Author

Topic: [BOUNTY & AIRDROP] ZPER -> KOREAN PROJECT, SUCCESSFUL PREASLE, 3 WEEKS ONLY! - page 202. (Read 103769 times)

newbie
Activity: 35
Merit: 0
Twitter Campaign
Twitter Profile : https://twitter.com/Crypto_love1
Spreadsheet no: 29

Week 1:  30.03 - 06.04
Retweet & Likes:
1. https://twitter.com/ZPER_team/status/978153095426224128
2.
3.
member
Activity: 1078
Merit: 10
Week 2 (06.04.18 - 12.04.18)   

Twitter URL: https://twitter.com/MikleSM
Followers: 3100

Like and retweet:
https://twitter.com/ZPER_team/status/982190279200403457                  
https://twitter.com/ZPER_team/status/982203498207952899                  
https://twitter.com/ZPER_team/status/982472644514668544                        
newbie
Activity: 84
Merit: 0
newbie
Activity: 168
Merit: 0
legendary
Activity: 868
Merit: 1000
There is a scammer impersonating me on line 128 of the signature campaign spreadsheet.

My original application is on line 23, with ethereum address as 0xf1F096e267c01D1bFddb6f8d714189a8Cd542674

This ethereum address can be verified on my bitcointalk profile.

Please remove the impersonator on line 128

Thanks!

It seems like line 127 - line 131 of the signature spreadsheet are duplicate entries, with different eth addresses. A scammer is impersonating bounty participants for an easy reward
newbie
Activity: 196
Merit: 0
Jump to: