似乎: 1. 0x9cb8d9BaE84830b7f5F11ee5048c04a80b8514BA 屬於/與 @0xswapnet 相關:swapnet-1.gitbook.io/docs/refe...… 2. 0xbeef63AE5a2102506e8a352a5bB32aA8B30B3112 屬於/與 @ApertureFinance 相關:github.com/Aperture-Finance/un...…
本文為機器翻譯
展示原文

BlockSec Phalcon
@Phalcon_xyz
01-26
ALERT! We detected a series of suspicious transactions hours ago targeting victim contracts deployed by two creators across #Ethereum, #Arbitrum, #Base, and #BSC, with total losses exceeding $17M.
The victim contracts are not open-source and appear to expose an arbitrary-call

來自推特
免責聲明:以上內容僅為作者觀點,不代表Followin的任何立場,不構成與Followin相關的任何投資建議。
喜歡
收藏
評論
分享




