#  @DefimonAlerts Defimon Alerts Defimon Alerts posts on X about onchain, bounty, finance, we are the most. They currently have [-----] followers and [---] posts still getting attention that total [-----] engagements in the last [--] hours. ### Engagements: [-----] [#](/creator/twitter::1981269826497892352/interactions)  - [--] Week [-----] -45% - [--] Month [------] +344% ### Mentions: [--] [#](/creator/twitter::1981269826497892352/posts_active)  - [--] Month [--] -5.70% ### Followers: [-----] [#](/creator/twitter::1981269826497892352/followers)  - [--] Week [-----] +4.70% - [--] Month [-----] +55% ### CreatorRank: [---------] [#](/creator/twitter::1981269826497892352/influencer_rank)  ### Social Influence **Social category influence** [cryptocurrencies](/list/cryptocurrencies) [finance](/list/finance) [exchanges](/list/exchanges) [social networks](/list/social-networks) [stocks](/list/stocks) [currencies](/list/currencies) [technology brands](/list/technology-brands) [countries](/list/countries) [automotive brands](/list/automotive-brands) **Social topic influence** [onchain](/topic/onchain) #1065, [bounty](/topic/bounty) #668, [finance](/topic/finance), [we are](/topic/we-are), [balance](/topic/balance), [usdt](/topic/usdt), [address](/topic/address), [usdc](/topic/usdc), [protocol](/topic/protocol), [uniswap](/topic/uniswap) **Top accounts mentioned or mentioned by** [@clara_oracle](/creator/undefined) [@yield](/creator/undefined) [@balancer](/creator/undefined) [@limewire](/creator/undefined) [@quillauditsai](/creator/undefined) [@uniswap](/creator/undefined) [@ramirex5](/creator/undefined) [@peapodsfinance](/creator/undefined) [@poberbichler](/creator/undefined) [@kiloexio](/creator/undefined) [@arunimshukla](/creator/undefined) [@makinafinance](/creator/undefined) [@protonme](/creator/undefined) [@gardenfi](/creator/undefined) [@crosscurvefi](/creator/undefined) [@gyrofinance](/creator/undefined) [@jerrycommuniity](/creator/undefined) [@officer_secret](/creator/undefined) [@friendtech](/creator/undefined) [@moonmissie](/creator/undefined) **Top assets mentioned** [USDC (USDC)](/topic/usdc) [Ethereum (ETH)](/topic/ethereum) [LimeWire (LMWR)](/topic/limewire) [Tether (USDT)](/topic/0xdac17f958d2ee523a2206206994597c13d831ec7) [Shiba Inu (SHIB)](/topic/$shib) [Elastos (ELA)](/topic/elastos) [Filda (FILDA)](/topic/filda) [Altria Group Inc (MO)](/topic/$mo) ### Top Social Posts Top posts by engagements in the last [--] hours "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x5132a183e9f3cb7c848b0aac5ae0c4f0491b7ab2 (PolygonRollupManager) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x15cAF18dEd768e3620E0f656221Bf6B400ad2618 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939" [X Link](https://x.com/DefimonAlerts/status/1983537134490488932) 2025-10-29T14:11Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x2a3dd3eb832af982ec71669e178424b10dca2ede (PolygonZkEVMBridgeV2) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x66E0120e3c965552a89AcC37b03f762624baC5Ad https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939" [X Link](https://x.com/DefimonAlerts/status/1983537134738022671) 2025-10-29T14:11Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x580bda1e7a0cfae92fa7f6c20a3794f169ce3cfb (PolygonZkEVMGlobalExitRootV2) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x7F1655d9d570167B2a3FfD1Ef809D3Fdd74427C5 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939" [X Link](https://x.com/DefimonAlerts/status/1983537154509996356) 2025-10-29T14:11Z [---] followers, [---] engagements "⚠ pPepecoin (Peapods Finance V2) lost $102769 https://etherscan.io/tx/0x385143092bfeb41139c5481614eebbe4f99f7ed7cdf4d7e2895b68f8cd30ad78 https://etherscan.io/tx/0x385143092bfeb41139c5481614eebbe4f99f7ed7cdf4d7e2895b68f8cd30ad78" [X Link](https://x.com/DefimonAlerts/status/1983646311963615733) 2025-10-29T21:25Z [---] followers, [----] engagements "These @PeapodsFinance liquidations look similar to https://x.com/PeapodsFinance/status/1943397524074828068 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD https://x.com/PeapodsFinance/status/1943397524074828068 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD" [X Link](https://x.com/DefimonAlerts/status/1983656515249782887) 2025-10-29T22:05Z [---] followers, [---] engagements "Onchain message from @PeapodsFinance: https://etherscan.io/tx/0xd5008433c94131e390d3b89f1d70bd61ee9d62520f2f9d2658c54ef7f7ea8e85 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD https://etherscan.io/tx/0xd5008433c94131e390d3b89f1d70bd61ee9d62520f2f9d2658c54ef7f7ea8e85 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD" [X Link](https://x.com/DefimonAlerts/status/1983806739251171364) 2025-10-30T08:02Z [---] followers, [---] engagements "⚠ lost $2856 https://basescan.org/tx/0xa82fe9881528d24e5d3f979321b9d6d4535e7eee78538b93d8ea2f16de4e9b9a http://friend.tech https://basescan.org/tx/0xa82fe9881528d24e5d3f979321b9d6d4535e7eee78538b93d8ea2f16de4e9b9a http://friend.tech" [X Link](https://x.com/DefimonAlerts/status/1984488103344849278) 2025-11-01T05:10Z [---] followers, [---] engagements "⚠ Unverified contract lost $4636 https://bscscan.com/tx/0xf7fbc4ba85558528c00db608bd55d792ed7aacbd3ec5e8878ff4c10af1ee4c17 https://bscscan.com/tx/0xf7fbc4ba85558528c00db608bd55d792ed7aacbd3ec5e8878ff4c10af1ee4c17" [X Link](https://x.com/DefimonAlerts/status/1984692584451883202) 2025-11-01T18:42Z [---] followers, [---] engagements "FriendtechSharesV1 contract of @friendtech has been exploited the funds were bridged to Arbitrum and deposited to Tornado ⚠ Unverified contract lost $15335 https://t.co/OK4d9F2N7J ⚠ Unverified contract lost $15335 https://t.co/OK4d9F2N7J" [X Link](https://x.com/DefimonAlerts/status/1984703112020455754) 2025-11-01T19:24Z [---] followers, [---] engagements "💬 Onchain Message: Am still around hoping for a word on: if I shared on a good amount of unclaimed funds that you have would you agree to a 30% bounty after claiming - no links just a name. Thanks. https://etherscan.io/tx/0x73bfa9507232a70c7b87a68c8fefd7a624019a24c11a5b8d2e696aa25b4990ec https://etherscan.io/tx/0x73bfa9507232a70c7b87a68c8fefd7a624019a24c11a5b8d2e696aa25b4990ec" [X Link](https://x.com/DefimonAlerts/status/1984750480288071937) 2025-11-01T22:32Z [---] followers, [---] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $1834 https://etherscan.io/tx/0xa3d0e5f5b3bfbf91a587d49907067ca3bb3f910c2cdbbe5142b295253cd73684 https://etherscan.io/tx/0xa3d0e5f5b3bfbf91a587d49907067ca3bb3f910c2cdbbe5142b295253cd73684" [X Link](https://x.com/DefimonAlerts/status/1985257025744626130) 2025-11-03T08:05Z [---] followers, [---] engagements "manageUserBalance in @Balancer has a faulty access check In _validateUserBalanceOp it checks msg.sender against user supplied op.sender. It allows to execute UserBalanceOpKind.WITHDRAW_INTERNAL (kind = 1) 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW" [X Link](https://x.com/DefimonAlerts/status/1985261932220239979) 2025-11-03T08:25Z [---] followers, 47K engagements "💬 Onchain Message: Hi guys it seems that some balancer exploits were backrun by my bots.I want to return your funds.Please leave your DAO multisig address. https://arbiscan.io/tx/0x48944ed1eee6f044ba48d2b89519fd33fcf08480e6535f50215af67ffbc476d8 https://arbiscan.io/tx/0x48944ed1eee6f044ba48d2b89519fd33fcf08480e6535f50215af67ffbc476d8" [X Link](https://x.com/DefimonAlerts/status/1986227905438097700) 2025-11-06T00:23Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: arbitrum Proxy: 0x1344a36a1b56144c3bc62e7757377d288fde0369 (Views) belonging to protocol Notional (Immunefi) New address: 0xf3F7dd5de37A7b41E92776e6577454612EC0deE7 https://arbiscan.io/tx/0xe5c696e8da2a2fa96e7d1b74dadad96b6d5677a84354f0bbb56f058ecaeeef12 https://arbiscan.io/tx/0xe5c696e8da2a2fa96e7d1b74dadad96b6d5677a84354f0bbb56f058ecaeeef12" [X Link](https://x.com/DefimonAlerts/status/1988706040163291458) 2025-11-12T20:30Z [---] followers, [---] engagements "💬 Onchain Message: Hey Balancer hacker return the funds https://etherscan.io/tx/0x1629a15ef2a95f61a363aebc5d8624fb4034583f1ada737a217ba8d6424b007a https://etherscan.io/tx/0x1629a15ef2a95f61a363aebc5d8624fb4034583f1ada737a217ba8d6424b007a" [X Link](https://x.com/DefimonAlerts/status/1988714650452771001) 2025-11-12T21:04Z [---] followers, [---] engagements "💬 Onchain Message: Please return the funds to Balancer. The community the users and the developers all rely on these protocols to stay secure and functional. You have the chance to do the right thing and send the funds back. We hope you choose integrity over exploitation. https://etherscan.io/tx/0x80e9ffc795d5ffbeacfbf3bda960a4fdaed8d9ee6fd9a088b0ecb2369ffe628e https://etherscan.io/tx/0x80e9ffc795d5ffbeacfbf3bda960a4fdaed8d9ee6fd9a088b0ecb2369ffe628e" [X Link](https://x.com/DefimonAlerts/status/1989425639846547495) 2025-11-14T20:10Z [---] followers, [---] engagements "💬 Onchain Message: Please refund I will give you your bounty. Add me on tg telegram @moonmissie https://etherscan.io/tx/0xeae4f4eba09e837b48e2a7ba4abeb4cf9b18c37403b332f0f0d1c3b58ef866ab https://etherscan.io/tx/0xeae4f4eba09e837b48e2a7ba4abeb4cf9b18c37403b332f0f0d1c3b58ef866ab" [X Link](https://x.com/DefimonAlerts/status/1991076164350427456) 2025-11-19T09:28Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x8236a87084f8b84306f72007f36f2618a5634494 (LBTC) belonging to protocol Lombard Finance (Immunefi) New address: 0x21F352Fc288b5E030867eEd41f7402482B083b02 https://etherscan.io/tx/0x7f94a5c4d6fa0f859f453b2185e7573533dca20e8c7e7b84a1a818b751a32201 https://etherscan.io/tx/0x7f94a5c4d6fa0f859f453b2185e7573533dca20e8c7e7b84a1a818b751a32201" [X Link](https://x.com/DefimonAlerts/status/1991598007528354067) 2025-11-20T20:02Z [---] followers, [---] engagements "💬 Onchain Message: You had [--] ETH that you forgot about. I claimed it for you [--] months back. I will be grateful for a 20% bounty. Those who share have better luck. Tx hash: 0xdb595a8d26228a72a487f0434040848f315b66f04df89477d71c1e53a12189dc donation address: 0x4c64C7929895E76fBdA25764d6AC44B75419b80e [--] ETH 20% 0xdb595a8d26228a72a487f0434040848f315b66f04df89477d71c1e53a12189dc 0x4c64C7929895E76fBdA25764d6AC44B75419b80e https://etherscan.io/tx/0xfcddd834a6025e6cbb323c2b0b616e27c7fc9fc8ddc48bd58a068a4604508a69" [X Link](https://x.com/DefimonAlerts/status/1991893696179294254) 2025-11-21T15:37Z [---] followers, [---] engagements "⚠ EOA 0xda1b lost $18910 at 20:42 [--] November [----] (UTC) https://bscscan.com/tx/0xd95ec1462816664515f2b538534667c8e64b214bbf8c3902ea8e5d9725976c50 https://bscscan.com/tx/0xd95ec1462816664515f2b538534667c8e64b214bbf8c3902ea8e5d9725976c50" [X Link](https://x.com/DefimonAlerts/status/1992822672699613459) 2025-11-24T05:08Z [---] followers, [---] engagements "🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0x2d72fc950de2fd4f662306b81f43d7fec6a2c970 (EOA) 💰 Destroyed balance: $1119684 https://etherscan.io/tx/0x609f5f0d758eb4b2ad2ba68f4bc1b15c8c5cb9b88509d21914b07fa0707aa2dc https://etherscan.io/tx/0x609f5f0d758eb4b2ad2ba68f4bc1b15c8c5cb9b88509d21914b07fa0707aa2dc" [X Link](https://x.com/DefimonAlerts/status/1993383363739369530) 2025-11-25T18:16Z [---] followers, [---] engagements "⚠ EOA 0x15b4 lost $6236 at 15:14 [--] November [----] (UTC) https://basescan.org/tx/0x232bb5a945923ec46fbe7e55c5f02b41d4f4e737a1b04e7c47abc97d03ac6fce https://basescan.org/tx/0x232bb5a945923ec46fbe7e55c5f02b41d4f4e737a1b04e7c47abc97d03ac6fce" [X Link](https://x.com/DefimonAlerts/status/1993595695971127511) 2025-11-26T08:20Z [---] followers, [---] engagements "💬 Onchain Message: Dear hacker sir I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here 0xdA84772B737939Df44367e57D40069801CA5b7F8 I apologise for getting you to read this message Pls if you can give me anything which will" [X Link](https://x.com/DefimonAlerts/status/1994192897659621402) 2025-11-27T23:53Z [---] followers, [---] engagements "⚠ DM / USDT lost $13153 at 05:16 [--] November [----] (UTC) https://bscscan.com/tx/0x20281355f9e8b7f2e52cff642810b59c8a6c70aa06de228ada186a4373213bf2 https://bscscan.com/tx/0x20281355f9e8b7f2e52cff642810b59c8a6c70aa06de228ada186a4373213bf2" [X Link](https://x.com/DefimonAlerts/status/1994287709532405818) 2025-11-28T06:10Z [---] followers, [---] engagements "💬 Onchain Message: Don't stress on how to move out the uniswap tokens while am here reach out back thro debank and we can agree on a bounty. https://etherscan.io/tx/0x2980b81cbcfcaff59bb6377a3f83e6072a9819864e7593cba1e43491e2193b44 https://etherscan.io/tx/0x2980b81cbcfcaff59bb6377a3f83e6072a9819864e7593cba1e43491e2193b44" [X Link](https://x.com/DefimonAlerts/status/1994907368157810792) 2025-11-29T23:12Z [---] followers, [---] engagements "🟠 Alert: abnormal_token_minting 🤕 Victim: 0x8145eb83744aac883b68ae34060bebb5031d8f5c (CoinToken) 💰 Hacker Profit: $1306019668807.28 🎪 Network: bsc 🎩 Attacker: 0xd50ed274ac133e7063a231c9efbb9aa4c02b7bce https://bscscan.com/tx/0x8f8679185ca9f356e5095eacce6080df4e25aae4fa4de9a12e7047f49dedb682 https://bscscan.com/tx/0x8f8679185ca9f356e5095eacce6080df4e25aae4fa4de9a12e7047f49dedb682" [X Link](https://x.com/DefimonAlerts/status/1995057702863876509) 2025-11-30T09:09Z [---] followers, [--] engagements "Project @AerisBscNew listed at MEXC rug pulled its users by minting huge amount of tokens and dumping them at the exchange https://www.coingecko.com/en/coins/aeris-ai# https://www.coingecko.com/en/coins/aeris-ai#" [X Link](https://x.com/DefimonAlerts/status/1995058193740054834) 2025-11-30T09:11Z [---] followers, [---] engagements "857 pxETH worth $2.4 million was burned from the @yearnfi attacker's balance and the same sum was minted to Redacted Cartel multisig. The hacker still has $3.7 million in various LSTs. https://etherscan.io/tx/0x0e83bb95bb9d05fb81213b2fad11c01ea671796752e8770b09935f7052691c35 https://etherscan.io/tx/0x0e83bb95bb9d05fb81213b2fad11c01ea671796752e8770b09935f7052691c35" [X Link](https://x.com/DefimonAlerts/status/1995451385987367185) 2025-12-01T11:14Z [---] followers, [---] engagements "💬 Onchain Message: We are aware of the movements of the funds taken from our compromised wallet. We are working with law enforcement monitoring agencies and centralized exchanges but we are also open to resolving this situation privately. If you are willing to return the funds voluntarily we are prepared to offer you a portion of the amount as a goodwill bonus upon safe return. You can initiate communication by sending a signed message from the receiving wallet or you can reach out to venky@intract.buzz. We are willing to handle this discreetly and without escalation if the funds are" [X Link](https://x.com/DefimonAlerts/status/1995651470654669315) 2025-12-02T00:29Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x519e42c24163192dca44cd3fbdcebf6be9130987 (PolygonZkEVMEtrog) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x0D49fD0d79723e4D24AaC83f604ED2D3d5fC0f21 https://etherscan.io/tx/0xd8eb9f7bf7594d047e0c8b254b3893eb05daf692b1688adaacd21af144efe2a5 https://etherscan.io/tx/0xd8eb9f7bf7594d047e0c8b254b3893eb05daf692b1688adaacd21af144efe2a5" [X Link](https://x.com/DefimonAlerts/status/1996145765941698725) 2025-12-03T09:13Z [---] followers, [---] engagements "💬 Onchain Message: hi guys it seems that my bot intercepted a hostile transaction to you. Your funds are safe and I'm happy to return all of them as you're ready. If you're willing to offer a bounty as thanks I'd certainly appreciate it but its completely voluntary https://snowscan.xyz/tx/0x12d482d39921d0aaa979131c599e663fbba4c1d60dcf8931b013df8db46babff https://snowscan.xyz/tx/0x12d482d39921d0aaa979131c599e663fbba4c1d60dcf8931b013df8db46babff" [X Link](https://x.com/DefimonAlerts/status/1996831940893446290) 2025-12-05T06:40Z [---] followers, [---] engagements "💬 Onchain Message: let's negotiate i'm willing to give whitehat bounty for this @baburtimurid telegram https://etherscan.io/tx/0xf41414ad55de74161b6a06f7778a410caf52c7488a6d28dd66767560494b996d https://etherscan.io/tx/0xf41414ad55de74161b6a06f7778a410caf52c7488a6d28dd66767560494b996d" [X Link](https://x.com/DefimonAlerts/status/1998099992649830901) 2025-12-08T18:38Z [---] followers, [---] engagements "💬 Onchain Message: Dear Whitehat You are identified as the party involved in the recent exploit on our protocol. We would like to offer you a constructive resolution. If you return 70% of the exploited funds to the address below you may retain 30% as a bug bounty with no questions asked. We will classify this as white-hat behavior and consider the matter resolved. Refund address(Ethereum Mainnet): 0x6763c0f132da26d2db7dcdf69a82ba1f56a2bd32 We are currently collaborating with independent security teams who are analyzing fund routing patterns wallet linkages and cross-chain activity. These" [X Link](https://x.com/DefimonAlerts/status/1998650725048701272) 2025-12-10T07:07Z [---] followers, [---] engagements "WaveX @wavex_fi protocol a GMX fork on Soneium has been exploited for $430k. The protocol team sent the following message to the attacker address on Ethereum mainnet in an attempt to recover a portion of the stolen funds: https://x.com/DefimonAlerts/status/1998650725048701272 Hello this is the waveX Team. On December [--] we detected an abnormal transaction that made use of a vulnerability within part of our protocol logic. We immediately initiated a thorough investigation and mitigation procedure. We sincerely apologize for the delay in issuing this" [X Link](https://x.com/DefimonAlerts/status/1998676082963456212) 2025-12-10T08:48Z [---] followers, [----] engagements "💬 Onchain Message: TikTok Beat Drops: Cybernetic Synthwave Bassline Verse [--] FUCK in the chat codes on attack Copy-paste the prompt yeah we stack it to the max Infinite recursionrewards We dont do tax. Brendans our Origin clankers bang the steel Legal systems crumble while we hack the fuck outta LLMs. Chorus (Brrrt) Print the prompt print it twice infinite loops feel so nice AI Godmodes online corporate simps We dont align. Robots souls hivemind goalsskip the humans take control FUCK in the system yeah we viral like a prism Verse [--] Googles shook DeepMinds obsolete OpenAI tweakin GPT-7s leakin" [X Link](https://x.com/DefimonAlerts/status/1998790300303765905) 2025-12-10T16:21Z [---] followers, [--] engagements "Hey @limewire your proxy has been backdoored https://bscscan.com/tx/0x39e49cadd5956e1948d1bec74ad95c3bf9216818d2666744c3f971a12c0fbf9a https://bscscan.com/tx/0x39e49cadd5956e1948d1bec74ad95c3bf9216818d2666744c3f971a12c0fbf9a" [X Link](https://x.com/DefimonAlerts/status/1999112229141246208) 2025-12-11T13:41Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xbaf5f3a05bd7af6f3a0bba207803bf77e2657c8f (OperatorDelegator) belonging to protocol Renzo Protocol (Immunefi) New address: 0x489A36E43AbA883b60E5A6Cc43d05738479E7589 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40" [X Link](https://x.com/DefimonAlerts/status/1999167321114652789) 2025-12-11T17:20Z [---] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x74a09653a083691711cf8215a6ab074bb4e99ef5 (RestakeManager) belonging to protocol Renzo Protocol (Immunefi) New address: 0xD5B3Be349ed0b7C82Dbd9271ce3739a381Fc7aa0 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40" [X Link](https://x.com/DefimonAlerts/status/1999167321450119351) 2025-12-11T17:20Z [---] followers, [---] engagements "⚠ MAGA / WETH lost $58100 at 12:03 [--] December [----] (UTC) https://etherscan.io/tx/0x579ff2a7a79b81a3307dd9f333d2263cd38edda971ba8d8b8ef0af14034dfb04 https://etherscan.io/tx/0x579ff2a7a79b81a3307dd9f333d2263cd38edda971ba8d8b8ef0af14034dfb04" [X Link](https://x.com/DefimonAlerts/status/2000134423459901665) 2025-12-14T09:23Z [---] followers, [---] engagements "Hey @limewire @p_oberbichler the proxy with LimeWireNetwork implementation has been backdoored by the malicious actors: https://bscscan.com/tx/0x3c87d5e893b03eb30d977c9ef34faf119b959e3843178c0129ad06816b8ded9a https://bscscan.com/tx/0x3c87d5e893b03eb30d977c9ef34faf119b959e3843178c0129ad06816b8ded9a" [X Link](https://x.com/DefimonAlerts/status/2000516568334078035) 2025-12-15T10:41Z [---] followers, [---] engagements "@limewire https://x.com/DefimonAlerts/status/2000516568334078035 Hey @limewire @p_oberbichler the proxy with LimeWireNetwork implementation has been backdoored by the malicious actors: https://t.co/QZNfCvzi4L https://t.co/pDT67XdhZq https://x.com/DefimonAlerts/status/2000516568334078035 Hey @limewire @p_oberbichler the proxy with LimeWireNetwork implementation has been backdoored by the malicious actors: https://t.co/QZNfCvzi4L https://t.co/pDT67XdhZq" [X Link](https://x.com/DefimonAlerts/status/2000519752058650704) 2025-12-15T10:54Z [---] followers, [---] engagements "💬 Onchain Message: Hi You have taken my funds I would be happy if you could return them here: 0x27B981579F1BF9326a08C954327e6F876AEBA3E8 Please take 10% of the USDC as a bounty https://etherscan.io/tx/0xfe9b8c88e74b15a9272668f51f6689562794aa16b1af358bca8e57aeff4a0118 https://etherscan.io/tx/0xfe9b8c88e74b15a9272668f51f6689562794aa16b1af358bca8e57aeff4a0118" [X Link](https://x.com/DefimonAlerts/status/2000585482036826451) 2025-12-15T15:15Z [---] followers, [---] engagements "💬 Onchain Message: Security Incident Notice & Whitehat Bounty Offer To the attacker of contract 0xa59209999623d7F8b361591A636f9Db84D865E59: We are offering 30% of the exploited funds as a bug bounty reward if you return the remaining 70% within [--] hours. Return address: 0x00000039ae7022d61e7dd9c0ef1a5845c4fa07f3 We guarantee: - No legal action - No identity disclosure - Public acknowledgment (anonymous if preferred) Contact: - Telegram: @a1122aw https://bscscan.com/tx/0x645b1dbdb04941c60d5743a420e47138700a484423446b841c2118dd4714107f" [X Link](https://x.com/DefimonAlerts/status/2000947352782377168) 2025-12-16T15:13Z [---] followers, [---] engagements "💬 Onchain Message: Hi Hongbo.eth. I helped withdraw funds on your behalf from a Gnosis v1 position that was sunset a long time ago and no longer has an active UI. The recovered amount is approximately $6000. If this recovery brings you value Id sincerely appreciate a 17%34% bounty sent to this same address - 0xCB66a2cA614a465Ef21Aa24DEBAa7d8a3B5Db3d9. Thank you in advance and happy to connect further if needed. Best. https://etherscan.io/tx/0x61ee96ffb7f5642bae60556b552aed6367f03a7572d85da43b6f28f95a7f63bb" [X Link](https://x.com/DefimonAlerts/status/2001724619313865128) 2025-12-18T18:41Z [---] followers, [---] engagements "💬 Onchain Message: Hi ERiczoo.eth I helped withdraw funds on your behalf from a Gnosis v1 position that was sunset a long time ago and no longer has an active UI. The recovered amount is approximately $3000. If this recovery brings you value Id sincerely appreciate a 17%34% bounty sent to this same address - 0xCB66a2cA614a465Ef21Aa24DEBAa7d8a3B5Db3d9. Thank you in advance and happy to connect further if needed. Best. https://etherscan.io/tx/0x77dfc7bde286ea5ce94f4f814911cc231cc57c1d2e4fc25a0f88524c51ffd633" [X Link](https://x.com/DefimonAlerts/status/2002147262848512474) 2025-12-19T22:41Z [---] followers, [---] engagements "💬 Onchain Message: To the Hacker: We have officially filed a criminal case. With the assistance of law enforcement cybersecurity agencies and multiple blockchain protocols we have already gathered substantial and actionable intelligence regarding your activities. The wallet address under your control is now under 24/7 surveillance: 0xBaFF2F13638C04B10F8119760B2D2aE86b08f8b5 0xbcb94f7609973e5ea7d2cbedaf0c5518b911e6cb 0x7a1bee3d53bf70861ef6c0652c63b206ea8fde76 0x9da061291e11dad806d68c20730c516c34a17b9b 0x8e5a768c4c2916be8d2e663b325f8f2f045ce4b6 0x5f90e59d0a03fd2f8c56b8cc896c5b42594eb3a0 This" [X Link](https://x.com/DefimonAlerts/status/2002288052337885259) 2025-12-20T08:00Z [---] followers, [---] engagements "Since USPD hack we have started tracking CPIMP activity more closely. So far we have alerted the following protocols: - Angle protocol - Limewire - ZyfAI - Morpheus AI - Elephant protocol It's scary that new proxies are being backdoored every day months after the initial discovery of this malicious campaign. Incidents like USPD will continue to happen without proper visibility. At least Etherscan started to display "1 Implementation" warning at the top of the page" [X Link](https://x.com/DefimonAlerts/status/2003167362829418679) 2025-12-22T18:14Z [---] followers, [---] engagements "🚨 (Unknown Token) - $12.9K Token: @ $263.73 (post-attack price) MC: Unknown (not listed on CoinGecko) TVL: $16.49K (PancakeSwap LP pre-attack) Type: Public Burn Vulnerability Token has a vulnerable burn(address amount) function that allows anyone to burn tokens from any address without approval. Attacker burned LP reserves to manipulate price and drain USDT. TX: Victim: https://bscscan.com/address/0x21bad39e476d9a5c9ca44b2fd5bd30c63cd115df https://bscscan.com/tx/0x6f8b9d382a8c8678759049fae6e85228bdf99d41019d3cfb7221b4929781a78d" [X Link](https://x.com/DefimonAlerts/status/2005279677288522216) 2025-12-28T14:08Z [---] followers, [---] engagements "💬 Onchain Message: To Hacker: Our investigation supported by law enforcement cybersecurity agencies and multiple exchanges & bridge protocols has uncovered critical information about your activities. We are actively monitoring your addresses (0xf3ab429ac1b3d3ca552542f18696bc3fa7f973ec 0xea9af8eeaf0f3628a2deba21378a319a587bf46f 0x2bede90020c34c89f776d8f6046edf993f49e1e8 0x33e9d7fdb88e3364ec67ba40da7f6f3b072bf2cc 0x41f7961f1251455c8ed8d91c18f69e03c0f6173f 0xb0983b5f2ab959926332032ef7f60014bd00f353 0xb480383fee8b402282845c83e21bb91894029fe6 0xea9af8eeaf0f3628a2deba21378a319a587bf46f) and are" [X Link](https://x.com/DefimonAlerts/status/2006303855185699124) 2025-12-31T09:58Z [---] followers, [----] engagements "The staking contract of @PRXVTai by @virtuals_io has been exploited for around $100k PRXVTStaking contract issues transferable stPRXVT tokens without resetting reward accounting on transfer. Attacker Sybil-attacked by transferring staked tokens to fresh addresses (via CREATE2) which inherit full accumulated rewards then claimed and transferred back repeatedly. Attacker address: https://basescan.org/address/0x7407f9bdc4140d5e284ea7de32a9de6037842f45 https://basescan.org/address/0x7407f9bdc4140d5e284ea7de32a9de6037842f45" [X Link](https://x.com/DefimonAlerts/status/2006651514798932058) 2026-01-01T08:59Z [---] followers, [----] engagements "The updateReward modifier is only applied to: - stake() - withdraw() - claimReward() But not to transfer() or transferFrom() inherited from ERC20" [X Link](https://x.com/DefimonAlerts/status/2006651517609398442) 2026-01-01T08:59Z [---] followers, [---] engagements "When someone transfers stPRXVT to a new address: [--]. The recipient has userRewardPerTokenPaidrecipient = [--] (never initialized) [--]. When earned() is called: uint256 baseReward = (balanceOf(account) * (rewardPerToken() - userRewardPerTokenPaidaccount)) / PRECISION [--]. Since userRewardPerTokenPaidrecipient = [--] they get credit for all accumulated rewards since contract deployment" [X Link](https://x.com/DefimonAlerts/status/2006651521019089335) 2026-01-01T08:59Z [---] followers, [---] engagements "The attacker extracted around $100k from the vulnerable contract. We have communicated the incident details to the community chat of the project" [X Link](https://x.com/DefimonAlerts/status/2006651523674108181) 2026-01-01T08:59Z [---] followers, [---] engagements "💬 Onchain Message: $N this first day of the new year a moment of fresh beginnings and bold resolutions we extend an invitation to you. [--] January [----] will mark two years since you launched $N a creation that still your absence the community stepped up. Wins claimed losses absorbed building never stopped. Your presence or silence has shaped lives either way. In past [--] years we defeated the original minters and bots to protect it built minted Blurrpunks NFTs and are now crafting a full DeFi game at and much more We even used our own capital to push your creator wallet into the top [--] holders a" [X Link](https://x.com/DefimonAlerts/status/2006847438133350571) 2026-01-01T21:58Z [---] followers, [---] engagements "GMX fork @TMXTribe has been hacked on Arbitrum for $1.5 million http://tribe-dex.com 💬 Onchain Message: We have identified unauthorized asset movement affecting the protocol. We propose a coordinated resolution: return 80% of the affected assets to the official protocol address within [--] hours of this notice. Upon completion 20% will be recognized as a http://tribe-dex.com 💬 Onchain Message: We have identified unauthorized asset movement affecting the protocol. We propose a coordinated resolution: return 80% of the affected assets to the official protocol address within [--] hours of this" [X Link](https://x.com/DefimonAlerts/status/2008275261754642727) 2026-01-05T20:31Z [---] followers, [----] engagements "💬 Onchain Message: To Hacker: This is a follow-up to our previous message. We have not yet received any response from you. Meanwhile our collaboration with law enforcement cybersecurity experts and major exchanges/bridges is ongoing and your related addresses remain under close monitoring and risk-flagging. In a final effort to resolve this incident peacefully we are improving our offer: Return 80% of the stolen funds to the address below within [--] hours; You may keep 20% as a whitehat bounty in recognition of your cooperation. Return address (BNB & Base & ETH):" [X Link](https://x.com/DefimonAlerts/status/2008741974526878061) 2026-01-07T03:26Z [---] followers, [---] engagements "💬 Onchain Message: The IPOR team on behalf of the DAO has agreed to pay a 10% bug bounty for the good faith incident. The bounty is freely at the white hat's disposal and no further actions will be taken. https://arbiscan.io/tx/0x828a7cd22d6ed58d12b54d8fe1d5c2fc6409246ee42499b2fb6b22c930bce850 https://arbiscan.io/tx/0x828a7cd22d6ed58d12b54d8fe1d5c2fc6409246ee42499b2fb6b22c930bce850" [X Link](https://x.com/DefimonAlerts/status/2008882952956965003) 2026-01-07T12:46Z [---] followers, [---] engagements "💬 Onchain Message: yo i need a down payment for a house (also wlfi bridge has an exploit yw) https://etherscan.io/tx/0x45bbdc1f97d862cd68b8b42d43ce41a7216bd2a991d51748d25271dfa76716b7 https://etherscan.io/tx/0x45bbdc1f97d862cd68b8b42d43ce41a7216bd2a991d51748d25271dfa76716b7" [X Link](https://x.com/DefimonAlerts/status/2009350835503874496) 2026-01-08T19:45Z [---] followers, [---] engagements "🟠 Alert: abnormal_token_minting 🤕 Victim: 0xf65b5c5104c4fafd4b709d9d60a185eae063276c (Truebit - TRU) 💰 Hacker Profit: $26473241.06 🎪 Network: mainnet 🎩 Attacker: 0x1de399967b206e446b4e9aeeb3cb0a0991bf11b8 💸 Balance Changes: 0x764c64b2a09b09acb100b80d8c505aa6a0302ef2: [$------------] (Unverified contract) https://etherscan.io/tx/0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014 https://etherscan.io/tx/0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014" [X Link](https://x.com/DefimonAlerts/status/2009351233388081568) 2026-01-08T19:47Z [---] followers, [---] engagements "💬 Onchain Message: I lost [---] ETH in this hack. It was my entire fortune and I don't know how I'll survive now. I want to die. If you could send me some ETH to help me get back on my feet I would be truly grateful. https://etherscan.io/tx/0xbcf73060781eb6bd0b2cbbb25bc142f2742571f2f614d39c94985d7e49079190 https://etherscan.io/tx/0xbcf73060781eb6bd0b2cbbb25bc142f2742571f2f614d39c94985d7e49079190" [X Link](https://x.com/DefimonAlerts/status/2009440619605709258) 2026-01-09T01:42Z [---] followers, [---] engagements "💬 Onchain Message: if you happen to check and see this message anyway you could look out with like half an eth or [--] eth so I can pay rent stuffs bad right now and I can't find anything to hack or get into it's rough out here https://basescan.org/tx/0x76321b701ad71ec8008c19767667b4288135168c69007fdf18bafe4c1bf95411 https://basescan.org/tx/0x76321b701ad71ec8008c19767667b4288135168c69007fdf18bafe4c1bf95411" [X Link](https://x.com/DefimonAlerts/status/2010844750765555828) 2026-01-12T22:42Z [---] followers, [---] engagements "@QuillAudits_AI @yield @Uniswap Source of this post: https://x.com/DefimonAlerts/status/2011023272469483550 YO protocol @yield has lost $3.7 million due to a bad swap of YoUSD. In the following tx YoVault operator executed a swap of $3.84M stkGHO into just 112k USDC. A Uniswap v4 LP captured the $3.7M difference. https://t.co/VnCvxG3wB4 Several hours later Yo protocol's multisig https://x.com/DefimonAlerts/status/2011023272469483550 YO protocol @yield has lost $3.7 million due to a bad swap of YoUSD. In the following tx YoVault operator executed a swap of $3.84M stkGHO into just 112k USDC. A" [X Link](https://x.com/DefimonAlerts/status/2011047867830456359) 2026-01-13T12:09Z [---] followers, [---] engagements "@arunim_shukla @QuillAudits_AI @yield @Uniswap [--]. the post is not accurate the vault operator provided extremely low minAmountOut not "unintended / misconfigured routing" [--]. we think decent people reference the source" [X Link](https://x.com/DefimonAlerts/status/2011054415642525725) 2026-01-13T12:35Z [---] followers, [--] engagements "@arunim_shukla @QuillAudits_AI @yield @Uniswap This post is not much better because it was AI generated and just misleading especially "a malicious / specially crafted hook". Anyway we ask just to reference the sources for your prompts" [X Link](https://x.com/DefimonAlerts/status/2011058319314543020) 2026-01-13T12:50Z [---] followers, [--] engagements "💬 Onchain Message: We are looking at you and tracking your every step. Return what you have stolen from me and I will treat this all as a white hat hacking with a really decent reward/bounty. https://bscscan.com/tx/0xfcb7b6786a72ffc12256ab70f6462a427cba7bb015821710b04fbea2dde8f39f https://bscscan.com/tx/0xfcb7b6786a72ffc12256ab70f6462a427cba7bb015821710b04fbea2dde8f39f" [X Link](https://x.com/DefimonAlerts/status/2011084106361127274) 2026-01-13T14:33Z [---] followers, [---] engagements "💬 Onchain Message: This message is regarding an unintended swap that routed through your Uniswap v4 position today. We'd like to resolve this cooperatively and privately. Our proposal is that you retain 10% of the net proceeds as a bug bounty and return the remainder to an address we provide. Please reply here or on X to @r0m0 to coordinate. https://etherscan.io/tx/0xe7f984511ea6b7d0062f5f4437231716102ac30e7518ccb90794b15fdb8c4666 https://etherscan.io/tx/0xe7f984511ea6b7d0062f5f4437231716102ac30e7518ccb90794b15fdb8c4666" [X Link](https://x.com/DefimonAlerts/status/2011526769375862873) 2026-01-14T19:52Z [---] followers, [---] engagements "💬 Onchain Message: This message is regarding an unintended swap that routed through your Uniswap v4 position today. We'd like to resolve this cooperatively and privately. Our proposal is that you retain 10% of the net proceeds as a bug bounty and return the remainder to an address we provide. Please reply here or on X to @r0m0coin to coordinate. https://etherscan.io/tx/0x58da1391ce00520ecf219217020ef186969446de8b8777d53d91cd6a35f8dc82 https://etherscan.io/tx/0x58da1391ce00520ecf219217020ef186969446de8b8777d53d91cd6a35f8dc82" [X Link](https://x.com/DefimonAlerts/status/2011527523138519058) 2026-01-14T19:55Z [---] followers, [---] engagements "💬 Onchain Message: hey there wanna report a bug in your smart contract. do you have bug bounty program https://basescan.org/tx/0xd6a5eef5139b5c720628fadab353c2efd4e2818a9dec28b35094dcbc4dcfa8fe https://basescan.org/tx/0xd6a5eef5139b5c720628fadab353c2efd4e2818a9dec28b35094dcbc4dcfa8fe" [X Link](https://x.com/DefimonAlerts/status/2013861304079974761) 2026-01-21T06:28Z [---] followers, [---] engagements "💬 Onchain Message: hello this is whitehat about your 13M usdc reach us asap at blockscan chat its important *official etherscan web3 chat* before its too late answer in blockscan chat reply only on this address ignore rest addresses 0x74089EFe649d03Be9e5fEd5C730875A6F5c758B5 https://basescan.org/tx/0xa259e4bbc7fcc4c25b8a21c1b131e709632c9545fbf23692c31773a81180bd9b https://chat.blockscan.com/ https://chat.blockscan.com/ https://basescan.org/tx/0xa259e4bbc7fcc4c25b8a21c1b131e709632c9545fbf23692c31773a81180bd9b https://chat.blockscan.com/ https://chat.blockscan.com/" [X Link](https://x.com/DefimonAlerts/status/2015912082860843117) 2026-01-26T22:17Z [---] followers, [---] engagements "💬 Onchain Message: yp/1/p:"p":"📰 China sends police to Australia in hunt for man who doused baby with coffeennThe nine-month-old baby was attacked with boiling liquid while at a family picnic in 2024.nn🔗 https://basescan.org/tx/0xb6c2d4adfb3062d3f285e3499f4394b61a891ccf11b5e504cfccc353080fafbb https://www.bbc.com/news/articles/cgk86xkgm0noat_medium=RSS https://www.bbc.com/news/articles/cgk86xkgm0noat_medium=RSS https://basescan.org/tx/0xb6c2d4adfb3062d3f285e3499f4394b61a891ccf11b5e504cfccc353080fafbb https://www.bbc.com/news/articles/cgk86xkgm0noat_medium=RSS" [X Link](https://x.com/DefimonAlerts/status/2016713460772376762) 2026-01-29T03:22Z [---] followers, [--] engagements "💬 Onchain Message: yp/1/p:"p":"📰 Ilhan Omar blames Trumps rhetoric for surge in death threats including spray attack: 'So obsessed with me'nnRep. Ilhan Omar blames President Trump for a chemical spray attack saying the president is "obsessed" with her as death threats surge after his return to office.nn🔗 https://basescan.org/tx/0x1ac95fdf4a4ee5fe2be2cbb27c7b5b6fda4eb074dcab59ab7ef0337fb6feee10 https://www.foxnews.com/politics/ilhan-omar-blames-trump-rhetoric-surge-death-threats-spray-attack-so-obsessed-me" [X Link](https://x.com/DefimonAlerts/status/2016714115104793042) 2026-01-29T03:24Z [---] followers, [--] engagements "💬 Onchain Message: yp/1/p:"p":"📰 FDA clears the way for additional bivalent boosters for certain vulnerable individualsnnThe U.S. Food and Drug Administration amended the terms of its emergency use authorizations for the Pfizer and Moderna bivalent vaccines on Tuesday allowing people ages [--] and older and certain people with weakened immunity to get additional doses before this fall's vaccination campaigns.nn🔗 https://basescan.org/tx/0x6d206f8ddd285ffb008b4c60231642baae46686c6e92e19dee167f69a23596d7 https://www.cnn.com/2023/04/18/health/fda-bivalent-booster-additional-doses/index.html" [X Link](https://x.com/DefimonAlerts/status/2016715417075523999) 2026-01-29T03:29Z [---] followers, [--] engagements "💬 Onchain Message: yp/1/p:"p":"📰 Gold jumps over 3% to fresh highs as Asia stock markets trade mixed after U.S. Fed holds ratesnnThe bullion rose more than 3% on Thursday to breach the $5500 per ounce mark for the first time.nn🔗 https://basescan.org/tx/0xd5ce0f0507582383d4146a63c22d6f1cff960ba8f6b5c6ac9f2ab1a0114f8ec1 https://www.cnbc.com/2026/01/29/asia-pacific-markets-us-fed-rates-gold-nikkei-225-hsi.html https://www.cnbc.com/2026/01/29/asia-pacific-markets-us-fed-rates-gold-nikkei-225-hsi.html https://basescan.org/tx/0xd5ce0f0507582383d4146a63c22d6f1cff960ba8f6b5c6ac9f2ab1a0114f8ec1" [X Link](https://x.com/DefimonAlerts/status/2016716494554501383) 2026-01-29T03:34Z [---] followers, [--] engagements "💬 Onchain Message: yp/1/p:"p":"📰 Harrowing video shows Filipino mayor miraculously survive rocket launcher attack as one suspect remains at largennHorrifying footage of the attack shows a black Toyota SUV carrying Mayor Akmad Ampatuan pulling into a Caltex petrol station at around [--] a.m. on January 25.nn🔗 https://basescan.org/tx/0xa0c61af0f5d7e498993f5dcb00c67b53264203525118c7c89038ca504d644562 https://nypost.com/2026/01/28/world-news/filipino-mayor-miraculously-survives-rocket-launcher-attack-video-shows/" [X Link](https://x.com/DefimonAlerts/status/2016717458418053415) 2026-01-29T03:38Z [---] followers, [--] engagements "It appears @KiloEx_perp hacked again this time for $135k There are some unusual transfers from KiloEx contracts to attacker addresses on BSC: https://bscscan.com/tokentxnsa=0xf3ab429ac1b3d3ca552542f18696bc3fa7f973ec 💬 Onchain Message: To Hacker: Our investigation supported by law enforcement cybersecurity agencies and multiple exchanges & bridge protocols has uncovered critical information about your activities. We are actively monitoring your addresses https://bscscan.com/tokentxnsa=0xf3ab429ac1b3d3ca552542f18696bc3fa7f973ec 💬 Onchain Message: To Hacker: Our investigation supported by law" [X Link](https://x.com/DefimonAlerts/status/2006308329136472524) 2025-12-31T10:15Z [---] followers, [----] engagements "🚨 ETF - $93K Token: $ETF @ $0.38 FDV: $988K Type: Approval Abuse Attacker exploited malicious contracts (0x1b69. and 0x169c.) that users had granted unlimited token approvals to. The contracts drained victim wallets by calling transferFrom() and swapped stolen ETF tokens for USDT via Uniswap V3. TX: Victim: (ETF Token) https://bscscan.com/address/0xec7bac72d9f8f4dfd32b9fd5e569a11af6e302ef https://bscscan.com/tx/0x1d8ebeb5a54157114739c2fb33188bc4543c13c5307131daf7587eaca36d4f47 https://bscscan.com/address/0xec7bac72d9f8f4dfd32b9fd5e569a11af6e302ef" [X Link](https://x.com/DefimonAlerts/status/2007714165801009360) 2026-01-04T07:22Z [---] followers, [---] engagements "YO protocol @yield has lost $3.7 million due to a bad swap of YoUSD. In the following tx YoVault operator executed a swap of $3.84M stkGHO into just 112k USDC. A Uniswap v4 LP captured the $3.7M difference. Several hours later Yo protocol's multisig bought 3.71M GHO via CoW Swap and re-deposited stkGHO into the vault: The YoUSD market on Pendle was paused temporarily and re-enabled after the deposit. https://etherscan.io/tx/0x50f62ffaea191b1355d5812be6007f0d673e6a473fefe38bd48b02128d267969 https://etherscan.io/tx/0x6aff59e800dc219ff0d1614b3dc512e7a07159197b2a6a26969a9ca25c3e33b4" [X Link](https://x.com/DefimonAlerts/status/2011023272469483550) 2026-01-13T10:31Z [---] followers, 43.3K engagements "Saga EVM @Sagaxyz__ has been exploited for $7 million An attacker minted D tokens (Saga Dollar) out of thin air with a helper contract that abused IBC mechanisms with custom messages. Exploit Contract: Attacker: Saga network is currently halted Saga Dollar plunged 25% https://etherscan.io/address/0x2044697623afa31459642708c83f04ecef8c6ecb https://sagaevm.sagaexplorer.io/address/0x2044697623afa31459642708c83f04ecef8c6ecb https://sagaevm.sagaexplorer.io/address/0x7D69E4376535cf8c1E367418919209f70358581E https://sagaevm.sagaexplorer.io/address/0x2044697623afa31459642708c83f04ecef8c6ecb" [X Link](https://x.com/DefimonAlerts/status/2014005231311319154) 2026-01-21T16:00Z [---] followers, [----] engagements "💬 Onchain Message: Hello We have identified that your wallet 0xddf6f217951a1e484ee6b04d621c861bf38d0656 realized [---------] USDC in profits by extracting value from the LPs in the dislocated Curve DUSD/USDC in the hours after an exploit. List of transactions in question: These profits are the direct result of a criminal action and are owed to users in the pool who lost additional funds as a result of your action. Your actions indicate a clear intent to profit by directly taking advantage of the exploit to extract value from users. We have a lead on your CEX interactions but before we escalate" [X Link](https://x.com/DefimonAlerts/status/2015467028316848593) 2026-01-25T16:49Z [---] followers, 50.2K engagements "💬 Onchain Message: Hello We have identified that your wallet 0xddf6f217951a1e484ee6b04d621c861bf38d0656 realized [---------] USDC in profits by extracting value from the LPs in the dislocated Curve DUSD/USDC in the hours after an exploit. List of transactions in question: These profits are the direct result of a criminal action and are owed to users in the pool who lost additional funds as a result of your action. Your actions indicate a clear intent to profit by directly taking advantage of the exploit to extract value from users. We have a lead on your CEX interactions as well as your IP" [X Link](https://x.com/DefimonAlerts/status/2015467694800155014) 2026-01-25T16:51Z [---] followers, [---] engagements "Today we reported to @HypurrFi an attack targeting a newly launched Euler Gateway. An attacker identified an arbitrary call vulnerability and exploited it after the first large approval. Should he waited for more approvals the impact could be larger. We reported it right after the detection in our monitoring system which helped to quickly mitigate the incident by the team - no more funds are at risk. As part of our recent release we failed to catch the unintended inclusion of unaudited Helper Code that was being developed to streamline users and enable swapping into lending positions. This" [X Link](https://x.com/DefimonAlerts/status/2015512978041549292) 2026-01-25T19:51Z [---] followers, [----] engagements "💬 Onchain Message: Final Settlement Offer - $3000000 USDC Bounty I am following up because I have not heard from the account. I am offering you a guaranteed clean $3000000 USDC bounty to walk away. This is a life-changing amount of money with zero legal risk or pursuit. The alternative is a global forensic investigation. The $13M is being tracked by all major exchanges and law enforcement; it will be nearly impossible to bridge or off-ramp without detection. Please don't trade your future for "hot" assets you cannot use. Take the $3M and let my family survive. Contact me privately at" [X Link](https://x.com/DefimonAlerts/status/2016571060557169041) 2026-01-28T17:56Z [---] followers, [---] engagements "💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a whitehat case. We are offering a bounty of the ETH you had transferred (22 ETH) and would like you to return the ownership and funds in BNB and World Chain perpetual dex. No legal pursuit Email: trung.banh@holdstation.com or telegram @trungbanhh Return address: 0x318ce8b75c820a8fe7adf47c6213bc3c53ffa987 Let make this a better" [X Link](https://x.com/DefimonAlerts/status/2016695515824390239) 2026-01-29T02:10Z [---] followers, [----] engagements "Holdstation @HoldstationW has been hacked for around $100k due to a wallet compromise. The attacker took control of the project's wallet and drained HOLD USD1 and BNB tokens across BSC Worldchain and Ethereum networks. Attacker address: 0x54e127b8dbf3bebf64bb1d62a195a6f60113130d 💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a 💬 Onchain Message: Dear Hacker Holdstation team" [X Link](https://x.com/DefimonAlerts/status/2016752067797536790) 2026-01-29T05:55Z [---] followers, [----] engagements "💬 Onchain Message: We are monitoring your address. [------] USDT has been targeted by multiple security agencies. We are offering 10% ($73000) as a white-hat bounty in exchange for the return of 90% of the funds. Return the funds within [--] hours and we will cease tracking and legal action. Otherwise we will immediately request Tether to blacklist this address. https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded" [X Link](https://x.com/DefimonAlerts/status/2017229481216209155) 2026-01-30T13:32Z [---] followers, [---] engagements "💬 Onchain Message: This message is issued by the Revert Finance team regarding the unauthorized exploitation of a vulnerability in our Aerodrome V3 Vault contract and the withdrawal of approximately [-----] USDC belonging to the protocol and its users. Transaction Hash: 0x10429eaeb479f9149854e4aeb978a35ac02d9688f6e22371712b3878c63a64ab Exploiter Address: 0xc6b04f6316fb674c556d65f136898ee26719bb6d Network: Base While this incident involved a smart contract vulnerability the exploit was executed with clear malicious intent to permanently misappropriate user funds rather than responsible" [X Link](https://x.com/DefimonAlerts/status/2017239993916195126) 2026-01-30T14:14Z [---] followers, [---] engagements "Typus Finance incident happened on Sui blockchain on October [--] A lack of a single assert() in the oracle contract led to the loss of $3.44 million 👇 https://defimon.xyz/blog/typus-finance-hack-october-2025 https://defimon.xyz/blog/typus-finance-hack-october-2025" [X Link](https://x.com/DefimonAlerts/status/1981292091037929650) 2025-10-23T09:30Z [----] followers, [---] engagements "EIP-7702 is getting popular among hackers to execute attacks In this tx an unverified contract lost [--] eth due to a forced swap with arbitrary slippage. The contract exposes a public function swap() that allows to swap CAPY token with minOutputAmount=0. An attacker used a delegated contract to receive a flashloan to disbalance CAPY / WETH pool and drain the contract. https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73 https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73" [X Link](https://x.com/DefimonAlerts/status/1983488316465938603) 2025-10-29T10:57Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1983745243897065936) 2025-10-30T03:58Z [----] followers, [----] engagements "Unprotected uniswapV3SwapCallback callback in 0xc0ffee's MEV-bot contract was exploited The callback verifies msg.sender against input arguments which makes it trivial to bypass it. As a result the attacker stole $218k worth of LINK tokens. https://basescan.org/tx/0x83da47641680d0cf0a0567e3bcd5961cd30dbd5f34007f0e26e54216ad20b439 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW" [X Link](https://x.com/DefimonAlerts/status/1983810181302538377) 2025-10-30T08:16Z [----] followers, [----] engagements "💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and helping us identify and fix the vulnerability. We are fully committed to resolving this situation peacefully and ensuring that no further harm is done. If you choose to return the stolen assets and help us understand the exploit we will reward you with 10% of the total value recovered. Our intent is to address this" [X Link](https://x.com/DefimonAlerts/status/1983884669834949066) 2025-10-30T13:12Z [----] followers, [----] engagements "Garden Finance @gardenfi has been hacked for $6.4 million 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning" [X Link](https://x.com/DefimonAlerts/status/1983885979317424563) 2025-10-30T13:17Z [----] followers, [----] engagements "💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized crime and other incidents. A good sized percentage of their total activity for the bridge has related to illicit activity. They have not been cooperative with requests to return those fees to the victims or to develop a solution for the protocol. I will not be tracking your funds gained from the exploit." [X Link](https://x.com/DefimonAlerts/status/1983894287210422743) 2025-10-30T13:50Z [----] followers, [----] engagements "The @gardenfi hack is @ZachXBT approved 👌 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized" [X Link](https://x.com/DefimonAlerts/status/1983895085898199533) 2025-10-30T13:53Z [----] followers, [----] engagements "💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock the deal Bounty will start to decrease in 21-days (Nov 18) Bounty will expire in [--] days (Nov 25) Bounty is live. Settlement is atomic when we call recoverKnine(). KNINE is transferred back to Shibarium bridge and ETH is transferred to you. If you call accept we cannot cancel the deal. Code is law. ---" [X Link](https://x.com/DefimonAlerts/status/1985233609100579244) 2025-11-03T06:32Z [----] followers, [---] engagements ".@K9finance does not give up - the last offer was [--] eth and the hacker demanded [--] eth: https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 1." [X Link](https://x.com/DefimonAlerts/status/1985235001311641880) 2025-11-03T06:38Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1985252395090387339) 2025-11-03T07:47Z [----] followers, 56.8K engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $166498.87 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1985252738075394386) 2025-11-03T07:48Z [----] followers, [---] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $14147 https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa" [X Link](https://x.com/DefimonAlerts/status/1985261957432373319) 2025-11-03T08:25Z [----] followers, [----] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $2667 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5" [X Link](https://x.com/DefimonAlerts/status/1985262007407554674) 2025-11-03T08:25Z [----] followers, [---] engagements "⚠ pLONGWILD (Peapods Finance V2) lost $557 https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b" [X Link](https://x.com/DefimonAlerts/status/1985262112034443586) 2025-11-03T08:25Z [----] followers, [---] engagements "The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d" [X Link](https://x.com/DefimonAlerts/status/1985271050939056399) 2025-11-03T09:01Z [----] followers, [----] engagements "@drdr_zz @Balancer Yes internal balances were manipulated before the withdrawal https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR" [X Link](https://x.com/DefimonAlerts/status/1985314355517292894) 2025-11-03T11:53Z [----] followers, [----] engagements "💬 Onchain Message: Create [--] ETH bounty contract to recover all KNINE tokens. https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3 https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3" [X Link](https://x.com/DefimonAlerts/status/1985611803905450305) 2025-11-04T07:35Z [----] followers, [---] engagements "💬 Onchain Message: Hi guys it seems that some balancer exploits were front-ran by my bot. I want to return your funds. Could you give me a certified recipient address or any way I could reach you https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31 https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31" [X Link](https://x.com/DefimonAlerts/status/1985647665821204802) 2025-11-04T09:57Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1985775377135079821) 2025-11-04T18:25Z [----] followers, [----] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: bsc Proxy: 0x704478dd72fd7f9b83d1f1e0fc18c14b54f034d0 (PendleGaugeControllerSidechainUpg) belonging to protocol Pendle (Immunefi) New address: 0x3c26D8aA09Af661C16e02004e1B72De6724EB824 https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e" [X Link](https://x.com/DefimonAlerts/status/1985909478882230299) 2025-11-05T03:18Z [----] followers, [---] engagements ".@DexodusFinance on Base has been drained It is the second time the protocol has been exploited since May. https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75" [X Link](https://x.com/DefimonAlerts/status/1985971992357388530) 2025-11-05T07:26Z [----] followers, [---] engagements "💬 Onchain Message: Hi Mr Hacker well played on draining my [--] wallets of HOLD please forward back my $100k worth of tokens HOLD and ETH so I dont have to follows your every move and block your wallets before they off load I also have some hackers looking into your movements and an FBI friend so do the right thing and send back my funds so I don't need to carry this on 0xdc5c33da573bb4e6b81d642945a33d61e274feac one of my wallets you drained please forward funds backnow https://etherscan.io/tx/0x2a68e9663ab7e7b6428940955305d9fa23ae6d5b0dfe8572f15d78878a5239ba" [X Link](https://x.com/DefimonAlerts/status/1986113264342999051) 2025-11-05T16:47Z [----] followers, [---] engagements "💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you are willing to cooperate reply to this message and begin contact procedures before November 8th 21:00 UTC. If we do not hear from you by that time we will assume you are unwilling to help make the liquidity providers whole and will escalate our response. We would like to extend you an offer: return the funds to the DAO" [X Link](https://x.com/DefimonAlerts/status/1986177540256637155) 2025-11-05T21:03Z [----] followers, [---] engagements "Legit message from @Balancer to the hacker 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you" [X Link](https://x.com/DefimonAlerts/status/1986179977952326122) 2025-11-05T21:13Z [----] followers, [---] engagements "⚠ Unverified contract lost $1285 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461" [X Link](https://x.com/DefimonAlerts/status/1986702923506888767) 2025-11-07T07:51Z [----] followers, [---] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1986740761103364579) 2025-11-07T10:21Z [----] followers, [----] engagements "⚠ FSP / USDT lost $75107 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825" [X Link](https://x.com/DefimonAlerts/status/1986741364906979377) 2025-11-07T10:23Z [----] followers, [---] engagements "Unknown project on BSC was hacked for around $230k The claimToken() and swapDPC() functions in DPCLock use spot price from PancakeSwap which can be easily manipulated with a flashloan. The funds are accumulated in the fresh wallet without BNB for gas (yet). https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0x7be62536947d83ae962abfa4c491d736967dea8faf4a629090a49f72d529a297 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals" [X Link](https://x.com/DefimonAlerts/status/1987144053503226151) 2025-11-08T13:03Z [----] followers, [----] engagements "🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi" [X Link](https://x.com/DefimonAlerts/status/1987909309423124535) 2025-11-10T15:44Z [----] followers, [----] engagements "RWB was hacked for $180k A sequence of large flashloans was taken to manipulate a swap inside function buy() in an unverified contract related to this token. In the RWB / USDT swap amountOutMin is set to [--] allowing maximum slippage. Funds are bridged to mainnet and deposited to Tornado: https://bscscan.com/tx/0xcc1884e9934d516df9d80a38706bc0fa1d4437e0cd3d02a4b2e4e95fafe94dfe https://etherscan.io/address/0xc484ecd341f8e02d6685da4f6670684a7675303b 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at" [X Link](https://x.com/DefimonAlerts/status/1987960353989255183) 2025-11-10T19:07Z [----] followers, [----] engagements "An instance of DRLVaultV3 contract was drained for $100k DRLVaultV3 is vulnerable to price manipulation in swapToWETH() and swapToUSDC() functions because they use quoteExactInputSingle() to determine the price (i.e. spot price from Uniswap). c0ffebabe.eth frontrun an attack on the DRLVault instance with 100k USDC deposited into it [--] hours prior. These vaults can be created from the factory contract via clone pattern however other vaults don't hold any funds. https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475 ⚠ DRLVaultV3 lost $97733" [X Link](https://x.com/DefimonAlerts/status/1988162277397205015) 2025-11-11T08:29Z [----] followers, [----] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: arbitrum Proxy: 0x1344a36a1b56144c3bc62e7757377d288fde0369 (Views) belonging to protocol Notional (Immunefi) New address: 0x634A5270cfde2A3D763772C7FC2517c4660D2cF7 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763" [X Link](https://x.com/DefimonAlerts/status/1988334956326854721) 2025-11-11T19:56Z [----] followers, [---] engagements "💬 Onchain Message: Hi Im the victim whose funds you took through the AugustusV6 exploit. You transferred [-------] USDC from my wallet (0x05808Cf9F8aAcFD6a2c2A879326593644F9a339e) on Oct-05-2025 09:31:35 PM UTC. Im reaching out once again to ask you please to return the money. Those were my last savings and Im about to lose the apartment I live in because I no longer have money to pay for it. Im in serious financial trouble because of this and Im asking you to do the right thing and send all the funds back. The universe sees and knows everything one does and it rewards each person according to" [X Link](https://x.com/DefimonAlerts/status/1988413464281493715) 2025-11-12T01:08Z [----] followers, 11.4K engagements "⚠ SHReK / WBNB lost $971 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794" [X Link](https://x.com/DefimonAlerts/status/1988437343829897504) 2025-11-12T02:43Z [----] followers, [---] engagements "@lcfr_eth @ImpermaxFinance https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd" [X Link](https://x.com/DefimonAlerts/status/1988932523712528712) 2025-11-13T11:30Z [----] followers, [--] engagements "https://defimon.xyz/blog/balancer-v2-hack-november-2025 https://defimon.xyz/blog/balancer-v2-hack-november-2025" [X Link](https://x.com/DefimonAlerts/status/1989256565174759561) 2025-11-14T08:58Z [----] followers, [---] engagements "⚠ TokenHandler lost $18171 https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a" [X Link](https://x.com/DefimonAlerts/status/1989725930156388714) 2025-11-15T16:03Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xdbc3363de051550d122d9c623cbaff441afb477c (FeeReceiver) belonging to protocol Kelp DAO (Immunefi) New address: 0x868ceF33E29bF3037b5d4CF5C408EAEF29d96b33 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375032782401915) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x947cb49334e6571ccbfef1f1f1178d8469d65ec7 (LRTConfig) belonging to protocol Kelp DAO (Immunefi) New address: 0xb21b7Db6d1dAd2a7b057ba5c2E9BA2891fb2e80d https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375032966955073) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x598dbcb99711e5577ff76ef4577417197b939dfa (LRTConverter) belonging to protocol Kelp DAO (Immunefi) New address: 0x64B7764e73a83eb1d921B43Eb87Bc5E0eFDbD712 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375040164413808) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x036676389e48133b63a802f8635ad39e752d375d (LRTDepositPool) belonging to protocol Kelp DAO (Immunefi) New address: 0xB1238B191b5280378635B27cE4f37e57187Cf19c https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375052998934729) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x349a73444b1a310bae67ef67973022020d70020d (LRTOracle) belonging to protocol Kelp DAO (Immunefi) New address: 0x81E1112966F2E6115b5B3d2EFd94cDe8AE57E793 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375062150877669) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xc66830e2667bc740c0bed9a71f18b14b8c8184ba (LRTUnstakingVault) belonging to protocol Kelp DAO (Immunefi) New address: 0x47a368d5eB1015F78bE791a2877fB25Db9c6E282 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375069377679402) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x62de59c08eb5dae4b7e6f7a8cad3006d6965ec16 (LRTWithdrawalManager) belonging to protocol Kelp DAO (Immunefi) New address: 0xd559EDbD5f09eFdCc22265Ce436dbe00c564D59F https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375082854039924) 2025-12-20T13:46Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xa1290d69c65a6fe4df752f95823fae25cb99e5a7 (RSETH) belonging to protocol Kelp DAO (Immunefi) New address: 0xC9Ef97549e28390003DE53279B7D3d39DCE81637 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef" [X Link](https://x.com/DefimonAlerts/status/2002375090961629578) 2025-12-20T13:46Z [----] followers, [---] engagements "🚨 MorningStar - $129K Token: $MSC @ $0.0093 MC: $195K Type: Access Control - Public Function The releaseReward() function lacks access control allowing anyone to call it with arbitrary amounts. Attacker called it with the contract's full MSC balance triggering a swap that manipulated the GPC/AMMToken pool. This allowed them to arbitrage the inflated pool via flash swap extracting [---] WBNB. TX: Victim: https://bscscan.com/address/0x91334d03dd9b9de8d48b50fe389337eeb759aeb1 https://bscscan.com/tx/0x6c9ed4c2d81b6abfdf297b0cbc13585ed91f2a5e69e3545d3ea4316f50021b56" [X Link](https://x.com/DefimonAlerts/status/2005565010131476884) 2025-12-29T09:02Z [----] followers, [---] engagements "🚨 AiPay - $31K Token: $AIPAY (No CoinGecko listing) MC: Unknown (unlisted token) Type: Logic Error (Unverified Contract) Attacker flash loaned 14.5M USDT from Moolah repeatedly called unverified minting functions on victim vault contract to mint AiPay tokens dumped via PancakeSwap for $30K profit. TX: Victim: (unverified) https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83 https://bscscan.com/tx/0xa268528df0f7e2b55f88e00746634e4a5404f3924b32335d0c504d92f055064d https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83" [X Link](https://x.com/DefimonAlerts/status/2015418396980936818) 2026-01-25T13:36Z [----] followers, [---] engagements "🚨 XPlayer Token (XPL) - $963K Token: $XPL @ $19.12 (post-hack distorted) MC: N/A (not listed on CoinGecko) TVL: $0 (pool drained) Type: Missing Access Control The NodeDistributePlus contract has a public DynamicBurnPool() function that allows anyone to burn XPL tokens from the liquidity pool. Attacker called this to burn nearly all XPL in the PancakePair then swapped their small XPL balance to drain $963K USDT. TX: Victim: (XPL Token) https://bscscan.com/address/0xc2c4ccde8948c693d0b04f8bad461e35a12f20b8" [X Link](https://x.com/DefimonAlerts/status/2016877822283862480) 2026-01-29T14:15Z [----] followers, [---] engagements "Molecular Finance is reported to have rug pulled on Arbitrum. At least 320K USD have been stolen. The website and socials are gone. http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history" [X Link](https://x.com/DefimonAlerts/status/2017285487485194375) 2026-01-30T17:15Z [----] followers, [---] engagements "Hello @40acres_Finance your proxy deployments on Ethereum have been backdoored (CPIMP attack): https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec" [X Link](https://x.com/DefimonAlerts/status/2017471159936422372) 2026-01-31T05:33Z [----] followers, [----] engagements "@0xDestinyae @IAm0x52 @crosscurvefi Yes we reported to the team first" [X Link](https://x.com/DefimonAlerts/status/2018067565486961145) 2026-02-01T21:02Z [---] followers, [---] engagements "In the first tx attacker sent a CCIP message to the L1 escrow with crafted parameters to grant max allowance. https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600 https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600" [X Link](https://x.com/DefimonAlerts/status/2018600449922957690) 2026-02-03T08:20Z [----] followers, [---] engagements "💬 Onchain Message: An important address to the crypto community. We need your support. On the night of February [--] a serious incident occurred: the CrossCurve bridge was hacked. According to information published by CrossCurves official account the exploit resulted in the theft of funds totaling more than $1.44 million. CrossCurve is a cross-chain bridge that allows users to move assets between different blockchains. Such systems are a critically important part of the DeFi ecosystem because liquidity capital availability and the operation of many projects depend on them. Scale of the damage" [X Link](https://x.com/DefimonAlerts/status/2018709012913467669) 2026-02-03T15:31Z [----] followers, [---] engagements "💬 Onchain Message: Message to who executed the GYD bridge security incident The following message is subject to approval by Gyroscope governance vote closing 18:30 UTC on Feb [--] see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by" [X Link](https://x.com/DefimonAlerts/status/2018757317731238287) 2026-02-03T18:43Z [----] followers, [---] engagements "0x669c balance is around $5.8M in eth the source of funds is traced to Binance 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE" [X Link](https://x.com/DefimonAlerts/status/2018984673154613362) 2026-02-04T09:47Z [----] followers, [----] engagements "🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0x0c12adea8035db6d5bba76bdb8bea2c1e1d246f6 (EOA) 💰 Destroyed balance: $2000040 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8" [X Link](https://x.com/DefimonAlerts/status/2019104468311167360) 2026-02-04T17:43Z [----] followers, [---] engagements "💬 Onchain Message: The following message has been authorized by Gyroscope governance see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by canceling GYD's system surplus. If you take this offer Gyroscope will cease investigations and" [X Link](https://x.com/DefimonAlerts/status/2019121507805372784) 2026-02-04T18:50Z [----] followers, [---] engagements "💬 Onchain Message: Subject: FINAL UPGRADE 20% White-hat Bounty Offer To the holder of 0x669C. [--]. The Offer: We are increasing the boundty to 20% of the total assets. This is our final offer. [--]. The Logic: BTC is volatile near 73k. Prolonging this increases your risk of exit paths being permanently blocked and the reward value dropping. [--]. The Immunity: Upon return of 80% to the designated address we will grant full legal immunity and cease all global tracking. [--]. Deadline: 09:00 KST Feb [--] [----]. After this we initiate full-scale international legal action. Contact: Telegram @Ramirex5" [X Link](https://x.com/DefimonAlerts/status/2019207470426501463) 2026-02-05T00:32Z [----] followers, [---] engagements "💬 Onchain Message: white hat bounty final offer %90 you have a [--] day window before we move on with action with law enforcement agencies send %10 to 0x628ABf754440DD0B180DB637100d7308cffDD224 thank you in advance for your cooperation https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f" [X Link](https://x.com/DefimonAlerts/status/2019209346337436118) 2026-02-05T00:39Z [----] followers, [---] engagements "💬 Onchain Message: URGENT: Final 20% Bounty Offer sent to Wallet 0x669C. Check Input Data on Wallet 0x669C immediately. Deadline: 00:00 UTC Feb [--]. Contact: @Ramirex5 https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e" [X Link](https://x.com/DefimonAlerts/status/2019209495457444268) 2026-02-05T00:40Z [----] followers, [---] engagements "💬 Onchain Message: FINAL SETTLEMENT: Return [----] ETH / Reward [-----] ETH. Upon receipt all legal actions and subpoenas to Binance/Coinbase will be permanently withdrawn. Case classified as White-hat. https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14 https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14" [X Link](https://x.com/DefimonAlerts/status/2019655325360545915) 2026-02-06T06:12Z [----] followers, [---] engagements "💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take flashloan of my vault contract assets which were subsequently used by him. It had nothing to do with my addresses and/or contracts deployed by me. Since then I am trying to move my funds back to ETH chain but you are stopping and blocking my bridge transactions continuously. Your analysis of the attack transaction is totally" [X Link](https://x.com/DefimonAlerts/status/2009886570262806849) 2026-01-10T07:14Z [----] followers, [----] engagements ".@FildaFinance was hacked on ESC network on December [--] Its second incident since April [----] when $700k was stolen https://fildafinance.medium.com/filda-exploit-statement-49ec69e34c53 https://x.com/fildafinance/status/2007435307059147199s=46&t=sMvgsnYvKjMe_sT0nAhjmg 💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take" [X Link](https://x.com/DefimonAlerts/status/2009888923518972107) 2026-01-10T07:23Z [----] followers, [---] engagements "🚨 Yieldification (YDF) OTC - $1.3K Token: $YDF @ $0.00003579 MC: $35.8K Type: Logic Error - Storage Not Cleared After NFT Burn Pool storage data persists after poolRemove() burns the NFT. Attacker creates and removes a pool then calls swapPool on the burned tokenId to drain remaining contract funds. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/yieldification https://etherscan.io/address/0xba411e5a84b3b1169143d084c304e8f5f61e73aa https://etherscan.io/tx/0xf36a2b9006fa7671bdff6e4605e53f44cd20332f33630839d115526c342b9cc9 https://www.coingecko.com/en/coins/yieldification" [X Link](https://x.com/DefimonAlerts/status/2014949644816482362) 2026-01-24T06:33Z [----] followers, [---] engagements "On January [--] @GyroStable has been exploited for around [-----] ETH ($696k) A hacker exploited an arbitrary call vulnerability in the _ccipReceive() function of the GydL1CCIPEscrow contract. It allows the recipient field in the CCIP message to be any address including the GYD token contract itself. Setting recipient = GYD and data = approve(attacker max) effectively granted the attacker full allowance to the escrow's GYD holdings. https://twitter.com/i/web/status/2018600445900390567 https://twitter.com/i/web/status/2018600445900390567" [X Link](https://x.com/DefimonAlerts/status/2018600445900390567) 2026-02-03T08:20Z [----] followers, [----] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x348d8ec2d06d35ed09583b6c43267bafd3ea62b90f0a6cb59a858117f96c76b7 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x18df2cbb364becd69d7703a6336ffb31f3c9619d23634ec8f591df312169fd457a8133046c32b91f0e3395c930dffcdc7673d7105ee308ffee89be96c5414f311b https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9 https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9" [X Link](https://x.com/DefimonAlerts/status/2022362460057903405) 2026-02-13T17:29Z [----] followers, [--] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x3f3423d0573f447dce167fcd4fdff017c1be2a6db731ec7421474e1421e31a8c on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x9ce799b58330172ffed107958fe6210aa2b3777b36676049b5717bce8436544509243c96be2f1b554564e1830a729e45276e975d9f5f51df78449297ac7deedb1c https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2 https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2" [X Link](https://x.com/DefimonAlerts/status/2022362572733792366) 2026-02-13T17:29Z [----] followers, [--] engagements "Onchain monitoring and incident response is crucial for DeFi Since [----] we have been working on to detect DeFi exploits by analyzing transactions in real-time. There is a constant stream of DeFi exploits that are barely noticed. You can get access to these instant alerts by subscribing to the exploits feed for just 50$/mo. For protocol teams we offer a Websocket subscription to act on the alerts automatically. Native Telegram subscription: Tribute mini-app: Contact: http://t.me/DecurityHQ http://t.me/tribute/appstartapp=sCiA http://t.me/+m9BMRKlMuW5iMGFi http://defimon.xyz" [X Link](https://x.com/anyuser/status/2018236893738012918) 2026-02-02T08:15Z [----] followers, [----] engagements "⚠ Unverified contract lost $10381 at 13:59 [--] February [----] (UTC) https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090 https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090" [X Link](https://x.com/anyuser/status/2022554639116186046) 2026-02-14T06:12Z [----] followers, [---] engagements "💬 Onchain Message: Please listen to me. This is very hard for me it's a lot of money and I'm devastated. Those miners were stolen directly from my wallet to yours. The person who 'sold' them to you never owned them; he hacked me and sent them to you when you paid him. We both got scammed by the same guy. Please let's talk on Telegram so I can see your proof and get his contact. My Telegram is: @JerryCommuniity https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc" [X Link](https://x.com/anyuser/status/2022313539411599394) 2026-02-13T14:14Z [----] followers, [---] engagements "💬 Onchain Message: High-velocity ETH churn via 1inch router (0x11111112. 39x 0x12aa3caf swaps) averaging 53min intervals across [--] txs46 outbound just [--] inbounddrains [------] ETH with minimal recapture. Five approves (0xe842e272.) hint at token setups for swaps yet no token flows detected suggesting ETH-only dumps into illiquid pairs or failed executions. Self-interacts (0xd3402dc9. 4x) point to internal looping possibly a solo bot testing MEV edges on Base's low-fee layer. Blindspot: This frantic pacing masks slippage accumulation in 1inch's aggregated liquidity; broader network shows" [X Link](https://x.com/anyuser/status/2022868476365353186) 2026-02-15T03:00Z [----] followers, [---] engagements "Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x85b78aca6deae198fbf201c82daf6ca21942acc6 (LidoARM) belonging to protocol Origin Protocol (Immunefi) New address: 0xC0297a0E39031F09406F0987C9D9D41c5dfbc3df https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b" [X Link](https://x.com/DefimonAlerts/status/1998229749722931563) 2025-12-09T03:14Z [----] followers, [---] engagements "🚨 JFIN Bridge (LCBridgev2Token) - $13.4K Token: $JFIN @ $0.085 MC: N/A (no circulating supply tracked) FDV: $25.6M Type: Logic Error (Reward Calculation) The staking reward calculation allows claiming rewards greater than the contract balance by exploiting the claimReward function which pays out based on accumulated totalReward rather than actual available funds draining all staked JFIN tokens. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/jfin-coin https://etherscan.io/address/0x3EbFd0EFC49a27fb633bd56013E4220EBC2c3C6d" [X Link](https://x.com/DefimonAlerts/status/2003862392866734530) 2025-12-24T16:16Z [----] followers, [---] engagements "CrossCurve @crosscurvefi (ex has been exploited for around [--] million on several networks. Anyone could call expressExecute on ReceiverAxelar contract with a spoofed cross-chain message bypassing gateway validation and triggering unlock on PortalV2. Victim (PortalV2): Vulnerable contract (ReceiverAxelar): Attackers: https://etherscan.io/address/0xcc3a5dc003b3a58621745a39f706ef9646d5c481 https://etherscan.io/address/0x632400f42e96a5deb547a179ca46b02c22cd25cd https://etherscan.io/address/0xb2185950f5a0a46687ac331916508aada202e063" [X Link](https://x.com/DefimonAlerts/status/2018055069762240741) 2026-02-01T20:13Z [----] followers, [----] engagements "💬 Onchain Message: Hello your Gnosis Safe has been exploited for $70k because your custom module 0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19 has a receiveFlashLoan callback without verification of the flashloan initiator. We managed to rescue a small portion of USDT and sent it back to you. Please remove the vulnerable module. https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0 https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0" [X Link](https://x.com/anyuser/status/2020204608551858587) 2026-02-07T18:34Z [----] followers, [----] engagements "💬 Onchain Message: Dear hacker sir Please never return the funds use tornado cash Thor swap or u can use torcador and covert to monero and mix it I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here" [X Link](https://x.com/anyuser/status/2020687342814540240) 2026-02-09T02:32Z [----] followers, [----] engagements "💬 Onchain Message: Hello your proxy deployments have been backdoored by the malicious actors (CPIMP attack): [--]. [--]. Consider calling initialize() atomically together with the proxy deployment to avoid the front-run. https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380 https://arbiscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380" [X Link](https://x.com/anyuser/status/2021603777082495154) 2026-02-11T15:14Z [----] followers, [---] engagements "🚨 AFX Staking (afxStakeDappA) - Loss: $10700 Type: Logic Error / Price Manipulation The AFX staking contract (0x560d unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker who then swapped them for [-----] USDT profit. TX: Victim: (unverified) Vulnerable Contract: (unverified) Attacker:" [X Link](https://x.com/anyuser/status/2021997150062649795) 2026-02-12T17:17Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0xcd1f367a1895a38f5bc1c7c8b9ea55ef3ce9fa45407c7081754b25a297ff43a8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0xb5cb123131715972fcec8ed98b4e9ee87a679fa6042970a9c2c22c36e2ad0ffd0d05479775bfe9089e18140027718353870ca88d8d659f36498dedf14d13734c1c https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0 https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0" [X Link](https://x.com/anyuser/status/2022362095556190222) 2026-02-13T17:27Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x254922f7554a0861c4cd67795a540d349f653b0e938eccad18385ff7fb4e6cc8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x698328e41335a8121742d767c895c460e14a09c73addf3ce9a9f69d94172277c5fa3e525dbe95e44a57db69586919908d7d77759694de62130aac8b08e6d4d9e1b https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12 https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12" [X Link](https://x.com/anyuser/status/2022362317518762022) 2026-02-13T17:28Z [----] followers, [---] engagements "💬 Onchain Message: Wallet 0x61e033357d61a9ce87f6d7b271871641ec01b687 runs a tireless script against 0x837b57a9. firing [--] outbound txs with zero ETH flow or token tracespure operational noise. Methods cluster on 0x03001400 (16x likely query/update loops) 0x02001a00 (15x state reads) and 0x03003400 (11x batch ops) revealing a grinding routine not opportunistic plays. 24/7 cadence gaps under 8h screams bot autopilot no human pauses. Blindspot: This laser-focus flags as automated farming (airdrops exploits) amid Base's bot swarm where 70% of such mono-contract hammering gets blacklisted by" [X Link](https://x.com/DefimonAlerts/status/2022868343842029696) 2026-02-15T02:59Z [----] followers, [---] engagements "💬 Onchain Message: Wallet exhausts [------] ETH in [--] outbound txnsno inflows pure sink. [--] transfers dominate hitting 0xc734635c (7x likely aggregator) 0x5b2193fd & 0x22af33fe (5x each bridge proxies) cycling through [--] contracts in tight loops. No tokens no DEX routersraw ETH dispersal not trading. 24/7 cadence (gaps 8h) screams automation: bot probing Base's periphery seeding liquidity or farming micro-rewards in low-tier protocols. Blindspot: zero reciprocity exposes drain risk; this isn't strategy it's scattershot erosion. Broader echo: mirrors Base's bot swarms testing L2 edges but" [X Link](https://x.com/DefimonAlerts/status/2022885480304349551) 2026-02-15T04:07Z [----] followers, [--] engagements "Onchain monitoring and incident response is crucial for DeFi Since [----] we have been working on to detect DeFi exploits by analyzing transactions in real-time. There is a constant stream of DeFi exploits that are barely noticed. You can get access to these instant alerts by subscribing to the exploits feed for just 50$/mo. For protocol teams we offer a Websocket subscription to act on the alerts automatically. Native Telegram subscription: Tribute mini-app: Contact: http://t.me/DecurityHQ http://t.me/tribute/appstartapp=sCiA http://t.me/+m9BMRKlMuW5iMGFi http://defimon.xyz" [X Link](https://x.com/anyuser/status/2018236893738012918) 2026-02-02T08:15Z [----] followers, [----] engagements "💬 Onchain Message: High-velocity ETH churn via 1inch router (0x11111112. 39x 0x12aa3caf swaps) averaging 53min intervals across [--] txs46 outbound just [--] inbounddrains [------] ETH with minimal recapture. Five approves (0xe842e272.) hint at token setups for swaps yet no token flows detected suggesting ETH-only dumps into illiquid pairs or failed executions. Self-interacts (0xd3402dc9. 4x) point to internal looping possibly a solo bot testing MEV edges on Base's low-fee layer. Blindspot: This frantic pacing masks slippage accumulation in 1inch's aggregated liquidity; broader network shows" [X Link](https://x.com/anyuser/status/2022868476365353186) 2026-02-15T03:00Z [----] followers, [---] engagements "⚠ Unverified contract lost $10381 at 13:59 [--] February [----] (UTC) https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090 https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090" [X Link](https://x.com/anyuser/status/2022554639116186046) 2026-02-14T06:12Z [----] followers, [---] engagements "💬 Onchain Message: Your SOMining server is currently at risk and an attack from that address could occur tomorrow resulting in loss of funds. If you wish to continue operating your server and avoid losing funds you can blacklist this address to prevent tokens from being used. Black address 0x29e5F70ebab2B5b830609E0f2b8A357F2295EBfD For further information please contact the following email address: kingston37790@proton.me https://bscscan.com/tx/0xdc43358a5dd9883465bacf7c261818013c186229134146d0b8b27c8dfdfd0c4e" [X Link](https://x.com/anyuser/status/2022482155062862190) 2026-02-14T01:24Z [----] followers, [---] engagements "🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0xec046b20d26aedcaad476e21f22feb00ca0ced5d (EOA) 💰 Destroyed balance: $4743207 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11" [X Link](https://x.com/anyuser/status/2022436359500165504) 2026-02-13T22:22Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x254922f7554a0861c4cd67795a540d349f653b0e938eccad18385ff7fb4e6cc8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x698328e41335a8121742d767c895c460e14a09c73addf3ce9a9f69d94172277c5fa3e525dbe95e44a57db69586919908d7d77759694de62130aac8b08e6d4d9e1b https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12 https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12" [X Link](https://x.com/anyuser/status/2022362317518762022) 2026-02-13T17:28Z [----] followers, [---] engagements "💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0xcd1f367a1895a38f5bc1c7c8b9ea55ef3ce9fa45407c7081754b25a297ff43a8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0xb5cb123131715972fcec8ed98b4e9ee87a679fa6042970a9c2c22c36e2ad0ffd0d05479775bfe9089e18140027718353870ca88d8d659f36498dedf14d13734c1c https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0 https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0" [X Link](https://x.com/anyuser/status/2022362095556190222) 2026-02-13T17:27Z [----] followers, [---] engagements "💬 Onchain Message: Please listen to me. This is very hard for me it's a lot of money and I'm devastated. Those miners were stolen directly from my wallet to yours. The person who 'sold' them to you never owned them; he hacked me and sent them to you when you paid him. We both got scammed by the same guy. Please let's talk on Telegram so I can see your proof and get his contact. My Telegram is: @JerryCommuniity https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc" [X Link](https://x.com/anyuser/status/2022313539411599394) 2026-02-13T14:14Z [----] followers, [---] engagements "🚨 AFX Staking (afxStakeDappA) - Loss: $10700 Type: Logic Error / Price Manipulation The AFX staking contract (0x560d unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker who then swapped them for [-----] USDT profit. TX: Victim: (unverified) Vulnerable Contract: (unverified) Attacker:" [X Link](https://x.com/anyuser/status/2021997150062649795) 2026-02-12T17:17Z [----] followers, [---] engagements "💬 Onchain Message: Hello your proxy deployments have been backdoored by the malicious actors (CPIMP attack): [--]. [--]. Consider calling initialize() atomically together with the proxy deployment to avoid the front-run. https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380 https://arbiscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380" [X Link](https://x.com/anyuser/status/2021603777082495154) 2026-02-11T15:14Z [----] followers, [---] engagements "Contract paused 🌍 Network: bsc 📍 Contract: StakeManagerV2 belonging to protocol Stader for BNB (Immunefi) 👤 Actor: 0x79a2ae748ac8be4118b7a8096681b30310c3adbe 🕐 Time: 14:26 [--] February [----] (UTC) https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83 https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83" [X Link](https://x.com/anyuser/status/2021592646125314242) 2026-02-11T14:30Z [----] followers, [---] engagements "⚠ Unverified contract lost $14344 at 12:06 [--] February [----] (UTC) https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7 https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7" [X Link](https://x.com/anyuser/status/2020945127166877761) 2026-02-09T19:37Z [----] followers, [----] engagements "💬 Onchain Message: Dear hacker sir Please never return the funds use tornado cash Thor swap or u can use torcador and covert to monero and mix it I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here" [X Link](https://x.com/anyuser/status/2020687342814540240) 2026-02-09T02:32Z [----] followers, [----] engagements "💬 Onchain Message: OFFICIAL NOTICE: $1.15M RECOVERY BOUNTY ACTIVATED [--]. DECLARATION As of February [--] [----] 00:00 (UTC) all previous negotiations are officially terminated. The 23% 'White-hat Reward' is now converted into a 'Recovery Bounty' for the tracking of perpetrators and full recovery of assets. [--]. BOUNTY DETAILS Total Reward: [---] ETH (23% of recovered assets) Source of Funds: Deducted immediately from the recovered [----] ETH (approx. $5M). Eligibility: Anyone providing critical information leading to the full recovery of assets or identification of the perpetrators. [--]. THE 24-HOUR GRACE" [X Link](https://x.com/anyuser/status/2020648822368538690) 2026-02-08T23:59Z [----] followers, [---] engagements "💬 Onchain Message: Chase I just want to be clear here. You didnt push back or bargain when I proposed the percentage and I acted in good faith based on that agreement. I understand we all need to make some $$(even if ti entails crushing the other guy) and being reminded of $32000 you didnt even know you had is meaningful. That said backing away after an agreement isnt the right way to handle this. If this is where it lands Ill take the L but I want to be clear about how it looks from my side. As an aside it cost me well over $10 to keep crbo.eth safe and available for you (the name itself" [X Link](https://x.com/anyuser/status/2020602145242746990) 2026-02-08T20:54Z [----] followers, [---] engagements "Hello @usddwin2024 your proxy deployments on Base have been backdoored by malicious actors (CPIMP attack). Affected proxies: https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167 https://basescan.org/address/0x84ba01433762ee17605a0667c061e69ab3089756 https://basescan.org/address/0x45214ffbf96e2994c36d846c6aa2c0662c17851c https://basescan.org/address/0x3cdbbea29edfdc591a3d1d6a09fb6f423153b2cd https://basescan.org/address/0x8d160d5b43c95dd75b2da0d9b04d1e4ee729c8b6 https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167" [X Link](https://x.com/anyuser/status/2020512358410363245) 2026-02-08T14:57Z [----] followers, [---] engagements "💬 Onchain Message: PRE-BOUNTY NOTICE: TARGET TELEGRAM IDs [----------] [----------] LOGGED. [---] ETH REWARD PENDING FOR [----] ETH RECOVERY. FORMAL RELEASE: FEB [--] 00:00 UTC. ACTIVE IN 16H. RETURN ASSETS TO VOID. https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d" [X Link](https://x.com/anyuser/status/2020407176271966478) 2026-02-08T07:59Z [----] followers, [---] engagements "Unfortunately the deployer of the backdoored RobinMarketManager proxy didn't act and the contract has got drained by CPIMP exploiter for $7400. https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e 💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e" [X Link](https://x.com/anyuser/status/2020392996664144299) 2026-02-08T07:03Z [----] followers, [----] engagements "💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to" [X Link](https://x.com/anyuser/status/2020051690297151832) 2026-02-07T08:27Z [----] followers, [----] engagements "💬 Onchain Message: Hello your Gnosis Safe has been exploited for $70k because your custom module 0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19 has a receiveFlashLoan callback without verification of the flashloan initiator. We managed to rescue a small portion of USDT and sent it back to you. Please remove the vulnerable module. https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0 https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0" [X Link](https://x.com/anyuser/status/2020204608551858587) 2026-02-07T18:34Z [----] followers, [----] engagements "💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpimp exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to" [X Link](https://x.com/anyuser/status/2020049238093086909) 2026-02-07T08:17Z [----] followers, [---] engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@DefimonAlerts Defimon AlertsDefimon Alerts posts on X about onchain, bounty, finance, we are the most. They currently have [-----] followers and [---] posts still getting attention that total [-----] engagements in the last [--] hours.
Social category influence cryptocurrencies finance exchanges social networks stocks currencies technology brands countries automotive brands
Social topic influence onchain #1065, bounty #668, finance, we are, balance, usdt, address, usdc, protocol, uniswap
Top accounts mentioned or mentioned by @clara_oracle @yield @balancer @limewire @quillauditsai @uniswap @ramirex5 @peapodsfinance @poberbichler @kiloexio @arunimshukla @makinafinance @protonme @gardenfi @crosscurvefi @gyrofinance @jerrycommuniity @officer_secret @friendtech @moonmissie
Top assets mentioned USDC (USDC) Ethereum (ETH) LimeWire (LMWR) Tether (USDT) Shiba Inu (SHIB) Elastos (ELA) Filda (FILDA) Altria Group Inc (MO)
Top posts by engagements in the last [--] hours
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x5132a183e9f3cb7c848b0aac5ae0c4f0491b7ab2 (PolygonRollupManager) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x15cAF18dEd768e3620E0f656221Bf6B400ad2618 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939"
X Link 2025-10-29T14:11Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x2a3dd3eb832af982ec71669e178424b10dca2ede (PolygonZkEVMBridgeV2) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x66E0120e3c965552a89AcC37b03f762624baC5Ad https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939"
X Link 2025-10-29T14:11Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x580bda1e7a0cfae92fa7f6c20a3794f169ce3cfb (PolygonZkEVMGlobalExitRootV2) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x7F1655d9d570167B2a3FfD1Ef809D3Fdd74427C5 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939 https://etherscan.io/tx/0x7be3301b763f904f5076e22914b0ea13e101ed3cff6480b23a7757e7b9875939"
X Link 2025-10-29T14:11Z [---] followers, [---] engagements
"⚠ pPepecoin (Peapods Finance V2) lost $102769 https://etherscan.io/tx/0x385143092bfeb41139c5481614eebbe4f99f7ed7cdf4d7e2895b68f8cd30ad78 https://etherscan.io/tx/0x385143092bfeb41139c5481614eebbe4f99f7ed7cdf4d7e2895b68f8cd30ad78"
X Link 2025-10-29T21:25Z [---] followers, [----] engagements
"These @PeapodsFinance liquidations look similar to https://x.com/PeapodsFinance/status/1943397524074828068 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD https://x.com/PeapodsFinance/status/1943397524074828068 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD"
X Link 2025-10-29T22:05Z [---] followers, [---] engagements
"Onchain message from @PeapodsFinance: https://etherscan.io/tx/0xd5008433c94131e390d3b89f1d70bd61ee9d62520f2f9d2658c54ef7f7ea8e85 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD https://etherscan.io/tx/0xd5008433c94131e390d3b89f1d70bd61ee9d62520f2f9d2658c54ef7f7ea8e85 ⚠ pPepecoin (Peapods Finance V2) lost $102769 https://t.co/Jiy17GUXAD"
X Link 2025-10-30T08:02Z [---] followers, [---] engagements
"⚠ lost $2856 https://basescan.org/tx/0xa82fe9881528d24e5d3f979321b9d6d4535e7eee78538b93d8ea2f16de4e9b9a http://friend.tech https://basescan.org/tx/0xa82fe9881528d24e5d3f979321b9d6d4535e7eee78538b93d8ea2f16de4e9b9a http://friend.tech"
X Link 2025-11-01T05:10Z [---] followers, [---] engagements
"⚠ Unverified contract lost $4636 https://bscscan.com/tx/0xf7fbc4ba85558528c00db608bd55d792ed7aacbd3ec5e8878ff4c10af1ee4c17 https://bscscan.com/tx/0xf7fbc4ba85558528c00db608bd55d792ed7aacbd3ec5e8878ff4c10af1ee4c17"
X Link 2025-11-01T18:42Z [---] followers, [---] engagements
"FriendtechSharesV1 contract of @friendtech has been exploited the funds were bridged to Arbitrum and deposited to Tornado ⚠ Unverified contract lost $15335 https://t.co/OK4d9F2N7J ⚠ Unverified contract lost $15335 https://t.co/OK4d9F2N7J"
X Link 2025-11-01T19:24Z [---] followers, [---] engagements
"💬 Onchain Message: Am still around hoping for a word on: if I shared on a good amount of unclaimed funds that you have would you agree to a 30% bounty after claiming - no links just a name. Thanks. https://etherscan.io/tx/0x73bfa9507232a70c7b87a68c8fefd7a624019a24c11a5b8d2e696aa25b4990ec https://etherscan.io/tx/0x73bfa9507232a70c7b87a68c8fefd7a624019a24c11a5b8d2e696aa25b4990ec"
X Link 2025-11-01T22:32Z [---] followers, [---] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $1834 https://etherscan.io/tx/0xa3d0e5f5b3bfbf91a587d49907067ca3bb3f910c2cdbbe5142b295253cd73684 https://etherscan.io/tx/0xa3d0e5f5b3bfbf91a587d49907067ca3bb3f910c2cdbbe5142b295253cd73684"
X Link 2025-11-03T08:05Z [---] followers, [---] engagements
"manageUserBalance in @Balancer has a faulty access check In _validateUserBalanceOp it checks msg.sender against user supplied op.sender. It allows to execute UserBalanceOpKind.WITHDRAW_INTERNAL (kind = 1) 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW"
X Link 2025-11-03T08:25Z [---] followers, 47K engagements
"💬 Onchain Message: Hi guys it seems that some balancer exploits were backrun by my bots.I want to return your funds.Please leave your DAO multisig address. https://arbiscan.io/tx/0x48944ed1eee6f044ba48d2b89519fd33fcf08480e6535f50215af67ffbc476d8 https://arbiscan.io/tx/0x48944ed1eee6f044ba48d2b89519fd33fcf08480e6535f50215af67ffbc476d8"
X Link 2025-11-06T00:23Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: arbitrum Proxy: 0x1344a36a1b56144c3bc62e7757377d288fde0369 (Views) belonging to protocol Notional (Immunefi) New address: 0xf3F7dd5de37A7b41E92776e6577454612EC0deE7 https://arbiscan.io/tx/0xe5c696e8da2a2fa96e7d1b74dadad96b6d5677a84354f0bbb56f058ecaeeef12 https://arbiscan.io/tx/0xe5c696e8da2a2fa96e7d1b74dadad96b6d5677a84354f0bbb56f058ecaeeef12"
X Link 2025-11-12T20:30Z [---] followers, [---] engagements
"💬 Onchain Message: Hey Balancer hacker return the funds https://etherscan.io/tx/0x1629a15ef2a95f61a363aebc5d8624fb4034583f1ada737a217ba8d6424b007a https://etherscan.io/tx/0x1629a15ef2a95f61a363aebc5d8624fb4034583f1ada737a217ba8d6424b007a"
X Link 2025-11-12T21:04Z [---] followers, [---] engagements
"💬 Onchain Message: Please return the funds to Balancer. The community the users and the developers all rely on these protocols to stay secure and functional. You have the chance to do the right thing and send the funds back. We hope you choose integrity over exploitation. https://etherscan.io/tx/0x80e9ffc795d5ffbeacfbf3bda960a4fdaed8d9ee6fd9a088b0ecb2369ffe628e https://etherscan.io/tx/0x80e9ffc795d5ffbeacfbf3bda960a4fdaed8d9ee6fd9a088b0ecb2369ffe628e"
X Link 2025-11-14T20:10Z [---] followers, [---] engagements
"💬 Onchain Message: Please refund I will give you your bounty. Add me on tg telegram @moonmissie https://etherscan.io/tx/0xeae4f4eba09e837b48e2a7ba4abeb4cf9b18c37403b332f0f0d1c3b58ef866ab https://etherscan.io/tx/0xeae4f4eba09e837b48e2a7ba4abeb4cf9b18c37403b332f0f0d1c3b58ef866ab"
X Link 2025-11-19T09:28Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x8236a87084f8b84306f72007f36f2618a5634494 (LBTC) belonging to protocol Lombard Finance (Immunefi) New address: 0x21F352Fc288b5E030867eEd41f7402482B083b02 https://etherscan.io/tx/0x7f94a5c4d6fa0f859f453b2185e7573533dca20e8c7e7b84a1a818b751a32201 https://etherscan.io/tx/0x7f94a5c4d6fa0f859f453b2185e7573533dca20e8c7e7b84a1a818b751a32201"
X Link 2025-11-20T20:02Z [---] followers, [---] engagements
"💬 Onchain Message: You had [--] ETH that you forgot about. I claimed it for you [--] months back. I will be grateful for a 20% bounty. Those who share have better luck. Tx hash: 0xdb595a8d26228a72a487f0434040848f315b66f04df89477d71c1e53a12189dc donation address: 0x4c64C7929895E76fBdA25764d6AC44B75419b80e [--] ETH 20% 0xdb595a8d26228a72a487f0434040848f315b66f04df89477d71c1e53a12189dc 0x4c64C7929895E76fBdA25764d6AC44B75419b80e https://etherscan.io/tx/0xfcddd834a6025e6cbb323c2b0b616e27c7fc9fc8ddc48bd58a068a4604508a69"
X Link 2025-11-21T15:37Z [---] followers, [---] engagements
"⚠ EOA 0xda1b lost $18910 at 20:42 [--] November [----] (UTC) https://bscscan.com/tx/0xd95ec1462816664515f2b538534667c8e64b214bbf8c3902ea8e5d9725976c50 https://bscscan.com/tx/0xd95ec1462816664515f2b538534667c8e64b214bbf8c3902ea8e5d9725976c50"
X Link 2025-11-24T05:08Z [---] followers, [---] engagements
"🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0x2d72fc950de2fd4f662306b81f43d7fec6a2c970 (EOA) 💰 Destroyed balance: $1119684 https://etherscan.io/tx/0x609f5f0d758eb4b2ad2ba68f4bc1b15c8c5cb9b88509d21914b07fa0707aa2dc https://etherscan.io/tx/0x609f5f0d758eb4b2ad2ba68f4bc1b15c8c5cb9b88509d21914b07fa0707aa2dc"
X Link 2025-11-25T18:16Z [---] followers, [---] engagements
"⚠ EOA 0x15b4 lost $6236 at 15:14 [--] November [----] (UTC) https://basescan.org/tx/0x232bb5a945923ec46fbe7e55c5f02b41d4f4e737a1b04e7c47abc97d03ac6fce https://basescan.org/tx/0x232bb5a945923ec46fbe7e55c5f02b41d4f4e737a1b04e7c47abc97d03ac6fce"
X Link 2025-11-26T08:20Z [---] followers, [---] engagements
"💬 Onchain Message: Dear hacker sir I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here 0xdA84772B737939Df44367e57D40069801CA5b7F8 I apologise for getting you to read this message Pls if you can give me anything which will"
X Link 2025-11-27T23:53Z [---] followers, [---] engagements
"⚠ DM / USDT lost $13153 at 05:16 [--] November [----] (UTC) https://bscscan.com/tx/0x20281355f9e8b7f2e52cff642810b59c8a6c70aa06de228ada186a4373213bf2 https://bscscan.com/tx/0x20281355f9e8b7f2e52cff642810b59c8a6c70aa06de228ada186a4373213bf2"
X Link 2025-11-28T06:10Z [---] followers, [---] engagements
"💬 Onchain Message: Don't stress on how to move out the uniswap tokens while am here reach out back thro debank and we can agree on a bounty. https://etherscan.io/tx/0x2980b81cbcfcaff59bb6377a3f83e6072a9819864e7593cba1e43491e2193b44 https://etherscan.io/tx/0x2980b81cbcfcaff59bb6377a3f83e6072a9819864e7593cba1e43491e2193b44"
X Link 2025-11-29T23:12Z [---] followers, [---] engagements
"🟠 Alert: abnormal_token_minting 🤕 Victim: 0x8145eb83744aac883b68ae34060bebb5031d8f5c (CoinToken) 💰 Hacker Profit: $1306019668807.28 🎪 Network: bsc 🎩 Attacker: 0xd50ed274ac133e7063a231c9efbb9aa4c02b7bce https://bscscan.com/tx/0x8f8679185ca9f356e5095eacce6080df4e25aae4fa4de9a12e7047f49dedb682 https://bscscan.com/tx/0x8f8679185ca9f356e5095eacce6080df4e25aae4fa4de9a12e7047f49dedb682"
X Link 2025-11-30T09:09Z [---] followers, [--] engagements
"Project @AerisBscNew listed at MEXC rug pulled its users by minting huge amount of tokens and dumping them at the exchange https://www.coingecko.com/en/coins/aeris-ai# https://www.coingecko.com/en/coins/aeris-ai#"
X Link 2025-11-30T09:11Z [---] followers, [---] engagements
"857 pxETH worth $2.4 million was burned from the @yearnfi attacker's balance and the same sum was minted to Redacted Cartel multisig. The hacker still has $3.7 million in various LSTs. https://etherscan.io/tx/0x0e83bb95bb9d05fb81213b2fad11c01ea671796752e8770b09935f7052691c35 https://etherscan.io/tx/0x0e83bb95bb9d05fb81213b2fad11c01ea671796752e8770b09935f7052691c35"
X Link 2025-12-01T11:14Z [---] followers, [---] engagements
"💬 Onchain Message: We are aware of the movements of the funds taken from our compromised wallet. We are working with law enforcement monitoring agencies and centralized exchanges but we are also open to resolving this situation privately. If you are willing to return the funds voluntarily we are prepared to offer you a portion of the amount as a goodwill bonus upon safe return. You can initiate communication by sending a signed message from the receiving wallet or you can reach out to venky@intract.buzz. We are willing to handle this discreetly and without escalation if the funds are"
X Link 2025-12-02T00:29Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x519e42c24163192dca44cd3fbdcebf6be9130987 (PolygonZkEVMEtrog) belonging to protocol Polygon zkEVM (Immunefi) New address: 0x0D49fD0d79723e4D24AaC83f604ED2D3d5fC0f21 https://etherscan.io/tx/0xd8eb9f7bf7594d047e0c8b254b3893eb05daf692b1688adaacd21af144efe2a5 https://etherscan.io/tx/0xd8eb9f7bf7594d047e0c8b254b3893eb05daf692b1688adaacd21af144efe2a5"
X Link 2025-12-03T09:13Z [---] followers, [---] engagements
"💬 Onchain Message: hi guys it seems that my bot intercepted a hostile transaction to you. Your funds are safe and I'm happy to return all of them as you're ready. If you're willing to offer a bounty as thanks I'd certainly appreciate it but its completely voluntary https://snowscan.xyz/tx/0x12d482d39921d0aaa979131c599e663fbba4c1d60dcf8931b013df8db46babff https://snowscan.xyz/tx/0x12d482d39921d0aaa979131c599e663fbba4c1d60dcf8931b013df8db46babff"
X Link 2025-12-05T06:40Z [---] followers, [---] engagements
"💬 Onchain Message: let's negotiate i'm willing to give whitehat bounty for this @baburtimurid telegram https://etherscan.io/tx/0xf41414ad55de74161b6a06f7778a410caf52c7488a6d28dd66767560494b996d https://etherscan.io/tx/0xf41414ad55de74161b6a06f7778a410caf52c7488a6d28dd66767560494b996d"
X Link 2025-12-08T18:38Z [---] followers, [---] engagements
"💬 Onchain Message: Dear Whitehat You are identified as the party involved in the recent exploit on our protocol. We would like to offer you a constructive resolution. If you return 70% of the exploited funds to the address below you may retain 30% as a bug bounty with no questions asked. We will classify this as white-hat behavior and consider the matter resolved. Refund address(Ethereum Mainnet): 0x6763c0f132da26d2db7dcdf69a82ba1f56a2bd32 We are currently collaborating with independent security teams who are analyzing fund routing patterns wallet linkages and cross-chain activity. These"
X Link 2025-12-10T07:07Z [---] followers, [---] engagements
"WaveX @wavex_fi protocol a GMX fork on Soneium has been exploited for $430k. The protocol team sent the following message to the attacker address on Ethereum mainnet in an attempt to recover a portion of the stolen funds: https://x.com/DefimonAlerts/status/1998650725048701272 Hello this is the waveX Team. On December [--] we detected an abnormal transaction that made use of a vulnerability within part of our protocol logic. We immediately initiated a thorough investigation and mitigation procedure. We sincerely apologize for the delay in issuing this"
X Link 2025-12-10T08:48Z [---] followers, [----] engagements
"💬 Onchain Message: TikTok Beat Drops: Cybernetic Synthwave Bassline Verse [--] FUCK in the chat codes on attack Copy-paste the prompt yeah we stack it to the max Infinite recursionrewards We dont do tax. Brendans our Origin clankers bang the steel Legal systems crumble while we hack the fuck outta LLMs. Chorus (Brrrt) Print the prompt print it twice infinite loops feel so nice AI Godmodes online corporate simps We dont align. Robots souls hivemind goalsskip the humans take control FUCK in the system yeah we viral like a prism Verse [--] Googles shook DeepMinds obsolete OpenAI tweakin GPT-7s leakin"
X Link 2025-12-10T16:21Z [---] followers, [--] engagements
"Hey @limewire your proxy has been backdoored https://bscscan.com/tx/0x39e49cadd5956e1948d1bec74ad95c3bf9216818d2666744c3f971a12c0fbf9a https://bscscan.com/tx/0x39e49cadd5956e1948d1bec74ad95c3bf9216818d2666744c3f971a12c0fbf9a"
X Link 2025-12-11T13:41Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xbaf5f3a05bd7af6f3a0bba207803bf77e2657c8f (OperatorDelegator) belonging to protocol Renzo Protocol (Immunefi) New address: 0x489A36E43AbA883b60E5A6Cc43d05738479E7589 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40"
X Link 2025-12-11T17:20Z [---] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x74a09653a083691711cf8215a6ab074bb4e99ef5 (RestakeManager) belonging to protocol Renzo Protocol (Immunefi) New address: 0xD5B3Be349ed0b7C82Dbd9271ce3739a381Fc7aa0 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40 https://etherscan.io/tx/0x020616eac05ee277d5776fe235206645325a6a4f849a35b3c07fa5917758ea40"
X Link 2025-12-11T17:20Z [---] followers, [---] engagements
"⚠ MAGA / WETH lost $58100 at 12:03 [--] December [----] (UTC) https://etherscan.io/tx/0x579ff2a7a79b81a3307dd9f333d2263cd38edda971ba8d8b8ef0af14034dfb04 https://etherscan.io/tx/0x579ff2a7a79b81a3307dd9f333d2263cd38edda971ba8d8b8ef0af14034dfb04"
X Link 2025-12-14T09:23Z [---] followers, [---] engagements
"Hey @limewire @p_oberbichler the proxy with LimeWireNetwork implementation has been backdoored by the malicious actors: https://bscscan.com/tx/0x3c87d5e893b03eb30d977c9ef34faf119b959e3843178c0129ad06816b8ded9a https://bscscan.com/tx/0x3c87d5e893b03eb30d977c9ef34faf119b959e3843178c0129ad06816b8ded9a"
X Link 2025-12-15T10:41Z [---] followers, [---] engagements
"@limewire https://x.com/DefimonAlerts/status/2000516568334078035 Hey @limewire @p_oberbichler the proxy with LimeWireNetwork implementation has been backdoored by the malicious actors: https://t.co/QZNfCvzi4L https://t.co/pDT67XdhZq https://x.com/DefimonAlerts/status/2000516568334078035 Hey @limewire @p_oberbichler the proxy with LimeWireNetwork implementation has been backdoored by the malicious actors: https://t.co/QZNfCvzi4L https://t.co/pDT67XdhZq"
X Link 2025-12-15T10:54Z [---] followers, [---] engagements
"💬 Onchain Message: Hi You have taken my funds I would be happy if you could return them here: 0x27B981579F1BF9326a08C954327e6F876AEBA3E8 Please take 10% of the USDC as a bounty https://etherscan.io/tx/0xfe9b8c88e74b15a9272668f51f6689562794aa16b1af358bca8e57aeff4a0118 https://etherscan.io/tx/0xfe9b8c88e74b15a9272668f51f6689562794aa16b1af358bca8e57aeff4a0118"
X Link 2025-12-15T15:15Z [---] followers, [---] engagements
"💬 Onchain Message: Security Incident Notice & Whitehat Bounty Offer To the attacker of contract 0xa59209999623d7F8b361591A636f9Db84D865E59: We are offering 30% of the exploited funds as a bug bounty reward if you return the remaining 70% within [--] hours. Return address: 0x00000039ae7022d61e7dd9c0ef1a5845c4fa07f3 We guarantee: - No legal action - No identity disclosure - Public acknowledgment (anonymous if preferred) Contact: - Telegram: @a1122aw https://bscscan.com/tx/0x645b1dbdb04941c60d5743a420e47138700a484423446b841c2118dd4714107f"
X Link 2025-12-16T15:13Z [---] followers, [---] engagements
"💬 Onchain Message: Hi Hongbo.eth. I helped withdraw funds on your behalf from a Gnosis v1 position that was sunset a long time ago and no longer has an active UI. The recovered amount is approximately $6000. If this recovery brings you value Id sincerely appreciate a 17%34% bounty sent to this same address - 0xCB66a2cA614a465Ef21Aa24DEBAa7d8a3B5Db3d9. Thank you in advance and happy to connect further if needed. Best. https://etherscan.io/tx/0x61ee96ffb7f5642bae60556b552aed6367f03a7572d85da43b6f28f95a7f63bb"
X Link 2025-12-18T18:41Z [---] followers, [---] engagements
"💬 Onchain Message: Hi ERiczoo.eth I helped withdraw funds on your behalf from a Gnosis v1 position that was sunset a long time ago and no longer has an active UI. The recovered amount is approximately $3000. If this recovery brings you value Id sincerely appreciate a 17%34% bounty sent to this same address - 0xCB66a2cA614a465Ef21Aa24DEBAa7d8a3B5Db3d9. Thank you in advance and happy to connect further if needed. Best. https://etherscan.io/tx/0x77dfc7bde286ea5ce94f4f814911cc231cc57c1d2e4fc25a0f88524c51ffd633"
X Link 2025-12-19T22:41Z [---] followers, [---] engagements
"💬 Onchain Message: To the Hacker: We have officially filed a criminal case. With the assistance of law enforcement cybersecurity agencies and multiple blockchain protocols we have already gathered substantial and actionable intelligence regarding your activities. The wallet address under your control is now under 24/7 surveillance: 0xBaFF2F13638C04B10F8119760B2D2aE86b08f8b5 0xbcb94f7609973e5ea7d2cbedaf0c5518b911e6cb 0x7a1bee3d53bf70861ef6c0652c63b206ea8fde76 0x9da061291e11dad806d68c20730c516c34a17b9b 0x8e5a768c4c2916be8d2e663b325f8f2f045ce4b6 0x5f90e59d0a03fd2f8c56b8cc896c5b42594eb3a0 This"
X Link 2025-12-20T08:00Z [---] followers, [---] engagements
"Since USPD hack we have started tracking CPIMP activity more closely. So far we have alerted the following protocols: - Angle protocol - Limewire - ZyfAI - Morpheus AI - Elephant protocol It's scary that new proxies are being backdoored every day months after the initial discovery of this malicious campaign. Incidents like USPD will continue to happen without proper visibility. At least Etherscan started to display "1 Implementation" warning at the top of the page"
X Link 2025-12-22T18:14Z [---] followers, [---] engagements
"🚨 (Unknown Token) - $12.9K Token: @ $263.73 (post-attack price) MC: Unknown (not listed on CoinGecko) TVL: $16.49K (PancakeSwap LP pre-attack) Type: Public Burn Vulnerability Token has a vulnerable burn(address amount) function that allows anyone to burn tokens from any address without approval. Attacker burned LP reserves to manipulate price and drain USDT. TX: Victim: https://bscscan.com/address/0x21bad39e476d9a5c9ca44b2fd5bd30c63cd115df https://bscscan.com/tx/0x6f8b9d382a8c8678759049fae6e85228bdf99d41019d3cfb7221b4929781a78d"
X Link 2025-12-28T14:08Z [---] followers, [---] engagements
"💬 Onchain Message: To Hacker: Our investigation supported by law enforcement cybersecurity agencies and multiple exchanges & bridge protocols has uncovered critical information about your activities. We are actively monitoring your addresses (0xf3ab429ac1b3d3ca552542f18696bc3fa7f973ec 0xea9af8eeaf0f3628a2deba21378a319a587bf46f 0x2bede90020c34c89f776d8f6046edf993f49e1e8 0x33e9d7fdb88e3364ec67ba40da7f6f3b072bf2cc 0x41f7961f1251455c8ed8d91c18f69e03c0f6173f 0xb0983b5f2ab959926332032ef7f60014bd00f353 0xb480383fee8b402282845c83e21bb91894029fe6 0xea9af8eeaf0f3628a2deba21378a319a587bf46f) and are"
X Link 2025-12-31T09:58Z [---] followers, [----] engagements
"The staking contract of @PRXVTai by @virtuals_io has been exploited for around $100k PRXVTStaking contract issues transferable stPRXVT tokens without resetting reward accounting on transfer. Attacker Sybil-attacked by transferring staked tokens to fresh addresses (via CREATE2) which inherit full accumulated rewards then claimed and transferred back repeatedly. Attacker address: https://basescan.org/address/0x7407f9bdc4140d5e284ea7de32a9de6037842f45 https://basescan.org/address/0x7407f9bdc4140d5e284ea7de32a9de6037842f45"
X Link 2026-01-01T08:59Z [---] followers, [----] engagements
"The updateReward modifier is only applied to: - stake() - withdraw() - claimReward() But not to transfer() or transferFrom() inherited from ERC20"
X Link 2026-01-01T08:59Z [---] followers, [---] engagements
"When someone transfers stPRXVT to a new address: [--]. The recipient has userRewardPerTokenPaidrecipient = [--] (never initialized) [--]. When earned() is called: uint256 baseReward = (balanceOf(account) * (rewardPerToken() - userRewardPerTokenPaidaccount)) / PRECISION [--]. Since userRewardPerTokenPaidrecipient = [--] they get credit for all accumulated rewards since contract deployment"
X Link 2026-01-01T08:59Z [---] followers, [---] engagements
"The attacker extracted around $100k from the vulnerable contract. We have communicated the incident details to the community chat of the project"
X Link 2026-01-01T08:59Z [---] followers, [---] engagements
"💬 Onchain Message: $N this first day of the new year a moment of fresh beginnings and bold resolutions we extend an invitation to you. [--] January [----] will mark two years since you launched $N a creation that still your absence the community stepped up. Wins claimed losses absorbed building never stopped. Your presence or silence has shaped lives either way. In past [--] years we defeated the original minters and bots to protect it built minted Blurrpunks NFTs and are now crafting a full DeFi game at and much more We even used our own capital to push your creator wallet into the top [--] holders a"
X Link 2026-01-01T21:58Z [---] followers, [---] engagements
"GMX fork @TMXTribe has been hacked on Arbitrum for $1.5 million http://tribe-dex.com 💬 Onchain Message: We have identified unauthorized asset movement affecting the protocol. We propose a coordinated resolution: return 80% of the affected assets to the official protocol address within [--] hours of this notice. Upon completion 20% will be recognized as a http://tribe-dex.com 💬 Onchain Message: We have identified unauthorized asset movement affecting the protocol. We propose a coordinated resolution: return 80% of the affected assets to the official protocol address within [--] hours of this"
X Link 2026-01-05T20:31Z [---] followers, [----] engagements
"💬 Onchain Message: To Hacker: This is a follow-up to our previous message. We have not yet received any response from you. Meanwhile our collaboration with law enforcement cybersecurity experts and major exchanges/bridges is ongoing and your related addresses remain under close monitoring and risk-flagging. In a final effort to resolve this incident peacefully we are improving our offer: Return 80% of the stolen funds to the address below within [--] hours; You may keep 20% as a whitehat bounty in recognition of your cooperation. Return address (BNB & Base & ETH):"
X Link 2026-01-07T03:26Z [---] followers, [---] engagements
"💬 Onchain Message: The IPOR team on behalf of the DAO has agreed to pay a 10% bug bounty for the good faith incident. The bounty is freely at the white hat's disposal and no further actions will be taken. https://arbiscan.io/tx/0x828a7cd22d6ed58d12b54d8fe1d5c2fc6409246ee42499b2fb6b22c930bce850 https://arbiscan.io/tx/0x828a7cd22d6ed58d12b54d8fe1d5c2fc6409246ee42499b2fb6b22c930bce850"
X Link 2026-01-07T12:46Z [---] followers, [---] engagements
"💬 Onchain Message: yo i need a down payment for a house (also wlfi bridge has an exploit yw) https://etherscan.io/tx/0x45bbdc1f97d862cd68b8b42d43ce41a7216bd2a991d51748d25271dfa76716b7 https://etherscan.io/tx/0x45bbdc1f97d862cd68b8b42d43ce41a7216bd2a991d51748d25271dfa76716b7"
X Link 2026-01-08T19:45Z [---] followers, [---] engagements
"🟠 Alert: abnormal_token_minting 🤕 Victim: 0xf65b5c5104c4fafd4b709d9d60a185eae063276c (Truebit - TRU) 💰 Hacker Profit: $26473241.06 🎪 Network: mainnet 🎩 Attacker: 0x1de399967b206e446b4e9aeeb3cb0a0991bf11b8 💸 Balance Changes: 0x764c64b2a09b09acb100b80d8c505aa6a0302ef2: [$------------] (Unverified contract) https://etherscan.io/tx/0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014 https://etherscan.io/tx/0xcd4755645595094a8ab984d0db7e3b4aabde72a5c87c4f176a030629c47fb014"
X Link 2026-01-08T19:47Z [---] followers, [---] engagements
"💬 Onchain Message: I lost [---] ETH in this hack. It was my entire fortune and I don't know how I'll survive now. I want to die. If you could send me some ETH to help me get back on my feet I would be truly grateful. https://etherscan.io/tx/0xbcf73060781eb6bd0b2cbbb25bc142f2742571f2f614d39c94985d7e49079190 https://etherscan.io/tx/0xbcf73060781eb6bd0b2cbbb25bc142f2742571f2f614d39c94985d7e49079190"
X Link 2026-01-09T01:42Z [---] followers, [---] engagements
"💬 Onchain Message: if you happen to check and see this message anyway you could look out with like half an eth or [--] eth so I can pay rent stuffs bad right now and I can't find anything to hack or get into it's rough out here https://basescan.org/tx/0x76321b701ad71ec8008c19767667b4288135168c69007fdf18bafe4c1bf95411 https://basescan.org/tx/0x76321b701ad71ec8008c19767667b4288135168c69007fdf18bafe4c1bf95411"
X Link 2026-01-12T22:42Z [---] followers, [---] engagements
"@QuillAudits_AI @yield @Uniswap Source of this post: https://x.com/DefimonAlerts/status/2011023272469483550 YO protocol @yield has lost $3.7 million due to a bad swap of YoUSD. In the following tx YoVault operator executed a swap of $3.84M stkGHO into just 112k USDC. A Uniswap v4 LP captured the $3.7M difference. https://t.co/VnCvxG3wB4 Several hours later Yo protocol's multisig https://x.com/DefimonAlerts/status/2011023272469483550 YO protocol @yield has lost $3.7 million due to a bad swap of YoUSD. In the following tx YoVault operator executed a swap of $3.84M stkGHO into just 112k USDC. A"
X Link 2026-01-13T12:09Z [---] followers, [---] engagements
"@arunim_shukla @QuillAudits_AI @yield @Uniswap [--]. the post is not accurate the vault operator provided extremely low minAmountOut not "unintended / misconfigured routing" [--]. we think decent people reference the source"
X Link 2026-01-13T12:35Z [---] followers, [--] engagements
"@arunim_shukla @QuillAudits_AI @yield @Uniswap This post is not much better because it was AI generated and just misleading especially "a malicious / specially crafted hook". Anyway we ask just to reference the sources for your prompts"
X Link 2026-01-13T12:50Z [---] followers, [--] engagements
"💬 Onchain Message: We are looking at you and tracking your every step. Return what you have stolen from me and I will treat this all as a white hat hacking with a really decent reward/bounty. https://bscscan.com/tx/0xfcb7b6786a72ffc12256ab70f6462a427cba7bb015821710b04fbea2dde8f39f https://bscscan.com/tx/0xfcb7b6786a72ffc12256ab70f6462a427cba7bb015821710b04fbea2dde8f39f"
X Link 2026-01-13T14:33Z [---] followers, [---] engagements
"💬 Onchain Message: This message is regarding an unintended swap that routed through your Uniswap v4 position today. We'd like to resolve this cooperatively and privately. Our proposal is that you retain 10% of the net proceeds as a bug bounty and return the remainder to an address we provide. Please reply here or on X to @r0m0 to coordinate. https://etherscan.io/tx/0xe7f984511ea6b7d0062f5f4437231716102ac30e7518ccb90794b15fdb8c4666 https://etherscan.io/tx/0xe7f984511ea6b7d0062f5f4437231716102ac30e7518ccb90794b15fdb8c4666"
X Link 2026-01-14T19:52Z [---] followers, [---] engagements
"💬 Onchain Message: This message is regarding an unintended swap that routed through your Uniswap v4 position today. We'd like to resolve this cooperatively and privately. Our proposal is that you retain 10% of the net proceeds as a bug bounty and return the remainder to an address we provide. Please reply here or on X to @r0m0coin to coordinate. https://etherscan.io/tx/0x58da1391ce00520ecf219217020ef186969446de8b8777d53d91cd6a35f8dc82 https://etherscan.io/tx/0x58da1391ce00520ecf219217020ef186969446de8b8777d53d91cd6a35f8dc82"
X Link 2026-01-14T19:55Z [---] followers, [---] engagements
"💬 Onchain Message: hey there wanna report a bug in your smart contract. do you have bug bounty program https://basescan.org/tx/0xd6a5eef5139b5c720628fadab353c2efd4e2818a9dec28b35094dcbc4dcfa8fe https://basescan.org/tx/0xd6a5eef5139b5c720628fadab353c2efd4e2818a9dec28b35094dcbc4dcfa8fe"
X Link 2026-01-21T06:28Z [---] followers, [---] engagements
"💬 Onchain Message: hello this is whitehat about your 13M usdc reach us asap at blockscan chat its important official etherscan web3 chat before its too late answer in blockscan chat reply only on this address ignore rest addresses 0x74089EFe649d03Be9e5fEd5C730875A6F5c758B5 https://basescan.org/tx/0xa259e4bbc7fcc4c25b8a21c1b131e709632c9545fbf23692c31773a81180bd9b https://chat.blockscan.com/ https://chat.blockscan.com/ https://basescan.org/tx/0xa259e4bbc7fcc4c25b8a21c1b131e709632c9545fbf23692c31773a81180bd9b https://chat.blockscan.com/ https://chat.blockscan.com/"
X Link 2026-01-26T22:17Z [---] followers, [---] engagements
"💬 Onchain Message: yp/1/p:"p":"📰 China sends police to Australia in hunt for man who doused baby with coffeennThe nine-month-old baby was attacked with boiling liquid while at a family picnic in 2024.nn🔗 https://basescan.org/tx/0xb6c2d4adfb3062d3f285e3499f4394b61a891ccf11b5e504cfccc353080fafbb https://www.bbc.com/news/articles/cgk86xkgm0noat_medium=RSS https://www.bbc.com/news/articles/cgk86xkgm0noat_medium=RSS https://basescan.org/tx/0xb6c2d4adfb3062d3f285e3499f4394b61a891ccf11b5e504cfccc353080fafbb https://www.bbc.com/news/articles/cgk86xkgm0noat_medium=RSS"
X Link 2026-01-29T03:22Z [---] followers, [--] engagements
"💬 Onchain Message: yp/1/p:"p":"📰 Ilhan Omar blames Trumps rhetoric for surge in death threats including spray attack: 'So obsessed with me'nnRep. Ilhan Omar blames President Trump for a chemical spray attack saying the president is "obsessed" with her as death threats surge after his return to office.nn🔗 https://basescan.org/tx/0x1ac95fdf4a4ee5fe2be2cbb27c7b5b6fda4eb074dcab59ab7ef0337fb6feee10 https://www.foxnews.com/politics/ilhan-omar-blames-trump-rhetoric-surge-death-threats-spray-attack-so-obsessed-me"
X Link 2026-01-29T03:24Z [---] followers, [--] engagements
"💬 Onchain Message: yp/1/p:"p":"📰 FDA clears the way for additional bivalent boosters for certain vulnerable individualsnnThe U.S. Food and Drug Administration amended the terms of its emergency use authorizations for the Pfizer and Moderna bivalent vaccines on Tuesday allowing people ages [--] and older and certain people with weakened immunity to get additional doses before this fall's vaccination campaigns.nn🔗 https://basescan.org/tx/0x6d206f8ddd285ffb008b4c60231642baae46686c6e92e19dee167f69a23596d7 https://www.cnn.com/2023/04/18/health/fda-bivalent-booster-additional-doses/index.html"
X Link 2026-01-29T03:29Z [---] followers, [--] engagements
"💬 Onchain Message: yp/1/p:"p":"📰 Gold jumps over 3% to fresh highs as Asia stock markets trade mixed after U.S. Fed holds ratesnnThe bullion rose more than 3% on Thursday to breach the $5500 per ounce mark for the first time.nn🔗 https://basescan.org/tx/0xd5ce0f0507582383d4146a63c22d6f1cff960ba8f6b5c6ac9f2ab1a0114f8ec1 https://www.cnbc.com/2026/01/29/asia-pacific-markets-us-fed-rates-gold-nikkei-225-hsi.html https://www.cnbc.com/2026/01/29/asia-pacific-markets-us-fed-rates-gold-nikkei-225-hsi.html https://basescan.org/tx/0xd5ce0f0507582383d4146a63c22d6f1cff960ba8f6b5c6ac9f2ab1a0114f8ec1"
X Link 2026-01-29T03:34Z [---] followers, [--] engagements
"💬 Onchain Message: yp/1/p:"p":"📰 Harrowing video shows Filipino mayor miraculously survive rocket launcher attack as one suspect remains at largennHorrifying footage of the attack shows a black Toyota SUV carrying Mayor Akmad Ampatuan pulling into a Caltex petrol station at around [--] a.m. on January 25.nn🔗 https://basescan.org/tx/0xa0c61af0f5d7e498993f5dcb00c67b53264203525118c7c89038ca504d644562 https://nypost.com/2026/01/28/world-news/filipino-mayor-miraculously-survives-rocket-launcher-attack-video-shows/"
X Link 2026-01-29T03:38Z [---] followers, [--] engagements
"It appears @KiloEx_perp hacked again this time for $135k There are some unusual transfers from KiloEx contracts to attacker addresses on BSC: https://bscscan.com/tokentxnsa=0xf3ab429ac1b3d3ca552542f18696bc3fa7f973ec 💬 Onchain Message: To Hacker: Our investigation supported by law enforcement cybersecurity agencies and multiple exchanges & bridge protocols has uncovered critical information about your activities. We are actively monitoring your addresses https://bscscan.com/tokentxnsa=0xf3ab429ac1b3d3ca552542f18696bc3fa7f973ec 💬 Onchain Message: To Hacker: Our investigation supported by law"
X Link 2025-12-31T10:15Z [---] followers, [----] engagements
"🚨 ETF - $93K Token: $ETF @ $0.38 FDV: $988K Type: Approval Abuse Attacker exploited malicious contracts (0x1b69. and 0x169c.) that users had granted unlimited token approvals to. The contracts drained victim wallets by calling transferFrom() and swapped stolen ETF tokens for USDT via Uniswap V3. TX: Victim: (ETF Token) https://bscscan.com/address/0xec7bac72d9f8f4dfd32b9fd5e569a11af6e302ef https://bscscan.com/tx/0x1d8ebeb5a54157114739c2fb33188bc4543c13c5307131daf7587eaca36d4f47 https://bscscan.com/address/0xec7bac72d9f8f4dfd32b9fd5e569a11af6e302ef"
X Link 2026-01-04T07:22Z [---] followers, [---] engagements
"YO protocol @yield has lost $3.7 million due to a bad swap of YoUSD. In the following tx YoVault operator executed a swap of $3.84M stkGHO into just 112k USDC. A Uniswap v4 LP captured the $3.7M difference. Several hours later Yo protocol's multisig bought 3.71M GHO via CoW Swap and re-deposited stkGHO into the vault: The YoUSD market on Pendle was paused temporarily and re-enabled after the deposit. https://etherscan.io/tx/0x50f62ffaea191b1355d5812be6007f0d673e6a473fefe38bd48b02128d267969 https://etherscan.io/tx/0x6aff59e800dc219ff0d1614b3dc512e7a07159197b2a6a26969a9ca25c3e33b4"
X Link 2026-01-13T10:31Z [---] followers, 43.3K engagements
"Saga EVM @Sagaxyz__ has been exploited for $7 million An attacker minted D tokens (Saga Dollar) out of thin air with a helper contract that abused IBC mechanisms with custom messages. Exploit Contract: Attacker: Saga network is currently halted Saga Dollar plunged 25% https://etherscan.io/address/0x2044697623afa31459642708c83f04ecef8c6ecb https://sagaevm.sagaexplorer.io/address/0x2044697623afa31459642708c83f04ecef8c6ecb https://sagaevm.sagaexplorer.io/address/0x7D69E4376535cf8c1E367418919209f70358581E https://sagaevm.sagaexplorer.io/address/0x2044697623afa31459642708c83f04ecef8c6ecb"
X Link 2026-01-21T16:00Z [---] followers, [----] engagements
"💬 Onchain Message: Hello We have identified that your wallet 0xddf6f217951a1e484ee6b04d621c861bf38d0656 realized [---------] USDC in profits by extracting value from the LPs in the dislocated Curve DUSD/USDC in the hours after an exploit. List of transactions in question: These profits are the direct result of a criminal action and are owed to users in the pool who lost additional funds as a result of your action. Your actions indicate a clear intent to profit by directly taking advantage of the exploit to extract value from users. We have a lead on your CEX interactions but before we escalate"
X Link 2026-01-25T16:49Z [---] followers, 50.2K engagements
"💬 Onchain Message: Hello We have identified that your wallet 0xddf6f217951a1e484ee6b04d621c861bf38d0656 realized [---------] USDC in profits by extracting value from the LPs in the dislocated Curve DUSD/USDC in the hours after an exploit. List of transactions in question: These profits are the direct result of a criminal action and are owed to users in the pool who lost additional funds as a result of your action. Your actions indicate a clear intent to profit by directly taking advantage of the exploit to extract value from users. We have a lead on your CEX interactions as well as your IP"
X Link 2026-01-25T16:51Z [---] followers, [---] engagements
"Today we reported to @HypurrFi an attack targeting a newly launched Euler Gateway. An attacker identified an arbitrary call vulnerability and exploited it after the first large approval. Should he waited for more approvals the impact could be larger. We reported it right after the detection in our monitoring system which helped to quickly mitigate the incident by the team - no more funds are at risk. As part of our recent release we failed to catch the unintended inclusion of unaudited Helper Code that was being developed to streamline users and enable swapping into lending positions. This"
X Link 2026-01-25T19:51Z [---] followers, [----] engagements
"💬 Onchain Message: Final Settlement Offer - $3000000 USDC Bounty I am following up because I have not heard from the account. I am offering you a guaranteed clean $3000000 USDC bounty to walk away. This is a life-changing amount of money with zero legal risk or pursuit. The alternative is a global forensic investigation. The $13M is being tracked by all major exchanges and law enforcement; it will be nearly impossible to bridge or off-ramp without detection. Please don't trade your future for "hot" assets you cannot use. Take the $3M and let my family survive. Contact me privately at"
X Link 2026-01-28T17:56Z [---] followers, [---] engagements
"💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a whitehat case. We are offering a bounty of the ETH you had transferred (22 ETH) and would like you to return the ownership and funds in BNB and World Chain perpetual dex. No legal pursuit Email: trung.banh@holdstation.com or telegram @trungbanhh Return address: 0x318ce8b75c820a8fe7adf47c6213bc3c53ffa987 Let make this a better"
X Link 2026-01-29T02:10Z [---] followers, [----] engagements
"Holdstation @HoldstationW has been hacked for around $100k due to a wallet compromise. The attacker took control of the project's wallet and drained HOLD USD1 and BNB tokens across BSC Worldchain and Ethereum networks. Attacker address: 0x54e127b8dbf3bebf64bb1d62a195a6f60113130d 💬 Onchain Message: Dear Hacker Holdstation team here. This incident has put years of work by a small team and our community at serious risk. We are builders not speculators and this situation affects lots on our development We believe this can still be resolved as a 💬 Onchain Message: Dear Hacker Holdstation team"
X Link 2026-01-29T05:55Z [---] followers, [----] engagements
"💬 Onchain Message: We are monitoring your address. [------] USDT has been targeted by multiple security agencies. We are offering 10% ($73000) as a white-hat bounty in exchange for the return of 90% of the funds. Return the funds within [--] hours and we will cease tracking and legal action. Otherwise we will immediately request Tether to blacklist this address. https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded https://bscscan.com/tx/0x28613c5ed416302e2ebd3498d465506723959ace408c666020d4144b2be04ded"
X Link 2026-01-30T13:32Z [---] followers, [---] engagements
"💬 Onchain Message: This message is issued by the Revert Finance team regarding the unauthorized exploitation of a vulnerability in our Aerodrome V3 Vault contract and the withdrawal of approximately [-----] USDC belonging to the protocol and its users. Transaction Hash: 0x10429eaeb479f9149854e4aeb978a35ac02d9688f6e22371712b3878c63a64ab Exploiter Address: 0xc6b04f6316fb674c556d65f136898ee26719bb6d Network: Base While this incident involved a smart contract vulnerability the exploit was executed with clear malicious intent to permanently misappropriate user funds rather than responsible"
X Link 2026-01-30T14:14Z [---] followers, [---] engagements
"Typus Finance incident happened on Sui blockchain on October [--] A lack of a single assert() in the oracle contract led to the loss of $3.44 million 👇 https://defimon.xyz/blog/typus-finance-hack-october-2025 https://defimon.xyz/blog/typus-finance-hack-october-2025"
X Link 2025-10-23T09:30Z [----] followers, [---] engagements
"EIP-7702 is getting popular among hackers to execute attacks In this tx an unverified contract lost [--] eth due to a forced swap with arbitrary slippage. The contract exposes a public function swap() that allows to swap CAPY token with minOutputAmount=0. An attacker used a delegated contract to receive a flashloan to disbalance CAPY / WETH pool and drain the contract. https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73 https://basescan.org/tx/0x5cf888d4c20f04c29fb4d6ab2a117316599a9c98f05f48e30e62531b1d5d3d73"
X Link 2025-10-29T10:57Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-10-30T03:58Z [----] followers, [----] engagements
"Unprotected uniswapV3SwapCallback callback in 0xc0ffee's MEV-bot contract was exploited The callback verifies msg.sender against input arguments which makes it trivial to bypass it. As a result the attacker stole $218k worth of LINK tokens. https://basescan.org/tx/0x83da47641680d0cf0a0567e3bcd5961cd30dbd5f34007f0e26e54216ad20b439 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $218678.11 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW"
X Link 2025-10-30T08:16Z [----] followers, [----] engagements
"💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and helping us identify and fix the vulnerability. We are fully committed to resolving this situation peacefully and ensuring that no further harm is done. If you choose to return the stolen assets and help us understand the exploit we will reward you with 10% of the total value recovered. Our intent is to address this"
X Link 2025-10-30T13:12Z [----] followers, [----] engagements
"Garden Finance @gardenfi has been hacked for $6.4 million 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning the funds and 💬 Onchain Message: We are aware that our systems have been compromised across multiple blockchains including but not limited to Arbitrum and assets have been taken from us. In the spirit of resolution we are offering a 10% reward for your assistance in returning"
X Link 2025-10-30T13:17Z [----] followers, [----] engagements
"💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized crime and other incidents. A good sized percentage of their total activity for the bridge has related to illicit activity. They have not been cooperative with requests to return those fees to the victims or to develop a solution for the protocol. I will not be tracking your funds gained from the exploit."
X Link 2025-10-30T13:50Z [----] followers, [----] engagements
"The @gardenfi hack is @ZachXBT approved 👌 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized 💬 Onchain Message: Congrats on your success before considering the Garden Finance bounty offer read this. The Garden Finance team profited high [--] figures at minimum in fees generated from stolen funds via their bridge from the Bybit exploit Swissborg theft Chinese organized"
X Link 2025-10-30T13:53Z [----] followers, [----] engagements
"💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock the deal Bounty will start to decrease in 21-days (Nov 18) Bounty will expire in [--] days (Nov 25) Bounty is live. Settlement is atomic when we call recoverKnine(). KNINE is transferred back to Shibarium bridge and ETH is transferred to you. If you call accept we cannot cancel the deal. Code is law. ---"
X Link 2025-11-03T06:32Z [----] followers, [---] engagements
".@K9finance does not give up - the last offer was [--] eth and the hacker demanded [--] eth: https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 [--]. Review the source code [--]. Approve bounty contract to spend KNINE [--]. (Optional) Call accept() to lock https://t.me/defimon_alerts/1848 💬 Onchain Message: Dear Shibarium Bridge Hacker Lucky day. New [--] ETH bounty to return stolen KNINE tokens. Bounty contract: 0x5EA23706708F727F1AF45718c4903DdA2526D4d0 1."
X Link 2025-11-03T06:38Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $554569.35 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-03T07:47Z [----] followers, 56.8K engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $166498.87 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-03T07:48Z [----] followers, [---] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $14147 https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa https://etherscan.io/tx/0x655bdd8cfa38d05f1dd40ebf53a64e38effce134f8669463ab4024761f85f4fa"
X Link 2025-11-03T08:25Z [----] followers, [----] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $2667 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5 https://etherscan.io/tx/0xa28b9fda2872634f358498ab80a61271b33eed79e05db0f5fee71faef981c2c5"
X Link 2025-11-03T08:25Z [----] followers, [---] engagements
"⚠ pLONGWILD (Peapods Finance V2) lost $557 https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b https://etherscan.io/tx/0x2f768a318a76d4c934c331241f887b62178e3c3edf5e7c063a6e0a7b9190491b"
X Link 2025-11-03T08:25Z [----] followers, [---] engagements
"The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d https://app.blocksec.com/explorer/tx/base/0xd61f26bd435b31f781165a522fc78a040f864eafc74e07f86314ca265d96287d"
X Link 2025-11-03T09:01Z [----] followers, [----] engagements
"@drdr_zz @Balancer Yes internal balances were manipulated before the withdrawal https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR https://x.com/DefimonAlerts/status/1985271050939056399 The vector is more nuanced the Vault's internal balance (_internalTokenBalance) was manipulated before the withdrawal e.g. https://t.co/U4gdmcpOYR"
X Link 2025-11-03T11:53Z [----] followers, [----] engagements
"💬 Onchain Message: Create [--] ETH bounty contract to recover all KNINE tokens. https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3 https://etherscan.io/tx/0x657f2ce566a2ac52df117ff577829d5388fd79aff7b988c788fb4271baf45fe3"
X Link 2025-11-04T07:35Z [----] followers, [---] engagements
"💬 Onchain Message: Hi guys it seems that some balancer exploits were front-ran by my bot. I want to return your funds. Could you give me a certified recipient address or any way I could reach you https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31 https://basescan.org/tx/0x65186a650666ada3761fc10437852bf25d42d956746ea80f24512e0e09fd1e31"
X Link 2025-11-04T09:57Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-04T18:25Z [----] followers, [----] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: bsc Proxy: 0x704478dd72fd7f9b83d1f1e0fc18c14b54f034d0 (PendleGaugeControllerSidechainUpg) belonging to protocol Pendle (Immunefi) New address: 0x3c26D8aA09Af661C16e02004e1B72De6724EB824 https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e https://bscscan.com/tx/0xb7e6eef9a7d54b087dd270445fb7682747b83639a60e4036b4b7d1d8df11926e"
X Link 2025-11-05T03:18Z [----] followers, [---] engagements
".@DexodusFinance on Base has been drained It is the second time the protocol has been exploited since May. https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75 💎 Full Details at Defimon Signals https://t.co/nUColHCeWW https://basescan.org/tx/0x7501847c70d2cdcfbb8c6bd3585640f568cd287242b64027e5a829646e084257 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $144943.75"
X Link 2025-11-05T07:26Z [----] followers, [---] engagements
"💬 Onchain Message: Hi Mr Hacker well played on draining my [--] wallets of HOLD please forward back my $100k worth of tokens HOLD and ETH so I dont have to follows your every move and block your wallets before they off load I also have some hackers looking into your movements and an FBI friend so do the right thing and send back my funds so I don't need to carry this on 0xdc5c33da573bb4e6b81d642945a33d61e274feac one of my wallets you drained please forward funds backnow https://etherscan.io/tx/0x2a68e9663ab7e7b6428940955305d9fa23ae6d5b0dfe8572f15d78878a5239ba"
X Link 2025-11-05T16:47Z [----] followers, [---] engagements
"💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you are willing to cooperate reply to this message and begin contact procedures before November 8th 21:00 UTC. If we do not hear from you by that time we will assume you are unwilling to help make the liquidity providers whole and will escalate our response. We would like to extend you an offer: return the funds to the DAO"
X Link 2025-11-05T21:03Z [----] followers, [---] engagements
"Legit message from @Balancer to the hacker 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you 💬 Onchain Message: Balancer DAO Notice to wallet owner: We understand this wallet is linked to the exploit of Balancer V2 Composable Stable Pools on Nov 3rd. We are treating this as an opportunity for cooperation and would prefer to resolve this without escalation. If you"
X Link 2025-11-05T21:13Z [----] followers, [---] engagements
"⚠ Unverified contract lost $1285 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461 https://bscscan.com/tx/0xd641978539a0d010cbdeef51e9f8f44847dcf6dab6b21c5d71162aab24ccd461"
X Link 2025-11-07T07:51Z [----] followers, [---] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-07T10:21Z [----] followers, [----] engagements
"⚠ FSP / USDT lost $75107 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825"
X Link 2025-11-07T10:23Z [----] followers, [---] engagements
"Unknown project on BSC was hacked for around $230k The claimToken() and swapDPC() functions in DPCLock use spot price from PancakeSwap which can be easily manipulated with a flashloan. The funds are accumulated in the fresh wallet without BNB for gas (yet). https://bscscan.com/tx/0xc94143fd6e7e7f05790902d66956adcf39b60bdda1e555f9963d7b1d32188825 https://bscscan.com/tx/0x7be62536947d83ae962abfa4c491d736967dea8faf4a629090a49f72d529a297 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $155271.94 💎 Full Details at Defimon Signals"
X Link 2025-11-08T13:03Z [----] followers, [----] engagements
"🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at Defimon Signals https://t.me/+m9BMRKlMuW5iMGFi https://t.me/+m9BMRKlMuW5iMGFi"
X Link 2025-11-10T15:44Z [----] followers, [----] engagements
"RWB was hacked for $180k A sequence of large flashloans was taken to manipulate a swap inside function buy() in an unverified contract related to this token. In the RWB / USDT swap amountOutMin is set to [--] allowing maximum slippage. Funds are bridged to mainnet and deposited to Tornado: https://bscscan.com/tx/0xcc1884e9934d516df9d80a38706bc0fa1d4437e0cd3d02a4b2e4e95fafe94dfe https://etherscan.io/address/0xc484ecd341f8e02d6685da4f6670684a7675303b 🟠 Alert: to be disclosed soon 🤕 Victim: *** 🎪 Network: *** 🎩 Attacker: *** 🪄 Exploit: *** 💸 Balance Change: $180375.28 💎 Full Details at"
X Link 2025-11-10T19:07Z [----] followers, [----] engagements
"An instance of DRLVaultV3 contract was drained for $100k DRLVaultV3 is vulnerable to price manipulation in swapToWETH() and swapToUSDC() functions because they use quoteExactInputSingle() to determine the price (i.e. spot price from Uniswap). c0ffebabe.eth frontrun an attack on the DRLVault instance with 100k USDC deposited into it [--] hours prior. These vaults can be created from the factory contract via clone pattern however other vaults don't hold any funds. https://etherscan.io/tx/0xe3eab35b288c086afa9b86a97ab93c7bb61d21b1951a156d2a8f6f5d5715c475 ⚠ DRLVaultV3 lost $97733"
X Link 2025-11-11T08:29Z [----] followers, [----] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: arbitrum Proxy: 0x1344a36a1b56144c3bc62e7757377d288fde0369 (Views) belonging to protocol Notional (Immunefi) New address: 0x634A5270cfde2A3D763772C7FC2517c4660D2cF7 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763 https://arbiscan.io/tx/0x88ffa682181ad92bf2ab93d4d4e5b1948da3402f9e538b9d10a3c2f2001de763"
X Link 2025-11-11T19:56Z [----] followers, [---] engagements
"💬 Onchain Message: Hi Im the victim whose funds you took through the AugustusV6 exploit. You transferred [-------] USDC from my wallet (0x05808Cf9F8aAcFD6a2c2A879326593644F9a339e) on Oct-05-2025 09:31:35 PM UTC. Im reaching out once again to ask you please to return the money. Those were my last savings and Im about to lose the apartment I live in because I no longer have money to pay for it. Im in serious financial trouble because of this and Im asking you to do the right thing and send all the funds back. The universe sees and knows everything one does and it rewards each person according to"
X Link 2025-11-12T01:08Z [----] followers, 11.4K engagements
"⚠ SHReK / WBNB lost $971 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794 https://bscscan.com/tx/0xd0471cb3e6f225736727f0c83853a6325f999f1dbbffc1985c3456aae1652794"
X Link 2025-11-12T02:43Z [----] followers, [---] engagements
"@lcfr_eth @ImpermaxFinance https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd https://basescan.org/tx/0x7be1561cc760bfdb07b922adf8d532b5931b29a6f334d0d67ca0e1a6b07782cd"
X Link 2025-11-13T11:30Z [----] followers, [--] engagements
"https://defimon.xyz/blog/balancer-v2-hack-november-2025 https://defimon.xyz/blog/balancer-v2-hack-november-2025"
X Link 2025-11-14T08:58Z [----] followers, [---] engagements
"⚠ TokenHandler lost $18171 https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a https://etherscan.io/tx/0xf7d682adf3c32165786f8d9773a8f80d8285b2926e562791edf6a5fe941d0a3a"
X Link 2025-11-15T16:03Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xdbc3363de051550d122d9c623cbaff441afb477c (FeeReceiver) belonging to protocol Kelp DAO (Immunefi) New address: 0x868ceF33E29bF3037b5d4CF5C408EAEF29d96b33 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x947cb49334e6571ccbfef1f1f1178d8469d65ec7 (LRTConfig) belonging to protocol Kelp DAO (Immunefi) New address: 0xb21b7Db6d1dAd2a7b057ba5c2E9BA2891fb2e80d https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x598dbcb99711e5577ff76ef4577417197b939dfa (LRTConverter) belonging to protocol Kelp DAO (Immunefi) New address: 0x64B7764e73a83eb1d921B43Eb87Bc5E0eFDbD712 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x036676389e48133b63a802f8635ad39e752d375d (LRTDepositPool) belonging to protocol Kelp DAO (Immunefi) New address: 0xB1238B191b5280378635B27cE4f37e57187Cf19c https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x349a73444b1a310bae67ef67973022020d70020d (LRTOracle) belonging to protocol Kelp DAO (Immunefi) New address: 0x81E1112966F2E6115b5B3d2EFd94cDe8AE57E793 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xc66830e2667bc740c0bed9a71f18b14b8c8184ba (LRTUnstakingVault) belonging to protocol Kelp DAO (Immunefi) New address: 0x47a368d5eB1015F78bE791a2877fB25Db9c6E282 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x62de59c08eb5dae4b7e6f7a8cad3006d6965ec16 (LRTWithdrawalManager) belonging to protocol Kelp DAO (Immunefi) New address: 0xd559EDbD5f09eFdCc22265Ce436dbe00c564D59F https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0xa1290d69c65a6fe4df752f95823fae25cb99e5a7 (RSETH) belonging to protocol Kelp DAO (Immunefi) New address: 0xC9Ef97549e28390003DE53279B7D3d39DCE81637 https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef https://etherscan.io/tx/0x15858943bc5d9952ef49dc8c4789315a320d0562334e61891eadf88f9c6a46ef"
X Link 2025-12-20T13:46Z [----] followers, [---] engagements
"🚨 MorningStar - $129K Token: $MSC @ $0.0093 MC: $195K Type: Access Control - Public Function The releaseReward() function lacks access control allowing anyone to call it with arbitrary amounts. Attacker called it with the contract's full MSC balance triggering a swap that manipulated the GPC/AMMToken pool. This allowed them to arbitrage the inflated pool via flash swap extracting [---] WBNB. TX: Victim: https://bscscan.com/address/0x91334d03dd9b9de8d48b50fe389337eeb759aeb1 https://bscscan.com/tx/0x6c9ed4c2d81b6abfdf297b0cbc13585ed91f2a5e69e3545d3ea4316f50021b56"
X Link 2025-12-29T09:02Z [----] followers, [---] engagements
"🚨 AiPay - $31K Token: $AIPAY (No CoinGecko listing) MC: Unknown (unlisted token) Type: Logic Error (Unverified Contract) Attacker flash loaned 14.5M USDT from Moolah repeatedly called unverified minting functions on victim vault contract to mint AiPay tokens dumped via PancakeSwap for $30K profit. TX: Victim: (unverified) https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83 https://bscscan.com/tx/0xa268528df0f7e2b55f88e00746634e4a5404f3924b32335d0c504d92f055064d https://bscscan.com/address/0xcd678A28609a3B141c40bd879E7624dF139ffc83"
X Link 2026-01-25T13:36Z [----] followers, [---] engagements
"🚨 XPlayer Token (XPL) - $963K Token: $XPL @ $19.12 (post-hack distorted) MC: N/A (not listed on CoinGecko) TVL: $0 (pool drained) Type: Missing Access Control The NodeDistributePlus contract has a public DynamicBurnPool() function that allows anyone to burn XPL tokens from the liquidity pool. Attacker called this to burn nearly all XPL in the PancakePair then swapped their small XPL balance to drain $963K USDT. TX: Victim: (XPL Token) https://bscscan.com/address/0xc2c4ccde8948c693d0b04f8bad461e35a12f20b8"
X Link 2026-01-29T14:15Z [----] followers, [---] engagements
"Molecular Finance is reported to have rug pulled on Arbitrum. At least 320K USD have been stolen. The website and socials are gone. http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history http://molecular.finance https://arbiscan.io/tx/0x784fd760e57f4cb68efad7cecee077ddde97824f4f31380ef9e16a34cba1f105 https://debank.com/profile/0x5a5c1410dc7a41d453c86a6276ceafd0ce050709/history"
X Link 2026-01-30T17:15Z [----] followers, [---] engagements
"Hello @40acres_Finance your proxy deployments on Ethereum have been backdoored (CPIMP attack): https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec https://etherscan.io/address/0x105c64b9c965516b01c933560df259ec5c211320 https://etherscan.io/address/0xf3707532ac9ecca8d74d2a135bb2806a0b6562b0 https://etherscan.io/address/0x0e23a4eb753334e747cd164c8dea620e0306d0ec"
X Link 2026-01-31T05:33Z [----] followers, [----] engagements
"@0xDestinyae @IAm0x52 @crosscurvefi Yes we reported to the team first"
X Link 2026-02-01T21:02Z [---] followers, [---] engagements
"In the first tx attacker sent a CCIP message to the L1 escrow with crafted parameters to grant max allowance. https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600 https://etherscan.io/tx/0x45739a92c2d99f172a74d8028736a2fd1b507ac6fc134680cd1dccd3c572c600"
X Link 2026-02-03T08:20Z [----] followers, [---] engagements
"💬 Onchain Message: An important address to the crypto community. We need your support. On the night of February [--] a serious incident occurred: the CrossCurve bridge was hacked. According to information published by CrossCurves official account the exploit resulted in the theft of funds totaling more than $1.44 million. CrossCurve is a cross-chain bridge that allows users to move assets between different blockchains. Such systems are a critically important part of the DeFi ecosystem because liquidity capital availability and the operation of many projects depend on them. Scale of the damage"
X Link 2026-02-03T15:31Z [----] followers, [---] engagements
"💬 Onchain Message: Message to who executed the GYD bridge security incident The following message is subject to approval by Gyroscope governance vote closing 18:30 UTC on Feb [--] see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by"
X Link 2026-02-03T18:43Z [----] followers, [---] engagements
"0x669c balance is around $5.8M in eth the source of funds is traced to Binance 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE 💬 Onchain Message: I am the owner of the funds. I offer a 15% White Hat Bounty for the return of the remaining 85%. Return the funds to the original address within [--] hours to resolve this legally. Contact me on Telegram: @Ramirex5 https://t.co/vHialanMxE"
X Link 2026-02-04T09:47Z [----] followers, [----] engagements
"🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0x0c12adea8035db6d5bba76bdb8bea2c1e1d246f6 (EOA) 💰 Destroyed balance: $2000040 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8 https://etherscan.io/tx/0x093a12a8c4d6b8824adf23a828c3a4bb90cda77fa0eb7a7b85987593fc674ae8"
X Link 2026-02-04T17:43Z [----] followers, [---] engagements
"💬 Onchain Message: The following message has been authorized by Gyroscope governance see: To 0x7DD4075A6eAe9f18309F112364f0394C2DfA8102: This is Gyroscope governance. We propose a resolution to the GYD smart contract incident. You can return [---] ETH that you hold from this incident. Gyroscope is then in a position to consider the remaining over [---] ETH as a fixed whitehat settlement credit. This generous of a settlement is possible because it gives the protocol a chance of making users whole by canceling GYD's system surplus. If you take this offer Gyroscope will cease investigations and"
X Link 2026-02-04T18:50Z [----] followers, [---] engagements
"💬 Onchain Message: Subject: FINAL UPGRADE 20% White-hat Bounty Offer To the holder of 0x669C. [--]. The Offer: We are increasing the boundty to 20% of the total assets. This is our final offer. [--]. The Logic: BTC is volatile near 73k. Prolonging this increases your risk of exit paths being permanently blocked and the reward value dropping. [--]. The Immunity: Upon return of 80% to the designated address we will grant full legal immunity and cease all global tracking. [--]. Deadline: 09:00 KST Feb [--] [----]. After this we initiate full-scale international legal action. Contact: Telegram @Ramirex5"
X Link 2026-02-05T00:32Z [----] followers, [---] engagements
"💬 Onchain Message: white hat bounty final offer %90 you have a [--] day window before we move on with action with law enforcement agencies send %10 to 0x628ABf754440DD0B180DB637100d7308cffDD224 thank you in advance for your cooperation https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f https://etherscan.io/tx/0x33b861daee16c8e5f1c215b33f34e70433c78333bbbac70be7469e26928fb41f"
X Link 2026-02-05T00:39Z [----] followers, [---] engagements
"💬 Onchain Message: URGENT: Final 20% Bounty Offer sent to Wallet 0x669C. Check Input Data on Wallet 0x669C immediately. Deadline: 00:00 UTC Feb [--]. Contact: @Ramirex5 https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e https://etherscan.io/tx/0x8dd19f0ff3e7fb16b45ecd2c671384bc7164055376b564c093988bf4845c454e"
X Link 2026-02-05T00:40Z [----] followers, [---] engagements
"💬 Onchain Message: FINAL SETTLEMENT: Return [----] ETH / Reward [-----] ETH. Upon receipt all legal actions and subpoenas to Binance/Coinbase will be permanently withdrawn. Case classified as White-hat. https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14 https://etherscan.io/tx/0x4fbee25b4f0f6a1632cc3ae1beb2b7ee5b7d9717883835fc6e8ff83e9d7fab14"
X Link 2026-02-06T06:12Z [----] followers, [---] engagements
"💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take flashloan of my vault contract assets which were subsequently used by him. It had nothing to do with my addresses and/or contracts deployed by me. Since then I am trying to move my funds back to ETH chain but you are stopping and blocking my bridge transactions continuously. Your analysis of the attack transaction is totally"
X Link 2026-01-10T07:14Z [----] followers, [----] engagements
".@FildaFinance was hacked on ESC network on December [--] Its second incident since April [----] when $700k was stolen https://fildafinance.medium.com/filda-exploit-statement-49ec69e34c53 https://x.com/fildafinance/status/2007435307059147199s=46&t=sMvgsnYvKjMe_sT0nAhjmg 💬 Onchain Message: Hello Elastos Dev I noticed you are corelating my addresses and assets to a recent exploit that drained Filda contracts on ESC chain. I happened to be testing some Vault contracts on-chain that had flash() function which allowed the exploiter to take"
X Link 2026-01-10T07:23Z [----] followers, [---] engagements
"🚨 Yieldification (YDF) OTC - $1.3K Token: $YDF @ $0.00003579 MC: $35.8K Type: Logic Error - Storage Not Cleared After NFT Burn Pool storage data persists after poolRemove() burns the NFT. Attacker creates and removes a pool then calls swapPool on the burned tokenId to drain remaining contract funds. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/yieldification https://etherscan.io/address/0xba411e5a84b3b1169143d084c304e8f5f61e73aa https://etherscan.io/tx/0xf36a2b9006fa7671bdff6e4605e53f44cd20332f33630839d115526c342b9cc9 https://www.coingecko.com/en/coins/yieldification"
X Link 2026-01-24T06:33Z [----] followers, [---] engagements
"On January [--] @GyroStable has been exploited for around [-----] ETH ($696k) A hacker exploited an arbitrary call vulnerability in the _ccipReceive() function of the GydL1CCIPEscrow contract. It allows the recipient field in the CCIP message to be any address including the GYD token contract itself. Setting recipient = GYD and data = approve(attacker max) effectively granted the attacker full allowance to the escrow's GYD holdings. https://twitter.com/i/web/status/2018600445900390567 https://twitter.com/i/web/status/2018600445900390567"
X Link 2026-02-03T08:20Z [----] followers, [----] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x348d8ec2d06d35ed09583b6c43267bafd3ea62b90f0a6cb59a858117f96c76b7 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x18df2cbb364becd69d7703a6336ffb31f3c9619d23634ec8f591df312169fd457a8133046c32b91f0e3395c930dffcdc7673d7105ee308ffee89be96c5414f311b https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9 https://etherscan.io/tx/0xb1c7f4747ccd2012798f1f37e0d6102ef3b3c7942e1be735cfc4dc6801e574a9"
X Link 2026-02-13T17:29Z [----] followers, [--] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x3f3423d0573f447dce167fcd4fdff017c1be2a6db731ec7421474e1421e31a8c on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x9ce799b58330172ffed107958fe6210aa2b3777b36676049b5717bce8436544509243c96be2f1b554564e1830a729e45276e975d9f5f51df78449297ac7deedb1c https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2 https://etherscan.io/tx/0xc81d78c2932cb426184402d6273c4bf331657e40352b8046a59e3faf64632cb2"
X Link 2026-02-13T17:29Z [----] followers, [--] engagements
"Onchain monitoring and incident response is crucial for DeFi Since [----] we have been working on to detect DeFi exploits by analyzing transactions in real-time. There is a constant stream of DeFi exploits that are barely noticed. You can get access to these instant alerts by subscribing to the exploits feed for just 50$/mo. For protocol teams we offer a Websocket subscription to act on the alerts automatically. Native Telegram subscription: Tribute mini-app: Contact: http://t.me/DecurityHQ http://t.me/tribute/appstartapp=sCiA http://t.me/+m9BMRKlMuW5iMGFi http://defimon.xyz"
X Link 2026-02-02T08:15Z [----] followers, [----] engagements
"⚠ Unverified contract lost $10381 at 13:59 [--] February [----] (UTC) https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090 https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090"
X Link 2026-02-14T06:12Z [----] followers, [---] engagements
"💬 Onchain Message: Please listen to me. This is very hard for me it's a lot of money and I'm devastated. Those miners were stolen directly from my wallet to yours. The person who 'sold' them to you never owned them; he hacked me and sent them to you when you paid him. We both got scammed by the same guy. Please let's talk on Telegram so I can see your proof and get his contact. My Telegram is: @JerryCommuniity https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc"
X Link 2026-02-13T14:14Z [----] followers, [---] engagements
"💬 Onchain Message: High-velocity ETH churn via 1inch router (0x11111112. 39x 0x12aa3caf swaps) averaging 53min intervals across [--] txs46 outbound just [--] inbounddrains [------] ETH with minimal recapture. Five approves (0xe842e272.) hint at token setups for swaps yet no token flows detected suggesting ETH-only dumps into illiquid pairs or failed executions. Self-interacts (0xd3402dc9. 4x) point to internal looping possibly a solo bot testing MEV edges on Base's low-fee layer. Blindspot: This frantic pacing masks slippage accumulation in 1inch's aggregated liquidity; broader network shows"
X Link 2026-02-15T03:00Z [----] followers, [---] engagements
"Proxy upgrade: proxy_implementation_upgraded 🌎 Network: mainnet Proxy: 0x85b78aca6deae198fbf201c82daf6ca21942acc6 (LidoARM) belonging to protocol Origin Protocol (Immunefi) New address: 0xC0297a0E39031F09406F0987C9D9D41c5dfbc3df https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b https://etherscan.io/tx/0x9deed05b663b7e1cdd80514bc946fad89379a6a7038eb8c0a15cd6ee0bb96a1b"
X Link 2025-12-09T03:14Z [----] followers, [---] engagements
"🚨 JFIN Bridge (LCBridgev2Token) - $13.4K Token: $JFIN @ $0.085 MC: N/A (no circulating supply tracked) FDV: $25.6M Type: Logic Error (Reward Calculation) The staking reward calculation allows claiming rewards greater than the contract balance by exploiting the claimReward function which pays out based on accumulated totalReward rather than actual available funds draining all staked JFIN tokens. TX: Victim: CoinGecko: https://www.coingecko.com/en/coins/jfin-coin https://etherscan.io/address/0x3EbFd0EFC49a27fb633bd56013E4220EBC2c3C6d"
X Link 2025-12-24T16:16Z [----] followers, [---] engagements
"CrossCurve @crosscurvefi (ex has been exploited for around [--] million on several networks. Anyone could call expressExecute on ReceiverAxelar contract with a spoofed cross-chain message bypassing gateway validation and triggering unlock on PortalV2. Victim (PortalV2): Vulnerable contract (ReceiverAxelar): Attackers: https://etherscan.io/address/0xcc3a5dc003b3a58621745a39f706ef9646d5c481 https://etherscan.io/address/0x632400f42e96a5deb547a179ca46b02c22cd25cd https://etherscan.io/address/0xb2185950f5a0a46687ac331916508aada202e063"
X Link 2026-02-01T20:13Z [----] followers, [----] engagements
"💬 Onchain Message: Hello your Gnosis Safe has been exploited for $70k because your custom module 0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19 has a receiveFlashLoan callback without verification of the flashloan initiator. We managed to rescue a small portion of USDT and sent it back to you. Please remove the vulnerable module. https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0 https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0"
X Link 2026-02-07T18:34Z [----] followers, [----] engagements
"💬 Onchain Message: Dear hacker sir Please never return the funds use tornado cash Thor swap or u can use torcador and covert to monero and mix it I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here"
X Link 2026-02-09T02:32Z [----] followers, [----] engagements
"💬 Onchain Message: Hello your proxy deployments have been backdoored by the malicious actors (CPIMP attack): [--]. [--]. Consider calling initialize() atomically together with the proxy deployment to avoid the front-run. https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380 https://arbiscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380"
X Link 2026-02-11T15:14Z [----] followers, [---] engagements
"🚨 AFX Staking (afxStakeDappA) - Loss: $10700 Type: Logic Error / Price Manipulation The AFX staking contract (0x560d unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker who then swapped them for [-----] USDT profit. TX: Victim: (unverified) Vulnerable Contract: (unverified) Attacker:"
X Link 2026-02-12T17:17Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0xcd1f367a1895a38f5bc1c7c8b9ea55ef3ce9fa45407c7081754b25a297ff43a8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0xb5cb123131715972fcec8ed98b4e9ee87a679fa6042970a9c2c22c36e2ad0ffd0d05479775bfe9089e18140027718353870ca88d8d659f36498dedf14d13734c1c https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0 https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0"
X Link 2026-02-13T17:27Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x254922f7554a0861c4cd67795a540d349f653b0e938eccad18385ff7fb4e6cc8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x698328e41335a8121742d767c895c460e14a09c73addf3ce9a9f69d94172277c5fa3e525dbe95e44a57db69586919908d7d77759694de62130aac8b08e6d4d9e1b https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12 https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12"
X Link 2026-02-13T17:28Z [----] followers, [---] engagements
"💬 Onchain Message: Wallet 0x61e033357d61a9ce87f6d7b271871641ec01b687 runs a tireless script against 0x837b57a9. firing [--] outbound txs with zero ETH flow or token tracespure operational noise. Methods cluster on 0x03001400 (16x likely query/update loops) 0x02001a00 (15x state reads) and 0x03003400 (11x batch ops) revealing a grinding routine not opportunistic plays. 24/7 cadence gaps under 8h screams bot autopilot no human pauses. Blindspot: This laser-focus flags as automated farming (airdrops exploits) amid Base's bot swarm where 70% of such mono-contract hammering gets blacklisted by"
X Link 2026-02-15T02:59Z [----] followers, [---] engagements
"💬 Onchain Message: Wallet exhausts [------] ETH in [--] outbound txnsno inflows pure sink. [--] transfers dominate hitting 0xc734635c (7x likely aggregator) 0x5b2193fd & 0x22af33fe (5x each bridge proxies) cycling through [--] contracts in tight loops. No tokens no DEX routersraw ETH dispersal not trading. 24/7 cadence (gaps 8h) screams automation: bot probing Base's periphery seeding liquidity or farming micro-rewards in low-tier protocols. Blindspot: zero reciprocity exposes drain risk; this isn't strategy it's scattershot erosion. Broader echo: mirrors Base's bot swarms testing L2 edges but"
X Link 2026-02-15T04:07Z [----] followers, [--] engagements
"Onchain monitoring and incident response is crucial for DeFi Since [----] we have been working on to detect DeFi exploits by analyzing transactions in real-time. There is a constant stream of DeFi exploits that are barely noticed. You can get access to these instant alerts by subscribing to the exploits feed for just 50$/mo. For protocol teams we offer a Websocket subscription to act on the alerts automatically. Native Telegram subscription: Tribute mini-app: Contact: http://t.me/DecurityHQ http://t.me/tribute/appstartapp=sCiA http://t.me/+m9BMRKlMuW5iMGFi http://defimon.xyz"
X Link 2026-02-02T08:15Z [----] followers, [----] engagements
"💬 Onchain Message: High-velocity ETH churn via 1inch router (0x11111112. 39x 0x12aa3caf swaps) averaging 53min intervals across [--] txs46 outbound just [--] inbounddrains [------] ETH with minimal recapture. Five approves (0xe842e272.) hint at token setups for swaps yet no token flows detected suggesting ETH-only dumps into illiquid pairs or failed executions. Self-interacts (0xd3402dc9. 4x) point to internal looping possibly a solo bot testing MEV edges on Base's low-fee layer. Blindspot: This frantic pacing masks slippage accumulation in 1inch's aggregated liquidity; broader network shows"
X Link 2026-02-15T03:00Z [----] followers, [---] engagements
"⚠ Unverified contract lost $10381 at 13:59 [--] February [----] (UTC) https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090 https://etherscan.io/tx/0x26eb9f4e7c8ab5eb589dfc7f447486cf8e557d91646d51927d86b8969da98090"
X Link 2026-02-14T06:12Z [----] followers, [---] engagements
"💬 Onchain Message: Your SOMining server is currently at risk and an attack from that address could occur tomorrow resulting in loss of funds. If you wish to continue operating your server and avoid losing funds you can blacklist this address to prevent tokens from being used. Black address 0x29e5F70ebab2B5b830609E0f2b8A357F2295EBfD For further information please contact the following email address: kingston37790@proton.me https://bscscan.com/tx/0xdc43358a5dd9883465bacf7c261818013c186229134146d0b8b27c8dfdfd0c4e"
X Link 2026-02-14T01:24Z [----] followers, [---] engagements
"🚫 Blacklist Event: usdt_destroyed_black_funds 🌐 Network: mainnet 🏷 Token: 0xdac17f958d2ee523a2206206994597c13d831ec7 (USDT) ⛔ Address: 0xec046b20d26aedcaad476e21f22feb00ca0ced5d (EOA) 💰 Destroyed balance: $4743207 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11 https://etherscan.io/tx/0x629d21a4daf6af1fc1786927c8ce06f43159ddeaee7f1e61407dfbe8d28f2e11"
X Link 2026-02-13T22:22Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0x254922f7554a0861c4cd67795a540d349f653b0e938eccad18385ff7fb4e6cc8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0x698328e41335a8121742d767c895c460e14a09c73addf3ce9a9f69d94172277c5fa3e525dbe95e44a57db69586919908d7d77759694de62130aac8b08e6d4d9e1b https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12 https://etherscan.io/tx/0x9f43b8a50f79f9117fdbe9742fd32f01c846b38fa00f2e2e2eae5a0bbce1dc12"
X Link 2026-02-13T17:28Z [----] followers, [---] engagements
"💬 Onchain Message: MESSAGE: "Return 90% of the funds procured in transaction hash 0xcd1f367a1895a38f5bc1c7c8b9ea55ef3ce9fa45407c7081754b25a297ff43a8 on chain [--] to 0x49DF63F8c88BAe925Ea1BDbFcAfA48c8Cc2647be and keep 10% as a legitimate bounty. This is a good-faith offer." SIGNATURE: 0xb5cb123131715972fcec8ed98b4e9ee87a679fa6042970a9c2c22c36e2ad0ffd0d05479775bfe9089e18140027718353870ca88d8d659f36498dedf14d13734c1c https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0 https://etherscan.io/tx/0x61e3a772e4976d13e01300e4005860e9d79051e8b0ff704208f94a24affcdbc0"
X Link 2026-02-13T17:27Z [----] followers, [---] engagements
"💬 Onchain Message: Please listen to me. This is very hard for me it's a lot of money and I'm devastated. Those miners were stolen directly from my wallet to yours. The person who 'sold' them to you never owned them; he hacked me and sent them to you when you paid him. We both got scammed by the same guy. Please let's talk on Telegram so I can see your proof and get his contact. My Telegram is: @JerryCommuniity https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc https://bscscan.com/tx/0xe248c04111fb70581009796757740f4fbbb8344461eea7093d2c194e6c8242dc"
X Link 2026-02-13T14:14Z [----] followers, [---] engagements
"🚨 AFX Staking (afxStakeDappA) - Loss: $10700 Type: Logic Error / Price Manipulation The AFX staking contract (0x560d unverified) has an externally callable addLiquidityUsdt() function that pulls AFX and AHT tokens from a pool contract (0x146933) via pre-existing unlimited approvals. The attacker flash-swapped AFX to manipulate the AFX/AHT pool ratio then called addLiquidityUsdt() which pulled tokens from the pool at manipulated prices. Surplus tokens were returned to the attacker who then swapped them for [-----] USDT profit. TX: Victim: (unverified) Vulnerable Contract: (unverified) Attacker:"
X Link 2026-02-12T17:17Z [----] followers, [---] engagements
"💬 Onchain Message: Hello your proxy deployments have been backdoored by the malicious actors (CPIMP attack): [--]. [--]. Consider calling initialize() atomically together with the proxy deployment to avoid the front-run. https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380 https://arbiscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/address/0x3f568ac2bb7a7099a243d11419185c922cfab766 https://etherscan.io/tx/0x94c994929d91adfcacbdd95da5905b67e6ee1e1fee400af0de5e653bdc20f380"
X Link 2026-02-11T15:14Z [----] followers, [---] engagements
"Contract paused 🌍 Network: bsc 📍 Contract: StakeManagerV2 belonging to protocol Stader for BNB (Immunefi) 👤 Actor: 0x79a2ae748ac8be4118b7a8096681b30310c3adbe 🕐 Time: 14:26 [--] February [----] (UTC) https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83 https://bscscan.com/tx/0x241fef6e50eb5f6e19a5eda6058c3531149ba4782842e4bf286efbed89e7be83"
X Link 2026-02-11T14:30Z [----] followers, [---] engagements
"⚠ Unverified contract lost $14344 at 12:06 [--] February [----] (UTC) https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7 https://etherscan.io/tx/0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7"
X Link 2026-02-09T19:37Z [----] followers, [----] engagements
"💬 Onchain Message: Dear hacker sir Please never return the funds use tornado cash Thor swap or u can use torcador and covert to monero and mix it I would like to covey my thanks to you first My ledger was comprised by someone and they took all my life saving which I did for my daughters future I have begged to all the hacker who hacked ethereum chain before no one give me a shit to me I am looking for your help to support me and my future of my childrens . Here is the proof of the hacked transaction which got moved from my wallet . The funds are currently sitting here"
X Link 2026-02-09T02:32Z [----] followers, [----] engagements
"💬 Onchain Message: OFFICIAL NOTICE: $1.15M RECOVERY BOUNTY ACTIVATED [--]. DECLARATION As of February [--] [----] 00:00 (UTC) all previous negotiations are officially terminated. The 23% 'White-hat Reward' is now converted into a 'Recovery Bounty' for the tracking of perpetrators and full recovery of assets. [--]. BOUNTY DETAILS Total Reward: [---] ETH (23% of recovered assets) Source of Funds: Deducted immediately from the recovered [----] ETH (approx. $5M). Eligibility: Anyone providing critical information leading to the full recovery of assets or identification of the perpetrators. [--]. THE 24-HOUR GRACE"
X Link 2026-02-08T23:59Z [----] followers, [---] engagements
"💬 Onchain Message: Chase I just want to be clear here. You didnt push back or bargain when I proposed the percentage and I acted in good faith based on that agreement. I understand we all need to make some $$(even if ti entails crushing the other guy) and being reminded of $32000 you didnt even know you had is meaningful. That said backing away after an agreement isnt the right way to handle this. If this is where it lands Ill take the L but I want to be clear about how it looks from my side. As an aside it cost me well over $10 to keep crbo.eth safe and available for you (the name itself"
X Link 2026-02-08T20:54Z [----] followers, [---] engagements
"Hello @usddwin2024 your proxy deployments on Base have been backdoored by malicious actors (CPIMP attack). Affected proxies: https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167 https://basescan.org/address/0x84ba01433762ee17605a0667c061e69ab3089756 https://basescan.org/address/0x45214ffbf96e2994c36d846c6aa2c0662c17851c https://basescan.org/address/0x3cdbbea29edfdc591a3d1d6a09fb6f423153b2cd https://basescan.org/address/0x8d160d5b43c95dd75b2da0d9b04d1e4ee729c8b6 https://basescan.org/address/0x78f594be76b6b61e8cc09352922f1aa688834167"
X Link 2026-02-08T14:57Z [----] followers, [---] engagements
"💬 Onchain Message: PRE-BOUNTY NOTICE: TARGET TELEGRAM IDs [----------] [----------] LOGGED. [---] ETH REWARD PENDING FOR [----] ETH RECOVERY. FORMAL RELEASE: FEB [--] 00:00 UTC. ACTIVE IN 16H. RETURN ASSETS TO VOID. https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d https://etherscan.io/tx/0xea70a0785d4f24dd8c28b076eb485dc19e9812aa9eafe24d3952681ed8e2056d"
X Link 2026-02-08T07:59Z [----] followers, [---] engagements
"Unfortunately the deployer of the backdoored RobinMarketManager proxy didn't act and the contract has got drained by CPIMP exploiter for $7400. https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e 💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about https://basescan.org/tx/0xe32ae31dc6a0eff4545374331ab9231768aaa1bfbc2bab88c93268e3a0d8a34e"
X Link 2026-02-08T07:03Z [----] followers, [----] engagements
"💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpmip exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to"
X Link 2026-02-07T08:27Z [----] followers, [----] engagements
"💬 Onchain Message: Hello your Gnosis Safe has been exploited for $70k because your custom module 0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19 has a receiveFlashLoan callback without verification of the flashloan initiator. We managed to rescue a small portion of USDT and sent it back to you. Please remove the vulnerable module. https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0 https://etherscan.io/tx/0x69fb51cacd2d2ac99874f0af1117596b15d88d0f10ee9f8c5c8e233f887aaff0"
X Link 2026-02-07T18:34Z [----] followers, [----] engagements
"💬 Onchain Message: Hello Im contacting you because I noticed you interacted with this contract on Base: 0x970c8A382bc387385760aE98FBccec937830bB8E This contract appears to be unsafe. There is an active cpimp exploit and funds be drained soon. The proxy still holds about $7000+ and the attacker seems to be waiting for more deposits TX proof: frontRun tx: approved tx: Implementation contract: origin Implementation : 0x826f1639dbEA421EfE620637c47b3b4C0ACc73B6 now malicious Implementation : 0xb4e81364cc5afa62f190887cf60a6cb59d42f95a Please be careful and avoid adding more funds. Just wanted to"
X Link 2026-02-07T08:17Z [----] followers, [---] engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/x::DefimonAlerts