Bitcoin Forum
September 21, 2019, 08:31:10 AM *
News: If you like a topic and you see an orange "bump" link, click it. More info.
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 [30] 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 87 »
  Print  
Author Topic: Known Alts of any-one - A User Generated List Mk III (2019 Q3)  (Read 82209 times)
Sasuke102001
Full Member
***
Offline Offline

Activity: 280
Merit: 111


View Profile
April 29, 2018, 02:11:01 AM
 #581

Accounts Connected:

Fazlurkhan.kz
Adioliver
Sasuke102001

Proof:

Adioliver and Sasuke102001 applied for the same campaign - IOS signature bounty campaign




ETH addresses of Adiliover and Sasuke102001 related to ETH address: 0x9bB968440878783811eCf303523C35B7643a9c73 (An old ETH address of Sasuke102001 - check)





Fazlurkhan.kz used ETH address: 0x856FaB3402D730045Ea0446CAD094c4A62dce37e



And Fazlurkhan.kz  ETH address also related to old ETH address of Sasuke102001: 0x9bB968440878783811eCf303523C35B7643a9c73



Both Fazlurkhan.kz and Adioliver joined Rebellious airdrop in this forum. Although I can't find out the spreadsheet but I know it cause both ETH addresses of these acounts received Rebellious token when Rebellious airdrop distribution happened.




After that Adioliver  send Rebellious token to Fazlurkhan.kz

https://etherscan.io/tx/0x2e444c771f0b7b83797ed5958b32f112592153c4c1c7bb922c4d71a6b3fda10e

Beside all these accounts applied for the same campaign very closely




Related Addresses:

Code:
0x856FaB3402D730045Ea0446CAD094c4A62dce37e
0x2425736D0764A630bc011C6118d3d01DdbF79470
0x3157C72F81C83E06b6b5B48c8293Cae6FD920eC6
0x9bB968440878783811eCf303523C35B7643a9c73

Miscellaneous:

Abusing bounty and airdrop with alt accounts.





Only one transaction between 2 eth addresses.
No strong evidence, just a suspicion of alts just because these accounts had enrolled in same signature campaigns quite a few times.
No same eth addresses used by any of the 3 accounts.
If anyone can review the case, kindly do so.
1569054670
Hero Member
*
Offline Offline

Posts: 1569054670

View Profile Personal Message (Offline)

Ignore
1569054670
Reply with quote  #2

1569054670
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
1569054670
Hero Member
*
Offline Offline

Posts: 1569054670

View Profile Personal Message (Offline)

Ignore
1569054670
Reply with quote  #2

1569054670
Report to moderator
1569054670
Hero Member
*
Offline Offline

Posts: 1569054670

View Profile Personal Message (Offline)

Ignore
1569054670
Reply with quote  #2

1569054670
Report to moderator
cheater detector
Member
**
Offline Offline

Activity: 73
Merit: 26

Hello cheaters, I'm back!


View Profile
April 29, 2018, 06:49:57 AM
 #582

Accounts Connected:
zhangxie29152784, linshisui38, anzhanbei1214068, huanzhong644306, lantan81383628, yanxuanyunshan4, mi56374100, yurenchuang7125,


Proof:
This address has recieved many WEPOWER token deposits... https://etherscan.io/address/0x4e7691b3c29665282e19f0077907b268601ab80c#tokentxns


When we search on Wepower bounty sheet v2 on signature campaign https://docs.google.com/spreadsheets/d/1olZL82IL25jWujuiVqHZy7VGz7epeE2bvVQLXF7M2as/edit#gid=1930357659 , we found these names...

zhangxie29152784 0x3844daccb2816ed8293362ee67d554feafdb75ec #141
linshisui38 0x3844daccb2816ed8293362ee67d554feafdb75ec #150
anzhanbei1214068 0xb1521a31fa5d8a3efe2085300e3a5b6c7f48d9ee #199
huanzhong644306 0x29290a709c2128b3294ddb3cb217104011053a3a #185
lantan81383628 0x864787afe824c55437dd9323b52bb295388bebff #167
yanxuanyunshan4 0xbbb3648e14c1394104f622df2583521767526ddf #157
mi56374100 0x9b196a3068fc9b6f864a4d2efad8c90da82e9f0e #192
yurenchuang7125 0x295badf8a63b08f593f241c1fdf3b55fd597b4bf #213


Related Addresses:

Code:
0x3844daccb2816ed8293362ee67d554feafdb75ec
0x3844daccb2816ed8293362ee67d554feafdb75ec
0xb1521a31fa5d8a3efe2085300e3a5b6c7f48d9ee
0x29290a709c2128b3294ddb3cb217104011053a3a
0x864787afe824c55437dd9323b52bb295388bebff
0xbbb3648e14c1394104f622df2583521767526ddf
0x9b196a3068fc9b6f864a4d2efad8c90da82e9f0e
0x295badf8a63b08f593f241c1fdf3b55fd597b4bf

Miscellaneous:
Abusing bounties with alts
rajurathod18
Member
**
Offline Offline

Activity: 224
Merit: 21


View Profile
April 29, 2018, 06:55:08 AM
 #583



Cybermiles bounty campaign was managed by Krypital. After checking final spreadsheet I came across lots of bounty abusers and in the spreadsheet I found fake accounts which do not exists and coincidently have same BTT, telegram, twitter and facebook names which totally hint us towards bounty rewards manipulation & corruption

Here is the link to the final spreadsheet of cybermiles bounty campaign rewards https://drive.google.com/open?id=1qQMtIoF5YXJ88b8FbSiMuKxIHKJBW1bC81WRz3bE0FY

I will share here one by one bounty abusers which are not doing their bounty hunting in an honest manner.

CASE 1



In above image members marked in blue have alt accounts for bounty campaigns hieuvm1991, phuongthao96, bichphuong, kimphuong1988, Selja1977,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3bBC7c49b83Fb93D9eD2E4e80365D108f19ff35C

Reference of Abusing 1) https://ethplorer.io/address/0x3bbc7c49b83fb93d9ed2e4e80365d108f19ff35c#pageSize=100
                               2) https://ethplorer.io/address/0x103ba1e2f25029f95fa379125e6bcff76f2f525a#pageSize=100

Related address
Code:
hieuvm1991        -0x103Ba1E2f25029f95fA379125e6BCfF76F2f525A
Code:
phuongthao9      -0x4DeB348ABbF1A559C3DDEC9D99915A64e74c497C
Code:
bichphuong         -0xD53FF4d07870d5bfD02c6D39E4b39B39d0594F4e
Code:
kimphuong1988  -0x2b45f1528c74a228bcf9Ec491466a17A308aa193
Code:
Selja1977           -0xb24201F31144134C8432299A24Ef07802763C045

CASE 2



In above image members marked in Yellow have alt accounts for bounty campaigns Deubila, GangNamSK
, HSRP,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0xA2539237Fd90b50BEC35aCd7d41816A550E75ACa

Reference to Abusing 1) https://ethplorer.io/address/0xa2539237fd90b50bec35acd7d41816a550e75aca#pageSize=100
                               

Related address
Code:
Deubila            -0x9D7eD4AA9E99C6b05e9cab71f0b33834c5CaA6bF
Code:
HSRP               -0xF67E951e9a1194DceBEeFfC7DF1Fef2E8551a608
Code:
GangNamSK     -0x51ACA61EFd0b9020353eaA9fD53040e3adB5849C

CASE 3



In above image members marked in Yellow have alt accounts for bounty campaigns Windybi, ngungoc130485

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3463934897d356B8659cBDFE15209e3bC3229105

Reference to Abusing 1) https://ethplorer.io/address/0xd9cf954b678e9a6bf997ae61a61b62f928e6dcb5#pageSize=100
                               2) https://ethplorer.io/address/0x151bc71a40c56c7cb3317d86996fd0b4ff9bd907#pageSize=100
                               

Related address
Code:
Windybi                 -0x609cbBa0792115d83Ac12883290C9F83a67e662b
Code:
ngungoc130485      -0xd9cf954B678E9a6BF997AE61A61B62f928E6DcB5

CASE 4 MANIPULATION

Fake signature campaign participants



Fake Media campaign participants



I cant find these members on BTT forum, telegram as well as on Twitter with their given details and the funny things about this fake hunters are they coincidently or purposely have same names for BTT Forum, telegram & Twitter accounts.Grin Grin. This makes questionable remarks and forces us to believe that the cybermiles bounty campaign have been manipulated or there is some corruption involved in bounty rewards. These fake guys who don't even exist collected 34000CMT worth 7400$ tokens & sent tokens to exchange.



Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x45393b52678bb3381e39865Ab4b65c66d6f54746

Reference to Abusing 1) https://ethplorer.io/address/0x45393b52678bb3381e39865ab4b65c66d6f54746#pageSize=100

Conclusion:- I hope all bounty abusers will be punished as per forum rules. The important one is point 4 this force us to think there is corruption or Manipulation in bounty Campaign managed by Krypital. He must answer to this manipulation or corruption of bounty rewards as mentioned in Case 4, for all bounty hunters who were doing their bounty hunting in an honest manner of cybermilesbounty campaign.

This post will be continued as there are more bounty abusers to be exposed from cybermiles bounty campaign.

Timelord2067
Legendary
*
Offline Offline

Activity: 1974
Merit: 1283


Witty! £ $ ₹ € ¥ ¢ ≠ ÷ ™


View Profile
April 30, 2018, 12:39:31 AM
 #584


What a pity you've just lifted mdayonliner 's work from the 25th of March 2018 and passed it off as your own.



mdayonline's reference was KeithBeeCham work two days prior connecting

chixka000, identifyuser, NetFreak199 and alexberezov

(and all three of you haven't thought to check their trust walls for previous connections to yet more alts that have been made in the past.)



Welcome rajurathod18 - I look forward to you editing your post using the submission form at which time I'll add your finds to the Google Spread Sheet.


Timelord2067's Timely Test and Main-neT LighTning Loans to a "T"
https://bitcointalk.org/index.php?topic=5184177.0
main-net BTC 0.0001 loans, test-net BTC 0.001 loans 1% seven days max.
Glomerulus22
Jr. Member
*
Offline Offline

Activity: 280
Merit: 3


View Profile
April 30, 2018, 09:53:32 AM
 #585

Accounts Connected:

LamontFalkner, MarlonDamon

Proof:

Name:    LamontFalkner u=1835488 http://archive.is/BjMNO
Posts:    179
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:24:38 PM
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon u=1277719 http://archive.is/yVJH4
Posts:    181
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:26:18 PM
Last Active:    April 29, 2018, 10:24:39 PM

This guy is trying to be smart - he does not post exactly same posts, but his double posts are different, but to similar or same topic, like here: https://bitcointalk.org/index.php?topic=2539541.msg35575910#msg35575910

(https://www.anonfork.io/) ANON - new privacy coin with very cheap masternodes! Join  (https://t.me/anonymousbitcoin)
iasenko
Hero Member
*****
Offline Offline

Activity: 686
Merit: 1220


Running my first Full Node :)


View Profile WWW
April 30, 2018, 10:03:57 PM
Last edit: May 01, 2018, 12:54:42 PM by iasenko
 #586

Accounts Connected:

(Where possible put UID's in numerical order) domainer.com, hodler.com,

Proof:



Miscellaneous:

Both accounts have similarities in the:
- domain name for username.
- domain names for email account, both in Gmail.
- registered same day same hour, with only 20 min difference.
- posting the same time in the same section.
- both have same level of English
- same post style
See the proof.

Too many similarities to be just a coincidence.

Tagtuyot
Jr. Member
*
Offline Offline

Activity: 73
Merit: 9


View Profile WWW
May 01, 2018, 08:16:57 AM
 #587

Accounts Connected:
knightmairesaint
Intersan
yrreg ger

Proof:
knightmairesaint post https://bitcointalk.org/index.php?topic=2174287.msg22050620#msg22050620 (archive = http://archive.is/Veb8T)
Intersan post https://bitcointalk.org/index.php?topic=3365718.msg35269832#msg35269832 (archive = http://archive.is/G38Ra)
yrreg ger post https://bitcointalk.org/index.php?topic=2258785.msg23872797#msg23872797 (archive = http://archive.is/f5qmL)

All 3 accounts used the btc add = 3Ep9YtRbA2ntveQKAUumbVooxthLUDmXvi  

Related Addresses:
3Ep9YtRbA2ntveQKAUumbVooxthLUDmXvi  


Miscellaneous:
knightmairesaint have the
Code:
This user's password was reset recently.

This user's email address was changed recently.

and Intersan have only the
Code:
This user's password was reset recently.

yrreg ger doesnt have any changes

Note: Im not accusing the user that hes/her scammer/scamming. Just posting here because of the recent changes to the 2 accounts. Chances of the accs are bought may be possible

cheater detector
Member
**
Offline Offline

Activity: 73
Merit: 26

Hello cheaters, I'm back!


View Profile
May 01, 2018, 10:02:30 AM
 #588

Accounts Connected:
alexsetiawan , kurniajim


Proof:
This address has received 2 ETHOS/BQX token deposits... https://etherscan.io/address/0x73068dddc3a3d644211c23315fab4d0ced54d48a#tokentxns


When we search on BQX's facebook bounty sheet, https://docs.google.com/spreadsheets/d/1VN61OS92gyZSHlYorDMfVVf90n3jl-HKTGbhBXVthNE/edit#gid=537703444 , we found these names...

alexsetiawan 0x1cf35acecfc5cdb8356b3e884a67ece61c803d7a #240
kurniajim 0x72d2ac75b2886b3a11ecae88dc9d125f3fe3d326 #231


Related Addresses:
Code:
0x1cf35acecfc5cdb8356b3e884a67ece61c803d7a
0x72d2ac75b2886b3a11ecae88dc9d125f3fe3d326

Miscellaneous:
Abusing bounty with alt.

P.S kurniajim already red tagged, therefore, his other account should be red tagged as well for cheating, shared ponzi site through ref link and tried to bribe DT to remove negative trust on his account.





Accounts Connected:
aidit45@gmail.com , annazaitun87


Proof:
This address has received 2 ETHOS/BQX token deposits... https://etherscan.io/address/0xbdaeb44cf131cfe0de1b682d7fb003e13dcd767b#tokentxns


When we search on BQX's facebook bounty sheet https://docs.google.com/spreadsheets/d/1VN61OS92gyZSHlYorDMfVVf90n3jl-
HKTGbhBXVthNE/edit#gid=537703444 , we found these names...

aidit45@gmail.com 0x54804cbd6db2362656f743e4c4306dd4f98e6580 #450
annazaitun87 0x7963bb5c1b6cdbda1f6d40a7750f9f02c2e0207f #472

Related Addresses:
Code:
0x54804cbd6db2362656f743e4c4306dd4f98e6580
0x7963bb5c1b6cdbda1f6d40a7750f9f02c2e0207f  

Miscellaneous:
Abusing bounty with alt





Accounts Connected:
farharhadi, CROYA86, stevano, mamaita, DIAH PERMATASARI, zoelhack, Mbah Tyo, RENATA612


Proof:
This address has received LOT of MONACO token deposits... https://etherscan.io/address/0x14c0f433b2eda890ca9dcbb39bde9d138e71fe97#tokentxns


When we search on MONACO blog/media, signature, and twitter sheet, https://docs.google.com/spreadsheets/d/1XMYFUomHmRGvdCwJa2sZr9XlN2xL3Elcih11ovge_60/edit#gid=20
43407156 we found these names...

#BLOG/MEDIA SHEET
farharhadi 0xe976cc6de5a3939dff39852fa6f1630965edd957 #50
CROYA86 0xac9aa01846e5f2b5a24bdc981d6ffdd5d82f590b #9
stevano 0x5489f45c44f0a189c89e0f24c04fddaad2158f44 #8
mamaita 0x73a6e296a2b493e0ab733f0c4b1adfdac4153ed8 #52

#SIGNATURE SHEET
stevano 0x21b18948a0d29634f322c0b18688b47d83f7a952 #193
DIAH PERMATASARI 0xeac14bd54cc94d815c770bd91efd8fec0572e52b #252
zoelhack 0x258aa6b1a771b641db6ac85c70f8c05ebb32336c #253

#TWITTER SHEET
Mbah Tyo 0x0c16c76f44280509adafb860767bd75bd99502ff #466
RENATA612 0x83b4be3ddb8e19d5cab8eee0d2b0fd81cefccf7d #464

Related Addresses:
Code:
0xe976cc6de5a3939dff39852fa6f1630965edd957
0xac9aa01846e5f2b5a24bdc981d6ffdd5d82f590b
0x5489f45c44f0a189c89e0f24c04fddaad2158f44
0x73a6e296a2b493e0ab733f0c4b1adfdac4153ed8
0x21b18948a0d29634f322c0b18688b47d83f7a952
0xeac14bd54cc94d815c770bd91efd8fec0572e52b
0x258aa6b1a771b641db6ac85c70f8c05ebb32336c
0x0c16c76f44280509adafb860767bd75bd99502ff
0x83b4be3ddb8e19d5cab8eee0d2b0fd81cefccf7d    

Miscellaneous:
Abusing various bounties with alts
zool2003
Jr. Member
*
Offline Offline

Activity: 126
Merit: 3

Joe's Signatureless Challenge


View Profile
May 01, 2018, 10:40:28 AM
 #589


What a pity you've just lifted mdayonliner 's work from the 25th of March 2018 and passed it off as your own.



mdayonline's reference was KeithBeeCham work two days prior connecting

chixka000, identifyuser, NetFreak199 and alexberezov

(and all three of you haven't thought to check their trust walls for previous connections to yet more alts that have been made in the past.)



Welcome rajurathod18 - I look forward to you editing your post using the submission form at which time I'll add your finds to the Google Spread Sheet.



It was actually my work that made the link on the back off another user who linked 2 of the accounts.


Accounts Connected:
chixka000, netfreak199, Camus, visionary, alexberezov, identifyuser

Proof:

6 of the accounts joined the PECUNIO Signature bounty. At the time they joined in pairs within 5 - 15 minutes of each other and when I looked at the profiles they signed out at similar times
https://docs.google.com/spreadsheets/d/1G8pBrPNw5gkpwCYLbr-ggqL3HBGSGCud_bUz-gojAfI/edit#gid=1761784155

I looked at chixka000 & netfreak199 first and noticed that they made posts at a similar time and they logged out at similar times. I then looked at another campaign that they were in and found their ETH addresses.

This was just one campaign that I looked at and discovered that all of these smaller accounts were contributing to one account at similar times too.
Netfreak transferred    3,191.48936170213 MWAT to chixka000 15 days ago
lehard transferred    3,191.48936170213 MWAT to chixka000 15 days ago
alexberezov transferred   4,851.359064618577 MWAT to chixka000 16 days ago
identifyuser transferred  3,538.009719773167 MWAT to chixka000 16 days ago
Camus transferred  47,285.45675578803 MWAT to chixka000 16 days ago
visionary transferred  47,285.45675578803 MWAT to chixka000 16 days ago

If you look here chixka is asking about a bounty that he isn't involved with

This has been a long campaign, one I've very much enjoyed. Looking forward to the final spreadsheet being shared
is there any information about calculation of stakes for bounty? at least approximate date? I didn't find announcements from bounty Manager.

However alexberezov was and if you look above alexberezov has transferred bounty earnings to chixka

They have also been connected through merit

Merit summary for alexberezov,
January 25, 2018, 03:58:00 PM: 50 from chixka000
January 25, 2018, 03:39:16 PM: 50 from NetFreak199

MWAT Campaign all 7 names in the youtube campaign and 4 of them joining within 30 minutes of each other.
https://docs.google.com/spreadsheets/d/1c_63IbIczvWvAE33b-QgpgfmlN2FzMK7TuTWUpytXds/edit#gid=1724170213

Related Addresses:

ETH addresses that link the accounts together.

alexberezov
Code:
0x55515EDbe90d7d8f29De195E13D02bB43f9Ee8f0
Netfreak
Code:
0x822d9cd5b86391cdb5e4743089b8cc9f964195bf
lehard
Code:
0x8d25806367854781767728Ec23E9d2d9cF13A9E6
identifyuser
Code:
0x8Ede1DbeeCde0AE2859f9735cA0470c8210c0e0C
Camus
Code:
0x84D547a3D8F70857801EA98654Df62258d5ea3ae
visionary
Code:
0x52683d2A38676De03D1029cdAe1f2729473b8b7F
chixka000
Code:
0xAaEedA078AcF2e037FFf742c564dc11eBa815b7f


Miscellaneous:

As it stands I have messaged the PECUNIO bounty manager twice and he didn't respond and the spreadsheet still says that they have been accepted but they have moved onto another signature bounty
Thrive Signature bounty
6 of these accounts joined up and what I also noticed is that these accounts are joining in at the end of the campaign each time.
https://docs.google.com/spreadsheets/d/10-0pamtd_CjyZjmmFZ5Q_0HSNhrRC2i-E5HqVokTEjo/edit#gid=1453105285

I have no doubt you will correct me if I’m wrong.

The users are plaguing campaigns and not getting kicked out.

▬▬▬ I'm part of a movement to help make the forums a better place and free it of spam:▬▬▬
█ █  http://bit.ly/SigFree  █ █
Welckomtome
Full Member
***
Offline Offline

Activity: 448
Merit: 100



View Profile
May 01, 2018, 11:46:23 AM
Last edit: May 01, 2018, 12:23:15 PM by Welckomtome
 #590

Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns



When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns



When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns


When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
maxwelll
Newbie
*
Offline Offline

Activity: 15
Merit: 1


View Profile
May 02, 2018, 08:53:56 AM
 #591

Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns
https://i.imgur.com/YOd6wjP.jpg


When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns
https://i.imgur.com/VMAENLK.jpg


When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns
https://i.imgur.com/x0jgi0l.jpg

When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
I often hear stories like that. most people will make up stories to cover up their mistakes.
digaran
Hero Member
*****
Offline Offline

Activity: 910
Merit: 613

111113DUwES2ZNWSJztA3oBuhzfcdmiaG


View Profile
May 03, 2018, 02:34:00 AM
 #592

Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.


HOWEYCOINS   ▮      Excitement and         ⭐  ● TWITTER  ● FACEBOOK   ⭐      
  ▮    guaranteed returns                 ●TELEGRAM                         
  ▮  of the travel industry
    ⭐  ●Ann Thread ●Instagram   ⭐ 
✅    U.S.Sec    ➡️
✅  approved!  ➡️
marlboroza
Legendary
*
Offline Offline

Activity: 1316
Merit: 1629


grand inquisitor clown car member


View Profile
May 03, 2018, 02:58:01 AM
Merited by Timelord2067 (1)
 #593

Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.

Quoted for reference and whole post is archived here https://archive.fo/FfIhp#selection-6559.0-6559.135

Timelord2067
Legendary
*
Offline Offline

Activity: 1974
Merit: 1283


Witty! £ $ ₹ € ¥ ¢ ≠ ÷ ™


View Profile
May 03, 2018, 12:35:56 PM
 #594

Archived for future reference: http://archive.is/0e8eH#selection-6693.0-6721.93

Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.

Hmm, let's look at your case file:





Ref: https://bitcointalk.org/index.php?topic=1481383.msg15040552#msg15040552

Nope, can't see any reason to remove any Red Paint TM from your case file.

Case Closed

(you might want to check your Trust Wall, I've just pissed up against it again...)

Kiss


Timelord2067's Timely Test and Main-neT LighTning Loans to a "T"
https://bitcointalk.org/index.php?topic=5184177.0
main-net BTC 0.0001 loans, test-net BTC 0.001 loans 1% seven days max.
Welckomtome
Full Member
***
Offline Offline

Activity: 448
Merit: 100



View Profile
May 03, 2018, 03:38:47 PM
 #595

Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns



When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns



When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns


When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
I often hear stories like that. most people will make up stories to cover up their mistakes.

You look carefully! from one purse was sent a part of the tokens received for the airdrop (this is part of the tokens my friend gave me!) and the second part of the whole transferred to me brother that I helped him sell them on the exchange https://etherdelta.com  ... You are building false accusations! Well, nothing will judge everyone's life. You probably heard about the boomerang effect?
Leopard11
Jr. Member
*
Offline Offline

Activity: 504
Merit: 5


View Profile
May 03, 2018, 05:06:34 PM
 #596

Accounts connected: taketeke, deadgin, melai, tokek_belang, pathapoddo, ayome, leopard11, ks2018ks, giayen2018, quockiencoltd, sabunstar, ind-coder, french_andrey, sbastian77, adiba14, pvt-snafu(claims his eth address has been hacked), barlo357




User Pvt-snafu said he accidentally copied private key to spreadsheet.

Tokens came from this address 0x3B916345D94a1c7CF527004fE5d472eCcB45BE18 and were sent to accumulating addresses:
Code:
0x5bf0370c237aa27584af15b569b134473b279a41
0x3463934897d356b8659cbdfe15209e3bc3229105

Accounts connected: taketeke, deadgin, melai, tokek_belang, pathapoddo

Proofs

Spreadsheet:

UTRUST https://docs.google.com/spreadsheets/d/1Z7vmnANbyyECG9dQG11m8lnlBvGvfLd5rVJcl_1OW6c/edit#gid=1766024366

Address used:
Code:
0x1Ec0637d3091382912Adaf222A3be089C97140E7
0x00d97D7f128D251Cfd3Bd638FE300Abf3037C736
0xfa04d587A17383a7dDb5C337Fc751899D847c483
0x842D3A8D4E3d0FcE7133Ac9296bfe9E68Fd4Eaf3
0x349e0629E750A836EBf25d3bAdE13478a93B9998
0x7799853415FC72CA6886Df073deC180794B545C9

Accounts connected: ayome, leopard11

Proofs:

SETH spreadsheets:

https://docs.google.com/spreadsheets/d/1ikNmbSRe0DjNgjrqw52I6mu0CG7dJnazRZrW62irT0g/edit#gid=587292998 account ayome
https://docs.google.com/spreadsheets/d/1BEpvVwIZ-mPEbncqdnw_RGO04G2uk2Vpn6Hu6z6wMs4/edit#gid=587292998 account leopard11

Address used:
Code:
0x00d97D7f128D251Cfd3Bd638FE300Abf3037C736
0xa4028711D3C2820CbA857a29fDD93CC4755E7726
0x3B916345D94a1c7CF527004fE5d472eCcB45BE18
0xC964416A729E707a8c40Cf79fAE89a73d77e9d9E

Account connected: barlo357

Proofs:

INS spreadsheet: https://docs.google.com/spreadsheets/d/1QPmKERyhvuXm1yRDydDi9vFOa_fpy5nG-urHPaoF-EQ/edit#gid=1204494185

Address used:
Code:
0xC9D80F6b03276d66349109f3bb90514bE1628993

Accounts connected: ks2018ks, giayen2018

Proofs:

Spreadsheet: betterbetting https://docs.google.com/spreadsheets/d/1G1T8UhgtMQIsKpBkpQq-zqsb_92t1iljc_B7QRQOe90/edit#gid=1306199723

Address used:
Code:
0xf9b5fDB04E8e9EEb5537C2b1bAe953610C7047A6

Accounts connected: quockiencoltd

Proofs:

Spreadsheet: peculium https://docs.google.com/spreadsheets/d/1Zd7n0efGBM0YlPn2-s5MWDD3wEpeXWfpWumAiYL3QKs/edit#gid=479310416

Address used:
Code:
0xBf03A2Fc87b82a717bD2050C1a9B853691a1b2c2

Accounts connected: sabunstar, ind-coder, french_andrey,

Proofs:

Spreadsheet:LALA https://docs.google.com/spreadsheets/d/1p_Uc-jO0ce3RSqKQ8hZbOATJ2vIVNAWeL5lgvZP7ecY/edit#gid=905527113

Address used:
Code:
0x0Ad4229980Fef2d110874cf07016426A52356a03
0x8358F75af220fe3bf982c81085EEd54f1A1063B4
0xEFa6463273e56694A6452B3e6BEC0169D0099E84

Accounts connected: sbastian77, adiba14, pvt-snafu(claims his eth address has been hacked), giayen2018(already mentioned above which is proof that both address mentioned at beginning of post are used for token accumulation)

Proofs:

Matrix Spreadsheets:
https://docs.google.com/spreadsheets/d/1GEUgxinT2dGqUeQNw75kzXPzlwc2XSSw9ebzi8sQEbg/edit#gid=1120191121
https://docs.google.com/spreadsheets/d/18xWQV4Q2uu26CO3Ni4viz2LCImprYIhN_YtPe9hNozc/edit#gid=2117995218
https://docs.google.com/spreadsheets/d/1KunIgy961CRUbhnyRHV6dysSoN7ppONQJwvaJXhq2M0/edit#gid=1548701090
https://docs.google.com/spreadsheets/d/1mpsyR7KJFxElTxkBVv_SW2pnlaHEARGAESQG6vfi0Lw/edit#gid=1275807952

Address used:
Code:
0x3D8a57AeDA3DEDa5c22e32f3cFC95067b5524e75
0x582276af46Bf23F401Ff2e20Ca33E7C156336201
0x3B916345D94a1c7CF527004fE5d472eCcB45BE18
0xdbEeADF97Ea47a916551Ba9e045D653925b5Aa40
0xF5cA3064c67D82E5CBd3F581B39F34a13c8C7B05
0x31CcEc325565aD2B5C9849eD99c5Ca3A1DF919Bc
0x721384837CdB9D405eefdf6b8DdD5560919E673F

misc: cheating bounty campaigns.

I participate in many bounty companies !!! And I'm not not connected with the one account you wrote! I wrote in a branch of the bounty company sether that my wallet was hacked and asked to change it! I can find my message in the branch and present you with proof, all that you wrote about me is lies! I did not deceive anyone !!!
marlboroza
Legendary
*
Offline Offline

Activity: 1316
Merit: 1629


grand inquisitor clown car member


View Profile
May 03, 2018, 05:23:48 PM
 #597

Accounts connected: N.E.O.N, DedGin

Proof of connection: using the same twitter accounts.

Twitter Profile Link: https://twitter.com/SergoGeorg

Campaign : Twitter
Bitcointalk Username: DedGin
Spreadsheet No: 280
Twitter Account: https://twitter.com/Pn5Q95PiSyJ1LIj


Archived proofs: https://archive.fo/7eIra#selection-5825.0-5825.25 https://archive.fo/hL2SD#selection-2937.0-2937.27 https://archive.fo/eMxEb#selection-7011.0-7008.2

misc: cheating bitex bounty campaign at the moment.

pathapoddo
Full Member
***
Offline Offline

Activity: 458
Merit: 100



View Profile
May 03, 2018, 06:03:25 PM
 #598

I got a unnecessary red tag for doing nothing. Please recheck my issue and remove my red tag. https://bitcointalk.org/index.php?topic=3514418.new#new thanks.

DAEX ◄► RELIABLE CLEARING ECOSYSTEM ▬▬▬▬▬▬▬▬ANNWHITEPAPERBOUNTY 
bumschaa
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
May 03, 2018, 06:03:51 PM
 #599

Accounts Connected:

They are in numerical order!

chuanpu           https://bitcointalk.org/index.php?action=profile;u=1455244
Coopeer           https://bitcointalk.org/index.php?action=profile;u=1459460
Quantumbot   https://bitcointalk.org/index.php?action=profile;u=1460151
Godparticles   https://bitcointalk.org/index.php?action=profile;u=1460222
soopiking           https://bitcointalk.org/index.php?action=profile;u=1460330
MariaOzawaa   https://bitcointalk.org/index.php?action=profile;u=1460351
Jonesdoo           https://bitcointalk.org/index.php?action=profile;u=1460374
morphic           https://bitcointalk.org/index.php?action=profile;u=1460404
BooMoon           https://bitcointalk.org/index.php?action=profile;u=1460424
AssassinCreed   https://bitcointalk.org/index.php?action=profile;u=1460514
Yagami nunnery   https://bitcointalk.org/index.php?action=profile;u=1460559
Kyo Kusanagi   https://bitcointalk.org/index.php?action=profile;u=1460601
spritJ           https://bitcointalk.org/index.php?action=profile;u=1563565
Xhero           https://bitcointalk.org/index.php?action=profile;u=1563593
Windwolf           https://bitcointalk.org/index.php?action=profile;u=1563621
icowind           https://bitcointalk.org/index.php?action=profile;u=1563638
Newsky           https://bitcointalk.org/index.php?action=profile;u=1563862
dilidolu           https://bitcointalk.org/index.php?action=profile;u=1563892
kakaword           https://bitcointalk.org/index.php?action=profile;u=1563928

Proof:

1) Joined same bounty at the same time  
https://clip2net.com/s/3TTmoFF  (https://docs.google.com/spreadsheets/d/1GS1xvBs0o4DbpH8SosrGN1ADdrsnx2fq0dKng6ziOVo/edit#gid=579373772)

2) same day of registration all of them

3) same number of posts

bumschaa
Newbie
*
Offline Offline

Activity: 7
Merit: 0


View Profile
May 03, 2018, 06:12:00 PM
Last edit: May 03, 2018, 06:27:30 PM by bumschaa
 #600

Accounts Connected:

They are in numerical order!

jponline4u   https://bitcointalk.org/index.php?action=profile;u=1852805
monojet1   https://bitcointalk.org/index.php?action=profile;u=1852724

Proof:

1) Joined same bounty at the same time  
https://clip2net.com/s/3TTnwbq  (https://docs.google.com/spreadsheets/d/1GS1xvBs0o4DbpH8SosrGN1ADdrsnx2fq0dKng6ziOVo/edit#gid=579373772)

2) same day of registration

3) same number of posts

4) same posts in same threads
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 [30] 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 87 »
  Print  
 
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!