![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
加密货币交易员在3月12日进行了220,764美元的Stablecoin转移,造成了三明治攻击的受害者,其价值的近98%损失为最大可提取价值(MEV)机器人。
A crypto trader fell victim to a sandwich attack while making a $220,764 stablecoin transfer on March 12, losing almost 98% of its value to a Maximum Extractable Value (MEV) bot.
一名加密货币交易员在3月12日进行了220,764美元的Stablecoin转会,造成了三明治攻击的受害者,其价值的近98%损失为最大可提取价值(MEV)机器人。
The trader, who had borrowed $216,000 from Aave and converted it to USD Coin USDCUSD, attempted to swap it for Tether USDTUSD on decentralized exchange Uniswap v3, according to data from Ethereum block explorer.
根据Ethereum Block Explorer的数据,这位交易者已经从AAVE借了216,000美元并将其转换为Coin Coin Usdcusd,并试图将其转换为Tether Usdtusd,以分散的Exchange UNISWAP V3。
The transaction was stalled for 10 minutes before being bundled by a miner and included in a block at around 9:08 am UTC.
该交易停滞了10分钟,然后被矿工捆绑在一起,并在UTC上午9:08左右被包括在一个街区中。
The MEV bot then front-ran the transaction by swapping all the USDC liquidity out of the Uniswap v3 USDC-USDT pool and then put it back in after the transaction was executed.
然后,MEV机器人通过将所有USDC流动性从UNISWAP v3 USDC-USDT池中交换来进行交易,然后在执行交易后将其放回原处。
The transaction was tipped $200,000 by Ethereum block builder “bob-the-builder.eth” from the $220,764 swap and the attacker profited $8,000, founder of The DeFi Report Michael Nadeau said.
DEFI报告的创始人Michael Nadeau说,这笔交易的价格为200,000美元,由220,764美元的交易中的Ethereum Block Builder“ Bob-the-Builder.eth”倾斜,而攻击者则获利8,000美元。
Image Credit: The DeFi Report
图片来源:defi报告
DeFi researcher "DeFiac" speculates the same trader using different wallets has fallen victim to a total of six sandwich attacks, citing "internal tools." They pointed out that all funds traveled from borrowing and lending protocol Aave before being deposited on Uniswap.
Defi研究人员“ Difiac”推测使用不同钱包的同一交易员因“内部工具”为六次三明治袭击而成为了受害者。他们指出,所有资金都从借贷和贷款方案AAVE中传递出来,然后再存入Uniswap。
Two of the wallets fell victim to an MEV bot sandwich attack at around 9:00 am UTC on March 12. Ethereum wallet addresses "0xDDe...42a6D" and "0x999...1D215" were sandwich attacked for $138,838 and $128,003 in transactions that occurred three to four minutes earlier.
3月12日上午9:00,在UTC上午9:00左右,其中两个钱包成为了MEV Bot三明治袭击的受害者。
Both transactors made the same swap in the Uniswap v3 liquidity pool.
这两个交易仪都在Uniswap V3流动性库中进行了相同的互换。
Image Credit: DeFiac
图片来源:Difiac
Others speculate the trades could be attempts at money laundering.
其他人则推测可能是尝试洗钱的交易。
"If you have NK illicit funds you could construct a very mev-able tx, then privately send it to a mev bot and have them arb it in a bundle," said founder of crypto data dashboard DefiLlama, 0xngmi.
Crypto Data Dashboard Defillama(0xngmi)的创始人说:“如果您有NK非法资金,您可以构建一个非常可MEV的TX,然后将其私人发送给MEV机器人,并将其捆绑在一起。”
"That way you wash all the money with close to 0 losses."
“这样,您就以接近0的损失洗了所有钱。”
While initially criticizing Uniswap, Nadeau later acknowledged that the transactions didn't come from Uniswap's front end, which has MEV protection and default slippage settings.
尽管最初批评Uniswap,但纳多后来承认,交易并非来自Uniswap的前端,该前端具有MEV保护和默认的打滑设置。
Nadeau backtracked on those criticisms after Unispaw CEO Hayden Adams and others clarified the protections Uniswap has in place to fight against sandwich attacks.
在Unispaw首席执行官海登·亚当斯(Hayden Adams)和其他人阐明了Uniswap对抗三明治袭击的保护方面,纳多(Nadeau)回溯了这些批评。
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
-
-
- 比特币(BTC)价格超过$ 84,000,因为凉爽的通货膨胀数据增强了风险食欲
- 2025-03-13 15:05:51
- 比特币(BTC)价格在周三进一步上涨,因为凉爽的通货膨胀数据增强了风险食欲。
-
-
-
- XRP不仅仅是另一个数字资产,还提供了这一理论的证明
- 2025-03-13 15:05:51
- 随着XRP继续与市场的其余部分一起挣扎,社区驱动的帐户“万物XRP”背后的专家恳请市场参与者关注资产
-
-
-
- 比特币,XRP和Dogecoin骑着有利的经济风波
- 2025-03-13 14:50:51
- 冒险进入充满活力的加密货币世界,如今,今天的市场像在暴风雨后重新发现天际线一样展开。