![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
該事件發生在UNISWAP V3的USDC-USDT流動性池中,再次暴露了最大可提取價值(MEV)機器人的利用
A crypto trader fell victim to a sandwich attack on March 12 while swapping stablecoins on Uniswap v3, sti米晴coins. The incident, which occurred on Uniswap v3’s USDC-USDT liquidity pool, showcases how Maximum Extractable Value (MEV) bots exploit traders in decentralized finance (DeFi).
一名加密貨幣交易員於3月12日在三明治攻擊中遇到了遇難者,同時交換了stablecoins在STI coins的Uniswap V3上。該事件發生在UNISWAP V3的USDC-USDT流動性池上,展示瞭如何最大的可提取價值(MEV)機器人利用分散融資(DEFI)的交易者。
The trader intended to exchange $220,764 in USD Coin (USDC) for Tether (USDT). However, a bot intervened within eight seconds, disrupting the trade and leaving the trader with a mere $5,271 in USDT.
交易者打算將美元硬幣(USDC)的$ 220,764換成Tether(USDT)。但是,一個機器人在八秒鐘內進行了乾預,破壞了交易,並在USDT中僅以5,271美元的價格離開了交易員。
The trader planned to swap 220,764 USDC for USDT on Uniswap v3. An MEV bot intervened and pulled all the USDC liquidity from the pool before the trader’s trade could go through. Afterwards, the bot put the liquidity back into the pool.
交易者計劃將220,764 USDC換成UNISWAP V3。 MEV機器人進行了乾預,並在交易者交易進行之前,將所有USDC的流動性從游泳池中抽出。之後,機器人將流動性重新回到游泳池中。
As the bot had no liquidity to pay for the trader’s trade, it had to accept a bad price to complete the swap, leaving the trader with a small amount of USDT.
由於該機器人沒有流動性來支付交易者的交易,因此必須接受不良的價格才能完成互換,從而使交易員擁有少量的USDT。
According to Michael Nadeau, founder of The DeFi Report, the attacker paid Ethereum block builder “bob-the-builder.eth” a $200,000 tip from the total amount while keeping $8,000 as profit.
根據DEFI報告的創始人邁克爾·納多(Michael Nadeau)的說法,攻擊者向以太坊建築商“ Bob-the-Builder.eth”支付了20萬美元的提示,同時將8,000美元作為利潤保留。
DeFi researcher “DeFiac” noted that the same trader, using different wallets, might have been hit by six similar sandwich attacks within a single day. Two other wallets, “0xDDe…42a6D” and “0x999…1D215,” were also targeted, with one losing $138,838 and the other $128,003.
Defi研究人員“ Difiac”指出,使用不同錢包的同一交易員可能會在一天之內受到六次類似的三明治攻擊的打擊。另外兩個錢包“ 0xdde…42a6d”和“ 0x999…1d215”也是針對的,其中一個損失了$ 138,838,另外一個損失了128,003美元。
Some theorize that these unusual swaps might be an attempt at money laundering. DefiLlama developer 0xngmi suggested that these trades could be intentionally bad, used to clean illicit funds by routing transactions privately to an MEV bot.
有人認為這些不尋常的掉期可能是洗錢的嘗試。 Defillama開發人員0xngmi建議這些交易可能是故意不好的,用於通過將交易將交易私人路由到MEV機器人進行清潔。
Initially, some blamed Uniswap for the incident. However, CEO Hayden Adams clarified that these transactions didn’t occur through Uniswap’s official interface, which has MEV protection and slippage settings to help prevent such attacks.
最初,一些事件指責UNISWAP。但是,首席執行官海頓·亞當斯(Hayden Adams)澄清說,這些交易不是通過Uniswap的官方界面進行的,該界面具有MEV保護和滑動設置,以幫助防止此類攻擊。
This isn’t the first time we’ve seen traders targeted and nearly wiped out by sandwich attacks. Earlier this year, a trader put in 732,000 to be used for a swap but ended up with only 19,000 due to a similar trick.
這並不是我們第一次看到交易者的目標,幾乎被三明治攻擊所淘汰。今年早些時候,一名交易員投入了732,000次交換,但由於類似的技巧,最終僅獲得了19,000。
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
-
- 電報中的錢包擴展了其保管加密服務
- 2025-03-13 23:30:52
- 電報中的錢包,電報上的第三方加密貨幣錢包迷你應用程序將擴大其託管加密服務
-
- 預期的嗡嗡聲籠罩了PI網絡社區即將發生的變化,可能會改變其數字景觀
- 2025-03-13 23:30:52
- 隨著3月14日的截止日期的臨近,敦促交易者和用戶仔細制定策略並將其PI硬幣移入安全的PI錢包中
-
-
-
-
- 預測2021年加密週期結束的分析師提出了另一個大膽的預測。
- 2025-03-13 23:30:52
- 預測2021年加密週期結束的分析師提出了另一個大膽的預測。
-
-
- Rexas令牌構建器和QuickMint bot:使令牌化無縫
- 2025-03-13 23:30:52
- Rexas Finance提供了解決方案,使組織和個人只需單擊幾下即可使資產歸為資產。