Post
Topic
Board Reputation
Merits 2 from 1 user
Topic OP
An interesting case of bounty cheating.
by
KTChampions
on 06/08/2019, 13:41:28 UTC
⭐ Merited by Ratimov (2)
savel
acemibtc

~
If it’s not complicated, then the referral address (Ether Address that Referred you) indicate this: 0x830a57E1b37Dc39F3d2889122a8378007bA05D52
you will not lose anything, but I will gain. But this is not necessary.
http://archive.md/0YgSP#selection-527.82-527.124

acemibtc confirms his participation in the SENDERON airdrop and indicates this address 0x2f7Fc648AF6f10B34DC88374951395DF39c085bc
http://archive.md/yHlHI#selection-4865.0-4865.8
https://docs.google.com/spreadsheets/d/1tIMKx80RdDwydtReNwsZzuUO0KYHUqaMnWWar45EAak/htmlview

But savel is registered in another airdrop (eETH) with this address 0x2f7Fc648AF6f10B34DC88374951395DF39c085bc
and at address 0x830a57E1b37Dc39F3d2889122a8378007bA05D52 Arcurus is registered
https://docs.google.com/spreadsheets/d/17h8-vlpciM9OpOZ8E3L2jTLwic36AvItMIPxWnGSiKk/edit#gid=991770175

The problem is that to participate in eETH airdrop you just need to fill out the Google form - indicate your nickname on BTT and ETH address https://golos.io/eeth/@higogolos/eeth-airdrop

But after checking these two addresses we will understand who are the cheaters.

The first transaction to wallet 0x2f7Fc648AF6f10B34DC88374951395DF39c085bc was made from this wallet 0x830a57E1b37Dc39F3d2889122a8378007bA05D52 https://etherscan.io/tx/0x4f5d92df39c4c58c77abd91cc7eac7090f66385babb79829313be40aa0c6af9d

Both of these addresses sent ETH to 0xFe78E09aee02f1bB4a1F58F17F6e6Dda6565A7C9
https://etherscan.io/tx/0xbd490c1356e8a5b44cff2d42057e64dd02ea9168d6d2fca06890ef6c1cba69ae
https://etherscan.io/tx/0x117d53b5f8325b36594d1699515b89bb187b4a9eb6158abd232b764c3e0e8837

and to the address 0x2C448DFA4e6768F5926A550AD0CDA93c5038A4fF
https://etherscan.io/tx/0xc7343c334522e86fbad7e3842ebd346bed19ec8bc6d96d314f42ab5ea7cbeaa8
https://etherscan.io/tx/0x10b26591503a88f79ebaff283695b3e3042523b1a11ea03bc07a9d6c3dd42dbd

If you check the airdrop eETH spreadsheet, you might think that 0xFe78E09aee02f1bB4a1F58F17F6e6Dda6565A7C9 address belongs to HorseRider and 0x2C448DFA4e6768F5926A550AD0CDA93c5038A4fF belongs to primeasic


What do Arcurus, HorseRider and primeasic have in common? They are Donators.
If you look at the topic The Bitcointalk 10 BTC Donators - where are they now ? it’s easy to find these nicknames and many others who “participated” in the eETH airdrop and the wallets indicated during registration have a direct connection with two scammers' wallets.
Obviously, the scamer took nicknames of accounts from this list to deceive eETH airdrop.
Accounts savel acemibtc have an obvious connection - through wallets, through merits and through the topics in which they write.
In addition, the account acemibtc has been sold or stolen. This is easily traceable by the message history - first messages are only in Turkish, and after a break of several months in Russian and English (and a couple of short messages were made in Turkish in order to avert suspicions).