Bitcoin Forum
April 19, 2024, 05:05:53 PM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Warning: One or more bitcointalk.org users have reported that they believe that the creator of this topic displays some red flags which make them high-risk. (Login to see the detailed trust ratings.) While the bitcointalk.org administration does not verify such claims, you should proceed with extreme caution.
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24]  All
  Print  
Author Topic: BEST CRYPTO POKER | NEW CORONAVIRUS RELIEF PACKAGE: 3X CASH BONUS + LESS RAKE  (Read 27951 times)
phreess
Copper Member
Jr. Member
*
Offline Offline

Activity: 268
Merit: 7

Phreess - A Self-Appreciating Token


View Profile WWW
May 03, 2020, 09:39:30 PM
Last edit: May 03, 2020, 11:17:45 PM by phreess
 #461

Hey guys, I just joined bitcointalk, and I want to start a poker site, so I have been looking into the competition, and seeing that cryptopokergroup.com is scamming members, I decided to take a look and this is what I found so far:

https://www.whois.com/whois/cryptopokerclub.io - The whois info of their first domain

https://www.whois.com/whois/cryptopokergroup.com - The whois info of their latest domain.

I found several things that can be used to corrupt their site, if you guys so desire:

I found their "admin" login page: https://admin.cryptopokergroup.com/login/default.aspx?ReturnUrl=%2f

Dude, that admin login page is so insecure and I may bruteforce my way into logging into their scammer's cave. That's probably where all the scams start.

Also, I found several emails to contact in case of abuse (which I will place down below).

Also, I found where their game servers are, Data Miners S.A. ( Racknation.cr )
I will submit abuse emails and reports to all parties laid here, in order to take down this scammer site once and for all. I don't think we can save any scammed coins, but we can stop these scammers from taking from more people.

Their server IP from cryptopokergroup.com is on https://www.racknation.cr/ is: 190.112.223.106 (Racknation.cr IP)
Their admin, affiliate and game servers IPs is: 190.112.223.106 (Racknation.cr IP)
Their root public site IP is: 192.64.115.146 (Namecheap.com Hosting IP)

So, in short, their affiliate, admin and game servers are located at https://www.racknation.cr/ and their root domain hosting (the site that everyone sees), is hosted at https://www.namecheap.com/hosting/

In regards to their emails, they are managed from Google with these servers:
alt2.aspmx.l.google.com
aspmx.l.google.com
alt3.aspmx.l.google.com
alt4.aspmx.l.google.com
alt1.aspmx.l.google.com

Also, their google site verification code is:
google-site-verification=jQPChjSS9oLB59VXNUJmuaIzGGJb-46EuceY4jzdinc

So, as I said, we can just send tons of emails to the abuse departments of each service provider and hope they take down their service and pass their details to the authorities.

Hopefully, Racknation.cr will cooperate as that's where the main scam operation takes place (the game server, logs, the admin scam panel, etc)

When I find more info and after I report these scammers, I will post here or on the scam accusation thread (https://bitcointalk.org/index.php?topic=5243049.0)

EDIT:

Also, I found some subdomains of the deleted cryptopokerclub.io and their ongoing scam site cryptopokergroup.com:

lyncdiscover.cryptopokerclub.io
instantplay.cryptopokerclub.io
game.cryptopokerclub.io
affiliate.cryptopokerclub.io
admin.cryptopokerclub.io


instantplay.cryptopokergroup.com
game.cryptopokergroup.com
affiliate.cryptopokergroup.com
admin.cryptopokergroup.com

EDIT 2:

At game.cryptopokergroup.com I found 3 .exe files

SetupCryptoPoker247.exe
SetupCryptoPokerClub.exe
SetupCryptoPokerGroup.exe

I don't suggest you download these at all, but If needed, I uploaded them securely:

https://mega.nz/file/ok9lhCrB#7PDsR__gLSHVNfGSVQnEeefyy5zvpaWA1SrFYRyLWqw
https://mega.nz/file/l50VhCRC#g3g-pkZUQIxbfyfv1so9gTibmQ53eEgZ6-pLM8lG5vw
https://mega.nz/file/M40zWQJT#YGMMwiabsSHuZNBOlDwKa8xDlCVUe5XDFyWoOCGJlhg

EDIT 3:

it seems that domain cryptopokergroup.com is also propagating malware through exe files.

The setup files can be found at:

https://game.cryptopokergroup.com/SetupCryptoPokerClub
https://game.cryptopokergroup.com/
https://game.cryptopokergroup.com/SetupCryptoPoker247
https://game.cryptopokergroup.com/SetupCryptoPokerGroup

Just add .exe to the files above as it seems btc talk censors the links

It seems that SetupCryptoPokerGroup.exe and SetupCryptoPokerClub.exe files are the same, just the name changed.

Anyway, as two files are the same, only 2 scans could be done. The results are below:

https://www.hybrid-analysis.com/sample/b6d6af6e588eca6422cf4829cf2f4bacf324ecdf7830930296e4a7408c338a97
https://www.hybrid-analysis.com/sample/593ce36fea679d7ed8db2881e89c6650c18202cbaee608d901ea9db33541fd54

If, by the time the setup exe files can't be found in those URLs, there are backups at:

https://mega.nz/file/ok9lhCrB#7PDsR__gLSHVNfGSVQnEeefyy5zvpaWA1SrFYRyLWqw
https://mega.nz/file/l50VhCRC#g3g-pkZUQIxbfyfv1so9gTibmQ53eEgZ6-pLM8lG5vw
https://mega.nz/file/M40zWQJT#YGMMwiabsSHuZNBOlDwKa8xDlCVUe5XDFyWoOCGJlhg

EDIT 4:

Also, it's possible that the game server could send your hole cards to the game server. This is not verified yet, but it's possible that's what could happen.

  ●   Roy's Poker Room   ●
 ❰❰❰❰❰❰  Bitcoin Poker || No KYC  ❱❱❱❱❱❱  
● ▬▬▬▬▬ ● ▬▬▬▬▬ ●●●    ●  0.1% Rake || Daily GTD Tournaments  ●    ●●● ▬▬▬▬▬ ● ▬▬▬▬▬ ●
1713546353
Hero Member
*
Offline Offline

Posts: 1713546353

View Profile Personal Message (Offline)

Ignore
1713546353
Reply with quote  #2

1713546353
Report to moderator
1713546353
Hero Member
*
Offline Offline

Posts: 1713546353

View Profile Personal Message (Offline)

Ignore
1713546353
Reply with quote  #2

1713546353
Report to moderator
1713546353
Hero Member
*
Offline Offline

Posts: 1713546353

View Profile Personal Message (Offline)

Ignore
1713546353
Reply with quote  #2

1713546353
Report to moderator
Bitcoin mining is now a specialized and very risky industry, just like gold mining. Amateur miners are unlikely to make much money, and may even lose money. Bitcoin is much more than just mining, though!
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
phreess
Copper Member
Jr. Member
*
Offline Offline

Activity: 268
Merit: 7

Phreess - A Self-Appreciating Token


View Profile WWW
May 03, 2020, 11:33:14 PM
 #462

Hey guys, this is important.

So, they have been using IP "190.112.223.106" and it seems it's from their game server.

I don't know if these scammers own this IP, but I'm sure it has to do with them as if you see the IP records, you can see it's from their game server the hostname:

 ip: "190.112.223.106"
hostname: "game.cryptopokergroup.com"
city: "San Jose"
region: "California"
country: "US"
loc: "37.3329,-121.8916"
postal: "95113"
timezone: "America/Los_Angeles"
asn: Object
asn: "AS52423"
name: "Data Miners S.A. ( Racknation.cr )"
domain: "racknation.cr"
route: "190.112.223.0/24"
type: "isp"
company: Object
name: "Data Miners S.A. ( Racknation.cr )"
domain: "racknation.cr"
type: "isp"
privacy: Object
vpn: false
proxy: false
tor: false
hosting: false
abuse: Object
address: "300m sur de restaurante il pomodoro, Edificio Centro Creativo, ,, 9182100 - San Pedro - SJ"
country: "CR"
email: "noc@RACKNATION.CR"
name: "Felipe Cruz"
network: "190.112.220.0/22"
phone: "+506 40001053 []"



Either, they are in California, USA or in Costa Rica.

And it could be possible to get a judge to make an order to get Racknation to provide these scammers details, such as logged IPs, payment details, server details and more.

I tried contacting the game server Racknation.cr, but it seems they don't give a flying fuck about this.

https://i.imgur.com/zitIgZX.png
https://i.imgur.com/DHNi6Lp.png


I also contacted Namecheap, Namecheap Hosting and Godaddy about all this and let's see if they give a fuck about this.

I will pm everyone that has posted here that says they have been scammed by this pokerer site. Let's see if we can get a class action suit against these scammers.

  ●   Roy's Poker Room   ●
 ❰❰❰❰❰❰  Bitcoin Poker || No KYC  ❱❱❱❱❱❱  
● ▬▬▬▬▬ ● ▬▬▬▬▬ ●●●    ●  0.1% Rake || Daily GTD Tournaments  ●    ●●● ▬▬▬▬▬ ● ▬▬▬▬▬ ●
LastcallS
Newbie
*
Offline Offline

Activity: 15
Merit: 0


View Profile
May 04, 2020, 12:31:56 AM
 #463

Hey guys..

Hello @LastcallS

The team will re-post the entire conclusion summary of the account report which has been emailed to you among other emails.

You clearly left out large portions of the story in order to fit your bias. Things you left out in your message:

1. You had played, won, withdrew, deposited, received Bonuses + Rakeback and had a regular account activity since 2018 without any issues.

2. As you will read below - there is more to the story than what was written. Would you like to explain why your account logs into every timezone consistently month after month? With idle times exceeding any other player on the platform and irregular table joining behaviour? Also getting your password wrong all the time? After evaluating your account behaviour during our investigation, it quickly became clear that you either shared your account with other people or were using some form of automation software. Either scenario opens the door to possible exploits which is what clearly happened. You admitted to only be located in one location and using your PC 'only for poker'. Your story does not match your account history.

3. The most important comment and your entire argument equates to the following:

"The way they do the withdraws is that they group them together and send them daily. I don’t understand how would you approve the second withdraw based on the first one especially if the IP address is totally unusual (Germany). I know why because it was made by you and this is how you took the 4btc."

As the team mentioned many times your initial withdrawal that you made was approved and scheduled to be sent out in the next withdrawal window (which takes place once per day for the entire platform). This means all requests get grouped for all members into one time window. This is normal and has been the same procedure since the beginning. Your account requested another withdrawal before the initial one was processed and once again it was approved and added to the queue as normal. When the queue time came around that day, all withdrawals were processed as normal. Later that day you report that your account was compromised and the team reacted right away to block both accounts with cancelling the second account's pending withdrawal for the rest of the balance.

As for the IP changes - more on that is written below. As a summary your account has changed IP's 6 times in its history and the platform does not track IP changes or locations unless its a Blacklisted IP. This is because most players prefer using VPN's and it is common for one account to log in through multiple IP's.

4. You are quick to call it a scam when accounts being 'hacked' has never happened before in the platform's history. Why are other accounts not being 'hacked' if it is so common? The other users who were banned in this thread is due to either collusion, using multiple accounts or other forms of cheating.

Your story has nothing to do with any other person commenting in this thread and is entirely not related in any way.


Email highlights as sent to you:

Alongside the response, you were provided 3 attachments which shows your entire account history and log files.

1. Irrefutable evidence of your account being accessed normally without any password reset. A password reset request was never made. Your account logged into the platform without any irregularities.

2. Evidence of your account being logged into and used during a regular time-slot (11:00 - 12:00 UTC). Your entire login history shows 34 total occurrences of the same login timestamp within a +/- 1 hour time differential.

3. Evidence of 6 separate unique IP’s being utilized throughout your account lifespan.

4. Evidence of 33 occurrences where you got your password wrong since September 2018 until April 2020. An average of almost twice per month you are getting your password wrong despite logging in almost every single day. Strong correlation for misuse of login credentials. More analysis on this point can be found below under 'Additional findings (1)'.

5. Regular account activity playing game modes (Heads-Up Cash Games) which your account has played many times before.

6. Regular stakes played (1/2mBTC tables) which your account has played many times before.

7. In conclusion your account activity from the perspective of the platform showed regular usage.


Evidence based reasons for no security alert triggers during possible but not proven account intrusion:

1. Account logged into a regular time slot which has been used many times before.

2. Account password used as normal for access. No irregularities found.

3. Due to our policy for allowing accounts to utilize multiple IP's as long as it is not a blacklisted IP - the platform does not check for players who use a new IP as almost all of our playerbase prefers using VPN's which is the preferred consensus of privacy within the Cryptocurrency community.

4. Your second withdrawal as previously explained was grouped into your first withdrawal request that was made 7+ hours prior and executed at the daily withdrawal slot. As explained previously, all withdrawals are processed once per day for the entire platform. Your account status was clear and there would be no reason for the team to block any withdrawal requests.

5. As you did not enable 2FA via emails onto your account - there was no reason to confirm any withdrawal requests via email.


Additional findings: (1) Poor login credential management is the most probable cause of account intrusion/leak

1. Poor login credential management due to abnormally high amount of incorrect password attempts on your account record (33 incorrect password occurrences) despite logging in almost every day of every month.

2. Due to the incorrect password attempts - you are not using the 'remember password' feature of the application. This means if malware was the cause of the account intrusion - you are open for viruses to steal your password as you continuously type it in regularly.

3. An example of points #1 and #2: March 2020. You logged into the platform: 55 times and got your password wrong 4 times in the same month all on separate days. Why get your password wrong so many times when you logged in 30 out of the 31 days.

Conclusion (1): All the points above indicate a poor management of your login credentials or possible account sharing among friends/family which opens more doors for intrusion and data leaks from your side.


Additional findings: (2) Possible Bot/Automated playing software usage which could have account leaks:

1. Admittance from you twice in email correspondence that you use your computer 'only for poker'. The team found this statement strange and looked into what you meant which revealed multiple red flags. No member has even said anything similar and there is no viable use case for utilizing an entire computer only for one game that requires very little resources unless you are running it in a server environment for automated uses.

2. No records of you joining pre-existing games on any Tournaments, Sit n Go's or any other Ring Game table other than heads up games. You only ever join empty tables. This would be normal as some users prefer heads up modes however you have never joined heads up games that were already available. You always sat by yourself in your designated seat position waiting for players. Our engineering team reviewed such behaviour who have experience in automation and explained the following:

"A very basic reason why this behaviour happened is due to the set up and configuration process of bots and/or any automated systems. They all rely on hooking onto pixels on the screen to read card information. This process is very delicate and requires prior set ups to ensure it works well. The user goes on an empty table, sets up the required parameters and just leaves the device running. If they get action, the bot plays as normal. After they are done they simply shut off and re-run the process the following day. This also explains why the user was manually typing their password to login as bot software does not have automated means to login and join tables automatically. This part has to be manual and there is clear evidence of such behaviour. In addition to this - if true; it fully explains the account intrusion as the user likely purchased the software from underground sources with an array of likely leaks."

3. Prolonged daily idle time which exceeds the nominal expectation of up to 1.5 hours per day per user. In your case - your idle time on average ranged from 2.5-5+ hours which is greater than 200% the expected norm seen via all other players. A view of your entire history for 2020 has been attached for the days you had no action. The same result can be found in previous years as the team checked. Highlighted in yellow are the idle times outside the expected range of 1.5 hours.

4. Unnatural joining tables pattern and frequency. As noted in the attachment for idle times, the team also observed unnatural table selection and joining patterns. Your account always joined three empty heads up tables at all times continuously every single time you logged in. Then simultaneously sold chips across all three tables even when not logging out.

For an example: Login (Apr 02, 2020 @ 12:12 UTC). Joined 3x heads up tables. Left all three tables at 18:35 UTC. Then re-bought again in the same tables by 18:36 UTC. Then disconnected at 03:53 UTC the following day not playing against any opponent, simply being idle. Why not join other tables, why sell the chips just to rebuy them again in the same instance and why idle from 12:12 UTC until 03:53 UTC the following day - are some obvious questions the team evaluated. This unnatural behaviour indicates obvious automation.

5. Account logging into every timezone. As noted in the access log attachment - your account seems to be immune to timezones. Your account frequently logged in and out of every possible timezone which is not normal or natural behaviour indicating automation. We assessed our playerpool and do not have such occurrences. You admitted to only be located in Canada therefore how is your account active during hours of sleep or work?

Conclusion (2): Due to all the points above - there is clear substantial evidence of bot/automation software utilized and/or account sharing with friends or family members who live in a different timezone. Both conclusions violate our terms and conditions for account sharing or assistance software being utilized. Due to these reasons - additional account leaks from your side could have been possible when evaluating how the account controller gained access to your account via underground third party software.


Report Final Conclusion and Resolution:

1. Your account has been refunded 1,195.4‬0 mBTC which is the totality of the rake + second account's total balance they attempted to withdraw.

2. The second account who appeared to play with your account has been permanently banned. 

3. Your account has been enabled for 2FA verification via emails for all future withdrawals.

4. You accepted the resolution provided and withdrew 1,690 mBTC from your account.

5. You continued to play on the platform on Apr 09, 2020 as normal.

6. You have been refunded the largest extent possible. All further damages and losses are your own responsibility as per terms and conditions regarding misplacing your password and failure to safeguard your login credentials and account. The relevant terms and conditions sections are as follows:

3.3) You are obliged to protect your Personal Information. We do not take responsibility and cannot be held accountable for any leak of personal information that may arise out of your own behaviour.
3.5) You must not share your Login Credential with anyone. We do not take responsibility and cannot be held accountable for any account issues and/or losses if you have shared or misplaced your Login Credentials.
12.4) You are responsible for any activity on our Platform arising out of any failure to keep your password confidential, and may be held liable for any losses arising out of such a failure.
13.9) You must notify us in writing immediately if you have lost access and/or control of your account. We do not take responsibility and cannot be held accountable for any account issues and/or losses arising out of shared accounts.
26.4) Users have a responsibility in making a Withdrawal Request containing the correct Wallet ID. We are not accountable for and will not cover any losses occuring due erroneous, mistyped or otherwise incorrect Wallet IDs as this is outside of the control of the platform. 
33.5) If a player has been cheated on by another player when using the Facilities, we shall only refund the amounts lost by the player as a result of being cheated in the event that we can locate the cheating account and access the funds in question. In the event that more than one player is affected by the cheating account and we can allocate that cheating account, the remaining funds in the cheating account will be distributed on a pro-rata basis in accordance with the loss of each affected player.

7. Final remarks from the management team have been attached below after evaluating the new findings.


Final remarks from management:

"Hello,

We have become increasingly aware that this may be an elaborate scheme to defraud us by claiming your account has been accessed out of your control. You have consistently attempted to extort further payments by threatening us with legal action and continuously repeating the same information without being able to provide any further evidence for us to look through and consider.

Even though we have already given more than necessary information about how our platform operates as well as explaining our Term and Conditions to you in great detail.

We find it incredibly offensive that you continue to make wild accusations against our staff members who have gone above and beyond in order to recover funds which you claim have been misappropriated. As explained in previous correspondence we have extracted all available funds in this case and have refunded the maximum amount of BTC possible back to your account as quickly as possible which you have already withdrawn from the platform without facing any issues. This includes the amount from the second account, the amount transacted between the two accounts as well as the rake paid by both accounts. All funds which have left the platform cannot be recovered and that is where the extent of our reach ends.

Further to this point, we have now uncovered that you have previously operated two accounts during the same period. An account under the username of “PriseAI” has been found which is registered under an email extremely similar to yours. The email in question being “a.k*******@gmail.com” while your email being “i.k*******87@gmail.com”. As we are sure you are already aware this is a violation of our Terms and Conditions and would lead to a permanent ban for both accounts. This was not picked up by our team and the account was completely emptied on 11 January 2020.

This evidence shows us that it is entirely possible that you have orchestrated this scenario while previously testing whether our system will be able to spot this type of behaviour. This may have happened on multiple occasions with varying degrees of success. We find this information alarming considering we asked you to give us all information possible and you claimed that you have never done anything wrong and are an honest person. It would seem as though you had the ability to create a second account and play both. In this case playing against yourself to lose funds with the plan to claim further compensation after claiming your account was compromised while at the same time retaining a portion of your balance through a withdrawal. This may have also been done with another party, perhaps a friend or relative from the same family. Adding to this point, we will also be carrying out an analysis to check whether there is any evidence that you are connected to the players which you have previously played with especially those which formed a large portion of your total balance.

In addition to this, we find it highly irregular that a player who has won a large amount during the course of a few days does not initiate a withdrawal of balance especially when in your previous emails you refer to this amount as being substantial. Instead you left more time to elapse with your balance remaining untouched. We assume this time was needed to plan this scheme and put everything in place to carry it out. Instead, you then make an extremely small withdrawal request which we assume was a distraction or test considering how often you mention this withdrawal in your previous emails. We believe you were planning on leaving the platform anyway as you had amassed your largest balance to date and thought you may try to extort more funds from us since your reputation will no longer matter.

Furthermore, after reviewing more of your login data we have found that consistently between 1-3 times per month your password is entered incorrectly and then entered successfully within the same minute without any further wrong password attempts in this sequence. We find the consistency of this highly suspicious and have never seen this type of behaviour from any other user. Most users tend to type their password incorrectly only a handful of times during the course of their account history as well as having multiple incorrect attempts in one go. Something which has never been observed with your account. This leads us to believe that you may be running some type of assistance software possibly a highly sophisticated artificial player known as a “bot” which could be in control of your account. We would also like to note that we believe you had a fear of being automatically blocked by our system and reset your password every time it is input incorrectly. You yourself have mentioned in a previous email that you use your computer “only to play poker”. We find it highly possible that you are running this machine to automatically play for you at any time. We will continue to review more login data as well as comparing it to other accounts.

The team will continue to analyze and implement additional features and strategies to avoid both botting on the platform as well as any possible account intrusions from our side however we cannot control how users safeguard their own passwords and account credentials."



Hey CryproPokerClub,

If you are not scammers please answer my question. Who is the owner and where are you guys located? So I can simply look for my legal rights. I have asked your several times and still no answer.

1. This is correct I have been playing since 2018 with a little bit profit probably between 1 - 1.5btc. After 1 and half years I finally make decent profit(~5BTC) and you took it all. It's simply a robbery.
2. Yes. I love poker and play a lot. I don't see any problem with that. I am pretty sure I don't play 24/7 after all I need some sleep. I never ever shared account with someone else or used automation software(This is so easy to prove by playing on camera for decent hours and see if my pay match with the regular play on the account). Getting my password all the time - wtf is this ? I don't get my pass wrong all the time. It's possible to mistype the  password who doesn't do it.  Yes I do play on PC only for poker and didn't get "hacked" on the other poker sites which I played at the same time.
3. I understand you group the transaction together and send them all at once daily and I don't have issue with that. However you should always check every requested withdraw and don't approve the second withdraw based on the first one. If you just took a look on the request you will see that it is from Germany and I never ever played from other location different than Canada. Not to say that the second withdraw was requested 7 hours after my first one(which I did as always from Canada)
I don't see how you get 6 IP changes. I played only from Canada and didn't change internet provider(probably my IP is public) Even though my internet provider can change IP it cannot be different city or country that I live in.  I never ever used VPN SERVICE!!!
4.First of all I was not quick to call you a scam. I talked back and forth with a support for like 10 days or so. After pro checked my PC for virus and malware and could't find anything on top of that nothing else was "hacked" on my PC I got suspicious  and simply googled your poker site. I saw lots lots of people got scammed and complained and it was obvious for me that I was scammed.


Email highlights as sent to you:
1. It' simply not possible that my account was accessed normally just because I was not able to log in to my account the next day. So it's obvious you just sent the new password to yourself and enter the account.
2. It is not regular time for me the prove is  that there is 34 total occurrences for 1 year and half of playing. And I played a lot like 5-6 days a week. You said that even.
3.Again I only played from 1 location and 1 internet provider and never ever used VPN services. So I am not sure how you get those 6 separate IP addresses. Probably my internet provider change them from time to time but I am sure its always the same city and country.
4. Again 33 times getting my password wrong for year and half its such a low percentage its humanly to mistype few times a month consider that I play 5-6 times a week. I don't see whats wrong with it.
5. Yes this is true all I play is heads up. I love the game.
6. Yes I played .5/1, 1/2 and 2/4 on regular bases.


Evidence based reason for no security alert triggers during possible but not proven account intrusion:
1. Not true not regular time for me 34 times for 1 year and half. Simple math there is 78 weeks in year and half. On regular basis I play ~5.5 days a week so 78x5.5 = 429. 34 TIMES IS LESS THEN 10%. THIS IS NOT REGULAR TIME.
2. Again a lie. If it was regular way of logging in I would be able to log in with my regular password the next day. What you did is obvious again for like 10th time you sent your password to yourself and log in.
3. I never used VPN in my life.
4. Again you should check every request seperatly especially if its requested  from the other side of the world and I always log in for year and half from Canada.


Additional findings.

1)Poor login credential is simply a lie again simple math 78 weeks x ~5.5 days per week = 429 log in overall... 33 incorrect password is less then 10% percent which is normal if you mistype regurally.
2)Again I don't see how I will get malware or virus if i use my PC only for poker and nothing else was "hacked".
3)Short sample is one month even thought I got it wrong 55 time this is not proving anything its simply mistype...

False conclusion - I never shared account with anyone or had poor credentials. I have never get hacked and I played poker for years....


And after all back and forth with your support you blaming me for using bot. Such a ridiculous statement.  
1.Using PC for poker is smart so you don't get hacked. That's why is nearly impossible to get hacked.
2.I like heads up and all i play is  HU. I don't see anything wrong with it.
This is so easy to prove I can just record with my face a few sessions and you will see that my play match with regular play.

Usually when sites have suspicious for bot using they just ask for recorded session or in real time with camera not stealing players money like you did!!!

3. Again what a bias to explain myself why i play a lot more then avarage person on the site. I just like to play simple as that.

4. Usually Heads up lobby is empty and someone has to start new table in order to game to happen. You house bots a running the 6max tables so no bots on heads up.

5. Again not true I need time to sleep as well. Its true I play a lot but the other things are ridiculous. I had only one account on the site.


You refund me some of the amount just to make me keep playing on your scammy site so I can generate rake. If he was a real "hacker" he would simply take all my balance.

Again why don't reveal yourself - where does the company operate and who is the owner so I can look for my legal rights. I am sure a lot of people will be happy to sue CPC!!!
LastcallS
Newbie
*
Offline Offline

Activity: 15
Merit: 0


View Profile
May 04, 2020, 12:38:46 AM
 #464

Hey guys, this is important.

So, they have been using IP "190.112.223.106" and it seems it's from their game server.

I don't know if these scammers own this IP, but I'm sure it has to do with them as if you see the IP records, you can see it's from their game server the hostname:

 ip: "190.112.223.106"
hostname: "game.cryptopokergroup.com"
city: "San Jose"
region: "California"
country: "US"
loc: "37.3329,-121.8916"
postal: "95113"
timezone: "America/Los_Angeles"
asn: Object
asn: "AS52423"
name: "Data Miners S.A. ( Racknation.cr )"
domain: "racknation.cr"
route: "190.112.223.0/24"
type: "isp"
company: Object
name: "Data Miners S.A. ( Racknation.cr )"
domain: "racknation.cr"
type: "isp"
privacy: Object
vpn: false
proxy: false
tor: false
hosting: false
abuse: Object
address: "300m sur de restaurante il pomodoro, Edificio Centro Creativo, ,, 9182100 - San Pedro - SJ"
country: "CR"
email: "noc@RACKNATION.CR"
name: "Felipe Cruz"
network: "190.112.220.0/22"
phone: "+506 40001053 []"



Either, they are in California, USA or in Costa Rica.

And it could be possible to get a judge to make an order to get Racknation to provide these scammers details, such as logged IPs, payment details, server details and more.

I tried contacting the game server Racknation.cr, but it seems they don't give a flying fuck about this.

https://i.imgur.com/zitIgZX.png
https://i.imgur.com/DHNi6Lp.png


I also contacted Namecheap, Namecheap Hosting and Godaddy about all this and let's see if they give a fuck about this.

I will pm everyone that has posted here that says they have been scammed by this pokerer site. Let's see if we can get a class action suit against these scammers.


Hey phreess,

You are doing an amazing job. Not sure how the server IP works but they might be using a VPN server or something to cover themselves. There is a lot of people scammed from these scammers. Count me in for class action.
phreess
Copper Member
Jr. Member
*
Offline Offline

Activity: 268
Merit: 7

Phreess - A Self-Appreciating Token


View Profile WWW
May 04, 2020, 01:03:32 AM
 #465

So far, I report abuse and malware to these emails:

abuse@namecheap.com
abuse@namecheaphosting.com
netabuse@godaddy.com
abuse@godaddy.com
contentcomplaints@godaddy.com
noc@RACKNATION.CR
abuse@RACKNATION.CR

I will pm all of those that were affected by these people and see what we can do.

  ●   Roy's Poker Room   ●
 ❰❰❰❰❰❰  Bitcoin Poker || No KYC  ❱❱❱❱❱❱  
● ▬▬▬▬▬ ● ▬▬▬▬▬ ●●●    ●  0.1% Rake || Daily GTD Tournaments  ●    ●●● ▬▬▬▬▬ ● ▬▬▬▬▬ ●
royserpa
Copper Member
Jr. Member
*
Offline Offline

Activity: 165
Merit: 1

Roy's Poker Room - BTC, 0.1% Rake, No KYC


View Profile WWW
May 18, 2020, 07:01:32 AM
 #466

Hey CryptoPokerClub.io SCAM (Now called CryptoPokerGroup.com SCAM)

How funny you got me out of your telegram group haha. Don't worry I've exported plenty of your stuff from your group.

Hey phreess, good job on that mate!! I hope we can deal with those mofos asap!



EDIT: By the way, here's the telegram group link of these SCAMMERS: https://t.me/cryptopokerclub

Please avoid joining that telegram group, or use a "fake" account to see what they are up to.

  ●   Roy's Poker Room   ●
 ❰❰❰❰❰❰  Bitcoin Poker || No KYC  ❱❱❱❱❱❱  
● ▬▬▬▬▬ ● ▬▬▬▬▬ ●●●    ●  0.1% Rake || Daily GTD Tournaments  ●    ●●● ▬▬▬▬▬ ● ▬▬▬▬▬ ●
CryptoPokerClub (OP)
Jr. Member
*
Offline Offline

Activity: 203
Merit: 1

Next generation Bitcoin & Ethereum Poker Platform


View Profile WWW
May 18, 2020, 08:06:17 PM
 #467

Not only do the trolls have no evidence of any claim made but they also continue to create new bitcointalk accounts to spread the same misinformation. There are hundreds of regular players on the network who have no issues and never will have a problem unless they attempt to cheat, collude or violate the terms and conditions. Due to the trolls, this thread will now be locked and the team will post competition announcements for anyone interested to try the game. As the team mentioned a few times in the past - anyone can try the game at anytime and prove it is far from a scam with many more new features coming soon.

New tournament structure launch!

New tournaments have now been launched with larger Guaranteed prize pools!


https://cryptopokergroup.com
Next Generation Blockchain Powered Poker Platform
Pages: « 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 [24]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!