Bitcoin Forum
April 25, 2024, 05:05:50 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 [30] 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 192 »
  Print  
Author Topic: Known Alts of any-one - A User Generated List Mk III (2022 Q2)  (Read 171614 times)
rajurathod18
Member
**
Offline Offline

Activity: 224
Merit: 21


View Profile
April 29, 2018, 06:55:08 AM
 #581



Cybermiles bounty campaign was managed by Krypital. After checking final spreadsheet I came across lots of bounty abusers and in the spreadsheet I found fake accounts which do not exists and coincidently have same BTT, telegram, twitter and facebook names which totally hint us towards bounty rewards manipulation & corruption

Here is the link to the final spreadsheet of cybermiles bounty campaign rewards https://drive.google.com/open?id=1qQMtIoF5YXJ88b8FbSiMuKxIHKJBW1bC81WRz3bE0FY

I will share here one by one bounty abusers which are not doing their bounty hunting in an honest manner.

CASE 1



In above image members marked in blue have alt accounts for bounty campaigns hieuvm1991, phuongthao96, bichphuong, kimphuong1988, Selja1977,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3bBC7c49b83Fb93D9eD2E4e80365D108f19ff35C

Reference of Abusing 1) https://ethplorer.io/address/0x3bbc7c49b83fb93d9ed2e4e80365d108f19ff35c#pageSize=100
                               2) https://ethplorer.io/address/0x103ba1e2f25029f95fa379125e6bcff76f2f525a#pageSize=100

Related address
Code:
hieuvm1991        -0x103Ba1E2f25029f95fA379125e6BCfF76F2f525A
Code:
phuongthao9      -0x4DeB348ABbF1A559C3DDEC9D99915A64e74c497C
Code:
bichphuong         -0xD53FF4d07870d5bfD02c6D39E4b39B39d0594F4e
Code:
kimphuong1988  -0x2b45f1528c74a228bcf9Ec491466a17A308aa193
Code:
Selja1977           -0xb24201F31144134C8432299A24Ef07802763C045

CASE 2



In above image members marked in Yellow have alt accounts for bounty campaigns Deubila, GangNamSK
, HSRP,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0xA2539237Fd90b50BEC35aCd7d41816A550E75ACa

Reference to Abusing 1) https://ethplorer.io/address/0xa2539237fd90b50bec35acd7d41816a550e75aca#pageSize=100
                               

Related address
Code:
Deubila            -0x9D7eD4AA9E99C6b05e9cab71f0b33834c5CaA6bF
Code:
HSRP               -0xF67E951e9a1194DceBEeFfC7DF1Fef2E8551a608
Code:
GangNamSK     -0x51ACA61EFd0b9020353eaA9fD53040e3adB5849C

CASE 3



In above image members marked in Yellow have alt accounts for bounty campaigns Windybi, ngungoc130485

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3463934897d356B8659cBDFE15209e3bC3229105

Reference to Abusing 1) https://ethplorer.io/address/0xd9cf954b678e9a6bf997ae61a61b62f928e6dcb5#pageSize=100
                               2) https://ethplorer.io/address/0x151bc71a40c56c7cb3317d86996fd0b4ff9bd907#pageSize=100
                               

Related address
Code:
Windybi                 -0x609cbBa0792115d83Ac12883290C9F83a67e662b
Code:
ngungoc130485      -0xd9cf954B678E9a6BF997AE61A61B62f928E6DcB5

CASE 4 MANIPULATION

Fake signature campaign participants



Fake Media campaign participants



I cant find these members on BTT forum, telegram as well as on Twitter with their given details and the funny things about this fake hunters are they coincidently or purposely have same names for BTT Forum, telegram & Twitter accounts.Grin Grin. This makes questionable remarks and forces us to believe that the cybermiles bounty campaign have been manipulated or there is some corruption involved in bounty rewards. These fake guys who don't even exist collected 34000CMT worth 7400$ tokens & sent tokens to exchange.



Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x45393b52678bb3381e39865Ab4b65c66d6f54746

Reference to Abusing 1) https://ethplorer.io/address/0x45393b52678bb3381e39865ab4b65c66d6f54746#pageSize=100

Conclusion:- I hope all bounty abusers will be punished as per forum rules. The important one is point 4 this force us to think there is corruption or Manipulation in bounty Campaign managed by Krypital. He must answer to this manipulation or corruption of bounty rewards as mentioned in Case 4, for all bounty hunters who were doing their bounty hunting in an honest manner of cybermilesbounty campaign.

This post will be continued as there are more bounty abusers to be exposed from cybermiles bounty campaign.

1714064750
Hero Member
*
Offline Offline

Posts: 1714064750

View Profile Personal Message (Offline)

Ignore
1714064750
Reply with quote  #2

1714064750
Report to moderator
1714064750
Hero Member
*
Offline Offline

Posts: 1714064750

View Profile Personal Message (Offline)

Ignore
1714064750
Reply with quote  #2

1714064750
Report to moderator
The Bitcoin network protocol was designed to be extremely flexible. It can be used to create timed transactions, escrow transactions, multi-signature transactions, etc. The current features of the client only hint at what will be possible in the future.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714064750
Hero Member
*
Offline Offline

Posts: 1714064750

View Profile Personal Message (Offline)

Ignore
1714064750
Reply with quote  #2

1714064750
Report to moderator
1714064750
Hero Member
*
Offline Offline

Posts: 1714064750

View Profile Personal Message (Offline)

Ignore
1714064750
Reply with quote  #2

1714064750
Report to moderator
Timelord2067 (OP)
Legendary
*
Offline Offline

Activity: 3654
Merit: 2216


💲🏎️💨🚓


View Profile
April 30, 2018, 12:39:31 AM
Last edit: May 17, 2023, 12:05:21 AM by Timelord2067
 #582

[quote author=bumschaa link=topic=2544574.msg35814775#msg35814775 date=1524938109]
Accounts Connected:

They are in numerical order!

identifyuser -    https://bitcointalk.org/index.php?action=profile;u=227450
alexberezov -   https://bitcointalk.org/index.php?action=profile;u=1066970
chixka000 -      https://bitcointalk.org/index.php?action=profile;u=821846
visionary -       https://bitcointalk.org/index.php?action=profile;u=58779
NetFreak199 -  https://bitcointalk.org/index.php?action=profile;u=819793
Camus -          https://bitcointalk.org/index.php?action=profile;u=319059

[/quote]

What a pity you've just lifted mdayonliner 's work from the 25th of March 2018 and passed it off as your own.



mdayonline's reference was KeithBeeCham work two days prior connecting

chixka000, identifyuser, NetFreak199 and alexberezov

(and all three of you haven't thought to check their trust walls for previous connections to yet more alts that have been made in the past.)



Welcome rajurathod18 - I look forward to you editing your post using the submission form at which time I'll add your finds to the Google Spread Sheet.



Glomerulus22
Jr. Member
*
Offline Offline

Activity: 280
Merit: 3


View Profile
April 30, 2018, 09:53:32 AM
 #583

Accounts Connected:

LamontFalkner, MarlonDamon

Proof:

Name:    LamontFalkner u=1835488 http://archive.is/BjMNO
Posts:    179
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:24:38 PM
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon u=1277719 http://archive.is/yVJH4
Posts:    181
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:26:18 PM
Last Active:    April 29, 2018, 10:24:39 PM

This guy is trying to be smart - he does not post exactly same posts, but his double posts are different, but to similar or same topic, like here: https://bitcointalk.org/index.php?topic=2539541.msg35575910#msg35575910

(https://www.anonfork.io/) ANON - new privacy coin with very cheap masternodes! Join  (https://t.me/anonymousbitcoin)
TheBeardedBaby
Legendary
*
Offline Offline

Activity: 2184
Merit: 3134


₿uy / $ell


View Profile
April 30, 2018, 10:03:57 PM
Last edit: May 01, 2018, 12:54:42 PM by iasenko
 #584

Accounts Connected:

(Where possible put UID's in numerical order) domainer.com, hodler.com,

Proof:



Miscellaneous:

Both accounts have similarities in the:
- domain name for username.
- domain names for email account, both in Gmail.
- registered same day same hour, with only 20 min difference.
- posting the same time in the same section.
- both have same level of English
- same post style
See the proof.

Too many similarities to be just a coincidence.

Tagtuyot
Jr. Member
*
Offline Offline

Activity: 66
Merit: 9


View Profile WWW
May 01, 2018, 08:16:57 AM
 #585

Accounts Connected:
knightmairesaint
Intersan
yrreg ger

Proof:
knightmairesaint post https://bitcointalk.org/index.php?topic=2174287.msg22050620#msg22050620 (archive = http://archive.is/Veb8T)
Intersan post https://bitcointalk.org/index.php?topic=3365718.msg35269832#msg35269832 (archive = http://archive.is/G38Ra)
yrreg ger post https://bitcointalk.org/index.php?topic=2258785.msg23872797#msg23872797 (archive = http://archive.is/f5qmL)

All 3 accounts used the btc add = 3Ep9YtRbA2ntveQKAUumbVooxthLUDmXvi  

Related Addresses:
3Ep9YtRbA2ntveQKAUumbVooxthLUDmXvi  


Miscellaneous:
knightmairesaint have the
Code:
This user's password was reset recently.

This user's email address was changed recently.

and Intersan have only the
Code:
This user's password was reset recently.

yrreg ger doesnt have any changes

Note: Im not accusing the user that hes/her scammer/scamming. Just posting here because of the recent changes to the 2 accounts. Chances of the accs are bought may be possible

cheater detector
Member
**
Offline Offline

Activity: 213
Merit: 53


View Profile
May 01, 2018, 10:02:30 AM
 #586

Accounts Connected:
alexsetiawan , kurniajim


Proof:
This address has received 2 ETHOS/BQX token deposits... https://etherscan.io/address/0x73068dddc3a3d644211c23315fab4d0ced54d48a#tokentxns


When we search on BQX's facebook bounty sheet, https://docs.google.com/spreadsheets/d/1VN61OS92gyZSHlYorDMfVVf90n3jl-HKTGbhBXVthNE/edit#gid=537703444 , we found these names...

alexsetiawan 0x1cf35acecfc5cdb8356b3e884a67ece61c803d7a #240
kurniajim 0x72d2ac75b2886b3a11ecae88dc9d125f3fe3d326 #231


Related Addresses:
Code:
0x1cf35acecfc5cdb8356b3e884a67ece61c803d7a
0x72d2ac75b2886b3a11ecae88dc9d125f3fe3d326

Miscellaneous:
Abusing bounty with alt.

P.S kurniajim already red tagged, therefore, his other account should be red tagged as well for cheating, shared ponzi site through ref link and tried to bribe DT to remove negative trust on his account.





Accounts Connected:
aidit45@gmail.com , annazaitun87


Proof:
This address has received 2 ETHOS/BQX token deposits... https://etherscan.io/address/0xbdaeb44cf131cfe0de1b682d7fb003e13dcd767b#tokentxns


When we search on BQX's facebook bounty sheet https://docs.google.com/spreadsheets/d/1VN61OS92gyZSHlYorDMfVVf90n3jl-
HKTGbhBXVthNE/edit#gid=537703444 , we found these names...

aidit45@gmail.com 0x54804cbd6db2362656f743e4c4306dd4f98e6580 #450
annazaitun87 0x7963bb5c1b6cdbda1f6d40a7750f9f02c2e0207f #472

Related Addresses:
Code:
0x54804cbd6db2362656f743e4c4306dd4f98e6580
0x7963bb5c1b6cdbda1f6d40a7750f9f02c2e0207f  

Miscellaneous:
Abusing bounty with alt





Accounts Connected:
farharhadi, CROYA86, stevano, mamaita, DIAH PERMATASARI, zoelhack, Mbah Tyo, RENATA612


Proof:
This address has received LOT of MONACO token deposits... https://etherscan.io/address/0x14c0f433b2eda890ca9dcbb39bde9d138e71fe97#tokentxns


When we search on MONACO blog/media, signature, and twitter sheet, https://docs.google.com/spreadsheets/d/1XMYFUomHmRGvdCwJa2sZr9XlN2xL3Elcih11ovge_60/edit#gid=20
43407156 we found these names...

#BLOG/MEDIA SHEET
farharhadi 0xe976cc6de5a3939dff39852fa6f1630965edd957 #50
CROYA86 0xac9aa01846e5f2b5a24bdc981d6ffdd5d82f590b #9
stevano 0x5489f45c44f0a189c89e0f24c04fddaad2158f44 #8
mamaita 0x73a6e296a2b493e0ab733f0c4b1adfdac4153ed8 #52

#SIGNATURE SHEET
stevano 0x21b18948a0d29634f322c0b18688b47d83f7a952 #193
DIAH PERMATASARI 0xeac14bd54cc94d815c770bd91efd8fec0572e52b #252
zoelhack 0x258aa6b1a771b641db6ac85c70f8c05ebb32336c #253

#TWITTER SHEET
Mbah Tyo 0x0c16c76f44280509adafb860767bd75bd99502ff #466
RENATA612 0x83b4be3ddb8e19d5cab8eee0d2b0fd81cefccf7d #464

Related Addresses:
Code:
0xe976cc6de5a3939dff39852fa6f1630965edd957 
0xac9aa01846e5f2b5a24bdc981d6ffdd5d82f590b
0x5489f45c44f0a189c89e0f24c04fddaad2158f44
0x73a6e296a2b493e0ab733f0c4b1adfdac4153ed8
0x21b18948a0d29634f322c0b18688b47d83f7a952
0xeac14bd54cc94d815c770bd91efd8fec0572e52b
0x258aa6b1a771b641db6ac85c70f8c05ebb32336c
0x0c16c76f44280509adafb860767bd75bd99502ff
0x83b4be3ddb8e19d5cab8eee0d2b0fd81cefccf7d    

Miscellaneous:
Abusing various bounties with alts
zool2003
Jr. Member
*
Offline Offline

Activity: 126
Merit: 3

Joe's Signatureless Challenge


View Profile
May 01, 2018, 10:40:28 AM
 #587


What a pity you've just lifted mdayonliner 's work from the 25th of March 2018 and passed it off as your own.



mdayonline's reference was KeithBeeCham work two days prior connecting

chixka000, identifyuser, NetFreak199 and alexberezov

(and all three of you haven't thought to check their trust walls for previous connections to yet more alts that have been made in the past.)



Welcome rajurathod18 - I look forward to you editing your post using the submission form at which time I'll add your finds to the Google Spread Sheet.



It was actually my work that made the link on the back off another user who linked 2 of the accounts.


Accounts Connected:
chixka000, netfreak199, Camus, visionary, alexberezov, identifyuser

Proof:

6 of the accounts joined the PECUNIO Signature bounty. At the time they joined in pairs within 5 - 15 minutes of each other and when I looked at the profiles they signed out at similar times
https://docs.google.com/spreadsheets/d/1G8pBrPNw5gkpwCYLbr-ggqL3HBGSGCud_bUz-gojAfI/edit#gid=1761784155

I looked at chixka000 & netfreak199 first and noticed that they made posts at a similar time and they logged out at similar times. I then looked at another campaign that they were in and found their ETH addresses.

This was just one campaign that I looked at and discovered that all of these smaller accounts were contributing to one account at similar times too.
Netfreak transferred    3,191.48936170213 MWAT to chixka000 15 days ago
lehard transferred    3,191.48936170213 MWAT to chixka000 15 days ago
alexberezov transferred   4,851.359064618577 MWAT to chixka000 16 days ago
identifyuser transferred  3,538.009719773167 MWAT to chixka000 16 days ago
Camus transferred  47,285.45675578803 MWAT to chixka000 16 days ago
visionary transferred  47,285.45675578803 MWAT to chixka000 16 days ago

If you look here chixka is asking about a bounty that he isn't involved with

This has been a long campaign, one I've very much enjoyed. Looking forward to the final spreadsheet being shared
is there any information about calculation of stakes for bounty? at least approximate date? I didn't find announcements from bounty Manager.

However alexberezov was and if you look above alexberezov has transferred bounty earnings to chixka

They have also been connected through merit

Merit summary for alexberezov,
January 25, 2018, 03:58:00 PM: 50 from chixka000
January 25, 2018, 03:39:16 PM: 50 from NetFreak199

MWAT Campaign all 7 names in the youtube campaign and 4 of them joining within 30 minutes of each other.
https://docs.google.com/spreadsheets/d/1c_63IbIczvWvAE33b-QgpgfmlN2FzMK7TuTWUpytXds/edit#gid=1724170213

Related Addresses:

ETH addresses that link the accounts together.

alexberezov
Code:
0x55515EDbe90d7d8f29De195E13D02bB43f9Ee8f0
Netfreak
Code:
0x822d9cd5b86391cdb5e4743089b8cc9f964195bf
lehard
Code:
0x8d25806367854781767728Ec23E9d2d9cF13A9E6
identifyuser
Code:
0x8Ede1DbeeCde0AE2859f9735cA0470c8210c0e0C
Camus
Code:
0x84D547a3D8F70857801EA98654Df62258d5ea3ae
visionary
Code:
0x52683d2A38676De03D1029cdAe1f2729473b8b7F
chixka000
Code:
0xAaEedA078AcF2e037FFf742c564dc11eBa815b7f


Miscellaneous:

As it stands I have messaged the PECUNIO bounty manager twice and he didn't respond and the spreadsheet still says that they have been accepted but they have moved onto another signature bounty
Thrive Signature bounty
6 of these accounts joined up and what I also noticed is that these accounts are joining in at the end of the campaign each time.
https://docs.google.com/spreadsheets/d/10-0pamtd_CjyZjmmFZ5Q_0HSNhrRC2i-E5HqVokTEjo/edit#gid=1453105285

I have no doubt you will correct me if I’m wrong.

The users are plaguing campaigns and not getting kicked out.

▬▬▬ I'm part of a movement to help make the forums a better place and free it of spam:▬▬▬
█ █  http://bit.ly/SigFree  █ █
Welckomtome
Full Member
***
Offline Offline

Activity: 448
Merit: 100



View Profile
May 01, 2018, 11:46:23 AM
Last edit: May 01, 2018, 12:23:15 PM by Welckomtome
 #588

Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns



When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns



When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a 
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns


When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
maxwelll
Newbie
*
Offline Offline

Activity: 15
Merit: 1


View Profile
May 02, 2018, 08:53:56 AM
 #589

Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns
https://i.imgur.com/YOd6wjP.jpg


When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns
https://i.imgur.com/VMAENLK.jpg


When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a 
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns
https://i.imgur.com/x0jgi0l.jpg

When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
I often hear stories like that. most people will make up stories to cover up their mistakes.
digaran
Copper Member
Hero Member
*****
Offline Offline

Activity: 1330
Merit: 899

🖤😏


View Profile
May 03, 2018, 02:34:00 AM
 #590

Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.


🖤😏
marlboroza
Legendary
*
Offline Offline

Activity: 1932
Merit: 2270


View Profile
May 03, 2018, 02:58:01 AM
Merited by Timelord2067 (1)
 #591

Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.

Quoted for reference and whole post is archived here https://archive.fo/FfIhp#selection-6559.0-6559.135
Timelord2067 (OP)
Legendary
*
Offline Offline

Activity: 3654
Merit: 2216


💲🏎️💨🚓


View Profile
May 03, 2018, 12:35:56 PM
Last edit: May 17, 2023, 12:05:05 AM by Timelord2067
 #592

Archived for future reference: http://archive.is/0e8eH#selection-6693.0-6721.93

[quote author=digaran link=topic=2544574.msg36164949#msg36164949 date=1525314840]
[quote author=Timelord2067 link=topic=2544574.msg35917380#msg35917380 date=1525048771]Welcome rajurathod18[/quote]

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.[/quote]

Hmm, let's look at your case file:





Ref: https://bitcointalk.org/index.php?topic=1481383.msg15040552#msg15040552

Nope, can't see any reason to remove any Red Paint TM from your case file.

[size=50pt]Case Closed[/size]

(you might want to check your Trust Wall, I've just pissed up against it again...)

[size=50pt] :-*[/size]



Welckomtome
Full Member
***
Offline Offline

Activity: 448
Merit: 100



View Profile
May 03, 2018, 03:38:47 PM
 #593

Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns



When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns



When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a 
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns


When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
I often hear stories like that. most people will make up stories to cover up their mistakes.

You look carefully! from one purse was sent a part of the tokens received for the airdrop (this is part of the tokens my friend gave me!) and the second part of the whole transferred to me brother that I helped him sell them on the exchange https://etherdelta.com  ... You are building false accusations! Well, nothing will judge everyone's life. You probably heard about the boomerang effect?
Leopard11
Jr. Member
*
Offline Offline

Activity: 504
Merit: 5


View Profile
May 03, 2018, 05:06:34 PM
 #594

Accounts connected: taketeke, deadgin, melai, tokek_belang, pathapoddo, ayome, leopard11, ks2018ks, giayen2018, quockiencoltd, sabunstar, ind-coder, french_andrey, sbastian77, adiba14, pvt-snafu(claims his eth address has been hacked), barlo357




User Pvt-snafu said he accidentally copied private key to spreadsheet.

Tokens came from this address 0x3B916345D94a1c7CF527004fE5d472eCcB45BE18 and were sent to accumulating addresses:
Code:
0x5bf0370c237aa27584af15b569b134473b279a41
0x3463934897d356b8659cbdfe15209e3bc3229105

Accounts connected: taketeke, deadgin, melai, tokek_belang, pathapoddo

Proofs

Spreadsheet:

UTRUST https://docs.google.com/spreadsheets/d/1Z7vmnANbyyECG9dQG11m8lnlBvGvfLd5rVJcl_1OW6c/edit#gid=1766024366

Address used:
Code:
0x1Ec0637d3091382912Adaf222A3be089C97140E7
0x00d97D7f128D251Cfd3Bd638FE300Abf3037C736
0xfa04d587A17383a7dDb5C337Fc751899D847c483
0x842D3A8D4E3d0FcE7133Ac9296bfe9E68Fd4Eaf3
0x349e0629E750A836EBf25d3bAdE13478a93B9998
0x7799853415FC72CA6886Df073deC180794B545C9

Accounts connected: ayome, leopard11

Proofs:

SETH spreadsheets:

https://docs.google.com/spreadsheets/d/1ikNmbSRe0DjNgjrqw52I6mu0CG7dJnazRZrW62irT0g/edit#gid=587292998 account ayome
https://docs.google.com/spreadsheets/d/1BEpvVwIZ-mPEbncqdnw_RGO04G2uk2Vpn6Hu6z6wMs4/edit#gid=587292998 account leopard11

Address used:
Code:
0x00d97D7f128D251Cfd3Bd638FE300Abf3037C736
0xa4028711D3C2820CbA857a29fDD93CC4755E7726
0x3B916345D94a1c7CF527004fE5d472eCcB45BE18
0xC964416A729E707a8c40Cf79fAE89a73d77e9d9E

Account connected: barlo357

Proofs:

INS spreadsheet: https://docs.google.com/spreadsheets/d/1QPmKERyhvuXm1yRDydDi9vFOa_fpy5nG-urHPaoF-EQ/edit#gid=1204494185

Address used:
Code:
0xC9D80F6b03276d66349109f3bb90514bE1628993

Accounts connected: ks2018ks, giayen2018

Proofs:

Spreadsheet: betterbetting https://docs.google.com/spreadsheets/d/1G1T8UhgtMQIsKpBkpQq-zqsb_92t1iljc_B7QRQOe90/edit#gid=1306199723

Address used:
Code:
0xf9b5fDB04E8e9EEb5537C2b1bAe953610C7047A6

Accounts connected: quockiencoltd

Proofs:

Spreadsheet: peculium https://docs.google.com/spreadsheets/d/1Zd7n0efGBM0YlPn2-s5MWDD3wEpeXWfpWumAiYL3QKs/edit#gid=479310416

Address used:
Code:
0xBf03A2Fc87b82a717bD2050C1a9B853691a1b2c2

Accounts connected: sabunstar, ind-coder, french_andrey,

Proofs:

Spreadsheet:LALA https://docs.google.com/spreadsheets/d/1p_Uc-jO0ce3RSqKQ8hZbOATJ2vIVNAWeL5lgvZP7ecY/edit#gid=905527113

Address used:
Code:
0x0Ad4229980Fef2d110874cf07016426A52356a03
0x8358F75af220fe3bf982c81085EEd54f1A1063B4
0xEFa6463273e56694A6452B3e6BEC0169D0099E84

Accounts connected: sbastian77, adiba14, pvt-snafu(claims his eth address has been hacked), giayen2018(already mentioned above which is proof that both address mentioned at beginning of post are used for token accumulation)

Proofs:

Matrix Spreadsheets:
https://docs.google.com/spreadsheets/d/1GEUgxinT2dGqUeQNw75kzXPzlwc2XSSw9ebzi8sQEbg/edit#gid=1120191121
https://docs.google.com/spreadsheets/d/18xWQV4Q2uu26CO3Ni4viz2LCImprYIhN_YtPe9hNozc/edit#gid=2117995218
https://docs.google.com/spreadsheets/d/1KunIgy961CRUbhnyRHV6dysSoN7ppONQJwvaJXhq2M0/edit#gid=1548701090
https://docs.google.com/spreadsheets/d/1mpsyR7KJFxElTxkBVv_SW2pnlaHEARGAESQG6vfi0Lw/edit#gid=1275807952

Address used:
Code:
0x3D8a57AeDA3DEDa5c22e32f3cFC95067b5524e75
0x582276af46Bf23F401Ff2e20Ca33E7C156336201
0x3B916345D94a1c7CF527004fE5d472eCcB45BE18
0xdbEeADF97Ea47a916551Ba9e045D653925b5Aa40
0xF5cA3064c67D82E5CBd3F581B39F34a13c8C7B05
0x31CcEc325565aD2B5C9849eD99c5Ca3A1DF919Bc
0x721384837CdB9D405eefdf6b8DdD5560919E673F

misc: cheating bounty campaigns.

I participate in many bounty companies !!! And I'm not not connected with the one account you wrote! I wrote in a branch of the bounty company sether that my wallet was hacked and asked to change it! I can find my message in the branch and present you with proof, all that you wrote about me is lies! I did not deceive anyone !!!
marlboroza
Legendary
*
Offline Offline

Activity: 1932
Merit: 2270


View Profile
May 03, 2018, 05:23:48 PM
 #595

Accounts connected: N.E.O.N, DedGin

Proof of connection: using the same twitter accounts.

Twitter Profile Link: https://twitter.com/SergoGeorg

Campaign : Twitter
Bitcointalk Username: DedGin
Spreadsheet No: 280
Twitter Account: https://twitter.com/Pn5Q95PiSyJ1LIj


Archived proofs: https://archive.fo/7eIra#selection-5825.0-5825.25 https://archive.fo/hL2SD#selection-2937.0-2937.27 https://archive.fo/eMxEb#selection-7011.0-7008.2

misc: cheating bitex bounty campaign at the moment.
pathapoddo
Full Member
***
Offline Offline

Activity: 448
Merit: 100


CRYPTOCITIZEN $CCASH


View Profile
May 03, 2018, 06:03:25 PM
 #596

I got a unnecessary red tag for doing nothing. Please recheck my issue and remove my red tag. https://bitcointalk.org/index.php?topic=3514418.new#new thanks.

⎔ CRYPTOCITIZEN ┇ RULE & EARN 【 $CCASH 】
MMO RPG METAVERSE ON BSC ┇ FIGHT  • •  DRAG RACE  • •  EARN
➥ TELEGRAM ➥ TWITTER ➥ TWITCH ➥ WEBSITE  • • 【 WEBSITE 】
bumschaa
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
May 03, 2018, 06:03:51 PM
 #597

Accounts Connected:

They are in numerical order!

chuanpu           https://bitcointalk.org/index.php?action=profile;u=1455244
Coopeer           https://bitcointalk.org/index.php?action=profile;u=1459460
Quantumbot   https://bitcointalk.org/index.php?action=profile;u=1460151
Godparticles   https://bitcointalk.org/index.php?action=profile;u=1460222
soopiking           https://bitcointalk.org/index.php?action=profile;u=1460330
MariaOzawaa   https://bitcointalk.org/index.php?action=profile;u=1460351
Jonesdoo           https://bitcointalk.org/index.php?action=profile;u=1460374
morphic           https://bitcointalk.org/index.php?action=profile;u=1460404
BooMoon           https://bitcointalk.org/index.php?action=profile;u=1460424
AssassinCreed   https://bitcointalk.org/index.php?action=profile;u=1460514
Yagami nunnery   https://bitcointalk.org/index.php?action=profile;u=1460559
Kyo Kusanagi   https://bitcointalk.org/index.php?action=profile;u=1460601
spritJ           https://bitcointalk.org/index.php?action=profile;u=1563565
Xhero           https://bitcointalk.org/index.php?action=profile;u=1563593
Windwolf           https://bitcointalk.org/index.php?action=profile;u=1563621
icowind           https://bitcointalk.org/index.php?action=profile;u=1563638
Newsky           https://bitcointalk.org/index.php?action=profile;u=1563862
dilidolu           https://bitcointalk.org/index.php?action=profile;u=1563892
kakaword           https://bitcointalk.org/index.php?action=profile;u=1563928

Proof:

1) Joined same bounty at the same time  
https://clip2net.com/s/3TTmoFF  (https://docs.google.com/spreadsheets/d/1GS1xvBs0o4DbpH8SosrGN1ADdrsnx2fq0dKng6ziOVo/edit#gid=579373772)

2) same day of registration all of them

3) same number of posts

bumschaa
Newbie
*
Offline Offline

Activity: 14
Merit: 0


View Profile
May 03, 2018, 06:12:00 PM
Last edit: May 03, 2018, 06:27:30 PM by bumschaa
 #598

Accounts Connected:

They are in numerical order!

jponline4u   https://bitcointalk.org/index.php?action=profile;u=1852805
monojet1   https://bitcointalk.org/index.php?action=profile;u=1852724

Proof:

1) Joined same bounty at the same time  
https://clip2net.com/s/3TTnwbq  (https://docs.google.com/spreadsheets/d/1GS1xvBs0o4DbpH8SosrGN1ADdrsnx2fq0dKng6ziOVo/edit#gid=579373772)

2) same day of registration

3) same number of posts

4) same posts in same threads
Leopard11
Jr. Member
*
Offline Offline

Activity: 504
Merit: 5


View Profile
May 03, 2018, 07:11:01 PM
 #599

Accounts connected: taketeke, deadgin, melai, tokek_belang, pathapoddo, ayome, leopard11, ks2018ks, giayen2018, quockiencoltd, sabunstar, ind-coder, french_andrey, sbastian77, adiba14, pvt-snafu(claims his eth address has been hacked), barlo357




User Pvt-snafu said he accidentally copied private key to spreadsheet.

Tokens came from this address 0x3B916345D94a1c7CF527004fE5d472eCcB45BE18 and were sent to accumulating addresses:
Code:
0x5bf0370c237aa27584af15b569b134473b279a41
0x3463934897d356b8659cbdfe15209e3bc3229105

Accounts connected: taketeke, deadgin, melai, tokek_belang, pathapoddo

Proofs

Spreadsheet:

UTRUST https://docs.google.com/spreadsheets/d/1Z7vmnANbyyECG9dQG11m8lnlBvGvfLd5rVJcl_1OW6c/edit#gid=1766024366

Address used:
Code:
0x1Ec0637d3091382912Adaf222A3be089C97140E7
0x00d97D7f128D251Cfd3Bd638FE300Abf3037C736
0xfa04d587A17383a7dDb5C337Fc751899D847c483
0x842D3A8D4E3d0FcE7133Ac9296bfe9E68Fd4Eaf3
0x349e0629E750A836EBf25d3bAdE13478a93B9998
0x7799853415FC72CA6886Df073deC180794B545C9

Accounts connected: ayome, leopard11

Proofs:

SETH spreadsheets:

https://docs.google.com/spreadsheets/d/1ikNmbSRe0DjNgjrqw52I6mu0CG7dJnazRZrW62irT0g/edit#gid=587292998 account ayome
https://docs.google.com/spreadsheets/d/1BEpvVwIZ-mPEbncqdnw_RGO04G2uk2Vpn6Hu6z6wMs4/edit#gid=587292998 account leopard11

Address used:
Code:
0x00d97D7f128D251Cfd3Bd638FE300Abf3037C736
0xa4028711D3C2820CbA857a29fDD93CC4755E7726
0x3B916345D94a1c7CF527004fE5d472eCcB45BE18
0xC964416A729E707a8c40Cf79fAE89a73d77e9d9E

Account connected: barlo357

Proofs:

INS spreadsheet: https://docs.google.com/spreadsheets/d/1QPmKERyhvuXm1yRDydDi9vFOa_fpy5nG-urHPaoF-EQ/edit#gid=1204494185

Address used:
Code:
0xC9D80F6b03276d66349109f3bb90514bE1628993

Accounts connected: ks2018ks, giayen2018

Proofs:

Spreadsheet: betterbetting https://docs.google.com/spreadsheets/d/1G1T8UhgtMQIsKpBkpQq-zqsb_92t1iljc_B7QRQOe90/edit#gid=1306199723

Address used:
Code:
0xf9b5fDB04E8e9EEb5537C2b1bAe953610C7047A6

Accounts connected: quockiencoltd

Proofs:

Spreadsheet: peculium https://docs.google.com/spreadsheets/d/1Zd7n0efGBM0YlPn2-s5MWDD3wEpeXWfpWumAiYL3QKs/edit#gid=479310416

Address used:
Code:
0xBf03A2Fc87b82a717bD2050C1a9B853691a1b2c2

Accounts connected: sabunstar, ind-coder, french_andrey,

Proofs:

Spreadsheet:LALA https://docs.google.com/spreadsheets/d/1p_Uc-jO0ce3RSqKQ8hZbOATJ2vIVNAWeL5lgvZP7ecY/edit#gid=905527113

Address used:
Code:
0x0Ad4229980Fef2d110874cf07016426A52356a03
0x8358F75af220fe3bf982c81085EEd54f1A1063B4
0xEFa6463273e56694A6452B3e6BEC0169D0099E84

Accounts connected: sbastian77, adiba14, pvt-snafu(claims his eth address has been hacked), giayen2018(already mentioned above which is proof that both address mentioned at beginning of post are used for token accumulation)

Proofs:

Matrix Spreadsheets:
https://docs.google.com/spreadsheets/d/1GEUgxinT2dGqUeQNw75kzXPzlwc2XSSw9ebzi8sQEbg/edit#gid=1120191121
https://docs.google.com/spreadsheets/d/18xWQV4Q2uu26CO3Ni4viz2LCImprYIhN_YtPe9hNozc/edit#gid=2117995218
https://docs.google.com/spreadsheets/d/1KunIgy961CRUbhnyRHV6dysSoN7ppONQJwvaJXhq2M0/edit#gid=1548701090
https://docs.google.com/spreadsheets/d/1mpsyR7KJFxElTxkBVv_SW2pnlaHEARGAESQG6vfi0Lw/edit#gid=1275807952

Address used:
Code:
0x3D8a57AeDA3DEDa5c22e32f3cFC95067b5524e75
0x582276af46Bf23F401Ff2e20Ca33E7C156336201
0x3B916345D94a1c7CF527004fE5d472eCcB45BE18
0xdbEeADF97Ea47a916551Ba9e045D653925b5Aa40
0xF5cA3064c67D82E5CBd3F581B39F34a13c8C7B05
0x31CcEc325565aD2B5C9849eD99c5Ca3A1DF919Bc
0x721384837CdB9D405eefdf6b8DdD5560919E673F

misc: cheating bounty campaigns.

I participate in many bounty companies !!! And I'm not not connected with the one account you wrote! I wrote in a branch of the bounty company sether that my wallet was hacked and asked to change it! I can find my message in the branch and present you with proof, all that you wrote about me is lies! I did not deceive anyone !!!

Here is the proof that I informed the managers that my secret key was known to the scammer, remove the minus from the trust!
https://bitcointalk.org/index.php?topic=2453487.msg30741326#msg30741326
Timelord2067 (OP)
Legendary
*
Offline Offline

Activity: 3654
Merit: 2216


💲🏎️💨🚓


View Profile
May 04, 2018, 02:24:21 AM
Last edit: May 17, 2023, 12:04:38 AM by Timelord2067
 #600

10 Accounts Connected:

COINISM0001, nikjain422, preditor422, HartleyDrake, LamontFalkner, RonaldDuncan, MarlonDamon, QuinlanDeclan, KonradAvery, RodneyErskine,

[color=#0a80b1]Proof:[/color]

*Note* I have corrected the UID's in this quote - see below for details of correction...

[quote author=Glomerulus22 link=topic=2544574.msg35942017#msg35942017 date=1525082012]
Accounts Connected:

LamontFalkner, MarlonDamon

[color=#0a80b1]Proof:[/color]

Name:    LamontFalkner u=1835480 http://archive.is/BjMNO
Posts:    179
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:24:38 PM
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon u=1835488 http://archive.is/yVJH4
Posts:    181
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:26:18 PM
Last Active:    April 29, 2018, 10:24:39 PM

This guy is trying to be smart - he does not post exactly same posts, but his double posts are different, but to similar or same topic, like here: https://bitcointalk.org/index.php?topic=2539541.msg35575910#msg35575910
[/quote]

You can add to that list

Code:
Name: 	RonaldDuncan u=1835484 http://archive.is/WDWgY
Posts: 176
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:25:37
Last Active: 01 May 2018, 03:46:13

and

Code:
Name: 	QuinlanDeclan u=1835532 http://archive.is/DgzVM
Posts: 176
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:37:59
Last Active: 01 May 2018, 02:26:20

How I found them was I looked at LamontFalkner and MarlonDamon's trust walls and saw they both gave this person trust:

Code:
Name: 	COINISM0001 u=1231995 http://archive.is/f9MpN
Posts: 207
Activity: 140
Merit: 0
Position: Jr. Member
Date Registered: 20 October 2017, 17:34:31
Last Active: Today at 10:18:29

So we look at this last UID's trust wall and see:



All four of our valentine's day alts gave this last one trust (that wasn't reciprocated) it's a fair bet to say that COINISM0001 u=1231995 owns these alts.



previously RodneyErskine also gives trust to LamontFalkner and HartleyDrake on the same day:



Code:
Name: 	RodneyErskine u=1855453 http://archive.is/sWF9n
Posts: 0
Activity: 0
Merit: 0
Position: Brand new
Date Registered: 20 February 2018, 03:19:00
Last Active: 01 May 2018, 07:32:47

Having been created a week after valentine's day and having no activity it's a fair bet to say that this is also an alt.

RodneyErskine u=1855453 gives trust to

Code:
Name: 	HartleyDrake u=1835463 http://archive.is/KvF4r
Posts: 182
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:19:33
Last Active: 01 May 2018, 02:12:42

HartleyDrake gives trust to both RodneyErskine and KonradAvery on the 30th of April.



Code:
Name: 	KonradAvery u=1855449 http://archive.is/Al1yL
Posts: 0
Activity: 0
Merit: 0
Position: Brand new
Date Registered: 20 February 2018, 03:17:59
Last Active: 01 May 2018, 06:45:05

KonradAvery like RodneyErskine was created on the 20th of April and has no activity. (Konrad, unlike all the others doesn't have any negative trust thus far)

Having exhausted all our trust links, our accounts connected looks like this:

Accounts Connected:

COINISM0001, HartleyDrake, LamontFalkner, RonaldDuncan, MarlonDamon, QuinlanDeclan, KonradAvery, RodneyErskine,

which Glomerulus22 would have found had /she delved a little further under the surface.



And what of our first two UID's found?

Their last active corresponds with all the others listed:

Code:
Name: 	LamontFalkner u=1835480 http://archive.is/SNrdN
Posts: 182
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:24:38
Last Active: 01 May 2018, 02:26:40

Code:
Name: 	MarlonDamon u=1835488 http://archive.is/3wMo5
Posts: 184
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:26:18
Last Active: 01 May 2018, 07:22:52

Glomerulus22 also incorrectly labels the two s/he found with incorrect UID numbers.

The 1277719 belongs to

Code:
Name: 	nikjain422 u=1277719
Posts: 241
Activity: 112
Merit: 10
Position: Member
Date Registered: 04 November 2017, 01:26:10
Last Active: 29 April 2018, 16:28:59

which when you go back to the two last active dates above corresponds, so, was Glomerulus22 onto something? Let's look...

yahoo62278 identifies nikjain422 and preditor422 as being alts... both give each-other merits here and here

Code:
Name: 	preditor422 u=1285494
Posts: 90
Activity: 90
Merit: 1
Position: Jr. Member
Date Registered: 06 November 2017, 15:36:50
Last Active: 26 February 2018, 14:07:02

archive.is uses the GMT clock (I am GMT +10)

Name:    nikjain422
Last Active:    April 29, 2018, 06:28:59 AM

Name:    LamontFalkner
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon
Last Active:    April 29, 2018, 10:24:39 PM

I'm prepared to say both nikjain422 and preditor422 are alts of the other seven connected by me.

Miscellaneous:

Not sure how Glomerulus22 came to use the UID 1277719 but in any event, it seems to connect with the other alts.

I also haven't delved into these UID's individual posts, I've already spent  over 90 minutes on this one post.

Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 [30] 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 ... 192 »
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!