GuizinTLxD

guizinTLxD(also known as guizinTLxDalt) is a griefer, and an exploiter, known for griefing TA and MD, hacking at least one person and creating multiple alts. You can find him on https://www.roblox.com/users/95318087/profile

History

GuizinTLxD joined ROBLOX on October 2nd, 2015. His other commonly used account, GuizinTLxDalt, joined ROBLOX on June 10th, 2016. You can find it on https://www.roblox.com/users/133619040/profile

On August 2017, Guizin was the leader of griefers who attacked TA and MD during the War on Griefers.

Guizin as an admin on TA:

On October 12th, 2017, Guizin planned to attack TA by getting admin and then ruining TA from inside. Unexpectedly, Samuel (the owner of TA) gave GUI admin, which resulted in Gui AAing, only to get his admin removed on TA. However, minutes later, GUI got superadmin, and TA was thus put in danger, leading to destruction, barely avoiding getting most members exiled before GUI got unadmined for good. He had then started the TR Revolt against himself. MD would come in to support, but unexpectedly left to avoid being hacked and defended themselves.

Guizin targeting MD:

On July 2017, he used exploits on MD, which was then clogged with admins and was basically a de-facto free-admin anarchy, being a non-free-admin game only on paper, and was given superadmin based on the "rules", that being that he "had to play long enough" and "prove to be a good player". This act would lead to F3X deleting of the MD map from him, and eventually resulted in the July-August 2017 admin reform when mods+admins, later superadmins and then owners had to be interviewed to prove that they deserve their rank, with most failing to prove so. Following these events, MD has interviews just like other dominations.

On October 2017, Sgtxlord (then a MD superadmin) was reportedly hacked by GUI three times (once during the October 12th crisis). He had also btooled-exploited MD during a large server startup.

Alts

Guizin's other alts are Gilyerme, AnnaTozzo2016, CharlieXavier21 and GuizinTLxDBot.