市值: $2.6701T -0.280%
成交额(24h): $91.9045B -21.430%
  • 市值: $2.6701T -0.280%
  • 成交额(24h): $91.9045B -21.430%
  • 恐惧与贪婪指数:
  • 市值: $2.6701T -0.280%
加密货币
话题
百科
资讯
加密话题
视频
热门新闻
加密货币
话题
百科
资讯
加密话题
视频
bitcoin
bitcoin

$83431.384543 USD

1.12%

ethereum
ethereum

$1892.151092 USD

-0.03%

tether
tether

$0.999942 USD

0.02%

xrp
xrp

$2.278148 USD

3.41%

bnb
bnb

$578.808477 USD

3.91%

solana
solana

$127.225561 USD

2.56%

usd-coin
usd-coin

$1.000010 USD

0.01%

cardano
cardano

$0.727715 USD

-0.81%

dogecoin
dogecoin

$0.172018 USD

3.11%

tron
tron

$0.224692 USD

1.50%

pi
pi

$1.713684 USD

3.42%

unus-sed-leo
unus-sed-leo

$9.723476 USD

-1.81%

chainlink
chainlink

$13.386106 USD

2.19%

stellar
stellar

$0.274124 USD

7.50%

hedera
hedera

$0.198131 USD

-1.41%

加密货币新闻

加密货币交易者在stablecoin互换中遭到三明治攻击,损失了21.5万美元

2025/03/13 15:44

本文报道了在加密货币交易期间发生的三明治袭击事件,在交易交易者交换稳定时,交易员损失了21.5万美元。

加密货币交易者在stablecoin互换中遭到三明治攻击,损失了21.5万美元

A crypto trader had nearly 98% of the value in a $220,764 stablecoin transfer wiped out by an MEV bot performing a sandwich attack.

一个加密交易员在220,764美元的Stablecoin转移中,由MEV机器人进行了三明治攻击,将近98%的价值转移。

The trader lost $215,500 while the bot netted a profit when $220,764 worth of USDC stablecoin was swapped for $5,271 worth of Tether USDT in just eight seconds.

交易员损失了215,500美元,而机器人的利润却赚了220,764美元,价格为220,764美元的Stablecoin,在短短八秒钟内以价值5,271美元的Tether USDT换成。

Data from the Ethereum block explorer shows the MEV attack took place in the USDC-USDT liquidity pool on decentralized exchange Uniswap v3, which had assets worth $19.8 million locked.

以太坊街区资源管理器的数据显示,MEV攻击发生在美国USDC-USDT流动性池中,分散的交易所UNISWAP V3,其资产价值1,980万美元。

Details of the sandwich attack transaction Source: Etherscan

三明治攻击交易的详细信息来源:Etherscan

According to Michael Nadeau, founder of The DeFi Report, the MEV bot front-ran the transaction by pulling all the USDC liquidity out of Uniswap v3's USDC-USDT pool and then returning it after the trade was completed.

根据DEFI报告的创始人迈克尔·纳多(Michael Nadeau)的说法,MEV机器人前进的交易是通过将所有USDC流动性从Uniswap V3的UNISDC-USDC-USDT池中拉出,然后在交易完成后将其退回。

The attacker then paid a $200,000 tip to Ethereum block builder “bob-the-builder.eth” out of the $220,764 transaction and made an $8,000 profit.

然后,攻击者向以太坊建筑商“ Bob-the-Builder.eth”支付了200,000美元的小费,从220,764美元的交易中支付了8,000美元的利润。

DeFi researcher ‘DeFiac’ speculates that the same trader using different wallets may have encountered a total of six sandwich attacks, citing “internal tools” for analysis. They add that all the funds originated from lending protocol Aave before being deposited into Uniswap.

Defi研究人员“ Defiac”推测,使用不同钱包的同一交易员可能遇到了六次三明治攻击,理由是“内部工具”进行分析。他们补充说,所有资金均来自贷款方案AAVE,然后再将其存入UNISWAP。

Two of the traders fell victim to the MEV bot sandwich attack around 9 AM UTC on March 12. The Ethereum wallet addresses “0xDDe…42a6D” and “0x999…1D215” were sandwich attacked in transactions that occurred three to four minutes earlier, losing $138,838 and $128,038, respectively.

3月12日上午9点左右,两名交易者成为MEV Bot三明治袭击的受害者。以太坊钱包介绍了“​​ 0xdde…42A6D”和“ 0x999…1d215”,在三到四分钟之前发生了三到四分钟的交易,遭受了三到四分钟的攻击,损失了138,838 $ 138,838和$ 128,038和128,038美元。

Both of these traders carried out the same trade in the Uniswap v3 liquidity pool when they executed a large portion of the USDC-USDT liquidity.

这两个交易员在执行USDC-USDT流动性的大部分时间时,在Unistwap V3流动性池中进行了相同的贸易。

There is speculation that these transactions may be related to money laundering.

猜测这些交易可能与洗钱有关。

0xngmi, founder of the crypto data dashboard DefiLlama, said: "If you have NK illegal funds, you can construct a trade that is very easily susceptible to MEV attacks, then privately send it to an MEV bot and let them arbitrage it in a bundle. This way, named you can wash all the money with almost zero loss."

Crypto Data Dashboard Defillama的创始人0xngmi说:“如果您拥有NK非法资金,您可以构建一种非常容易受到MEV攻击易受的交易,然后将其私下发送给MEV机器人,并让他们以捆绑措施索要它。这样,您可以将所有的钱洗净而所有的钱。”

免责声明:info@kdj.com

所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!

如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。

2025年03月14日 发表的其他文章