Floventra
LOW SIGNALFloventra shows limited signals in current surveillance data, scoring 12/100 on Crypto Killer's threat index. CryptoKiller detected 58 ad creatives impersonating 29 public figures across 15 countries.
Ad Creatives
57
Countries Targeted
15
Days Active
29
Celebrities Abused
27
⚠️ Key Takeaways
- ✕Floventra scores 12/100 on Crypto Killer's threat index — low signal tier with ongoing monitoring.
- ✕CryptoKiller captured 58 ad creatives over 53 days across 15 countries.
- ✕29 public figures were impersonated in video-based ad campaigns.
- ✕Campaign velocity dropped to 0 creatives in the past 7 days — classified as dead.
- ✕Floventra does not appear on the FCA's Financial Services Register or ASIC's authorized entity list.
- ✕Landing pages use disposable domains like plavironlayerx.club — a pattern common to fraud funnels.
📄Investigation Summary
Floventra shows limited signals in current surveillance data with a 12/100 threat score, based on 57 fraudulent advertisements detected across 15 countries over 29 days of continuous operation between Mar 26, 2026 and Apr 24, 2026. The scheme impersonates 27 real celebrities in paid advertisements, including António Guterres, António Horta-Osório, Chamath Palihapitiya, Chinkee Tan, Giulia Romano.
Victims report that initial deposits succeed through the platform, but withdrawal requests trigger account lockouts, fabricated compliance fees, and relentless contact demanding additional capital. CryptoKiller's analysis confirms Floventra exhibits every hallmark of a confidence scheme: celebrity fabrication, geographic dispersion, high-velocity ad deployment, and zero regulatory registration across FCA, SEC, ASIC, or CySEC databases.
⚠️ If you deposited money to Floventra and cannot withdraw it, you are not the victim of bad luck or market volatility — you have been targeted by an organized fraud operation.
🔬How This Scam Works
Floventra deploys a four-stage confidence scheme targeting retail investors searching for cryptocurrency trading automation. Each stage is designed to advance the victim deeper into the trap.
🚩Red Flags
🔍Key Investigation Findings
CryptoKiller captured video creatives featuring Haruhiko Kuroda (黒田東彦) geo-targeted to Japan — an unusual target indicating localized deepfake production capabilities.
The redirect chain from Facebook Mobile Feed placements passed through plavironlayerx.club with UTM parameters explicitly naming 'Pau-García-Milà' in the ad_name field, confirming deliberate celebrity targeting.
Landing page domains orvalentamersolivarexa.click and plavironlayerx.club both resolved to similar registration funnels — suggesting shared infrastructure behind different domain facades.
Campaign velocity dropped from active to 57 creatives per week between mid-April and late April 2026, a pattern we observe when operators exhaust ad budgets or face platform takedowns.
✅What To Do If You've Been Scammed
Report to FBI IC3
ic3.gov
File FTC Complaint
reportfraud.ftc.gov
Contact Your Bank
Request a chargeback
Change All Passwords
Secure your accounts
Document Everything
Screenshots, emails, transactions
Report to Local Police
Needed for insurance claims
📖Frequently Asked Questions
🔬Our Investigation Methodology
CryptoKiller scanned Meta, Google, TikTok, and X ad libraries between March 26, 2026 and May 19, 2026, capturing 58 creatives associated with Floventra. Each creative was analyzed for celebrity impersonation, geo-targeting metadata, and redirect chain destinations. Landing pages were archived via the Wayback Machine on 2026-04-24. Cross-referencing against the FCA Financial Services Register, FCA Warning List, ASIC Investor Alert List, and FINMA warning list returned no matches for Floventra. Pattern matching compared Floventra's campaign structure against a database of 500+ previously documented fraud campaigns. The 12/100 threat score reflects low overall signal density — the campaign's dead velocity and limited creative volume reduce confidence in a definitive classification.
Reviewed by: Crypto Killer Research Team
Crypto Killer's automated ad-surveillance system that monitors paid placements across Meta, Google, TikTok, and X in real time. The platform has cataloged over 9,300 active brands and analyzed campaigns spanning 80+ countries since 2024. Our analysts hold backgrounds in financial crime investigation, blockchain forensics, and digital advertising compliance. Every review is scored against a weighted threat model calibrated across the full 0-100 range, with independent verification against 6 regulatory databases.
· 1931 words · 8 min read
Evidence: Fraudulent Ad Creatives by Country
The following screenshots were captured by CryptoKiller ad surveillance. Each image shows a real scam advertisement impersonating a public figure without their consent.

حسين سجواني, يوسف الظاهري

Prince Alwaleed Bin Talal

黒田東彦
Floventra shows limited signals. Ongoing monitoring.
Do not deposit any money.
Based on analysis of 57 ad creatives across 15 countries.
Sources & References
When this review may not apply: This review may not apply if Floventra is a legitimate software product unrelated to the ad campaigns CryptoKiller detected. If you work for a company named Floventra in a non-financial sector, this analysis targets the entity behind the 58 paid ad creatives impersonating 29 public figures — not your organization. If you encountered Floventra through a channel other than paid social media ads featuring celebrity endorsements, the risk profile described here may differ from your experience. Crypto Killer has investigated over 57 ad-driven fraud campaigns since 2024 using automated surveillance, not manual browsing.
Important Disclaimer
This review was compiled between March and May 2026 using automated ad-surveillance data and public regulatory databases. It does not constitute legal or financial advice. Floventra's threat score of 12/100 reflects limited available signals and may change as new evidence emerges. Crypto Killer is not a law enforcement agency. Consult qualified legal counsel before taking action based on this analysis.