April 2026

Do Not Buy ars.red

A breakdown of why the current ars.red AR2 script should be avoided. This page documents exit-scam history, stolen branding, plagiarized code, IP logging, and threats made by its operators. Evidence compiled from public Discord channels and V3rmillion threads.

lajza avatar
lajzadbljbny · Founder & Developer of ayyware

All evidence on this page was posted by lajza in the #do-not-buy-ars-red channel on the ayyware Discord server. Lajza is a competing AR2 script developer who compiled public evidence and personal experience with the people behind ars.red.

1

Who is behind the current ars.red?

The current ars.red is not developed by the original ars.red team. It is a rebrand of GC9, operated by two people known as 2ds (also known as 2dsboy) and Bred. The original ars.red developers have publicly called out the current version as stolen branding.

2ds obtained the ars.red codebase from a user named IHaxU by ratting him, meaning he used malware to steal access to the source code.

Evidence showing how 2ds obtained access to the original ars.red
2

Serial exit scamming

Bred and 2ds have been involved in at least 5 exit scams in 2025 alone. The pattern is always the same: launch a script under a new name, collect payments, then shut down abruptly without delivering.

Known previous projects (all exit-scammed):

Alternate AccessAlternate SolutionsDediwareCircleHubGC9bredhaxxDisconnect.ggVanity.ggNexusAxeraV2

Every release of GC9 lasted less than a month before being shut down. The rebranding to ars.red is just the latest iteration of the same cycle: reuse → hype → collect payments → exit-scam → repeat.

Screenshots documenting exit scam history
3

Stolen and plagiarized code

Bred's earlier script "Luna.vip" was found to contain 1:1 code snippets from the iridescent source leak and likely other leaked sources like fishy. Both the original ars.red developers and others on V3rmillion have confirmed that Bred is a known "skid" (someone who copies others' code and claims it as their own).

Bred's response when confronted about code origins

The original ars.red developer has spoken out about this directly, confirming the current team was never involved in the original project and stole both the name and codebase.

Original ars.red developer speaking out against the current version
4

IP logging and RestoreCord

Both ars.red and its predecessors use RestoreCord to log the IP addresses of anyone who joins their Discord server. They have also been documented logging IPs when you execute the script itself. Their database reportedly contains over 2,000 IP addresses collected from users.

Bred has previously leaked lajza's IP address, demonstrating that the collected data is actively used for harassment.

Evidence of IP logging via Dopamine.public (same Bred/Gxentry team rebranded from vanity.gg)
5

Predatory pricing

The Discord invite alone costs $10. Then you have to pay more than $10 for the actual script on top of that. Users can be blacklisted at any time for no reason, losing access to everything they paid for with no refund.

Pricing and access restrictions
6

DDoS and dox threats

2ds is documented threatening to DDoS and dox other AR2 developers and community members. This includes targeted harassment against competing script developers.

Screenshots of DDoS/dox threats and hostile behavior
7

Dopamine.public and vanity.gg

Before ars.red, Bred and an associate known as Gxentry ran Dopamine.public, which was itself a renamed version of vanity.gg. The vanity.gg source code was leaked and confirmed to be heavily plagiarized from the iridescent source leak, showing no original coding ability.

Dopamine.public / vanity.gg evidence — same team, same patterns
8

V3rmillion thread — community evidence

A dedicated V3rmillion thread documents the situation in detail with posts from multiple community members confirming the exit scam history, code theft, and generally bad reputation of the ars.red team.

V3rmillion thread screenshots — community members documenting the scam
More V3rmillion thread evidence
9

Additional evidence

V3rm conclusion thread — reputation summary and community response
Further screenshots including original developer statements and threats
Conversation screenshots and additional behavior documentation
!

Summary

  • Known serial exit scammers with 5+ confirmed exit scams in a single year
  • Stolen the "ars.red" brand name from the original developers who have publicly disowned them
  • Code plagiarized from leaked sources (iridescent, fishy) with no original development ability
  • IP logging through RestoreCord and on script execution, with 2,000+ IPs collected
  • $10 Discord entry fee + additional script cost, with arbitrary blacklisting and no refunds
  • DDoS and dox threats against competing developers and community members
  • Horrible reputation across V3rmillion and the wider AR2 scripting community

The people behind the current ars.red cannot be trusted. The evidence is public, consistent, and spans multiple years and platforms. Do not share payment information with them. Do not join their Discord server. Do not execute their script.