Post
Topic
Board Reputation
Merits 8 from 3 users
Re: Known Alts of any-one - A User Generated List Mk III (2020 Q1)
by
invincible49
on 22/03/2020, 13:08:24 UTC
⭐ Merited by nutildah (5) ,masulum (2) ,Banadony (1)
Newly found 17 Bitcointalk Accounts & more than 40 Ethereum Wallet Addresses are connected to Already Proven Cheater/Scammer Kakatua! Now adds up to 35 Connected Accounts

A couple of days ago I was looking into that Cryptofarid10 alts of Kakatua's account. Then provided a lot of details on how that guy owns 18 accounts.
Reference: https://bitcointalk.org/index.php?topic=5234050.0

Now after all of those findings I see this guy's cheating runs even deeper than what I first thought. But my today's report mostly depends on Alamin1955, CrisTofar, BountyQueen.

Connected Accounts  

1. Alamin1955, 2. BountyQueen (Banned), 3. CrisTofar, 4. Vince44 (Banned), 5. ariyanmizan7460, 6. EmmaLory (Banned), 7. ss.siyam, 8. tamim101001 (Already proven alts of Huraia), 9. Huraia, 10. tushartamim (Banned), 11. cryptoamirul10, 12. cryptoamin26 Merited by cryptofarid10, 13. Little Boy10, 14. Sojibrana77, 15. Habibur1729 Ranked up to Jr.Member because of a Merit given by cryptofarid10 for a copy&paste post, 16. 4Brothers, 17. emran113


Quoting Alts of Kakatua  


Proof:

ETH: 0x24ce7c186eC37a8F46e94c9D46a83511Dc64BD8A
Archive: http://archive.is/Fscux#msg52293158

ETH-address: 0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c
Archive: http://archive.is/wip/BNIbb

The following transaction showed that the BountyQueen sent a little amount of ETH to his altaccount Alamin1955’s Ethereum address.

TX ID: https://etherscan.io/tx/0xde5f5d0f9a8aa1b2393fa01c223c91a073db00e40317d4f38637bd5209010ef8


ETH Address (ERC20 support) : 0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4
Archive: http://archive.is/9Pv4q#msg53992675


TX ID: https://etherscan.io/tx/0x50ae4931e689d4ddadfe7b57cab33c36847e11d32fbbb38a7fd4bed8bb67b690


Eth Addtess: 0x4473fA76730d5c99dBA999eF7448CC8475503c4A
Archive: http://archive.is/uPd5V#msg49354024


TX ID: https://etherscan.io/tx/0x74b042c5bb3af39e654e3ef1cb1b5a45b334f1b730ff2d8ecda661e5ce63517a


ETH (ERC20) Address: 0x28B92E241793Ff3a94DcF1Fa328FEDa9036A0Cf4
Archive: http://archive.is/tqi4G#msg53992357

Now let's look into EmmaLory position along with Ethereum address in the spreadsheet of BMY.Guide bounty.

We can see he enrolled with 0x6743548743D43d2F65afd5a944EDA046853a7D43.


Alamin1955 enrolled in the same campaign with 0x24ce7c186eC37a8F46e94c9D46a83511Dc64BD8A.


CrisTofar participated with 0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4



We can now see for the purpose of stacking up all the rewards from BMY.Guide bounty this user used 0x9a35c415672e5b3cb45ec501291df13e9d44bd6e wallet address.

We can see Alamin1955 sent GUIDE tokens to that address.



TX ID: https://etherscan.io/tx/0x981691c8cda89e3ef308c4d09e3b2b756757dcfbb39007e8c06f49ccc3267827


Now we see transaction of GUIDE tokens from ariyanmizan7460’s account to the same wallet.



TX ID: https://etherscan.io/tx/0xfb1552a9ca00adc5e235e0f518aed94ac707a51ad018f73b1e069f38b5640d78

Again from CrisTofar’s wallet!



TX ID: https://etherscan.io/tx/0xbc0bf3e4fef6acf937b2d0e75ae87ac225233220b0afbc1c5f02fc9c6b2c3453

EmmaLory also sent GUIDE to that particular wallet.



TX ID: https://etherscan.io/tx/0x45664573f60c4c536695475f394fc57bac712ecfe8049119246a2a17169f1f4f

Now he finally dumped all the tokens on Exchange on the same day.



BMY.Guide Spreadsheet: https://docs.google.com/spreadsheets/d/10YRovPpaHfN2n97hpKXVe9ct_Yq4_GHBRhaHQ-39avs/edit#gid=1549706203


Now to further show how those accounts are from the same owner we can see the following 2 transactions on the same day and at the same time where 0.00045 eth was sent from BountyQueen’s wallet 0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c to 0x4736cbc66b6b2d3BeefE1546545dc12642765ba9.


TX ID 1: https://etherscan.io/tx/0xb8b4c2482e976fbc27f2b9e13e63a81955c66761b71ec65629192f9f2c0f5c29

And transfer of 2676 HUNT tokens from EmmaLory’s wallet 0x6743548743D43d2F65afd5a944EDA046853a7D43 right after 30 seconds.


TX ID 2: https://etherscan.io/tx/0x2361cb4e76169d8fbb850e0182bf69df14858e802b7192ea54fb525419f7fcf4


We can find out more transactions between those connected wallets/b]. 0x6a536d81134b82113d6c2f65adb7d505aab5f6f4 to 0x17a7d7901efa673148f205E735540E3abDD63917 for XNS tokens.


TX ID: https://etherscan.io/tx/0xa05cc393528e4d322fb6ab2d24bc84389caf20a0c1b97158512059416f90b6a9

More from 0x4f21994aa7669c31fb84386e07acdd678d0be97c to 0x17a7d7901efa673148f205E735540E3abDD63917 for XDB tokens.


TX ID: https://etherscan.io/tx/0xc927c9d1ccce0c524c05c423f20cadea484742bf9620bf760878c810f2630014

Transfer of ETH:


TX ID: https://etherscan.io/tx/0xc03d4c635d22360490fcfa6bac5ebc802cfe500d62bd71634b199ea7c6696c80

From 0x6a536d81134b82113d6c2f65adb7d505aab5f6f4 to 0x17a7d7901efa673148f205e735540e3abdd63917 for transferring of PNG tokens.


TX ID: https://etherscan.io/tx/0x71e41ec9b14b6d37e5b54e8062a0aee952f9e8d63157700a9fbb627f7f5b6cd7

Now we find CrisTofar's 0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4 countless interactions with BountyQueen’s wallet address 0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c.




Now again we see this user created a new wallet address 0x91700094be6E42F4A590a0875097B53574ED0Cab for stacking up a couple of more tokens.

BountyQueen sent his Sessia from 0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c to 0x91700094be6E42F4A590a0875097B53574ED0Cab.


TX ID 1: https://etherscan.io/tx/0x72890ee1b2a05fff93376a07349e1af5295918cc83cce78a691dc61980d56468


Transfer of NOBS tokens from Vince44's 0x4473fa76730d5c99dba999ef7448cc8475503c4a to that wallet address 0x91700094be6E42F4A590a0875097B53574ED0Cab.


TX ID 2: https://etherscan.io/tx/0xb7b4228ba97c7d43072c60f49e7b282d6356e23d60025d194805ba23d564ecfe


Now we can see from Jinbi bounty thread that the user named rakibul1364 (Banned) used to post and participate in various bounties with the same ETH wallet address 0x4473fA76730d5c99dBA999eF7448CC8475503c4A which BountyQueen later used. This proves it’s a ban evasion.

Bitcointalk username: rakibul1364
ETH address : 0x4473fA76730d5c99dBA999eF7448CC8475503c4A
Archive: http://archive.is/GjzAW#msg36126303

Connection between Vince44, rakibul1364, BountyQueen:
 

TX ID: https://etherscan.io/tx/0x74b042c5bb3af39e654e3ef1cb1b5a45b334f1b730ff2d8ecda661e5ce63517a


Then if we go deep then we see this user has another Bitcointalk newbie account created back in April 2019 ready for enrolling in bounties anytime now. The following transactions prove that he is indeed the owner of the account.

First he sent some Ethereum from 0x4473fa76730d5c99dba999ef7448cc8475503c4a to an Ethereum wallet 0x4dfe0ae260b563e48124da31613f1b3354ceffef which he used for Rallyapp Bounty campaigns on Bounty Portal!


TX ID: https://etherscan.io/tx/0x5616a3cb5daf91e6936ad275476014a7508069a697ffd368224aecbab12fcca3

Then he used the gas fee for dumping Rally Coin on exchange and used rest of the ETH for activating a new ETH address 0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2!!  Huh



TX ID: https://etherscan.io/tx/0xb10836b5ce0bf7d5e14b46e40c0730c8c0f66e778330b0b1b7f0f1d48a3918b5

Now we see the owner of that wallet address is another newbie account!

ETH(ERC-20) Address: 0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2
Archive: http://archive.is/w2kPe#msg51920933

Now I am very surprised that 0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2 address is keep tracing back to already proven altaccount user Huraia and tamim101001 but none of those accounts have been tagged or red trusted thus far.

Reference:

The user named tamim101001 has already a couple of accounts and as pointed out by Yoshie last year, the user tushartamim has already got a ban but that has not stopped him from using other accounts. 2 more accounts are connected to this user. Proof that it's a blatant ban evasion in below:

1. Huraia 2. tamim101001

Related Addresses:
Code:
[b]ETH :[/b] [color=red][size=10pt][b]0xD4129dF9AA9903fB0857511e9D179E244776c0Dd[/b][/size][/color]
[b]ETH :[/b] [color=red][size=10pt][b]0x319d7ee4fC14979c67366A2D8B43Aeb093D661EA[/b][/size][/color]


Proof of Connection between those accounts and tamim101001/Huraia:



https://etherscan.io/tx/0x4d722c946251a51c7a295c3cfc2cf0682ca2c5444dca3d6b3f961a03f3758ecd
https://etherscan.io/tx/0x749c7cb171c1c8ebfbe89f6f46b7f556932ed0884ccf073af0ffb03082ffeb6a


Ethereum TX:


TX ID: https://etherscan.io/tx/0xdd43ca143a08cb3f365bef85cfac5342ef4cbfe36d3ca42231127b304d04e384


Now the user cryptoamirul10 with 0x0b09C7fbE1DBCBF3726d978F521FcA69F3e4545e is connected to all of the accounts mentioned above.

ETH address : 0x0b09C7fbE1DBCBF3726d978F521FcA69F3e4545e
Archive: http://archive.is/fIw2k#msg51806781

We can see he used 0x319d7ee4fc14979c67366a2d8b43aeb093d661ea to stack up digitalbits (XDB), MiracleTele (TELE), (XNS) tokens.


TokenTXns: https://etherscan.io/address/0x319d7ee4fc14979c67366a2d8b43aeb093d661ea#tokentxns

We can see a couple of transactions between some of the above wallets and already reported wallet address 0x319d7ee4fc14979c67366a2d8b43aeb093d661ea.


TX ID: https://etherscan.io/tx/0x204a1ea97eb828b46cddf5e9cd8391d95021e2222ca686b7ffe669401f42435a


Things are not ending yet because here we can find out another account with quite similar username of the previous findings. This time the cheater has created a new wallet 0xa7db6027b0f1461Fdb94fB0074a58afB1653D2a1, received XNS tokens from bounty and activated it by sending a small Ethereum from 0xD4129dF9AA9903fB0857511e9D179E244776c0Dd for paying gas fee for the purpose of dumping on CREX on Sep-06-2019.


TX ID: https://etherscan.io/tx/0x647be634292dc13f8cf83f13f242f56f0cc547f2ca5f3890c758f8f9f50dfad6

At the same time he sent Ethereum from the mentioned wallet to 0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6 which is one of the wallet address of cryptoamin26.

ETH address : 0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6
Archive: http://archive.is/v2RcS#msg50210331


TX ID: https://etherscan.io/tx/0x5344937cd77ac2c0331c3d86a1bafdbfd8d57a9c532d4c952bfb13bdfe87f917


This person has so much patience that he then created a new ETH account for enrolling/cheating in StiB bounty where he received $14.5 worth of tokens.

ETH address : 0x25e7b04d04114666c10dE6F8af8953Eb0746a681
Archive: http://archive.vn/vdCRf#msg53949601

While a brand new account of Bitcointalk named 4Brothers enrolled in the StiB bounty with cryptoamin26's 0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6 address. Though the scammer did not have any luck of getting StiB tokens in this wallet!  Grin



For Reference StiB spreadsheet: https://docs.google.com/spreadsheets/d/1GFC0KJ5woVzPvRZK4IkIQh7vPjpvK0VYVUtwQh4vVOk/edit#gid=2032150916

We can see his connection with LittleBoy10 account which has no post as of reporting this.

LittleBoy10 used 0x980Ce87b4cc3e64bDB494e96eA6641E491D6a483 for StiB campaign which is connected to cryptoamin24.


TX ID: https://etherscan.io/tx/0x1b133042709c90c3b4edd432d281233e604b44dd3eefcd87550bcb48579cf67f

Now guess what! We find out that the known cheating wallet address 0xd4129df9aa9903fb0857511e9d179e244776c0dd is connected to 0x1c21e40d197f3a48e961401756ca54d8efef7e5b which is being used by Habibur1729.

ETH Address: 0x1C21e40D197F3a48E961401756cA54d8EfEF7e5B
Archive: http://archive.is/lrMYt#msg50546380


TX ID: https://etherscan.io/tx/0x9f6f22de496a2cfdb4aebb8fcb2889670e86f45f11b091f7bce69d4aeda94eb3

Now Habibur1729's account is behind the user emran113's wallet too!

Quote
ETH Address: 0xe4531346daeA7D98b1c18Bc1E314307A5653A2cD
Archive: http://archive.is/iW1yc#msg42447119


https://etherscan.io/tx/0x633de7effe6dd6647c8d0c55e40527afb746a8f21988480fadacff25a6e23e8c

This account also participated in the Highbank bounty.



Highbank Spreadsheet: https://docs.google.com/spreadsheets/d/1lJNxRn0GtV_mMa35LTqFodeXSHEtK6PTpP7ALro7U00/edit#gid=2107643482


Now I really didn’t want to see it but now I see the Proven scammer, bounty cheater Kakatua (already proved to be the owner of 18 Accounts on Bitcointalk) is somehow connected to most of the wallet addresses mentioned above. And it's worth bearing in mind that all of those wallets are connected to each others. As it's been mentioned in this thread that he kept stacking up StiB tokens in one wallet and then dumped to exchange.

Now we can find out cryptoamin26's wallet 0x25e7b04d04114666c10dE6F8af8953Eb0746a681 has been used for that purpose when the user sent StiB tokens to 0xFE76071A83D92A9cBc2F3B11Ea4cd41acd7B1477.



TX ID: https://etherscan.io/tx/0x3e228a1287216d4ad4a57e203fdc028a379b7c420029a4fdac1a0aa485254aab

And again from the already tagged address 0xD4129dF9AA9903fB0857511e9D179E244776c0Dd to 0xFE76071A83D92A9cBc2F3B11Ea4cd41acd7B1477.


TX ID: https://etherscan.io/tx/0x66eda765220cd2691e5aa95aa87dd97e7705cd5237e070588c8ceb397345caee

It’s already proven that the ETH address 0xD4129dF9AA9903fB0857511e9D179E244776c0Dd is of a bounty cheater.


3 Accounts Connected:

1. hargila  2. trickbdpro (Archived) 3. tushartamim  (Archived)
Related Addresses:

Code:
[b]ETH :[/b] [color=red][size=10pt][b]0xD4129dF9AA9903fB0857511e9D179E244776c0Dd[/b][/size][/color]


Now from the accusation thread by me against the user Kakatua, I proved that rashedul74064 is an altaccount of Kakatua which has 0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E ETH address associated with.


The user rashedul74064 with eth address 0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E is connected to user
alamin173020 with eth address 0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018.

TX ID: https://etherscan.io/tx/0x0b8aadd949406263198809ba6d2adc0fb9586a111845a469979f7ef5271d06a6


Now we find more StiB tokens transferring from that wallet to 0xFE76071A83D92A9cBc2F3B11Ea4cd41acd7B1477.


TX ID: https://etherscan.io/tx/0x2e8bbd48219a3df3f8863b1230df7197e8f05c141ab7d6efdbefb68ef655c466

Then we can find another Bitcointalk account is connected to this wallet.

Bitcointalk name: sojibrana77
ERC Wallet: 0x84C313562f671fF35d8330c462c82990bD86bc0d
Archive: http://archive.is/nXfus#msg52583089


And then another altaccount of Kakatua named saju8090 also been used for sending StiB tokens to that special address created for stacking up StiB tokens.


TX ID: https://etherscan.io/tx/0x605f3ac218461f2c45d0789a993c737e3cff8694c0e967b12091906947281db5


And then finally all the StiB tokens dumped on Exchange by the user.
TX ID: https://etherscan.io/tx/0xf84dc7714b0bc9c2bb33e1481808fcb724f154a6a37b85b82751b44ab0a7ef27

It comes as no surprise that Habibur1729 account's has also the same owner of the account of Alex Jahid because this scammer sent a little amount of ETH for paying gas fee when he needed to transfer Octus tokens!

Alex Jahid's Ethereum address: 0xab8b6803e61c82a773582cb45d313fd903562958


TX ID: https://etherscan.io/tx/0x25bdfc6f881159f1cd2b5ede33d91869d66ec438f9081acb8cd9a48598ed017f

If we keep tracking wallet addresses such as:
https://etherscan.io/address/0xd4129df9aa9903fb0857511e9d179e244776c0dd, https://etherscan.io/address/0x5ac09f199b321ca92310148901ae3b0ce6622b0e, and https://etherscan.io/address/0x7f9b9dfe29c1d7ec426567c116e021b419b19788 then we can find out how many wallet addresses this user has for the sole purpose of participating in bounties.

Miscellaneous:
It looks like it is one genuine scammer who has got so much time in his hands to play around with many altaccounts, usernames, wallets etc. How do we get rid of such a massive cheater?  Huh Huh


Now let's find out whether those connected accounts have sent Merits to altaccounts or not! All three connected accounts CrisTofar, Alamin1955, EmmaLory have actually given Merits to each others for submitting contents in the Bitcointalk's 10th anniversary art contest. I personally don't have any problem if anyone gives merit to others for participating in a campaign dedicated to celebrate the forum's 10th Birthday. But isn't it suspicious that this cheating person has sent merits to his various altaccounts?  Cheesy  



Archive:
1. http://archive.is/B2yLu#msg53134889
2. http://archive.is/9g0Ju
3. http://archive.is/9g0Ju#msg53135615
4. http://archive.is/GxsK9#msg53139533



Related Addresses:
Code:
0x24ce7c186eC37a8F46e94c9D46a83511Dc64BD8A
0x4f21994Aa7669c31fB84386e07AcdD678D0Be97c
0x6a536D81134b82113d6C2f65Adb7D505AAb5F6F4
0x4473fA76730d5c99dBA999eF7448CC8475503c4A
0x28b92e241793ff3a94dcf1fa328feda9036a0cf4
0x6743548743D43d2F65afd5a944EDA046853a7D43
0x9a35c415672e5b3cb45ec501291df13e9d44bd6e
0x17a7d7901efa673148f205E735540E3abDD63917
0x91700094be6E42F4A590a0875097B53574ED0Cab
0x4dfe0ae260b563e48124da31613f1b3354ceffef
0xe3d3c98aAaf4d5c50467605586c6C59193ba9fC2
0xd4129df9aa9903fb0857511e9d179e244776c0dd
0x0b09C7fbE1DBCBF3726d978F521FcA69F3e4545e
0x319d7ee4fc14979c67366a2d8b43aeb093d661ea
0xa7db6027b0f1461Fdb94fB0074a58afB1653D2a1
0xeB1A632fe44Eb3a8f22E69D1339CeDFB61FFAba6
0x25e7b04d04114666c10dE6F8af8953Eb0746a681
0x980Ce87b4cc3e64bDB494e96eA6641E491D6a483
0xFE76071A83D92A9cBc2F3B11Ea4cd41acd7B1477
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0x84C313562f671fF35d8330c462c82990bD86bc0d
0x5ac09f199b321ca92310148901ae3b0ce6622b0e
0x980ce87b4cc3e64bdb494e96ea6641e491d6a483
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0xD16fC5fC14F6f629f07441ece92f7C264c9be70a



Quoting other Related Addresses:


Code:
0x086d85d1AEBc7dd3B26493F267B0f8e01bC9de4b
0x7f9b9dfe29c1d7ec426567c116e021b419b19788
0xab8b6803e61c82a773582cb45d313fd903562958
0x8735Df8be03b3E454028F7375e7a4e5eDC478612
0x66cb2fbb2809d42cc84077914db8d05a66c0f78e
0x68e30F8AA305C24a89A13490ddEf7000fe59C9C0
0x5aC09f199b321CA92310148901Ae3B0Ce6622b0E
0x3E8F8Ab0B34761bfb4FD52929672E8f41c78a018
0xe40e76b981e40de1ac4044c479e1e34a695a00c2
0x6E21b6350c271d446058Ad1bf850AA1f321FE1F5
0xD16fC5fC14F6f629f07441ece92f7C264c9be70a
0x510088496ebd87ef4783ea3175d1ee88cd121a8d
0x8a87a2a9ce3a1657b7580f8df595ce34e86239fa
0x335FB382b5A151b55E09bFAC9f20D5F2937D272E
0x7753ec83d363e7F0e987CdaAbC174720C2E0EF4a
0x6173d37f0292327ebe607f650d5b08c0ae104d57