burn them will be fair if i didnt know that all thjose chaters already have his coins, so burn is fair but what about all of them who already cheat it?
Im not sure but maybe there is a better solution about it, maybe something like distribute the rest of coins between all of those wallets who didnt cheat, i mean before you guys discover all those fake wallets vps.
How would you like to discover someone using VPS/VPN? If that was so easy to do, I believe we would already have a valid solution in place.
By looking up the AS name of the wallet or attacker's botnet requesting IP
[root@jesus bitnodes]# whois -h whois.cymru.com 8.8.8.8
[Querying whois.cymru.com]
[whois.cymru.com]
AS | IP | AS Name
15169 | 8.8.8.8 | GOOGLE - Google Inc.,US
[root@jesus bitnodes]# whois -h whois.cymru.com 176.32.98.166
[Querying whois.cymru.com]
[whois.cymru.com]
AS | IP | AS Name
16509 | 176.32.98.166 | AMAZON-02 - Amazon.com, Inc.,US
[root@jesus bitnodes]# whois -h whois.cymru.com 72.52.9.107
[Querying whois.cymru.com]
[whois.cymru.com]
AS | IP | AS Name
32787 | 72.52.9.107 | PROLEXIC-TECHNOLOGIES-DDOS-MITIGATION-NETWORK - Prolexic Technologies, Inc.,US
Then decide if you should credit the requesting IP by cross matching the AS name against a list of residential ISP AS names or have a list of black listed AS names for which you will deny coins.