Pages:
Author

Topic: Kakatua Bounty Manager With His 41 Altaccounts! - page 3. (Read 2151 times)

legendary
Activity: 2338
Merit: 1041
Smart is not enough, there must be skills
I had guessed that this kid had cheated in a number of bounties that he participated in. Normally the bounties managed by this boy would also be cheated by himself.
hero member
Activity: 1974
Merit: 756
To boldly go where no rabbit has gone before...
Damn man, you should work in a PI office or something.
Good work. Meriting this
full member
Activity: 1078
Merit: 210
★Bitvest.io★ Play Plinko or Invest!
Great job invincible49  can't imagine how long it took to make this detailed report .   Added neg feedback to kakatua + supported the flag.
hero member
Activity: 2002
Merit: 578
That's a lot of work, kudos to the OP. Supported Lauda's flag. The guy has been doing shady businesses lately wouldn't be surprised if this has been happening ever since.

To kakatua you have to be stricter to participants you're managing and why do you still post the rules when you can't even implement it on the first place, that's fucking absurd brain as well.
legendary
Activity: 2674
Merit: 2965
Terminated.
sr. member
Activity: 1288
Merit: 415
Number one:It is common that, there are many scammer use someone account for collecting some reward from high volume project. Can't blame me for that.

But it's not that common to collect those rewards from so called "high volume project" just by some common accounts which are mostly not legimate or worthy enough and yet probably get accpeted in your campaigns most of the times, later gather all those rewards up to the address destinations of users connected to you again. It's really not that common.

Number two : cryptofarid10 he/she is a bounty hunter so, He/she can work at my campaign, It's not something unusual. It would be my fault if a bounty hunter would join my bounty. it's can't think Your fucking  brain Grin

Your fucking brain doesn't understand even after many reviews, that the user cryptofarid10 is just a shill bounty hunter with no real skills and using others work as his own portfolio. It's not your fault anyways, how could one think his own alt as dump though.

Number Three :
How do you get a private message from someone? And what evidence from this message is that  cryptofarid10 is my account? Someone's private message cannot go to you. In that case it proves that.  Someone opened an account in my name and created such a conversation. Otherwise,   You have opened an account in my name and make this conversation. To enhance your post's information and get some fucking merit... Huh

The evidence is cryptofarid10 agreed that he was happy with the merit received from LoyceV long back and even you were happy with the same thing, which now you claim never happened with you.

And yaa, the conversation on telegram could be verified by someone trusted here for sure, but I wouldn't hesitate to go with the OP as it already has too much of evidence to prove.
copper member
Activity: 59
Merit: 1
Number one:It is common that, there are many scammer use someone account for collecting some reward from high volume project. Can't blame me for that.
Number two : cryptofarid10 he/she is a bounty hunter so, He/she can work at my campaign, It's not something unusual. It would be my fault if a bounty hunter would join my bounty. it's can't think Your fucking  brain Grin
Number Three :


How do you get a private message from someone? And what evidence from this message is that  cryptofarid10 is my account? Someone's private message cannot go to you. In that case it proves that.  Someone opened an account in my name and created such a conversation. Otherwise,   You have opened an account in my name and make this conversation. To enhance your post's information and get some fucking merit... Huh
sr. member
Activity: 565
Merit: 268
Remember who u are, what u are & who you represent
41 Accounts connected including Kakatua bounty manager's

Update:
Unfortunately, there are more alts of this user which have been found and reported in here: https://bitcointalksearch.org/topic/m.54075994

For Complete List of This Scammer's Accounts and Supporting added Flags on Accounts CLICK HERE

Lauda has created a flag against kakatua based on the findings mentioned in this thread: https://bitcointalk.org/index.php?action=trust;flag=1474

There has been some talks about the bounty manager Kakatua among the bounty hunters communities after experiencing his very low quality bounty projects in recent times and then he has been tagged by some trusted members on the forum.
References:
1. https://bitcointalksearch.org/topic/agrichainx-plagiarized-whitepaper-5229914
2. https://bitcointalksearch.org/topic/m.53956003
3. https://bitcointalksearch.org/topic/fake-bounty-manager-5230005

Now I noticed the guy behind the account has Farid/Jahid/Alex/ in his username and then started to dig deep. Now please bear with me before I  get into details about the Kakatua guy.

Before that let's find out some Bitcointalk accounts which can be later proven as connected  


1. cryptofarid10 2. ALEX JAHID 3. jljahid1020 4. saddam83 5. Adegokemufu 6. Jentamicing 7. Miosekogba 8.
Miztasnow 9. rashedul74064 10. alamin173020 11. saju8090 12. Motin9 13. fannyaslam9 14. alex@ismail 15. ismail2270 16. ArickAslam0
17. JSRJ4 18. kakatua






Let's first look into Clickgem bounty campaign by Kakatua. We can see the requirement for the Twitter campaign is at least to have 500 minimum followers but Cryptofarid10's twitter used for this campaign had/has less than 30 followers.


500 - 1500 Followers : 1 Stakes per Week
1501 - 3000 Followers : 2 Stakes per Week
3001 - 5000 Followers : 4 Stakes per Week
5000+ Followers : 6 Stakes per Week

http://archive.is/wip/SyXPu

Twitter used: https://twitter.com/wahidyousofzy
Even though he submitted another twitter for the authentication post and still with less than 10x of the minimum required followers he got approved by Kakatua and this is very odd to find out that only 7 twitter participants were accepted out of 1818 applicants as shown in the spreadsheet !  

Proof of authentication
- Campaigns applied for: Facebook, Twitter, LinkedI,   Telegram, Signature
- Telegram link: https://t.me/alexhasanjahid
- Facebook link: https://www.facebook.com/cryptofarid10
- Twitter link : https://www.twitter.com/lima9882
http://archive.is/mestZ

Ethereum Address used: 0x086d85d1AEBc7dd3B26493F267B0f8e01bC9de4b

Spreadsheet for reference: https://docs.google.com/spreadsheets/d/1RLrinqIunUoXTQJXjUxqQRVjtS8jpzpuHrvsrk7WuNQ/edit#gid=1353884078
 



Now the next one is very serious cheating attempt by Kakatua, the Fred Energy bounty manager (http://archive.is/wip/2E5oY) where cryptofarid10 submitted other people's work as his own Translation works, and mentioned Hindi as his Language but he is most definitely a Bangladeshi guy whose native language is Bengali.



This cheater posted the User welovedcrypto work using that person's portfolio link which is https://docs.google.com/spreadsheets/d/108kbGPMovqothYU8tv0ZTWrJ1VvQdO7E4vRFJhtuoqU/edit

And Kakatua still accepted him in the campaign and gave him full stakes for the Translation job! The Ethereum address used for this bounty was 0x7f9b9dfe29c1d7ec426567c116e021b419b19788



 
Spreadsheet for reference: https://docs.google.com/spreadsheets/d/1YStMlJIrEtSXmJBwrOGftgNa47yuFNuPsk5o6-ueaC8/edit?usp=sharing

The mentioned wallet address 0x7f9b9dfe29c1d7ec426567c116e021b419b19788 is connected to the user named Alex Jahid.



http://archive.vn/fUXtD#msg43127314

Alex Jahid's Ethereum address: 0xab8b6803e61c82a773582cb45d313fd903562958

We can find out the transaction between Alex Jahid and Cryptofarid10's wallets.


TX ID: https://etherscan.io/tx/0x4a8c00e7bcdf14b4e3ed5977bad3d1e3fb4130fd06374cedc42d4d318cae77eb

Ironically Cryptofarid10's telegram ID used to be https://t.me/alexhasanjahid.  So we can see the common words like Alex and Jahid in both of those connected accounts.

I need a good trader from Brazil country people only...I give him salary 100$ perday.  If anyone here massage me telegram : https://t.me/alexhasanjahid

Archived: http://archive.vn/wip/4ysab

We can find out the user jljahid1020 used the same Ethereum address for a MB8Coin bounty.

jljahid1020's Ethereum address: 0xab8b6803e61c82a773582cb45d313fd903562958



Ether Wallet: 0xab8B6803E61c82a773582CB45d313FD903562958


Archived: http://archive.vn/N8PAl#msg40142603


This scum in here wrote that he was a native Arabic Speaker who's also fluent in Hindi and Bengali!!?  Huh He posted others works as his own in the MB8Coin bounty thread.

Reserve Arabic translation
I am a professional English to Arabic ICOs translator
- Native language: Arabic language

- Translation previous experience :
https://drive.google.com/drive/folders/1g-pbQPHonbNrdMc21mzTCbxV7_m4hXzd?usp=sharing
.
.
.
.
.

Email: [email protected]
- I have excellent English to Arabic translation experience and vice versa as I write and/or translate articles in both
- I am a surgeon so, I had more than 24 years of learning totally in English
- Bitcointalk username: jljahid1020
- Bitcointalk profile URL: https://bitcointalksearch.org/user/jljahid1020-1484489
- Twitter username: @jahid349203
- Twitter profile link: https://twitter.com/Jahid349203?s=09
- Twitter audit score link: https://www.twitteraudit.com/Jahid349203
- Facebook profile URL: https://www.facebook.com/profile.php?id=100013518917321
- Youtube profile: https://www.youtube.com/channel/UCPCl2kSE3tLgSKRMgrA6j3A
- My Telegram account link: https://t.me/jahid349203
- ERC20 wallet address: 0xab8B6803E61c82a773582CB45d313FD903562958

- Bitcoin wallet : 1FWvXTTHxMrwFRXzsiFaX2rsB3d1hSs5c9


Archived: http://archive.vn/wip/SvqTi



http://archive.vn/T4i63

Now just after a couple of days of acting as a fluent Arabic, Hindi translator, this filth applied as Filipino translator! Like WTF!!!!

Native language: Filipino
Part of bounty you apply for (ANN/Telegram): ANN
Translation/moderation experience (if any):
.
.
.

Bitcointalk username: jljahid1020
ERC-20 wallet address: 0xab8B6803E61c82a773582CB45d313FD903562958


Archived: http://archive.vn/wip/7Ln3H

His posts in the Bengali thread proves that he is in fact with only one native language which is Bengali.
 
এটা বাঙালি থ্রেড এখানে সবাই বাংলায় কথা বলতে পারেন। বিটকয়েন টক একটি ফরম সাইট এটা বিটকয়েন ডিস্কাসনের যায়গা। আমি মনে করি এখানে যারা কাজ করে তাদের মদ্দে বিটকয়েন সম্পর্কে জ্ঞান আছে, যাদের মদ্দে এটির সম্পর্কে বেশি জ্ঞান আছে তারা অন্যদের সাহায্য করুন। এটা  ফেসবুক, টুইটারের মোত কোনো সামাজিক মিডিয়া নয় যে এখানে, হাই, হেলো, কেমন আছো, কি করো, শুভ সকাল, শুভ রাত্রি, লিখবে, এইগুলা লিখলে তাকে রিপোর্ট দেওয়া হবে।তাই কেও এখানে কোনো অমুলক কথা লিখবেন না।

Archived: http://archive.is/dpTY9

jljahid1020 is Connected to saddam83

Bitcointalk Username: Saddam83
Your Twitter Account Link: https://twitter.com/BitcoinMaster9?s=09,
Bitcointalk profile link: https://bitcointalk.org/index.php?action=profile;threads;u=1789235;sa=showPosts,
ETH Address : 0x8735Df8be03b3E454028F7375e7a4e5eDC478612


Archived: http://archive.vn/xCrck#msg41209725

We can see from the wallet's TX history that it's connected to jljahid1020's wallet.
saddam83's Ethereum address: 0x8735Df8be03b3E454028F7375e7a4e5eDC478612

TX ID: https://etherscan.io/tx/0xc5a7fa06f3c2353603d69523d5f3b8e7c7214c0a2d14f133e57f5b6575ef2479




Now this saddam83 account is directly connected with our Scammer Hero Cryptofarid10/Kakatua which can be proven from the following transaction of Equitybase (BASE) token and proof of authentication posts by Cryptofarid10.

#Prof
Twitter profile: https://twitter.com/cryptofarid10?s=09
Telegram username: @cryptofarid10
ETH address: 0x66cb2fbb2809d42cc84077914db8d05a66c0f78e


Archived: http://archive.vn/AST12#msg43858760



TX ID: https://etherscan.io/tx/0x775878038972f057324af265cb0010e069cd98438392c189af668e02beb7d049



Now again Cryptofarid10 is connected to another account Adegokemufu.
Ethereum Address used: 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0

 


Archived: http://archive.vn/wip/Nr1yH



TX ID: https://etherscan.io/tx/0x6b3757ca787476b699e61c489ea0b397f47fbd8c95c9fc092339cfce329aef31


Now Adegokemufu is conncected with Jentamicing because both used same Eth address for bounties!

I passed kyc and I've not yet recieve my token.
My email : [email protected]
Wallet ; 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0


Archived: http://archive.vn/wip/8AgRt

Jentamicing is connected to another account named Miosekogba which shows the same wallet address was being used!

Week 8
Facebook campaign
facebook link : https://m.facebook.com/funmilola.ajayi.deborah
Number of friends :5000
Facebook username : Funmilola Deborah ajayi
Eth address : 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0



User Miztasnow also used the same Ethereum address for different bounties.

#proof of ownership
Telegram username : miztasnow
Twitter username :@iamhenny1
Wallet : 0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0


The user rashedul74064 with eth address 0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E is connected to user
alamin173020 with eth address 0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018.




TX ID: https://etherscan.io/tx/0x0b8aadd949406263198809ba6d2adc0fb9586a111845a469979f7ef5271d06a6


★Proof of authentication post *
BTT user name : alamin173020
Telegram username : @btctaker
ETH address : 0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018

Archived: http://archive.vn/wip/yHV3v


This user rashedul74064 sent to his altaccount saju8090 a little gas fee for withdrawing StiB tokens that he received from StiB bounty campaign. In the spreadsheet of this bounty we can see in the download campaign User Saju8090, spreadsheet number 162 used 0xe40e76b981e40de1ac4044c479e1e34a695a00c2 address which is connected to rashedul74064’s eth address 0x5ac09f199b321ca92310148901ae3b0ce6622b0e.


Now the user rashedul74064 also participated in the StiB campaign.


Reference: https://docs.google.com/spreadsheets/d/1GFC0KJ5woVzPvRZK4IkIQh7vPjpvK0VYVUtwQh4vVOk/edit#gid=0



TX ID: https://etherscan.io/tx/0x97d6654aff0133dc712dc98351939e32c55b6696cd63fae3a7a1a8608f1f7a88

Now rashedul74064 is the altaccount of Motin9.
Ethereum Address: 0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5


##Join&PROOF OF AUTHENTICATION##
Bitcointalk Username: motin9
Mail: [email protected]
bitcointalk profile link: https://bitcointalksearch.org/user/motin9-2367176
Facebook URL: https://www.facebook.com/nusratjahan.sumi.7140
Linkedin: https://www.linkedin.com/in/moom-tuch-39a609184
Twitter url: https://twitter.com/AslamArick?s=09
Telegram Username : @onyka73
Ethereum Wallet Address : 0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5



Archived: http://archive.vn/a4Dgf#msg51322769


Now Motin9 is the same user named fannyaslam9 with same same wallet address address.

Twitter profile link: https://twitter.com/ArickAslam?s=096
Telegram usear name:@cryptolover73
bitcoin profile link: https://bitcointalksearch.org/user/fannyaslam9-2150901;sa=account

my ether address : 0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5


Archived: http://archive.vn/m9mwA#msg41392755


Now it’s already proven by YOSHIE that this Motin9 has several accounts on this forum. I wonder why it has not been tagged already!


Accounts Connected:

2. Motin9
3. MOOMTUCH
4. fannyaslam9


Now we can again trace back alamin173020 connection to the user rashedul74064 by tracking the wallets transaction.



TX ID: https://etherscan.io/tx/0x0b8aadd949406263198809ba6d2adc0fb9586a111845a469979f7ef5271d06a6

We can again see the use of ALEX in another connected account!



Archived: http://archive.vn/OLl6r#msg48410002

Now my mind is really starting to feel crazy with all of those connected accounts and then I find out that user rashedul74064 connected
to
another account alex@ismail.



TX ID: https://etherscan.io/tx/0xbf74d076d325adc4b00dc115028bbb95f08bdfe17cc65ccbf79f0c08b3139ac1

Ethereum Wallet Address:     0xD16fC5fC14F6f629f07441ece92f7C264c9be70a



Archived: http://archive.vn/0jwBR#msg52287231

This time we can discover that alex@ismail is from the same person who is behind BTT account ismail2270 using same Ethereum address for various bounties


Bitcointalk Username: ismail2270
Bitcointalk Profile Link:
https://bitcointalksearch.org/user/ismail2270-2254584
Facebook Profile Link:
https://www.facebook.com/mdkhorshed.alommamun
Number of Facebook Friends: 1600
Your ERC20 Ethereum Address: 0xD16fC5fC14F6f629f07441ece92f7C264c9be70a


Archived: http://archive.vn/157yT#msg43058032


Now let us go back to our Hero ALEX JAHID with Ethereum address 0xab8B6803E61c82a773582CB45d313FD903562958 and as we have already found out rashedul74064’s eth address which is 0x5ac09f199b321ca92310148901ae3b0ce6622b0e connected to each other.

Archived: http://archive.vn/jXQyj#msg42783206



TX ID: https://etherscan.io/tx/0xbf9653aa0d8695da5d88600f5118ef3d06a37ce069dc4dfb464a1a36b31457ea


Special mention for this wallet 0x510088496ebd87ef4783ea3175d1ee88cd121a8d which has been used by user Motin9 and another newly found altaccount of the same user named ArickAslam0 .

Bitcointalk Username: ArickAslam0
Email: [email protected]
bitcointalk profile link: https://bitcointalksearch.org/user/arickaslam0-2583700
Facebook URL: https://m.facebook.com/fanny.aslam.50
Twitter url: https://twitter.com/arick0?s=09
Reddit: https://www.reddit.com/u/Moomtuch?utm_medium=android_app&utm_source=share
Telegram Username : @onyka7
Ethereum Wallet Address : 0x510088496ebd87ef4783ea3175d1ee88cd121a8d


Archived: http://archive.vn/AMUw2#msg50834911

Bitcointalk Username: motin9
bitcointalk profile link: https://bitcointalksearch.org/user/motin9-2367176
Facebook URL: https://m.facebook.com/bountyking28
Twitter url: https://twitter.com/MOOMTUCH?s=09
Telegram Username : @bountyking7
Linkin: https://www.linkedin.com/in/moom-tuch-39a609184
Ethereum Wallet Address : 0x510088496ebd87ef4783ea3175d1ee88cd121a8d



Archived: http://archive.vn/lSViY#msg51406763

Now here we can see- all of those Bitcointalk accounts are connected to each other, have connected wallets and all of this can be traced back to cryptofarid10.

Now we can see this user loves the name ALEX so much that he has used it in many places for the creation of various username and another giveaway by him is the over use of both ALEX and JAHID on so many occasions.

Proof of authentication
- Telegram link: https://t.me/alexhasanjahid
 

Archived: http://archive.vn/wip/VrMte

Now if we go deep into the Cryptofarid10’s eth transaction details then we can find out that his wallet received some eth from 0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa.




TX ID: https://etherscan.io/tx/0x919b19308a81403b3f3d46a09264d60b204bb5f1bd13c8fd035243faf5f7f487
 
Now we find that the wallet address 0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa is actually connected to Motin9.



TX ID: https://etherscan.io/tx/0x1edc976f20e634bb23962ba3aeb96fcd84d4eb44bec3afb6eea31099f8da289d

 
I can provide more transactions between those two wallets like the following ones:
1. https://etherscan.io/tx/0x17df6d509e6e434762c2bb8255de691c52ea0a979238c992ab41baa384b799ec
2. https://etherscan.io/tx/0x79aa6972338fdfecbf50d7596843f5aa3cc17232a3fa5bba5a57882f28e1d71e
3. https://etherscan.io/tx/0xe6b488d76065fba689d2dddd84ceb1a6c51b7984651cda2bc6f38676e730626d
4. https://etherscan.io/tx/0x86896990276eae55d6205a4b957a57d477b93caa1ce9eae65342861e5b0c6117
5. https://etherscan.io/tx/0x77df08ef324563e2c4b386495f3831dbf37f36ed7945e7f75ceff28c0a09b6ef

This CryptoFarid10 guy even dared to cheat in one of Yahoo62278’s campaign called StiB with another newly found altaccount (oh man I am getting tired now!)
JSRJ4.



We can find out that he sent StiB tokens from his 0x7f9b9dfe29c1d7ec426567c116e021b419b19788 wallet to this wallet 0x335FB382b5A151b55E09bFAC9f20D5F2937D272E which he used for staking up all of his rewards from StiB campaigns.



TX ID: https://etherscan.io/tx/0x7e925249bde6f3a87d1dcb6287381e11231e76518dab3403f6ac819ca86232a4

 
We can see that another wallet which he used for cheating in Yahoo62278’s campaign is 0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a and he sent 9600 StiB to the 0x335FB382b5A151b55E09bFAC9f20D5F2937D272E wallet.



TX ID: https://etherscan.io/tx/0x57696e47680ca6b5b0df98d33a2886b4cc96c7008cd003fd3a3e497bfa6feea5

For Reference: https://docs.google.com/spreadsheets/d/1GFC0KJ5woVzPvRZK4IkIQh7vPjpvK0VYVUtwQh4vVOk/edit#gid=0

Now as I have previously mentioned how much this cheating scum loves the name ALEX and JAHID that he has used one or both names in almost all of his altaccounts.

We can quote his post from JSRJ4 for further proof!

WEEK#15 (26/06-02/07)
Facebook campaign
Facebook Link: https://mobile.facebook.com/alexhasanjahid

Twitter campaign
Twitter Link: https://www.twitter.com/alex_jahid
#Tweets:
1. https://twitter.com/alex_jahid/status/1132128826404855808?s=19




Now let’s see if we can prove that the Kakatua guy is indeed the owner of all of those accounts! I remember there was a guy with username @cryptofarid begged me for Merit on Telegram back in October, 2018 and then I saw the Kakatua bounty manager had almost identical pattern of using alex as username when he first launched his bounty management group and then I PM’d him on telegram. I remembered Cryptofarid10 was so happy in late 2018 when he got merit for a merit worthy post in Bengali local board from LoyceV. I dm'd this Kakatua guy on telegram and I called out him as Farid and then he acknowledged to that, confessed to me that he is the the owner of Cryptofarid10 account which we can see now is connected to so many other Bitcointalk accounts.
The following screenshot is the conversation between me and him in Bengali language.    



Here he is admitting that he was very happy when LoyceV gave him merit and the main reason for his happiness was that he was a newbie.


সকল bitcointalk ইউজারদের  উদ্দেশ্যে বলছি।
জুনিয়র মেম্বার হতে ১ টি মেরিট সিস্টেম করার পর থেকে মেরিটেড করার পরিমান বেড়েছে। কেও হয়তো ১ টি মেরিট কিনে জুনিয়র হচ্ছে। কেও হয়তো কারো সাথে চুক্তি করে মেরিট নিয়ে জুনিয়র হচ্ছে, আবার কেও হয়তো তার অন্য কোনো বড় অ্যাকাউন্ট থেকে নতুন অ্যাকাউন্ট করে সেখানে মেরিট নিয়ে পজিশন আপ করে রাখছে। আমি আপনাদের ভালোর জন্য বলছি এইসব বন্ধ করেন যদি আপনার অ্যাকাউন্ট রক্ষা করতে চান। কারন ইতিমধ্যে ইনভেস্টিগেশন শুরু হয়ে গেছে। প্রতিটা অ্যাকাউন্ট এর ইনভেস্টিগেশন করতেছে। মেরিট সোর্স ও লেজেন্ডারি মেম্বার LoyceV ও আরও কিছু ক্ষমতাশালী লেজেন্ডারী মেম্বার ও মডারেটর। LoyceV এর ইনভেস্টিগেশন তালিকা]
নোট সবাই শেভ থাকার চেষ্টা করুন।  কারো মাথায় যদি কোনো রকম চালাকি  বুদ্ধি থেকে থাকে তাহলে সেগুলো ভূলে যান, যদি আপনি আপনার অ্যাকাউন্ট বাচাতে চান। কারন এটা ব্লকচেয়িন সিস্টেম যা শিকলের মতো আপনার একটা কাজ অন্য আরেকটা কাজের সাথে যুক্ত হয়ে থাকে। আপনি কোনো ডকুমেন্ট  কোনো রকম ভাবে মুছতে পাড়বেন না। ভূল কিছু করলে সেটা অবশ্যই ধড়া খাবেন।  তাহলে সবাই ভালো থাকুন এবং সতর্ক থাকুন।
ধন্যবাদ..

Archived: http://archive.vn/wip/T8ySM

For Reference: The above quoted post which Kakatua (Telegram username: @Jahid902) and me was talking about!



Now, we can see that this Kakatua/cryptofarid10 used his Kakatua account to cheat in the SitB bounty too!



The wallet address 0x6173d37f0292327ebe607f650d5b08c0ae104d57 belongs to Kakatua and the following TX proves that he received 8M Bitcollar tokens for managing the Bitcollar bounty campaign.
https://etherscan.io/tx/0x46c9f16a101979e8d6f1d122c02ea499bb24340b8511ae9c97c27043fa7f2d95

Now we have finally got the ultimate proof that Kakatua’s wallet address is directly connected to all of those above mentioned wallets by showing one single TX between already mentioned cheating wallet 0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a for enrolling in the SitB campaign and Kakatua’s 0x6173D37f0292327eBe607F650d5b08C0AE104D57.




TX ID: https://etherscan.io/tx/0x9fd4820d7f1259099c88ec9a64e0bd3e3a64051aaf3131f79fac61c5ccd3ca9d
 
Then he transferred all of the SitB tokens to his 0x335FB382b5A151b55E09bFAC9f20D5F2937D272E wallet address.



TX ID: https://etherscan.io/tx/0x57696e47680ca6b5b0df98d33a2886b4cc96c7008cd003fd3a3e497bfa6feea5


Miscellaneous:
Even this filthy scammer whose Kakatua account has been painted in red because of managing or launching many fraudulent, scam projects on the forum and there are a couple of threads against him already and to be honest the communioty is getting rekt because of those kind of cheaters with massive number of altaccounts, the space is becoming a place for scammers and dishonestly, many newbies are joining in his campaigns and without even doing own diligence they are indirectly helping scammers to promote scams and many people are losing funds, times for being involved with such scam projects. I have a hunch that this guy is the centre of creating some of the scam projects that he has managed as bounty manager. It’s probably up for the debate but what I can express from those proofs is that this guy deserve to be get ban hammer by the DT members, community and should never be allowed to return on the forum. But it's up for the respectful members of the forum to decide what to do.


Related Addresses:
Code:
0x086d85d1AEBc7dd3B26493F267B0f8e01bC9de4b
0x7f9b9dfe29c1d7ec426567c116e021b419b19788
0xab8b6803e61c82a773582cb45d313fd903562958
0x8735Df8be03b3E454028F7375e7a4e5eDC478612
0x66cb2fbb2809d42cc84077914db8d05a66c0f78e
0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018
0xe40e76b981e40de1ac4044c479e1e34a695a00c2
0x5ac09f199b321ca92310148901ae3b0ce6622b0e
0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5
0xD16fC5fC14F6f629f07441ece92f7C264c9be70a
0x510088496ebd87ef4783ea3175d1ee88cd121a8d
0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa
0x335FB382b5A151b55E09bFAC9f20D5F2937D272E
0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a
0x6173d37f0292327ebe607f650d5b08c0ae104d57


Edit: Changing the Title of this thread from "Kakatua Bounty Manager With His 17 Other Altaccounts" to Kakatua Bounty Manager With His 34 Altaccounts!"
Pages:
Jump to: