Author

Topic: Abusing bounty campaigns (Read 207 times)

member
Activity: 268
Merit: 24
August 15, 2018, 09:51:50 AM
#5
Dear silent26,
Thank you for the follow up about putting more strong evidence to prove this user is managing this 2 accounts.
Maybe i'm not a perfect investigator and i think i have lack of information for gathering some strong evidences.
But i'm trying to do my best, if i seek more malicious work of this user i will not hesitate to add it here asap.
And i hope those additional evidence you put here is enough to declare this user as a abuser and cheater.

I really appriciate your interest. Wink

Thanks and regards!
sr. member
Activity: 602
Merit: 327
Politeness: 1227: - 0 / +1
August 15, 2018, 06:03:09 AM
#4
After conducting some investigation about if these accounts are connected. I've found this...

I went through some bounties of these two accounts to look for their eth address and found out that their address are "somehow" next to each other in this spreadsheet, coincidence?

neymarjunior50 number 591 in Facebook spreadsheet
barsametu01 number 592 in Facebook spreadsheet

https://i.imgur.com/qOMhEar.png

And

neymarjunior50 number 882 in twitter spreadsheet
barsametu01 number 884 in twitter spreadsheet

https://i.imgur.com/JqsnTkx.png

Are these really coincidence? Wait there's more.

Check out there address in etherscan.io and you will notice that they have the exact same tokens.

neymarjunior50's erc20 address is 0x6166080ECE138205CD2B6172f267f29ED570C308 https://etherscan.io/address/0x6166080ece138205cd2b6172f267f29ed570c308
barsametu01's erc20 address is 0xcabBFB234E3D73d98DF7F116a3Ef0A920b7cc34D https://etherscan.io/address/0xcabbfb234e3d73d98df7f116a3ef0a920b7cc34d

Also both addresses sent tokens in this address 0x623B925b0A57a24EA8dE301F2E3E692cE903f0c3 with the same date as it says "35 days 20 hrs ago"

neymarjunior50's Txhash https://etherscan.io/tx/0xd692bebd6cca0dd1c3dbf763e29300617a3d5665fc6df61c661158219e73f6f7
barsametu01's Txhash https://etherscan.io/tx/0x7836241580dc39f3c8cb860f4edab9de940c0a2f2a3dd959135011db5ded7206

These might be still not enough to prove that these accounts were connected but this will somehow become additional evidences.
member
Activity: 268
Merit: 24
August 14, 2018, 10:44:28 PM
#3
Not a solid proof of connection. Any post, status or tagline they use are not a sort of evidence.
Sorry for what im reffering through, which is the bio of that two account on twitter.
And i think this is not a co-insedence right? 100% copy cat.
Quote
Just tip off the managers of the bounties he is participating in.
Actually, i'm done reporting him to the bounty manager of that campaign but until now no response from them.

-Btw thank you so much for your advice.
May i ask what are those strong proof that can i post here to proved that user is using dual accounts? So i can be able to add it here soon if ever i seek those proof.

Thanks.
legendary
Activity: 3094
Merit: 1472
August 14, 2018, 09:37:48 PM
#2
Not a solid proof of connection. Any post, status or tagline they use are not a sort of evidence.

Btw those Twitter accounts and Facebook accounts he uses has bot followers or gained by paying someone for adding friends or followers which is pretty easy nowadays. Just tip off the managers of the bounties he is participating in.
member
Activity: 268
Merit: 24
August 14, 2018, 09:07:22 PM
#1
2 alt account that abusing bounty campaigns such as sign, and social media spotted.

https://bitcointalksearch.org/user/neymarjunior50-1760729
Social media link of this account: https://twitter.com/neymarjunior505
Refference:

https://bitcointalksearch.org/user/barsametu01-1760760
Social media link of this account: https://twitter.com/barsametu01
Refference:

Bounty campaign join using this 2 accounts.
https://bitcointalksearch.org/topic/bounty-ultra-200k-bonus-4490650

Other refference, #876 & #877 on this sheet: https://docs.google.com/spreadsheets/d/1iJij3WsJIEHRXtxcbAEJLAPcW6Dgx5E3lQjGi2nWPSA/edit?usp=drivesdk


Jump to: