Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sybil Attacker Report #609

Open
Annu2047 opened this issue May 23, 2022 · 1 comment
Open

Sybil Attacker Report #609

Annu2047 opened this issue May 23, 2022 · 1 comment

Comments

@Annu2047
Copy link

Annu2047 commented May 23, 2022

Related Addresses

10 addresses:

0x3a920ddbc41181846785ae9ee89929ffd26deeae
0x4a40eb870dcf533d4dc097c3d87aafe9f64490a1
0xce462c13f461deeb3ec2daadd5e7d5f90bb8f0b2
0x3b810b595edf7bb386942677ef01d8ebfe2946a1
0x1b3dff537b7d46a0d30b1d20b101c483586747aa
0xad05b50b71d1c05e3309e9f99e633a21741b77d9
0x6a61857928149cb7cd2ad29251902787bcf9c3b0
0xa297a06221ab3c846354e7fb1b37eb5da06bda21
0xb24156b92244c1541f916511e879e60710e30b84
0x5f62ece59fbba2bae1654e9b69bbfa4e4d5b329b

Reasoning

All address received (0.01 or 0.1)ETH from 0x2fc617e933a52713247ce25730f6695920b3befe on arbitrum network

Tx details:

0x3a920ddbc41181846785ae9ee89929ffd26deeae(https://arbiscan.io/tx/0x4502fcb5dfaff59007903890903acde8d44d06b3253f8b9fe64a4a46f64136df)
0x4a40eb870dcf533d4dc097c3d87aafe9f64490a1(https://arbiscan.io/tx/0x5b7c7da57f60095e9f3647722d92da8c63ffbe32bc7c66d1e6415cbaa0c1c40f)
0xce462c13f461deeb3ec2daadd5e7d5f90bb8f0b2(https://arbiscan.io/tx/0x93fda3d863e7ffb270c60b4b26909c0ecc4ce69f85a1ab95728a3514c89c66b3)
0x3b810b595edf7bb386942677ef01d8ebfe2946a1(https://arbiscan.io/tx/0x863f7c1a62b6485556566492cfe3e2a755839bb19a55a0917fda1781c8d0340a)
0x1b3dff537b7d46a0d30b1d20b101c483586747aa(https://arbiscan.io/tx/0xe5def2c3e2595b350220df228e1ce1a3d3915e44a8a4394d7e6a0b795a33d019)
0xad05b50b71d1c05e3309e9f99e633a21741b77d9(https://arbiscan.io/tx/0xfe2553a056ebcc31cc5eddc81a7b2ae219a6f2d472e827568151425980c84570)
0x6a61857928149cb7cd2ad29251902787bcf9c3b0(https://arbiscan.io/tx/0xa8e6ad533486f492d6fcbb5792c0a8955cb6c4e1684703bdaa67bd25bfde34e1)
0xa297a06221ab3c846354e7fb1b37eb5da06bda21(https://arbiscan.io/tx/0x174b409b046276b3aadb698904b58d6eb6fcee8af56f0836d791668e461d3cda)
0xb24156b92244c1541f916511e879e60710e30b84(https://arbiscan.io/tx/0xc491c43aa97d9c253c7e1499ac0fd7e61caf7b465366f8ced03cbdb556d83b76)
0x5f62ece59fbba2bae1654e9b69bbfa4e4d5b329b(https://arbiscan.io/tx/0x82433c3dfc35cd80467aa9744a462a5cdd5c83a03bce02776a3b077b12f6129b)

All addresses farmed Lens Protocol Profiles (LPP) from 2022-05-18 to 2022-05-18

Tx details:
0x3a920ddbc41181846785ae9ee89929ffd26deeae(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0x3a920ddbc41181846785ae9ee89929ffd26deeae)
0x4a40eb870dcf533d4dc097c3d87aafe9f64490a1(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0x4a40eb870dcf533d4dc097c3d87aafe9f64490a1)
0xce462c13f461deeb3ec2daadd5e7d5f90bb8f0b2(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0xce462c13f461deeb3ec2daadd5e7d5f90bb8f0b2)
0x3b810b595edf7bb386942677ef01d8ebfe2946a1(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0x3b810b595edf7bb386942677ef01d8ebfe2946a1)
0x1b3dff537b7d46a0d30b1d20b101c483586747aa(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0x1b3dff537b7d46a0d30b1d20b101c483586747aa)
0xad05b50b71d1c05e3309e9f99e633a21741b77d9(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0xad05b50b71d1c05e3309e9f99e633a21741b77d9)
0x6a61857928149cb7cd2ad29251902787bcf9c3b0(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0x6a61857928149cb7cd2ad29251902787bcf9c3b0)
0xa297a06221ab3c846354e7fb1b37eb5da06bda21(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0xa297a06221ab3c846354e7fb1b37eb5da06bda21)
0xb24156b92244c1541f916511e879e60710e30b84(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0xb24156b92244c1541f916511e879e60710e30b84)
0x5f62ece59fbba2bae1654e9b69bbfa4e4d5b329b(https://polygonscan.com/token/0xdb46d1dc155634fbc732f92e853b10b288ad5a1d?a=0x5f62ece59fbba2bae1654e9b69bbfa4e4d5b329b)

Methodology

Same as #602 (comment)

Rewards Address

0x6a1AF72bBcfD0BA492E502F83334d3910Fa025dB

@shanefontaine
Copy link
Member

@Annu2047 We have observed cases of apps sending funds through Disperse to help their users pay for gas on L2s. We have also seen altruistic people and faucets do the same. Because of this, we will need additional evidence. Some potential compelling evidence may be:

  • Identical transactions on the exact same day/time by most or all of the addresses
  • A trace of the ERC20 token between addresses (as opposed to native tokens)
  • A similar time/date that all the addresses started transacting on a chain

Minting an NFT within the same day is interesting, but does not provide conclusive evidence of a Sybil attack.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants