Author

Topic: Need DT members - huge bounty abusing and Manipulation in Cybermiles Campaign (Read 588 times)

legendary
Activity: 3010
Merit: 8114
Six years later, a few of these accounts have woken up (ones that were never tagged). There's a lot of evidence TranTrongit was a bounty cheater:

2 Accounts Connected
Accounts Connected: (Note: Banned shown in red / Inactive in Blue)
   
1.TranTrongit
2.gabriela1999

I confirm that the two accounts are linked. There are additional connections via blockchain transactions.

Proof:

TXID: 0x740fb257860b22c8a5ef5bdc38c6b77a7592679ee9fd390fe6a82e153d51b937
From:  0xf39eb9408f4f6f98974787420e6aaad1e2ad2c55 (TranTrongit)
To: 0x2996407b95512d62230dc510332a1dd75af4a044

TXID: 0xfc88faf48ba87ece70a3e6ce7c66584c321110ba791f77a72c65eee957f57491
From:  0x85b47a2cdd209475c6755c6dff4b4c488cb2c849 (gabriela1999)
To: 0x2996407b95512d62230dc510332a1dd75af4a044

Quote from: TranTrongit
BSC Wallet Address: 0xf39EB9408f4f6F98974787420e6AAad1e2aD2C55
archive: https://ninjastic.space/post/59265923

Quote from: gabriela1999
Smart Chain (BSC) Wallet Address: 0x85B47A2cdD209475c6755C6dff4b4C488cB2C849
archive: https://ninjastic.space/post/58736152

Roberttran has been banned, but they deleted any mention of addresses associated with them. However, you can see they share the same name on social media:

Reddit Campaign
Reddit Profile: https://www.reddit.com/user/Roberttran90
...

Week3 - 6/22/2018 - 6/28/2018
BitcoinTalk User ID: Roberttran
Reddit profile: https://www.reddit.com/user/Roberttran90
...

Reported for ban evasion
legendary
Activity: 2492
Merit: 1164
Telegram: @julerz12
Sorry for bumping this old thread.
I was checking my bounty campaign spreadsheet for possible alts and searching connections on accounts when I found this address: 0x469a49b82946A44be4D23EEEb6232C73fb120D62
Oddly enough, it was used by 6 different Bitcointalk accounts. One of them, Selja1977 was already tagged for having multiple accounts. (Proofs are on this thread itself posted by OP) which led me to think that the accounts below are his/her alts too.

Katem8184
Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/KUcjv#selection-11511.13-11511.55)

mr.Alex.Selkov
Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/mTdAs#selection-5257.0-5259.55)

Seljaal77
Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/P3YqM#selection-9507.13-9509.30)

seljalex77 <--This one is even a Full Member ranked account.
Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/U62dw#selection-6283.18-6283.60)

TrumpLineRu
Used 0x469a49b82946A44be4D23EEEb6232C73fb120D62 here: (Arhive: http://archive.is/j0qGx#selection-2521.13-2521.55)
member
Activity: 238
Merit: 15
good job! people must know true about this criminal krypital
member
Activity: 224
Merit: 21
Update on bounty abusers in Cybermiles bounty campaign:-

As I mentioned in my above post the list of bounty abusers are huge in cybermiles campaign and I will be going to continue exposing these abusers, in my survey of finding bounty abusers I have come across some merit abusers too.

CASE 5



In above image members marked in Yellow have alt accounts for bounty campaigns tientrong94, jennyhau
, hoaidieu, & thangveo

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0xF488453239F12A39dD6fa0d24EE08BF7e666B2e3

Reference to Abusing 1) https://ethplorer.io/address/0xf488453239f12a39dd6fa0d24ee08bf7e666b2e3
                            
Related address
Code:
tientrong94            -0x744d248e0b5fa026e328b0b58e978bb6e468b360
Code:
jennyhau               -0xee4d3bed0ac7e5f94a85f9ee5e5142198cf7e85a
Code:
hoaidieu                -0x1938379e96D249D41222921F52f3c6a513e8cF79
Code:
thangveo              -0x2d28b8b9c1437652e052f812a597eb406fb59cc0

# also merit sharing with alt account from @tientrong94 to @hoaidieu

CASE 6



In above image members marked in Yellow have alt accounts for bounty campaigns Cris John Pham, besun
also @besun1 & @besun2 does not exist on our bitcointalk forum still they got bounty rewards for signature campaign. I think these abusers can give us some information about manipulation in bounty rewards

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x32d59b824fd129c96727E0EC1d7e97DEBD1b0983

Reference to Abusing 1) https://ethplorer.io/address/0x32d59b824fd129c96727e0ec1d7e97debd1b0983
                            
Related address
Code:
Cris John Pham         -0x3C4961afDE6c8aE5439eF4520Cc1336Aab9DC1b4
Code:
besun                       -0xC5e4B0C0C6BEaFE0E6f25FE5f8a5F38709590e49
Code:
besun1                     -0x8579d45c88a00dD5E9f35304179EaA917c3f5116
Code:
besun2                     -0x20Cc0D5de74B4940B2752aB9588144fffd238985

CASE 7



In above image members marked in Yellow have alt accounts for bounty campaigns kazoubg1, gamerferfect
& wsxdrfv

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x1832B189499A5AE86A342F17BBFBE1CFa792283F

Reference to Abusing 1) https://ethplorer.io/address/0x1832b189499a5ae86a342f17bbfbe1cfa792283f
                            
Related address
Code:
kazoubg1                -0x84A0F2002216096F0fa12274dC856f5623c2Cc9e
Code:
gamerferfect           -0x833a36eB828E69A4817B5de9250D6A46a8B80ead
Code:
wsxdrfv                  -0x833a36eB828E69A4817B5de9250D6A46a8B80ead

# These guys were also involved in merit abusing gamerferfect
was acting innocent. Now, this bounty abusing case is the proof all these mentioned accounts are ALT account of each other.

CASE 8



In above image members marked in Yellow have alt accounts for bounty campaigns Roberttran, TranTrongit

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x2996407B95512d62230dc510332A1dd75AF4a044

Reference to Abusing 1) https://ethplorer.io/address/0x2996407B95512d62230dc510332A1dd75AF4a044
                            
Related address
Code:
Roberttran           -0xA4E875D812018D95AB0E7005e686632C40D2b53f
Code:
TranTrongit          -0x28d6A99C81265b5eC04eb4fe37c0B924c948CA48

# These accounts are also involved in merit abusing & looks alt accounts

proof  


member
Activity: 224
Merit: 21
~
This looks the same as something I am dealing with ATM. Roll Eyes

Take a look at this post:
Hello campaign manager.

I am currently involved in your signature campaign.
I'm at position 340 on the spreadsheet.
But my wallet myetherwallet was hacked. I have updated the new wallet code in my bitcointalk account profile.
Please update my new wallet address.
New wallet address: 0x5A4bD00192954c4B1460863CAC6DEB8eafD8FAb9
Address replaced: 0x609cbBa0792115d83Ac12883290C9F83a67e662b
Thanks very much !

@Windyby I wonder where CTRL+F this addy 0x609cbBa0792115d83Ac12883290C9F83a67e662b will lead to

So, this account is linked with one of the accounts above and all accounts are linked with address they all claim it is hackers address.

On side note, there is large number of "hacked" ethereum wallets and non of these accounts ever created topic about it. I know I would, because it would be logical to try to find the thief.
We have found a good way to link these accounts, and in my honest opinion they become smarter and easiest way for them is to say that they were hacked and to switch to new wallet before someone link their accounts.

I agree with you they give same excuses I was hacked I was intruded by some hackers etc, I have prepared my list till case 11 to expose bounty abusers and out of which I found 2 merit abusers too one of this merit abusers are already red tagged by The Pharmacist. I am on 7 day tour with my family will post more about bounty abusers when I will reach home on 7th may
legendary
Activity: 1932
Merit: 2272
~
This looks the same as something I am dealing with ATM. Roll Eyes

Take a look at this post:
Hello campaign manager.

I am currently involved in your signature campaign.
I'm at position 340 on the spreadsheet.
But my wallet myetherwallet was hacked. I have updated the new wallet code in my bitcointalk account profile.
Please update my new wallet address.
New wallet address: 0x5A4bD00192954c4B1460863CAC6DEB8eafD8FAb9
Address replaced: 0x609cbBa0792115d83Ac12883290C9F83a67e662b
Thanks very much !

@Windyby I wonder where CTRL+F this addy 0x609cbBa0792115d83Ac12883290C9F83a67e662b will lead to

So, this account is linked with one of the accounts above and all accounts are linked with address they all claim it is hackers address.

On side note, there is large number of "hacked" ethereum wallets and non of these accounts ever created topic about it. I know I would, because it would be logical to try to find the thief.
We have found a good way to link these accounts, and in my honest opinion they become smarter and easiest way for them is to say that they were hacked and to switch to new wallet before someone link their accounts.
legendary
Activity: 3528
Merit: 7005
Top Crypto Casino
And do you think what you say is true? Can a person make over 15 accounts in a week? This is ridiculous. It's only possible that they went broke into someone else's wallet to transfer the token on their purse.
Apparently you know absolutely nothing about bitcointalk.  Not surprising that a scamming bounty participant wouldn't read anything here and couldn't care less about what goes on in the community.  

There have been farming rings with hundreds of accounts, and enrolling them in signature campaigns is a common tactic.
I was intruded by others and took away everything I had tried to work on.
What are you trying to say here?  What were you working on?  Who intruded on you?

Also, please don't quote the entire scam accusation and all the images unless you really need to.
newbie
Activity: 54
Merit: 0
And do you think what you say is true? Can a person make over 15 accounts in a week? This is ridiculous. It's only possible that they went broke into someone else's wallet to transfer the token on their purse.
newbie
Activity: 54
Merit: 0
member
Activity: 224
Merit: 21


Cybermiles bounty campaign was managed by Krypital. After checking final spreadsheet I came across lots of bounty abusers and in the spreadsheet I found fake accounts which do not exists and coincidently have same BTT, telegram, twitter and facebook names which totally hint us towards bounty rewards manipulation & corruption

Here is the link to the final spreadsheet of cybermiles bounty campaign rewards https://drive.google.com/open?id=1qQMtIoF5YXJ88b8FbSiMuKxIHKJBW1bC81WRz3bE0FY

I will share here one by one bounty abusers which are not doing their bounty hunting in an honest manner.

CASE 1



In above image members marked in blue have alt accounts for bounty campaigns hieuvm1991, phuongthao96, bichphuong, kimphuong1988, Selja1977,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3bBC7c49b83Fb93D9eD2E4e80365D108f19ff35C

Reference of Abusing 1) https://ethplorer.io/address/0x3bbc7c49b83fb93d9ed2e4e80365d108f19ff35c#pageSize=100
                               2) https://ethplorer.io/address/0x103ba1e2f25029f95fa379125e6bcff76f2f525a#pageSize=100

Related address
Code:
hieuvm1991        -0x103Ba1E2f25029f95fA379125e6BCfF76F2f525A
Code:
phuongthao9      -0x4DeB348ABbF1A559C3DDEC9D99915A64e74c497C
Code:
bichphuong         -0xD53FF4d07870d5bfD02c6D39E4b39B39d0594F4e
Code:
kimphuong1988  -0x2b45f1528c74a228bcf9Ec491466a17A308aa193
Code:
Selja1977           -0xb24201F31144134C8432299A24Ef07802763C045

CASE 2



In above image members marked in Yellow have alt accounts for bounty campaigns Deubila, GangNamSK
, HSRP,

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0xA2539237Fd90b50BEC35aCd7d41816A550E75ACa

Reference to Abusing 1) https://ethplorer.io/address/0xa2539237fd90b50bec35acd7d41816a550e75aca#pageSize=100
                               

Related address
Code:
Deubila            -0x9D7eD4AA9E99C6b05e9cab71f0b33834c5CaA6bF
Code:
HSRP               -0xF67E951e9a1194DceBEeFfC7DF1Fef2E8551a608
Code:
GangNamSK     -0x51ACA61EFd0b9020353eaA9fD53040e3adB5849C

CASE 3



In above image members marked in Yellow have alt accounts for bounty campaigns Windybi, ngungoc130485

Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x3463934897d356B8659cBDFE15209e3bC3229105

Reference to Abusing 1) https://ethplorer.io/address/0xd9cf954b678e9a6bf997ae61a61b62f928e6dcb5#pageSize=100
                               2) https://ethplorer.io/address/0x151bc71a40c56c7cb3317d86996fd0b4ff9bd907#pageSize=100
                               

Related address
Code:
Windybi                 -0x609cbBa0792115d83Ac12883290C9F83a67e662b
Code:
ngungoc130485      -0xd9cf954B678E9a6BF997AE61A61B62f928E6DcB5

CASE 4 MANIPULATION

Fake signature campaign participants



Fake Media campaign participants



I cant find these members on BTT forum, telegram as well as on Twitter with their given details and the funny things about this fake hunters are they coincidently or purposely have same names for BTT Forum, telegram & Twitter accounts.Grin Grin. This makes questionable remarks and forces us to believe that the cybermiles bounty campaign have been manipulated or there is some corruption involved in bounty rewards. These fake guys who don't even exist collected 34000CMT worth 7400$ tokens & sent tokens to exchange.



Proof:-
As shown in above images all of them were in Cybermiles bounty campaign

Main Distribution address of CMT Tokens https://ethplorer.io/address/0x944e159639accda67b2808ca436ce52a6d81ce58

Main eth Address:- 0x45393b52678bb3381e39865Ab4b65c66d6f54746

Reference to Abusing 1) https://ethplorer.io/address/0x45393b52678bb3381e39865ab4b65c66d6f54746#pageSize=100

Conclusion:- I hope all bounty abusers will be punished as per forum rules. The important one is point 4 this force us to think there is corruption or Manipulation in bounty Campaign managed by Krypital. He must answer to this manipulation or corruption of bounty rewards as mentioned in Case 4, for all bounty hunters who were doing their bounty hunting in an honest manner of cybermilesbounty campaign.

This post will be continued as there are more bounty abusers to be exposed from cybermiles bounty campaign.
Jump to: