Author

Topic: Known Alts of any-one - A User Generated List Mk III (2021 Q2) - page 187. (Read 172271 times)

full member
Activity: 406
Merit: 131
~
Will check this, i see 30 transactions https://etherscan.io/tokentxns?a=0x6e20d40fd6e6066a320668eb79d6b0612be20cd1 and one address from where all addresses received ether(for fee I guess).
Can you link me to:
Quote
Continuation of my previous little "investigation".

Yep, just in quoted message : https://bitcointalksearch.org/topic/m.26948800
Btw, it's easy to see how they enter the bounty one by one, I think just the "master" of all these accounts simply registers them in the campaigns one by one.

Correct me if I'm wrong.
mkaay...i think this is something for moderator.
Envion twitter bounty has more than 2000 participants, one can hardly check addresses trough their spreadsheet, other spreadsheets and link them with token transfers to one address without script or something.
Besides, without "rank rule" for twitter bounty, newbies can create/buy(example hugeblack ^^^) hundreds twitter accounts, create hundreds forum accounts, join bounty and by the time bounty ends they will all rank to junior/member rank, use these accounts to cheat more signatures and when these accounts reach senior rank they will probably sell them.  Undecided

In this case, I spent half an hour to find these addresses in the Envion table. And was enough to find one of the addresses, the another were close as you can see from the screenshots. Certainly this is not 100% proof, but what about the participants who initially create accounts in about one time interval, then they are registered in campaigns one after one, with twitter accounts similar like two drops of water, and after the campaign end they transfer all they tokens to one wallet who sells them on the etherdelta. Of course it's just a company of friends ... (=

Miscellaneous:

5 minute investigation : bitmora twitter spreadsheet (https://docs.google.com/spreadsheets/d/1a4CAP2ayQle_AUtlUO0jDtOc5fTwxEFtAF2eZsl7gDM/edit#gid=1788847874) - just found one ETH address - and here are a few others from this "team" already nearby (red rectangle are from second post, blue - from first) :



P.S. Think DeepOcean21 also in the "team".

legendary
Activity: 1932
Merit: 2272
~
Will check this, i see 30 transactions https://etherscan.io/tokentxns?a=0x6e20d40fd6e6066a320668eb79d6b0612be20cd1 and one address from where all addresses received ether(for fee I guess).
Can you link me to:
Quote
Continuation of my previous little "investigation".

Yep, just in quoted message : https://bitcointalksearch.org/topic/m.26948800
Btw, it's easy to see how they enter the bounty one by one, I think just the "master" of all these accounts simply registers them in the campaigns one by one.

Correct me if I'm wrong.
mkaay...i think this is something for moderator.
Envion twitter bounty has more than 2000 participants, one can hardly check addresses trough their spreadsheet, other spreadsheets and link them with token transfers to one address without script or something.
Besides, without "rank rule" for twitter bounty, newbies can create/buy(example hugeblack ^^^) hundreds twitter accounts, create hundreds forum accounts, join bounty and by the time bounty ends they will all rank to junior/member rank, use these accounts to cheat more signatures and when these accounts reach senior rank they will probably sell them.  Undecided

edit*
~
What I meant to say is that your proof looks legit but there are too many participants to go trough all addresses and other bounties and I honestly think that you scratched only bottom. Undecided Good catch tho.
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓

My guess is hugeblack got scammed by humbertin and has probably tapped three twitter accounts s/he probably sold to Humbertin in the first place.
... Just like quicksellers' M.O.

No (Diego Guanoluiso/ [email protected] /skype : live:francis1997a) scammed me when I try to sell chaturbate tokens  {i left my skype
 account on my post and he adds me}
proof :
i start selling chaturbate tokens on July 20, 2017, 07:47:01 PM
https://bitcointalksearch.org/topic/m.20264596
this user scam me on July 22, 2017, 05:28:41 AM
https://bitcointalksearch.org/topic/m.20294825

about twitter accounts I start selling accounts on August 30, 2017, 12:58:12 PM
https://bitcointalksearch.org/topic/m.21342078
 the first buyer  was MaoChao on 2017-09-06 check my trust to proof

How can sell twitter accounts to humbertin  Roll Eyes Roll Eyes Roll Eyes?


thanks, i really want to know who scam me & red trust to him.

Thanks for clarifying this issue.

Humbertin has contacted me in the past to be his escrow (don't know why) - as long as he sends BTC first I'd be prepared to be the escrow.

If either of you don't want to use me, then try this list that hedgy73 started: Recommended bitcointalk escrow services https://bitcointalksearch.org/topic/recommended-bitcointalk-escrow-services-2439910
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
This user still active abusing and joining signature campaign and not yet tagged by DT2 . Hopefully, This user tagged as soon as possible he can't scam here in the community.

Well, I splashed Red Paint TM on their Trust walls the same day, but how come you didn't?  Looks like most other contributors here have also splashed some claret around at one point or another.  One day you may well be on the fabled DT so all those tags will then turn red - I for one wouldn't want to go back over all my own work to then dish out Butt Hurt TM.
hero member
Activity: 1022
Merit: 509
AXIE INFINITY IS THE BEST!
Probably connected accounts: Lontongmie & Silvercell



(Lontongmie) https://bitcointalk.org/index.php?action=trust;u=890574 

Trust rating (Lontongmie):
Lauda   2017-05-23   0.00000000   Reference   Defaulted on a loan.
ibminer   2017-05-23   0.00000000   Reference   Defaulted on loan, and account has likely changed hands.

(Silvercell) https://bitcointalksearch.org/user/silvercell-989547
Trust Rating:

ranochigo (DT3)   2017-07-29   0.00000000   Reference   I strongly believe this person is trying to scam. Refer to the facts presented in the response.

Proof:

Silvercell post this:

username: Lontongmie

And Lontongmie post this : https://bitcointalksearch.org/topic/m.17285774 (can't quote because the thread is already locked).


This user still active abusing and joining signature campaign and not yet tagged by DT2 . Hopefully, This user tagged as soon as possible he can't scam here in the community.
full member
Activity: 406
Merit: 131
~
Will check this, i see 30 transactions https://etherscan.io/tokentxns?a=0x6e20d40fd6e6066a320668eb79d6b0612be20cd1 and one address from where all addresses received ether(for fee I guess).
Can you link me to:
Quote
Continuation of my previous little "investigation".

Yep, just in quoted message : https://bitcointalksearch.org/topic/m.26948800
Btw, it's easy to see how they enter the bounty one by one, I think just the "master" of all these accounts simply registers them in the campaigns one by one.

Correct me if I'm wrong.
legendary
Activity: 1932
Merit: 2272
~
Will check this, i see 30 transactions https://etherscan.io/tokentxns?a=0x6e20d40fd6e6066a320668eb79d6b0612be20cd1 and one address from where all addresses received ether(for fee I guess).
Can you link me to:
Quote
Continuation of my previous little "investigation".
full member
Activity: 406
Merit: 131
Hello all!
Accounts Connected:

Coffee06,
WillBeOk,
Solarminer,
DeepCoin ,
Smoke06,
hudutf3,
Closing,
Grankk,
Muradiye,
Autlook,
gkyldz,
Afterweeks,
albud4kfahri,
earless1,
platoon5,
differentsituation,
Hardlifeand,
emptyforever.

Proof:

Continuation of my previous little "investigation".
After coupe of days i again checked eth adress from my previously post. (https://etherscan.io/address/0x6e20d40fd6e6066a320668eb79d6b0612be20cd1#tokentxns)
and as you see - another 20 wallets was donors of CCore tokens. When i found all this addresses in Envion twitter bounty spreadsheet (https://docs.google.com/spreadsheets/d/1vrIn6FmFZS2CjiAa6ebUuSuR2Va7e5GYRrwJryiY9tE/edit#gid=538059588), and taked BCT accounts. All they are in, it's simlpe to check, couple of screen :



And yes, Hero and Legendary accounts in this game  Cry

Miscellaneous:

They participate a lots of finished and active bounty campaigns (it's like zergrush)  : Envion, adbank, Trade.io, Repux, TokenStars, Bitmora, HDAC, INS, etc (just check one twitter account : https://twitter.com/fatihmeydannn (WillBeOk), or https://twitter.com/ayseeges (Solarminer).

You can find they ETH adresses in all this campaign spreadsheets :
0x1e4375F2cfeEB6ba5B70320e909Da0F55b0e5313
0x6A75782a406d718B266F060D2d67dA44260990D8
0x9a05089c890263A17D8abebBD236b6CB664BA3A4
0xF6ddf965EAD458163c567380823fb5B41d730b0d
0xF0824725957F20edcf2f27E4c266e91014749E09
0x944D6a2d3C1476EBC5af30f3B64bfC8141Ad802a
0x7524813FBf6123845D0a61c1934A7aae39B2FF25
0xAB1Fecf0c5e6d8315C804dcb3005Adc633552b4e
0x803a3f96C39CF10e5b52453709406aAEED626DB8
0x45FFDAe4D8168F5dB5ff2C9b8595988f72411303
0x1f1FeC2E070F333C5c5230B242E9FB81454f3bea
0xfD2606F7cE33Dc3214Bb7E73bE1035eDBad85eb6
0x94d2548556B4B99c3DF09B6018eb5D59de7b6786
0x2Cea9147c78D78dBAdfFF004262d1E7C2739a053
0x3c56f745d4ad6B1adF2201ee9A52AE9f1A2DE62c
0x9b7395c8b342a5F55011B62AC5770B45E5cF14B

I hope that they will not be able to pass the KYS procedure, but I'll repeat the same, if you agree with me and you are bounty manager - will cancel all there stakes at the end so that his effort will be wasted (or they droped the price right away after reciving tokens, like since it happened with a CCore).
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
Name:    hugeblack
Date Registered:    09 July 2017, 00:59:58

the 9th of July to the 5th of August is 27 days (ie 3 X 9 days) - Just a coincidence mind you...  Roll Eyes
I don't understand this.

HugeBlack has page after page of sales of twitter accounts...

http://archive.is/2NmhZ
http://archive.is/3P1iG
http://archive.is/2NmhZ

and participates in the same gunbot twitter campaign http://archive.is/b2PAB#selection-1875.0-1875.26 as the three s/he's identified

as well as selling these: http://archive.is/3P1iG#selection-2609.0-2645.20

A.I.O  Email with :
  • Student Email  .edu end
  • free google voice number
  • 5 TB unlimited drive
  • Free office
  • untimied one drive
  • free amazon 6 months
price 2$

Does English To Arabic Translations http://archive.is/k73Cu#selection-2235.0-2235.28

and early on got scammed by none other than Humbertin http://archive.is/iJ0wK#selection-1731.0-1749.18

There's also pages of accelerate BTC transactions that hugeblack is participating in:

http://archive.is/b2PAB
http://archive.is/k73Cu#selection-1891.0-1891.84

something that humbertin has also taken to offering as a service:

https://bitcointalk.org/index.php?topic=2538127.0;topicseen HumbertxD - !!!!!!!!!!!!!Bitcoin transaction accelerator FREE !!!!!!!!!!!!!!!!!!
https://bitcointalk.org/index.php?topic=2111723.0;topicseen HumbertDice - [FREE] Speed up BTC unconfirmed transaction to confirmed
https://bitcointalk.org/index.php?topic=2206652.0;topicseen FrancisDice -     =.=[FREE] Speed up BTC unconfirmed transaction to confirmed

My guess is hugeblack got scammed by humbertin and has probably tapped three twitter accounts s/he probably sold to Humbertin in the first place.
... Just like quicksellers' M.O.
legendary
Activity: 1932
Merit: 2272
@timelord hold up with spreadsheet I have found 1 2 connection to i'll call it "0xdd12" farming rig, will update shortly...

18 accounts so far...

Got your PM - am holding up ...
I went trough more addresses and spreadsheets earlier today and I think that's it.
Btw, how is eidoo.bounty connected with other accounts?
Name:    hugeblack
Date Registered:    09 July 2017, 00:59:58

the 9th of July to the 5th of August is 27 days (ie 3 X 9 days) - Just a coincidence mind you...  Roll Eyes
I don't understand this.
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
On the Google Spread Sheet I'm using the term "0xdd12" farming rig for the 18 UID's so far identified here.

Can people preface their posts for this scammer as "0xdd12" farming rig continued... or something similar please?




Name:    hugeblack
Date Registered:    09 July 2017, 00:59:58

the 9th of July to the 5th of August is 27 days (ie 3 X 9 days) - Just a coincidence mind you...  Roll Eyes
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
@timelord hold up with spreadsheet I have found 1 2 connection to i'll call it "0xdd12" farming rig, will update shortly...

18 accounts so far...

Got your PM - am holding up ...


account connected Yarsk , cizatext , awawo
Bitcoin address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG
Btc address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG
BTC Address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG

Always use archive.is to archive posts. Quoting the posts and posting here is not the only way to connect. It is also important to backup your evidence so that connected alts don't delete their posts and get away with it.

So do use: archive.is

@hugeblack:

Always archive what you find via an archive service such as Archive.IS - check out our Resources Section

Dig a little deeper, awawo uses the BTC wallet address 12ge1WFVLNwznobu7Ld5v5D6oSsupdNyu2 http://archive.is/OcNdZ#selection-451.0-451.34 while I can't find anything else, review their previous posts, they also use ETH 0x0eC3c182a02465A1a02CAC2bb0B43B985Ea804c5 http://archive.is/eKiQp#selection-419.13-419.55 and the twitter twitter.com/yarsk4real http://archive.is/eKiQp#selection-405.8-405.30 (which ties them to Yarsk in name alone - and they want to purchase twitter followers http://archive.is/a0RFC#selection-1047.0-1047.54

An email address [email protected] http://archive.is/RWeoM#selection-1289.0-1291.19 and [email protected] in their profile page
Telegram username: @awawo http://archive.is/RWeoM#selection-1295.0-1295.25




@Yarsk uses the email [email protected] (in their profile page) Email used to signup at Brickblock: [email protected] http://archive.is/CFZaa#selection-1609.0-1611.22 Email Registered at Soferox or Soferox wallet address: [email protected] http://archive.is/A8Ali#selection-391.0-393.22

BTC Wallet address: 15PgsYrmREPybcR2WtnDvbsfAvjq73UABq http://archive.is/AU9Ge#selection-389.0-389.54
ETH Wallet address: 0x6c796e5c87fa3a81c2428f848f4ef98a80d31ea1 http://archive.is/AU9Ge#selection-391.0-391.62
ETH Wallet address: 0x00e8b95ef162824d2668c076b1cd91adca817690 http://archive.is/uUnKe#selection-725.0-725.58

twitter.com/YakubuDavid13 http://archive.is/AU9Ge#selection-465.8-465.33
twitter.com/yarsk4real http://archive.is/AU9Ge#selection-603.8-603.30

twitter.com/UTW_Globus http://archive.is/xR7vA#selection-1191.0-1193.56
twitter.com/newsaltcoins http://archive.is/xR7vA#selection-1285.0-1285.58
(these two could be the campaign posts - not certain if they are his/hers)

Telegram username: @cizatext cizatext http://archive.is/AU9Ge#selection-1559.0-1559.37 (clearly they are lazy and rank amateur scammer)

As with awawo is claiming from the same twitter campaign (so they get Red Paint TM )

awawo: Following @graftnetwork (Y/N): Y  http://archive.is/xwc2T#selection-487.0-487.32
Yarsk: Following @graftnetwork (Y/N): Y http://archive.is/onr4O#selection-1033.0-1033.32

Their Facebook profile: Post link to your Facebook page: https://m.facebook.com/yarskdave?refid=8 http://archive.is/a5Ow3#selection-389.0-391.40 http://archive.is/uUnKe#selection-1225.0-1227.32

WAVES Address: 3P4wTSuihtUk4ZqiDiSdoYWHHu9rakEUPVq http://archive.is/a5Ow3#selection-859.0-859.50

Post MoneyPot Account: yarsk http://archive.is/uUnKe#selection-1763.0-1763.28




Then there's @cizatext:

Email:    [email protected] (profile page)

Twitter Account Link: https://twitter.com/YakubuDavid13 http://archive.is/REVfF#selection-593.0-595.33
BTC ADDRESS: 15PgsYrmREPybcR2WtnDvbsfAvjq73UABq http://archive.is/REVfF#selection-607.0-607.47

NEM nano wallet address:  NCRGBM-LQXMEJ-FMAMER-GJKPM3-LG5PET-PLEAYZ-IGZQ http://archive.is/gZwAF#selection-1235.0-1235.72

Email Registered at Stamps or Stamps wallet address:   SxP0a0639282faf59424ad5c119783854668d4da6343a44ac688198a0de87d79b4d http://archive.is/oJmxv#selection-647.0-647.122
Telegram username: @yarskdave http://archive.is/oJmxv#selection-649.0-649.29

Btc address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG http://archive.is/oJmxv#selection-1147.0-1147.47

Post twitter account link : https://twitter.com/yarsk4real http://archive.is/oJmxv#selection-1605.0-1607.30




@hugeblack: Check out the OP for instructions on how to post via the Submission Form and the tools to use.

You loose half a point for not delving into the veritable wealth of clues to this scammers' tendrils, and another quarter mark for not archiving / formatting your post - ref: Level of awesomeness

Quote
HugeBlack (¼/3)




...and finally, unless I'm mistaken,

Name:    Yarsk
Date Registered:    05 August 2017, 05:47:47

Name:    cizatext
Date Registered:    18 October 2017, 06:29:05

Name:    awawo
Date Registered:    29 October 2017, 18:15:46

Were registered in close to multiples of nine days apart... 74 days and nine and a half days...
legendary
Activity: 3094
Merit: 1472

account connected Yarsk , cizatext , awawo
Bitcoin address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG
Btc address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG
BTC Address: 1BejwuDBA33gT8Zmg76wvdAARAv7qWK7PG

Always use archive.is to archive posts. Quoting the posts and posting here is not the only way to connect. It is also important to backup your evidence so that connected alts don't delete their posts and get away with it.

So do use: archive.is
legendary
Activity: 1932
Merit: 2272
@timelord hold up with spreadsheet I have found 1 2 connection to i'll call it "0xdd12" farming rig, will update shortly...

Account(already has - for cheating): bitcoinsay chanium signature in profile https://archive.fo/Ny5nd

So
Address used:
Code:
0xf7f30db836fdaf84da49f6aff8bf4133b6f161b3

Chanium bounty spreadsheet:



Connected with this transaction
https://etherscan.io/tx/0x8c448b8cd9e97ec3266103a09d2d138eeeb753a33eef143c211e59dc1895f242

to address 0x51b1535Cf06bc9437326473CE8b8720fE08052E0

misc: one-line shitposter, posting in the same local board as all other accounts.

Edit*

Account connected to kriptom archived https://archive.fo/ND2eE:



Will update shortly with another alt*

Account: bircoin

Address:
Code:
0x6667273b97886f6583065c38e4732fc8b5e24ec5

I've found it in taas bounty spreadsheet https://docs.google.com/spreadsheets/d/1XKlY9xEGkX4RdRmAS3nCkLtvFK9aSUVrVvB7L22uihk/edit#gid=0



sent tokens to "0xdd12" addy:

https://etherscan.io/tx/0xb87ab5ea9c28047cdd2d6568ea6fb7c06c67e27d2b15a41ec61e25d401299891
https://etherscan.io/tx/0x6dcac2496d55397ba0629b4c4b3f261cbbcca07d70a8368eca58c37976e94a6e

That address connects this account with https://bitcointalksearch.org/topic/m.27397657

ATM cheating betterbetting campaign https://docs.google.com/spreadsheets/d/1G1T8UhgtMQIsKpBkpQq-zqsb_92t1iljc_B7QRQOe90/edit#gid=1310713430:
http://prntscr.com/hw03hk
ETH address:0x4A62bce8E35B276489CCbe7966d3Dac1c8322fAD
18 accounts so far...
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
Blast from the past: https://bitcointalksearch.org/topic/m.18425502 (Locked thread) Wink

Quote
Accounts Connected:

ONLYfree -16: -4 / +0, racey -2: -1 / +0, douaa -2: -1 / +0, imane -16: -4 / +0, bitodigg -2: -1 / +0,

Proof:

Hacker from Morocco https://bitcointalksearch.org/topic/m.18425324 (Archive)

Related Addresses:

Wallet [080550a33e] https://www.walletexplorer.com/wallet/080550a33e09aaa2/addresses

Miscellaneous:

Ponzi, Self Vouching, multiple UID's in the same threads...

I got contacted by Racey today via PM - the usual fare it's all a misunderstanding...

Just had a look at their profiles:

Name:    ONLYfree
Posts:    2228
Activity:    1204
Position:    Legendary
Date Registered:    13 April 2014, 23:47:27
Last.Active:.03.January.2018, 04:56:29
Name:    Racey
Posts:    3882
Activity:    1092
Position:    Legendary
Date Registered:    09 November 2014, 00:01:26
Last Active:    Today at 08:40:25
Name:    douaa
Posts:    74
Activity:    74
Position:    Member
Date Registered:    09 March 2015, 10:17:36
Last Active:    19 May 2017, 23:18:19
Name:    bitodigg
Posts:    68
Activity:    68
Position:    Member
Date Registered:    15 November 2015, 23:17:31
Last Active:    19 May 2017, 23:17:55

Eight months ago:

http://archive.is/kEtM0#selection-305.0-379.27
Name:    ONLYfree
Posts:    2184
Activity:    1022
Position:    Legendary
Date Registered:    April 13, 2014, 01:47:27 PM
Last Active:.April 01,.2017,.05:17:50 PM
http://archive.is/IcuaY#selection-305.0-379.27
Name:    Racey
Posts:    3804
Activity:    882
Position:    Hero Member
Date Registered:    November 08, 2014, 02:01:26 PM
Last Active:    April 01, 2017, 10:57:57 PM

Uncanny how they can just stop posting, but are unconnected...  Might have to keep an eye out for these four if they have woken up.
legendary
Activity: 1932
Merit: 2272
^^^
NYGMA_35

Address is on profile https://archive.fo/kjgIa

Code:
0x7b688FababA56E91427a75e2c6DeCD0C5280e016

sent tokens to one of the addresses from posts above...

Code:
0xdd12d76573BFFdd7e1E70359EB65e83910A0f35E
https://etherscan.io/tx/0x3f8ed18a4a0828e0aeb9b39ffdd786a11aca9d4d4e1745aa39924920b6650018
https://etherscan.io/tx/0x2bf40f78e7690ca6e79f98f44ec0ff3c1ac5a54eae028b7716c28f27aa2f5491

Account Turkoin

Username: Turkoin
Language: Turkish
Profile Link: https://bitcointalksearch.org/user/turkoin-934013
Do you want to reserve white paper translation: Yes
Do you want to reserve ANN & Bounty Thread translation: Yes
ETH address: 0x85c7716158d1050c918eb5859c5219fac0665eb7
https://archive.fo/6G8CX

Address
Code:
0x85c7716158d1050c918eb5859c5219fac0665eb7

https://etherscan.io/tx/0x6d72d5b3d0f83191101e2253ad1e669e1056305227ad885f67c926a9e74955e4
From "xdd12" address

Not sure about this, but
tokens went from account nygma to account...well...one of accounts above and end up in Turkoin's addy:

legendary
Activity: 3094
Merit: 1472
....

Hm... Really impressed on how you got them. I already got the connection of nopedope and sezyumx linked with same wallet but was searching for some more connections. (didn't found any).

I also knew about lordzc but was not sure. There is another account- a Turkish translator. I hit the username while searching but couldn't find now. ;(
legendary
Activity: 3696
Merit: 2219
💲🏎️💨🚓
Another alt ^^^:

(snip)

How many alt accounts have we found so far?  Tongue

@Rakeshdobar1 : This isn't a suggestion; this is how you should present your information:

The use of PURPLE is to highlight where details should be archived. (You don't have to use purple in your actual reports)

Accounts Connected:

dumpdragon, sezyumx, paladium, ProspectorsPR, YassinBTC, eidoo.bounty (AKA Daniel ),

Disna is also connected with botake

So three further more additions: kriptom, Easy2Mine and a concrete proof to add sezyumx


Account above nopedope89 was minergate's https://archive.fo/wT4us representative, and after 3 months gap started this  Huh


Sezyumx and Monkey1 are both connected


Another alt ^^^:

kin-yon

Quite a haul there people, good work!  I'll write it up in the Google Spread Sheet shortly.
legendary
Activity: 1932
Merit: 2272
Another alt ^^^:

kin-yon


Pareto bounty spreadsheet https://docs.google.com/spreadsheets/d/13vIJsOw9pIDetLn7Hp8uHEAABoG-e31Pd1isZolaaqM/edit#gid=692863446

address:
Code:
0x6667273b97886f6583065c38e4732fc8b5e24ec5
0x8635E9bBB8d628958787c227db6A3E070B9429dC

Both accounts(kin-yon and nopedope) are in same siganature campaign: https://archive.fo/r4OEs

nopedopes address has been used by sezyumx(post above).

Either way I haven't checked your connection with nopedope (I will go through today). If it's proved that they both are same then kriptom's possibly might have cheated the giveaway.
How many alt accounts have we found so far?  Tongue
legendary
Activity: 1932
Merit: 2272
Usually participants(abuser ones) gather their tokens at one address. It's a trend or transaction pattern that abusers follow.
So this is that address 0x51b1535Cf06bc9437326473CE8b8720fE08052E0

ZRX token:
https://etherscan.io/tx/0x9d67333f96b51199cce0e0372afa6f941a98fc1b04afc14ae1002db46f8d1b93
From this address:
Code:
0x4a62bce8e35b276489ccbe7966d3dac1c8322fad

lordzc
#JOIN

Bitcointalk username: lordzc
Forum rank: Sr.member
Posts count:  958
ETH address:0x4A62bce8E35B276489CCbe7966d3Dac1c8322fAD
https://archive.fo/xyH1v

Right?

connection with sezyumx:
Code:
0x6667273b97886f6583065c38e4732fc8b5e24ec5

lordzc used address here https://archive.fo/0cB2H and sezymux here: https://archive.fo/aDd9D

EDITED*

thew3apon
used this add in ITT bounty:

Code:
0x329DD38c02DE176b141175eDfBE023A313676ce2

sent tokens here https://etherscan.io/tx/0xd3603ceeaaf7c03f167ea35caa7304bd2c299a93c8fa0b1e8d41acdb4d75057f
And received ether only few minutes before from https://etherscan.io/tx/0x704eda7ee33e5afa304e596ab63b286a9a1d280cf53b63190db1f14eec6fbaac
this address 0x8635e9bbb8d628958787c227db6a3e070b9429dc
mentioned couple of times in previous posts...

misc:
all accounts mentioned in previous posts starting from this post are "one-line" spammers and all of them are posting in Turkish local board.


edit n953

From stuffgogo signature(easy2mine is there too)
https://docs.google.com/spreadsheets/d/1xL7pwjaVjx2XRCXoBhAvuC61YEDU2tVru3Kxo7GOZvo/edit#gid=1436302817

cashcash



address:
Code:
0xdd12d76573bffdd7e1e70359eb65e83910a0f35e



and........edit
http://prntscr.com/hvy4qg probably better connection - pikcio bounty spreadsheet.
Jump to: