Pages:
Author

Topic: Bitcoin Miners - page 38. (Read 64188 times)

sr. member
Activity: 378
Merit: 250
January 26, 2014, 02:32:10 PM
Yeah, read the posts. You also sent a bunch of bitcoin to them because you looked at a bad picture on google street view and couldn't read that it didn't say cambridge microprocessor.
member
Activity: 63
Merit: 10
January 26, 2014, 02:30:35 PM
Where did the ctsminer website go??  lol.


Really, I'm not thinking someone who fell for a scam that obvious should be looking at starting a bitcoin security firm.

Read the posts.  I notified the hosting provider's legal department.  BTW, someone who got scammed is the perfect person to start a security firm.
sr. member
Activity: 294
Merit: 250
тσ ¢σιи σя иσт тσ ¢σιи?
January 26, 2014, 02:30:20 PM
I have spoken with Phoenix on Skype a few times + bought a Jupiter from him, where I trusted him by sending the coins first and then waited for the miner to arrive from Hawaii.
From these interactions I can conclude with fair certainty that it is highly unlikely he is a scammer.
I thing he just fell for the scam because greed took over and he wanted to be first in line as usual.

I agree with you that both are not scammers. My comment did not mean to imply that. I honestly think they are not conspiring with the fraudsters. What I mean is that they are terrible stupid for try to bash the people providing warnings and then later use the same warnings to pretend they did not help to pump up the sales. I hope they learn that send money to fraudsters is not the best way to prove the fraudsters are not fraudsters.


+1

People, including myself, did try to warn them from early on. Greed got the better of them though and then denial took over.
sr. member
Activity: 378
Merit: 250
January 26, 2014, 02:28:21 PM
Where did the ctsminer website go??  lol.


Really, I'm not thinking someone who fell for a scam that obvious should be looking at starting a bitcoin security firm.
vip
Activity: 756
Merit: 503
January 26, 2014, 02:24:44 PM
My hat goes off to Augusto Croppo, who first pointed out this his find with the IP address 185.8.106.66 that is associate with butterflyiab.com.

Thank you. I hope you had learned a lesson here:

Do not let greed overcome your rational thinking.
vip
Activity: 756
Merit: 503
January 26, 2014, 02:17:17 PM
I have spoken with Phoenix on Skype a few times + bought a Jupiter from him, where I trusted him by sending the coins first and then waited for the miner to arrive from Hawaii.
From these interactions I can conclude with fair certainty that it is highly unlikely he is a scammer.
I thing he just fell for the scam because greed took over and he wanted to be first in line as usual.

I agree with you that both are not scammers. My comment did not mean to imply that. I honestly think they are not conspiring with the fraudsters. What I mean is that they are terrible stupid for try to bash the people providing warnings and then later use the same warnings to pretend they did not help to pump up the sales. I hope they learn that send money to fraudsters is not the best way to prove the fraudsters are not fraudsters.
member
Activity: 63
Merit: 10
January 26, 2014, 02:08:03 PM
My hat goes off to Augusto Croppo, who first pointed out this his find with the IP address 185.8.106.66 that is associate with butterflyiab.com.  The thread was moving very fast and I missed his post. Thank you Augusto, for your work and I only wish I saw your post earlier. I thought I read every post, but obviously did not.  If you still think I and my brother are involved in the scam, I will give you my BTC transaction with CTS Miner, for you to verify.  

So here is the next question.  Who here is the best expert at tracking down bitcoin transactions and finding out who is currently holding our BTC?  I can either pay you a commission on every BTC recovered or an hourly wage.  Which ever you prefer?

In fact, I am thinking about putting together a team of people and form a bitcoin security firm that performs the following services:

1.) Investigates after the fact frauds involving bitcoin.
2.) Attempts to recover bitcoin that was obtained fraudulently and stop scammers from receiving product.
3.) Alert policing authorities and removal of the scammers support base. (ie. website, etc.)
4.) Investigates companies that offer their products for sale in bitcoin.
5.) Write a "Best Practices" white paper on how to not get scammed.
6.) Offer a searchable database of:
   a.) Known bitcoin scams and their associated IPs and domains and other relevant details.
   b.) "Un-verified" companies, involving bitcoin, that are asking for payment via bitcoin, wire transfer, western union and other forms of payment that are not reversable.
   c.) Known comanies that have achieved particular levels of trust in the bitcoin community:
      • Company is verified as legit via a pre-set of criteria that we will come up with.
      • Company has shipped a product and product works.
   d.) Allow the public to submit new companies for review and other relevant data to be verified.
   e.) Mobile and tablet app version of the databse.
7.) New scam alerts available via email, notification services & sms.


This is a really good start from user dree12:

https://bitcointalksearch.org/topic/list-of-major-bitcoin-heists-thefts-hacks-scams-and-losses-old-83794

Anybody else have some ideas for my new business?
sr. member
Activity: 434
Merit: 250
January 26, 2014, 02:07:14 PM

The cts website had https by comodo ca ltd

Edit: Actually, is it worth contacting comodo.com to see if they can reveal who paid for the https services on ctsminer.com website?

+1
I'm sure that would help with police investigations, please post the response here. (thread being monitored)

Also, yesterday the scammers had google pay per click ad showing up when cointerra was searched...google adwords has to have either a credit card or bank info from scammers in order to place the ads...then again the CC might be a stolen one. Never know, these scammers are not as sophisticated as people think, they are amateurs that left a paper trail.

There is always a slip up somewhere along the line. Hopefully you've hit the nail on the head.
sr. member
Activity: 447
Merit: 250
January 26, 2014, 02:06:16 PM
SCAM WEBSITE you are hosting.

Domain: ctsminer.com
IP: 199.188.201.252

http://domains-by-day.com/2014-01-24/ctsminer.com-domain-name-data.html
shows that ctsminer.com was originally associated with IP 185.8.106.66 (on another network)

THIS IS A KNOWN SCAMMER IP:
https://www.virustotal.com/en/ip-address/185.8.106.66/information/

Quote
So it is becoming obvious that you and your brother have been pumping up the sales for the fraudsters. Of course, now you and your brother have to find a way to disassociate from the fraud, so you come here and show that you found evidence which indicates they are fraudsters. But this evidence has already been presented, so you are not showing anything new. You are just throwing bullshit around in a desperate attempt to hide your participation in the fraud. You are certainly astronomically stupid to post the above information and pretend that was not uncovered before:

I agree, one thing that has been lost in their now brotherly avalanche of sleuth work, is that the brother yesterday posted an order claiming that he had paid for it and it later was posted that the order had not been paid for....something is wrong with that.

what is the explanation for this??
https://bitcointalksearch.org/topic/m.4744506

 Never replied, although lots of posts now about being scammed and sleuth work.


sr. member
Activity: 447
Merit: 250
January 26, 2014, 01:57:36 PM

The cts website had https by comodo ca ltd

Edit: Actually, is it worth contacting comodo.com to see if they can reveal who paid for the https services on ctsminer.com website?

+1
I'm sure that would help with police investigations, please post the response here. (thread being monitored)

Also, yesterday the scammers had google pay per click ad showing up when cointerra was searched...google adwords has to have either a credit card or bank info from scammers in order to place the ads...then again the CC might be a stolen one. Never know, these scammers are not as sophisticated as people think, they are amateurs that left a paper trail.
sr. member
Activity: 434
Merit: 250
January 26, 2014, 01:47:53 PM


oh so we have to believe that the scammer is in UK because the scammer said UK company. Really???. LOL...the FBI can get involved if US citizens were scammed...and the FBI also has a field office in Hawaii, and if the Antminers bought by the scammers are to be delivered to US than that is the ticket to one successful scam bust. Would be a great victory for bitcoin community.

+1

let's help bring these people to justice. It's the ethos behind bitcoin, we pull together and the network remains stable.
sr. member
Activity: 447
Merit: 250
January 26, 2014, 01:47:49 PM
full member
Activity: 168
Merit: 100
January 26, 2014, 01:47:01 PM
OMG,

http://domains-by-day.com/2014-01-24/ctsminer.com-domain-name-data.html

seems to have been removed.  It no longer shows ctsminer.com being on the IP, 185.8.106.66.  It now redirects to the their home page, at least from Hawaii.    Uhg!  I should have taken a screenshot.  Lets find another website that can check IP history of a domain. Looking now

Kind of fast don't you think? Guess the owner of CST can remove the site right away.
Or, the hosting provider takes fraud accusations seriously and disabled external access to the site while they investigate.
hero member
Activity: 854
Merit: 500
einc.io
January 26, 2014, 01:41:24 PM
This thread is the most interesting one I have ever follow on this forum.
hero member
Activity: 854
Merit: 500
einc.io
January 26, 2014, 01:39:58 PM
The crooks are erasing their traces.
I am sure there are forum members who can assemble traces back to their origin.
sr. member
Activity: 447
Merit: 250
January 26, 2014, 01:39:45 PM
lol, What now, Should we DDOS their site??

I think this is the point where the police should become involved.
I've already started writing the news article, so please keep me updated.

EDIT: ps: i like sitting in court watching scambags go down. - and THEY ALWAYS DO. Grin
Errr, What? This a matter to which a FBI agent should attend to, It will be impossible for a policeman to do this, Its their least priority if you ask me, I believe there is a cybercrime form on the FBI website. Check it out.

Don't be obnoxious,  try a little harder to be a pleasant person.
firstly, the company in question have indicated they are in the UK.
secondly, see firstly.

have a nice day, friend.

oh so we have to believe that the scammer is in UK because the scammer said UK company. Really???. LOL...the FBI can get involved if US citizens were scammed...and the FBI also has a field office in Hawaii, and if the Antminers bought by the scammers are to be delivered to US than that is the ticket to one successful scam bust. Would be a great victory for bitcoin community.
sr. member
Activity: 504
Merit: 250
January 26, 2014, 01:37:48 PM
Cross post, but Kncminers.com looks like a cloaked redirect using their reseller id (339) It is quite possible that KNCminer have the email address, or even postal address of the person who was assigned that ID.

They've not sold enough for a free Neptune anyway Cheesy

Edit: Quick look around for if that ID is used anywhere else online and found this: http://foorum.hinnavaatlus.ee/viewtopic.php?t=568902&postdays=0&postorder=asc&start=1550&sid=4f96074baf308ef97cde8610673f2b5d

Sorry, not got the foggiest what any of it says, but hopefully will give some clues.

Thats pupular Estonian computer tech Forums and the guy in that post is sayin he dont know if adverticing is allowed remove if not. +that link
sr. member
Activity: 434
Merit: 250
January 26, 2014, 01:36:43 PM
OMG,

http://domains-by-day.com/2014-01-24/ctsminer.com-domain-name-data.html

seems to have been removed.  It no longer shows ctsminer.com being on the IP, 185.8.106.66.  It now redirects to the their home page, at least from Hawaii.    Uhg!  I should have taken a screenshot.  Lets find another website that can check IP history of a domain. Looking now

Kind of fast don't you think? Guess the owner of CST can remove the site right away.

their facebook and twitter have been whipped down also.
sr. member
Activity: 447
Merit: 250
January 26, 2014, 01:34:43 PM
OMG,

http://domains-by-day.com/2014-01-24/ctsminer.com-domain-name-data.html

seems to have been removed.  It no longer shows ctsminer.com being on the IP, 185.8.106.66.  It now redirects to the their home page, at least from Hawaii.    Uhg!  I should have taken a screenshot.  Lets find another website that can check IP history of a domain. Looking now

Kind of fast don't you think? Guess the owner of CST can remove the site right away.
sr. member
Activity: 447
Merit: 250
January 26, 2014, 01:32:20 PM
Pages:
Jump to: