[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@BlockscopeCo BlockscopeBlockscope posts on X about $eth, $105m, $243m, 0xb37d617716e46511e56fe07b885fbdd70119f768 the most. They currently have XXXXX followers and XXX posts still getting attention that total XX engagements in the last XX hours.
Social category influence cryptocurrencies
Social topic influence $eth #1478, $105m #10, $243m, 0xb37d617716e46511e56fe07b885fbdd70119f768, $1858m, $dai, dai, $weth, flow, exchanges
Top accounts mentioned or mentioned by @zachxbt @arbitrum @coindcx @tornadocash @ethereum @bybitofficial @griffinai @uniswap @newgoldprotocol @yearnfi @tetherto @ethenalabs @solana @debridge @seedifyfund @paraswap @breederdodo @lidofinance @gmxio @hyperdrivedefi
Top assets mentioned Ethereum (ETH) Dai (DAI) WETH (WETH)
Top posts by engagements in the last XX hours
"1/ Earlier today @zachxbt reported the likely arrest of threat actor Danish Zulfiqar ("Danny") linked to the $243M Genesis theft and Kroll SIM swaps. Blockscope analyzed the suspected seizure address: 0xb37d617716e46511E56FE07b885fBdD70119f768 Current holdings sit at $18.58M (primarily $ETH & $DAI) showing specific consolidation patterns consistent with Law Enforcement seizures"
X Link 2025-12-05T15:24Z 1956 followers, XXX engagements
"2/ On further analysis of counterparties we identified a distinct obfuscation flow from last year: Funds were received from Mixers & Exchanges. Assets moved through intermediaries performing repeated $ETH $WETH swaps. Swapped funds were sent to fresh addresses before final exchange deposits. This layering was clearly designed to mask origins and sever exposure links"
X Link 2025-12-05T15:25Z 1956 followers, XXX engagements
"1/ Just yesterday we were discussing CPIMP attacks and now we have a live example: @USPD_io has been exploited for $1M via a malicious backdoor proxy planted over X months ago. All the drained funds were swapped to ETH. The exploiter currently holds $1.05M at this address: 0x083379bdac3e138cb0c7210e0282fbc466a3215a This wasn't a flash loan attack but a sophisticated "sleeper" job"
X Link 2025-12-05T16:16Z 1956 followers, XXX engagements
"A victim attributed to the ENS name markpascall.eth lost approximately $1.05M in assets in a suspected private key compromise. The incident came to light after @zachxbt flagged the activity. The stolen funds were consolidated and swapped for XXX ETH which was then funneled into Tornado Cash. Exploiter address: 0x4f8affe6cd269d1f8352d0542432de6975c3912d"
X Link 2025-12-11T17:14Z 1955 followers, XXX engagements