![aibobaby 👁💎 Profile](https://pbs.twimg.com/profile_images/1725738809898524672/-5ChpW-9_x96.jpg)
aibobaby 👁💎
@aibobaby
Followers
454
Following
699
Statuses
1K
https://t.co/NNXWg3sJnD
City of London, London
Joined July 2017
daydreams非常低估的ai agent,开发是starknet上游戏的创始人,游戏开发老炮,目前在1300万的市值,至少还有10倍的空间。
Unveiling a cypherpunk twist to the Daydreams protocol “The first P2P product from @daydreamsagents will be a torrent client that enables bootstrapping and sharing of data among network participants. From there, we’ll build out a deep incentive structure with $DREAMS.”
0
0
1
我也被盗了,starknet空投之后上面还剩点eth,想着可以获得rewards,就存进了zklend,没想到又被盗了。天天打土狗亏钱,链上存款还亏钱,市场又跌跌不休,今年开年真难啊!
zkLend 被盗了 9.5M 资金,我自己有 40wu 在里面。 zkLend lost $9.5M in a hack. I had 400k USD in it 现在 StarkNet 官方不作为,在被盗 12 小时后仍然放任 L2-L1 的跨链桥的 1800ETH 转出,不禁怀疑是不是监守自盗。 Right now, StarkNet officials are doing nothing. Even 12 hours after the hack, they allowed 1,800 ETH to be transferred out through the L2-L1 bridge. It makes me wonder if this is an inside job. ( 黑客的地址内拥有 BN,BitPay,OKX 等多个中心化机构的地址的提现、充币记录。 The hacker's address has multiple withdrawal and deposit records involving centralized platforms like Binance (BN), BitPay, and OKX. ※我们受害群群友准备本周日(2/16)前往香港报警,并同步申请信息公开,线下追查黑客本人。 ※Our victim group members are planning to go to Hong Kong to file a police report by this Sunday(Feb 16). We will also request public disclosure of information and conduct offline investigations to track down the hacker. ※有同样大额被盗的请联系我,可以一同前往。不要让事情不了了之。 ※If you were also affected, please contact me, and we can go together. We must not let this incident be forgotten. -------- 附群友分析 -------- ------ Victim Group's Analysis ------ 在对 zkLend 攻击事件的分析中,发现以下关键线索: During the analysis of the zkLend attack, we identified the following key leads: 关键地址/Key Address:0x93920786e0FdA8496248C4447e2e082dA69b6C40 Through the attacker's transaction records on StarkNet (0x04d7191dc8eac499bac710dd368706e3ce76c9945da52535de770d06ce7d3b26), we successfully traced this key address (0x93920786e0FdA8496248C4447e2e082dA69b6C40). Deposit 13.42 STRK from Ethereum, txHash: eth-0x3c2e09a2d6049fcf959002c122b8bdc8a9304b9daf60d3f779efb1e7b99255cd Withdraw 1.9 ETH to Ethereum, txHash: eth-0x8be118ffbfb72ccca7e7db79ad727ed551e9dea95a3a4d71419404e51ab51b13 该地址在多个 EVM 链上存在频繁交互,涉及的项目包括: Arbitrum:与 OKX 热钱包、Uniswap、GMX 有交互。 This address has frequent interactions across multiple EVM chains, involving the following projects: Arbitrum: Interacted with OKX hot wallets, Uniswap, and GMX. BNB Chain:与 PancakeSwap、Channels Finance 有交互。 BNB Chain: Interacted with PancakeSwap and Channels Finance. Ethereum Mainnet:与 Across、BitPay、THORChain、等项目有交互。 Ethereum Mainnet: Interacted with Across, BitPay, THORChain, and others. 这些交互与资产流动的广泛性,使得该地址成为调查的核心线索。 These extensive interactions and asset movements make this address a key lead in our investigation. 调查建议 Investigation Recommendations 联系相关项目方:与上述提到的项目(如 Uniswap、GMX、PancakeSwap 等)联系,调查该地址的交互记录,特别是用户行为数据(如浏览器指纹、IP 地址等)。 Contact the relevant projects: Reach out to the mentioned platforms (Uniswap, GMX, PancakeSwap, etc.) to investigate the transaction history of this address, particularly user behavior data such as browser fingerprints and IP addresses. 联系交易所:对于与该地址交互的交易所(如 OKX、BitPay 等),调查是否涉及 KYC 用户。 Contact exchanges: Investigate whether the exchanges interacting with this address (such as OKX and BitPay) have any KYC (Know Your Customer) records linked to it. 尽快报警立案:许多调证(如交易所的账户信息、IP 地址、KYC 记录等)需要司法文件才能执行,建议尽快向警方或相关司法机构报案,以便推动调查。 File a police report ASAP: Many key pieces of evidence (such as exchange account details, IP addresses, and KYC records) require legal documents for access. We strongly recommend reporting to the police or relevant judicial authorities as soon as possible to facilitate the investigation. 其他关联地址(参考) Other Related Addresses (For Reference) 0x34e5DC779cB705200e951239B6A89aaF5C7dBFc1 0xd95b3c1E638Ce3CDc070ad6D4F385c61E2eE8662 0x596a2b9a4EDa4405394Ed8BcfA735b6Bd206bb47 Tornado Cash 0x62b1a03A4D3b68137c407BF207F22933A665Fa10 Ronin Bridge 0xd3D83F33839a7450b11350099Bb311899ffA4204 ChangeNow 0x8bb53B5FA07dA51E65BA5E283EC912BE1e69c359 MEXC bc1qyajkchc4cgrgpcmmm2massjqrgvrepl28tyjl5 THORChain bc1qsqwywyfq3dhrmu3kh8emh2l6u5hde7szxpg99j THORChain @evilcos @SlowMist_Team @0xAA_Science @KuiGas @0xzhaozhao 求转发扩散
0
0
0
I pledge my allegiance to @avalonfinance_ as a true Avalonian 🎩🔮and claimed 5 $AVL allocation! If you got a bag, drop a screenshot below! 👇 Wanna claim yours? Here's how: 1️⃣ Go to
0
0
0
zklend中招了,starknet上没几个能用的dapp,结果还被盗了,starknet的defi之路是不是就此断绝
To the hacker: We understand that you are responsible for today’s attack on zkLend. You may keep 10% of the funds as a whitehat bounty, and send back the remaining 90%, or 3,300 ETH to be exact, to this Ethereum address: 0xCf31e1b97790afD681723fA1398c5eAd9f69B98C. Upon receiving the transfer, we agree to release from any and all liability regarding the attack. We are working with security firms and law enforcement at this stage. If we do not hear from you by 00:00 UTC, 14th Feb 2025, we will proceed with the next steps to track and prosecute you. This message is binding. It’s sent from the Ethereum ZEND token deployer account. Its authenticity can be verified by cross-checking with zkLend’s Twitter/X account.
0
0
0
昨天layer上线在1块2左右卖了,原以为要一去不返,没想到今天又拉回来了,找个合适的位置空!
首先恭喜参与投资的 @solayer_labs 首发上线了Binance、Upbit等大所,之前投它的理由一个是SVM叙事的想象空间很大,毕竟Solana是这一轮最亮眼的公链,另一个是看到 @shoucccc 从伯克利PHD休学加入Solayer作为首席工程师,让我很Bullish,有了解MEV和安全领域的朋友应该都听说过他和Fuzzland的大名。 价格走势上,$Layer正在大V天龙,这其实非常能反映市场的博弈。首先,最近做空VC币几乎已经成了一种政治正确,大家都受够了VC币高估值、低流通、持续解锁这几个特性,也确实大部分VC币都是上所即巅峰,后续对行业没有多少实际贡献,只是团队和投资人的取钱罐。 但是任何事情都不能脱离本质只看表面,当所有人都意识到做空是财富密码的时候,距离翻车也就不远了,在币圈从来没有什么钱是可以不带脑子还能长期赚下去的。以Solayer为例,最低的时候流通市值其实已经只有100多M,并不能算是一个典型的高估值开盘,而且币安合约上线的时间往往较晚,如果你等到币安合约再去开空,很可能已经错过了现货开盘的高价,还要扛着顶格的负费率,做空将会非常被动,再遇上轧空的话,很可能会损失惨重。 每个操作,一定要理解背后的核心逻辑,而不是邯郸学��,才能在这个风险和机遇都无处不在的市场长久生存。
0
0
0