Newly found 17 Bitcointalk Accounts & more than 40 Ethereum Wallet Addresses are connected to Already Proven Cheater/Scammer Kakatua! Now adds up to 35 Connected AccountsA couple of days ago I was looking into that
Cryptofarid10 alts of
Kakatua's account. Then provided a lot of details on how that guy owns 18 accounts.
Reference: https://bitcointalksearch.org/topic/kakatua-bounty-manager-with-his-41-altaccounts-5234050Now after all of those findings I see this guy's cheating runs even deeper than what I first thought. But my today's report mostly depends on
Alamin1955,
CrisTofar,
BountyQueen.
Connected Accounts 1.
Alamin1955, 2.
BountyQueen (Banned), 3.
CrisTofar, 4.
Vince44 (Banned), 5.
ariyanmizan7460, 6.
EmmaLory (Banned), 7.
ss.siyam, 8.
tamim101001 (Already proven alts of Huraia), 9.
Huraia, 10.
tushartamim (Banned), 11.
cryptoamirul10, 12.
cryptoamin26 Merited by cryptofarid10, 13.
Little Boy10, 14.
Sojibrana77, 15.
Habibur1729 Ranked up to Jr.Member because of a Merit given by cryptofarid10 for a copy&paste post, 16.
4Brothers, 17.
emran113 Quoting Alts of Kakatua Proof:ETH: 0x24ce7c186eC37a8F46e94c9D46a83511Dc64BD8A
Archive: http://archive.is/Fscux#msg52293158ETH-address: 0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c
Archive: http://archive.is/wip/BNIbbThe following transaction showed that the
BountyQueen sent a little amount of ETH to his altaccount
Alamin1955’s Ethereum address.
TX ID: https://etherscan.io/tx/0xde5f5d0f9a8aa1b2393fa01c223c91a073db00e40317d4f38637bd5209010ef8ETH Address (ERC20 support) : 0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4
Archive: http://archive.is/9Pv4q#msg53992675TX ID: https://etherscan.io/tx/0x50ae4931e689d4ddadfe7b57cab33c36847e11d32fbbb38a7fd4bed8bb67b690Eth Addtess: 0x4473fA76730d5c99dBA999eF7448CC8475503c4A
Archive: http://archive.is/uPd5V#msg49354024TX ID: https://etherscan.io/tx/0x74b042c5bb3af39e654e3ef1cb1b5a45b334f1b730ff2d8ecda661e5ce63517aETH (ERC20) Address: 0x28B92E241793Ff3a94DcF1Fa328FEDa9036A0Cf4
Archive: http://archive.is/tqi4G#msg53992357Now let's look into
EmmaLory position along with Ethereum address in the spreadsheet of BMY.Guide bounty.
We can see
he enrolled with
0x6743548743D43d2F65afd5a944EDA046853a7D43.
Alamin1955 enrolled in the same campaign with
0x24ce7c186eC37a8F46e94c9D46a83511Dc64BD8A.
CrisTofar participated with
0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4We can now see for the purpose of stacking up all the rewards from BMY.Guide bounty this
user used
0x9a35c415672e5b3cb45ec501291df13e9d44bd6e wallet address.
We can see
Alamin1955 sent GUIDE tokens to that address.
TX ID: https://etherscan.io/tx/0x981691c8cda89e3ef308c4d09e3b2b756757dcfbb39007e8c06f49ccc3267827 Now we see transaction of GUIDE tokens from
ariyanmizan7460’s account to the same wallet.
TX ID: https://etherscan.io/tx/0xfb1552a9ca00adc5e235e0f518aed94ac707a51ad018f73b1e069f38b5640d78Again from
CrisTofar’s wallet!
TX ID: https://etherscan.io/tx/0xbc0bf3e4fef6acf937b2d0e75ae87ac225233220b0afbc1c5f02fc9c6b2c3453EmmaLory also sent GUIDE to that particular wallet.
TX ID: https://etherscan.io/tx/0x45664573f60c4c536695475f394fc57bac712ecfe8049119246a2a17169f1f4fNow
he finally dumped all the tokens on Exchange on the same day.
BMY.Guide Spreadsheet: https://docs.google.com/spreadsheets/d/10YRovPpaHfN2n97hpKXVe9ct_Yq4_GHBRhaHQ-39avs/edit#gid=1549706203Now to further show how those accounts are from the
same owner we can see the following 2 transactions on the same day and at the same time where 0.00045 eth was sent from B
ountyQueen’s wallet
0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c to
0x4736cbc66b6b2d3BeefE1546545dc12642765ba9.
TX ID 1: https://etherscan.io/tx/0xb8b4c2482e976fbc27f2b9e13e63a81955c66761b71ec65629192f9f2c0f5c29And transfer of 2676 HUNT tokens from
EmmaLory’s wallet
0x6743548743D43d2F65afd5a944EDA046853a7D43 right after 30 seconds.
TX ID 2: https://etherscan.io/tx/0x2361cb4e76169d8fbb850e0182bf69df14858e802b7192ea54fb525419f7fcf4We can find out more transactions between those
connected wallets/b].
0x6a536d81134b82113d6c2f65adb7d505aab5f6f4 to
0x17a7d7901efa673148f205E735540E3abDD63917 for XNS tokens.
TX ID: https://etherscan.io/tx/0xa05cc393528e4d322fb6ab2d24bc84389caf20a0c1b97158512059416f90b6a9More from
0x4f21994aa7669c31fb84386e07acdd678d0be97c to
0x17a7d7901efa673148f205E735540E3abDD63917 for XDB tokens.
TX ID: https://etherscan.io/tx/0xc927c9d1ccce0c524c05c423f20cadea484742bf9620bf760878c810f2630014Transfer of ETH: TX ID: https://etherscan.io/tx/0xc03d4c635d22360490fcfa6bac5ebc802cfe500d62bd71634b199ea7c6696c80From
0x6a536d81134b82113d6c2f65adb7d505aab5f6f4 to
0x17a7d7901efa673148f205e735540e3abdd63917 for transferring of PNG tokens.
TX ID: https://etherscan.io/tx/0x71e41ec9b14b6d37e5b54e8062a0aee952f9e8d63157700a9fbb627f7f5b6cd7Now we find
CrisTofar's
0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4 countless interactions with
BountyQueen’s wallet address
0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c.
Now again we see this
user created a new wallet address
0x91700094be6E42F4A590a0875097B53574ED0Cab for stacking up a couple of more tokens.
BountyQueen sent his Sessia from
0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c to
0x91700094be6E42F4A590a0875097B53574ED0Cab.
TX ID 1: https://etherscan.io/tx/0x72890ee1b2a05fff93376a07349e1af5295918cc83cce78a691dc61980d56468Transfer of NOBS tokens from
Vince44's
0x4473fa76730d5c99dba999ef7448cc8475503c4a to that wallet address
0x91700094be6E42F4A590a0875097B53574ED0Cab.
TX ID 2: https://etherscan.io/tx/0xb7b4228ba97c7d43072c60f49e7b282d6356e23d60025d194805ba23d564ecfeNow we can see from Jinbi bounty thread that the user named
rakibul1364 (Banned) used to post and participate in various bounties with the same
ETH wallet address
0x4473fA76730d5c99dBA999eF7448CC8475503c4A which
BountyQueen later used. This proves it’s a ban evasion.
Bitcointalk username: rakibul1364
ETH address : 0x4473fA76730d5c99dBA999eF7448CC8475503c4A
Archive: http://archive.is/GjzAW#msg36126303Connection between Vince44,
rakibul1364,
BountyQueen: TX ID: https://etherscan.io/tx/0x74b042c5bb3af39e654e3ef1cb1b5a45b334f1b730ff2d8ecda661e5ce63517aThen if we go deep then we see this user has another Bitcointalk
newbie account created back in April 2019 ready for enrolling in bounties anytime now. The following transactions prove that he is indeed the
owner of the account.
First he sent some Ethereum from
0x4473fa76730d5c99dba999ef7448cc8475503c4a to an Ethereum wallet
0x4dfe0ae260b563e48124da31613f1b3354ceffef which he used for Rallyapp Bounty campaigns on Bounty Portal!
TX ID: https://etherscan.io/tx/0x5616a3cb5daf91e6936ad275476014a7508069a697ffd368224aecbab12fcca3Then he used the gas fee for dumping Rally Coin on exchange and used rest of the ETH for activating a new ETH address
0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2!!
TX ID: https://etherscan.io/tx/0xb10836b5ce0bf7d5e14b46e40c0730c8c0f66e778330b0b1b7f0f1d48a3918b5Now we see the
owner of that wallet address is another newbie account!
ETH(ERC-20) Address: 0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2
Archive: http://archive.is/w2kPe#msg51920933Now I am very surprised that
0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2 address is keep tracing back to already proven altaccount user
Huraia and
tamim101001 but none of those accounts have been tagged or red trusted thus far.
Reference:The user named
tamim101001 has already a couple of accounts and as pointed out by
Yoshie last year, the user
tushartamim has already got a ban but that has not stopped him from using other accounts. 2 more accounts are connected to this user. Proof that it's a blatant ban evasion in below:
1.
Huraia 2.
tamim101001Related Addresses:[b]ETH :[/b] [color=red][size=10pt][b]0xD4129dF9AA9903fB0857511e9D179E244776c0Dd[/b][/size][/color]
[b]ETH :[/b] [color=red][size=10pt][b]0x319d7ee4fC14979c67366A2D8B43Aeb093D661EA[/b][/size][/color]
Proof of Connection between those accounts and tamim101001/Huraia:https://etherscan.io/tx/0x4d722c946251a51c7a295c3cfc2cf0682ca2c5444dca3d6b3f961a03f3758ecdhttps://etherscan.io/tx/0x749c7cb171c1c8ebfbe89f6f46b7f556932ed0884ccf073af0ffb03082ffeb6aEthereum TX: TX ID: https://etherscan.io/tx/0xdd43ca143a08cb3f365bef85cfac5342ef4cbfe36d3ca42231127b304d04e384Now the user
cryptoamirul10 with
0x0b09C7fbE1DBCBF3726d978F521FcA69F3e4545e is connected to all of the accounts mentioned above.
ETH address : 0x0b09C7fbE1DBCBF3726d978F521FcA69F3e4545e
Archive: http://archive.is/fIw2k#msg51806781We can see he used
0x319d7ee4fc14979c67366a2d8b43aeb093d661ea to stack up digitalbits (XDB), MiracleTele (TELE), (XNS) tokens.
TokenTXns: https://etherscan.io/address/0x319d7ee4fc14979c67366a2d8b43aeb093d661ea#tokentxnsWe can see a couple of transactions between some of the above wallets and already reported wallet address
0x319d7ee4fc14979c67366a2d8b43aeb093d661ea.
TX ID: https://etherscan.io/tx/0x204a1ea97eb828b46cddf5e9cd8391d95021e2222ca686b7ffe669401f42435aThings are not ending yet because here we can find out
another account with quite similar username of the previous findings. This time the cheater has created a new wallet
0xa7db6027b0f1461Fdb94fB0074a58afB1653D2a1, received XNS tokens from bounty and activated it by sending a small Ethereum from
0xD4129dF9AA9903fB0857511e9D179E244776c0Dd for paying gas fee for the purpose of dumping on CREX on Sep-06-2019.
TX ID: https://etherscan.io/tx/0x647be634292dc13f8cf83f13f242f56f0cc547f2ca5f3890c758f8f9f50dfad6At the same time he sent Ethereum from the mentioned wallet to
0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6 which is one of the wallet address of
cryptoamin26.
ETH address : 0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6
Archive: http://archive.is/v2RcS#msg50210331TX ID: https://etherscan.io/tx/0x5344937cd77ac2c0331c3d86a1bafdbfd8d57a9c532d4c952bfb13bdfe87f917This person has so much patience that he then created a new ETH account for enrolling/cheating in StiB bounty where he received $14.5 worth of tokens.
ETH address : 0x25e7b04d04114666c10dE6F8af8953Eb0746a681
Archive: http://archive.vn/vdCRf#msg53949601While a brand new account of Bitcointalk named
4Brothers enrolled in the StiB bounty with
cryptoamin26's
0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6 address. Though the scammer did not have any luck of getting StiB tokens in this wallet!
For Reference StiB spreadsheet: https://docs.google.com/spreadsheets/d/1GFC0KJ5woVzPvRZK4IkIQh7vPjpvK0VYVUtwQh4vVOk/edit#gid=2032150916We can see his connection with
LittleBoy10 account which has no post as of reporting this.
LittleBoy10 used
0x980Ce87b4cc3e64bDB494e96eA6641E491D6a483 for StiB campaign which is connected to
cryptoamin24.
TX ID: https://etherscan.io/tx/0x1b133042709c90c3b4edd432d281233e604b44dd3eefcd87550bcb48579cf67fNow guess what! We find out that the known cheating wallet address
0xd4129df9aa9903fb0857511e9d179e244776c0dd is connected to
0x1c21e40d197f3a48e961401756ca54d8efef7e5b which is being used by
Habibur1729.
ETH Address: 0x1C21e40D197F3a48E961401756cA54d8EfEF7e5B
Archive: http://archive.is/lrMYt#msg50546380TX ID: https://etherscan.io/tx/0x9f6f22de496a2cfdb4aebb8fcb2889670e86f45f11b091f7bce69d4aeda94eb3Now
Habibur1729's account is behind the user
emran113's
wallet too!
3 Accounts Connected:1.
hargila 2.
trickbdpro (Archived) 3.
tushartamim (Archived)Related Addresses:[b]ETH :[/b] [color=red][size=10pt][b]0xD4129dF9AA9903fB0857511e9D179E244776c0Dd[/b][/size][/color]
Now from the accusation thread by me against the user
Kakatua, I proved that
rashedul74064 is an altaccount of
Kakatua which has
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E ETH address associated with.
Now we find more StiB tokens transferring from that wallet to 0xFE76071A83D92A9cBc2F3B11Ea4cd41acd7B1477.
TX ID:
https://etherscan.io/tx/0x2e8bbd48219a3df3f8863b1230df7197e8f05c141ab7d6efdbefb68ef655c466Then we can find another Bitcointalk account is connected to this wallet.
Bitcointalk name: sojibrana77
ERC Wallet: 0x84C313562f671fF35d8330c462c82990bD86bc0d
Archive: http://archive.is/nXfus#msg52583089And then another altaccount of
Kakatua named
saju8090 also been used for sending StiB tokens to that special address created for stacking up StiB tokens.
TX ID: https://etherscan.io/tx/0x605f3ac218461f2c45d0789a993c737e3cff8694c0e967b12091906947281db5And then finally all the StiB tokens dumped on Exchange by the
user.
TX ID: https://etherscan.io/tx/0xf84dc7714b0bc9c2bb33e1481808fcb724f154a6a37b85b82751b44ab0a7ef27It comes as no surprise that
Habibur1729 account's has also the same owner of the account of
Alex Jahid because this scammer sent a little amount of ETH for paying gas fee when he needed to transfer Octus tokens!
Alex Jahid's Ethereum address: 0xab8b6803e61c82a773582cb45d313fd903562958
TX ID: https://etherscan.io/tx/0x25bdfc6f881159f1cd2b5ede33d91869d66ec438f9081acb8cd9a48598ed017fIf we keep tracking wallet addresses such as:
https://etherscan.io/address/0xd4129df9aa9903fb0857511e9d179e244776c0dd,
https://etherscan.io/address/0x5ac09f199b321ca92310148901ae3b0ce6622b0e, and
https://etherscan.io/address/0x7f9b9dfe29c1d7ec426567c116e021b419b19788 then we can find out how many wallet addresses this user has for the sole purpose of participating in bounties.
Miscellaneous:It looks like it is one genuine scammer who has got so much time in his hands to play around with many altaccounts, usernames, wallets etc. How do we get rid of such a massive cheater?
Now let's find out whether those connected accounts have sent
Merits to
altaccounts or not! All three
connected accounts CrisTofar,
Alamin1955,
EmmaLory have actually given Merits to each others for submitting contents in the Bitcointalk's 10th anniversary art contest. I personally don't have any problem if anyone gives merit to others for participating in a campaign dedicated to celebrate the forum's 10th Birthday. But isn't it suspicious that this cheating person has sent merits to his various altaccounts?
Archive: 1.
http://archive.is/B2yLu#msg531348892.
http://archive.is/9g0Ju3.
http://archive.is/9g0Ju#msg531356154.
http://archive.is/GxsK9#msg53139533Related Addresses:0x24ce7c186eC37a8F46e94c9D46a83511Dc64BD8A
0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c
0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4
0x4473fA76730d5c99dBA999eF7448CC8475503c4A
0x28b92e241793ff3a94dcf1fa328feda9036a0cf4
0x6743548743D43d2F65afd5a944EDA046853a7D43
0x9a35c415672e5b3cb45ec501291df13e9d44bd6e
0x17a7d7901efa673148f205E735540E3abDD63917
0x91700094be6E42F4A590a0875097B53574ED0Cab
0x4dfe0ae260b563e48124da31613f1b3354ceffef
0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2
0xd4129df9aa9903fb0857511e9d179e244776c0dd
0x0b09C7fbE1DBCBF3726d978F521FcA69F3e4545e
0x319d7ee4fc14979c67366a2d8b43aeb093d661ea
0xa7db6027b0f1461Fdb94fB0074a58afB1653D2a1
0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6
0x25e7b04d04114666c10dE6F8af8953Eb0746a681
0x980Ce87b4cc3e64bDB494e96eA6641E491D6a483
0xFE76071A83D92A9cBc2F3B11Ea4cd41acd7B1477
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0x84C313562f671fF35d8330c462c82990bD86bc0d
0x5ac09f199b321ca92310148901ae3b0ce6622b0e
0x980ce87b4cc3e64bdb494e96ea6641e491d6a483
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0xD16fC5fC14F6f629f07441ece92f7C264c9be70a
Quoting other Related Addresses:0x086d85d1AEBc7dd3B26493F267B0f8e01bC9de4b
0x7f9b9dfe29c1d7ec426567c116e021b419b19788
0xab8b6803e61c82a773582cb45d313fd903562958
0x8735Df8be03b3E454028F7375e7a4e5eDC478612
0x66cb2fbb2809d42cc84077914db8d05a66c0f78e
0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018
0xe40e76b981e40de1ac4044c479e1e34a695a00c2
0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5
0xD16fC5fC14F6f629f07441ece92f7C264c9be70a
0x510088496ebd87ef4783ea3175d1ee88cd121a8d
0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa
0x335FB382b5A151b55E09bFAC9f20D5F2937D272E
0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a
0x6173d37f0292327ebe607f650d5b08c0ae104d57