当前位置:网站首页>Address monitoring API: how to trace and monitor uniswap hacker addresses
Address monitoring API: how to trace and monitor uniswap hacker addresses
2022-07-19 08:16:00 【Tokenview blockchain】
Encryption hacker
stay Crypto In the world , Using protocol vulnerabilities and phishing has become the main way for encryption hackers to launch attacks . According to relevant reports , stay 2022 In the first 2 quarter , The total amount of losses in the encryption industry due to protocol vulnerabilities exceeds 6.7 Billion dollars , Compared with last year, it increased by nearly 50%. It is precisely because the code of the encryption industry is open and transparent , Hackers can check the object code , Committed to discovering vulnerabilities and launching attacks . So many Web3 The project is designed to launch a vulnerability reward plan , To avoid greater economic losses .
And since 5 Since the month , Phishing attacks are more common . Such as through Discord Private letter fraud website link 、 Send phishing emails (Opensea Fishing mail ) And fake token airdrop to send malicious links (Uniswap V3 Stolen ) etc. , Let unsuspecting users be defenseless . Ethereum ecosystem has become the main victim , And with the NFT Incremental development of , Recently, encryption hackers have started again NFT“ go fishing ”, not a few NFT Assets are frequently stolen . Two common types NFT Phishing attacks are those that steal user signatures and highly imitated domain names and contents NFT Phishing site .
How to monitor and protect the security of encrypted assets has become the top priority . Once attacked by hackers , What measures should the project party take to protect the safety of customers' assets , And how ordinary users monitor the addresses and transaction details they care about , Is in Web3 The key issues concerned by the times . So this reflects the blockchain API The importance of Technology .API Its value lies in providing security 、 Privacy and ease of use data services . at present API It is applied in all fields of encryption industry , Involving token transactions 、 Address monitoring, transaction analysis and security . Block chaining API provider Tokenview Provide address monitoring and data for blockchain industry developers and ordinary users API, Help users get the changes of data on the chain in time , Monitor the transaction dynamics of the address .
Next ,Tokenview Teach you how to use API Monitor hacker address .
Get the hacker address
With Uniswap V3 Take the theft incident as an example :2022 year 7 month 12 Japan ,Binance CEO CZ Send a reminder , Hackers in Uniswap V3 Stolen from the platform 4,295 gold ETH.Uniswap founder Hayden Adams It is also confirmed that the theft is a phishing attack . some LP NFT Will be stolen because of late authorization transactions . We can get more information by monitoring the address and online transfer behavior . Please refer to : alert ! Another phishing attack :Uniswap Stolen 810 Thousands of dollars .
We go through Tokenview Blockchain browser finds the hacker address (Fake_Phishing5875):
https://eth.tokenview.com/cn/address/0x09b5027ef3a3b7332ee90321e558bad9c4447afa
Why monitor hacker addresses
Due to the anonymity of blockchain , We can't get the real identity information of the hacker . If hackers transfer the stolen funds into such as Binance Central exchange , Maybe we can get the clues of hackers . Of course , This idea is often too direct , Since the hacker chose to transfer to the exchange account , We must consider the anonymity of our own information .
Another reason for monitoring hackers' addresses is to get the hackers' information in time , Once the hacker address changes , The addresses associated with hackers can be monitored , In case hackers will carry out the next scam or other actions .
From stealing funds to the next step , The whole process may last for half a year or even longer . This also brings many difficulties to our monitoring . At this time, if you pass a program or API, Get relevant information at the first time when the address balance changes , Then monitoring will become much easier .
How to monitor hacker addresses
Tokenview Monitoring address of API adopt Webhook The way , Change the address balance information POST To set up Webhook URL On . Use Tokenview Address monitoring API To track the hacker's address generally requires the following three steps :
- register Tokenview Developer account :https://services.tokenview.com;
- Set address monitoring Webhook URL;
- Import or copy 「 Hacker address 」;
After completing the above steps , Once the hacker address has transaction information , We will receive the notice as soon as possible , Master the real-time dynamics of hacker addresses .
Tokenview Remind you to learn 【 Deception prevention skills 】:
- Prevent signature theft , When signing the transaction, you need to confirm the transaction content , Ensure the authenticity of the transaction initiator ;
- Don't disclose private keys and mnemonics ;
- Don't mess with unknown links and websites , Prevent high imitation of domain names and content NFT Phishing site .
边栏推荐
- Set settings in vscode json
- Dark horse programmer - software testing -16 stage 3 - function testing -175-198, URL composition introduction, request content and composition description line function test and database, URL composi
- 美联储降息,为何长期利好数字货币市场? 2020-03-05
- redis分布式锁
- Visual Studio 生产环境配置方案:SlowCheetah
- Oi memoirs
- 行为型模式之策略模式
- C#对txt文件的读写操作
- 在VSCode中设置settings.json
- 才意识到自己“奇葩”的360,会不会有些晚?
猜你喜欢

通过Dao投票STI的销毁,SeekTiger真正做到由社区驱动

【刷题篇】完全平方数

总结的太好了!终于有人把SQL的各种连接Join都讲明白了

Facial key point detection CNN

Classic general pbootcms flower website template source code, adaptive mobile terminal, with background management
![[C language] user defined type details: structure, enumeration, union](/img/5c/69d238a71e24b34c2232c20ed7e09e.png)
[C language] user defined type details: structure, enumeration, union

mySQL 2502 2503错误

Xilinx ultrascale+ MPSoC (zu9eg/zu15eg) high performance PCIe data preprocessing board
【特征工程】

Pytoch notes (3)
随机推荐
Csp-2020-6- role authorization
DP dynamic planning enterprise level template analysis (Digital triangle, rising sequence, knapsack, state machine, compressed DP)
Deep learning 7 deep feedforward network
What if the user information in the website app database is leaked and tampered with
the max_iter was reached which means the coef_ did not converge “the coef_ did not converge“
Stm32f103c8t6 hardware IIC control 4-pin 0.96 inch OLED display
redis集群
《痞子衡嵌入式半月刊》 第 58 期
从赌场逻辑,分析平台币的投资价值 2020-03-03
Interview question: outer margin folding problem (bug of block level elements in ordinary document flow)
By voting for the destruction of STI by Dao, seektiger is truly community driven
Practice of online problem feedback module (V): realize the automatic filling function of general field content
代码学习(DeamNet)CVPR | Adaptive Consistency Prior based Deep Network for Image Denoising
How to choose the right model
[C# 变量常量关键字]- C# 中的变量常量以及关键字
演示集合注入
[C language] user defined type details: structure, enumeration, union
从 B 站崩溃报告看分布式系统的技术栈
Pytoch notes (3)
C # read and write txt files