Author

Topic: Scammers using Profile of High rank members to join social campaign of UNIFINITY (Read 758 times)

hero member
Activity: 1834
Merit: 566
-snip-
The forum not moderated any kind of scam or bounty and everyone have no time for solving this.

The bounty have a manager and team project right? then they should solve it the best way to prevent the cheater for their own project. There is no guarantee at all a bounty without cheating, always has some cheater. But if the project hiring a good manager, at least the manager knows how to make the cheater not too much by limiting each application by using email or device also using POA to check and verify all entries.

If you want a bounty 100% without cheater, is impossible.
It totally impossible to 100% cheater free in the bounty campaign scheme because some bounty managers are not doing their job right and the issue to reduce the numbers of bounty cheaters that use high ranking members account information to register have been discussed and the solution decided then is the Proof of authenticity post (POA). But it amazed that some bounty managers don't even care about it.
legendary
Activity: 2660
Merit: 1261
-snip-
The forum not moderated any kind of scam or bounty and everyone have no time for solving this.

The bounty have a manager and team project right? then they should solve it the best way to prevent the cheater for their own project. There is no guarantee at all a bounty without cheating, always has some cheater. But if the project hiring a good manager, at least the manager knows how to make the cheater not too much by limiting each application by using email or device also using POA to check and verify all entries.

If you want a bounty 100% without cheater, is impossible.
member
Activity: 362
Merit: 12
In bounties spamming or cheating is now a major problem which should be solved in a constructive way. I think All High ranked users should discuss about it's solution.Moderators should make some rules which will be very restricted and anti spamming.
member
Activity: 420
Merit: 12
Globe-dex.com
That is very rampant today, I was also victimised by cheater before used my username and used random social media accounts then took the reward which unfortunately I joined without knowing that he registered my username first. Lesson learned because I didn’t check the spreadsheet after I registered was my mistake.

That's a very big mistake even when registering on a bounty it's always advisable to check your data on the shit to see if there is any mistake done just like that of BOUNTY DETECTIVE they made everything available not until bounty is over that's when the will start trying to figure out one or two members who has an issue regarding another Account who is using ones details to get the reward.
legendary
Activity: 2268
Merit: 1379
Fully Regulated Crypto Casino
It's something hard to pull off and not really effective because the address is brand new (no transactions to trace if it was marked as a scammer's address), and the scammer can also easily generate another address using HD wallets like Metamask or Myetherwallet when applying for another campaign using the same usernames
Actually you are right but reporting it would let anyone know that their address has been used for scamming. Its gonna be hard to catch these guys because they are just depending on the assumption that the account they used are also joining the campaign they trying to get some tokens too. Maybe some manager missed it if they were careless and too bad the one work hard for pormotions only scammer will received their rewards.

What I can think the reason behind it only the campaign manager didn't work properly or handled by an unprofessional manager.
Correct. If those works have been credited then only scammer will gain the rewarda, but since they are randomly doing that they are also not sure but there are cases probably that tokens went to scammer address instead of the one work on it.
sr. member
Activity: 1008
Merit: 308
I really don't understand why people enroll campaign with random social media accounts, how they will complete the tasks if they not the owner of that accounts (except they already bought those accounts)? What I can think the reason behind it only the campaign manager didn't work properly or handled by an unprofessional manager.
legendary
Activity: 2338
Merit: 1261
Heisenberg
The only way can do about this. Is just report those address and post as a warning. I do hope those address once reported as scam or alleged used for scam should be lock by ethereum network but this is far from reality to happen soon or never will due to the nature of blockchain.
It's something hard to pull off and not really effective because the address is brand new (no transactions to trace if it was marked as a scammer's address), and the scammer can also easily generate another address using HD wallets like Metamask or Myetherwallet when applying for another campaign using the same usernames
sr. member
Activity: 1540
Merit: 420
www.Artemis.co
That is very rampant today, I was also victimised by cheater before used my username and used random social media accounts then took the reward which unfortunately I joined without knowing that he registered my username first. Lesson learned because I didn’t check the spreadsheet after I registered was my mistake.
legendary
Activity: 2268
Merit: 1379
Fully Regulated Crypto Casino
How you will investigate the facebook and twitter account if the scammer just submit a random profile there by collecting from internet?
We cant do that for those social media accounts. Only the ethereum addresses are the only link to those cheaters. Im pretty sure that even the owner of these social accounts have no idea that they have been used for these kind of fraud.

But problem is the addresses are also brand new so there is no way of linking through transactions to find out who actually the person behind this is.
The only way can do about this. Is just report those address and post as a warning. I do hope those address once reported as scam or alleged used for scam should be lock by ethereum network but this is far from reality to happen soon or never will due to the nature of blockchain.
legendary
Activity: 2338
Merit: 1261
Heisenberg
A lot of accounts should be investigated here, we can trace who owns those Facebook accounts or twitter accounts linked to a specific account here in Bitcointalk and tagged all these accounts, it's bounty manager's fault why this thing happens, he should know that there, a verification post is important so the entry can be validate now they have to fix their mistakes.
Everything used including the social media usernames and profiles are just random. It's only the Ether addresses that may be the only actual thing that belong to the person behind this... But problem is the addresses are also brand new so there is no way of linking through transactions to find out who actually the person behind this is.

legendary
Activity: 2464
Merit: 3878
Hire Bitcointalk Camp. Manager @ r7promotions.com
Got rejected already mate. I didnt know that your a girl dude based on your facebook profile Royse777 Facebook Profile  Grin damn scammers didnt know how to recognize name and just add random facebook.
LOL I am too young there and I bet my fingers are not fat as I have :-D
legendary
Activity: 2436
Merit: 1189
Need Campaign Manager?PM on telegram @sujonali1819
A lot of accounts should be investigated here, we can trace who owns those Facebook accounts or twitter accounts linked to a specific account here in Bitcointalk and tagged all these accounts, it's bounty manager's fault why this thing happens, he should know that there, a verification post is important so the entry can be validate now they have to fix their mistakes.

How you will investigate the facebook and twitter account if the scammer just submit a random profile there by collecting from internet? I visited some profiles few minutes ago and see most of the accounts that has not a crypto related post in the past. So that means the scammer just put it and he/she also does not know the real user of that facebook/twitter accounts. So I think you can not get any good result by this way.

Only The bounty manager can reduce this. And this the bounty manager responsibility. When all bounty manager will be aware of it and reject all the suspicious applications then they will automatically stop this ways to scam.       
sr. member
Activity: 2030
Merit: 269
A lot of accounts should be investigated here, we can trace who owns those Facebook accounts or twitter accounts linked to a specific account here in Bitcointalk and tagged all these accounts, it's bounty manager's fault why this thing happens, he should know that there, a verification post is important so the entry can be validate now they have to fix their mistakes.
legendary
Activity: 2268
Merit: 1379
Fully Regulated Crypto Casino
Fck it, i'll just tell BM to change the address to mine, and let the scammer do all the work
Good idea since they are fond of using other's account why not change to users address and let these scumbags cry for the reward their work for.

Some bad guy used my name too. Nuke them !!! :-P
Got rejected already mate. I didnt know that your a girl dude based on your facebook profile Royse777 Facebook Profile  Grin damn scammers didnt know how to recognize name and just add random facebook.

It's not the first campaign I see my name in, like this.
Glad to see they're nuked now, at least the campaign manager did react pretty fast after this was uncovered.
Yes. Probably they already recognized they were rejected cause if no one noticed they may add some more participants account.
full member
Activity: 1028
Merit: 144
Diamond Hands 💎HODL
Seems like the manager already rejected a lot of the participant. My name is on the list and the Facebook profile that is link is not mine so clearly, there is someone using a lot of our profiles. The application should be posted in the bitcointalk account so that the manager could confirm it. The registration for the Facebook campaign is just using google docs and anybody could use anyone username in bitcointalk the manager should know it already but it was fine since a lot of participants were rejected already. It seems like they been doing this for a long time or maybe only by one user is doing all of the applications that are rejected. Anyway, it guesses it didn't work at all but it was not great. What a great find the bounty was just June 2020 so a lot of people could go and attempt this its better that we are aware of it if someone attempts it again. Also, I think the proof message would be enough to be accepted as an applicant.
legendary
Activity: 3668
Merit: 6382
Looking for campaign manager? Contact icopress!
It's not the first campaign I see my name in, like this.
Glad to see they're nuked now, at least the campaign manager did react pretty fast after this was uncovered.
legendary
Activity: 2464
Merit: 3878
Hire Bitcointalk Camp. Manager @ r7promotions.com


Thank you , Our Bounty team is now working on checking all valid participants. This is the reason why Authentication post is required. Ensuring that no cheaters will be accepted on this campaign
And this encourages spamming. As loyceV said, ask them to add their address in the profile. Some bad guy used my name too. Nuke them !!! :-P
legendary
Activity: 3290
Merit: 16489
Thick-Skinned Gang Leader and Golden Feather 2021
This is the main reason for using proof messages.
I'm pretty sure the main reason is bumping and spamming the thread. Otherwise it could be handled by PM, or via the user's Bitcointalk Profile.

Thank you , Our Bounty team is now working on checking all valid participants. This is the reason why Authentication post is required. Ensuring that no cheaters will be accepted on this campaign
Why don't you let them post their address in their profile? You can even use Google Docs spreadsheet to scrape the data, so they'll be instantly accepted or rejected after joining. You'll save yourself a lot of time that way, and reduce spam on the forum.
hero member
Activity: 2086
Merit: 761
To boldly go where no rabbit has gone before...
Fck it, i'll just tell BM to change the address to mine, and let the scammer do all the work
copper member
Activity: 2940
Merit: 1280
https://linktr.ee/crwthopia
I appreciate you OP for taking the time to compile all of this. I was surprised when I'm mentioned in a "Scam Accusation" Board. But after reading the whole topic, I understood that my profile was applied to be used there. Unfortunately, the manager there is quite negligent with that. I'm not sure how I got there but there's no authentication post from me and I was still posted in the spreadsheet. I just don't understand how it happens to be there though.

The Google Sheet is in View Only. Unless the editor of that is also part of the scam or something. I don't know.
legendary
Activity: 2268
Merit: 1379
Fully Regulated Crypto Casino
Do you think how many dummies accounts in social media this cheater had?
Not just him, even a lot of users have different set of telegram and email attached to its high rank accounrs. Based on the current spreadsheet, the facebook participants are 422 and for Twitter is 404. But if we are going to compared the actual proof of authentication from real applicants, the thread is only three pages utmost. So there is possibility that he/they operate above 200 to 300 dummies more or less but chances it could be more


Just rough estimation. Its not helpful to note those telegram username cause they can just changed them anytime. But its worth doing to note those emails used and ethereum address so there are reference here in forum just in case they do it again on other campaigns.

Will comply too those email and eth address used
legendary
Activity: 2492
Merit: 1232
Yeah right, I saw this kind of fraud way back year 2017 when I was active joining in some bounties campaign.
The only solution to this is to verify the authentication posted by the real account because not only twitter and Facebook are fake there, they also used a fake telegram account.

I saw mate @CryptopreneurBrainboss Bitcointalk name and profile there.

Which is the real telegram account of @CryptopreneurBrainboss is, @PedroBrainboss that you can found under on his Bitcointalk profile.
Good thing my name wasn't there.

Do you think how many dummies accounts in social media this cheater had?
hero member
Activity: 2926
Merit: 567
I'm sure these are old cheaters in the forum, those caught should be tagged I remember back 2018 my signature stake was awarded to a cheater because of triple entry using my Bitcointalk account with three different eth address in the entry, cheaters will always cheat if they find a way to do it, it's either you implement verification or proof of authentication.
hero member
Activity: 1190
Merit: 511
What Happened:
I just stumble on the spreadsheet of Unifinity Bounty campaign its like most of the high rank used to fill up form for registration. Now this is really alarming. I do hope the manager should be able to reject the application of those scammers who used our accounts for applying on their campaign.

Bounty Thread: https://bitcointalksearch.org/topic/bounty-unifinityph-bounty-programs-1m-uny-tokens-50000-5252718

Profile of users that has been used on registration. For those who will be on the list just wanted to inform you that your profile accounts are used for cheating. Check the spreadsheet:

Code:
https://docs.google.com/spreadsheets/u/0/d/1Ov2kZAr_jV0MUlw7HWGJGIZeiEW-48T787bCPPd2BF0/htmlview#

Search your name on Facebook and Twitter sheet. You'll see the magic and your facebook and twitter dopple account. Sad

List of some used profiles for registration:
Code:
Psynthax
Seneka
Landak
Mahanton
arwin100
bittraffic
terrific
barnes13
sulendra12
fuguebtc
Ziskinberg
BChydro
bitkanu
Edraket31
dustboy
$crypto$
conected
tazmantasik
Zackgeno96
BitcoinTurk
Coin-1
CoinEraser
Bttzed03
Bthd
barnes13
Casdinyard
Free1bitco.in
JCviggen
Murat
Anonylz
masulum
livingfree
StephenJH
cryptoaddictchie
btcltcdigger
Coin_trader
Divinespark
BitcoinPanther
gospodin
CryptopreneurBrainboss
Halab
electronicash
crwth
bitcoinst
Hydrogen
molsewid
john1010
Rodeo02
ryzaadit
stomachgrowls
ShowOff
taufik123
blockman
MWesterweele
mirakal
babo
pealr12
CjMapope
cygan
kingcolex
DarkDays
Wapinter
bct_ail
abel1337
Vispilio
jakelyson
asriloni
robelneo
TGD
davide72
bitbollo
NeuroticFish
iv4n
dannybrown
Gozie51
Bitcoinislife09
n0ne
Becky666
ice18
turkandjaydee
Kotone
Furious 7
target
madnessteat
shinratensei_
Taskford
DoublerHunter
molsewid
bitbollo
layer1gfx
Royse777
bitcoinst
joeperry
Leviathan.007



Note: many more but to many to add and only mentioned those I seen active here on forum



Now this is really dissapointing. Some reputable accounts has been used for this. I will compile those addressed that has been used and reported it. I know there is a way to report ethereum address used for cheating

Now Im calling the attention of the bounty manager Edraket3 to inspect the applications cause if you check the thread there are no application on these high rank accounts.


Scammers ethereum address
Code:
Will work on compilation later for reporting



Thank you , Our Bounty team is now working on checking all valid participants. This is the reason why Authentication post is required. Ensuring that no cheaters will be accepted on this campaign
member
Activity: 273
Merit: 14
The Bounty manager will see to it that all the given list will be check and all the participants who tried to cheat using an account that is not them will be disqualified.

legendary
Activity: 3080
Merit: 1353
Good that I'm not in the list, but damn, this has been practices in late 2017 and I thought bounty managers or should be all aware of this kind of fraud. And yet it is already 2020 and those cheaters still find way to use this old but effective fraudulent practice. I think we need the bounty managers to check everyone of his participants.

And thanks to the @cryptoaddictchie for a great job catching them. Checking the profile of the bounty manager, it seems to be his first time to handle a campaign and probably this is the reason why many cheaters where able to get in. But this is not an excuse and I do hope that he will reply on this thread.
hero member
Activity: 1778
Merit: 722
Leading Crypto Sports Betting & Casino Platform
I'm also there...  Angry
Thank you for let us know @cryptoaddictchie. The bounty manager should be more careful about these stuff. That's why they usually ask for proof of authentication.
hero member
Activity: 2926
Merit: 567
This is the main reason for using proof messages. Sending proof messages is a rule for this bounty but i didnt see a slot for writing proof link on application form. This explains why they chose them to attack. We can find cheater's username if we check ethereum adresses (maybe).

Quote
POST IN THIS THREAD :
Code:
##PROOF OF AUTHENTICATION##
Bitcointalk Username:
Telegram Username :
Campaign :
Spreadsheet # :
UNY Wallet Address :



I wonder why they did not do that it was a big issue in the past when people were using other people's account so they can cheat bounty campaign, this is what happens when you have an incompetent bounty manager, not doing the right thing, this campaign will be messed up.

There's a possibility of double-entry in the article and video creation and even in the signature campaign
legendary
Activity: 3178
Merit: 1054


i'm also there nay!

i really think bounty manager should check it all to see if we have some post of authentication and if we didn't post an authentication, then we need to be taken out of that sheet.

the graphics of the project seem very unpro. this must be a scam project, just look at the team members. i'm a Filipino and this is a Filipino project yet the team members of this project aren't even Filipinos.
legendary
Activity: 2352
Merit: 2592
Chancellor on Brink of Second Bailout for Banks
This is the main reason for using proof messages. Sending proof messages is a rule for this bounty but i didnt see a slot for writing proof link on application form. This explains why they chose them to attack. We can find cheater's username if we check ethereum adresses (maybe).

Quote
POST IN THIS THREAD :
Code:
##PROOF OF AUTHENTICATION##
Bitcointalk Username:
Telegram Username :
Campaign :
Spreadsheet # :
UNY Wallet Address :

legendary
Activity: 2268
Merit: 1379
Fully Regulated Crypto Casino
What Happened:
I just stumble on the spreadsheet of Unifinity Bounty campaign its like most of the high rank used to fill up form for registration. Now this is really alarming. I do hope the manager should be able to reject the application of those scammers who used our accounts for applying on their campaign.

Bounty Thread: https://bitcointalksearch.org/topic/bounty-unifinityph-bounty-programs-1m-uny-tokens-50000-5252718

Profile of users that has been used on registration. For those who will be on the list just wanted to inform you that your profile accounts are used for cheating. Check the spreadsheet:

Code:
https://docs.google.com/spreadsheets/u/0/d/1Ov2kZAr_jV0MUlw7HWGJGIZeiEW-48T787bCPPd2BF0/htmlview#

Search your name on Facebook and Twitter sheet. You'll see the magic and your facebook and twitter dopple account. Sad

List of some used profiles for registration:
Code:
Psynthax
Seneka
Landak
Mahanton
arwin100
bittraffic
terrific
barnes13
sulendra12
fuguebtc
Ziskinberg
BChydro
bitkanu
Edraket31
dustboy
$crypto$
conected
tazmantasik
Zackgeno96
BitcoinTurk
Coin-1
CoinEraser
Bttzed03
Bthd
barnes13
Casdinyard
Free1bitco.in
JCviggen
Murat
Anonylz
masulum
livingfree
StephenJH
cryptoaddictchie
btcltcdigger
Coin_trader
Divinespark
BitcoinPanther
gospodin
CryptopreneurBrainboss
Halab
electronicash
crwth
bitcoinst
Hydrogen
molsewid
john1010
Rodeo02
ryzaadit
stomachgrowls
ShowOff
taufik123
blockman
MWesterweele
mirakal
babo
pealr12
CjMapope
cygan
kingcolex
DarkDays
Wapinter
bct_ail
abel1337
Vispilio
jakelyson
asriloni
robelneo
TGD
davide72
bitbollo
NeuroticFish
iv4n
dannybrown
Gozie51
Bitcoinislife09
n0ne
Becky666
ice18
turkandjaydee
Kotone
Furious 7
target
madnessteat
shinratensei_
Taskford
DoublerHunter
molsewid
bitbollo
layer1gfx
Royse777
bitcoinst
joeperry
Leviathan.007
yurez
bobita
gandame
Dhoe
n0ne
xZork
bittick
msarro
Aivaryamal
Golftech
lobo13hf
X-ray
culuuton
AlyattesLydia

Note: many more but to many to add and only mentioned those I seen active here on forum



Now this is really dissapointing. Some reputable accounts has been used for this. I will compile those addressed that has been used and reported it. I know there is a way to report ethereum address used for cheating

Now Im calling the attention of the bounty manager Edraket3 to inspect the applications cause if you check the thread there are no POA application on these high rank accounts.


Scammers ethereum address
Code:
0xF1C33614671C00d5ba30a3d1718B6f00f9884eFe
0xBc35b06E2658D15a114CC8BE729716806292be54
0x14f2321d8Ac3Eda3ff8BF70197e4E2d14e24Ed11
0x2f324A92E5F2FBD1e0E60F5f04B380D2b99C9196
0x02C8858163210CCf571da3f61A2bdF283c812cd0
0xaC514835d426ce06A18b93d862926607524D7273
0x2D8eBA8B30970e020019944D688FC9da4C80D24C
0x78cA8D7A0210806597C096F4c4d411F0d5f79535
0xf8Bb88e207Ab0a29345DE6E7A75DC9201C28ec15
0x3BE3528e7686bb1cC1355073B13627cc0a3d3971
0x28E6e60D569D1AD48540d6A7BA32983220bd8731
0xc29608F0a7C41f75e43975d078D2858F99ba02C2
0xfC6242838ad7915cAC92b2FbFc75601201BE0637
0x9eE5909C3f7B57C71366726F5b13A4aB8871f6CF
0x2687Db0F11903aC7834007646FD74df19E5062A7
0xbF7B2f88D20d805DbbB014E3B22cF001c26caed2
0xA465688e69436368FCF1682892a14EC97A56E774
0x7F8E957205a632b268d0418B1234fD37f1C2E578
0x23C9E5e1263cfE6BC0F4815a3654B939Bb7Fc872
0x0D8F1df666bAaEFcf8f0Ba67ec2fE73a16246F35
0x964aB9656b043aE1d5a47f115121B4D6F59c6b7e
0x3F746C46b2220Ad86d4AD56d2c8278Cf6d461096
0xed2D4BA86fe82153Afd1Ed4969dB15f07Fe983d7
0x5B5c0968631712FBcB2FC685c9FCA4A231BA369A
0xd05AeBB5DbC3d2C7F967c7b141D6149B5F8Ea722
0xa2855de86a64256Ba60995Eb097A5B5DdFD2043c
0x1D19d2285eA0e7B02AE67599484887E47B03Ba90
0x25173EA5f38933aa2AB3D1eB5Cb1b21f0671346E
0xdb32cBd4000E88fA906472Cdc0AA825c404c97ac
0xCA4291db85e22BCe2A63a514485D85a47c2b99B4
0x902E08c479bA908e98337E5191184F8c13212773
0x28661f2936A8e8c76540c4cd334aEF449592ad11
0x2bf1a9EDceFFA19df1Cd76A250BC9f8951114F9e
0x2e1B5B3ed26a334e576f2B29862f09B72D509C18
0x174aB99DB6CF5D890F6056FFa31e262CF9D753ce
0xBa78154C82a0D5B837EcB1B97D695b54B3936012
0xF20e826A8aCd243929EB7299c0207B83ba21FeF3
0xF7913550D3800A3D758445D0242E109B89469B86
0x42B74C089179D3c81895648A042164da070a264b
0xa15A73B1232d58e4999ca3D075F6841F5be51219
0x69afC1F8179dFf9BC6b6AA9B0d6891Ba8a623D77
0x4051F444fD03868baDc85D5a92e05C75024a065e
0x0D14097d5A0ceAFcCAFCF8FdA04FDCD4BA3dB83B
0x77f3C13fDA77FF7E5CBeF62cd33E373f36939a58
0x684d121BaD3C61d1CadE9Bf0a55ca0816b673bC7
0x6950d1a0886CB455b5b12B545B92b1cb72183f17
0x2f833A393238B402762F3D7e71d896C1a751496C
0x6b9eb8D6Dfb38cAeB4D7da32d197c020c325E1f0
0xcC0587c707021Ed3c0CE42c659872C308a178848
0xaD2ce11A7967Bf6DF9144EC81acf84F25532C73B
0x7Fb98f1ad23Bdb5074aA6EC7A17b413Cf544A82E
0x5b1a5F7A583a3e4d72b832E4A71C6c281173879b
0x0b8882DFB533F771793E0437e80CCc5F2bEBB753
0x2448a9A13236e7B45d44a8000619EeD45B99144F
0x44D426Cd68AE88b8D39b7249ED93595D2b01086b
0xb30f976E7246D4E3e1B229b67fFA6B3BE55E3160
0x2d3E0c221502736e033199687B0a9517F889E168
0xB19611dF7Df02795D638a4e150DFeA004005230e
0x34529c2dC0379724C92E4824E3ED31F3E2d17968
0x89861DB18cBD77E6C3c49b5C1Cc8F59B516B4229
0x7ddB7c8B3B52613189E9B213f590C0A9a80CCD23
0xC860e49b083B831aB7185b9728757421a943373f
0xb6C3EF5758a502E2C17147A3bF5F75A9F48AF96B
0x049FB743C203b8F4591558ba3de9fAadf1396EED
0x87C422c8DAcFcC8a41942d78e50f86B2336e1695
0xBF7C94C08888F96283FC3a4334776939d2a64cd3
0x459d94f6AFe6B3b2012DEEC5bFebe561B9C48152
0xe36D70c5D6EC14364398A371B53f62B87706cd58
0x4831091E7f0c6E197B1c607AE46580110F6490fC
0x7343a4963EaEdE59eEE425F7E947831BCca4358f
0xf1b7f68e9Fb8C15B66C0B8b15da5c3580d7F4118
0xF888170FBA5718574C7027Cc19619Eb4e6A373a3
0xaF0A8E86424D3fBc31c9253D139250e5909714e8
0x9baC3C4f29212DD17C3f0f6A620c777AdA24aD8c
0x9Bd9ffcFF8b33b020164ba1c31C2aE208a3C2767
0xF76CBac14B0641318E24d2c05d7F528BCFF10FA2
0xaBB7A5225eC91FD9be33dBE86955529fE60eEC66
0x537b37be8E1EAC6978bfb14C89BEfAc4C9560721
0xD736A7Fe72C08e2E7e5bb6a15712e48e118D764B
0xb1051c934DDd3dA2Ca1Cf7d955A3e5Ff345b9F97
0xE812f45B21b97E692FbFBCb5469f19e8a5B5ECe7
0x2C642eb613552B87829700e1D807FE161a989d88
0xD0DFA84335032E10abA9837E1b6d0437cF22b3A0
0x27eb8915Cf3b0E823f123f1E9f4cf0F4670Ce791
0xd5Cb74f71a91a9f7c1941C8B4E49768ab50aadb8
0x9Ce38394d80808855aBe42c420Ea0C94E7618b37
0xB7Ed74512111d58EB49aE81ce4B54D73053cfA48
0x47FBef656177b265130c22A192bf1C45f12C81c8
0x3A19fDC02dF688980695E9e55A27423B99Da4cf5
0x8C722e710bfcD5f3cEC9123716877d856822d77d
0x079ff25120ab273654a0ad152519AC5548eB0BDd
0xB193F93d81FF1517f61F4273e8AF7c65f85D639E
0x29F1896FCEe6E3f9B900d82f44F36F2C71F7e793
0x06a9aaef04b2593687Ff507E9c6b9061511a8B5d
0xf76E7E8914249fD9704eDdA544EeAE4A02dbB556
0xFf0E868A4E68fc5A6Bd00dfE4567fa62a39C4A72
0x5D8F032A1874DC145E43e1b73B2910E912c6252d
To be added more..

Most of the participants have been rejected so far by the bounty manager of this campaign
Jump to: