7 تغريدة 1 قراءة Nov 24, 2022
We find a smart money (or dark money?) address that always borrows >$10M USDC/ETH and deposits it to exchange every time before FTX-drainer dumps ETH.
Chances are he knows the activity of FTX-drainer and benefits from it:
🧵
🎯Target: 0xd275e5cb559d6dc236a5f8002a5f0b4c8e610701
⏳Time: 2022-11-21 UTC
14:11 0xd275 transferred 15,000 $ETH to the exchange
16:11 the FTX hacker began to transfer 15,000 $ETH to multiple addresses
Both happened to transfer the same amount.
⌛️2022-11-21
8:00 0xd275 began to transfer $USDC to the exchange. #Binance
9:16 Hacker began to sell $ETH to get $RenBTC.
⏳On the day FTX was hacked🕵️‍♂️: 2022-11-12
The transaction activity of 0xd275 always stops before the hacker starts trading, and starts after the hacker stops trading🔄.
00:12 0xd275 has a contract interaction with AAVE and then stopped. The last transaction was 11-11 18:43.
⏳Two hours later, at 2022-11-12 02:22
The FTX hacker's address received ETH for the first time and began to sell tokens.
⌛️2022-11-12
7:34 Hacker address ceased activity;
7:58 0xd275 resumed activity.
⌛️2022-11-12
11:55 0xd275 ceased activity;
12:38 Hacker address resumed activity.
It seems that the hacker's behavior is somehow connected to 0xd275.🤨

جاري تحميل الاقتراحات...