[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@SpecterAnalyst SpecterSpecter posts on X about onchain, deposit, ethereum, bnb the most. They currently have XXXXX followers and XX posts still getting attention that total XXXXX engagements in the last XX hours.
Social category influence cryptocurrencies XXXXX% exchanges XXXX% travel destinations XXXX% stocks XXXX% events XXXX% finance XXXX%
Social topic influence onchain 6.45%, deposit #477, ethereum #1245, bnb #293, $apr #17, bitcoin 3.23%, $30m 3.23%, hong kong 3.23%, $ab 3.23%, token XXXX%
Top accounts mentioned or mentioned by @apriori @zachxbt @lieren888 @venusprotocol @takaralend @moonwelldefi @roundtablespace @janctionglobal @bubblemaps @serpinxbt @irysxyz @nocontextweb3 @supershyguy0 @0xsoju @0xintuition @singmea @joshbenaron @tanuki42 @certik @europol
Top assets mentioned Ethereum (ETH) aPriori (APR) Bitcoin (BTC) AB (prev. Newton) (AB) Aki Network (AKI) Monad (MON) Dai (DAI) BNB (BNB) OG Fan Token (OG)
Top posts by engagements in the last XX hours
"How DPRK threat actors stole XXX BTC ($30M) from another alleged theft Mr. Leung. During on-chain research I came across funds that I later linked to an ongoing case in the Hong Kong District Court. On March XX 2025 a total of XXX BTC was stolen across three wallets. an attack that I later connected to the Lazarus Group. Theft address: 1KGnHUhhqw7P7QPDcXyPdowSTg687Fe8N9 These XXX BTC were part of the 1000 BTC that were allegedly taken by Mr. Leung from Yan Yung a case that has been active in court since 2018. In 2022 the court issued an order legally barring Mr. Leung from moving XXXXXX BTC"
X Link 2025-12-01T15:21Z 9576 followers, 4336 engagements
"What caused the $AB (@ABDAO_Global ) massive dump A huge sell order was placed at the exact moment the token started dumping on Binance Alpha XXX. At 01:27 AM UTC a single tx sold 192.37M $AB swapped for $932.79K USDT. In the same minute (01:28 AM UTC) another transaction sold 501.43M $AB swapped for $282.91K USDT. Stay Smart"
X Link 2025-10-09T03:04Z 9576 followers, 1753 engagements
"Further investigation linked the trader to @bitforexcom founder @GarrettBullish. BitForex shut down in February 2024 after disappearing with $56M in user funds"
X Link 2025-10-12T07:23Z 9575 followers, 37.8K engagements
"OKX Deposit X previously received 688.7K USDT from 0xbBf4 on July X and also deposited 393.98K USDT to another OKX deposit wallet on June X. That OKX Deposit X also received 593K USDT from 0x01c8 on May XX. 0xbBF48160C1230f9490eBa07F94d7008d3ee07A5c 0x01c85C52373D0dab78A4278837CD44bb6E0DCf0b OKX Deposit 2: 0xbF2E6217096f625b4C459303F95f2D9f3a44f60f"
X Link 2025-11-13T18:42Z 9575 followers, 6111 engagements
"On July XX 0x01c8 sent XXXXXX ETH for gas fees to 0xC0a which was later used to deposit 506K USDT to Bybit wallet: 0xaE7A4A99Db2d7eE28aE244F05a1833388321Ab72 That Bybit deposit wallet received 50M $AKI tokens (@aki_protocol) on Polygon from a multisig wallet (0x6cb) created by 0xf9785A1a5149C021482CF4b7Bffe6883B927025b"
X Link 2025-11-13T18:42Z 9576 followers, 5875 engagements
"I dont know why yall are surprised about the Monad launch. I dont like to comment on any project without solid evidence to back it up but Monad will definitely be like Eclipse. They both raised funds at ETHDenver 2024"
X Link 2025-11-24T15:29Z 9575 followers, XXX engagements
"was able to put together the wallets that the Upbit attacker bridged to on Ethereum. Total holding $19M"
X Link 2025-11-29T14:58Z 9576 followers, 1583 engagements
"Im finding it difficult to fully understand how a single transaction caused a $9M loss to @yearnfi . Its a very complex txs and one key element that helped the attacker was the flash loan taken from Balancer. Breakdown HOW IT WORKED (Step-by-Step) X. Flash Loan Setup The attacker borrowed a large amount of liquid-staking tokens (LSDs) from Balancer: 4000 wstETH ($14.7M) XXX rETH ($1M) 3100 WETH ($9.3M) X. Deposit into yETH Vault All the borrowed assets were deposited into Yearns yETH vault and the attacker received yETH shares in return. X. Core of the Exploit The attacker repeatedly:"
X Link 2025-12-01T09:42Z 9574 followers, 13.8K engagements
"On Sep XX 2023 Mixin a cross-chain was hacked for $200M in an attack linked to DPRK-affiliated actors. The attacker swapped the stolen assets into $DAI $ETH and $BTC. Two years later the funds have still not been moved and remain in the original theft addresses now worth approximately $285M"
X Link 2025-12-02T16:20Z 9572 followers, 1444 engagements
"The attacker appears to be targeting lending protocols successfully exploiting several within the last XX days with none of the teams publicly disclosing the incidents. Major affected protocols include: @VenusProtocol: $664K @TakaraLend: $450K @MoonwellDeFi: $2M+ There are more like @lobsterfi @orbiterone and others with very low liquidity"
X Link 2025-11-04T12:08Z 9572 followers, 92.1K engagements
"I didnt mention that the team directly deposited 3.9M $APR ($1.4M) to a CEX on October XX. I actually included this in the flow visual"
X Link 2025-11-24T12:20Z 9572 followers, 1023 engagements
"Its been over XX hours since I posted my investigation on $APR and submitted it for the @serpinxbt bounty. If you want to verify it/ award the bounty kindly do the needful. Im really tired of having to remind you in the Ca. Sent message on TG than 24hrs no response"
X Link 2025-11-26T19:59Z 9572 followers, XXX engagements
"it appears to have been an exploit involving @0G_labs and @0G_Foundation around 6:00 AM UTC. The attacker withdrew 500000 $OG tokens and bridged the funds to BNB and Ethereum before depositing them into Tornado Cash. Total Loss: $517k Victim: 0x617E8e3C07bEF319F26C1682270A19e89Ea2bf75 Attacker Addresses: 0x617E8e3C07bEF319F26C1682270A19e89Ea2bf75 0xF1fAB77c27AEB656EF04D610B8356186c650B74a 0x1fa71304010Af642067ee284Aae4B48EdfF661E3 Stay Smart"
X Link 2025-12-11T14:25Z 9570 followers, 4554 engagements