nähe von Zürich einige kühle Räume gemietet, um weiter minen zu können. Falls jemand Interesse daran hätte, seine Miner dort ebenfalls einzustellen: Bitte eine PM.
38  Bitcoin / Hardware / 50 TH-miner - probably not for the kitchen... on: May 04, 2014, 10:59:39 PM
Is this http://peernova.com/product/petaone-rack/ the wet dream of every miner - or just some huge PR-buzz which will turn out as hot air?
39  Bitcoin / Pools / "Private" pool? on: April 26, 2014, 10:05:40 AM
Hi all,

anybody an idea who the persons behind "Demonpool" are? Looks kind of weird to me... And couldn't find anything about them. (http://www.demonpool.com)
40  Bitcoin / Hardware / Hardware monitoring on: April 26, 2014, 12:45:43 AM
I've got my different miners at different locations. Ant most of the time, I can't be everywhere (yeah, from time to time, I've got to go home...). Now it would be handy if there would be some solution which would enable me - and probably others - to monitor all miners remotely and - if necessary - restart them. Does such a thing exist?
Pages: « 1 [2]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!