Scam Detective
Phone Number

(479) 530-3175

Last reported Feb 24, 2026

Low Activity
  • 2 community reports from users

Campaign Intelligence

This cluster centers on 2382 connected domains tagged as PureHVNC, elf, sh. 572 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 557 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2228 complaints with federal agencies. Geog...

This cluster centers on 2396 connected domains tagged as 156-233-71-230, Quakbot, lnk. 586 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (8772427372, 1319641540, 1319641221) with 565 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2237 complaints with federal agen...

This cluster centers on 1895 connected domains tagged as BeaverTail, RedLineStealer, password: 2026. 113 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 934 phone numbers (8772427372, 1319641540, 1319641221) with 524 FTC complaints; 683 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2093 complaints wit...

This cluster centers on 2416 connected domains tagged as BABADEDA, WallStealer, meterpreter. 607 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 969 phone numbers (5086371451, 9366439335, 1842506726) with 570 FTC complaints; 690 email addresses (kellymoore_64@yahoo.com, schantzsybg7@aol.com, online.motors@consultant.com). Across all linked entities, consumers have filed 2243 complaints with federa...

This cluster centers on 2764 connected domains tagged as BeaverTail, Kaiji, fbf543. 645 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1132 phone numbers (7638857447, 8664372914, 2157987305) with 10266 FTC complaints; 146 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8616274 CFPB complaints; 298 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vm...

This cluster centers on 3287 connected domains tagged as HijackLoader, RemcosRAT, screenconnect. 617 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1649 phone numbers (5408463620, 8552597377, 8007873903) with 7110 FTC complaints; 143 companies (Informative LLC, HomePlus Corporation, Doral Capital Corporation) with 8547081 CFPB complaints; 807 email addresses (kellymoore_64@yahoo.com, schantzsybg7@...

This cluster centers on 2874 connected domains tagged as QuasarRAT, StealitStealer, pw-k53mv9bc. 652 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1375 phone numbers (2157987305, 2025069230, 2028641298) with 14635 FTC complaints; 160 companies (JPMORGAN CHASE & CO., Advanced Resolution Services Inc., EVERBANK, NATIONAL ASSOCIATION) with 8680419 CFPB complaints; 299 email addresses (abuse@fb.com, ...

This cluster centers on 1486 connected domains tagged as None, keylogger. 5 of these domains have been flagged by threat intelligence feeds including Google Safe Browsing and URLhaus. The connected infrastructure includes 1364 phone numbers (3124141737, 3163966869, 8553892999) with 17909 FTC complaints; 170 companies (EQUIFAX, INC., TRANSUNION INTERMEDIATE HOLDINGS, INC., BANK OF AMERICA, NATIONAL ASSOCIATION) with 8747332 CFPB complaints; 187 email addresses (xxxxxxxxxxxxxxxxxxxxxxxx@vmh5.grup...

Details

First Seen
2/24/2026
Last Reported
2/24/2026
Area Code
479

Connected Entities

Community Reports

How does this scam work? Is it possible to make an address appear to have traded/swapped a coin when it has actually just received it? I have a question about what certainly seems like a scam, however I cannot quite understand how it operates and I hope someone with better knowledge can explain it to me. I have been observing wallets of well known crypto people such as vitalik.eth and Arthur Hayes (0x534a0076fb7c2b1f83fa21497429ad7ad3bd7587). I notice that they appear to be swapping ETH for brand new shitcoins, and in small amounts. This is pretty unlikely to be them (why would billionaire want to swap 0.05 ETH for a brand new shitcoin?), but what I don’t understand is how the scammers get the blockchain to register the ‘trades’. The only thing I can think of is that they are doing a swap themselves and then utilising the option of having the coin received go to a different address, which is an option I see on 1inch. The coins then go to Vitalik or Arthur and appear as trades, causing other wallet-watchers to FOMO in. The difficulty with that explanation is that most of the ‘trades’ take place on Uniswap not 1inch and there isn’t an option to send the received coin to a different address there as far as I can tell. Perhaps the scammers have their own custom interface which utilises that feature? If anyone could educate me I would be grateful. It is obviously a scam but I don’t understand the technical side of it. Here is an example of what I mean: https://etherscan.io/tx/0x3b9a0de088ac792a611ed78ce736ef51f47953031751b9c6e18f8b01ad323f88

989 days ago1 upvote

Is it possible to make an address appear to have traded/swapped a coin when they have actually just received it? I have a question about what certainly seems like a scam, however I cannot quite understand how it operates and I hope someone can explain it to me. I have been observing wallets of well known crypto people such as vitalik.eth and Arthur Hayes (0x534a0076fb7c2b1f83fa21497429ad7ad3bd7587). I notice that they appear to be swapping ETH for brand new shitcoins, and in small amounts. This is pretty unlikely to be them (why would billionaire want to swap 0.05 ETH for a brand new shitcoin?), but what I don’t understand is how the scammers get the blockchain to register the ‘trades’. The only thing I can think of is that they are doing a swap themselves and then utilising the option of having the coin received go to a different address, which is an option I see on 1inch. The coins then go to Vitalik or Arthur and appear as trades, causing other wallet-watchers to FOMO in. The difficulty with that explanation is that most of the ‘trades’ take place on Uniswap not 1inch and there isn’t an option to send the received coin to a different address there as far as I can tell. Perhaps the scammers have their own custom interface which utilises that feature? If anyone could educate me I would be grateful. I am sure it’s a scam and Vitalik and Arthur aren’t swapping ETH for these coins but I’m lacking an explanation. Thanks in advance! Here is an example of what I mean: https://etherscan.io/tx/0x3b9a0de088ac792a611ed78ce736ef51f47953031751b9c6e18f8b01ad323f88

989 days ago1 upvote

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.

Proton VPN Block malicious sites and encrypt your connection

Proton VPN routes your traffic through encrypted servers and blocks known malware domains. Free plan available.