Multiple Accounts Including 6 Full Member Accounts, 4 Sr Member Accounts, 1 Hero Member Account Connected to Previously Exposed/Tagged Bounty CheaterFor Complete List of This Bounty Cheater's Accounts and Supporting added Flags on Accounts CLICK HERE Newly found Connected Accounts to each others and to the Previously Banned/Tagged Ones!1.
pacman7331 (Full Member)2.
redbunny (Newbie)3.
DUBYAO (Newbie) (Actively Participating in bounties) (Possible alt.)
4.
hirngespenst (Hacked/Bought account) (Full Member)5.
kickdapa (Hacked/Bought account, Actively enrolling in Bounties!) (Full Member)6.
novusordo (Red Trusted & User Not Active Since July 2019) (Sr. Member)7.
shakeelaijaz (User Not Active Since February 2019)8.
akonrupom (Banned)Connected Accounts to Previously Banned/Tagged Ones!1.
AshikurRahmanKhan16 (Banned)2.
rezveekhan (Banned) (Newbie)3.
pictsidhe (user banned for using multiple accounts, plagiarism, ban evasion) (Pretty strong guess of mine is that this was a bought account!)
4.
polyballz (user banned for using multiple accounts, plagiarism, ban evasion) (Pretty strong guess of mine is that this was another bought account just by looking at the post history!)
5.
Family2930(Red Trusted)6.
akashark(Red Trusted)7.
ashikerrez(Red Trusted)8.
iqbalrozi(Red Trusted)9.
sagufran (Red Trusted & User Not Active Since September 2019) (Newbie)10.
Ferris419 (Hacked/Bought Account, Red Trusted & Still active on the forum- participating in various bounties!) (Hero Member)11.
Kick (Hacked/Bought Account, Red Trusted & Still active on the forum- participating in various bounties!) (Member)References:Ferris419 Hero Member
Kick Member
sagufran Newbie
rezveekhan Newbie
banned bpipConclusion: Ferris419, Kick, sagufran, rezveekhan are controlled by one abuser that evades the ban.
Archived:
http://archive.is/yRawd#msg53224257Archived: http://archive.is/bKmkf#msg53229329Extraction:This guy has been
exposed as bounty cheaters/account buyer/hacker/scammer with a lots of
altaccounts and hacked account previously by
KTChampions and
YOSHIE. Some respectful members already talked a lot about this person in this
thread where Yoshie provided a couple of more altaccounts of Akashark/Ferris419.
Proof:Archived: http://archive.is/uuRht#msg53404912Archived: http://archive.is/6MBCMtelegram : @shakeelaijaz
twitter: @alizaijaz5
redit: kilaijaz
Archived: http://archive.is/OG6qr#msg51861951Telegram Username: @shakeelaijaz
Twitter Username: @alizaijaz5
Archived: http://archive.is/17dLP#msg49320647Now if we look at the post history of this user we can see a sudden change of his pattern. From a regular poster on Speculation from Economy board (Specially the topic "Wall Observer BTC/USD - Bitcoin price movement tracking & discussion"), Trading Sections to Altcoins and Bitcoin Discussion sections after June, 2018. Ironically the owner of this account changed the password of this account on 30th June 2018.
I'm working in China. I'm a US Citizen. I need to buy crypto.
Archived: http://archive.is/wip/xkr64But judging by this user's recent social media accounts it can be said that this user is not a US citizen which may lead one to think that this might be another bought account of this user.
Now we need to see what wallet address hacked account Kick used for bounties.
Username at Bitcoitnalk; Kick
ETH wallet address; 0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571
Archived: http://archive.is/SUVbz#msg53259777How about the
YouTube channel that already been exposed account
Akashark used for participating in various bounties?
Archived: http://archive.is/mcKAg#msg47662736Archived: http://archive.is/XhAD9#msg52189807Now if we take a look at the
pacman7331's history of participating in various
YouTube bounty campaigns then we see the same YouTube channel that he used for bounty with his previous accounts still is being used.
Archived: http://archive.is/oHv0x#msg53991681Video Archived: http://archive.is/nC5wKArchived: http://archive.is/Qd9Hs#msg53747793Video link 1's Archived: http://archive.is/wip/TNlBwNow if we click on the channel's name then we can go to its profile link which is
https://www.youtube.com/channel/UCvJVT8UkgS2v7LwE83bsurQConnection between previous accounts and the bought ones:Now we have to go back to one of the
Ethereum address this user used for his
pictsidhe and
akashark account.
Ledger ETH Address: 0x02D84A866f6Ad6F8DB78617e16DA76c401e59d37
Archived: https://archive.is/fVtx9#msg51457911Now we have to see whether
hirngespenst is connected to all of those accounts. It's a tricky one because the user probably
hacked/bought this account sometime in
May, 2018 for only one purpose which was to enroll in various Signature campaigns. We can see this account was registered in
2015, the original owner used to be a miner from Germany.Archived 1: https://archive.is/wip/0gn6UArchived 2: http://archive.is/wip/kRNgxArchived 3: http://archive.is/HqFz0After 2 months of sleeping this account woke up on 16th of May, 2018 and ironically on the same day current user changed the password and started posting on Altcoin section, Bitcoin Discussion. No more post in the
German section since then.!
ETH Address: 0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb
Archived: http://archive.is/QvVlI#msg46702520TX between 0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb and
0x820e459e9181d0d00a97df64c6b7fffb42ba3f13 for WPP tokens.
TX ID: https://etherscan.io/tx/0xec204b362fc1c3abafe7966d619a25b83a72d8bb936e2f23d6274b5b6debf811WPP Holder: https://etherscan.io/token/0x056dd20b01799e9c1952c7c9a5ff4409a6110085?a=0x820e459e9181d0d00a97df64c6b7fffb42ba3f13Now if we click on that
0x2b50a28e3d2df8b4f4287b716ea6b225fe1f4599 address then we find that 3 wallet addresses of this proven bounty cheater’s which are
0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571 (Used by
Kick) and
0x5b7371be93f4276c0d367d1675999dcf3e0f4272 (Used by
pictsidhe)) present in here.
From that tokens balance we see
0x820e459e9181d0d00a97df64c6b7fffb42ba3f13 and
0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571 account sent a lot of different tokens to
0x2b50a28e3d2df8b4f4287b716ea6b225fe1f4599 which I presume was being used for stacking up different bounty reward tokens that this user earned from various bounties.
Tokens Balance: https://etherscan.io/address/0x2b50a28e3d2df8b4f4287b716ea6b225fe1f4599#tokentxns0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb is connected with
0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1 which is the wallet address of user
novusordo.
Wallet address: 0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1.
Archived: http://archive.is/8OvFg#msg51905384This wallet was fueled by user
hirngespenst’s little
Ethereum and also
hirngespenst sent
PPT tokens to that wallet.
TX ID: https://etherscan.io/tx/0x8b383d2e3aa2506cb5707b27eb8e1abb8aaeb0bd075dd306e1f75c965a56f1abNow things getting interesting because we see this user with
a habit of buying hacked or old BTT accounts has another active bounty accounts which is surely a hacked or bought account. This user sent exactly the same amount of
PPT tokens to that
0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1 at the same time of our previous proof of that Transaction happened.
TX ID: https://etherscan.io/tx/0x350893daf93a6b9c26022cefefced2cb74f84e0ebc19d50e09f58615b75f0a0cThen after a few minutes he dumped or sent all the earning
PPT to another wallet.
TX ID: https://etherscan.io/tx/0x1cd7f46666fb242f7b8d64bc760eca2a3d3d9e20c9671602af50d4d046399609[/b]ETH Address: 0xaD62278702602e2D36f92B335BBFD942F4E61bE2
Archived: http://archive.is/kqgAw#msg46702967Now if we see the post history of
kickdapa,
we can see this guy was one of the active miners back in the days and then his account went to sleep in 2016 and woke up after 2 years in 2018, started posting a lot one liners, shitposts in alt-sections mainly.Now we can find out how much he has tried to bypass his
cheating way into different bounties using the
same Twitter account but changing the Twitter username from time to time!!!
Archived: https://archive.is/c7S94#msg51434864If we click on that
twitter profile we see the profile
does not exist!
But if we click
one of the tweet links from the quoted post then we see it
redirects to
https://twitter.com/pacman094 which is
already being used by a couple of other Bitcointalk accounts as shown in this thread!!!!
Archived https://twitter.com/somarahman94/status/1138583561915682816: https://archive.is/VFBzxNow if were to
judge where this guy is from after seeing the mentioned location he put in his twitter and LinkedIn bio
we could say this guy is neither an American nor a German but he owns which proved that the owners were from USA and Germany.Archived: https://archive.is/Jh9eQNow if we revisit to our proven cheater’s wallet
0x5b7371be93f4276c0d367d1675999dcf3e0f4272 then we can find out more connection with
Kickdapa’s wallet
0xad62278702602e2d36f92b335bbfd942f4e61be2.
TX ID: https://etherscan.io/tx/0x4925d6e2962cc1d31a723cc7f0c26c2a9ad0ad5e87c9647286d7766eb3eda898For More proofs: https://etherscan.io/tx/0xca95f700a84a4a98aac0d2011a64f9453b40ba2627e1d8f6b7c460ea3b6ebf1dNow to further prove that
Kickdapa is indeed the alt of this user we can see how he started stacking a couple of more ETC-20 tokens in
0xb6214F03087f2E25A8894F553da600132F6A31E5 wallet along with sending from
0x02D84A866f6Ad6F8DB78617e16DA76c401e59d37 which wallet he previously used for other accounts including
akashark.
Tokens TXs: https://etherscan.io/address/0xb6214f03087f2e25a8894f553da600132f6a31e5#tokentxnsIronically this account has so many connections to
0x5b7371be93f4276c0d367d1675999dcf3e0f4272 which was/is a proven wallet address of bounty cheater.
Again see: https://bitcointalksearch.org/topic/m.46666193This guy is already enrolling in different bounties using his alts. For one example we can see that he has enrolled in
BestChange signature campaign and social media campaigns.
Archived: https://archive.is/8xsay#msg53594818Archived: https://archive.is/j0Jib#msg53594281Signature Sheet: https://docs.google.com/spreadsheets/d/1S-Z93LYB6lQ9Rgn3ElcVvlo2xnXC-XGNE5rLQmiPr4g/edit#gid=0Social media Sheet: https://docs.google.com/spreadsheets/d/1r1O54dOYCooQOIfVO9oo3WYEzkmIwYqi5cQlJ4-TVJ4/edit#gid=0Merit Abuse:An inactive
Legendary member named
Jayjay04 suspiciously gave
pacman7331 a staggering 50 Merits for this post though the pictures he posted there are no longer available to see. 6k is bottom. Gonna just go out on a limb and say we won’t see sub 6k coins.
Some buy volume coming in.
Hit the edge of the descending wedge
Archived: https://archive.is/STbsi#msg40069338This user sent Merit from his known alt
Ferris419 to
Hirngespenst for bounty related very post.
Archived: https://archive.is/wip/FJ1IaAgain this user sent Merit from his known alt
Ferris419 to
Hirngespenst for bounty related very post.
Archived: https://archive.is/wip/2Zi1MNow, this guy is one of the most talented bounty cheaters/hackers on the forum because he has tried so hard to enroll in different bounties with his countless hacked/bought accounts. My guess would be that he has not probably missed any bounty since Fall, 2017! Now we can see he tries to clean his tracks by wiping out or deleting his bounty reports on the forum or every time one of his accounts gets banned/red trust, he changes his social sites credentials. But a little thing here and there and an hour of digging took me back to his already exposed account
iqbalrozi.
He used to enroll with https://www.linkedin.com/in/iqbalrozi account, after he got
red trusted with so many other bitcointalk accounts he since then deleted almost all the
LinkedIn reports from that
iqbalrozi BTT account and
then changed the username to https://www.linkedin.com/in/shohagkhan94 and
sometime it is https://www.linkedin.com/in/ashikkhan094. Neat trick if you ask me but can't hide anymore. If you click on
iqbalrozi's
LinkedIn and
pacman7331's
LinkedIn profile
shohagkhan94 you will see they redirect to the same
LinkedIn profile.Archived: http://archive.is/uuRht#msg53404912Archived: https://archive.is/oHv0x#msg53991681Spyce bounty sheet from March, 2020: https://docs.google.com/spreadsheets/d/1yk2hd1NrXsB1cz6gol5LMWZE700otHqR7i912okO228/edit#gid=1821524638Miscellaneous:Account buyers are not to be trusted. There are enough proofs in this post that indicates that this guy is using all of those active accounts currently which are connected to previously busted altaccounts of his. He has also broken the ban evasion rule so many times. It looks like whether DT members or reputable bounty managers tag him or not, this guy will again start using another hacked/bought account because he knows how to get those Bitcointalk accounts so easily and we can't do anything about it tbh. But I hope he will have his conscience back and work towards something good which can benefit the forum or him or the people around him.
Related Addresses:0xFCeE7547D17b09b99c1d825BC0e32efB711A9df4
0xA136DBdDAD3Bcf0499a13B1C181B45F0290A181f
0x5b7371bE93f4276c0d367D1675999dcf3E0F4272
0x23CB67CAA90cDF9EEB02ddB2231e436459359C32
0xE3eC04BA8EcE15c5A18227dd73E60eb7c27a9571
0x02D84A866f6Ad6F8DB78617e16DA76c401e59d37
0x0e7121D9a6FAE41326BEd1B4A5B08e19C93cacfb
0xaD62278702602e2D36f92B335BBFD942F4E61bE2
0x0ab9f6a3d5b46f3ec909d86015fbf4a8e6f843a3
0x4429128EdEe19eBaD7A8970De248319C9329dF4C
0x07D04c9b6933db16F83121C407B946d58B4643Cf
0x1C370485843364EB5aBB2f4e22de254b8c4B0DC1
BTC Wallets:
3P14PQ47zWyaNyUfTWqQYh7JnWZe2PtUL7
3NbmxihW2yqLxZ1Vg7voHn5QBYbNYi2oVC
Social Sites:
YouTube: https://www.youtube.com/channel/UCvJVT8UkgS2v7LwE83bsurQ
Facebook: https://www.facebook.com/Pacman094
Twitter: https://twitter.com/pacman094
Linkedin:
https://www.linkedin.com/in/shohagkhan94/
https://www.linkedin.com/in/iqbalrozi/
https://www.linkedin.com/in/ashikkhan094
https://www.linkedin.com/in/akashark94/
Telegram: @Pacpok94