Cryptscam Abuse Explorer

Stay safe, check if wallets are scam!

Support us with a donation

Report number
1
Wallet balance
 BTC → 
Total received
 BTC → 
Transaction number
date
03 September 2020 Thursday. 18:47:42 UTC
type
ransomware
scammer/abuser
country
Saudi Arabia
description
To recover your lost Database and avoid leaking it: Send us 0.095 Bitcoin (BTC) to our Bitcoin address 1Dm19fq1We1tBHo1GQ7F2E8mMgo1XrTMGn and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: 998, alemtyaz, almokhtsar, almorasel, bacula, biucentrax, bqqb, bugtracker, cells, costcalc, countries, crm, dcim, dms, dndoon, dndoon_app, drugfree, drupal, easyappointments, elawyer, epss, feng_office, fengoffice, fikra, fikra_idea, gleam, hmailserver, icehrmdb, iconfile_com1, iconfile_com2, iconfile_master, iconprojects, icontech, icontech_com1, icontech_db1, icontech_db2, icontech_gps, icontech_master, icontech_microservices, icontech_microservices_db1, icontek, inventory, jobs, magazine, magento, mautic, mnar, ms_catalog, nc_dashboard, nexcloud, nextcloud_18, nextcloud_master, nextcloud_saas1, nextcloud_saas2, nextcloud_tmp, orangehrm, orangehrm_mysql, portal, project_snabel, projects_erp_v1, projects_erp_v2, pyrocms, sellah, sellah_com_1, sellah_com_2, sellah_master, sentrifugo, signal, smea, snabel_school, stockgrapper, tamkeen_skills, tashkeelonline, tmk, weberpdemo, webtop, wordpress. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
source
bitcoinabuse
Site url