News Feed
  • DrugHub has agreed to fully refund all users who lost money in the SuperMarket exit scam.  
  • Retro Market has gone offline. Circumstances of the closure unknown.  
  • SuperMarket has closed following an exit scam by one of the admins.  
  • The admin of Incognito Market, Pharoah, has been arrested by the FBI several months after exit scamming.  
  • Silk RoadTorhoo mini logo
  • darknet markets list
  • Popular P2P exchange LocalMonero has announced it is closing.  

Why does the wiki list of exchanges not work? : Monero | Torhoo darknet markets

I have been trying to access the list over the past few days and it has always returned a "problem loading page" unable to connect result.
/u/AncientIdai I want money
2 points
1 week ago
> Enzyme here to serve!

this does not give u extra credibility xd
/u/notrustbutverify 📢 🍼
1 points
1 week ago
You think working as a dread moderator give you any I don't think so
/u/soul_m
2 points
1 week ago
Well, what information do you provide? You could show toilet paper - you have something more important. Or if you saw something and found nothing else, then you thought it was a jackpot - even if you believe your own words - even if there was something - then why did you decide it was the backend? How can you publish such nonsense based on such a small thing? Do you know how many rotating proxies, how much redirects cost? Do you know how many enticing things they do to get trapped? I look at them, BO fight off attacks that kill others. If you actually got to the backend, then show us how? You didn't find the IP on Google ;) But I suspect you only have beautiful words. I advise you to find something more substantial in the future.
/u/notrustbutverify 📢 🍼
1 points
1 week ago
I mean the method is exposed in of those dumpli pictures but you guys are stupid and don't make your own research. Just eat what paris or hugbunter are saying to you.
/u/heroinaddictreal 🍼
1 points
1 week ago
Go outside touch some grass ) Meanwhile i order some #4 white in BO what a troll u are )
/u/Paris A
7 points
1 week ago

1
Awards Received
Bag of Sand
1
Okay people... let's get a good understanding on the right way to do these things.

Let me first start off by saying that IP leaks do happen occasionally and they are stupidly easy to detect. However proving that it is the market's IP address's backend is a completely different situation. Phishing proxies will relay EXACTLY everything in the request. It is a MITM attack of course where the phishing proxy just overwrites the URL itself. Just because you search up some headers and see it is in the exact way doesn't mean it's from a the main fucking backend. The amount of times I have had to say this over and over and over again. They proxy everything, that is the fucking point. So of course it's going to look like a certain way.

In my view, from what I see here, this is almost 100% a phishing MITM proxy. How do I know? Because I have seen a similar one with the same proxmox situation just a couple weeks ago. If you think you got an IP leak and you fear that the admins won't pay a bug bounty (or will hide it) provide the information to dread staff and we can provide verification so it if falls through we post a message saying we have verified that is it correct.

There are many ways we can double check these things. Generally we just do a request flood maxing out their server's connection lines and see if the backend of the site goes down at the same time. There is also a request structure we can use to uncover if it is a phishing proxy. It's just stupid to assume this is the site's backend when the headers are the same. Like of course they would be. That is the fucking point.

I'll leave this up for 1 hour so people can see this comment and then remove this post.
/u/devilish P
2 points
1 week ago
I'm going to work on a post detailing this so people can stop throwing turds at marketplaces for supposed IP leaks that are phishing proxies.
/u/BlackCell P BlackOps
1 points
1 week ago
PS. We have always and will always pay our bug bounties!

-> /d/BlackOps/wiki?id=860b2749
/u/PixelDrift 🍼
1 points
1 week ago
Thanks!
/u/notrustbutverify 📢 🍼
0 points
1 week ago
Why did I get the framework then? It should have been nginx like any other MITM?
/u/Paris A
2 points
1 week ago
It fucking proxies the exact requests you send. Some MiTM proxies are better and have their own application routing layer that doesn't use nginx. It is stupid easy to relay these requests to make it look exactly the same.
/u/notrustbutverify 📢 🍼
1 points
1 week ago
There was no sign of Django being used on that website, everything was obfuscated. They just made a fuck up and exposed their own site. You did not even bother checking with me the issue at hand. You went directly into saying "MiTM".
/u/BlackCell P BlackOps
2 points
1 week ago
Listen. You've been talking so much bullshit on Dread when people don;t pay you, i am sure /u/TopshellNL can also vouch for that. You been coming at us with 4 different accounts and probably sent Drughub in our direction as well. You've been exposed for the third time now and your accounts have already been banned. The first time we didn't pay you fast enough you immediately threatened us. I am sure /u/Paris can find those conversation logs as you keep deleting every single conversation you have. And now you come with IPs that aren't even our server IPs.

And you post it on Pitch with your Enzyme account. What a fucking surprise.

You fucked up here, not us.
/u/notrustbutverify 📢 🍼
1 points
1 week ago
I have never talked to TopShell outside of DDoS stuff. I have no link with DrugHub in contrary I despise him because of links with the late AlphaBay same for his shill CodeIsLaw.

When there is an issue at hand you check, pay and solve it. Done. No ghosting whatsoever. Now you pay the price with /u/paris hidding your mistake. Typical from a /u/DeSnake shill right paris?
/u/BlackCell P BlackOps
2 points
1 week ago*
He bud, go FUD someone else instead of Paris. We paid your bug bounty. If you for once came to us normally and have some patience then we could have immediately told you its not correct. But every time you do you start freaking out. As you do with others from what i can see. You need to calm the fuck down brother. This is ALL on you and on nobody else. If you wanted anything your short temper and way of going about things is very wrong. I advise you to really think about this if you want to get somewhere in life. It's hard words but true.

I won't be wasting my time in this post anymore.

Good luck.
/u/notrustbutverify 📢 🍼
0 points
1 week ago
Admin of a darknet marketplace giving advice lol

We will talk at the booth.
If you truly have the IP you know what to do. I suspect Paris is right though.
/u/notrustbutverify 📢 🍼
1 points
1 week ago
Why is it showing the framework used then and not a reverse proxy?
/u/DaSnake
1 points
1 week ago
Would that by any chance happen to be Sam Bent's kissing booth ?
/u/BlackCell P BlackOps
2 points
1 week ago*
Appreciate you taking the time to respond.

We have no issue leaving it up, as i replied below, It's not ours so anyone who has it. Good luck with it!
/u/zephyra
1 points
1 week ago
True, and these type of reverse proxy based phish attacks are hard to identify as they are just serving everything exactly. Plus, we can’t block them via server side verification as they spoof the host too, so blocking them through server side is not possible and to block them through client side, it requires jewscript.
/u/BlackCell P BlackOps
5 points
1 week ago*
It’s you again,

Enzyme ( ItsDoxHub - Beelzebum - notrustbutverify - parsed and various other Alts)

The same person who betrayed vendor Topshellnl , threatening to release doxx info after being 'hired' by him. And have been annoyingly threatening us for a while, even after we paid your bug bounty in full. Seems like you can’t stop stabbing anyone in the back.

Look bud, these IPs, have nothing to do with our back-end and we don't use a VM. Good luck with some random proxies though.

Talking to yourself throughout this entire post with all these shitty ALTs of yours, no older than 3 weeks and make some upvotes. -> /post/d5100fa8e09525ede1fa/#c-a2b423a9299d20cdb2

/u/Hugbunter and /u/Paris should ban this account as well, along with all the others. If you need to contact us/me, you know where top find us (not at this IP though ;) )

We paid your bug bounty in full. And why contact us asking what we think about some names. We both know you tried to get paid for your BS and we didn't so now you come up with yet another way to try and tarnish someone's reputation as is your entire M.O. and yet again with bullshit information.

Thanks for using dump.li , seems our ad budget is paying off ;)

TLDR: What you think is us.. isn't us.

-
Team Black Ops


ps.


/u/notrustbutverify 📢 🍼 2 points
18 minutes ago
And since people are covering their lack of knowledge here's the treat by saying "it's a

I also found something :) : http://dumpliwoard5qsrrsroni7bdiishealhky4snigbzfmzcquwo3kml4id onion/i/045387.jpeg
/u/majorpayne2
1 points
1 week ago
mate you can't be this retarded, do you genuinely believe all of us are alts of the same person :sob:
btw nice subdread ban LOL
/u/notrustbutverify 📢 🍼
1 points
1 week ago
You and me know very well that you use django, a random proxy with your site header and the same framework that you use?

You can't even stay in the subject you have to move to some FUD which you can't even back up lol at least this will be for public use and a good one if you know what I mean
/u/BlackCell P BlackOps
1 points
1 week ago
Tell me, why should i care if you use this? Use it, give it to the Feds for all i care. It won't change anything for us bud.

You must think we've been sleeping on the job, we haven't ;) And you wont get any amount of money from us (anymore).
/u/notrustbutverify 📢 🍼
1 points
1 week ago
Yeah I knew that when I gave you that whole number fix instead of allowing that location:product-details, you ghosted me and now you have your payback.

Also stop that persona you are not ASNT, you use django, your market is made of Django Packages. Did you read that? P A C K A G E SSSSS :)
/u/BlackCell P BlackOps
1 points
1 week ago
Someone should put you in a package and seal it the fuck up.
/u/TrippyHippy123
2 points
1 week ago
/u/BlackCell hahahahaha LMFAO your comment is gold!!
“Someone should put you in a package and seal it the fuck up”… ROFL
/u/notrustbutverify 📢 🍼
1 points
1 week ago
You know you fucked up, how much time is left for you? I am sure it has already been scraped lol
/u/BlackCell P BlackOps
2 points
1 week ago
My friend, this IP was never our server IP. There is nothing to parse. You want to hold onto something that was never there. This i can guarantee you.
/u/notrustbutverify 📢 🍼
1 points
1 week ago
If not then heaven is yours but you know that this IP was or is urs.
/u/BlackCell P BlackOps
1 points
1 week ago
You forgot something, here let me help you.

 wasn't + isn't

You're welcome.
/u/PixelDrift 🍼
1 points
1 week ago
popcorn.gif
/u/Anorial_newacc
1 points
1 week ago
first of don't scam someone who fucking finds you bugs that is shit. In your case nice and good that you talk here about it if they don't drop a statement or say something about it they should pay you more now as compansation
/u/BlackCell P BlackOps
4 points
1 week ago
First.

We paid him and scammed him on nothing. He even got extra for the wait! But he scams and doxxes everyone that pays him.

P.I.C. -> /post/d5100fa8e09525ede1fa/#c-9008769b98d2666638

Thanks.
/u/Anorial_newacc
1 points
1 week ago
thx for the clarification and sorry for this Guys. I never heard his name / about him. then i take all back what i said does at least someone knows who he really is bc he also post stuff on Pitch around 2h ago. I hate scammers if you want to scam scam scammers or companys or govs but not innocent people
/u/BlackCell P BlackOps
2 points
1 week ago
Yeah i saw there he post under his real ENZYME name because on dread his main Enzyme account has already been banned by the admins.
/u/notrustbutverify 📢 🍼
1 points
1 week ago*
I had CodeIsLaw bot following me around
/post/9fe9f70769dda71a5c35/#c-02e3848dcfb6ea0eb0
/u/Anorial_newacc
1 points
1 week ago
unfortuntly they don't impliment a filter if he trys to identify himself and delete his account instantly would be good and funny but i don't think it is possibly.
Appreciate it.
/u/majorpayne2
1 points
1 week ago
writing something as complex and opsec-reliant as a DNM in python is definitely a choice
/u/notrustbutverify 📢 🍼
1 points
1 week ago
When you mean writing? you mean

import
import
import
import
/u/majorpayne2
1 points
1 week ago
import # As an AI assistant, I can't tell you what this package does. However, based on the name...
import # As an AI assistant, I can't tell you what this package does. However, based on the name...
import # As an AI assistant, I can't tell you what this package does. However, based on the name...
import # As an AI assistant, I can't tell you what this package does. However, based on the name...
/u/notrustbutverify 📢 🍼
1 points
1 week ago*
And since people are covering their lack of knowledge here's the treat by saying "it's a phishing link" yeah to the point of using a framework and containers, yeah yeah yeah, next time phishers are going to write in Rust

removed links because someone not happy
/u/headshotnegativity
1 points
1 week ago
CJNG??
/u/notrustbutverify 📢 🍼
2 points
1 week ago
El mencho in Rust
/u/headshotnegativity
1 points
1 week ago
viva la revolucion hermano
muerte a toda authoridad
/u/fake_biz 🍼 P
1 points
1 week ago
proxmox? wtf, are you serious?
Enzyme here

/u/realitymixer is looking for you. Sounded like you fucked his girl or something /post/d5100fa8e09525ede1fa.
/u/delhifpo P ShowerPeeper
1 points
1 week ago
lool dude you should not have tagged that nigga.
Why? The retard made three threads and numerous comments about me and I should be the one to be quiet? Forget about it man. I'm not going to let me bullied for something I have nothing to do with in the first place. They have zero proof. And they won't find any since, you know - there isn't. It's fairly entertaining seeing them try though. The black dick stylometry is one of the worst attempts at de-anonymization I've seen my entire life. Reflects well on the author especially when you know they call it "evidence".
/u/majorpayne2
2 points
1 week ago
LMFAO, holy shit hello my alt account /u/notrustbutverify
Oh! Hello, me.
/u/majorpayne2
2 points
1 week ago
The greatest stylometric analysis of the 21st century, and probably the previous four centuries too
/u/notrustbutverify 📢 🍼
1 points
1 week ago
We are Alts'chetyp
/u/headshotnegativity
1 points
1 week ago
you all been mods here too..
/u/notrustbutverify 📢 🍼
-2 points
1 week ago
other port
SSH-2.0-OpenSSH_9.2p1 Debian-2+deb12u6

server_host_key:
fingerprint:4c4M02lROUz1q9YPBG5mzDnaJ07db/E7XPmvFKzl4H8
fingerprint_sha256:e1ce0cd36951394cf5abd60f046e66cc39da274edd6ff13b5cf9af14ace5e07f

213.171.XX.XX:3128
3128
TCP/HTTP
 

HTTP/1.1 501 method 'GET' not available
Connection: close
Cache-Control: max-age=0
Date: Mon, 23 Jun 2025 14:38:04 GMT
Expires: Mon, 23 Jun 2025 14:38:04 GMT
Pragma: no-cache
Server: pve-api-daemon/3.0


213.171.XX.XX:111
111
TCP/PORTMAP
  
program  version  netid    address                 service          owner          
100000   4        tcp6     ::.0.111                portmapper       superuser      
100000   3        tcp6     ::.0.111                portmapper       superuser      
100000   4        udp6     ::.0.111                portmapper       superuser      
100000   3        udp6     ::.0.111                portmapper       superuser      
100000   4        tcp      0.0.0.0.0.111           portmapper       superuser      
100000   3        tcp      0.0.0.0.0.111           portmapper       superuser      
100000   2        tcp      0.0.0.0.0.111           portmapper       superuser      
100000   4        udp      0.0.0.0.0.111           portmapper       superuser      
100000   3        udp      0.0.0.0.0.111           portmapper       superuser      
100000   2        udp      0.0.0.0.0.111           portmapper       superuser      
100000   4        local    /run/rpcbind.sock       portmapper       superuser      
100000   3        local    /run/rpcbind.sock       portmapper       superuser      

213.171.XX.XX:123
123
UDP/NTP
  
Version: 4
Close stratum: 3
Polling Interval: 4
Root Delay: 0.004791259765625
Root Dispersion: 0.0338897705078125
Reference ID: 1566532173
Reference Timestamp: 16992965818733728323
/u/gbusa
1 points
1 week ago
this is rather interesting