Do Not Buy ars.red
A breakdown of why the current ars.red AR2 script should be avoided. This page documents exit-scam history, stolen branding, plagiarized code, IP logging, and threats made by its operators. Evidence compiled from public Discord channels and V3rmillion threads.
All evidence on this page was posted by lajza in the #do-not-buy-ars-red channel on the ayyware Discord server. Lajza is a competing AR2 script developer who compiled public evidence and personal experience with the people behind ars.red.
Who is behind the current ars.red?
The current ars.red is not developed by the original ars.red team. It is a rebrand of GC9, operated by two people known as 2ds (also known as 2dsboy) and Bred. The original ars.red developers have publicly called out the current version as stolen branding.
2ds obtained the ars.red codebase from a user named IHaxU by ratting him, meaning he used malware to steal access to the source code.
Serial exit scamming
Bred and 2ds have been involved in at least 5 exit scams in 2025 alone. The pattern is always the same: launch a script under a new name, collect payments, then shut down abruptly without delivering.
Known previous projects (all exit-scammed):
Every release of GC9 lasted less than a month before being shut down. The rebranding to ars.red is just the latest iteration of the same cycle: reuse → hype → collect payments → exit-scam → repeat.
Stolen and plagiarized code
Bred's earlier script "Luna.vip" was found to contain 1:1 code snippets from the iridescent source leak and likely other leaked sources like fishy. Both the original ars.red developers and others on V3rmillion have confirmed that Bred is a known "skid" (someone who copies others' code and claims it as their own).
The original ars.red developer has spoken out about this directly, confirming the current team was never involved in the original project and stole both the name and codebase.
IP logging and RestoreCord
Both ars.red and its predecessors use RestoreCord to log the IP addresses of anyone who joins their Discord server. They have also been documented logging IPs when you execute the script itself. Their database reportedly contains over 2,000 IP addresses collected from users.
Bred has previously leaked lajza's IP address, demonstrating that the collected data is actively used for harassment.
Predatory pricing
The Discord invite alone costs $10. Then you have to pay more than $10 for the actual script on top of that. Users can be blacklisted at any time for no reason, losing access to everything they paid for with no refund.
DDoS and dox threats
2ds is documented threatening to DDoS and dox other AR2 developers and community members. This includes targeted harassment against competing script developers.
Dopamine.public and vanity.gg
Before ars.red, Bred and an associate known as Gxentry ran Dopamine.public, which was itself a renamed version of vanity.gg. The vanity.gg source code was leaked and confirmed to be heavily plagiarized from the iridescent source leak, showing no original coding ability.
V3rmillion thread — community evidence
A dedicated V3rmillion thread documents the situation in detail with posts from multiple community members confirming the exit scam history, code theft, and generally bad reputation of the ars.red team.
Additional evidence
Summary
- •Known serial exit scammers with 5+ confirmed exit scams in a single year
- •Stolen the "ars.red" brand name from the original developers who have publicly disowned them
- •Code plagiarized from leaked sources (iridescent, fishy) with no original development ability
- •IP logging through RestoreCord and on script execution, with 2,000+ IPs collected
- •$10 Discord entry fee + additional script cost, with arbitrary blacklisting and no refunds
- •DDoS and dox threats against competing developers and community members
- •Horrible reputation across V3rmillion and the wider AR2 scripting community
The people behind the current ars.red cannot be trusted. The evidence is public, consistent, and spans multiple years and platforms. Do not share payment information with them. Do not join their Discord server. Do not execute their script.
External reference: v3rm.net — Do not buy ars.red