![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
本文報導了在加密貨幣交易期間發生的三明治襲擊事件,在交易交易者交換穩定時,交易員損失了21.5萬美元。
A crypto trader had nearly 98% of the value in a $220,764 stablecoin transfer wiped out by an MEV bot performing a sandwich attack.
一個加密交易員在220,764美元的Stablecoin轉移中,由MEV機器人進行了三明治攻擊,將近98%的價值轉移。
The trader lost $215,500 while the bot netted a profit when $220,764 worth of USDC stablecoin was swapped for $5,271 worth of Tether USDT in just eight seconds.
交易員損失了215,500美元,而機器人的利潤卻賺了220,764美元,價格為220,764美元的Stablecoin,在短短八秒鐘內以價值5,271美元的Tether USDT換成。
Data from the Ethereum block explorer shows the MEV attack took place in the USDC-USDT liquidity pool on decentralized exchange Uniswap v3, which had assets worth $19.8 million locked.
以太坊街區資源管理器的數據顯示,MEV攻擊發生在美國USDC-USDT流動性池中,分散的交易所UNISWAP V3,其資產價值1,980萬美元。
Details of the sandwich attack transaction Source: Etherscan
三明治攻擊交易的詳細信息來源:Etherscan
According to Michael Nadeau, founder of The DeFi Report, the MEV bot front-ran the transaction by pulling all the USDC liquidity out of Uniswap v3's USDC-USDT pool and then returning it after the trade was completed.
根據DEFI報告的創始人邁克爾·納多(Michael Nadeau)的說法,MEV機器人前進的交易是通過將所有USDC流動性從Uniswap V3的UNISDC-USDC-USDT池中拉出,然後在交易完成後將其退回。
The attacker then paid a $200,000 tip to Ethereum block builder “bob-the-builder.eth” out of the $220,764 transaction and made an $8,000 profit.
然後,攻擊者向以太坊建築商“ Bob-the-Builder.eth”支付了200,000美元的小費,從220,764美元的交易中支付了8,000美元的利潤。
DeFi researcher ‘DeFiac’ speculates that the same trader using different wallets may have encountered a total of six sandwich attacks, citing “internal tools” for analysis. They add that all the funds originated from lending protocol Aave before being deposited into Uniswap.
Defi研究人員“ Defiac”推測,使用不同錢包的同一交易員可能遇到了六次三明治攻擊,理由是“內部工具”進行分析。他們補充說,所有資金均來自貸款方案AAVE,然後再將其存入UNISWAP。
Two of the traders fell victim to the MEV bot sandwich attack around 9 AM UTC on March 12. The Ethereum wallet addresses “0xDDe…42a6D” and “0x999…1D215” were sandwich attacked in transactions that occurred three to four minutes earlier, losing $138,838 and $128,038, respectively.
3月12日上午9點左右,兩名交易者成為MEV Bot三明治襲擊的受害者。以太坊錢包介紹了“ 0xdde…42A6D”和“ 0x999…1d215”,在三到四分鐘之前發生了三到四分鐘的交易,遭受了三到四分鐘的攻擊,損失了138,838 $ 138,838和$ 128,038和128,038美元。
Both of these traders carried out the same trade in the Uniswap v3 liquidity pool when they executed a large portion of the USDC-USDT liquidity.
這兩個交易員在執行USDC-USDT流動性的大部分時間時,在Unistwap V3流動性池中進行了相同的貿易。
There is speculation that these transactions may be related to money laundering.
猜測這些交易可能與洗錢有關。
0xngmi, founder of the crypto data dashboard DefiLlama, said: "If you have NK illegal funds, you can construct a trade that is very easily susceptible to MEV attacks, then privately send it to an MEV bot and let them arbitrage it in a bundle. This way, named you can wash all the money with almost zero loss."
Crypto Data Dashboard Defillama的創始人0xngmi說:“如果您擁有NK非法資金,您可以構建一種非常容易受到MEV攻擊易受的交易,然後將其私下發送給MEV機器人,並讓他們以捆綁措施索要它。這樣,您可以將所有的錢洗淨而所有的錢。”
免責聲明:info@kdj.com
所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!
如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。
-
- 比特幣(BTC)積累趨勢得分最近處於低水平
- 2025-03-13 23:15:52
- 這家鏈分析公司GlassNode在一份報告中透露,比特幣投資者最近如何看到朝著強烈的變化轉變。
-
-
-
-
- 更新:Jerry,ChainCatcher
- 2025-03-13 23:10:51
- 美國參議員辛西婭·盧米斯(Cynthia Lummis)提出的戰略比特幣儲備法案現已發佈在國會政府網站上
-
-
- 加密鯨在Skyren Dao(Skyyrn)上大放異彩
- 2025-03-13 23:10:51
- 加密鯨魚不會無緣無故地扔錢。當大型投資者開始積累代幣時,通常是因為他們看到大量上升空間。
-
-