Cryptscam Abuse Explorer

Bleiben Sie sicher, überprüfen Sie, ob Brieftaschen Betrug sind!

Unterstützen Sie uns mit einer Spende

Berichtsnummern
7
Brieftaschenguthaben
 BTC → 
Insgesamt erhalten
 BTC → 
Transaktionsnummern
Datum
30 Juli 2019 Dienstag. 16:20:57 UTC
Typ
ransomware
Letzte Berichte
Land
Chile
Beschreibung
To recover your lost Database and avoid leaking it: Send us 0.05 Bitcoin (BTC) to our Bitcoin address 3F4hqV3BRYf9JkPasL8yUPSQ5ks3FF3tS1 and contact us by Email with your Server IP or Domain name and a Proof of Payment. Your Database is downloaded and backed up on our servers. Backups that we have right now: *******. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
source
bitcoinabuse
Seiten-URL
Datum
26 Juni 2019 Mittwoch. 15:28:51 UTC
Typ
ransomware
Letzte Berichte
mysql
Land
Canada
Beschreibung
To recover your lost Database and avoid leaking it: Send us 0.1 Bitcoin (BTC) to our Bitcoin address 3F4hqV3BRYf9JkPasL8yUPSQ5ks3FF3tS1 and contact us by Email with your Server IP or Domain name and a Proof of Payment. Any eMail without your server IP Address or Domain Name and a Proof of Payment together will be ignored. Your Database is downloaded and backed up on our servers. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
source
bitcoinabuse
Seiten-URL
Datum
14 Juni 2019 Freitag. 16:53:08 UTC
Typ
ransomware
Letzte Berichte
Land
United Kingdom
Beschreibung
took a 1 day old DB, dropped a test table and left the same note as the others, i would imagine a virgin 14 year old is behide such a junior thing.
source
bitcoinabuse
Seiten-URL
Datum
14 Juni 2019 Freitag. 00:55:00 UTC
Typ
ransomware
Letzte Berichte
Land
United States
Beschreibung
The dude took an empty database that I created and left this message behind: "To recover your lost Database and avoid leaking it: Send us 0.05 Bitcoin (BTC) to our Bitcoin address 3F4hqV3BRYf9JkPasL8yUPSQ5ks3FF3tS1 and contact us by Email with your Server IP or Domain name and a Proof of Payment. Your Database is downloaded and backed up on our servers. Backups that we have right now: scioly. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise."
source
bitcoinabuse
Seiten-URL
Datum
10 Juni 2019 Montag. 22:23:03 UTC
Typ
ransomware
Letzte Berichte
mysql database ransom
Land
Germany
Beschreibung
To recover your lost Database and avoid leaking it: Send us 0.05 Bitcoin (BTC) to our Bitcoin address 3F4hqV3BRYf9JkPasL8yUPSQ5ks3FF3tS1 and contact us by Email with your Server IP or Domain name and a Proof of Payment. Your Database is downloaded and backed up on our servers. Backups that we have right now: [DB Names]. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
source
bitcoinabuse
Seiten-URL
Datum
10 Juni 2019 Montag. 11:38:32 UTC
Typ
ransomware
Letzte Berichte
Land
Bhutan
Beschreibung
***FOLLOWING IS THE MESSAGE LEFT BEHIND*** To recover your lost Database and avoid leaking it: Send us 0.05 Bitcoin (BTC) to our Bitcoin address 3F4hqV3BRYf9JkPasL8yUPSQ5ks3FF3tS1 and contact us by Email with your Server IP or Domain name and a Proof of Payment. Your Database is downloaded and backed up on our servers. Backups that we have right now: 4c609e94a99a291b, openproject, playsms. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise. | 3F4hqV3BRYf9JkPasL8yUPSQ5ks3FF3tS1 | [email protected] |
source
bitcoinabuse
Seiten-URL
Datum
03 Juni 2019 Montag. 09:28:31 UTC
Typ
blackmail scam
Letzte Berichte
Land
Netherlands
Beschreibung
This boy got the menu of my pizza's stolen. He just logged on into my phpmyadmin and removed it... i got it backed up... hes soo noob
source
bitcoinabuse
Seiten-URL