[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
GMX exploiter moves stolen funds to various addresses. Community is actively tracking the funds and discussing potential recovery actions.
This topic is about an Ethereum address (0x99cdeb84064c2bc63de0cea7c6978e272d0f2dae) involved in the GMX exploit, focusing on the movement of stolen funds and community efforts to track and potentially recover them.
Engagements 24-Hour Chart Data
Current Value: XXX
Daily Average: XXX
1 Week: XXXXX +92%
1-Year High: XXXXX on 2025-07-09
1-Year Low: XXX on 2025-07-21
Social Network | X |
---|---|
Engagements | XXX |
Mentions 24-Hour Chart Data
Current Value: X
Daily Average: X
1 Week: X no change
1-Year High: X on 2025-07-10
1-Year Low: X on 2025-07-17
Social Network | X |
---|---|
Mentions | X |
Creators 24-Hour Chart Data
X unique social accounts have posts mentioning 0x99cdeb84064c2bc63de0cea7c6978e272d0f2dae in the last XX hours which is up XXX% from X in the previous XX hours
Daily Average: X
1 Week: X no change
1-Year High: X on 2025-07-09
1-Year Low: X on 2025-07-17
Sentiment 24-Hour Chart Data
Current Value: %
Daily Average: XXX%
1-Year High: XXX% on 2025-07-18
1-Year Low: XXX% on 2025-07-18
Top assets mentioned In the posts about 0x99cdeb84064c2bc63de0cea7c6978e272d0f2dae in the last XX hours
Top topics mentioned In the posts about 0x99cdeb84064c2bc63de0cea7c6978e272d0f2dae in the last XX hours
dai, gmx, $9m, 0xdf3340a436c27655ba62f8281565c9925c3a5221, vault, $usdc, bounty, onchain, $eth