[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.] [@BeosinAlert](/creator/twitter/BeosinAlert) "The rest of the stolen funds (about $10M) are held by 0xdf3340a436c27655ba62f8281565c9925c3a5221 on the #Arbitrum network"  [@BeosinAlert](/creator/x/BeosinAlert) on [X](/post/tweet/1943247653086916856) 2025-07-10 09:55:18 UTC 12.6K followers, 1164 engagements "The following X ethereum addresses are holding $ETH worth of $XX million from the stolen funds. - 0xe9ad5a0f2697a3cf75ffa7328bda93dbaef7f7e7 - 0x69c965e164fa60e37a851aa5cd82b13ae39c1d95 - 0xa33fcbe3b84fb8393690d1e994b6a6adc256d8a3 - 0x639cd2fc24ec06be64aaf94eb89392bea98a6605"  [@BeosinAlert](/creator/x/BeosinAlert) on [X](/post/tweet/1943247248684650684) 2025-07-10 09:53:42 UTC 12.6K followers, 3654 engagements "More than $13M of the stolen funds are being transfered to 0x99cdeb84064c2bc63de0cea7c6978e272d0f2dae. The hacker has used multiple cross-chain bridges to move $USDC to an Ethereum address (0xDF3340A436c27655bA62F8281565C9925C3a5221) and $9M funds were swapped into $DAI"  [@BeosinAlert](/creator/x/BeosinAlert) on [X](/post/tweet/1942975636467060792) 2025-07-09 15:54:25 UTC 12.6K followers, 8330 engagements "The stolen funds flow are as follows and stored in multiple addresses: Bitcoin: bc1qwxm53zya6cuflxhcxy84t4c4wrmgrwqzd07jxm Tron: TCAfB8jHbJ56xwmfwKwWEs8HLRjbC2GfHG Ethereum: 0x0a360bd648eb86613961a2aa41dc1610c5305f4f Beosin Trace are monitoring the funds flow. #BigOne #KYT"  [@BeosinAlert](/creator/x/BeosinAlert) on [X](/post/tweet/1945377648081035567) 2025-07-16 06:59:09 UTC 12.6K followers, 3291 engagements
[GUEST ACCESS MODE: Data is scrambled or limited to provide examples. Make requests using your API key to unlock full data. Check https://lunarcrush.ai/auth for authentication information.]
@BeosinAlert
"The rest of the stolen funds (about $10M) are held by 0xdf3340a436c27655ba62f8281565c9925c3a5221 on the #Arbitrum network" @BeosinAlert on X 2025-07-10 09:55:18 UTC 12.6K followers, 1164 engagements
"The following X ethereum addresses are holding $ETH worth of $XX million from the stolen funds. - 0xe9ad5a0f2697a3cf75ffa7328bda93dbaef7f7e7 - 0x69c965e164fa60e37a851aa5cd82b13ae39c1d95 - 0xa33fcbe3b84fb8393690d1e994b6a6adc256d8a3 - 0x639cd2fc24ec06be64aaf94eb89392bea98a6605" @BeosinAlert on X 2025-07-10 09:53:42 UTC 12.6K followers, 3654 engagements
"More than $13M of the stolen funds are being transfered to 0x99cdeb84064c2bc63de0cea7c6978e272d0f2dae. The hacker has used multiple cross-chain bridges to move $USDC to an Ethereum address (0xDF3340A436c27655bA62F8281565C9925C3a5221) and $9M funds were swapped into $DAI" @BeosinAlert on X 2025-07-09 15:54:25 UTC 12.6K followers, 8330 engagements
"The stolen funds flow are as follows and stored in multiple addresses: Bitcoin: bc1qwxm53zya6cuflxhcxy84t4c4wrmgrwqzd07jxm Tron: TCAfB8jHbJ56xwmfwKwWEs8HLRjbC2GfHG Ethereum: 0x0a360bd648eb86613961a2aa41dc1610c5305f4f Beosin Trace are monitoring the funds flow. #BigOne #KYT" @BeosinAlert on X 2025-07-16 06:59:09 UTC 12.6K followers, 3291 engagements
/creator/twitter::1497042007432515585/posts