Scam Detective
Phone Number

479-530-3175

Last reported Feb 24, 2026

Low Activity
  • 2 community reports from users

Campaign Intelligence

This cluster centers on 2451 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include cdn.discordapp.com, 91.92.241.152, 91.92.240.222, 158.94.208.174, 178.16.52.44, 158.94.211.102, 158.94.210.93, 158.94.208.52, i.postimg.cc, s3.us-east-2.amazonaws.com, storage.googleapis.com, 178.16.52.18, 158.94.211.101, 158.94.211.100, local-host.life, dropmefiles.com, limewire.com, 62.60.226.159, id8965.com, valfanto.com and 2431 more. 633 of these domains have been flagged by threat int...

This cluster centers on 1486 connected domains tagged as AgentTesla, None, js. The domains include i.postimg.cc, cdn.discordapp.com, s3.us-east-2.amazonaws.com, pastes.io, dl.dropboxusercontent.com, ltcexchange.bitparking.com, bitcoin.sipa.be, litecoinpool.org, cryptocoincharts.com, sigaintevyh2rzvw.onion, toremail.net, lelantos.org, www.sigaint.org, epjhlyfgxenf2q4o.onion~~, inocncymyac2mufx.onion, torbox3uiot6wchz.onion, 344c6kbnjnljjzlz.onion, mailtor.net, bscscan.com, securitized.io and 1466...

This cluster centers on 2957 connected domains tagged as GuLoader, NorthKorea, censys. The domains include salelegalsteroids.com, 192.210.186.208, gharnt.com, cloflart.com, id3702579photo-image-docs.com, www.almacensantangel.com, 64.95.12.162, blue-oceans.net, sixmexicos.com, baritonclick.online, 185.252.24.15, un1rw11q4u.com, ameyiando.com, niril.sbs, bursaelektriktamir.com, blankeyeo.com, umxtxhub.za.com, sunchernical.com, 18.194.67.137, servecdn.my and 2937 more. 606 of these domains have bee...

This cluster centers on 2107 connected domains tagged as GuLoader, NorthKorea, censys. The domains include storage.googleapis.com, cdn.discordapp.com, pastes.io, s3.us-east-2.amazonaws.com, dl.dropboxusercontent.com, 188.137.230.45, touchskins.io, 158.94.208.7, 74.0.32.149, 74.0.32.141, api.touchskins.io, 80.89.237.190, 188.137.254.207, api.wewpwsw.su, 188.137.229.136, 196.251.107.24, 104.194.152.180, link.storjshare.io, s3.g.s4.mega.io, 62.60.226.159 and 2087 more. 562 of these domains have bee...

This cluster centers on 2121 connected domains tagged as GuLoader, NorthKorea, censys. The domains include 59.182.90.199, 178.50.166.61, 113.168.249.76, 123.209.193.86, 113.165.6.38, 120.157.72.234, 171.235.194.253, 120.157.159.171, 37.142.77.163, 46.124.33.133, 46.124.40.3, 83.224.151.243, 88.86.246.233, 41.146.1.154, 59.182.119.128, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, cdn.discordapp.com and 2101 more. 576 of these domains have been flagged by threat intelligence feed...

This cluster centers on 1630 connected domains tagged as BABADEDA, pw-2026, wsh. The domains include storage.googleapis.com, cdn.discordapp.com, implementing-theft-metal-justin.trycloudflare.com, staying-heavily-meaning-blowing.trycloudflare.com, creations-venture-traditional-stainless.trycloudflare.com, arilprivate.storexyz.web.id, 206.123.145.26, 103.125.219.204, 45.87.43.154, 10cricofficial.com, justwatch.life, 195.16.44.75, advise-visual-playstation-closer.trycloudflare.com, 91.92.241.197, 6...

This cluster centers on 2141 connected domains tagged as GuLoader, NorthKorea, censys. The domains include 59.182.90.199, 91.80.129.100, 123.28.175.23, 120.61.247.2, 178.50.166.61, 113.168.249.76, 123.209.193.86, 113.165.6.38, 120.157.72.234, 171.235.194.253, 120.157.159.171, 37.142.77.163, 171.241.208.124, 120.157.229.220, 171.117.30.233, 91.80.136.9, 46.124.33.133, 46.124.40.3, 83.224.151.243, 88.86.246.233 and 2121 more. 596 of these domains have been flagged by threat intelligence feeds incl...

This cluster centers on 2559 connected domains tagged as GuLoader, NorthKorea, trojan. The domains include 83.224.148.34, 14.236.247.68, 120.157.72.59, 95.127.248.192, 116.110.179.199, 116.101.73.68, 95.127.250.241, 152.173.199.182, 91.80.129.100, 59.88.45.188, 117.216.5.20, 182.60.11.164, 41.146.14.165, 120.157.46.38, 59.182.90.199, 113.168.249.76, 78.132.114.25, 171.241.208.124, 120.157.229.220, 14.236.84.25 and 2539 more. 640 of these domains have been flagged by threat intelligence feeds inc...

Details

First Seen
2/24/2026
Last Reported
2/24/2026
Area Code
479

Linked Company Activity

EQUIFAX, INC.
1 BBB complaint · Credit Cards] [Business: Equifax Impersonator] [Location: MD, USA- 21207]
TRANSUNION INTERMEDIATE HOLDINGS, INC.
4 BBB complaints · Phishing] [Business: TransUnion Imposter Sc
JPMORGAN CHASE & CO.
16 BBB complaints
CITIBANK, N.A.
23 BBB complaints
SELECT PORTFOLIO SERVICING, INC.
1 BBB complaint · Advance Fee Loan] [Business: Said they were from Select Portfolio Servicing] [Location:
WELLS FARGO & COMPANY
204 BBB complaints · Bank/Credit Card C

Connected Entities

Community Reports

How does this scam work? Is it possible to make an address appear to have traded/swapped a coin when it has actually just received it? I have a question about what certainly seems like a scam, however I cannot quite understand how it operates and I hope someone with better knowledge can explain it to me. I have been observing wallets of well known crypto people such as vitalik.eth and Arthur Hayes (0x534a0076fb7c2b1f83fa21497429ad7ad3bd7587). I notice that they appear to be swapping ETH for brand new shitcoins, and in small amounts. This is pretty unlikely to be them (why would billionaire want to swap 0.05 ETH for a brand new shitcoin?), but what I don’t understand is how the scammers get the blockchain to register the ‘trades’. The only thing I can think of is that they are doing a swap themselves and then utilising the option of having the coin received go to a different address, which is an option I see on 1inch. The coins then go to Vitalik or Arthur and appear as trades, causing other wallet-watchers to FOMO in. The difficulty with that explanation is that most of the ‘trades’ take place on Uniswap not 1inch and there isn’t an option to send the received coin to a different address there as far as I can tell. Perhaps the scammers have their own custom interface which utilises that feature? If anyone could educate me I would be grateful. It is obviously a scam but I don’t understand the technical side of it. Here is an example of what I mean: https://etherscan.io/tx/0x3b9a0de088ac792a611ed78ce736ef51f47953031751b9c6e18f8b01ad323f88

1036 days ago1 upvote

Is it possible to make an address appear to have traded/swapped a coin when they have actually just received it? I have a question about what certainly seems like a scam, however I cannot quite understand how it operates and I hope someone can explain it to me. I have been observing wallets of well known crypto people such as vitalik.eth and Arthur Hayes (0x534a0076fb7c2b1f83fa21497429ad7ad3bd7587). I notice that they appear to be swapping ETH for brand new shitcoins, and in small amounts. This is pretty unlikely to be them (why would billionaire want to swap 0.05 ETH for a brand new shitcoin?), but what I don’t understand is how the scammers get the blockchain to register the ‘trades’. The only thing I can think of is that they are doing a swap themselves and then utilising the option of having the coin received go to a different address, which is an option I see on 1inch. The coins then go to Vitalik or Arthur and appear as trades, causing other wallet-watchers to FOMO in. The difficulty with that explanation is that most of the ‘trades’ take place on Uniswap not 1inch and there isn’t an option to send the received coin to a different address there as far as I can tell. Perhaps the scammers have their own custom interface which utilises that feature? If anyone could educate me I would be grateful. I am sure it’s a scam and Vitalik and Arthur aren’t swapping ETH for these coins but I’m lacking an explanation. Thanks in advance! Here is an example of what I mean: https://etherscan.io/tx/0x3b9a0de088ac792a611ed78ce736ef51f47953031751b9c6e18f8b01ad323f88

1036 days ago1 upvote

Share Your Experience

What's Your Exposure?

Know your risk exposure to this message with a Thorough Analysis. It returns a detailed report covering the complaint history, your data breach exposure, related scam entities, and risk signals tied to this email message. Check the box and enter your email address now.