Pages:
Author

Topic: [Bounty - 10 BTC] Help identify ANY address from the list (Read 6151 times)

legendary
Activity: 1862
Merit: 1114
WalletScrutiny.com
I'm curious to know later on, which witch-hunt we were taking part in here.
newbie
Activity: 26
Merit: 0

The WhoIs info for wm-center.com

Registrant:
 Maxim Borovikov
 Petukhova 24-32
 Novosibirsk, Novosibirsk 630088
 RU
 +79139186144
 
Domain Name: WM-CENTER.COM

Administrative Contact:
 Borovikov, Maxim
 Petukhova 24-32
 Novosibirsk, Novosibirsk 630088
 RU
 +79139186144
 
Technical Contact:
 Borovikov, Maxim
 Petukhova 24-32
 Novosibirsk, Novosibirsk 630088
 RU
 +79139186144
 
Record last updated 06-08-2012 10:22:19 AM
Record expires on 05-13-2018
Record created on 05-13-2005

The forum users Imagine and Kenuri have something to do with one of the addresses as well... both put money into them. This address, specifically: 1NoDPxUcXwTzYaxNjPjdRKGDicMAcEMn1T. There is also an Mt.Gox transaction associated with it (withdrawal) that you might be able to track down.
administrator
Activity: 5222
Merit: 13032
What were the ads for?
That should help us track down the identity.

http://wm-center.com
legendary
Activity: 1078
Merit: 1003
… and so the fungibility is gone. Hope we find a way to make investigations like this pointless for the majority of transactions.

Easy, there is several similar proposals, e.g. Automatic Coin Mixing Idea.
Yes, I knew that thread. It would be a great thing for hot wallets. Cold storage would not work that way though.

I don't see how this remove fungibility.. All anyone can ever do when searching the blockchain and following a certain amount of bitcoins is guess whether or not they remained in the same hands or not. I can't see how you can possibly prove beyond a shadow of a doubt that I own an address that I never publicly proclaimed I do.
legendary
Activity: 1862
Merit: 1114
WalletScrutiny.com
… and so the fungibility is gone. Hope we find a way to make investigations like this pointless for the majority of transactions.

Easy, there is several similar proposals, e.g. Automatic Coin Mixing Idea.
Yes, I knew that thread. It would be a great thing for hot wallets. Cold storage would not work that way though.
sr. member
Activity: 269
Merit: 250
… and so the fungibility is gone. Hope we find a way to make investigations like this pointless for the majority of transactions.

Easy, there is several similar proposals, e.g. Automatic Coin Mixing Idea.
legendary
Activity: 1862
Merit: 1114
WalletScrutiny.com
… and so the fungibility is gone. Hope we find a way to make investigations like this pointless for the majority of transactions.
newbie
Activity: 26
Merit: 0
Is there a tool out there that I could use to see if I am assosiated with any of the adresses, for like 5 tx's forward. I personally have about 20 adresses so the manual work amounts to too much. Also if such a tool would exist Im sure it would in the long run make life atleast slightly more difficult for random thieves, so if theres a programmer out there, consider making one pls.

I can look into it, probably wouldn't be too hard using blockchain.info's plaintext query API.
hero member
Activity: 910
Merit: 1000
Items flashing here available at btctrinkets.com
Is there a tool out there that I could use to see if I am assosiated with any of the adresses, for like 5 tx's forward. I personally have about 20 adresses so the manual work amounts to too much. Also if such a tool would exist Im sure it would in the long run make life atleast slightly more difficult for random thieves, so if theres a programmer out there, consider making one pls.
newbie
Activity: 26
Merit: 0
It would appear this person has a number of businesses.

And seeing as he paid theymos from one of those addresses, I'd say he's probably our guy.
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
I don't want to publish misinformation, therefore I only give a couple keywords to search this forum and elsewhere: Pavel and ecardone (see talkgold post).
legendary
Activity: 1918
Merit: 1570
Bitcoin: An Idea Worth Spending
http://www.enomcentral.com/whois/247exchange-biz.html

^ I ran across this earlier today, but played it no mind till now. Not sure if it helps.

Quote
Domain Name: 247EXCHANGE.BIZ
Domain ID: D46145980-BIZ
Sponsoring Registrar: DIRECTNIC, LTD.
Sponsoring Registrar IANA ID: 291
Registrar URL (registration services): www.directnic.com
Domain Status: clientTransferProhibited
Domain Status: clientUpdateProhibited
Registrant ID: DN-1583057
Registrant Name: Maxim Borovikov
Registrant Organization: Maxim Borovikov
Registrant Address1: Petukhova 24-32
Registrant City: Novosibirsk
Registrant State/Province: Novosibirsk
Registrant Postal Code: 630088
Registrant Country: Russian Federation
Registrant Country Code: RU
Registrant Phone Number: +7.9139186144
Registrant Email: 

Administrative Contact ID: DN-1583057
Administrative Contact Name: Maxim Borovikov
Administrative Contact Organization: Maxim Borovikov
Administrative Contact Address1: Petukhova 24-32
Administrative Contact City: Novosibirsk
Administrative Contact State/Province: Novosibirsk
Administrative Contact Postal Code: 630088
Administrative Contact Country: Russian Federation
Administrative Contact Country Code: RU
Administrative Contact Phone Number: +7.9139186144
Administrative Contact Email: 

Billing Contact ID: DN-1583057
Billing Contact Name: Maxim Borovikov
Billing Contact Organization: Maxim Borovikov
Billing Contact Address1: Petukhova 24-32
Billing Contact City: Novosibirsk
Billing Contact State/Province: Novosibirsk
Billing Contact Postal Code: 630088
Billing Contact Country: Russian Federation
Billing Contact Country Code: RU
Billing Contact Phone Number: +7.9139186144
Billing Contact Email: 

Technical Contact ID: DN-1583057
Technical Contact Name: Maxim Borovikov
Technical Contact Organization: Maxim Borovikov
Technical Contact Address1: Petukhova 24-32
Technical Contact City: Novosibirsk
Technical Contact State/Province: Novosibirsk
Technical Contact Postal Code: 630088
Technical Contact Country: Russian Federation
Technical Contact Country Code: RU
Technical Contact Phone Number: +7.9139186144
Technical Contact Email: 

Name Server: NS1.PLANET-WM.COM
Name Server: NS2.PLANET-WM.COM
Created by Registrar: DIRECTNIC, LTD.
Last Updated by Registrar: DIRECTNIC, LTD.
Domain Registration Date: Wed Jul 27 01:55:29 GMT 2011
Domain Expiration Date: Tue Jul 26 23:59:59 GMT 2016
Domain Last Updated Date: Fri Apr 13 03:23:35 GMT 2012

~Bruno K~
newbie
Activity: 26
Merit: 0
The WhoIs info for wm-center.com

Registrant:
 Maxim Borovikov
 Petukhova 24-32
 Novosibirsk, Novosibirsk 630088
 RU
 +79139186144
 
Domain Name: WM-CENTER.COM

Administrative Contact:
 Borovikov, Maxim
 Petukhova 24-32
 Novosibirsk, Novosibirsk 630088
 RU
 +79139186144
 
Technical Contact:
 Borovikov, Maxim
 Petukhova 24-32
 Novosibirsk, Novosibirsk 630088
 RU
 +79139186144
 
Record last updated 06-08-2012 10:22:19 AM
Record expires on 05-13-2018
Record created on 05-13-2005

The forum users Imagine and Kenuri have something to do with one of the addresses as well... both put money into them. This address, specifically: 1NoDPxUcXwTzYaxNjPjdRKGDicMAcEMn1T. There is also an Mt.Gox transaction associated with it (withdrawal) that you might be able to track down.
vip
Activity: 1052
Merit: 1155
16X2xjFaE4RA8kt85sb4ebVL12EggyxFw4 belongs to wm-center.com. He used it to purchase forum ads.

What were the ads for?
That should help us track down the identity.
administrator
Activity: 5222
Merit: 13032
16X2xjFaE4RA8kt85sb4ebVL12EggyxFw4 belongs to wm-center.com. He used it to purchase forum ads.
legendary
Activity: 1002
Merit: 1000
Bitcoin
My guess, BTC stolen and sent to those adress, OP want to find the theif !

I've been stolen too, 126.5 BTC, long long time ago, stolen BTC where sent to 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7
not in any list or linked list in this thread Sad

According to ArtFortz, 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7 belongs to Slush's pool.

Quote
Ours is correct.  Check every link on our blocks page if you want, they're all correct.

114974     OverlordQ     03-25-2011 10:55:45     --  02h 06m 25s     Confirmed
http://bitcoinpool.com/block.php?block=114974 ->
http://blockexplorer.com/b/114974 ->
http://blockexplorer.com/block/000000000000da97d2ba7ddb5d3c9b48980b92bb12f3926bb0382615853fbaca
containing generation http://blockexplorer.com/tx/0db08f91bef092708054d340e698986cdac83dbeaaee91f8fe7b94b6b6dcd285
which was sent to SLUSHS pool main addr 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7 in tx http://blockexplorer.com/tx/67e8af21b9759571a95b2f73926ccdb59d5fd625acddeb20533c52429efd243e


I had a very week password, and the theif logued to my account, uncheck warn me by mail, change adress, withdraw, and set stuff back to normal, It took me a while before noticing, as in those good old days, we where mining tons of bitcoins !!!  

When I noticed, I have spoken with Slush on IRC, he said that he could'nt help, I assumed that's was my fault and did'nt make much a case of that !  
But... Huh  
This mean 2 possibility,
1 - I've been wrong taking note of the adress and noted mine, or
2 - Stolen funds from my Slush pool account where sent to another Slush pool account ?  Is/was it possible ?

Interesting..

EDIT : I was wrong : Stolen funds have been sent to : 18nxWEvkNjqXdNBHYrXsQ8McHm689xsMyn

I'll edit my post
legendary
Activity: 1288
Merit: 1227
Away on an extended break
My guess, BTC stolen and sent to those adress, OP want to find the theif !

I've been stolen too, 126.5 BTC, long long time ago, stolen BTC where sent to 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7
not in any list or linked list in this thread Sad

According to ArtFortz, 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7 belongs to Slush's pool.

Quote
Ours is correct.  Check every link on our blocks page if you want, they're all correct.

114974     OverlordQ     03-25-2011 10:55:45     --  02h 06m 25s     Confirmed
http://bitcoinpool.com/block.php?block=114974 ->
http://blockexplorer.com/b/114974 ->
http://blockexplorer.com/block/000000000000da97d2ba7ddb5d3c9b48980b92bb12f3926bb0382615853fbaca
containing generation http://blockexplorer.com/tx/0db08f91bef092708054d340e698986cdac83dbeaaee91f8fe7b94b6b6dcd285
which was sent to SLUSHS pool main addr 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7 in tx http://blockexplorer.com/tx/67e8af21b9759571a95b2f73926ccdb59d5fd625acddeb20533c52429efd243e

legendary
Activity: 1002
Merit: 1000
Bitcoin
My guess, BTC stolen and sent to those adress, OP want to find the theif !

I've been stolen too, 126.5 BTC, long long time ago, stolen BTC where sent to 1PJnjo4n2Rt5jWTUrCRr4inK2XmFPXqFC7 18nxWEvkNjqXdNBHYrXsQ8McHm689xsMyn
not in any list or linked list in this thread Sad
hero member
Activity: 910
Merit: 1005
I made a quick tool to try and help with this: results

The page shows transactions which have tags belonging to known users. These users *might* be able to provide more information on the target addresses. Unfortunately there are no directly linked addresses, only transactions one hop away from the final addresses (i.e. there is one transaction in-between).

Received Transactions

bitcointalk user kenuri (https://bitcointalksearch.org/user/kenuri-67634) sent 50 BTC to 1N9Dxt66RoxW8CoMb58Kw18GZjiqUM2rYB which was then sent to 1NoDPxUcXwTzYaxNjPjdRKGDicMAcEMn1T (a target address) (http://blockchain.info/tx/ef91b598dda18119963b0e97c5cc9dea600e51c3c4faa17a5a3484b9ac55305f)

bitcointalk user li_gangyi (https://bitcointalksearch.org/user/ligangyi-34062) sent 7 BTC to 1CERGTScYAs4q6oK6U7QRRy5EB2gbB5hpT which was then sent to 1NoDPxUcXwTzYaxNjPjdRKGDicMAcEMn1T (a target address) (http://blockchain.info/tx/9a2cd434972227dbe7192102d3fbcc99e05ed83178cd3d1785ab1cb847d44b52)

0.01 BTC was sent to blockchain.info in this transaction (http://blockchain.info/tx/70add1fe625d665790d28995d928e1733d83904afb2c2c5a4e548b965d8b2d96) part of which was then sent to 1A66TFRPWrFay45LHJmJMebWPKBcd7EhoW (a target address). Probably from the days when My Wallet had a 0.01 BTC tx fee, we don't keep logs anyway.

Sent Transactions

16X2xjFaE4RA8kt85sb4ebVL12EggyxFw4 (a target address) sent 4 BTC to 18ahbMZVmyT6yM6AkiXS5dS9hRH7uD18kb which was then sent to the Bitcointalk donation address (http://blockchain.info/tx/d310b2fd0322b8838bdb1a41254605b7bc16f242fa7de7ab22650ae4cbc6dedf). There are some more occurrences of the bitcointalk donation address and an address tagged to Theymos.

A Few sent transactions can be linked to "Pirate Booty" which is either a pirate address or silk road, a dead end either way. Several Transactions were also sent to Instawallet's old green address.

1A66TFRPWrFay45LHJmJMebWPKBcd7EhoW (a target address) sent 3,000 BTC to 167DeVgSudKYF3fvKiQ7UEQsU9bfgcEfSC which then sent 112 BTC to the bitcointalk user "nyana" (http://blockchain.info/tx/cd3923aeed0b74b32468b03b0ccf1bd3cea942ec4dc02e3efaccd74462f39d56)

1A66TFRPWrFay45LHJmJMebWPKBcd7EhoW (a target address) sent 600 BTC to 19HM68K6z4PNDacVSQ4gJPqmXRh1s6gUkM which was then sent to Mt.Gox in this transaction (http://blockchain.info/tx/68ea1b0d326e873c6c7dd5740268948c8936f6bce10ead7a7629b83d961c9ab7). This might be your best bet, try and contact Mt.Gox for information on that transaction.

Hope this was some help, although the results maybe fruitless.
Pages:
Jump to: