Cryptscam Abuse Explorer

¡Manténgase seguro, verifique si las billeteras son una estafa!

Apóyenos con una donación

Dirección de la wallet
Números de reporte
1
Saldo de wallet
 BTC → 
Total recibido
 BTC → 
Números de transacción
Fecha
03 septiembre 2020 jueves. 18:47:42 UTC
Tipo
ransomware
Estafador / abusador
País
Saudi Arabia
Descripción
To recover your lost Database and avoid leaking it: Send us 0.095 Bitcoin (BTC) to our Bitcoin address 1Dm19fq1We1tBHo1GQ7F2E8mMgo1XrTMGn and contact us by Email with your Server IP or Domain name and a Proof of Payment. If you are unsure if we have your data, contact us and we will send you a proof. Your Database is downloaded and backed up on our servers. Backups that we have right now: 998, alemtyaz, almokhtsar, almorasel, bacula, biucentrax, bqqb, bugtracker, cells, costcalc, countries, crm, dcim, dms, dndoon, dndoon_app, drugfree, drupal, easyappointments, elawyer, epss, feng_office, fengoffice, fikra, fikra_idea, gleam, hmailserver, icehrmdb, iconfile_com1, iconfile_com2, iconfile_master, iconprojects, icontech, icontech_com1, icontech_db1, icontech_db2, icontech_gps, icontech_master, icontech_microservices, icontech_microservices_db1, icontek, inventory, jobs, magazine, magento, mautic, mnar, ms_catalog, nc_dashboard, nexcloud, nextcloud_18, nextcloud_master, nextcloud_saas1, nextcloud_saas2, nextcloud_tmp, orangehrm, orangehrm_mysql, portal, project_snabel, projects_erp_v1, projects_erp_v2, pyrocms, sellah, sellah_com_1, sellah_com_2, sellah_master, sentrifugo, signal, smea, snabel_school, stockgrapper, tamkeen_skills, tashkeelonline, tmk, weberpdemo, webtop, wordpress. If we dont receive your payment in the next 10 Days, we will make your database public or use them otherwise.
fuente de datos
bitcoinabuse
Sitio URL