⚠️ ACTIVE FRAUD ALERT — nanotrading.online is a live cryptocurrency fraud site. Do not connect any wallet or enter seed phrases. Report It Now →
Blockchain Forensics & Legal Advocacy

Exposing the Nanotrading Investment
Cryptocurrency Fraud Syndicate

This site is the official public record of a forensic investigation into a professional cryptocurrency advance-fee fraud operation. The perpetrators fabricated investment accounts, stole $36,150 from a single confirmed victim, and are actively targeting more people right now. Every fact here is documented, on-chain, and court-admissible.

Read the Investigation Track the Wallets I Was Scammed
$36,150
Confirmed Stolen
14
Wallets Traced
9 Days
Since Last Activity
$484
Freezable USDT Identified
2
KYC Exchange Targets
Case: NTI-LEAVITT-2026-001
Status: ACTIVE — GROUP INTELLIGENCE PHASE
Network: TRON Mainnet / TRC-20 USDT
Opened: April 3, 2026
Classification: RESTRICTED

What Is This Site?

This is a public forensic investigation record maintained by the FTH Digital Forensics Unit. We document cryptocurrency fraud using blockchain analysis, document forensics, and open-source intelligence (OSINT). All findings are published here so that victims, lawyers, law enforcement, and exchanges have a single verified source of truth.

The fraud this site covers: An organized criminal group operating as "Nanotrading Investment" contacted victims claiming they were owed a large investment account. To receive the money, victims were told they needed to pay fees in USDT cryptocurrency. The fees never stop — every payment generates a new excuse for another payment. The investment account does not exist.

We have traced every USDT transaction, identified the exchanges the criminals used, built a complete legal brief, and produced professional documents ready for FBI, SEC, and exchange compliance submission. Everything you need to build a case is on this site.

⛔ This is a Live, Ongoing Fraud
The criminals are still operating. We observed funds cycling through their sink wallets as recently as March 25, 2026 — just 9 days ago. The fraud website nanotrading.online is still live and contains a seed phrase harvesting page that will steal any connected crypto wallet.

If you have been contacted by anyone claiming to be from "Nanotrading Investment," do not send any more money. Contact us or file a report with the FBI immediately.
Confirmed Facts — At a Glance
All forensically verified as of April 4, 2026
  • Fraud documents generated by PyFPDF 1.7.2 Python library — not a financial institution
  • Zero SEC, FINRA, or any regulatory registration found for "Nanotrading Investment"
  • $7,080 USDT traced across 14 wallets and 29 transactions on TRON blockchain
  • Bybit Exchange sent $1,880 to fraud wallet (3 withdrawals, August 2025) — KYC subpoena target
  • Gate.io confirmed as second exit exchange — second KYC subpoena path to real identity
  • Operation active since May 2024 — Leavitt is one of potentially 50–100+ victims

Everything You Need, Organized

Six sections, built for victims, lawyers, and law enforcement. No technical knowledge required.

Understanding the "Advance Fee Investment" Playbook

This fraud follows a documented global pattern used by organized criminal groups, particularly from Southeast Asia. Here is the exact script they use, step by step.

  1. Initial Contact — "You Have an Unclaimed Account"

    The victim is contacted out of nowhere, usually via messaging app or email. The message claims that a deceased relative, former business partner, or stranger has left behind a large investment account — and the victim has been designated as the new beneficiary. In this case, a person named "Mark Johnson" allegedly left $1.2 million in an account.

    ⚠️ Red Flag
    Unsolicited contact about a large sum of money you were not expecting is always a scam. There is no legal mechanism for a stranger to "assign" $1.2 million to you via an investment account.
  2. The Document Package — "Official" Papers Sent as Proof

    To appear legitimate, the criminals send professional-looking PDF documents: an "Investment Mandate" letter and a detailed "Account Statement" showing the $1.2 million balance. These documents look real. They have letterheads, case numbers, and official formatting. They are completely fake. Our forensic analysis confirmed both PDFs were generated by a Python programming library called PyFPDF — the same tool a developer uses to make receipts. A real financial institution uses bank-grade document management software, not open-source Python scripts.

  3. The Fee Demand — "You Must Pay 5% to Unlock the Funds"

    Once trust is established, the "account manager" (in this case: Daniel Joseph Schumer) explains that international financial regulations require a 5% clearance fee — approximately $60,175 — before the funds can be released. This must be paid as USDT cryptocurrency to a specific TRON wallet address. This is the core of the fraud. No legitimate institution charges a percentage-of-account fee to release funds to a beneficiary.

  4. The Escalation — Excuse After Excuse

    After the first payment, a new problem arises. Then another. Then another. The victim had already paid $36,150 and was being asked for more. Each new fee comes with a new fake document — a "debit memo," an "insurance requirement," a "tax clearance." The excuses are carefully engineered to feel believable. The real pattern: the demands never stop until the victim has no more money to send.

  5. The Exit — Wallet Swept, Fraud Continues

    Once a victim stops paying or becomes suspicious, the operators sweep all collected USDT through a chain of wallets to obscure the trail, then abandon the fraud collection wallet and move on to new victims under a new brand name. The wallet used for this case ($7,080 total) was swept clean and abandoned on September 10, 2025. The operators have been running new campaigns ever since.

Key Wallets — At a Glance

We identified and classified 14 wallets involved in this fraud. Here are the five most critical.

FRAUD COLLECTION WALLET
Primary fraud address — now swept & abandoned
Crime Wallet
TGf5bSmBBUPAY7bhsGhmafeD8w19h6sLdb
Received: $7,080 USDT Balance: $0 (swept) Active: May–Sep 2025
PRIMARY CRIMINAL SINK
Still holds $116.94 USDT — Tether freeze target
Freeze Target
TSt36w9edfNJaCQs433MyUNeHYBajoJTzK
Received: ~$2,000 USDT Balance: $116.94 ← FREEZE NOW
BYBIT HOT WALLET — KYC TARGET #1
Exchange that paid $1,880 to fraud wallet
Exchange
TU4vEruvZwLLkSfV9bNw12EJTPvNr7Pvaa
Action: Subpoena Bybit for the account holder who withdrew $1,880 USDT to fraud wallet in Aug 2025. That person is a suspect or the fraud operator.
GATE.IO EXIT WALLET — KYC TARGET #2
Still holds $366.94 USDT — second freeze target
Freeze Target
TLSptUxetSpjB8xRS6QrnJwuBY7Q7cuMyh
$366.94 USDT still sitting here — More recoverable than the primary sink. Gate.io delegated energy to this wallet, proving the operator has a Gate.io KYC account.
// Priority Actions

These Three Actions Can Identify the Criminals

Two regulated exchanges — Bybit and Gate.io — hold KYC records for the accounts that fed money into this fraud. A law enforcement letter or attorney subpoena to either exchange will reveal the real name, passport, and contact details of the fraud operator. The draft letters are ready and on this site.

View Draft Letters →
1
Bybit KYC Subpoena
compliance@bybit.com — 3 Aug 2025 withdrawals to fraud wallet totaling $1,880 USDT
2
Gate.io KYC Subpoena
compliance@gate.io — $1,500 received + $366.94 still frozen in Gate.io exit wallet
3
Tether Freeze — Both Wallets
legal@tether.to — $116.94 + $366.94 = $483.88 total freezable USDT remaining
4
FBI IC3 Complaint
ic3.gov — Wire fraud, money laundering, CFAA violations. Full case package ready to attach.