Verdict: Bprotrade (bprotrade.io) is a confirmed “fraud factory” linked to the multi-billion dollar Milton Group and AK Group scam syndicates. Forensic evidence confirms they utilize manipulated software and shared server clusters to defraud investors under the guise of an elite trading platform.
Technical Summary
| Technical Category | Entity Information & Connections |
| Scam Trading Platform | Bprotrade |
| Live / Active Domain | bprotrade.io |
| Previous Domains | bprotrade.com, bprotrade.cc, bprotrade.net, bprotrade.org, bprotrade.info, client.bprotrade.io |
| Group Affiliation | Part of the Limited AK Group, a subsidiary of the Milton Group syndicate. |
| Verified Sister Entities | Solo Capitals, EverFX, CryptoMB, BProFX, CoinEvo (Lilac Group LLC), LPL Invest, Vetoro Banc, and MelbourneFX. |
| Evidence of Linkage | Shared Puma TS software suite, geographical/personnel overlap, unified IP/Server/VOIP infrastructure, and the “Clone Effect” in website architecture |
The Architecture of Deception: Bprotrade and the Milton Group
Bprotrade (bprotrade.io) is a confirmed scam. It operates as a strategic arm of the AK Group, mirroring the tactics of known fraudulent entities like Stonebridge Ventures(stonebridgeventures.net). Historically, bprotrade.com served as the primary landing page before regulatory pressure rendered it unreachable, forcing the operation to migrate to its current io domain and several mirrors.
The AK Group functions as a high-volume subsidiary of the Milton Group Scam Empire. This network is responsible for global financial losses exceeding $250 million, according to recent 2026 investigative reports. The severity of this operation was cemented in March 2026, when a German court sentenced Mikheil Biniashvili, a key figure in the AK Group, to seven-and-a-half years in prison.
Technical Infrastructure: The “Scam-in-a-Box” System
The technical architecture of Bprotrade and its sister brands, including BProFX, EverFX, and Vetoro Banc, serves as a direct bridge to the Milton Group ecosystem. They all share a proprietary “fraud stack” designed to manipulate victims.
1. Solo Capitals
- Primary Domains: solocapitals.net, solocapitals.com, solocapitals.cc, solocapitals.io
- Context: Based in Georgia, this brand was the centerpiece of the BBC investigation, “On the Hunt for the Businessmen Behind a Billion-Dollar Scam.” The investigation proved that branding and technology were funneled through private servers linked directly to the Milton Group.
2. EverFX
- Primary Domains: everfx.com, everfxglobal.com, everfx.pro
- Context: Known for high-profile sponsorships like Sevilla FC, EverFX defrauded over 170,000 people. While it used a CySEC-regulated front (ICC Intercertus Capital Ltd), it functioned as a massive “boiler room.”
- Rebrands: After UK (FCA) bans, traffic moved to axiance.com—which is still actively scamming in 2026—and axiance-eu.com.
3. CryptoMB
- Primary Domains: cryptomb.cc, cryptomb.io, cryptomb.com
- Context: Linked to Columbia Capital Group Ltd, this entity operated alongside cryptoeu.com and euro-crypto.com. While these specific domains are inactive in 2026, they remain part of the broader recovery investigation.
4. BProFX
- Primary Domains: bprofx.com, bprofx.cc, bprofx.net
- Context: BProFX acts as the “second-stage” trap. When victims at EverFX became suspicious, they were often moved to BProFX under the guise of an “elite platform” with better algorithms. It is registered as an unregulated shell in Dominica via Dynamics Solution Ltd.
5. CoinEvo (Lilac Group LLC)
- Primary Domains: coinevo.io, coinevo.pro
- Context: Flagged by Italy’s CONSOB, CoinEvo utilizes the same high-pressure sales tactics and falsified trading interfaces as the Tbilisi call centers.
6. LPL Invest
- Primary Domains: lplinvest.com,lplfinances.eu, and lpleurope.eu
- Context: This is a recovery scam. It mimics the legitimate US-based LPL Financial (lpl.com) to target people who have already lost money, pretending to help them trace and recover funds while actually extracting a second “fee.”
7. Vetoro Banc
- Primary Domains: vetoro.io, vetoro.cc, vetorobank.com
- Context: Specifically flagged by the UK’s FCA. This “fraud factory” specialized in convincing victims to “upgrade” accounts based on fake analyst reports.
8. MelbourneFX
- Primary Domains: mlbfx.io, melbourne-fx.io, melbournefx.io
- Context: Newly flagged in April 2026 by the Australian government. This entity demands an astronomical minimum deposit of $5,500 AUD/USD, whereas legitimate brokers allow starts at $100. Currently, only mlbfx.io remains active.
Forensic Evidence: How Bprotrade is Linked to the Syndicate
Investigative findings from 2024 through early 2026 prove these brands are not independent, but “skins” on a singular infrastructure.
1. The Puma TS Software Suite
Bprotrade is built on the Puma Trading System, a proprietary “fraud stack” developed by the Milton Group.
- Bespoke Illegality: Unlike MetaTrader, Puma is not a commercial product. It is an illegal package provided only to “franchisees” of the network.
- Manipulation: The backend allows agents to see victim credentials and manually manipulate charts to show fabricated profits, encouraging further deposits.
2. IP and Server Clusters
Forensic analysis reveals that Bprotrade shares IP addresses and server clusters with CryptoMB and Vetoro Banc. These are often hosted on “bulletproof” servers in Bulgaria and Cyprus to avoid takedowns. Many sites contain code snippets from “Project Partners LLC,” a known Milton-linked development entity.
3. Remote Access Exploitation
Following the standard Milton Group manual, Bprotrade agents insist victims install AnyDesk or TeamViewer. This allows scammers to:
- Access online banking portals directly.
- Install malicious extensions to intercept 2FA codes.
- Execute unauthorized transfers from the victim’s local machine.
4. Payment Gateway Obfuscation
The money trail for Bprotrade utilizes a mesh of shell companies in the UK, Marshall Islands, and St. Vincent and the Grenadines. Deposit addresses for Bitcoin and Ethereum are frequently linked to “parent wallets” used by the wider Milton Group to mix stolen crypto.
Comparison Table: Bprotrade vs. Milton Group Assets
| Feature | Technical Similarity | Status (2026) |
| Trading Platform | PumaTS (Proprietary) | Identical |
| Backend CRM | Milton/Morgan Internal CRM | Identical |
| Server Hosting | Shared IP Clusters (Bulgaria/Cyprus) | Highly Linked |
| Remote Access | AnyDesk/TeamViewer Exploitation | Standard Operating Procedure |
| Source Code | “Project Partners LLC” snippets | Confirmed |
Take Action Against Bprotrade
If you have lost money to Bprotrade or any of its sister entities listed above, you are a victim of a coordinated international syndicate. Despite many domains being unreachable, investigative trails remain warm.
Report your case and provide any correspondence through our Reporting Page to assist in the ongoing 2026 recovery efforts.