市值: $2.6701T -0.280%
體積(24小時): $91.9045B -21.430%
  • 市值: $2.6701T -0.280%
  • 體積(24小時): $91.9045B -21.430%
  • 恐懼與貪婪指數:
  • 市值: $2.6701T -0.280%
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
Top News
Cryptos
主題
Cryptospedia
資訊
CryptosTopics
影片
bitcoin
bitcoin

$83431.384543 USD

1.12%

ethereum
ethereum

$1892.151092 USD

-0.03%

tether
tether

$0.999942 USD

0.02%

xrp
xrp

$2.278148 USD

3.41%

bnb
bnb

$578.808477 USD

3.91%

solana
solana

$127.225561 USD

2.56%

usd-coin
usd-coin

$1.000010 USD

0.01%

cardano
cardano

$0.727715 USD

-0.81%

dogecoin
dogecoin

$0.172018 USD

3.11%

tron
tron

$0.224692 USD

1.50%

pi
pi

$1.713684 USD

3.42%

unus-sed-leo
unus-sed-leo

$9.723476 USD

-1.81%

chainlink
chainlink

$13.386106 USD

2.19%

stellar
stellar

$0.274124 USD

7.50%

hedera
hedera

$0.198131 USD

-1.41%

加密貨幣新聞文章

加密貨幣交易者在stablecoin互換中遭到三明治攻擊,損失了21.5萬美元

2025/03/13 15:44

本文報導了在加密貨幣交易期間發生的三明治襲擊事件,在交易交易者交換穩定時,交易員損失了21.5萬美元。

加密貨幣交易者在stablecoin互換中遭到三明治攻擊,損失了21.5萬美元

A crypto trader had nearly 98% of the value in a $220,764 stablecoin transfer wiped out by an MEV bot performing a sandwich attack.

一個加密交易員在220,764美元的Stablecoin轉移中,由MEV機器人進行了三明治攻擊,將近98%的價值轉移。

The trader lost $215,500 while the bot netted a profit when $220,764 worth of USDC stablecoin was swapped for $5,271 worth of Tether USDT in just eight seconds.

交易員損失了215,500美元,而機器人的利潤卻賺了220,764美元,價格為220,764美元的Stablecoin,在短短八秒鐘內以價值5,271美元的Tether USDT換成。

Data from the Ethereum block explorer shows the MEV attack took place in the USDC-USDT liquidity pool on decentralized exchange Uniswap v3, which had assets worth $19.8 million locked.

以太坊街區資源管理器的數據顯示,MEV攻擊發生在美國USDC-USDT流動性池中,分散的交易所UNISWAP V3,其資產價值1,980萬美元。

Details of the sandwich attack transaction Source: Etherscan

三明治攻擊交易的詳細信息來源:Etherscan

According to Michael Nadeau, founder of The DeFi Report, the MEV bot front-ran the transaction by pulling all the USDC liquidity out of Uniswap v3's USDC-USDT pool and then returning it after the trade was completed.

根據DEFI報告的創始人邁克爾·納多(Michael Nadeau)的說法,MEV機器人前進的交易是通過將所有USDC流動性從Uniswap V3的UNISDC-USDC-USDT池中拉出,然後在交易完成後將其退回。

The attacker then paid a $200,000 tip to Ethereum block builder “bob-the-builder.eth” out of the $220,764 transaction and made an $8,000 profit.

然後,攻擊者向以太坊建築商“ Bob-the-Builder.eth”支付了200,000美元的小費,從220,764美元的交易中支付了8,000美元的利潤。

DeFi researcher ‘DeFiac’ speculates that the same trader using different wallets may have encountered a total of six sandwich attacks, citing “internal tools” for analysis. They add that all the funds originated from lending protocol Aave before being deposited into Uniswap.

Defi研究人員“ Defiac”推測,使用不同錢包的同一交易員可能遇到了六次三明治攻擊,理由是“內部工具”進行分析。他們補充說,所有資金均來自貸款方案AAVE,然後再將其存入UNISWAP。

Two of the traders fell victim to the MEV bot sandwich attack around 9 AM UTC on March 12. The Ethereum wallet addresses “0xDDe…42a6D” and “0x999…1D215” were sandwich attacked in transactions that occurred three to four minutes earlier, losing $138,838 and $128,038, respectively.

3月12日上午9點左右,兩名交易者成為MEV Bot三明治襲擊的受害者。以太坊錢包介紹了“​​ 0xdde…42A6D”和“ 0x999…1d215”,在三到四分鐘之前發生了三到四分鐘的交易,遭受了三到四分鐘的攻擊,損失了138,838 $ 138,838和$ 128,038和128,038美元。

Both of these traders carried out the same trade in the Uniswap v3 liquidity pool when they executed a large portion of the USDC-USDT liquidity.

這兩個交易員在執行USDC-USDT流動性的大部分時間時,在Unistwap V3流動性池中進行了相同的貿易。

There is speculation that these transactions may be related to money laundering.

猜測這些交易可能與洗錢有關。

0xngmi, founder of the crypto data dashboard DefiLlama, said: "If you have NK illegal funds, you can construct a trade that is very easily susceptible to MEV attacks, then privately send it to an MEV bot and let them arbitrage it in a bundle. This way, named you can wash all the money with almost zero loss."

Crypto Data Dashboard Defillama的創始人0xngmi說:“如果您擁有NK非法資金,您可以構建一種非常容易受到MEV攻擊易受的交易,然後將其私下發送給MEV機器人,並讓他們以捆綁措施索要它。這樣,您可以將所有的錢洗淨而所有的錢。”

免責聲明:info@kdj.com

所提供的資訊並非交易建議。 kDJ.com對任何基於本文提供的資訊進行的投資不承擔任何責任。加密貨幣波動性較大,建議您充分研究後謹慎投資!

如果您認為本網站使用的內容侵犯了您的版權,請立即聯絡我們(info@kdj.com),我們將及時刪除。

2025年03月13日 其他文章發表於