Author

Topic: Known Alts of any-one - A User Generated List Mk III (2021 Q2) - page 163. (Read 172284 times)

legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
10 Accounts Connected:

COINISM0001, nikjain422, preditor422, HartleyDrake, LamontFalkner, RonaldDuncan, MarlonDamon, QuinlanDeclan, KonradAvery, RodneyErskine,

Proof:

*Note* I have corrected the UID's in this quote - see below for details of correction...

Accounts Connected:

LamontFalkner, MarlonDamon

Proof:

Name:    LamontFalkner u=1835480 http://archive.is/BjMNO
Posts:    179
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:24:38 PM
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon u=1835488 http://archive.is/yVJH4
Posts:    181
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:26:18 PM
Last Active:    April 29, 2018, 10:24:39 PM

This guy is trying to be smart - he does not post exactly same posts, but his double posts are different, but to similar or same topic, like here: https://bitcointalksearch.org/topic/m.35575910

You can add to that list

Code:
Name: RonaldDuncan u=1835484 http://archive.is/WDWgY
Posts: 176
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:25:37
Last Active: 01 May 2018, 03:46:13

and

Code:
Name: QuinlanDeclan u=1835532 http://archive.is/DgzVM
Posts: 176
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:37:59
Last Active: 01 May 2018, 02:26:20

How I found them was I looked at LamontFalkner and MarlonDamon's trust walls and saw they both gave this person trust:

Code:
Name: COINISM0001 u=1231995 http://archive.is/f9MpN
Posts: 207
Activity: 140
Merit: 0
Position: Jr. Member
Date Registered: 20 October 2017, 17:34:31
Last Active: Today at 10:18:29

So we look at this last UID's trust wall and see:



All four of our valentine's day alts gave this last one trust (that wasn't reciprocated) it's a fair bet to say that COINISM0001 u=1231995 owns these alts.



previously RodneyErskine also gives trust to LamontFalkner and HartleyDrake on the same day:



Code:
Name: RodneyErskine u=1855453 http://archive.is/sWF9n
Posts: 0
Activity: 0
Merit: 0
Position: Brand new
Date Registered: 20 February 2018, 03:19:00
Last Active: 01 May 2018, 07:32:47

Having been created a week after valentine's day and having no activity it's a fair bet to say that this is also an alt.

RodneyErskine u=1855453 gives trust to

Code:
Name: HartleyDrake u=1835463 http://archive.is/KvF4r
Posts: 182
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:19:33
Last Active: 01 May 2018, 02:12:42

HartleyDrake gives trust to both RodneyErskine and KonradAvery on the 30th of April.



Code:
Name: KonradAvery u=1855449 http://archive.is/Al1yL
Posts: 0
Activity: 0
Merit: 0
Position: Brand new
Date Registered: 20 February 2018, 03:17:59
Last Active: 01 May 2018, 06:45:05

KonradAvery like RodneyErskine was created on the 20th of April and has no activity. (Konrad, unlike all the others doesn't have any negative trust thus far)

Having exhausted all our trust links, our accounts connected looks like this:

Accounts Connected:

COINISM0001, HartleyDrake, LamontFalkner, RonaldDuncan, MarlonDamon, QuinlanDeclan, KonradAvery, RodneyErskine,

which Glomerulus22 would have found had /she delved a little further under the surface.



And what of our first two UID's found?

Their last active corresponds with all the others listed:

Code:
Name: LamontFalkner u=1835480 http://archive.is/SNrdN
Posts: 182
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:24:38
Last Active: 01 May 2018, 02:26:40

Code:
Name: MarlonDamon u=1835488 http://archive.is/3wMo5
Posts: 184
Activity: 84
Merit: 0
Position: Jr. Member
Date Registered: 14 February 2018, 23:26:18
Last Active: 01 May 2018, 07:22:52

Glomerulus22 also incorrectly labels the two s/he found with incorrect UID numbers.

The 1277719 belongs to

Code:
Name: nikjain422 u=1277719
Posts: 241
Activity: 112
Merit: 10
Position: Member
Date Registered: 04 November 2017, 01:26:10
Last Active: 29 April 2018, 16:28:59

which when you go back to the two last active dates above corresponds, so, was Glomerulus22 onto something? Let's look...

yahoo62278 identifies nikjain422 and preditor422 as being alts... both give each-other merits here and here

Code:
Name: preditor422 u=1285494
Posts: 90
Activity: 90
Merit: 1
Position: Jr. Member
Date Registered: 06 November 2017, 15:36:50
Last Active: 26 February 2018, 14:07:02

archive.is uses the GMT clock (I am GMT +10)

Name:    nikjain422
Last Active:    April 29, 2018, 06:28:59 AM

Name:    LamontFalkner
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon
Last Active:    April 29, 2018, 10:24:39 PM

I'm prepared to say both nikjain422 and preditor422 are alts of the other seven connected by me.

Miscellaneous:

Not sure how Glomerulus22 came to use the UID 1277719 but in any event, it seems to connect with the other alts.

I also haven't delved into these UID's individual posts, I've already spent  over 90 minutes on this one post.
jr. member
Activity: 504
Merit: 5
newbie
Activity: 14
Merit: 0
Accounts Connected:

They are in numerical order!

jponline4u   https://bitcointalksearch.org/user/jponline4u-1852805
monojet1   https://bitcointalksearch.org/user/monojet1-1852724

Proof:

1) Joined same bounty at the same time  
https://clip2net.com/s/3TTnwbq  (https://docs.google.com/spreadsheets/d/1GS1xvBs0o4DbpH8SosrGN1ADdrsnx2fq0dKng6ziOVo/edit#gid=579373772)

2) same day of registration

3) same number of posts

4) same posts in same threads
newbie
Activity: 14
Merit: 0
Accounts Connected:

They are in numerical order!

chuanpu           https://bitcointalksearch.org/user/chuanpu-1455244
Coopeer           https://bitcointalksearch.org/user/coopeer-1459460
Quantumbot   https://bitcointalksearch.org/user/quantumbot-1460151
Godparticles   https://bitcointalksearch.org/user/godparticles-1460222
soopiking           https://bitcointalksearch.org/user/soopiking-1460330
MariaOzawaa   https://bitcointalksearch.org/user/mariaozawaa-1460351
Jonesdoo           https://bitcointalksearch.org/user/jonesdoo-1460374
morphic           https://bitcointalksearch.org/user/morphic-1460404
BooMoon           https://bitcointalksearch.org/user/boomoon-1460424
AssassinCreed   https://bitcointalksearch.org/user/assassincreed-1460514
Yagami nunnery   https://bitcointalksearch.org/user/yagami-nunnery-1460559
Kyo Kusanagi   https://bitcointalksearch.org/user/kyo-kusanagi-1460601
spritJ           https://bitcointalksearch.org/user/spritj-1563565
Xhero           https://bitcointalksearch.org/user/xhero-1563593
Windwolf           https://bitcointalksearch.org/user/windwolf-1563621
icowind           https://bitcointalksearch.org/user/icowind-1563638
Newsky           https://bitcointalksearch.org/user/newsky-1563862
dilidolu           https://bitcointalksearch.org/user/dilidolu-1563892
kakaword           https://bitcointalksearch.org/user/kakaword-1563928

Proof:

1) Joined same bounty at the same time  
https://clip2net.com/s/3TTmoFF  (https://docs.google.com/spreadsheets/d/1GS1xvBs0o4DbpH8SosrGN1ADdrsnx2fq0dKng6ziOVo/edit#gid=579373772)

2) same day of registration all of them

3) same number of posts

full member
Activity: 448
Merit: 100
CRYPTOCITIZEN $CCASH
I got a unnecessary red tag for doing nothing. Please recheck my issue and remove my red tag. https://bitcointalk.org/index.php?topic=3514418.new#new thanks.
jr. member
Activity: 504
Merit: 5
full member
Activity: 448
Merit: 100
Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns



When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns



When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns


When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
I often hear stories like that. most people will make up stories to cover up their mistakes.

You look carefully! from one purse was sent a part of the tokens received for the airdrop (this is part of the tokens my friend gave me!) and the second part of the whole transferred to me brother that I helped him sell them on the exchange https://etherdelta.com  ... You are building false accusations! Well, nothing will judge everyone's life. You probably heard about the boomerang effect?
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
Archived for future reference: http://archive.is/0e8eH#selection-6693.0-6721.93

Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.

Hmm, let's look at your case file:





Ref: https://bitcointalksearch.org/topic/--1481383

Nope, can't see any reason to remove any Red Paint TM from your case file.

Case Closed

(you might want to check your Trust Wall, I've just pissed up against it again...)

Kiss

legendary
Activity: 1932
Merit: 2272
Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.

Quoted for reference and whole post is archived here https://archive.fo/FfIhp#selection-6559.0-6559.135
copper member
Activity: 1330
Merit: 899
🖤😏
Welcome rajurathod18

Looks like people I have merited are turning to be helpful for the community. I don't even know, why did I resigned as a source? oh yes because I was offended for having 0 sMerits for days. now that I think about it, I always had 0 sMerits on the last days of every month. lol.

I can't believe these facking cheaters are earning $7000 just by posting garbage. Timelord2067 are you going to remove your red paint on me or should I paint your walls first? second lol.

You might be surprised after deleting your red tag on me, maybe you could be included on DT2 by you know who.
I'm going to tag these cheaters and ask for $50 for tag removal on the trust feedback. they should pay $50 in Bitcoin and to the forum.
Maybe it's time for me to be considered as an authority to the useless power abuse of some of the DT2 members to prevent tyranny. some DT2 members are tagging people and then would say that they are not going to remove the tags no matter what. they should use their power to benefit the forum and not their own egoes.

Maybe DT1 members should consider and compare my methods in dealing with these cases with the methods of some DT2 members.
Maybe I could be a good choice, because I don't need any power nor do I need any green trust.

newbie
Activity: 15
Merit: 1
Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns
https://i.imgur.com/YOd6wjP.jpg


When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns
https://i.imgur.com/VMAENLK.jpg


When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns
https://i.imgur.com/x0jgi0l.jpg

When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
I often hear stories like that. most people will make up stories to cover up their mistakes.
full member
Activity: 448
Merit: 100
Accounts Connected:
TukangSleeding, Newbee69, Thalhahmtp , thanoskuvf , Yoshimaru, crptovsa


Proof:
This address has received some DEBITUM token deposits.. https://etherscan.io/address/0x6ae4663ffe677d180f6db9e1cbd38b2935b23752#tokentxns



When we search on Debitum facebook bounty sheet https://docs.google.com/spreadsheets/d/1TkIkv4i9RBzg0c1HmPr4fwYTFqPnLNx6z5eP6mgazNQ/edit#gid=1680112320 , we found these names...

Tukangsleeding 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/oE6KP)
Newbee69 0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  (Found here http://archive.is/5hKpD)
Thalhahmtp 0x612925e3c9f12b2765265bfd35294b7e0269b0cc (#1251)
thanoskuvf 0x57dad616b91004f3dd4007774ba5580a48ecdf6b (#1252)
Yoshimaru 0xca01592a4fff5308742bff39261d8a4ffed7c7bd (#1248)
crptovsa 0x0d924a5ff3d00814dccd911c860ba0d3c31479cb (#1249)

Related Addresses:
Code:
0x612925E3c9F12B2765265BFd35294B7e0269B0Cc  
0x57dad616b91004f3dd4007774ba5580a48ecdf6b
0xca01592a4fff5308742bff39261d8a4ffed7c7bd
0x0d924a5ff3d00814dccd911c860ba0d3c31479cb

Miscellaneous:
abusing bounty with alts





Accounts Connected:
Aubameyang, rajakoin1994


Proof:
This address has received 2 ADBANK token deposits...https://etherscan.io/address/0xed02293084b86fa973c337a110cc812236cd18ac#tokentxns



When we search on Adbank facebook bounty sheet, we found these names..

Aubameyang 0xd5811c014ce871d3fc17409f6e71dca6ef270a1a (number #78)
rajakoin1994 0xFf866Cb33172738f666213d463A24B29C686A8D0 (number #477)

Related Addresses:

Code:
0xd5811c014ce871d3fc17409f6e71dca6ef270a1a
0xFf866Cb33172738f666213d463A24B29C686A8D0

Miscellaneous:
Abusing bounty with alt.





Accounts Connected:
welckomtome , baikallivestar , pon-viet


Proof:
This address has received many Sugar Exchange token deposits... https://etherscan.io/address/0x2a18036a76eb0f8b703a60f388d08b652777246c#tokentxns


When we search on forum, we found these names...

welckomtome 0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53 (Found on here http://archive.is/RoDmf)
baikallivestar 0x08927b6b199f327c5cac5b186643c57ee99a8707 (Found on here  http://archive.is/62ywE)
pon-viet 0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb (Found on here http://archive.is/n1RL6)

Related Addresses:
Code:
0x57c4168dDeb972C0F17b7883BFE5307AF3c52D53
0x08927b6b199f327c5cac5b186643c57ee99a8707
0xbbb991417ee2af4527ef436b50f76dc4bfcca8cb

Miscellaneous:
Abusing bounty with alts


WTF?? this is my friend and brother send tokens for me!!!
Why is this person lying and trusting him?
I can prove that my friend and brother sent me tokens!  Is it forbidden to transfer tokens to each other? What is the violation?
I do not have many accounts about what is written in this message please return back.
jr. member
Activity: 126
Merit: 3
Joe's Signatureless Challenge

What a pity you've just lifted mdayonliner 's work from the 25th of March 2018 and passed it off as your own.



mdayonline's reference was KeithBeeCham work two days prior connecting

chixka000, identifyuser, NetFreak199 and alexberezov

(and all three of you haven't thought to check their trust walls for previous connections to yet more alts that have been made in the past.)



Welcome rajurathod18 - I look forward to you editing your post using the submission form at which time I'll add your finds to the Google Spread Sheet.



It was actually my work that made the link on the back off another user who linked 2 of the accounts.


Accounts Connected:
chixka000, netfreak199, Camus, visionary, alexberezov, identifyuser

Proof:

6 of the accounts joined the PECUNIO Signature bounty. At the time they joined in pairs within 5 - 15 minutes of each other and when I looked at the profiles they signed out at similar times
https://docs.google.com/spreadsheets/d/1G8pBrPNw5gkpwCYLbr-ggqL3HBGSGCud_bUz-gojAfI/edit#gid=1761784155

I looked at chixka000 & netfreak199 first and noticed that they made posts at a similar time and they logged out at similar times. I then looked at another campaign that they were in and found their ETH addresses.

This was just one campaign that I looked at and discovered that all of these smaller accounts were contributing to one account at similar times too.
Netfreak transferred    3,191.48936170213 MWAT to chixka000 15 days ago
lehard transferred    3,191.48936170213 MWAT to chixka000 15 days ago
alexberezov transferred   4,851.359064618577 MWAT to chixka000 16 days ago
identifyuser transferred  3,538.009719773167 MWAT to chixka000 16 days ago
Camus transferred  47,285.45675578803 MWAT to chixka000 16 days ago
visionary transferred  47,285.45675578803 MWAT to chixka000 16 days ago

If you look here chixka is asking about a bounty that he isn't involved with

This has been a long campaign, one I've very much enjoyed. Looking forward to the final spreadsheet being shared
is there any information about calculation of stakes for bounty? at least approximate date? I didn't find announcements from bounty Manager.

However alexberezov was and if you look above alexberezov has transferred bounty earnings to chixka

They have also been connected through merit

Merit summary for alexberezov,
January 25, 2018, 03:58:00 PM: 50 from chixka000
January 25, 2018, 03:39:16 PM: 50 from NetFreak199

MWAT Campaign all 7 names in the youtube campaign and 4 of them joining within 30 minutes of each other.
https://docs.google.com/spreadsheets/d/1c_63IbIczvWvAE33b-QgpgfmlN2FzMK7TuTWUpytXds/edit#gid=1724170213

Related Addresses:

ETH addresses that link the accounts together.

alexberezov
Code:
0x55515EDbe90d7d8f29De195E13D02bB43f9Ee8f0
Netfreak
Code:
0x822d9cd5b86391cdb5e4743089b8cc9f964195bf
lehard
Code:
0x8d25806367854781767728Ec23E9d2d9cF13A9E6
identifyuser
Code:
0x8Ede1DbeeCde0AE2859f9735cA0470c8210c0e0C
Camus
Code:
0x84D547a3D8F70857801EA98654Df62258d5ea3ae
visionary
Code:
0x52683d2A38676De03D1029cdAe1f2729473b8b7F
chixka000
Code:
0xAaEedA078AcF2e037FFf742c564dc11eBa815b7f


Miscellaneous:

As it stands I have messaged the PECUNIO bounty manager twice and he didn't respond and the spreadsheet still says that they have been accepted but they have moved onto another signature bounty
Thrive Signature bounty
6 of these accounts joined up and what I also noticed is that these accounts are joining in at the end of the campaign each time.
https://docs.google.com/spreadsheets/d/10-0pamtd_CjyZjmmFZ5Q_0HSNhrRC2i-E5HqVokTEjo/edit#gid=1453105285

I have no doubt you will correct me if I’m wrong.

The users are plaguing campaigns and not getting kicked out.
member
Activity: 213
Merit: 53
Accounts Connected:
alexsetiawan , kurniajim


Proof:
This address has received 2 ETHOS/BQX token deposits... https://etherscan.io/address/0x73068dddc3a3d644211c23315fab4d0ced54d48a#tokentxns


When we search on BQX's facebook bounty sheet, https://docs.google.com/spreadsheets/d/1VN61OS92gyZSHlYorDMfVVf90n3jl-HKTGbhBXVthNE/edit#gid=537703444 , we found these names...

alexsetiawan 0x1cf35acecfc5cdb8356b3e884a67ece61c803d7a #240
kurniajim 0x72d2ac75b2886b3a11ecae88dc9d125f3fe3d326 #231


Related Addresses:
Code:
0x1cf35acecfc5cdb8356b3e884a67ece61c803d7a
0x72d2ac75b2886b3a11ecae88dc9d125f3fe3d326

Miscellaneous:
Abusing bounty with alt.

P.S kurniajim already red tagged, therefore, his other account should be red tagged as well for cheating, shared ponzi site through ref link and tried to bribe DT to remove negative trust on his account.





Accounts Connected:
[email protected] , annazaitun87


Proof:
This address has received 2 ETHOS/BQX token deposits... https://etherscan.io/address/0xbdaeb44cf131cfe0de1b682d7fb003e13dcd767b#tokentxns


When we search on BQX's facebook bounty sheet https://docs.google.com/spreadsheets/d/1VN61OS92gyZSHlYorDMfVVf90n3jl-
HKTGbhBXVthNE/edit#gid=537703444 , we found these names...

[email protected] 0x54804cbd6db2362656f743e4c4306dd4f98e6580 #450
annazaitun87 0x7963bb5c1b6cdbda1f6d40a7750f9f02c2e0207f #472

Related Addresses:
Code:
0x54804cbd6db2362656f743e4c4306dd4f98e6580
0x7963bb5c1b6cdbda1f6d40a7750f9f02c2e0207f  

Miscellaneous:
Abusing bounty with alt





Accounts Connected:
farharhadi, CROYA86, stevano, mamaita, DIAH PERMATASARI, zoelhack, Mbah Tyo, RENATA612


Proof:
This address has received LOT of MONACO token deposits... https://etherscan.io/address/0x14c0f433b2eda890ca9dcbb39bde9d138e71fe97#tokentxns


When we search on MONACO blog/media, signature, and twitter sheet, https://docs.google.com/spreadsheets/d/1XMYFUomHmRGvdCwJa2sZr9XlN2xL3Elcih11ovge_60/edit#gid=20
43407156 we found these names...

#BLOG/MEDIA SHEET
farharhadi 0xe976cc6de5a3939dff39852fa6f1630965edd957 #50
CROYA86 0xac9aa01846e5f2b5a24bdc981d6ffdd5d82f590b #9
stevano 0x5489f45c44f0a189c89e0f24c04fddaad2158f44 #8
mamaita 0x73a6e296a2b493e0ab733f0c4b1adfdac4153ed8 #52

#SIGNATURE SHEET
stevano 0x21b18948a0d29634f322c0b18688b47d83f7a952 #193
DIAH PERMATASARI 0xeac14bd54cc94d815c770bd91efd8fec0572e52b #252
zoelhack 0x258aa6b1a771b641db6ac85c70f8c05ebb32336c #253

#TWITTER SHEET
Mbah Tyo 0x0c16c76f44280509adafb860767bd75bd99502ff #466
RENATA612 0x83b4be3ddb8e19d5cab8eee0d2b0fd81cefccf7d #464

Related Addresses:
Code:
0xe976cc6de5a3939dff39852fa6f1630965edd957
0xac9aa01846e5f2b5a24bdc981d6ffdd5d82f590b
0x5489f45c44f0a189c89e0f24c04fddaad2158f44
0x73a6e296a2b493e0ab733f0c4b1adfdac4153ed8
0x21b18948a0d29634f322c0b18688b47d83f7a952
0xeac14bd54cc94d815c770bd91efd8fec0572e52b
0x258aa6b1a771b641db6ac85c70f8c05ebb32336c
0x0c16c76f44280509adafb860767bd75bd99502ff
0x83b4be3ddb8e19d5cab8eee0d2b0fd81cefccf7d    

Miscellaneous:
Abusing various bounties with alts
jr. member
Activity: 66
Merit: 9
Accounts Connected:
knightmairesaint
Intersan
yrreg ger

Proof:
knightmairesaint post https://bitcointalksearch.org/topic/ann-cartaxi-special-signature-campaign-updated-2174287 (archive = http://archive.is/Veb8T)
Intersan post https://bitcointalksearch.org/topic/m.35269832 (archive = http://archive.is/G38Ra)
yrreg ger post https://bitcointalksearch.org/topic/seniors-bazista-signature-campaign-ended-0001-per-post-2258785 (archive = http://archive.is/f5qmL)

All 3 accounts used the btc add = 3Ep9YtRbA2ntveQKAUumbVooxthLUDmXvi  

Related Addresses:
3Ep9YtRbA2ntveQKAUumbVooxthLUDmXvi  


Miscellaneous:
knightmairesaint have the
Code:
This user's password was reset recently.

This user's email address was changed recently.

and Intersan have only the
Code:
This user's password was reset recently.

yrreg ger doesnt have any changes

Note: Im not accusing the user that hes/her scammer/scamming. Just posting here because of the recent changes to the 2 accounts. Chances of the accs are bought may be possible

legendary
Activity: 2240
Merit: 3150
₿uy / $ell ..oeleo ;(
Accounts Connected:

(Where possible put UID's in numerical order) domainer.com, hodler.com,

Proof:



Miscellaneous:

Both accounts have similarities in the:
- domain name for username.
- domain names for email account, both in Gmail.
- registered same day same hour, with only 20 min difference.
- posting the same time in the same section.
- both have same level of English
- same post style
See the proof.

Too many similarities to be just a coincidence.
jr. member
Activity: 280
Merit: 3
Accounts Connected:

LamontFalkner, MarlonDamon

Proof:

Name:    LamontFalkner u=1835488 http://archive.is/BjMNO
Posts:    179
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:24:38 PM
Last Active:    April 29, 2018, 08:08:14 PM

Name:    MarlonDamon u=1277719 http://archive.is/yVJH4
Posts:    181
Activity:    84
Merit:    0
Position:    Jr. Member
Date Registered:    February 14, 2018, 01:26:18 PM
Last Active:    April 29, 2018, 10:24:39 PM

This guy is trying to be smart - he does not post exactly same posts, but his double posts are different, but to similar or same topic, like here: https://bitcointalksearch.org/topic/m.35575910
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓

What a pity you've just lifted mdayonliner 's work from the 25th of March 2018 and passed it off as your own.



mdayonline's reference was KeithBeeCham work two days prior connecting

chixka000, identifyuser, NetFreak199 and alexberezov

(and all three of you haven't thought to check their trust walls for previous connections to yet more alts that have been made in the past.)



Welcome rajurathod18 - I look forward to you editing your post using the submission form at which time I'll add your finds to the Google Spread Sheet.

member
Activity: 224
Merit: 21


Cybermiles bounty campaign was managed by Krypital. After checking final spreadsheet I came across lots of bounty abusers and in the spreadsheet I found fake accounts which do not exists and coincidently have same BTT, telegram, twitter and facebook names which totally hint us towards bounty rewards manipulation & corruption

Here is the link to the final spreadsheet of cybermiles bounty campaign rewards https://drive.google.com/open?id=1qQMtIoF5YXJ88b8FbSiMuKxIHKJBW1bC81WRz3bE0FY

I will share here one by one bounty abusers which are not doing their bounty hunting in an honest manner.

CASE 1



In above image members marked in blue have alt accounts for bounty campaigns hieuvm1991, phuongthao96, bichphuong, kimphuong1988, Selja1977,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3bBC7c49b83Fb93D9eD2E4e80365D108f19ff35C

Reference of Abusing 1) https://ethplorer.io/address/0x3bbc7c49b83fb93d9ed2e4e80365d108f19ff35c#pageSize=100
                               2) https://ethplorer.io/address/0x103ba1e2f25029f95fa379125e6bcff76f2f525a#pageSize=100

Related address
Code:
hieuvm1991        -0x103Ba1E2f25029f95fA379125e6BCfF76F2f525A
Code:
phuongthao9      -0x4DeB348ABbF1A559C3DDEC9D99915A64e74c497C
Code:
bichphuong         -0xD53FF4d07870d5bfD02c6D39E4b39B39d0594F4e
Code:
kimphuong1988  -0x2b45f1528c74a228bcf9Ec491466a17A308aa193
Code:
Selja1977           -0xb24201F31144134C8432299A24Ef07802763C045

CASE 2



In above image members marked in Yellow have alt accounts for bounty campaigns Deubila, GangNamSK
, HSRP,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0xA2539237Fd90b50BEC35aCd7d41816A550E75ACa

Reference to Abusing 1) https://ethplorer.io/address/0xa2539237fd90b50bec35acd7d41816a550e75aca#pageSize=100
                               

Related address
Code:
Deubila            -0x9D7eD4AA9E99C6b05e9cab71f0b33834c5CaA6bF
Code:
HSRP               -0xF67E951e9a1194DceBEeFfC7DF1Fef2E8551a608
Code:
GangNamSK     -0x51ACA61EFd0b9020353eaA9fD53040e3adB5849C

CASE 3



In above image members marked in Yellow have alt accounts for bounty campaigns Windybi, ngungoc130485

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3463934897d356B8659cBDFE15209e3bC3229105

Reference to Abusing 1) https://ethplorer.io/address/0xd9cf954b678e9a6bf997ae61a61b62f928e6dcb5#pageSize=100
                               2) https://ethplorer.io/address/0x151bc71a40c56c7cb3317d86996fd0b4ff9bd907#pageSize=100
                               

Related address
Code:
Windybi                 -0x609cbBa0792115d83Ac12883290C9F83a67e662b
Code:
ngungoc130485      -0xd9cf954B678E9a6BF997AE61A61B62f928E6DcB5

CASE 4 MANIPULATION

Fake signature campaign participants



Fake Media campaign participants



I cant find these members on BTT forum, telegram as well as on Twitter with their given details and the funny things about this fake hunters are they coincidently or purposely have same names for BTT Forum, telegram & Twitter accounts.Grin Grin. This makes questionable remarks and forces us to believe that the cybermiles bounty campaign have been manipulated or there is some corruption involved in bounty rewards. These fake guys who don't even exist collected 34000CMT worth 7400$ tokens & sent tokens to exchange.



Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x45393b52678bb3381e39865Ab4b65c66d6f54746

Reference to Abusing 1) https://ethplorer.io/address/0x45393b52678bb3381e39865ab4b65c66d6f54746#pageSize=100

Conclusion:- I hope all bounty abusers will be punished as per forum rules. The important one is point 4 this force us to think there is corruption or Manipulation in bounty Campaign managed by Krypital. He must answer to this manipulation or corruption of bounty rewards as mentioned in Case 4, for all bounty hunters who were doing their bounty hunting in an honest manner of cybermilesbounty campaign.

This post will be continued as there are more bounty abusers to be exposed from cybermiles bounty campaign.

Jump to: