![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
![]() |
|
本文报道了在加密货币交易期间发生的三明治袭击事件,在交易交易者交换稳定时,交易员损失了21.5万美元。
A crypto trader had nearly 98% of the value in a $220,764 stablecoin transfer wiped out by an MEV bot performing a sandwich attack.
一个加密交易员在220,764美元的Stablecoin转移中,由MEV机器人进行了三明治攻击,将近98%的价值转移。
The trader lost $215,500 while the bot netted a profit when $220,764 worth of USDC stablecoin was swapped for $5,271 worth of Tether USDT in just eight seconds.
交易员损失了215,500美元,而机器人的利润却赚了220,764美元,价格为220,764美元的Stablecoin,在短短八秒钟内以价值5,271美元的Tether USDT换成。
Data from the Ethereum block explorer shows the MEV attack took place in the USDC-USDT liquidity pool on decentralized exchange Uniswap v3, which had assets worth $19.8 million locked.
以太坊街区资源管理器的数据显示,MEV攻击发生在美国USDC-USDT流动性池中,分散的交易所UNISWAP V3,其资产价值1,980万美元。
Details of the sandwich attack transaction Source: Etherscan
三明治攻击交易的详细信息来源:Etherscan
According to Michael Nadeau, founder of The DeFi Report, the MEV bot front-ran the transaction by pulling all the USDC liquidity out of Uniswap v3's USDC-USDT pool and then returning it after the trade was completed.
根据DEFI报告的创始人迈克尔·纳多(Michael Nadeau)的说法,MEV机器人前进的交易是通过将所有USDC流动性从Uniswap V3的UNISDC-USDC-USDT池中拉出,然后在交易完成后将其退回。
The attacker then paid a $200,000 tip to Ethereum block builder “bob-the-builder.eth” out of the $220,764 transaction and made an $8,000 profit.
然后,攻击者向以太坊建筑商“ Bob-the-Builder.eth”支付了200,000美元的小费,从220,764美元的交易中支付了8,000美元的利润。
DeFi researcher ‘DeFiac’ speculates that the same trader using different wallets may have encountered a total of six sandwich attacks, citing “internal tools” for analysis. They add that all the funds originated from lending protocol Aave before being deposited into Uniswap.
Defi研究人员“ Defiac”推测,使用不同钱包的同一交易员可能遇到了六次三明治攻击,理由是“内部工具”进行分析。他们补充说,所有资金均来自贷款方案AAVE,然后再将其存入UNISWAP。
Two of the traders fell victim to the MEV bot sandwich attack around 9 AM UTC on March 12. The Ethereum wallet addresses “0xDDe…42a6D” and “0x999…1D215” were sandwich attacked in transactions that occurred three to four minutes earlier, losing $138,838 and $128,038, respectively.
3月12日上午9点左右,两名交易者成为MEV Bot三明治袭击的受害者。以太坊钱包介绍了“ 0xdde…42A6D”和“ 0x999…1d215”,在三到四分钟之前发生了三到四分钟的交易,遭受了三到四分钟的攻击,损失了138,838 $ 138,838和$ 128,038和128,038美元。
Both of these traders carried out the same trade in the Uniswap v3 liquidity pool when they executed a large portion of the USDC-USDT liquidity.
这两个交易员在执行USDC-USDT流动性的大部分时间时,在Unistwap V3流动性池中进行了相同的贸易。
There is speculation that these transactions may be related to money laundering.
猜测这些交易可能与洗钱有关。
0xngmi, founder of the crypto data dashboard DefiLlama, said: "If you have NK illegal funds, you can construct a trade that is very easily susceptible to MEV attacks, then privately send it to an MEV bot and let them arbitrage it in a bundle. This way, named you can wash all the money with almost zero loss."
Crypto Data Dashboard Defillama的创始人0xngmi说:“如果您拥有NK非法资金,您可以构建一种非常容易受到MEV攻击易受的交易,然后将其私下发送给MEV机器人,并让他们以捆绑措施索要它。这样,您可以将所有的钱洗净而所有的钱。”
免责声明:info@kdj.com
所提供的信息并非交易建议。根据本文提供的信息进行的任何投资,kdj.com不承担任何责任。加密货币具有高波动性,强烈建议您深入研究后,谨慎投资!
如您认为本网站上使用的内容侵犯了您的版权,请立即联系我们(info@kdj.com),我们将及时删除。
-
- Bittorrent Coin(BTTC)正在加密世界中浪潮
- 2025-03-13 23:50:52
- 随着市场势头的强大增强,BTTC的定位是潜在的突破,可能会达到新的历史高点。
-
- 加密货币市场正在迅速发展,投资者正在寻求安全,稳定和长期的机会
- 2025-03-13 23:50:52
- 加密货币市场正在迅速发展,投资者正在寻求安全,稳定和长期的机会。 Nexaglobal正在领导这种转变
-
-
-
- 离子云挖掘启动了一项免费计划,以降低用户的参与门槛,并为新手提供无风险的机会
- 2025-03-13 23:45:51
- 离子云采矿启动了一项免费计划,为用户提供了进入加密货币挖掘领域的机会,而无需任何障碍
-
-
- 红石(红色)越过23%以优于市场
- 2025-03-13 23:45:51
- Redstone目前的交易价格为0.5882美元,在过去24小时内增长了23%。代币的市值已跃升至1.64亿美元
-
- 3月14日的倒计时使PI网络用户屏住呼吸
- 2025-03-13 23:45:51
- 这个日期可能标志着PI加密货币未来的关键时刻,预期的潜在变化
-