Bitcoin Forum
April 25, 2024, 07:54:39 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Tens/hundreds of accounts - Bot malfunction?  (Read 324 times)
This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
Lauda (OP)
Legendary
*
Offline Offline

Activity: 2674
Merit: 2965


Terminated.


View Profile WWW
October 26, 2018, 01:10:30 PM
Last edit: October 26, 2018, 02:41:36 PM by Lauda
 #1

Thread (link to last page): https://bitcointalk.org/index.php?topic=5031375.2200

What caught my attention are the usernames after taking a random look at the last page:
Quote
Most people should spot that there is a coded pattern there (at least from the trailing numbers). After taking a closer look, two things are obvious:

1) The spreadsheet number that the user posts (although it is sometimes different):
Quote
Spreadsheet #: 62
2) The addresses being posted. Taken from the last page (111):
Quote
0x7eC9e5194cB47dF887CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF320CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1b9870404
0x7eC9e5194cB47dF637CF0Ae0aad3D1b5578704
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B99054
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B05449
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B065740

Previous page (110):
Quote
0x7eC9e5194cB47dF003CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba05480636
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8870
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B0574480
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B878010
0x7eC9e5194cB47dF258CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF328CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF978CF0Ae0aad3D1ba8B8e668A

There are 13 more entries on the page before that if I search for the prefix and so on. I don't have time to list all the accounts/look for them right now (sheets are being attacked too obviously). If anyone is interested, just look for the prefix '0x7eC9e5194cB47dF'.

I have no idea what's going on here though. I've sent this thread to a mod.

"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks"
😼 Bitcoin Core (onion)
1714031679
Hero Member
*
Offline Offline

Posts: 1714031679

View Profile Personal Message (Offline)

Ignore
1714031679
Reply with quote  #2

1714031679
Report to moderator
1714031679
Hero Member
*
Offline Offline

Posts: 1714031679

View Profile Personal Message (Offline)

Ignore
1714031679
Reply with quote  #2

1714031679
Report to moderator
"Bitcoin: mining our own business since 2009" -- Pieter Wuille
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714031679
Hero Member
*
Offline Offline

Posts: 1714031679

View Profile Personal Message (Offline)

Ignore
1714031679
Reply with quote  #2

1714031679
Report to moderator
marlboroza
Legendary
*
Offline Offline

Activity: 1932
Merit: 2270


View Profile
October 26, 2018, 03:46:32 PM
 #2

Quote
I have no idea what's going on here though.
I have few theories, looking at the same pattern(posts are without quotation to point something, links to posts are above each one):

Account #1 :

Bitcointalk name: EsthervAlinav4990
Twitter Profile Link = https://twitter.com/EsthervAlinav4990 --> doesn't exist
Facebook Profile Link = https://www.facebook.com/EsthervAlinav4990 --> doesn't exist
Telegram Username = @EsthervAlinav4990 --> exist, but long time no seen
Medium Link = https://medium.com/@EsthervAlinav4990 --> doesn't exist


Account #2 :

Bitcointalk name: KyliebNorahb4944
Twitter Profile Link = https://twitter.com/KyliebNorahb4944  --> doesn't exist
Facebook Profile Link = https://www.facebook.com/KyliebNorahb4944 -- doesn't exist
Telegram Username = @KyliebNorahb4944  --> exist, also as previous user, long time no seen
Medium Link = https://medium.com/@KyliebNorahb4944 --> doesn't exist


Account #3 :

Bitcointalk name: Promoprice
Twitter Profile Link = https://twitter.com/PaigeiPresleyi5003 --> account doesn't exist
Facebook Profile Link = https://www.facebook.com/PaigeiPresleyi5003 --> account doesn't exist
Telegram Username = @PaigeiPresleyi5003 --> long time no seen
Medium Link = https://medium.com/@PaigeiPresleyi5003 --> nowhere to be found


Account #4 :

Bitcointalk name: AubreybLucyb4866
Twitter Profile Link = https://twitter.com/AubreybLucyb4866  --> it doesn't exist
Facebook Profile Link = https://www.facebook.com/AubreybLucyb4866 --> doesn't exist
Telegram Username = @AubreybLucyb4866  --> last time seen long time ago
Medium Link = https://medium.com/@AubreybLucyb4866 --> error 404, doesn't exist

And so on...

Could it be...ICO bumping service? Bumping bounty to keep it on top for more promotion?  Undecided I mean, they all applied to bounties with social media accounts which don't exist, except telegram which is inactive anyway, with invalid eth addy's:

ETH Address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B0574480
ETH Address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8870

Someone is trying to cheat campaigns? I just don't see how. Latest post:

#proof authentification
Bitcointalk username: PaigeiPresleyi5003
Twitter campaign: https://twitter.com/PaigeiPresleyi5003
Facebook campaign: https://www.facebook.com/PaigeiPresleyi5003
Telegram: @PaigeiPresleyi5003
ETH Address: 0xF17Be7223E482EC7F899E15186aDfa4e2D87011
Nothing is real. I am not tech person, is ddos possible this way?
Kavelj22
Legendary
*
Offline Offline

Activity: 1736
Merit: 1433


🔃EN>>AR Translator🔃


View Profile
October 26, 2018, 03:56:12 PM
 #3

Just Shocked again !!
That's an abusive attack to Lauda (as a bounty manager) because mostly thought she is not checking bounties she overrolls. I think the abuser willing to complete destroying your reputation and not just willing to cheat campaigns. This is so dumb to make such a bot error; I think bot-owner knows what he is doing (just a thought).
I think you (Lauda) will face a lot of bounty related issues now you are nolonger in DT.
Anyway, Mods have to quick react over this storm against Lauda; it's still one of the few assets of this forum.

R


▀▀▀▀▀▀▀██████▄▄
████████████████
▀▀▀▀█████▀▀▀█████
████████▌███▐████
▄▄▄▄█████▄▄▄█████
████████████████
▄▄▄▄▄▄▄██████▀▀
LLBIT
  CRYPTO   
FUTURES
 1,000x 
LEVERAGE
COMPETITIVE
    FEES    
 INSTANT 
EXECUTION
.
   TRADE NOW   
The Cryptovator
Legendary
*
Offline Offline

Activity: 2226
Merit: 2170


Need PR/CMC & CG? TG @The_Cryptovator


View Profile WWW
October 26, 2018, 04:11:25 PM
 #4

Could it be...ICO bumping service? Bumping bounty to keep it on top for more promotion?  Undecided I mean, they all applied to bounties with social media accounts which don't exist, except telegram which is inactive anyway, with invalid eth addy's:

Yes, most likely accounts are created for ICO bumping service. Most of mentioned account activity almost same (21). They only post proof of authentication post, they never submitted any bounty report still now. I believe they are avoiding post deletion.  I have experience on this thread, I am reporting daily at least 2/3 page. They are using same methods almost. Quoting full thread and with nice project.

.BEST..CHANGE.███████████████
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
██
███████████████
..BUY/ SELL CRYPTO..
coinlocket$
Legendary
*
Offline Offline

Activity: 2352
Merit: 1512


#1 VIP Crypto Casino


View Profile
October 26, 2018, 04:53:14 PM
 #5

@marlboroza In the past, I've also found some "fake" accounts with fake eth address or fake social media activities.

@Lauda, also the accounts I've found on the past using the same patterns of those accounts where they post different fake addresses on every proof of authentication.

Since like this user https://bitcointalk.org/index.php?action=profile;u=2391504;sa=showPosts is using all fake data, from:

btc profile
fake social media
fake eth

We can assume they are just bounty bumping services.

Edit, actually this storm of accounts are using real eth addresses

Maybe most likely from others random users? like this one



Twitter username: @HuyJav

Twitter url: https://twitter.com/HuyJav

Followers: 4730

Retweets:
https://twitter.com/xtradeio/status/989189600542371841
https://twitter.com/xtradeio/status/989213717698146305

ERC20 Wallet address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A


##PROOF OF AUTHENTICATION##
Bitcointalk Profile Link: https://bitcointalk.org/EsthervAlinav4990
Telegram Username (For Telegram Campaign only!): @EsthervAlinav4990
Campaign : Telegram, Twitter, Facebook
Spreadsheet #: 62
ETH Address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A

.
.BITCASINO.. 
.
#1 VIP CRYPTO CASINO

▄██████████████▄
█▄████████████▄▀▄▄▄
█████████████████▄▄▄
█████▄▄▄▄▄▄██████████████▄
███████████████████████████████
████▀█████████████▄▄██████████
██████▀██████████████████████
████████████████▀██████▌████
███████████████▀▀▄█▄▀▀█████▀
███████████████████▀▀█████▀
 ▀▀▀▀▀▀▀██████████████
          ▀▀▀████████
                ▀▀▀███

.
......PLAY......
Lauda (OP)
Legendary
*
Offline Offline

Activity: 2674
Merit: 2965


Terminated.


View Profile WWW
October 26, 2018, 05:09:30 PM
Last edit: October 27, 2018, 02:30:34 PM by Lauda
 #6

Could it be...ICO bumping service? Bumping bounty to keep it on top for more promotion?  Undecided I mean, they all applied to bounties with social media accounts which don't exist, except telegram which is inactive anyway, with invalid eth addy's:
The team doesn't even have a proper ANN thread yet; it's an actual startup based in China, unlike most ICOs. They are, however, pretty naive when it comes to Bitcointalk. Someone could have tricked them into hiring such a service under false pretenses (they were tricked already regarding something else, but I'm not going to go into the details of that). Since I don't know what exactly the cause of this is, I can't exclude any possibilities. However, given what I just said and my experience with my contact I am in strong belief that this isn't the case.
Keep in mind that it is also possible that an enemy of Vena or me could be doing this. The Telegram campaign was under attack before the thread got attacked.

Nothing is real. I am not tech person, is ddos possible this way?
Yes, of course. A DDoS is possible with anything that asks for resources or sends them to the server for processing. However, given the rate-limiting, cloudflare and the type of resources (plaintext posts) I don't see how it could ever become viable.

Lauda (as a bounty manager) because mostly thought she is not checking bounties she overrolls.
Are you kidding me? My bounties have by far the highest rejection rate[1] in the campaigns that have the highest number of cheaters (Telegram && Content). Content currently being at over 70%, and TG over 60% (still being processed).

That's an abusive attack to Lauda
That's also one of the possibilities.

We can assume they are just bounty bumping services.
As I have just written above, I highly doubt that. It is more likely that it is either: a) Random bumping (post in multiple threads to avoid detection); b) Attack targeted at me.

Update: Some numbers are in for Telegram.
Total entries: 2949
Rejected entries: 2666[2]
Rejection rate: ~90.4%

[1] At least from what I have seen so far, especially content stuff (e.g. duplicate submissions across different domains are often accepted).
[2] Quite a lovely number. Roll Eyes

"The Times 03/Jan/2009 Chancellor on brink of second bailout for banks"
😼 Bitcoin Core (onion)
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!