![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
加密貨幣交易員在3月12日進行了220,764美元的Stablecoin轉移,造成了三明治攻擊的受害者,其價值的近98%損失為最大可提取價值(MEV)機器人。
A crypto trader fell victim to a sandwich attack while making a $220,764 stablecoin transfer on March 12, losing almost 98% of its value to a Maximum Extractable Value (MEV) bot.
一名加密貨幣交易員在3月12日進行了220,764美元的Stablecoin轉會,造成了三明治攻擊的受害者,其價值的近98%損失為最大可提取價值(MEV)機器人。
The trader, who had borrowed $216,000 from Aave and converted it to USD Coin USDCUSD, attempted to swap it for Tether USDTUSD on decentralized exchange Uniswap v3, according to data from Ethereum block explorer.
根據Ethereum Block Explorer的數據,這位交易者已經從AAVE借了216,000美元並將其轉換為Coin Coin Usdcusd,並試圖將其轉換為Tether Usdtusd,以分散的Exchange UNISWAP V3。
The transaction was stalled for 10 minutes before being bundled by a miner and included in a block at around 9:08 am UTC.
該交易停滯了10分鐘,然後被礦工捆綁在一起,並在UTC上午9:08左右被包括在一個街區中。
The MEV bot then front-ran the transaction by swapping all the USDC liquidity out of the Uniswap v3 USDC-USDT pool and then put it back in after the transaction was executed.
然後,MEV機器人通過將所有USDC流動性從UNISWAP v3 USDC-USDT池中交換來進行交易,然後在執行交易後將其放回原處。
The transaction was tipped $200,000 by Ethereum block builder “bob-the-builder.eth” from the $220,764 swap and the attacker profited $8,000, founder of The DeFi Report Michael Nadeau said.
DEFI報告的創始人Michael Nadeau說,這筆交易的價格為200,000美元,由220,764美元的交易中的Ethereum Block Builder“ Bob-the-Builder.eth”傾斜,而攻擊者則獲利8,000美元。
Image Credit: The DeFi Report
圖片來源:defi報告
DeFi researcher "DeFiac" speculates the same trader using different wallets has fallen victim to a total of six sandwich attacks, citing "internal tools." They pointed out that all funds traveled from borrowing and lending protocol Aave before being deposited on Uniswap.
Defi研究人員“ Difiac”推測使用不同錢包的同一交易員因“內部工具”為六次三明治襲擊而成為了受害者。他們指出,所有資金都從借貸和貸款方案AAVE中傳遞出來,然後再存入Uniswap。
Two of the wallets fell victim to an MEV bot sandwich attack at around 9:00 am UTC on March 12. Ethereum wallet addresses "0xDDe...42a6D" and "0x999...1D215" were sandwich attacked for $138,838 and $128,003 in transactions that occurred three to four minutes earlier.
3月12日上午9:00,在UTC上午9:00左右,其中兩個錢包成為了MEV Bot三明治襲擊的受害者。
Both transactors made the same swap in the Uniswap v3 liquidity pool.
這兩個交易儀都在Uniswap V3流動性庫中進行了相同的互換。
Image Credit: DeFiac
圖片來源:Difiac
Others speculate the trades could be attempts at money laundering.
其他人則推測可能是嘗試洗錢的交易。
"If you have NK illicit funds you could construct a very mev-able tx, then privately send it to a mev bot and have them arb it in a bundle," said founder of crypto data dashboard DefiLlama, 0xngmi.
Crypto Data Dashboard Defillama(0xngmi)的創始人說:“如果您有NK非法資金,您可以構建一個非常可MEV的TX,然後將其私人發送給MEV機器人,並將其捆綁在一起。”
"That way you wash all the money with close to 0 losses."
“這樣,您就以接近0的損失洗了所有錢。”
While initially criticizing Uniswap, Nadeau later acknowledged that the transactions didn't come from Uniswap's front end, which has MEV protection and default slippage settings.
儘管最初批評Uniswap,但納多後來承認,交易並非來自Uniswap的前端,該前端具有MEV保護和默認的打滑設置。
Nadeau backtracked on those criticisms after Unispaw CEO Hayden Adams and others clarified the protections Uniswap has in place to fight against sandwich attacks.
在Unispaw首席執行官海登·亞當斯(Hayden Adams)和其他人闡明了Uniswap對抗三明治襲擊的保護方面,納多(Nadeau)回溯了這些批評。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- 毫無疑問,最新的看跌加密價格對投資者余額產生了巨大影響。
- 2025-03-13 15:30:51
- 毫無疑問,最新的看跌加密價格對投資者余額產生了巨大影響。
-
-
-
- 比特幣(BTC)價格超過$ 84,000,因為涼爽的通貨膨脹數據增強了風險食慾
- 2025-03-13 15:05:51
- 比特幣(BTC)價格在周三進一步上漲,因為涼爽的通貨膨脹數據增強了風險食慾。
-
-
-
- XRP不僅僅是另一個數字資產,還提供了這一理論的證明
- 2025-03-13 15:05:51
- 隨著XRP繼續與市場的其餘部分一起掙扎,社區驅動的帳戶“萬物XRP”背後的專家懇請市場參與者關注資產
-
-