Author

Topic: Tens/hundreds of accounts - Bot malfunction? (Read 346 times)

legendary
Activity: 2674
Merit: 2965
Terminated.
October 26, 2018, 12:09:30 PM
#6
Could it be...ICO bumping service? Bumping bounty to keep it on top for more promotion?  Undecided I mean, they all applied to bounties with social media accounts which don't exist, except telegram which is inactive anyway, with invalid eth addy's:
The team doesn't even have a proper ANN thread yet; it's an actual startup based in China, unlike most ICOs. They are, however, pretty naive when it comes to Bitcointalk. Someone could have tricked them into hiring such a service under false pretenses (they were tricked already regarding something else, but I'm not going to go into the details of that). Since I don't know what exactly the cause of this is, I can't exclude any possibilities. However, given what I just said and my experience with my contact I am in strong belief that this isn't the case.
Keep in mind that it is also possible that an enemy of Vena or me could be doing this. The Telegram campaign was under attack before the thread got attacked.

Nothing is real. I am not tech person, is ddos possible this way?
Yes, of course. A DDoS is possible with anything that asks for resources or sends them to the server for processing. However, given the rate-limiting, cloudflare and the type of resources (plaintext posts) I don't see how it could ever become viable.

Lauda (as a bounty manager) because mostly thought she is not checking bounties she overrolls.
Are you kidding me? My bounties have by far the highest rejection rate[1] in the campaigns that have the highest number of cheaters (Telegram && Content). Content currently being at over 70%, and TG over 60% (still being processed).

That's an abusive attack to Lauda
That's also one of the possibilities.

We can assume they are just bounty bumping services.
As I have just written above, I highly doubt that. It is more likely that it is either: a) Random bumping (post in multiple threads to avoid detection); b) Attack targeted at me.

Update: Some numbers are in for Telegram.
Total entries: 2949
Rejected entries: 2666[2]
Rejection rate: ~90.4%

[1] At least from what I have seen so far, especially content stuff (e.g. duplicate submissions across different domains are often accepted).
[2] Quite a lovely number. Roll Eyes
legendary
Activity: 2534
Merit: 1517
#1 VIP Crypto Casino
@marlboroza In the past, I've also found some "fake" accounts with fake eth address or fake social media activities.

@Lauda, also the accounts I've found on the past using the same patterns of those accounts where they post different fake addresses on every proof of authentication.

Since like this user https://bitcointalksearch.org/user/kyliebnorahb4944-2391504 is using all fake data, from:

btc profile
fake social media
fake eth

We can assume they are just bounty bumping services.

Edit, actually this storm of accounts are using real eth addresses

Maybe most likely from others random users? like this one



Twitter username: @HuyJav

Twitter url: https://twitter.com/HuyJav

Followers: 4730

Retweets:
https://twitter.com/xtradeio/status/989189600542371841
https://twitter.com/xtradeio/status/989213717698146305

ERC20 Wallet address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A


##PROOF OF AUTHENTICATION##
Bitcointalk Profile Link: https://bitcointalk.org/EsthervAlinav4990
Telegram Username (For Telegram Campaign only!): @EsthervAlinav4990
Campaign : Telegram, Twitter, Facebook
Spreadsheet #: 62
ETH Address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
legendary
Activity: 2394
Merit: 2223
Signature space for rent
Could it be...ICO bumping service? Bumping bounty to keep it on top for more promotion?  Undecided I mean, they all applied to bounties with social media accounts which don't exist, except telegram which is inactive anyway, with invalid eth addy's:

Yes, most likely accounts are created for ICO bumping service. Most of mentioned account activity almost same (21). They only post proof of authentication post, they never submitted any bounty report still now. I believe they are avoiding post deletion.  I have experience on this thread, I am reporting daily at least 2/3 page. They are using same methods almost. Quoting full thread and with nice project.
legendary
Activity: 1778
Merit: 1474
🔃EN>>AR Translator🔃
Just Shocked again !!
That's an abusive attack to Lauda (as a bounty manager) because mostly thought she is not checking bounties she overrolls. I think the abuser willing to complete destroying your reputation and not just willing to cheat campaigns. This is so dumb to make such a bot error; I think bot-owner knows what he is doing (just a thought).
I think you (Lauda) will face a lot of bounty related issues now you are nolonger in DT.
Anyway, Mods have to quick react over this storm against Lauda; it's still one of the few assets of this forum.
legendary
Activity: 1932
Merit: 2272
ETH Address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B0574480
ETH Address: 0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8870

Someone is trying to cheat campaigns? I just don't see how. Latest post:

#proof authentification
Bitcointalk username: PaigeiPresleyi5003
Twitter campaign: https://twitter.com/PaigeiPresleyi5003
Facebook campaign: https://www.facebook.com/PaigeiPresleyi5003
Telegram: @PaigeiPresleyi5003
ETH Address: 0xF17Be7223E482EC7F899E15186aDfa4e2D87011
Nothing is real. I am not tech person, is ddos possible this way?
legendary
Activity: 2674
Merit: 2965
Terminated.
Thread (link to last page): https://bitcointalk.org/index.php?topic=5031375.2200

What caught my attention are the usernames after taking a random look at the last page:
Quote
Most people should spot that there is a coded pattern there (at least from the trailing numbers). After taking a closer look, two things are obvious:

1) The spreadsheet number that the user posts (although it is sometimes different):
Quote
Spreadsheet #: 62
2) The addresses being posted. Taken from the last page (111):
Quote
0x7eC9e5194cB47dF887CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF320CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1b9870404
0x7eC9e5194cB47dF637CF0Ae0aad3D1b5578704
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B99054
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B05449
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B065740

Previous page (110):
Quote
0x7eC9e5194cB47dF003CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba05480636
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B8870
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B0574480
0x7eC9e5194cB47dF637CF0Ae0aad3D1ba8B878010
0x7eC9e5194cB47dF258CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF328CF0Ae0aad3D1ba8B8e668A
0x7eC9e5194cB47dF978CF0Ae0aad3D1ba8B8e668A

There are 13 more entries on the page before that if I search for the prefix and so on. I don't have time to list all the accounts/look for them right now (sheets are being attacked too obviously). If anyone is interested, just look for the prefix '0x7eC9e5194cB47dF'.

I have no idea what's going on here though. I've sent this thread to a mod.
Jump to: