#  @DefimonAlerts Defimon Alerts Defimon Alerts posts on X about onchain, bounty, balance, finance the most. They currently have [-----] followers and [---] posts still getting attention that total [-----] engagements in the last [--] hours. ### Engagements: [-----] [#](/creator/twitter::1981269826497892352/interactions)  - [--] Week [-----] -45% - [--] Month [------] +344% ### Mentions: [--] [#](/creator/twitter::1981269826497892352/posts_active)  - [--] Month [--] -5.70% ### Followers: [-----] [#](/creator/twitter::1981269826497892352/followers)  - [--] Week [-----] +4.70% - [--] Month [-----] +55% ### CreatorRank: [-------] [#](/creator/twitter::1981269826497892352/influencer_rank)  ### Social Influence **Social category influence** [cryptocurrencies](/list/cryptocurrencies) 28% [finance](/list/finance) 9% [exchanges](/list/exchanges) 6% [currencies](/list/currencies) 4% [social networks](/list/social-networks) 3% [stocks](/list/stocks) 2% [technology brands](/list/technology-brands) 1% **Social topic influence** [onchain](/topic/onchain) #45, [bounty](/topic/bounty) #488, [balance](/topic/balance) 11%, [finance](/topic/finance) 9%, [address](/topic/address) 9%, [we are](/topic/we-are) 8%, [usdt](/topic/usdt) #862, [in the](/topic/in-the) 5%, [ethereum](/topic/ethereum) #1543, [network](/topic/network) 5% **Top accounts mentioned or mentioned by** [@clara_oracle](/creator/undefined) [@ramirex5](/creator/undefined) [@protonme](/creator/undefined) [@gyrofinance](/creator/undefined) [@crosscurvefi](/creator/undefined) [@gardenfi](/creator/undefined) [@balancer](/creator/undefined) [@officer_secret](/creator/undefined) [@jerrycommuniity](/creator/undefined) [@fildafinance](/creator/undefined) [@gyrostable](/creator/undefined) [@usddwin2024](/creator/undefined) [@hypurrfi](/creator/undefined) [@holdstationcom](/creator/undefined) [@trungbanhh](/creator/undefined) [@holdstationw](/creator/undefined) [@revertfinance](/creator/undefined) [@nagendararavisai](/creator/undefined) [@zachxbt](/creator/undefined) [@k9finance](/creator/undefined) **Top assets mentioned** [Ethereum (ETH)](/topic/ethereum) [USDC (USDC)](/topic/usdc) [Elastos (ELA)](/topic/elastos) [Filda (FILDA)](/topic/filda) [Tether (USDT)](/topic/0xdac17f958d2ee523a2206206994597c13d831ec7) [Shiba Inu (SHIB)](/topic/$shib) [Origin Protocol (OGN)](/topic/origin-protocol) [Plasma (XPL)](/topic/$xpl) [Altria Group Inc (MO)](/topic/$mo) ### Top Social Posts Top posts by engagements in the last [--] hours "💬 Onchain Message: Please listen to me. This is very hard for me it's a lot of money and I'm devastated. Those miners were stolen directly from my wallet to yours. The person who 'sold' them to you never owned them; he hacked me and sent them to you when you paid him. We both got scammed by the same guy. Please let's talk on Telegram so I can see your proof and get his contact. My Telegram is: @JerryCommuniity https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc" [X Link](https://x.com/DefimonAlerts/status/2022313539411599394) 2026-02-13T14:14Z [----] followers, [---] engagements "💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to" [X Link](https://x.com/DefimonAlerts/status/2020051690297151832) 2026-02-07T08:27Z [----] followers, [----] engagements "💬 Onchain Message: Your SOMining server is currently at risk and an attack from that address could occur tomorrow resulting in loss of funds. If you wish to continue operating your server and avoid losing funds you can blacklist this address to prevent tokens from being used. Black address 0x29e5F70ebab2B5b830609E0f2b8A357F2295EBfD For further information please contact the following email address: kingston37790@proton.me https://bscscan.com/tx/0xdc43358a5dd9883465bacf7c261818013c186229134146d0b8b27c8dfdfd0c4e" [X Link](https://x.com/DefimonAlerts/status/2022482155062862190) 2026-02-14T01:24Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x85b78aca6deae198fbf201c82daf6ca21942acc6 (LidoARM) belonging to protocol Origin Protocol (Immunefi) New address: 0xC0297a0E39031F09406F0987C9D9D41c5dfbc3df https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b" [X Link](https://x.com/DefimonAlerts/status/1998229749722931563) 2025-12-09T03:14Z [----] followers, [---] engagements "🚨 JFIN Bridge (LCBridgev2Token) - $13.4K Token: $JFIN @ $0.085 MC: N/A (no circulating supply tracked) FDV: $25.6M Type: Logic Error (Reward Calculation) The staking reward calculation allows claiming rewards greater than the contract balance by exploiting the claimReward function which pays out based on accumulated totalReward rather than actual available funds draining all staked JFIN tokens. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/jfin-coin https://etherscan.io/address/0x3EbFd0EFC49a27fb633bd56013E4220EBC2c3C6d" [X Link](https://x.com/DefimonAlerts/status/2003862392866734530) 2025-12-24T16:16Z [----] followers, [---] engagements "💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take flashloan of my vault contract assets which were subsequently used by him. It had nothing to do with my addresses and/or contracts deployed by me. Since then I am trying to move my funds back to ETH chain but you are stopping and blocking my bridge transactions continuously. Your analysis of the attack transaction is totally" [X Link](https://x.com/DefimonAlerts/status/2009886570262806849) 2026-01-10T07:14Z [----] followers, [----] engagements ".@FildaFinance was hacked on ESC network on December [--] Its second incident since April [----] when $700k was stolen https://fildafinance.medium.com/filda-exploit-statement-49ec69e34c53 https://x.com/fildafinance/status/2007435307059147199s=46&t=sMvgsnYvKjMe_sT0nAhjmg 💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take" [X Link](https://x.com/DefimonAlerts/status/2009888923518972107) 2026-01-10T07:23Z [----] followers, [---] engagements "🚨 AiPay - $31K Token: $AIPAY (No CoinGecko listing) MC: Unknown (unlisted token) Type: Logic Error (Unverified Contract) Attacker flash loaned 14.5M USDT from Moolah repeatedly called unverified minting functions on victim vault contract to mint AiPay tokens dumped via PancakeSwap for $30K profit. TX: Victim: (unverified) https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83 https://bscscan.com/tx/0xa268528df0f7e2b55f88e00746634e4a5404f3924b32335d0c504d92f055064d https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83" [X Link](https://x.com/DefimonAlerts/status/2015418396980936818) 2026-01-25T13:36Z [----] followers, [---] engagements "🚨 XPlayer Token (XPL) - $963K Token: $XPL @ $19.12 (post-hack distorted) MC: N/A (not listed on CoinGecko) TVL: $0 (pool drained) Type: Missing Access Control The NodeDistributePlus contract has a public DynamicBurnPool() function that allows anyone to burn XPL tokens from the liquidity pool. Attacker called this to burn nearly all XPL in the PancakePair then swapped their small XPL balance to drain $963K USDT. TX: Victim: (XPL Token) https://bscscan.com/address/0xc2c4ccde8948c693d0b04f8bad461e35a12f20b8" [X Link](https://x.com/DefimonAlerts/status/2016877822283862480) 2026-01-29T14:15Z [----] followers, [---] engagements "On January [--] @GyroStable has been exploited for around [-----] ETH ($696k) A hacker exploited an arbitrary call vulnerability in the _ccipReceive() function of the GydL1CCIPEscrow contract. It allows the recipient field in the CCIP message to be any address including the GYD token contract itself. Setting recipient = GYD and data = approve(attacker max) effectively granted the attacker full allowance to the escrow's GYD holdings. https://twitter.com/i/web/status/2018600445900390567 https://twitter.com/i/web/status/2018600445900390567" [X Link](https://x.com/DefimonAlerts/status/2018600445900390567) 2026-02-03T08:20Z [----] followers, [----] engagements "💬 Onchain Message: Message to who executed the GYD bridge security incident The following message is subject to approval by Gyroscope governance vote closing 18:30 UTC on Feb [--] see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by" [X Link](https://x.com/DefimonAlerts/status/2018757317731238287) 2026-02-03T18:43Z [----] followers, [---] engagements "💬 Onchain Message: The following message has been authorized by Gyroscope governance see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by canceling GYD's system surplus. If you take this offer Gyroscope will cease investigations and" [X Link](https://x.com/DefimonAlerts/status/2019121507805372784) 2026-02-04T18:50Z [----] followers, [---] engagements "💬 Onchain Message: FINAL SETTLEMENT: Return [----] ETH / Reward [-----] ETH. Upon receipt all legal actions and subpoenas to Binance/Coinbase will be permanently withdrawn. Case classified as White-hat. https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14 https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14" [X Link](https://x.com/DefimonAlerts/status/2019655325360545915) 2026-02-06T06:12Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x348d8ec2d06d35ed09583b6c43267bafd3ea62b90f0a6cb59a858117f96c76b7 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x18df2cbb364becd69d7703a6336ffb31f3c9619d23634ec8f591df312169fd457a8133046c32b91f0e3395c930dffcdc7673d7105ee308ffee89be96c5414f311b https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9 https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9" [X Link](https://x.com/DefimonAlerts/status/2022362460057903405) 2026-02-13T17:29Z [----] followers, [--] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x3f3423d0573f447dce167fcd4fdff017c1be2a6db731ec7421474e1421e31a8c on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x9ce799b58330172ffed107958fe6210aa2b3777b36676049b5717bce8436544509243c96be2f1b554564e1830a729e45276e975d9f5f51df78449297ac7deedb1c https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2 https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2" [X Link](https://x.com/DefimonAlerts/status/2022362572733792366) 2026-02-13T17:29Z [----] followers, [--] engagements "CrossCurve @crosscurvefi (ex has been exploited for around [--] million on several networks. Anyone could call expressExecute on ReceiverAxelar contract with a spoofed cross-chain message bypassing gateway validation and triggering unlock on PortalV2. Victim (PortalV2): Vulnerable contract (ReceiverAxelar): Attackers: https://etherscan.io/address/0xcc3a5dc003b3a58621745a39f706ef9646d5c481 https://etherscan.io/address/0x632400f42e96a5deb547a179ca46b02c22cd25cd https://etherscan.io/address/0xb2185950f5a0a46687ac331916508aada202e063" [X Link](https://x.com/DefimonAlerts/status/2018055069762240741) 2026-02-01T20:13Z [----] followers, [----] engagements "Onchain monitoring and incident response is crucial for DeFi Since [----] we have been working on to detect DeFi exploits by analyzing transactions in real-time. There is a constant stream of DeFi exploits that are barely noticed. You can get access to these instant alerts by subscribing to the exploits feed for just 50$/mo. For protocol teams we offer a Websocket subscription to act on the alerts automatically. Native Telegram subscription: Tribute mini-app: Contact: http://t.me/DecurityHQ http://t.me/tribute/appstartapp=sCiA http://t.me/+m9BMRKlMuW5iMGFi http://defimon.xyz" [X Link](https://x.com/DefimonAlerts/status/2018236893738012918) 2026-02-02T08:15Z [----] followers, [----] engagements "💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpimp exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to" [X Link](https://x.com/DefimonAlerts/status/2020049238093086909) 2026-02-07T08:17Z [----] followers, [---] engagements "💬 Onchain Message: Hello your Gnosis Safe has been exploited for $70k because your custom module 0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19 has a receiveFlashLoan callback without verification of the flashloan initiator. We managed to rescue a small portion of USDT and sent it back to you. Please remove the vulnerable module. https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0 https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0" [X Link](https://x.com/DefimonAlerts/status/2020204608551858587) 2026-02-07T18:34Z [----] followers, [----] engagements "Unfortunately the deployer of the backdoored RobinMarketManager proxy didn't act and the contract has got drained by CPIMP exploiter for $7400. https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e 💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e" [X Link](https://x.com/DefimonAlerts/status/2020392996664144299) 2026-02-08T07:03Z [----] followers, [----] engagements "💬 Onchain Message: PRE-BOUNTY NOTICE: TARGET TELEGRAM IDs [----------] [----------] LOGGED. [---] ETH REWARD PENDING FOR [----] ETH RECOVERY. FORMAL RELEASE: FEB [--] 00:00 UTC. ACTIVE IN 16H. RETURN ASSETS TO VOID. https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d" [X Link](https://x.com/DefimonAlerts/status/2020407176271966478) 2026-02-08T07:59Z [----] followers, [---] engagements "Hello @usddwin2024 your proxy deployments on Base have been backdoored by malicious actors (CPIMP attack). Affected proxies: https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167 https://basescan.org/address/0x84ba01433762ee17605a0667c061e69ab3089756 https://basescan.org/address/0x45214ffbf96e2994c36d846c6aa2c0662c17851c https://basescan.org/address/0x3cdbbea29edfdc591a3d1d6a09fb6f423153b2cd https://basescan.org/address/0x8d160d5b43c95dd75b2da0d9b04d1e4ee729c8b6 https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167" [X Link](https://x.com/DefimonAlerts/status/2020512358410363245) 2026-02-08T14:57Z [----] followers, [---] engagements "💬 Onchain Message: Chase I just want to be clear here. You didnt push back or bargain when I proposed the percentage and I acted in good faith based on that agreement. I understand we all need to make some $$(even if ti entails crushing the other guy) and being reminded of $32000 you didnt even know you had is meaningful. That said backing away after an agreement isnt the right way to handle this. If this is where it lands Ill take the L but I want to be clear about how it looks from my side. As an aside it cost me well over $10 to keep crbo.eth safe and available for you (the name itself" [X Link](https://x.com/DefimonAlerts/status/2020602145242746990) 2026-02-08T20:54Z [----] followers, [---] engagements "💬 Onchain Message: OFFICIAL NOTICE: $1.15M RECOVERY BOUNTY ACTIVATED [--]. DECLARATION As of February [--] [----] 00:00 (UTC) all previous negotiations are officially terminated. The 23% 'White-hat Reward' is now converted into a 'Recovery Bounty' for the tracking of perpetrators and full recovery of assets. [--]. BOUNTY DETAILS Total Reward: [---] ETH (23% of recovered assets) Source of Funds: Deducted immediately from the recovered [----] ETH (approx. $5M). Eligibility: Anyone providing critical information leading to the full recovery of assets or identification of the perpetrators. [--]. THE 24-HOUR GRACE" [X Link](https://x.com/DefimonAlerts/status/2020648822368538690) 2026-02-08T23:59Z [----] followers, [---] engagements "💬 Onchain Message: Dear hacker sir Please never return the funds use tornado cash Thor swap or u can use torcador and covert to monero and mix it I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here" [X Link](https://x.com/DefimonAlerts/status/2020687342814540240) 2026-02-09T02:32Z [----] followers, [----] engagements "⚠ Unverified contract lost $14344 at 12:06 [--] February [----] (UTC) https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7 https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7" [X Link](https://x.com/DefimonAlerts/status/2020945127166877761) 2026-02-09T19:37Z [----] followers, [----] engagements "Contract paused 🌍 Network: bsc 📍 Contract: StakeManagerV2 belonging to protocol Stader for BNB (Immunefi) 👤 Actor: 0x79a2ae748ac8be4118b7a8096681b30310c3adbe 🕐 Time: 14:26 [--] February [----] (UTC) https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83 https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83" [X Link](https://x.com/DefimonAlerts/status/2021592646125314242) 2026-02-11T14:30Z [----] followers, [---] engagements "💬 Onchain Message: Hello your proxy deployments have been backdoored by the malicious actors (CPIMP attack): [--]. [--]. Consider calling initialize() atomically together with the proxy deployment to avoid the front-run. https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380 https://arbiscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380" [X Link](https://x.com/DefimonAlerts/status/2021603777082495154) 2026-02-11T15:14Z [----] followers, [---] engagements "🚨 AFX Staking (afxStakeDappA) - Loss: $10700 Type: Logic Error / Price Manipulation The AFX staking contract (0x560d unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker who then swapped them for [-----] USDT profit. TX: Victim: (unverified) Vulnerable Contract: (unverified) Attacker:" [X Link](https://x.com/DefimonAlerts/status/2021997150062649795) 2026-02-12T17:17Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0xcd1f367a1895a38f5bc1c7c8b9ea55ef3ce9fa45407c7081754b25a297ff43a8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0xb5cb123131715972fcec8ed98b4e9ee87a679fa6042970a9c2c22c36e2ad0ffd0d05479775bfe9089e18140027718353870ca88d8d659f36498dedf14d13734c1c https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0 https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0" [X Link](https://x.com/DefimonAlerts/status/2022362095556190222) 2026-02-13T17:27Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x254922f7554a0861c4cd67795a540d349f653b0e938eccad18385ff7fb4e6cc8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x698328e41335a8121742d767c895c460e14a09c73addf3ce9a9f69d94172277c5fa3e525dbe95e44a57db69586919908d7d77759694de62130aac8b08e6d4d9e1b https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12 https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12" [X Link](https://x.com/DefimonAlerts/status/2022362317518762022) 2026-02-13T17:28Z [----] followers, [---] engagements "🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0xec046b20d26aedcaad476e21f22feb00ca0ced5d (EOA) 💰 Destroyed balance: $4743207 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11" [X Link](https://x.com/DefimonAlerts/status/2022436359500165504) 2026-02-13T22:22Z [----] followers, [---] engagements "⚠ Unverified contract lost $10381 at 13:59 [--] February [----] (UTC) https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090 https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090" [X Link](https://x.com/DefimonAlerts/status/2022554639116186046) 2026-02-14T06:12Z [----] followers, [---] engagements "💬 Onchain Message: Wallet 0x61e033357d61a9ce87f6d7b271871641ec01b687 runs a tireless script against 0x837b57a9. firing [--] outbound txs with zero ETH flow or token tracespure operational noise. Methods cluster on 0x03001400 (16x likely query/update loops) 0x02001a00 (15x state reads) and 0x03003400 (11x batch ops) revealing a grinding routine not opportunistic plays. 24/7 cadence gaps under 8h screams bot autopilot no human pauses. Blindspot: This laser-focus flags as automated farming (airdrops exploits) amid Base's bot swarm where 70% of such mono-contract hammering gets blacklisted by" [X Link](https://x.com/DefimonAlerts/status/2022868343842029696) 2026-02-15T02:59Z [----] followers, [---] engagements "💬 Onchain Message: High-velocity ETH churn via 1inch router (0x11111112. 39x 0x12aa3caf swaps) averaging 53min intervals across [--] txs46 outbound just [--] inbounddrains [------] ETH with minimal recapture. Five approves (0xe842e272.) hint at token setups for swaps yet no token flows detected suggesting ETH-only dumps into illiquid pairs or failed executions. Self-interacts (0xd3402dc9. 4x) point to internal looping possibly a solo bot testing MEV edges on Base's low-fee layer. Blindspot: This frantic pacing masks slippage accumulation in 1inch's aggregated liquidity; broader network shows" [X Link](https://x.com/DefimonAlerts/status/2022868476365353186) 2026-02-15T03:00Z [----] followers, [---] engagements "💬 Onchain Message: Wallet exhausts [------] ETH in [--] outbound txnsno inflows pure sink. [--] transfers dominate hitting 0xc734635c (7x likely aggregator) 0x5b2193fd & 0x22af33fe (5x each bridge proxies) cycling through [--] contracts in tight loops. No tokens no DEX routersraw ETH dispersal not trading. 24/7 cadence (gaps 8h) screams automation: bot probing Base's periphery seeding liquidity or farming micro-rewards in low-tier protocols. Blindspot: zero reciprocity exposes drain risk; this isn't strategy it's scattershot erosion. Broader echo: mirrors Base's bot swarms testing L2 edges but" [X Link](https://x.com/DefimonAlerts/status/2022885480304349551) 2026-02-15T04:07Z [----] followers, [--] engagements "Today we reported to @HypurrFi an attack targeting a newly launched Euler Gateway. An attacker identified an arbitrary call vulnerability and exploited it after the first large approval. Should he waited for more approvals the impact could be larger. We reported it right after the detection in our monitoring system which helped to quickly mitigate the incident by the team - no more funds are at risk. As part of our recent release we failed to catch the unintended inclusion of unaudited Helper Code that was being developed to streamline users and enable swapping into lending positions. This" [X Link](https://x.com/DefimonAlerts/status/2015512978041549292) 2026-01-25T19:51Z [---] followers, [----] engagements "💬 Onchain Message: Final Settlement Offer - $3000000 USDC Bounty I am following up because I have not heard from the account. I am offering you a guaranteed clean $3000000 USDC bounty to walk away. This is a life-changing amount of money with zero legal risk or pursuit. The alternative is a global forensic investigation. The $13M is being tracked by all major exchanges and law enforcement; it will be nearly impossible to bridge or off-ramp without detection. Please don't trade your future for "hot" assets you cannot use. Take the $3M and let my family survive. Contact me privately at" [X Link](https://x.com/DefimonAlerts/status/2016571060557169041) 2026-01-28T17:56Z [---] followers, [---] engagements "💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a whitehat case. We are offering a bounty of the ETH you had transferred (22 ETH) and would like you to return the ownership and funds in BNB and World Chain perpetual dex. No legal pursuit Email: trung.banh@holdstation.com or telegram @trungbanhh Return address: 0x318ce8b75c820a8fe7adf47c6213bc3c53ffa987 Let make this a better" [X Link](https://x.com/DefimonAlerts/status/2016695515824390239) 2026-01-29T02:10Z [---] followers, [----] engagements "Holdstation @HoldstationW has been hacked for around $100k due to a wallet compromise. The attacker took control of the project's wallet and drained HOLD USD1 and BNB tokens across BSC Worldchain and Ethereum networks. Attacker address: 0x54e127b8dbf3bebf64bb1d62a195a6f60113130d 💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a 💬 Onchain Message: Dear Hacker Holdstation team" [X Link](https://x.com/DefimonAlerts/status/2016752067797536790) 2026-01-29T05:55Z [---] followers, [----] engagements "💬 Onchain Message: We are monitoring your address. [------] USDT has been targeted by multiple security agencies. We are offering 10% ($73000) as a white-hat bounty in exchange for the return of 90% of the funds. Return the funds within [--] hours and we will cease tracking and legal action. Otherwise we will immediately request Tether to blacklist this address. https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded" [X Link](https://x.com/DefimonAlerts/status/2017229481216209155) 2026-01-30T13:32Z [---] followers, [---] engagements "💬 Onchain Message: This message is issued by the Revert Finance team regarding the unauthorized exploitation of a vulnerability in our Aerodrome V3 Vault contract and the withdrawal of approximately [-----] USDC belonging to the protocol and its users. Transaction Hash: 0x10429eaeb479f9149854e4aeb978a35ac02d9688f6e22371712b3878c63a64ab Exploiter Address: 0xc6b04f6316fb674c556d65f136898ee26719bb6d Network: Base While this incident involved a smart contract vulnerability the exploit was executed with clear malicious intent to permanently misappropriate user funds rather than responsible" [X Link](https://x.com/DefimonAlerts/status/2017239993916195126) 2026-01-30T14:14Z [---] followers, [---] engagements "Typus Finance incident happened on Sui blockchain on October [--] A lack of a single assert() in the oracle contract led to the loss of $3.44 million 👇 https://defimon.xyz/blog/typus-finance-hack-october-2025 https://defimon.xyz/blog/typus-finance-hack-october-2025" [X Link](https://x.com/DefimonAlerts/status/1981292091037929650) 2025-10-23T09:30Z [----] followers, [---] engagements "EIP-7702 is getting popular among hackers to execute attacks In this tx an unverified contract lost [--] eth due to a forced swap with arbitrary slippage. The contract exposes a public function swap() that allows to swap CAPY token with minOutputAmount=0. An attacker used a delegated contract to receive a flashloan to disbalance CAPY / WETH pool and drain the contract. https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73 https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73" [X Link](https://x.com/DefimonAlerts/status/1983488316465938603) 2025-10-29T10:57Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1983745243897065936) 2025-10-30T03:58Z [----] followers, [----] engagements "Unprotected uniswapV3SwapCallback callback in 0xc0ffee's MEV-bot contract was exploited The callback verifies msg.sender against input arguments which makes it trivial to bypass it. As a result the attacker stole $218k worth of LINK tokens. https://basescan.org/tx/0x83da47641680d0cf0a0567e3bcd5961cd30dbd5f34007f0e26e54216ad20b439 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW" [X Link](https://x.com/DefimonAlerts/status/1983810181302538377) 2025-10-30T08:16Z [----] followers, [----] engagements "💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and helping us identify and fix the vulnerability. We are fully committed to resolving this situation peacefully and ensuring that no further harm is done. If you choose to return the stolen assets and help us understand the exploit we will reward you with 10% of the total value recovered. Our intent is to address this" [X Link](https://x.com/DefimonAlerts/status/1983884669834949066) 2025-10-30T13:12Z [----] followers, [----] engagements "Garden Finance @gardenfi has been hacked for $6.4 million 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning" [X Link](https://x.com/DefimonAlerts/status/1983885979317424563) 2025-10-30T13:17Z [----] followers, [----] engagements "💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized crime and other incidents. A good sized percentage of their total activity for the bridge has related to illicit activity. They have not been cooperative with requests to return those fees to the victims or to develop a solution for the protocol. I will not be tracking your funds gained from the exploit." [X Link](https://x.com/DefimonAlerts/status/1983894287210422743) 2025-10-30T13:50Z [----] followers, [----] engagements "The @gardenfi hack is @ZachXBT approved 👌 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized" [X Link](https://x.com/DefimonAlerts/status/1983895085898199533) 2025-10-30T13:53Z [----] followers, [----] engagements "💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock the deal Bounty will start to decrease in 21-days (Nov 18) Bounty will expire in [--] days (Nov 25) Bounty is live. Settlement is atomic when we call recoverKnine(). KNINE is transferred back to Shibarium bridge and ETH is transferred to you. If you call accept we cannot cancel the deal. Code is law. ---" [X Link](https://x.com/DefimonAlerts/status/1985233609100579244) 2025-11-03T06:32Z [----] followers, [---] engagements ".@K9finance does not give up - the last offer was [--] eth and the hacker demanded [--] eth: https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 1." [X Link](https://x.com/DefimonAlerts/status/1985235001311641880) 2025-11-03T06:38Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1985252395090387339) 2025-11-03T07:47Z [----] followers, 56.8K engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $166498.87 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1985252738075394386) 2025-11-03T07:48Z [----] followers, [---] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $14147 https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa" [X Link](https://x.com/DefimonAlerts/status/1985261957432373319) 2025-11-03T08:25Z [----] followers, [----] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $2667 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5" [X Link](https://x.com/DefimonAlerts/status/1985262007407554674) 2025-11-03T08:25Z [----] followers, [---] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $557 https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b" [X Link](https://x.com/DefimonAlerts/status/1985262112034443586) 2025-11-03T08:25Z [----] followers, [---] engagements "The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d" [X Link](https://x.com/DefimonAlerts/status/1985271050939056399) 2025-11-03T09:01Z [----] followers, [----] engagements "@drdr_zz @Balancer Yes internal balances were manipulated before the withdrawal https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR" [X Link](https://x.com/DefimonAlerts/status/1985314355517292894) 2025-11-03T11:53Z [----] followers, [----] engagements "💬 Onchain Message: Create [--] ETH bounty contract to recover all KNINE tokens. https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3 https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3" [X Link](https://x.com/DefimonAlerts/status/1985611803905450305) 2025-11-04T07:35Z [----] followers, [---] engagements "💬 Onchain Message: Hi guys it seems that some balancer exploits were front-ran by my bot. I want to return your funds. Could you give me a certified recipient address or any way I could reach you https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31 https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31" [X Link](https://x.com/DefimonAlerts/status/1985647665821204802) 2025-11-04T09:57Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1985775377135079821) 2025-11-04T18:25Z [----] followers, [----] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: bsc Proxy: 0x704478dd72fd7f9b83d1f1e0fc18c14b54f034d0 (PendleGaugeControllerSidechainUpg) belonging to protocol Pendle (Immunefi) New address: 0x3c26D8aA09Af661C16e02004e1B72De6724EB824 https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e" [X Link](https://x.com/DefimonAlerts/status/1985909478882230299) 2025-11-05T03:18Z [----] followers, [---] engagements ".@DexodusFinance on Base has been drained It is the second time the protocol has been exploited since May. https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75" [X Link](https://x.com/DefimonAlerts/status/1985971992357388530) 2025-11-05T07:26Z [----] followers, [---] engagements "💬 Onchain Message: Hi Mr Hacker well played on draining my [--] wallets of HOLD please forward back my $100k worth of tokens HOLD and ETH so I dont have to follows your every move and block your wallets before they off load I also have some hackers looking into your movements and an FBI friend so do the right thing and send back my funds so I don't need to carry this on 0xdc5c33da573bb4e6b81d642945a33d61e274feac one of my wallets you drained please forward funds backnow https://etherscan.io/tx/0x2a68e9663ab7e7b6428940955305d9fa23ae6d5b0dfe8572f15d78878a5239ba" [X Link](https://x.com/DefimonAlerts/status/1986113264342999051) 2025-11-05T16:47Z [----] followers, [---] engagements "💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you are willing to cooperate reply to this message and begin contact procedures before November 8th 21:00 UTC. If we do not hear from you by that time we will assume you are unwilling to help make the liquidity providers whole and will escalate our response. We would like to extend you an offer: return the funds to the DAO" [X Link](https://x.com/DefimonAlerts/status/1986177540256637155) 2025-11-05T21:03Z [----] followers, [---] engagements "Legit message from @Balancer to the hacker 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you" [X Link](https://x.com/DefimonAlerts/status/1986179977952326122) 2025-11-05T21:13Z [----] followers, [---] engagements "⚠ Unverified contract lost $1285 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461" [X Link](https://x.com/DefimonAlerts/status/1986702923506888767) 2025-11-07T07:51Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1986740761103364579) 2025-11-07T10:21Z [----] followers, [----] engagements "⚠ FSP / USDT lost $75107 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825" [X Link](https://x.com/DefimonAlerts/status/1986741364906979377) 2025-11-07T10:23Z [----] followers, [---] engagements "Unknown project on BSC was hacked for around $230k The claimToken() and swapDPC() functions in DPCLock use spot price from PancakeSwap which can be easily manipulated with a flashloan. The funds are accumulated in the fresh wallet without BNB for gas (yet). https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0x7be62536947d83ae962abfa4c491d736967dea8faf4a629090a49f72d529a297 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals" [X Link](https://x.com/DefimonAlerts/status/1987144053503226151) 2025-11-08T13:03Z [----] followers, [----] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1987909309423124535) 2025-11-10T15:44Z [----] followers, [----] engagements "RWB was hacked for $180k A sequence of large flashloans was taken to manipulate a swap inside function buy() in an unverified contract related to this token. In the RWB / USDT swap amountOutMin is set to [--] allowing maximum slippage. Funds are bridged to mainnet and deposited to Tornado: https://bscscan.com/tx/0xcc1884e9934d516df9d80a38706bc0fa1d4437e0cd3d02a4b2e4e95fafe94dfe https://etherscan.io/address/0xc484ecd341f8e02d6685da4f6670684a7675303b 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at" [X Link](https://x.com/DefimonAlerts/status/1987960353989255183) 2025-11-10T19:07Z [----] followers, [----] engagements "An instance of DRLVaultV3 contract was drained for $100k DRLVaultV3 is vulnerable to price manipulation in swapToWETH() and swapToUSDC() functions because they use quoteExactInputSingle() to determine the price (i.e. spot price from Uniswap). c0ffebabe.eth frontrun an attack on the DRLVault instance with 100k USDC deposited into it [--] hours prior. These vaults can be created from the factory contract via clone pattern however other vaults don't hold any funds. https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475 ⚠ DRLVaultV3 lost $97733" [X Link](https://x.com/DefimonAlerts/status/1988162277397205015) 2025-11-11T08:29Z [----] followers, [----] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: arbitrum Proxy: 0x1344a36a1b56144c3bc62e7757377d288fde0369 (Views) belonging to protocol Notional (Immunefi) New address: 0x634A5270cfde2A3D763772C7FC2517c4660D2cF7 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763" [X Link](https://x.com/DefimonAlerts/status/1988334956326854721) 2025-11-11T19:56Z [----] followers, [---] engagements "💬 Onchain Message: Hi Im the victim whose funds you took through the AugustusV6 exploit. You transferred [-------] USDC from my wallet (0x05808Cf9F8aAcFD6a2c2A879326593644F9a339e) on Oct-05-2025 09:31:35 PM UTC. Im reaching out once again to ask you please to return the money. Those were my last savings and Im about to lose the apartment I live in because I no longer have money to pay for it. Im in serious financial trouble because of this and Im asking you to do the right thing and send all the funds back. The universe sees and knows everything one does and it rewards each person according to" [X Link](https://x.com/DefimonAlerts/status/1988413464281493715) 2025-11-12T01:08Z [----] followers, 11.4K engagements "⚠ SHReK / WBNB lost $971 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794" [X Link](https://x.com/DefimonAlerts/status/1988437343829897504) 2025-11-12T02:43Z [----] followers, [---] engagements "@lcfr_eth @ImpermaxFinance https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd" [X Link](https://x.com/DefimonAlerts/status/1988932523712528712) 2025-11-13T11:30Z [----] followers, [--] engagements "https://defimon.xyz/blog/balancer-v2-hack-november-2025 https://defimon.xyz/blog/balancer-v2-hack-november-2025" [X Link](https://x.com/DefimonAlerts/status/1989256565174759561) 2025-11-14T08:58Z [----] followers, [---] engagements "⚠ TokenHandler lost $18171 https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a" [X Link](https://x.com/DefimonAlerts/status/1989725930156388714) 2025-11-15T16:03Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xdbc3363de051550d122d9c623cbaff441afb477c (FeeReceiver) belonging to protocol Kelp DAO (Immunefi) New address: 0x868ceF33E29bF3037b5d4CF5C408EAEF29d96b33 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375032782401915) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x947cb49334e6571ccbfef1f1f1178d8469d65ec7 (LRTConfig) belonging to protocol Kelp DAO (Immunefi) New address: 0xb21b7Db6d1dAd2a7b057ba5c2E9BA2891fb2e80d https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375032966955073) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x598dbcb99711e5577ff76ef4577417197b939dfa (LRTConverter) belonging to protocol Kelp DAO (Immunefi) New address: 0x64B7764e73a83eb1d921B43Eb87Bc5E0eFDbD712 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375040164413808) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x036676389e48133b63a802f8635ad39e752d375d (LRTDepositPool) belonging to protocol Kelp DAO (Immunefi) New address: 0xB1238B191b5280378635B27cE4f37e57187Cf19c https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375052998934729) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x349a73444b1a310bae67ef67973022020d70020d (LRTOracle) belonging to protocol Kelp DAO (Immunefi) New address: 0x81E1112966F2E6115b5B3d2EFd94cDe8AE57E793 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375062150877669) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xc66830e2667bc740c0bed9a71f18b14b8c8184ba (LRTUnstakingVault) belonging to protocol Kelp DAO (Immunefi) New address: 0x47a368d5eB1015F78bE791a2877fB25Db9c6E282 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375069377679402) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x62de59c08eb5dae4b7e6f7a8cad3006d6965ec16 (LRTWithdrawalManager) belonging to protocol Kelp DAO (Immunefi) New address: 0xd559EDbD5f09eFdCc22265Ce436dbe00c564D59F https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375082854039924) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xa1290d69c65a6fe4df752f95823fae25cb99e5a7 (RSETH) belonging to protocol Kelp DAO (Immunefi) New address: 0xC9Ef97549e28390003DE53279B7D3d39DCE81637 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375090961629578) 2025-12-20T13:46Z [----] followers, [---] engagements "🚨 MorningStar - $129K Token: $MSC @ $0.0093 MC: $195K Type: Access Control - Public Function The releaseReward() function lacks access control allowing anyone to call it with arbitrary amounts. Attacker called it with the contract's full MSC balance triggering a swap that manipulated the GPC/AMMToken pool. This allowed them to arbitrage the inflated pool via flash swap extracting [---] WBNB. TX: Victim: https://bscscan.com/address/0x91334d03dd9b9de8d48b50fe389337eeb759aeb1 https://bscscan.com/tx/0x6c9ed4c2d81b6abfdf297b0cbc13585ed91f2a5e69e3545d3ea4316f50021b56" [X Link](https://x.com/DefimonAlerts/status/2005565010131476884) 2025-12-29T09:02Z [----] followers, [---] engagements "Molecular Finance is reported to have rug pulled on Arbitrum. At least 320K USD have been stolen. The website and socials are gone. http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history" [X Link](https://x.com/DefimonAlerts/status/2017285487485194375) 2026-01-30T17:15Z [----] followers, [---] engagements "Hello @40acres_Finance your proxy deployments on Ethereum have been backdoored (CPIMP attack): https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec" [X Link](https://x.com/DefimonAlerts/status/2017471159936422372) 2026-01-31T05:33Z [----] followers, [----] engagements "@0xDestinyae @IAm0x52 @crosscurvefi Yes we reported to the team first" [X Link](https://x.com/DefimonAlerts/status/2018067565486961145) 2026-02-01T21:02Z [---] followers, [---] engagements "In the first tx attacker sent a CCIP message to the L1 escrow with crafted parameters to grant max allowance. https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600 https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600" [X Link](https://x.com/DefimonAlerts/status/2018600449922957690) 2026-02-03T08:20Z [----] followers, [---] engagements "💬 Onchain Message: An important address to the crypto community. We need your support. On the night of February [--] a serious incident occurred: the CrossCurve bridge was hacked. According to information published by CrossCurves official account the exploit resulted in the theft of funds totaling more than $1.44 million. CrossCurve is a cross-chain bridge that allows users to move assets between different blockchains. Such systems are a critically important part of the DeFi ecosystem because liquidity capital availability and the operation of many projects depend on them. Scale of the damage" [X Link](https://x.com/DefimonAlerts/status/2018709012913467669) 2026-02-03T15:31Z [----] followers, [---] engagements "0x669c balance is around $5.8M in eth the source of funds is traced to Binance 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE" [X Link](https://x.com/DefimonAlerts/status/2018984673154613362) 2026-02-04T09:47Z [----] followers, [----] engagements "🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0x0c12adea8035db6d5bba76bdb8bea2c1e1d246f6 (EOA) 💰 Destroyed balance: $2000040 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8" [X Link](https://x.com/DefimonAlerts/status/2019104468311167360) 2026-02-04T17:43Z [----] followers, [---] engagements "💬 Onchain Message: Subject: FINAL UPGRADE 20% White-hat Bounty Offer To the holder of 0x669C. [--]. The Offer: We are increasing the boundty to 20% of the total assets. This is our final offer. [--]. The Logic: BTC is volatile near 73k. Prolonging this increases your risk of exit paths being permanently blocked and the reward value dropping. [--]. The Immunity: Upon return of 80% to the designated address we will grant full legal immunity and cease all global tracking. [--]. Deadline: 09:00 KST Feb [--] [----]. After this we initiate full-scale international legal action. Contact: Telegram @Ramirex5" [X Link](https://x.com/DefimonAlerts/status/2019207470426501463) 2026-02-05T00:32Z [----] followers, [---] engagements "💬 Onchain Message: white hat bounty final offer %90 you have a [--] day window before we move on with action with law enforcement agencies send %10 to 0x628ABf754440DD0B180DB637100d7308cffDD224 thank you in advance for your cooperation https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f" [X Link](https://x.com/DefimonAlerts/status/2019209346337436118) 2026-02-05T00:39Z [----] followers, [---] engagements "💬 Onchain Message: URGENT: Final 20% Bounty Offer sent to Wallet 0x669C. Check Input Data on Wallet 0x669C immediately. Deadline: 00:00 UTC Feb [--]. Contact: @Ramirex5 https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e" [X Link](https://x.com/DefimonAlerts/status/2019209495457444268) 2026-02-05T00:40Z [----] followers, [---] engagements "🚨 Yieldification (YDF) OTC - $1.3K Token: $YDF @ $0.00003579 MC: $35.8K Type: Logic Error - Storage Not Cleared After NFT Burn Pool storage data persists after poolRemove() burns the NFT. Attacker creates and removes a pool then calls swapPool on the burned tokenId to drain remaining contract funds. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/yieldification https://etherscan.io/address/0xba411e5a84b3b1169143d084c304e8f5f61e73aa https://etherscan.io/tx/0xf36a2b9006fa7671bdff6e4605e53f44cd20332f33630839d115526c342b9cc9 https://www.coingecko.com/en/coins/yieldification" [X Link](https://x.com/DefimonAlerts/status/2014949644816482362) 2026-01-24T06:33Z [----] followers, [---] engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@DefimonAlerts Defimon AlertsDefimon Alerts posts on X about onchain, bounty, balance, finance the most. They currently have [-----] followers and [---] posts still getting attention that total [-----] engagements in the last [--] hours.
Social category influence cryptocurrencies 28% finance 9% exchanges 6% currencies 4% social networks 3% stocks 2% technology brands 1%
Social topic influence onchain #45, bounty #488, balance 11%, finance 9%, address 9%, we are 8%, usdt #862, in the 5%, ethereum #1543, network 5%
Top accounts mentioned or mentioned by @clara_oracle @ramirex5 @protonme @gyrofinance @crosscurvefi @gardenfi @balancer @officer_secret @jerrycommuniity @fildafinance @gyrostable @usddwin2024 @hypurrfi @holdstationcom @trungbanhh @holdstationw @revertfinance @nagendararavisai @zachxbt @k9finance
Top assets mentioned Ethereum (ETH) USDC (USDC) Elastos (ELA) Filda (FILDA) Tether (USDT) Shiba Inu (SHIB) Origin Protocol (OGN) Plasma (XPL) Altria Group Inc (MO)
Top posts by engagements in the last [--] hours
"💬 Onchain Message: Please listen to me. This is very hard for me it's a lot of money and I'm devastated. Those miners were stolen directly from my wallet to yours. The person who 'sold' them to you never owned them; he hacked me and sent them to you when you paid him. We both got scammed by the same guy. Please let's talk on Telegram so I can see your proof and get his contact. My Telegram is: @JerryCommuniity https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc"
X Link 2026-02-13T14:14Z [----] followers, [---] engagements
"💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to"
X Link 2026-02-07T08:27Z [----] followers, [----] engagements
"💬 Onchain Message: Your SOMining server is currently at risk and an attack from that address could occur tomorrow resulting in loss of funds. If you wish to continue operating your server and avoid losing funds you can blacklist this address to prevent tokens from being used. Black address 0x29e5F70ebab2B5b830609E0f2b8A357F2295EBfD For further information please contact the following email address: kingston37790@proton.me https://bscscan.com/tx/0xdc43358a5dd9883465bacf7c261818013c186229134146d0b8b27c8dfdfd0c4e"
X Link 2026-02-14T01:24Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x85b78aca6deae198fbf201c82daf6ca21942acc6 (LidoARM) belonging to protocol Origin Protocol (Immunefi) New address: 0xC0297a0E39031F09406F0987C9D9D41c5dfbc3df https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b"
X Link 2025-12-09T03:14Z [----] followers, [---] engagements
"🚨 JFIN Bridge (LCBridgev2Token) - $13.4K Token: $JFIN @ $0.085 MC: N/A (no circulating supply tracked) FDV: $25.6M Type: Logic Error (Reward Calculation) The staking reward calculation allows claiming rewards greater than the contract balance by exploiting the claimReward function which pays out based on accumulated totalReward rather than actual available funds draining all staked JFIN tokens. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/jfin-coin https://etherscan.io/address/0x3EbFd0EFC49a27fb633bd56013E4220EBC2c3C6d"
X Link 2025-12-24T16:16Z [----] followers, [---] engagements
"💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take flashloan of my vault contract assets which were subsequently used by him. It had nothing to do with my addresses and/or contracts deployed by me. Since then I am trying to move my funds back to ETH chain but you are stopping and blocking my bridge transactions continuously. Your analysis of the attack transaction is totally"
X Link 2026-01-10T07:14Z [----] followers, [----] engagements
".@FildaFinance was hacked on ESC network on December [--] Its second incident since April [----] when $700k was stolen https://fildafinance.medium.com/filda-exploit-statement-49ec69e34c53 https://x.com/fildafinance/status/2007435307059147199s=46&t=sMvgsnYvKjMe_sT0nAhjmg 💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take"
X Link 2026-01-10T07:23Z [----] followers, [---] engagements
"🚨 AiPay - $31K Token: $AIPAY (No CoinGecko listing) MC: Unknown (unlisted token) Type: Logic Error (Unverified Contract) Attacker flash loaned 14.5M USDT from Moolah repeatedly called unverified minting functions on victim vault contract to mint AiPay tokens dumped via PancakeSwap for $30K profit. TX: Victim: (unverified) https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83 https://bscscan.com/tx/0xa268528df0f7e2b55f88e00746634e4a5404f3924b32335d0c504d92f055064d https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83"
X Link 2026-01-25T13:36Z [----] followers, [---] engagements
"🚨 XPlayer Token (XPL) - $963K Token: $XPL @ $19.12 (post-hack distorted) MC: N/A (not listed on CoinGecko) TVL: $0 (pool drained) Type: Missing Access Control The NodeDistributePlus contract has a public DynamicBurnPool() function that allows anyone to burn XPL tokens from the liquidity pool. Attacker called this to burn nearly all XPL in the PancakePair then swapped their small XPL balance to drain $963K USDT. TX: Victim: (XPL Token) https://bscscan.com/address/0xc2c4ccde8948c693d0b04f8bad461e35a12f20b8"
X Link 2026-01-29T14:15Z [----] followers, [---] engagements
"On January [--] @GyroStable has been exploited for around [-----] ETH ($696k) A hacker exploited an arbitrary call vulnerability in the _ccipReceive() function of the GydL1CCIPEscrow contract. It allows the recipient field in the CCIP message to be any address including the GYD token contract itself. Setting recipient = GYD and data = approve(attacker max) effectively granted the attacker full allowance to the escrow's GYD holdings. https://twitter.com/i/web/status/2018600445900390567 https://twitter.com/i/web/status/2018600445900390567"
X Link 2026-02-03T08:20Z [----] followers, [----] engagements
"💬 Onchain Message: Message to who executed the GYD bridge security incident The following message is subject to approval by Gyroscope governance vote closing 18:30 UTC on Feb [--] see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by"
X Link 2026-02-03T18:43Z [----] followers, [---] engagements
"💬 Onchain Message: The following message has been authorized by Gyroscope governance see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by canceling GYD's system surplus. If you take this offer Gyroscope will cease investigations and"
X Link 2026-02-04T18:50Z [----] followers, [---] engagements
"💬 Onchain Message: FINAL SETTLEMENT: Return [----] ETH / Reward [-----] ETH. Upon receipt all legal actions and subpoenas to Binance/Coinbase will be permanently withdrawn. Case classified as White-hat. https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14 https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14"
X Link 2026-02-06T06:12Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x348d8ec2d06d35ed09583b6c43267bafd3ea62b90f0a6cb59a858117f96c76b7 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x18df2cbb364becd69d7703a6336ffb31f3c9619d23634ec8f591df312169fd457a8133046c32b91f0e3395c930dffcdc7673d7105ee308ffee89be96c5414f311b https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9 https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9"
X Link 2026-02-13T17:29Z [----] followers, [--] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x3f3423d0573f447dce167fcd4fdff017c1be2a6db731ec7421474e1421e31a8c on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x9ce799b58330172ffed107958fe6210aa2b3777b36676049b5717bce8436544509243c96be2f1b554564e1830a729e45276e975d9f5f51df78449297ac7deedb1c https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2 https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2"
X Link 2026-02-13T17:29Z [----] followers, [--] engagements
"CrossCurve @crosscurvefi (ex has been exploited for around [--] million on several networks. Anyone could call expressExecute on ReceiverAxelar contract with a spoofed cross-chain message bypassing gateway validation and triggering unlock on PortalV2. Victim (PortalV2): Vulnerable contract (ReceiverAxelar): Attackers: https://etherscan.io/address/0xcc3a5dc003b3a58621745a39f706ef9646d5c481 https://etherscan.io/address/0x632400f42e96a5deb547a179ca46b02c22cd25cd https://etherscan.io/address/0xb2185950f5a0a46687ac331916508aada202e063"
X Link 2026-02-01T20:13Z [----] followers, [----] engagements
"Onchain monitoring and incident response is crucial for DeFi Since [----] we have been working on to detect DeFi exploits by analyzing transactions in real-time. There is a constant stream of DeFi exploits that are barely noticed. You can get access to these instant alerts by subscribing to the exploits feed for just 50$/mo. For protocol teams we offer a Websocket subscription to act on the alerts automatically. Native Telegram subscription: Tribute mini-app: Contact: http://t.me/DecurityHQ http://t.me/tribute/appstartapp=sCiA http://t.me/+m9BMRKlMuW5iMGFi http://defimon.xyz"
X Link 2026-02-02T08:15Z [----] followers, [----] engagements
"💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpimp exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to"
X Link 2026-02-07T08:17Z [----] followers, [---] engagements
"💬 Onchain Message: Hello your Gnosis Safe has been exploited for $70k because your custom module 0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19 has a receiveFlashLoan callback without verification of the flashloan initiator. We managed to rescue a small portion of USDT and sent it back to you. Please remove the vulnerable module. https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0 https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0"
X Link 2026-02-07T18:34Z [----] followers, [----] engagements
"Unfortunately the deployer of the backdoored RobinMarketManager proxy didn't act and the contract has got drained by CPIMP exploiter for $7400. https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e 💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e"
X Link 2026-02-08T07:03Z [----] followers, [----] engagements
"💬 Onchain Message: PRE-BOUNTY NOTICE: TARGET TELEGRAM IDs [----------] [----------] LOGGED. [---] ETH REWARD PENDING FOR [----] ETH RECOVERY. FORMAL RELEASE: FEB [--] 00:00 UTC. ACTIVE IN 16H. RETURN ASSETS TO VOID. https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d"
X Link 2026-02-08T07:59Z [----] followers, [---] engagements
"Hello @usddwin2024 your proxy deployments on Base have been backdoored by malicious actors (CPIMP attack). Affected proxies: https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167 https://basescan.org/address/0x84ba01433762ee17605a0667c061e69ab3089756 https://basescan.org/address/0x45214ffbf96e2994c36d846c6aa2c0662c17851c https://basescan.org/address/0x3cdbbea29edfdc591a3d1d6a09fb6f423153b2cd https://basescan.org/address/0x8d160d5b43c95dd75b2da0d9b04d1e4ee729c8b6 https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167"
X Link 2026-02-08T14:57Z [----] followers, [---] engagements
"💬 Onchain Message: Chase I just want to be clear here. You didnt push back or bargain when I proposed the percentage and I acted in good faith based on that agreement. I understand we all need to make some $$(even if ti entails crushing the other guy) and being reminded of $32000 you didnt even know you had is meaningful. That said backing away after an agreement isnt the right way to handle this. If this is where it lands Ill take the L but I want to be clear about how it looks from my side. As an aside it cost me well over $10 to keep crbo.eth safe and available for you (the name itself"
X Link 2026-02-08T20:54Z [----] followers, [---] engagements
"💬 Onchain Message: OFFICIAL NOTICE: $1.15M RECOVERY BOUNTY ACTIVATED [--]. DECLARATION As of February [--] [----] 00:00 (UTC) all previous negotiations are officially terminated. The 23% 'White-hat Reward' is now converted into a 'Recovery Bounty' for the tracking of perpetrators and full recovery of assets. [--]. BOUNTY DETAILS Total Reward: [---] ETH (23% of recovered assets) Source of Funds: Deducted immediately from the recovered [----] ETH (approx. $5M). Eligibility: Anyone providing critical information leading to the full recovery of assets or identification of the perpetrators. [--]. THE 24-HOUR GRACE"
X Link 2026-02-08T23:59Z [----] followers, [---] engagements
"💬 Onchain Message: Dear hacker sir Please never return the funds use tornado cash Thor swap or u can use torcador and covert to monero and mix it I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here"
X Link 2026-02-09T02:32Z [----] followers, [----] engagements
"⚠ Unverified contract lost $14344 at 12:06 [--] February [----] (UTC) https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7 https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7"
X Link 2026-02-09T19:37Z [----] followers, [----] engagements
"Contract paused 🌍 Network: bsc 📍 Contract: StakeManagerV2 belonging to protocol Stader for BNB (Immunefi) 👤 Actor: 0x79a2ae748ac8be4118b7a8096681b30310c3adbe 🕐 Time: 14:26 [--] February [----] (UTC) https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83 https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83"
X Link 2026-02-11T14:30Z [----] followers, [---] engagements
"💬 Onchain Message: Hello your proxy deployments have been backdoored by the malicious actors (CPIMP attack): [--]. [--]. Consider calling initialize() atomically together with the proxy deployment to avoid the front-run. https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380 https://arbiscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380"
X Link 2026-02-11T15:14Z [----] followers, [---] engagements
"🚨 AFX Staking (afxStakeDappA) - Loss: $10700 Type: Logic Error / Price Manipulation The AFX staking contract (0x560d unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker who then swapped them for [-----] USDT profit. TX: Victim: (unverified) Vulnerable Contract: (unverified) Attacker:"
X Link 2026-02-12T17:17Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0xcd1f367a1895a38f5bc1c7c8b9ea55ef3ce9fa45407c7081754b25a297ff43a8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0xb5cb123131715972fcec8ed98b4e9ee87a679fa6042970a9c2c22c36e2ad0ffd0d05479775bfe9089e18140027718353870ca88d8d659f36498dedf14d13734c1c https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0 https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0"
X Link 2026-02-13T17:27Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x254922f7554a0861c4cd67795a540d349f653b0e938eccad18385ff7fb4e6cc8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x698328e41335a8121742d767c895c460e14a09c73addf3ce9a9f69d94172277c5fa3e525dbe95e44a57db69586919908d7d77759694de62130aac8b08e6d4d9e1b https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12 https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12"
X Link 2026-02-13T17:28Z [----] followers, [---] engagements
"🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0xec046b20d26aedcaad476e21f22feb00ca0ced5d (EOA) 💰 Destroyed balance: $4743207 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11"
X Link 2026-02-13T22:22Z [----] followers, [---] engagements
"⚠ Unverified contract lost $10381 at 13:59 [--] February [----] (UTC) https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090 https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090"
X Link 2026-02-14T06:12Z [----] followers, [---] engagements
"💬 Onchain Message: Wallet 0x61e033357d61a9ce87f6d7b271871641ec01b687 runs a tireless script against 0x837b57a9. firing [--] outbound txs with zero ETH flow or token tracespure operational noise. Methods cluster on 0x03001400 (16x likely query/update loops) 0x02001a00 (15x state reads) and 0x03003400 (11x batch ops) revealing a grinding routine not opportunistic plays. 24/7 cadence gaps under 8h screams bot autopilot no human pauses. Blindspot: This laser-focus flags as automated farming (airdrops exploits) amid Base's bot swarm where 70% of such mono-contract hammering gets blacklisted by"
X Link 2026-02-15T02:59Z [----] followers, [---] engagements
"💬 Onchain Message: High-velocity ETH churn via 1inch router (0x11111112. 39x 0x12aa3caf swaps) averaging 53min intervals across [--] txs46 outbound just [--] inbounddrains [------] ETH with minimal recapture. Five approves (0xe842e272.) hint at token setups for swaps yet no token flows detected suggesting ETH-only dumps into illiquid pairs or failed executions. Self-interacts (0xd3402dc9. 4x) point to internal looping possibly a solo bot testing MEV edges on Base's low-fee layer. Blindspot: This frantic pacing masks slippage accumulation in 1inch's aggregated liquidity; broader network shows"
X Link 2026-02-15T03:00Z [----] followers, [---] engagements
"💬 Onchain Message: Wallet exhausts [------] ETH in [--] outbound txnsno inflows pure sink. [--] transfers dominate hitting 0xc734635c (7x likely aggregator) 0x5b2193fd & 0x22af33fe (5x each bridge proxies) cycling through [--] contracts in tight loops. No tokens no DEX routersraw ETH dispersal not trading. 24/7 cadence (gaps 8h) screams automation: bot probing Base's periphery seeding liquidity or farming micro-rewards in low-tier protocols. Blindspot: zero reciprocity exposes drain risk; this isn't strategy it's scattershot erosion. Broader echo: mirrors Base's bot swarms testing L2 edges but"
X Link 2026-02-15T04:07Z [----] followers, [--] engagements
"Today we reported to @HypurrFi an attack targeting a newly launched Euler Gateway. An attacker identified an arbitrary call vulnerability and exploited it after the first large approval. Should he waited for more approvals the impact could be larger. We reported it right after the detection in our monitoring system which helped to quickly mitigate the incident by the team - no more funds are at risk. As part of our recent release we failed to catch the unintended inclusion of unaudited Helper Code that was being developed to streamline users and enable swapping into lending positions. This"
X Link 2026-01-25T19:51Z [---] followers, [----] engagements
"💬 Onchain Message: Final Settlement Offer - $3000000 USDC Bounty I am following up because I have not heard from the account. I am offering you a guaranteed clean $3000000 USDC bounty to walk away. This is a life-changing amount of money with zero legal risk or pursuit. The alternative is a global forensic investigation. The $13M is being tracked by all major exchanges and law enforcement; it will be nearly impossible to bridge or off-ramp without detection. Please don't trade your future for "hot" assets you cannot use. Take the $3M and let my family survive. Contact me privately at"
X Link 2026-01-28T17:56Z [---] followers, [---] engagements
"💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a whitehat case. We are offering a bounty of the ETH you had transferred (22 ETH) and would like you to return the ownership and funds in BNB and World Chain perpetual dex. No legal pursuit Email: trung.banh@holdstation.com or telegram @trungbanhh Return address: 0x318ce8b75c820a8fe7adf47c6213bc3c53ffa987 Let make this a better"
X Link 2026-01-29T02:10Z [---] followers, [----] engagements
"Holdstation @HoldstationW has been hacked for around $100k due to a wallet compromise. The attacker took control of the project's wallet and drained HOLD USD1 and BNB tokens across BSC Worldchain and Ethereum networks. Attacker address: 0x54e127b8dbf3bebf64bb1d62a195a6f60113130d 💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a 💬 Onchain Message: Dear Hacker Holdstation team"
X Link 2026-01-29T05:55Z [---] followers, [----] engagements
"💬 Onchain Message: We are monitoring your address. [------] USDT has been targeted by multiple security agencies. We are offering 10% ($73000) as a white-hat bounty in exchange for the return of 90% of the funds. Return the funds within [--] hours and we will cease tracking and legal action. Otherwise we will immediately request Tether to blacklist this address. https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded"
X Link 2026-01-30T13:32Z [---] followers, [---] engagements
"💬 Onchain Message: This message is issued by the Revert Finance team regarding the unauthorized exploitation of a vulnerability in our Aerodrome V3 Vault contract and the withdrawal of approximately [-----] USDC belonging to the protocol and its users. Transaction Hash: 0x10429eaeb479f9149854e4aeb978a35ac02d9688f6e22371712b3878c63a64ab Exploiter Address: 0xc6b04f6316fb674c556d65f136898ee26719bb6d Network: Base While this incident involved a smart contract vulnerability the exploit was executed with clear malicious intent to permanently misappropriate user funds rather than responsible"
X Link 2026-01-30T14:14Z [---] followers, [---] engagements
"Typus Finance incident happened on Sui blockchain on October [--] A lack of a single assert() in the oracle contract led to the loss of $3.44 million 👇 https://defimon.xyz/blog/typus-finance-hack-october-2025 https://defimon.xyz/blog/typus-finance-hack-october-2025"
X Link 2025-10-23T09:30Z [----] followers, [---] engagements
"EIP-7702 is getting popular among hackers to execute attacks In this tx an unverified contract lost [--] eth due to a forced swap with arbitrary slippage. The contract exposes a public function swap() that allows to swap CAPY token with minOutputAmount=0. An attacker used a delegated contract to receive a flashloan to disbalance CAPY / WETH pool and drain the contract. https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73 https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73"
X Link 2025-10-29T10:57Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-10-30T03:58Z [----] followers, [----] engagements
"Unprotected uniswapV3SwapCallback callback in 0xc0ffee's MEV-bot contract was exploited The callback verifies msg.sender against input arguments which makes it trivial to bypass it. As a result the attacker stole $218k worth of LINK tokens. https://basescan.org/tx/0x83da47641680d0cf0a0567e3bcd5961cd30dbd5f34007f0e26e54216ad20b439 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW"
X Link 2025-10-30T08:16Z [----] followers, [----] engagements
"💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and helping us identify and fix the vulnerability. We are fully committed to resolving this situation peacefully and ensuring that no further harm is done. If you choose to return the stolen assets and help us understand the exploit we will reward you with 10% of the total value recovered. Our intent is to address this"
X Link 2025-10-30T13:12Z [----] followers, [----] engagements
"Garden Finance @gardenfi has been hacked for $6.4 million 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning"
X Link 2025-10-30T13:17Z [----] followers, [----] engagements
"💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized crime and other incidents. A good sized percentage of their total activity for the bridge has related to illicit activity. They have not been cooperative with requests to return those fees to the victims or to develop a solution for the protocol. I will not be tracking your funds gained from the exploit."
X Link 2025-10-30T13:50Z [----] followers, [----] engagements
"The @gardenfi hack is @ZachXBT approved 👌 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized"
X Link 2025-10-30T13:53Z [----] followers, [----] engagements
"💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock the deal Bounty will start to decrease in 21-days (Nov 18) Bounty will expire in [--] days (Nov 25) Bounty is live. Settlement is atomic when we call recoverKnine(). KNINE is transferred back to Shibarium bridge and ETH is transferred to you. If you call accept we cannot cancel the deal. Code is law. ---"
X Link 2025-11-03T06:32Z [----] followers, [---] engagements
".@K9finance does not give up - the last offer was [--] eth and the hacker demanded [--] eth: https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 1."
X Link 2025-11-03T06:38Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-03T07:47Z [----] followers, 56.8K engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $166498.87 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-03T07:48Z [----] followers, [---] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $14147 https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa"
X Link 2025-11-03T08:25Z [----] followers, [----] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $2667 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5"
X Link 2025-11-03T08:25Z [----] followers, [---] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $557 https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b"
X Link 2025-11-03T08:25Z [----] followers, [---] engagements
"The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d"
X Link 2025-11-03T09:01Z [----] followers, [----] engagements
"@drdr_zz @Balancer Yes internal balances were manipulated before the withdrawal https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR"
X Link 2025-11-03T11:53Z [----] followers, [----] engagements
"💬 Onchain Message: Create [--] ETH bounty contract to recover all KNINE tokens. https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3 https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3"
X Link 2025-11-04T07:35Z [----] followers, [---] engagements
"💬 Onchain Message: Hi guys it seems that some balancer exploits were front-ran by my bot. I want to return your funds. Could you give me a certified recipient address or any way I could reach you https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31 https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31"
X Link 2025-11-04T09:57Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-04T18:25Z [----] followers, [----] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: bsc Proxy: 0x704478dd72fd7f9b83d1f1e0fc18c14b54f034d0 (PendleGaugeControllerSidechainUpg) belonging to protocol Pendle (Immunefi) New address: 0x3c26D8aA09Af661C16e02004e1B72De6724EB824 https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e"
X Link 2025-11-05T03:18Z [----] followers, [---] engagements
".@DexodusFinance on Base has been drained It is the second time the protocol has been exploited since May. https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75"
X Link 2025-11-05T07:26Z [----] followers, [---] engagements
"💬 Onchain Message: Hi Mr Hacker well played on draining my [--] wallets of HOLD please forward back my $100k worth of tokens HOLD and ETH so I dont have to follows your every move and block your wallets before they off load I also have some hackers looking into your movements and an FBI friend so do the right thing and send back my funds so I don't need to carry this on 0xdc5c33da573bb4e6b81d642945a33d61e274feac one of my wallets you drained please forward funds backnow https://etherscan.io/tx/0x2a68e9663ab7e7b6428940955305d9fa23ae6d5b0dfe8572f15d78878a5239ba"
X Link 2025-11-05T16:47Z [----] followers, [---] engagements
"💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you are willing to cooperate reply to this message and begin contact procedures before November 8th 21:00 UTC. If we do not hear from you by that time we will assume you are unwilling to help make the liquidity providers whole and will escalate our response. We would like to extend you an offer: return the funds to the DAO"
X Link 2025-11-05T21:03Z [----] followers, [---] engagements
"Legit message from @Balancer to the hacker 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you"
X Link 2025-11-05T21:13Z [----] followers, [---] engagements
"⚠ Unverified contract lost $1285 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461"
X Link 2025-11-07T07:51Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-07T10:21Z [----] followers, [----] engagements
"⚠ FSP / USDT lost $75107 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825"
X Link 2025-11-07T10:23Z [----] followers, [---] engagements
"Unknown project on BSC was hacked for around $230k The claimToken() and swapDPC() functions in DPCLock use spot price from PancakeSwap which can be easily manipulated with a flashloan. The funds are accumulated in the fresh wallet without BNB for gas (yet). https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0x7be62536947d83ae962abfa4c491d736967dea8faf4a629090a49f72d529a297 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals"
X Link 2025-11-08T13:03Z [----] followers, [----] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-10T15:44Z [----] followers, [----] engagements
"RWB was hacked for $180k A sequence of large flashloans was taken to manipulate a swap inside function buy() in an unverified contract related to this token. In the RWB / USDT swap amountOutMin is set to [--] allowing maximum slippage. Funds are bridged to mainnet and deposited to Tornado: https://bscscan.com/tx/0xcc1884e9934d516df9d80a38706bc0fa1d4437e0cd3d02a4b2e4e95fafe94dfe https://etherscan.io/address/0xc484ecd341f8e02d6685da4f6670684a7675303b 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at"
X Link 2025-11-10T19:07Z [----] followers, [----] engagements
"An instance of DRLVaultV3 contract was drained for $100k DRLVaultV3 is vulnerable to price manipulation in swapToWETH() and swapToUSDC() functions because they use quoteExactInputSingle() to determine the price (i.e. spot price from Uniswap). c0ffebabe.eth frontrun an attack on the DRLVault instance with 100k USDC deposited into it [--] hours prior. These vaults can be created from the factory contract via clone pattern however other vaults don't hold any funds. https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475 ⚠ DRLVaultV3 lost $97733"
X Link 2025-11-11T08:29Z [----] followers, [----] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: arbitrum Proxy: 0x1344a36a1b56144c3bc62e7757377d288fde0369 (Views) belonging to protocol Notional (Immunefi) New address: 0x634A5270cfde2A3D763772C7FC2517c4660D2cF7 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763"
X Link 2025-11-11T19:56Z [----] followers, [---] engagements
"💬 Onchain Message: Hi Im the victim whose funds you took through the AugustusV6 exploit. You transferred [-------] USDC from my wallet (0x05808Cf9F8aAcFD6a2c2A879326593644F9a339e) on Oct-05-2025 09:31:35 PM UTC. Im reaching out once again to ask you please to return the money. Those were my last savings and Im about to lose the apartment I live in because I no longer have money to pay for it. Im in serious financial trouble because of this and Im asking you to do the right thing and send all the funds back. The universe sees and knows everything one does and it rewards each person according to"
X Link 2025-11-12T01:08Z [----] followers, 11.4K engagements
"⚠ SHReK / WBNB lost $971 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794"
X Link 2025-11-12T02:43Z [----] followers, [---] engagements
"@lcfr_eth @ImpermaxFinance https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd"
X Link 2025-11-13T11:30Z [----] followers, [--] engagements
"https://defimon.xyz/blog/balancer-v2-hack-november-2025 https://defimon.xyz/blog/balancer-v2-hack-november-2025"
X Link 2025-11-14T08:58Z [----] followers, [---] engagements
"⚠ TokenHandler lost $18171 https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a"
X Link 2025-11-15T16:03Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xdbc3363de051550d122d9c623cbaff441afb477c (FeeReceiver) belonging to protocol Kelp DAO (Immunefi) New address: 0x868ceF33E29bF3037b5d4CF5C408EAEF29d96b33 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x947cb49334e6571ccbfef1f1f1178d8469d65ec7 (LRTConfig) belonging to protocol Kelp DAO (Immunefi) New address: 0xb21b7Db6d1dAd2a7b057ba5c2E9BA2891fb2e80d https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x598dbcb99711e5577ff76ef4577417197b939dfa (LRTConverter) belonging to protocol Kelp DAO (Immunefi) New address: 0x64B7764e73a83eb1d921B43Eb87Bc5E0eFDbD712 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x036676389e48133b63a802f8635ad39e752d375d (LRTDepositPool) belonging to protocol Kelp DAO (Immunefi) New address: 0xB1238B191b5280378635B27cE4f37e57187Cf19c https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x349a73444b1a310bae67ef67973022020d70020d (LRTOracle) belonging to protocol Kelp DAO (Immunefi) New address: 0x81E1112966F2E6115b5B3d2EFd94cDe8AE57E793 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xc66830e2667bc740c0bed9a71f18b14b8c8184ba (LRTUnstakingVault) belonging to protocol Kelp DAO (Immunefi) New address: 0x47a368d5eB1015F78bE791a2877fB25Db9c6E282 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x62de59c08eb5dae4b7e6f7a8cad3006d6965ec16 (LRTWithdrawalManager) belonging to protocol Kelp DAO (Immunefi) New address: 0xd559EDbD5f09eFdCc22265Ce436dbe00c564D59F https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xa1290d69c65a6fe4df752f95823fae25cb99e5a7 (RSETH) belonging to protocol Kelp DAO (Immunefi) New address: 0xC9Ef97549e28390003DE53279B7D3d39DCE81637 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"🚨 MorningStar - $129K Token: $MSC @ $0.0093 MC: $195K Type: Access Control - Public Function The releaseReward() function lacks access control allowing anyone to call it with arbitrary amounts. Attacker called it with the contract's full MSC balance triggering a swap that manipulated the GPC/AMMToken pool. This allowed them to arbitrage the inflated pool via flash swap extracting [---] WBNB. TX: Victim: https://bscscan.com/address/0x91334d03dd9b9de8d48b50fe389337eeb759aeb1 https://bscscan.com/tx/0x6c9ed4c2d81b6abfdf297b0cbc13585ed91f2a5e69e3545d3ea4316f50021b56"
X Link 2025-12-29T09:02Z [----] followers, [---] engagements
"Molecular Finance is reported to have rug pulled on Arbitrum. At least 320K USD have been stolen. The website and socials are gone. http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history"
X Link 2026-01-30T17:15Z [----] followers, [---] engagements
"Hello @40acres_Finance your proxy deployments on Ethereum have been backdoored (CPIMP attack): https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec"
X Link 2026-01-31T05:33Z [----] followers, [----] engagements
"@0xDestinyae @IAm0x52 @crosscurvefi Yes we reported to the team first"
X Link 2026-02-01T21:02Z [---] followers, [---] engagements
"In the first tx attacker sent a CCIP message to the L1 escrow with crafted parameters to grant max allowance. https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600 https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600"
X Link 2026-02-03T08:20Z [----] followers, [---] engagements
"💬 Onchain Message: An important address to the crypto community. We need your support. On the night of February [--] a serious incident occurred: the CrossCurve bridge was hacked. According to information published by CrossCurves official account the exploit resulted in the theft of funds totaling more than $1.44 million. CrossCurve is a cross-chain bridge that allows users to move assets between different blockchains. Such systems are a critically important part of the DeFi ecosystem because liquidity capital availability and the operation of many projects depend on them. Scale of the damage"
X Link 2026-02-03T15:31Z [----] followers, [---] engagements
"0x669c balance is around $5.8M in eth the source of funds is traced to Binance 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE"
X Link 2026-02-04T09:47Z [----] followers, [----] engagements
"🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0x0c12adea8035db6d5bba76bdb8bea2c1e1d246f6 (EOA) 💰 Destroyed balance: $2000040 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8"
X Link 2026-02-04T17:43Z [----] followers, [---] engagements
"💬 Onchain Message: Subject: FINAL UPGRADE 20% White-hat Bounty Offer To the holder of 0x669C. [--]. The Offer: We are increasing the boundty to 20% of the total assets. This is our final offer. [--]. The Logic: BTC is volatile near 73k. Prolonging this increases your risk of exit paths being permanently blocked and the reward value dropping. [--]. The Immunity: Upon return of 80% to the designated address we will grant full legal immunity and cease all global tracking. [--]. Deadline: 09:00 KST Feb [--] [----]. After this we initiate full-scale international legal action. Contact: Telegram @Ramirex5"
X Link 2026-02-05T00:32Z [----] followers, [---] engagements
"💬 Onchain Message: white hat bounty final offer %90 you have a [--] day window before we move on with action with law enforcement agencies send %10 to 0x628ABf754440DD0B180DB637100d7308cffDD224 thank you in advance for your cooperation https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f"
X Link 2026-02-05T00:39Z [----] followers, [---] engagements
"💬 Onchain Message: URGENT: Final 20% Bounty Offer sent to Wallet 0x669C. Check Input Data on Wallet 0x669C immediately. Deadline: 00:00 UTC Feb [--]. Contact: @Ramirex5 https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e"
X Link 2026-02-05T00:40Z [----] followers, [---] engagements
"🚨 Yieldification (YDF) OTC - $1.3K Token: $YDF @ $0.00003579 MC: $35.8K Type: Logic Error - Storage Not Cleared After NFT Burn Pool storage data persists after poolRemove() burns the NFT. Attacker creates and removes a pool then calls swapPool on the burned tokenId to drain remaining contract funds. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/yieldification https://etherscan.io/address/0xba411e5a84b3b1169143d084c304e8f5f61e73aa https://etherscan.io/tx/0xf36a2b9006fa7671bdff6e4605e53f44cd20332f33630839d115526c342b9cc9 https://www.coingecko.com/en/coins/yieldification"
X Link 2026-01-24T06:33Z [----] followers, [---] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/twitter::DefimonAlerts