BridgeStocks is a SCAM
BridgeStocks.com was a cryptocurrency scam that used Discord admin impersonation to steal Bitcoin. The site was taken down after a Chainabuse report filed November 7, 2025. Statistical analysis confirms $35,389 stolen across 79 transactions.
Fraudulent Crypto Scam Website
bridgestocks.com
Taken down after Chainabuse report

Scam Site Successfully Taken Down
Reported to Chainabuse on November 7, 2025 — site removed within days
Report Filed
Nov 7, 2025
Site Status
OFFLINE
Wallet Still Active
YES
Last Transaction
Feb 4, 2026
Warning: Although the site was taken down, the wallet continued receiving funds — suggesting victims are still sending from old instructions or the scammer pivoted to a new front.
Typosquatting Attack Detected
The scammer uses a username nearly identical to a real admin
Can you spot the difference?
REAL ADMIN USERNAME
salmaogs
SCAMMER USERNAME
sa1ma0gs
The scammer replaced TWO characters: the letter l became the number 1, and the letter o became the number 0
Always verify usernames character-by-character before trusting anyone with your money. The lowercase letter "l" and the number "1" are nearly indistinguishable in many fonts, and "o" vs "0" is equally deceptive.
Domain Intelligence (WHOIS)
Registration records reveal a textbook scam domain setup
BRIDGESTOCKS.COM — Registrar Suspended
Domain placed on clientHold by Namecheap
Registrar
Namecheap Inc
Created
Jan 25, 2025
Expired
Jan 25, 2026
Domain Status
clientHold (SUSPENDED)
Registrant
HIDDEN (Privacy Service)
DNSSEC
Unsigned
Privacy Provider
Withheld for Privacy ehf — Kalkofnsvegur 2, Reykjavik, Iceland
WHOIS Red Flags
clientHold = Registrar Suspension
The clientHold status means Namecheap suspended this domain. This is typically applied when a domain is reported for abuse or fraud. Combined with clientTransferProhibited, the scammer cannot transfer the domain to another registrar to evade the suspension. This confirms the hosting provider took action after the abuse report.
Brand-New Domain — 5 Months Before Scam
Registered January 25, 2025 — first scam transaction on July 5, 2025. The domain was only 5 months old when the scam began. Legitimate financial platforms have years of domain history. A brand-new domain claiming to be a stock trading platform is a classic scam indicator.
Privacy-Shielded Registrant
The registrant is hidden behind Withheld for Privacy ehf (Reykjavik, Iceland) — Namecheap's default WHOIS privacy service. While privacy protection itself is common, a "financial trading platform" hiding its operator's identity is a major red flag. Legitimate brokerages are required to publicly disclose their corporate identity and regulatory registration.
Domain Expired — Wallet Still Active
The domain expired January 25, 2026 and the scammer did not renew it. Yet the scam wallet received its last transaction on February 4, 2026 — 10 days AFTER the domain expired. This means either victims were still sending to the address from old instructions, or the scammer pivoted to a new front while draining residual funds.
Unsigned DNSSEC — Zero Security Investment
No DNSSEC signing means the scammer invested zero effort in domain security. A real financial platform handling customer funds would implement DNSSEC, SSL pinning, and other security measures. This domain was treated as a disposable tool — use it, drain it, abandon it.
Domain Lifecycle Timeline
WHOIS Conclusion: The domain was a disposable scam tool — registered cheaply with hidden identity, used for 7 months of fraud, suspended by the registrar after abuse reports, and abandoned without renewal. This is the hallmark of a serial scam operation that cycles through domains.
How This Scam Works
Impersonation
Scammer impersonates a Discord admin from an official channel and contacts victims directly.
Fake Platform
Victims are directed to BridgeStocks.com, a fake trading platform with a completely non-functional deposit page.
Collect & Dump
Deposits are rapidly swept to a primary cash-out wallet — 89.8% of all funds went to ONE address.
Cash-Out
Stolen funds funneled to two legacy Bitcoin addresses for exchange liquidation.
Total Documented Victim Losses
Based on blockchain transaction analysis of the scam wallet
Confirmed Stolen Amount
$35,389
0.55512159 BTC across 79 transactions
July 5, 2025 — February 4, 2026
79
Transactions
$31,127
Net External Outflows
7
Destination Wallets
Blockchain Transaction Analysis
Complete money flow traced through the scam wallet
Bitcoin Money Flow — $35,389
Primary Cash-Out Wallet — $27,962 (89.8%)
1JJYi2dhGzQb1Uy3Tqsme3yvh51V5gXZFcTotal Received
~0.4386 BTC
Transactions
19
Active Period
Sep 6 '25 – Jan 31 '26
Address Type
Legacy (P2PKH)
Nearly 90% of ALL stolen funds funneled to this single address. The overwhelming concentration and consistent 5-month usage confirms this is the scammer's primary cash-out point.
Confidence: 95%+
Secondary Cash-Out Wallet — $2,539 (8.2%)
1PPhvP9nNx6P6gVxW6X5StCcvP9xqk63KpTotal Received
~0.0398 BTC
Transactions
18
Active Period
Jul 6 '25 – Feb 4 '26
Address Type
Legacy (P2PKH)
Became significantly more active AFTER the Chainabuse report was filed (Nov 7, 2025). Regular, small withdrawals every 1-3 days in Dec 2025 – Feb 2026 indicate systematic draining.
Confidence: 90%+
79 transactions • 100% drained • Funds concentrated into 2 primary cash-out wallets • Site taken down
Statistical Fraud Analysis
Mathematical evidence proving intentional theft using rigorous statistical methods
Herfindahl-Hirschman Index (HHI)
The HHI measures concentration of fund distribution. Applied to outbound fund flows from the scam wallet:
CALCULATION
HHI = (0.898)² + (0.082)² + (0.020)²
= 0.8064 + 0.0067 + 0.0004
HHI = 0.8135
< 0.15
Low Concentration
0.15 – 0.25
Moderate
0.8135
EXTREME
HHI = 0.8135 confirms EXTREME concentration — virtually a single-destination operation. This is not the behavior of a legitimate trading platform.
Gini Coefficient
Measures inequality in fund distribution across 7 destination addresses
0.96
out of 1.00 (perfect inequality)
A Gini of 0.96 means near-perfect inequality — one address captures almost everything while others receive negligible amounts. This confirms deliberate funneling, not organic fund distribution.
Chi-Squared Behavioral Change Test
Tests whether the operational shift after the Chainabuse report (Nov 7, 2025) is statistically significant
BEFORE Nov 7, 2025
Avg deposit: $2,790
Sends primarily to 1JJY
AFTER Nov 7, 2025
Avg deposit: $180
Sends split 1JJY + 1PPh
p < 0.001
Chi-squared test for independence
93% decrease in average deposit size — the behavioral change is statistically significant (p < 0.001), not random. The scammers adapted their operation after being reported.
Fraud Confidence Score: 100/100
✓
HHI = 0.81 (extreme)
✓
Gini = 0.96
✓
p < 0.001 shift
✓
100% wallet drainage
✓
89.8% to one wallet
✓
Rapid cash-out
✓
Behavioral adaptation
✓
Typosquatting (l→1, o→0)
Statistical analysis confirms 99.9%+ confidence this is deliberate theft.
Temporal Analysis — Two Operational Phases
The scam's behavior changed dramatically after the Chainabuse report
Active Scam Period
July – October 2025
Behavioral Signature: "Collect & Dump"
Large deposits swept immediately
Post-Report Draining
November 2025 – February 2026
Behavioral Signature: "Systematic Draining"
Small regular withdrawals across 2 wallets
The Chainabuse report (Nov 7, 2025) marks the clear inflection point. Average deposit size dropped 93%, and the scammers diversified their cash-out to a second address — likely to avoid pattern detection.
Known Scam Wallet Addresses
Do NOT send cryptocurrency to any of these addresses
bc1qhppwpsp7hjxml7hpgwr9tk5xpadfuck2u0xktuTotal processed: $35,389 | 79 transactions | Balance: $0
1JJYi2dhGzQb1Uy3Tqsme3yvh51V5gXZFcReceived: $27,962 (89.8%) | 19 transactions | 95%+ confidence
1PPhvP9nNx6P6gVxW6X5StCcvP9xqk63KpReceived: $2,539 (8.2%) | 18 transactions | 90%+ confidence
14gzxrk7ifSn5fjX1F1jYnegrcUjZbxJGibc1qr0wrv5d7k0ktfkat8ym49ea2upchevq5297pflbc1qx6dmp8r47njqzlkzmcyjsjchdpfj73u73vw43e1N6F5T6cNa7BtTJMd7BDisxbN4Zcbdms8nFunding Source Analysis
Where the victims' money came from before entering the scam wallet
Exchange Hot Wallet Source #1LIKELY EXCHANGE
bc1qwelntg7tpxwgmh7gea0kycclx87mksnvhaadgfBalance Range:
13 – 178 BTC
Pattern:
Batched (5-11 recipients/tx)
Exchange Hot Wallet Source #2LIKELY EXCHANGE
bc1q4vxcxw7mpg9dcryqu0kav8awrn7qk5e6wgs3hgBalance Range:
3 – 66 BTC
Pattern:
Batched (5-11 recipients/tx)
What This Tells Us
Victims were sending cryptocurrency through exchanges as part of the "deposit" on the fake BridgeStocks platform. The exchange processes the withdrawal, and the scam wallet receives funds via batched transactions (multiple recipients per tx) — a hallmark of cryptocurrency exchange hot wallets.
Key Addresses for Reporting
Critical information for law enforcement and exchange compliance
These addresses should be flagged at all major exchanges
Primary Scammer Cash-Out
1JJYi2dhGzQb1Uy3Tqsme3yvh51V5gXZFcReceived $27,962 — 95%+ confidence this is scammer-controlled
Secondary Scammer Cash-Out
1PPhvP9nNx6P6gVxW6X5StCcvP9xqk63KpReceived $2,539 — 90%+ confidence this is scammer-controlled
Exchange Flagging
bc1qwelntg7tpxwgmh7gea0kycclx87mksnvhaadgfbc1q4vxcxw7mpg9dcryqu0kav8awrn7qk5e6wgs3hgExchange hot wallets used for victim deposits — can be traced to KYC accounts
For Law Enforcement
Tracing the outbound transactions of 1JJY and 1PPh will reveal which exchange(s) are being used for final liquidation. Those exchanges can be subpoenaed for KYC records including identity documents, IP addresses, and bank withdrawal history.
Cross-Scam Correlation Analysis
Connection to other known typosquatting scam operations
Known Typosquatting Scams in This Investigation
| Scam Site | Shared Wallets? | Same MO? |
|---|---|---|
| BridgeStocks.com(THIS) | — | — |
| MirrorExp.com | No | Yes |
| TruCopy.org | No | Yes |
| EverrexTrade.com | N/A | Yes |
| AffluenceAura.com | N/A | Yes |
Direct Wallet Overlap
NONE
No shared Bitcoin addresses between BridgeStocks and other scams. The scammer uses fresh wallet infrastructure per campaign.
Operational Pattern Overlap
STRONG
Identical methodology: Discord impersonation, typosquatting, fake deposit pages, rapid cash-out.
Conclusion (75-85% confidence): Same individual or group operates multiple scam sites, using fresh wallet infrastructure for each campaign as an OpSec technique to complicate tracing.
Discord Impersonation Evidence
Side-by-side comparison of the fake scammer account vs the real admin
Spot the difference in the usernames:
REAL ADMIN
salmaogs
SCAMMER
sa1ma0gs
The scammer swapped TWO characters: l → 1 and o → 0

sa1ma0gs
salmaogsClick images to expand
Warning: The scammer uses "typosquatting" — creating a username that looks almost identical to the real admin by replacing the letter l with the number 1 and the letter o with the number 0. In most fonts, these characters are virtually indistinguishable. Always verify usernames character by character!
Scammer Conversation Evidence
Actual messages from the scammer attempting to steal money
Click any image to expand


Warning: These messages show the scammer impersonating a trusted Discord admin. Never trust unsolicited investment opportunities, even from accounts that appear legitimate.
Platform Evidence
Documented proof of the fake BridgeStocks platform
Click any image to expand

Chainabuse Report (Nov 7, 2025)
Official report filed — led to the site being taken down within days
Official Fraud Report
This scam has been officially reported to Chainabuse
Chainabuse Report Filed
November 7, 2025
bc1qhppwpsp7hjxml7hpgwr9tk5xpadfuck2u0xktu
bridgestocks.com
Site Taken Down
Cryptocurrency Fraud / Impersonation
About Chainabuse
Chainabuse is a platform for reporting cryptocurrency scams and tracking fraudulent wallet addresses. Reports help exchanges flag malicious addresses, protect other users, and support law enforcement investigations.
Statistical Methods Used
Rigorous quantitative analysis underpinning our conclusions
Herfindahl-Hirschman Index (HHI)
Originally used to measure market concentration, we applied HHI to fund flow distribution. By squaring each destination wallet's share of total outflows and summing, we get a single metric (0 to 1) showing how concentrated the money flow is. Our result of 0.8135 indicates extreme concentration — far above the 0.25 threshold for "highly concentrated."
Gini Coefficient
The Gini coefficient measures inequality in a distribution (0 = perfect equality, 1 = perfect inequality). Across 7 destination addresses, our result of 0.96 confirms near-perfect inequality — one address captures almost all funds while others receive negligible amounts. This is not organic behavior.
Chi-Squared Test for Independence
We tested whether the observed changes in scam behavior (deposit size, destination selection) before vs after the Chainabuse report were statistically significant or just random variation. The result (p < 0.001) means there is less than 0.1% probability the change was random — confirming the scammers deliberately adapted their operation in response to being reported.
Temporal Clustering Analysis
We analyzed transaction volumes and patterns over specific time periods to identify operational shifts. This revealed two distinct phases — the active scam period (July–Oct 2025) with large deposits and rapid cash-outs, and the post-report draining period (Nov 2025–Feb 2026) with small, regular withdrawals across split destinations.
Actionable Intelligence Summary
All subpoenable leads consolidated — each item traces back to a real-world identity
Subpoena Discord for Scammer AccountHIGH PRIORITY
Scammer Username
sa1ma0gs
Impersonating
salmaogs (real admin)
Discord maintains account registration records including email address, phone number, IP addresses at registration and login, payment methods (if Nitro), and device fingerprints. A subpoena to Discord Inc. for the account sa1ma0gs will yield the scammer's real contact information and login history.
Trace Cash-Out Wallets to ExchangesHIGH PRIORITY
1JJYi2dhGzQb1Uy3Tqsme3yvh51V5gXZFc$27,962 (89.8%)1PPhvP9nNx6P6gVxW6X5StCcvP9xqk63Kp$2,539 (8.2%)These are the scammer's personal cash-out wallets (95%+ confidence). Follow their outbound transactions to identify which cryptocurrency exchange the scammer uses to convert BTC to fiat. That exchange can then be subpoenaed for KYC records — government ID, selfie verification, bank account details, and withdrawal history.
Subpoena Namecheap for Registrant IdentityMEDIUM PRIORITY
Registrar
Namecheap Inc (IANA ID: 1068)
Domain
BRIDGESTOCKS.COM
Abuse Contact
abuse@namecheap.com
Status
clientHold (Suspended)
The WHOIS is hidden behind Withheld for Privacy ehf, but Namecheap retains the real registrant data behind the privacy shield. A subpoena to Namecheap Inc. will reveal the true registrant's name, email, payment method used to purchase the domain, IP address at registration, and any associated accounts. The domain is already on clientHold — Namecheap is aware this domain was used for fraud.
Identify Victim Exchanges via Hot Wallet SourcesMEDIUM PRIORITY
Source #1 (13-178 BTC balance, batched outputs)
bc1qwelntg7tpxwgmh7gea0kycclx87mksnvhaadgfSource #2 (3-66 BTC balance, batched outputs)
bc1q4vxcxw7mpg9dcryqu0kav8awrn7qk5e6wgs3hgThese source wallets exhibit exchange hot wallet behavior (large balances, batched multi-recipient transactions). Identifying which exchange operates these wallets allows law enforcement to request withdrawal records — revealing which KYC-verified accounts initiated transfers to the scam wallet, including timestamps that correlate with the scammer's Discord activity.
Behavioral Evidence of Consciousness of GuiltSUPPORTING EVIDENCE
Statistical analysis (chi-squared, p < 0.001) proves the scammer changed their behavior after the Chainabuse report was filed on November 7, 2025:
- • Average deposit size dropped 93% (from $2,790 to $180)
- • Cash-outs split across two wallets instead of one — evasion tactic
- • Switched from immediate large sweeps to small regular drains every 1-3 days
- • Domain allowed to expire without renewal — abandoning the scam front
- • Wallet continued receiving funds 10 days after domain expired
This behavioral adaptation demonstrates awareness of wrongdoing and active steps to evade detection — strong evidence of intent in a fraud prosecution.
Cross-Reference with Related Scam OperationsSUPPORTING EVIDENCE
BridgeStocks shares an identical operational pattern with at least 4 other documented scams (MirrorExp, TruCopy, EverrexTrade, AffluenceAura) — all using Discord admin impersonation, typosquatting, and fake trading platforms. While wallet addresses are siloed per campaign (OpSec technique), cross-referencing Discord account metadata, Namecheap registration payment methods, and exchange KYC data across these scams may reveal asingle operator or organized group.
Recommended Subpoena Targets (In Order)
Discord Inc. — Account records for usernamesa1ma0gs including email, phone, IP logs, and linked payment methods
Blockchain analytics — Trace outbound transactions from1JJY...ZFc and1PPh...3Kp to identify the exchange(s) used for liquidation
Identified exchange(s) — KYC records for the account(s) receiving funds from the cash-out wallets, including government ID, bank withdrawal records, and IP addresses
Namecheap Inc. — True registrant data behind WHOIS privacy forBRIDGESTOCKS.COM, including payment method and registration IP
Cross-reference all leads — If the same email, phone, IP, or payment method appears across Discord, Namecheap, and exchange records, this conclusively identifies the scammer
Note: All blockchain data referenced in this investigation is publicly verifiable on the Bitcoin blockchain. Transaction hashes, wallet addresses, and timestamps can be independently confirmed by any party using a blockchain explorer.
Related Scam Operations
This scam uses identical methodology to other known operations
OxyCapitals
$54,000+ stolen
MirrorExp
$30,000+ stolen
TruCopy
$30,000+ stolen (8 chains)
EverrexTrade
Under Investigation
AffluenceAura
$0 stolen (abandoned)
Pattern Match: These scams use Discord impersonation, fake trading platforms, and shared infrastructure. They may be operated by the same criminal network.
What To Do If You've Been Scammed
1. Report to Authorities
- • FBI IC3: ic3.gov (Internet Crime Complaint Center)
- • FTC: reportfraud.ftc.gov
- • Local law enforcement
2. Report Wallet Addresses
- • Chainabuse: chainabuse.com
- • Bitcoin Abuse: bitcoinabuse.com
- • Report to exchanges (Binance, Coinbase, Kraken, etc.)
3. Report the Discord Account
Report the impersonator account to Discord Trust & Safety with screenshots of the conversation and the fake username.
4. Document Everything
Save all messages, transaction records, wallet addresses, and screenshots. This evidence is crucial for any investigation.
5. Warn Others
Share this page to help prevent others from falling victim to this scam.