215 Scam Reports

NFT Scam

1

Identified as a scammer main wallet address.

0
1
Reported Addresses
Reported Address
NFT OTC SCAM
0xacbd0d6b5dbc4e848f96d84481a5beb0e7f537f7
Reported Address
NFT OTC SCAM
0xc27c81fd5322e0efcd1af788d9fe0c787589eb3f
Reported Address
NFT OTC SCAM
0x1a168a6c6c0b1c0079b8a5dfa45beeb72e89d060

NFT Scam

2

Original creator aka "Sloffo" on discords (discord ID 1002981184936087622). Releases NFT project with promises of utility, hbar returns to holders, none delivered, all funds drained from teasury wallet. Multiple wallets offramp to 0.0.16952 (Binance) with memo 100898046 Project has now been turned over to new management.

1
2
Reported Addresses and Domains
Reported Domain

https://twitter.com/HederaSloths

Reported Address
Royalties
0.0.1100412
Reported Address
Treasury
0.0.1234270

+ 2 more

NFT Scam

2

Impersonating OpenSea. Drainer kit is previously seen at: https://www.chainabuse.com/report/63a8abdd-e3b6-4097-ba83-7aa4e4fe8ce5 Uses Telegram bot: 5678259242:AAFAh64oW_-uYTcIEIoFY2dN1FjaAiZBCy4 4semir jajaja100_bot chat ID: 1910796604 SkateMillion bignomer chat ID: 5264481224 Semir Semirchik chat ID: 5540716045 Gg gg28472

0
2
Reported Addresses and Domains
Reported Domain

kanyepromo-opensea.com

Reported Address
0x96323425DfD1a717b03Dae774B52030F7791Cb5A

NFT Scam

1

Wallet drainer with fake mint. Lure via a fake Discord server. Related cases: https://www.chainabuse.com/report/f864b386-c07c-4990-bd5c-b369c7cee5d0 https://www.chainabuse.com/report/7e660137-5737-47bf-a3a8-f00ff9ba0e48 https://www.chainabuse.com/report/1222bc25-9a43-4519-831a-437d42bd9eab /api/AddAddress /api/CheckAddress /api/CheckNfts /api/GetAddress721 /api/GetItems /api/Approve4 /api/Approve4 /api/Approve /api/GetAddress20 /api/Approve3 /api/Approve2

0
1
Reported Addresses and Domains
Reported Domain

premint-fridaybeers.xyz

Reported Address
receiver 1
0x3b37e90a131d8c531903bf16d005254345677d04
Reported Address
receiver 2
0x58bb1e9bab1746985d46b4b195dd78544d9bee7e

+ 2 more

NFT Scam

2

Wallet drainer with fake mint. Related cases: https://www.chainabuse.com/report/f864b386-c07c-4990-bd5c-b369c7cee5d0 https://www.chainabuse.com/report/7e660137-5737-47bf-a3a8-f00ff9ba0e48 Same API endpoints /bagholders.io/api/AddAddress ../CheckAddress ../GetAddress

0
2
Reported Addresses and Domains
Reported Domain

bagholders.io

Reported Address
receiver 1
0xC4B0E6CF56e76e831e13d197705b4Ce05c472DDc
Reported Address
receiver 2
0xdbb27aa750ddd12704cb2dd9f261c5bac6d04001

+ 3 more

NFT Scam

1

Impersonating Goblintown. Previously seen luring on Instagram: https://www.chainabuse.com/report/471f328a-2b41-471e-9a65-edc9aa53e6fe Uses Twitter list: https://twitter.com/i/lists/1568358899501129729 Drainer kit highlight: Some parts of its configuration are on the HTML, which includes the victim's IP, country code, receiver wallet of the malicious actor, and minimum ETH Telegram bot: 5798101517:AAEwxzrtItE70GWLTJm2Gv1C4JIaEIbBLBs cryptodrainbot chat ID: 5235093890 admwhy chat ID: 5454045172 buff163support RU language is being used to notify the malicious actors using the bot. The domain owner is related to: arkgiveaway.net shadowmarket.xyz

0
1
Reported Addresses and Domains
Reported Domain

goblin-town.fun

Reported Address
0xdc6e8Fb22F99b2076D4C2827794705fd348178F7
Reported Domain

arkgiveaway.net

+ 1 more

NFT Scam

1

Scammer deposited at binance

0
1
Reported Addresses and Domains
Reported Address
Minibot Art Scam
0x10713E5e8EDF865c1c85E4389D1A9ff45394F6d1
Reported Domain

minibot.art

Reported Address
Minibot Art Scam
0x66dDe65962AFd05Cdd2fFB845eF43e3bD1571559

+ 2 more

NFT Scam

1

Twitter user @kramrogNL was scammed for a BAYC, BAKC, & multiple other NFTs.

0
1
Reported Addresses
Reported Address
0x93623A30FC2DDdEdE3bB9b9B16F0E7683C453BeB
Reported Address
0xbfe5dbe545394e841bc93a59da81673d19101ec1
Reported Address
0x9ad5236ccf8773d83356c664d8989e0b207d2f33

+ 1 more

NFT Scam

3

Premint scam project

0
3
Reported Addresses and Domains
Reported Address
0xaC21Cb915E8A3fd8f465ed980C29B3c730dee67c
Reported Domain

http://premint-mint.xyz

NFT Scam

2

The Twitter User @Zwlzzer3 (name will change, Twitter UID: 1465228484750446593) with wallet 0.0.1224781 pretends to be my giveaway winner @Zwizzer3 and dmed me to steal the NFT. Stay safe

0
2
Reported Address
Reported Address
0.0.1224781

NFT Scam

2

The Sandbox Game Instagram ATO, again. OpenSea API key: f87f138c76004290b414b60b90194302 Uses Discord webhook: /discord.com/api/webhooks/1017242676191567962/7bskAdTbajTM1JE9M7jQ3av4CDD0fhp0_eoaeLbaEsyvLvAHoLKSDiSFoop2bAs6D8mz channel_id: 1017242118961508414 guild_id: 1017240840927719534

0
2
Reported Addresses and Domains
Reported Domain

thesandboxesgame.com

Reported Address
0x645daA8cD7F757aC644388E3b132362cb708c96C

NFT Scam

2

The real rtfkt site is running a sale at the moment and as usual, the clones are looking to hunt...Interesting fact about this is that the url was tweeted from a verified account with about 24K followers but blocked replies to the tweet so that what people can only do is retweet to comment.

0
2
Reported Domain
Reported Domain

https://rtfkft.com/

NFT Scam

2

**The Executive Team** It appears that Pablo Salvador Yañez Camino (AKA the COO) is the only "working" team member involved with the project and only administrator with access to the 365 wallet. The other team members mentioned are merely figureheads including his mother Ursula (AKA the “Project Leader/Owner”) and younger brother (AKA the previous administrator of the project’s discord server, also the creator of said discord server). **Backstory** We had a staff+artist meeting on August 27th (2022), in which Pablo was supposed to partake, but ended up doing a no-show. During that meeting, Fefa explained how the project came to be : Pablo and his mother, Ursula, had an idea for a long term NFT project, Pablo went to Fefa (his aunt) about it and asked her if she wanted to be hired as the artist for said project. He made it clear that he would be the one to manage the project and his mother (Ursula) would help him every once in a while. We believe she was mainly spell checking things. **Memo** A couple of months into the launch of the project, Pablo met up with Memo, a crypto connoisseur. Memo was made Project Manager and Senior Advisor, when he only agreed to being a Senior Advisor. Pablo made it seem like Memo was a part of the management team, when he didn’t even know about being made Project Manager until months later when Arizona contacted him about it. **Mod Team** The mod team was continuously gaslighted by Pablo with his promises that were never fulfilled. Many promises to hire additional team members (ex: community manager) that could help the project continue to grow, yet no action was taken. The mods have received no compensation for their time, like we were promised when we were made staff members. **Tokens** Pablo also promised to send free tokens to the community many times (8 different tokens), but we were never given any information about when and how those tokens would be sent. We believe the tokens were simply to encourage people to join the server. **Funds/profit** Unfortunately we have seen that there are very little funds left in the Amazonas 365 wallet. We have not been made aware of where the funds raised by the 365 Women collection have gone or how they have been used to further continue the project. The only thing we are aware of is that the past couple months Pablo has gone to yacht parties, lived in Dubai, visited Mexico, Miami, and possibly other places. Here’s the link to the transactions list : https://www.blockchain.com/eth/address/0xb1f6ded523f30ef0c9ca547a394351e10964123c?view=standard We believe any current attempts to market the project will result in those funds also being mismanaged and misused and will not result in any actual growth of the project originally promised.

0
2
Reported Domain
Reported Domain

https://opensea.io/collection/365women

NFT Scam

1

Twitter ATO of a US journalist - Jake Whittenberg. Impersonated Azuki. C&Cs: /sea-claims.io:5656/getMsg /sea-claims.io:5656/postOrder /sea-claims.io:5657/transfer/received /sea-claims.io:5657/transfer/receivedERC20 /sea-claims.io:5657/getnfts/<address>

0
1
Reported Addresses and Domains
Reported Domain

azukiofficial.net

Reported Domain

sea-claims.io

Reported Address
malicious contract
0x710A26Ad2d0189ebEbDADCc9e97e9625dd07505a

+ 3 more

NFT Scam

1

Twitter ATO - @jingmonis. Impersonated Yugalabs and Metamask. Previously seen on a fake Moonbirds. Same tactics used... 🚩 Etherscan API key 7VNHRBIIYT797X793ZXMQ5NWIZ92GH78RV 🚩 MoralisWeb3 /jfncl5uugds7.usemoralis.com:2053/server esmwfIo7zVXeXWqQzadIGFRFVGSj8fgRrQdgQt72 🚩 jsonbin $2b$10$A1MCDIC7vl.ImRv4u6o11eXaZs5CX0MKe82OJNwrGLG8g/tC3GiIG 🚩Telegram bot: 5710635181:AAGaaZ0238HqledXfEblxeiCnz9DlTMI_AI lickymillis_bot chat IDs: -671563422 -1001753587117 group name: Metamask LICK - NOTIFICATIONS creator: pokemonfan56 ID: 5100346606 admin: monkey ID: 5124429525 mentions zachxbt... member: Pepeaf id: 987175295 member: Weabookangz ID: 1619978666 member: pa0l6RCztTpT3OVtMEl9 ID: 5746593652 member: xrp_banditt ID: 2071685807

0
1
Reported Addresses and Domains
Reported Domain

blog-metamask.io

Reported Domain

blog-metamask.io/articles/critical-sec-update

Reported Address
malicious contract
0xd13b093EAfA3878De27183388Fea7D0D2B0AbF9E

+ 2 more

Reports by Chain

;
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo