This post is an explainer to the actions taken and thought process behind banning 28 members of our Discord who had the 200 Stonk role.
When our Discord first opened, we gave the “200 Stonk” role to the first 200 members through the door as a fun thing. Over time, 60 or so of those members left, and we had about 140 who stuck around. We decided to mint 1 PCD each to those 140 through a community vote on Discord, then ratified that vote on Snapshot.
We opened up a Premint whitelist application to collect 200 Stonk addresses, and gave those a week or two to send in their addresses. We required Discord linking, but did not require Twitter linking. We received about 200 applications, 62 of which I verified as actually holding the 200 Stonk role. While looking at the data, we noticed that some of the applications had the ****same hashed IP address (not traceable, but obviously the same). Here is an example of what this data looks like:
As anyone can see, red rows are similar IP addresses. Some of this wasn’t obvious at first because these came in at different times. However, if we sort by IP, we get the following
We’re purposely not including Discord names and Eth addresses here because it wouldn’t be right to make some of that info public (and blurring out some of the IP, just incase), however, if the community wants to see the data, we can provide the data with at least Eth addresses redacted. Perhaps the screenshots will be enough.
As one can see in the data above, we have a group of four addresses with the same IP, and a group of 17 with the same address. Some of that group of 17 were not 200 Stonk. If we filter for the role, we see the following: