Bitcoin Abuse Database
Report history for 1Gf7xfbLnNfJRz9rRrq5aQGwhFhAFUhCT2
Address found in database:
Address | 1Gf7xfbLnNfJRz9rRrq5aQGwhFhAFUhCT2 View address on blockchain.info |
---|---|
Report Count | 5 |
Latest Report | Tue, 28 Jun 22 01:12:17 +0000 (1 month ago) |
If you have additional information about this address, please file a report.
Reports:
Date | Abuse Type | Description |
---|---|---|
Jun 28, 2022 | ransomware | Good work deserves recommendation... i lost over 2.3 BTC on Instagram bitcoin scam.. Right about 2 weeks after my ordeal with them I tried using the recommendation from someone on one of the comment section www.reportfraudcenter.com I was able to get all my money back in less than 48 hours.. Contact www.reportfraudcenter.com to recover all your stolen bitcoins free of charge |
Jun 27, 2022 | other | I was scammed $54,000 worth of Bitcoin in Binary option, good thing I got every penny back through the help of a United States crypto recovery expert agency. Visit: www.cryptoregister.us Please if you are a victim of online scam quickly contact them to recover all your lost money easily. |
Jun 27, 2022 | ransomware | All your data is a backed up. You must pay 0.04 BTC to 1Gf7xfbLnNfJRz9rRrq5aQGwhFhAFUhCT2 48 hours for recover it. After 48 hours expiration we will leaked and exposed all your data. In case of refusal to pay, we will contact the General Data Protection Regulation, GDPR and notify them that you store user data in an open form and is not safe. Under the rules of the law, you face a heavy fine or arrest and your base dump will be dropped from our server! You can buy bitcoin here, does not take much time to buy https://localbitcoins.com with this guide https://localbitcoins.com/guides/how-to-buy-bitcoins After paying write to me in the mail with your DB IP: [email protected] and you will receive a link to download your database dump. |
Nov 23, 2020 | ransomware | a guy who applies ransom to an XD test database |
Nov 19, 2020 | ransomware | Bot accessing unprotected MongoDB databases. Deleting all existing data and put a ransom document. |