[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
 @Phalcon_xyz BlockSec PhalconBlockSec Phalcon posts on X about $219k, 0xe143b486ab0413df0d6dad2caf6d2f61cac54730, $120m, the root the most. They currently have XXXXX followers and X posts still getting attention that total XXXXXXX engagements in the last XX hours.
Social category influence cryptocurrencies #366 technology brands XX%
Social topic influence $219k 20%, 0xe143b486ab0413df0d6dad2caf6d2f61cac54730 20%, $120m 20%, the root #9, token 20%, oracle 20%, $1m 20%, 1m 20%, rseth XX%
Top accounts mentioned or mentioned by @balancer @asterafinance @moonwelldefis @phalconxyz @z__wizz @pumpdotfunguy @goan999999 @iakshatmittal @_tradernico @gollopd32313 @btb_finance @proofofbags
Top posts by engagements in the last XX hours
"ALERT Our system detected an attack transaction on #Base a few hours ago targeting an unknown contract and resulting in a loss of approximately $219K (55 WETH). The root cause appears to be improper access control which allowed arbitrary transferFrom calls. As a result the victims approved assets were stolen. Please revoke any approvals to 0xE143b486ab0413Df0D6DAd2caf6d2f61CAC54730 immediately and avoid granting new approvals to this contract. Subscribe to BlockSec Phalcon today to get alerted in realtime and take automatic actions to protect your assets"
X Link @Phalcon_xyz 2025-10-30T03:20Z 6722 followers, 4891 engagements
"ALERT @Balancer and several forked projects have been attacked. Any forked projects should stay alert and monitor closely The losses were as follows: Eth: balancer 70m Base: balancer 3.9m Polygon: balancer 117k Sonic: beets 3.4m Arb: balancer 5.9m Op: beethoven 283k"
X Link @Phalcon_xyz 2025-11-03T08:25Z 6722 followers, 159.2K engagements
".@Balancer and several forked projects were attacked a few hours ago resulting in losses exceeding $120M across multiple chains. This was a highly sophisticated exploit. Our initial analysis suggests the root cause was an invariant manipulation that distorted the BPT price calculation allowing the attacker to profit from a specific stable pool through a single batch swap. Take an attack TX on Arbitrum as an example the batchSwap operation can be broken down into three phases: X. The attacker swaps BPT for underlying assets to precisely adjust the balance of one token (cbETH) to the edge of a"
X Link @Phalcon_xyz 2025-11-03T11:07Z 6722 followers, 108.3K engagements
"ALERT Our system detected a series of suspicious transactions targeting @MoonwellDeFis smart contracts on #Base and #Optimism. Our analysis indicates an issue with the token price (rsETH / ETH) feed from the off-chain oracle which was exploited possibly by a MEV bot resulting in losses exceeding $1M. It appears that the price used by the protocol was incorrectly updated. As there is no direct method available to contact the respective project please reach out to us if you have any questions. With Phalcon @Phalcon_xyz real-time monitoring you may block exploits before the loss. Secure now"
X Link @Phalcon_xyz 2025-11-04T07:56Z 6722 followers, 25.1K engagements