From 6371733ef8fc856d563930d60194c4d1c92ab4b2 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Mon, 3 Jun 2024 17:56:31 -0500 Subject: [PATCH 01/21] Add logic to fetch true positive addresses --- early-attack-detector-py/src/utils.py | 37 ++++++++++++++++++++++++++- 1 file changed, 36 insertions(+), 1 deletion(-) diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index 4ba32181..29458f3f 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -6,6 +6,10 @@ from concurrent.futures import ThreadPoolExecutor import functools import operator +import pandas as pd +import logging +import io +import re from src.constants import CONTRACT_SLOT_ANALYSIS_DEPTH, MASK, BOT_ID from src.logger import logger @@ -116,4 +120,35 @@ def alert_count(chain_id: int, alert_id: str) -> int: except Exception as err: logger.error(f"Error obtaining alert counts: {err}") - return alert_id_counts, alert_counts \ No newline at end of file + return alert_id_counts, alert_counts + +def get_tp_attacker_list(test_state=True) -> list: + content = open('tp_list_test.csv', 'r').read() if test_state else open('tp_list.csv', 'r').read() + if not test_state: + res = requests.get('https://raw.githubusercontent.com/forta-network/starter-kits/main/early-attack-detector-py/tp_list.csv') + logging.info(f"Made request to fetch fp list: {res.status_code}") + content = res.content.decode('utf-8') if res.status_code == 200 else open('tp_list.csv', 'r').read() + + df_fps = pd.read_csv(io.StringIO(content), sep=',') + attacker_list = set(df_fps['Attacker'].tolist()) + + # Regular expression for Ethereum addresses + eth_address_pattern = re.compile(r'^0x[a-fA-F0-9]{40}$') + + unique_attacker_addresses = set() + # Besides random strings, this list is populated + # by some Cosmos and Solana addresses. + non_eth_entries = [] + + for entry in attacker_list: + # some values were sneaking in as `float` types + # (e.g. 'nan') + if isinstance(entry, str): + parts = [part.strip() for part in entry.split(',')] + for part in parts: + if eth_address_pattern.match(part): + unique_attacker_addresses.add(part) + else: + non_eth_entries.append(part) + + return list(unique_attacker_addresses) \ No newline at end of file From 379ddccb0d58f637fd64816fe60423cf25afc300 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 4 Jun 2024 15:16:15 -0500 Subject: [PATCH 02/21] Add logic to update fetched TP list --- early-attack-detector-py/src/utils.py | 11 ++++++++++- 1 file changed, 10 insertions(+), 1 deletion(-) diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index 29458f3f..8333608f 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -151,4 +151,13 @@ def get_tp_attacker_list(test_state=True) -> list: else: non_eth_entries.append(part) - return list(unique_attacker_addresses) \ No newline at end of file + return list(unique_attacker_addresses) + +def update_tp_attacker_list(current_tp_list, test_state=True) -> list: + fetched_tp_list = get_tp_attacker_list(test_state) + + for entry in fetched_tp_list: + if entry not in current_tp_list: + current_tp_list.append(entry) + + return current_tp_list \ No newline at end of file From 8b328f66ea893da0dc2e796658d1b2eee0c00af3 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 4 Jun 2024 15:17:25 -0500 Subject: [PATCH 03/21] Add variables for blocks in a day --- early-attack-detector-py/src/constants.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/early-attack-detector-py/src/constants.py b/early-attack-detector-py/src/constants.py index 4c4fd50d..b1add51c 100644 --- a/early-attack-detector-py/src/constants.py +++ b/early-attack-detector-py/src/constants.py @@ -33,4 +33,7 @@ EXTRA_TIME_BOTS = [ '0xa91a31df513afff32b9d85a2c2b7e786fdd681b3cdd8d93d6074943ba31ae400' # funding tornado cash ] -EXTRA_TIME_DAYS = 180 \ No newline at end of file +EXTRA_TIME_DAYS = 180 + +ETH_BLOCKS_IN_ONE_DAY = 7200 +THREE_SECOND_BLOCKS_IN_ONE_DAY = 28800 \ No newline at end of file From 5f65271e6807d8e942a4cff11ddecdfc12d6648d Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 4 Jun 2024 17:07:42 -0500 Subject: [PATCH 04/21] Remove 'test_state' from TP fetching functions --- early-attack-detector-py/src/utils.py | 19 ++++++++----------- 1 file changed, 8 insertions(+), 11 deletions(-) diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index 8333608f..81bdf135 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -122,22 +122,19 @@ def alert_count(chain_id: int, alert_id: str) -> int: return alert_id_counts, alert_counts -def get_tp_attacker_list(test_state=True) -> list: - content = open('tp_list_test.csv', 'r').read() if test_state else open('tp_list.csv', 'r').read() - if not test_state: - res = requests.get('https://raw.githubusercontent.com/forta-network/starter-kits/main/early-attack-detector-py/tp_list.csv') - logging.info(f"Made request to fetch fp list: {res.status_code}") - content = res.content.decode('utf-8') if res.status_code == 200 else open('tp_list.csv', 'r').read() +def get_tp_attacker_list() -> list: + res = requests.get('https://raw.githubusercontent.com/forta-network/starter-kits/main/early-attack-detector-py/tp_list.csv') + logging.info(f"Made request to fetch fp list: {res.status_code}") + content = res.content.decode('utf-8') if res.status_code == 200 else open('tp_list.csv', 'r').read() df_fps = pd.read_csv(io.StringIO(content), sep=',') attacker_list = set(df_fps['Attacker'].tolist()) - # Regular expression for Ethereum addresses eth_address_pattern = re.compile(r'^0x[a-fA-F0-9]{40}$') unique_attacker_addresses = set() - # Besides random strings, this list is populated - # by some Cosmos and Solana addresses. + # Could be populated by random strings + # and non-Ethereum addresses non_eth_entries = [] for entry in attacker_list: @@ -153,8 +150,8 @@ def get_tp_attacker_list(test_state=True) -> list: return list(unique_attacker_addresses) -def update_tp_attacker_list(current_tp_list, test_state=True) -> list: - fetched_tp_list = get_tp_attacker_list(test_state) +def update_tp_attacker_list(current_tp_list) -> list: + fetched_tp_list = get_tp_attacker_list() for entry in fetched_tp_list: if entry not in current_tp_list: From 2df14c3af352a187f87a024fb6af75f700e9365b Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 4 Jun 2024 17:13:04 -0500 Subject: [PATCH 05/21] Create True Positive list CSV --- early-attack-detector-py/tp_list.csv | 340 +++++++++++++++++++++++++++ 1 file changed, 340 insertions(+) create mode 100644 early-attack-detector-py/tp_list.csv diff --git a/early-attack-detector-py/tp_list.csv b/early-attack-detector-py/tp_list.csv new file mode 100644 index 00000000..c5254c32 --- /dev/null +++ b/early-attack-detector-py/tp_list.csv @@ -0,0 +1,340 @@ +Date,MonthYear,,Attack Name,Network,Type of attack,Type of Protocol,Losses in USD,Deplorer Adress,Attacker,Attacker Smart Contracts,Attacked Protocol Addresses,Exploit is happening during smart contract creation,Forta Detected,Detected For Protocol,AlertId,Time of Alert,ExploitTxHash,Time of Exploit Tx,Diff,Diff in sec,Detected Early or During Exploit,Super Early,Alert id - Beta,Time of Beta/beta alt or Lean AD,DIff with exploit in secs,prod vs beta/lean -diff in secs,Time to Detect Comment,Victim,Status,Victim Comment,Comment,Indication of performance issue,Github Issue,Bullet points,ProtocolContracts,MatchingAlertHashesForProtocolContracts_TPs,MatchingAlertHashesForProtocolContracts_FPs,FP Count,MEV FrontRun,Hyperlink,# of TX to any protocol address where a new contract is created (60days prior to attack),,Funded by,Funder exploit contract +,189912,,Dungeon Swap,BSC,,,,,0x7d192fa3a48c307100c3e663050291fff786aa1f,,,,FN,,,,0x3ee23c1585474eaa4f976313cafbc09461abb781d263547c8397788c68a00160,Feb-27-2023 06:25:41 AM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/23/2023,20232,,AquaDAO,Cosmos,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +2/23/2023,20232,,NFTCloud,BSC,,,,,0x16b904b61a5104e270521e759d27520bb97f1dd0,,,,FN,,,,0x4897b7fb241c72dc96d97ba4ad42c00654d47cb3961239f5088b878942b4d48d,2023-02-24 09:33:02 (UTC),,,,,,,,,,,,,,,,,,,,,,,,,, +2/23/2023,20232,,FEG Token,BSC,,,,,0x2c4d38413b3eabaf73b12d23525521850fc7cc0b,,,,FN,,,,0x5e4e4431751c462b068268376c43e7759fee2a53e224e59b42d8d485269c91ec,Feb-23-2023 05:11:03 PM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/23/2023,20232,,Dynamic Finance,BSC,,,,,0x0C925A25fDaaC4460CAb0CC7abc90Ff71f410094,,,,FN,,,,0xc09678fec49c643a30fc8e4dec36d0507dae7e9123c270e1f073d335deab6cf0,Feb-22-2023 05:36:32 AM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/15/2023,20232,,Revert Finance,?,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +2/17/2023,20232,,Dexible,Mainnet,,,,,0x684083f312ac50f538cc4b634d85a2feafaab77a,,,,TP,,,"Fri, 17 Feb 2023 05:33:35 GMT",0x138daa4cbeaa3db42eefcec26e234fc2c89a4aa17d6b1870fc460b2856fd11a6,Feb-17-2023 04:20:35 AM +UTC,4680,4680,,,,,,,,No Victim,,,,,,,,,,,,,,,, +2/15/2023,20232,,Multichain,Mainnet,,,,,0xfde0d1575ed8e06fbf36256bcdfa1f359281455a,,,,FN,,,,0x192e2f19ab497f93ed32b2ed205c4b2ff628c82e2f236b26bec081ac361be47f,Feb-15-2023 03:47:35 AM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/16/2023,20232,,Platypus Finance,Avalanche,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +2/9/2023,20232,,SushiSwap Bento Box,Mainnet,,,,,0xe7f7a0154bf17b51c89d125f4bca543e8821d92f,,,,FN,,,,0x9098af4f226d88edd7097a122d0368d79a0ab5781766cc0a95b197188404f751,Feb-09-2023 09:55:59 PM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/7/2023,20232,,CoW Swap Protocol,Mainnet,,,,,"0xc0E82C1ed4786F8B7F806D1B8A6335ec485266fF,0x94b6F400df694D0de29F600B15BAeed83E95658C",,,,FN,,,,0x9d8e649bfeb42fe0523939baf803160a0fbbdc7cc8122c8c5e24c8ab40f8af85,Feb-07-2023 02:13:11 AM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/7/2023,20232,,LionGo,BSC,,,,,0x36d173937f3e03074246adcfd6e4d06f3638c28a,,,,FN,,,,0xd29c32ab8e43192ceea1d8c632e8c3136323215acb99936f6d85e891f69a6b34,Feb-07-2023 03:32:27 PM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/13/2023,20232,,DForce Network,Arbitrum/Optimism,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +2/5/2023,20232,,Degen Millionaires Club,BSC,,,,,?,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +2/3/2023,20232,,SperaxUSD,Arbitrum ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +2/4/2023,20232,,Orion Protocol,Mainnet/ BSC,,,,,"0x3dabf5e36df28f6064a7c5638d0c4e01539e35f1, 0x837962b686fd5a407fb4e5f92e8be86a230484bd",,,,FN,,,,0xfb153c572e304093023b4f9694ef39135b6ed5b2515453173e81ec02df2e2104,Feb-02-2023 03:40:20 PM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +2/1/2023,20232,,Bevo,BSC,,,,,0xd3455773C44bF0809e2aEff140E029c632985C50,,,,FN,,,,0xb97502d3976322714c828a890857e776f25c79f187a32e2d548dda1c315d2a7d,2023-01-30 09:37:05 (UTC),,,,,,,,,,,,,,,,,,,,,,,,,, +2/3/2023,20232,,BonqDAO,Mainnet,,,,,0xcAcf2D28B2A5309e099f0C6e8C60Ec3dDf656642,,,,FN,,,,0xdd6dd9726a1ad07412b9bf2ae407d2e030f29394703f43ec18859ba8d8368349,Feb-01-2023 07:02:11 PM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +3/1/2023,20233,,Shata Capital,Mainnet,,,,,0xa0959536560776ef8627da14c6e8c91e2c743a0a,,,,FN,,,,,,,,,,,,,,,,,,Identified as MEV,,,,,,,,,,,,, +3/6/2023,20233,,PeopleDAO,Mainnet,,,,,0x6e5cc01c94ffab8a1db9e70a8cac19767f239443,,,,FN,,,,0x4bd2f6981b6b3005da8730bc14bfbbf36bd9faab6b5976012830c6235ea0afcf,Mar-06-2023 01:04:47 PM +UTC,,,,,,,,,,,,,,,,,,,,,,,,,, +3/13/2023,20233,,Euler,Mainnet,,,,,0xB2698C2D99aD2c302a95A8DB26B08D17a77cedd4,,,,TP,,,"Mon, 13 Mar 2023 08:59:59 GMT",0xa476fad72c8f4ee15fd2d75ecda4701d8f3ac74431aa453521f13a01c8688142,Mar-13-2023 08:54:23 AM +UTC,264,264,,,,,,,,No Victim,,,,,,,,,,,,,,,, +3/9/2023,20233,,SushiSwap ,Mainnet,,,,,0xe7bcf916e255d8eff168f7bd032be02e760aa2fc,,,,FN,,,,,,,,,,,,,,,,,,Idenified as MEV,,,,,,,,,,,,, +3/15/2023,20233,,Poolz Finance,BSC,,,,,0x190Cd736F5825ff0Ae0141B5C9cb7Fcd042cef2a ,,,,FN,,,,0x39718b03ae346dfe0210b1057cf9f0c378d9ab943512264f06249ae14030c5d5,,,,,,,,,,,,,,Idenified as MEV,,,,,,,,,,,,, +3/17/2023,20233,,Para.space,Mainnet,,,,,0x21B7A2c0F7C0C29c0Bbc55f5620Dc797c29c46B3,,,,FN,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +3/29/2023,20233,,Safemoon,BSC,,,,,0x286e09932b8d096cba3423d12965042736b8f850,,,,FN,,,,0x48e52a12cb297354a2a1c54cbc897cf3772328e7e71f51c9889bb8c5e533a934,,,,,,,,,,,,,,Idenified as MEV,,,,,,,,,,,,, +3/17/2023,20233,,Anji Eco Hack,BSC,,,,,0xc578d755cd56255d3ff6e92e1b6371ba945e3984,,,,FN,,,,,,,,,,,,,,,,,,pos rep; thousands of tx,,,,,,,,,,,,, +3/19/2023,20233,,Thunder Lands,Polygon,,,,,0x9b62d31d90511b7343da090959107f6bf4c29417,,,,FN,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +3/22/2023,20233,,Nuwa,BSC,,,,,0x286e09932b8d096cba3423d12965042736b8f850,,,,FN,,,,,,,,,,,,,,,,,,Idenified as MEV,,,,,,,,,,,,, +3/22/2023,20233,,ASKACR Token,BSC,,,,,0x190cd736f5825ff0ae0141b5c9cb7fcd042cef2a,,,,FN,,,,,,,,,,,,,,,,,,Idenified as MEV,,,,,,,,,,,,, +3/29/2023,20233,,UMNS,BSC,,,,,0xca357e19078356376a8a0235d8ac885f6c620354,,,,FN,,,,0x5feb28c35ddda566cf224714f7f721d093ab1de964ea0420f025dd44d953a344,,,,,,,,,,,,,,,,,,,,,,,,,,, +3/29/2023,20233,,UF DAO,BSC,,,,,0xc578d755cd56255d3ff6e92e1b6371ba945e3984,,,,FN,,,,,,,,,,,,,,,,,,Pos Rep,,,,,,,,,,,,, +4/1/2023,20234,,Allbridge,BSC,,,,,"0x2b3cff12c02625518deb0af14684999fb6e3e360,0xc578d755cd56255d3ff6e92e1b6371ba945e3984",,,,TP,,ATTACK-DETECTOR-2,"Sun, 02 Apr 2023 00:18:00 GMT",0x30b1aa3d20d8446e2f9a8b3da7620d1bf2eed1cb2844a28cee413b4932203ff4,Apr-02-2023 12:12:38 AM +UTC,5 min 22 sec,322,,,,,,,,No Victim,,,,,,,,,,,,,,,, +4/10/2023,20234,,Sushiswap,Mainnet,,,,,"0x719cdb61e217de6754ee8fc958f2866d61d565cf,0xdd39ca368240ebaacf292ad2624c9b0ef7e9eea6",,,,TP,,ATTACK-DETECTOR-2,"Sun, 09 Apr 2023 08:42:06 GMT",0xea3480f1f1d1f0b32283f8f282ce16403fe22ede35c0b71a732193e56c5c45e8,Apr-09-2023 02:35:23 AM +UTC,6 hours 7 min,21960,,,,,,,,Yes,,,,,,,,,,,,,,,, +4/12/2023,20234,,MetaPoint,BSC,,,,,"0x341722ba06a760d24b487e68dc93679339a0cc2f,0x554364b2407d1f25A2F4b8020D8E9236722FCA40,0x0D1969A30bB4BA02e731862edBCed5F5abBa8373",,,,FN (beta detected - see link in the comment),,ATTACK-DETECTOR-2,"Tue, 11 Apr 2023 20:25:43 GMT",0x170008739b53f717edb0507e9b57b170f82fe109b0514d2b7e2e1114515454bb,2023-04-11 20:07:15,17 min 32 sec,1052,,,,,,,,No Victim,,,perf issue; detected by beta,,,,,,,,,,,,, +4/13/2023,20234,,Yearn,Mainnet,,,,,"0x5bac20beef31d0eccb369a33514831ed8e9cdfe0,0x16af29b7efbf019ef30aae9023a5140c012374a5,0x6f4a6262d06272c8b2e00ce75e76d84b9d6f6ab8",,,,TP,,ATTACK-DETECTOR-2,"Thu, 13 Apr 2023 05:53:17 GMT",0xd979fba826f3931f0be8dd3a4119d4c0ff6e0834d1f3b64d41970503af3c00af,2023-04-13 5:45:11,8 min 6 sec,486,,,,,,,,Yes,,,with attribution,,,,,,,,,,,,, +4/15/2023,20234,,0x0Audits,Mainnet,,,,,0xcb81b2601fcde7ef06f01b3b2fdd4486225b8923,,,,FN,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +4/16/2023,20234,,Swapos,Mainnet,,,,,0x2df07C054138Bf29348F35a12a22550230BD1405 ,,,,FN (beta detected - see link in the comment),,ATTACK-DETECTOR-2,"Sun, 16 Apr 2023 05:44:36 GMT",0xbe643ccdcae57181b9fef554d63029e0605b2e860172d442c37eaabffdb44575,2023-04-16 5:32:47,11 min 11 sec,671,,,,,,,,Yes,,,with attribution. perf issue; detected by beta,,,,,,,,,,,,, +4/17/2023,20234,,DeFiGeek,Mainnet,,,,,0xDBDf5f801da11d65fE9B1D449CBEd6EBE2f04Fd3,,,,FN (beta detected - see link in the comment),,ATTACK-DETECTOR-2,"Sun, 16 Apr 2023 10:12:31 GMT",0xf9b673551de378a94ed484124085364055c2251881aabdd323b9be5394e8a766,2023-04-16 10:03:35,10 min 56 sec,656,,,,,,,,No Victim,,,perf issue; detected by beta,,,,,,,,,,,,, +4/19/2023,20234,,OceanLife,BSC,,,,,0xfb8ef8de849079559801bff8848178640cdd41b7,,,,FN (beta detected - see link in the comment),,ATTACK-DETECTOR-2,"Tue, 18 Apr 2023 19:35:57 GMT",0xa21692ffb561767a74a4cbd1b78ad48151d710efab723b1efa5f1e0147caab0a,2023-04-19 1:04:41,4 hours 29 min,16140,,,,,,,,No Victim,,,perf issue; detected by beta,,,,,,,,,,,,, +4/20/2023,20234,,Unlock Protocol,Mainnet,,,,,0x43ee4169d9ff5e5b10ca42923b1e5d07a157bb71 ,,,,FN,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +4/18/2023,20234,,Hundred Finance,Mainnet/OP,,,,,0x155da45d374a286d383839b1ef27567a15e67528 ,,,,TP,,ATTACK-DETECTOR-2,"Sat, 15 Apr 2023 14:13:12 GMT",0x6e9ebcdebbabda04fa9f2e3bc21ea8b2e4fb4bf4f4670cb8483e2f0b2604f451,2023-04-15 14:12:00,1 min 12 sec,72,,,,,,,,No Victim,,,,,,,,,,,,,,,, +4/20/2023,20234,,Elastic,BSC,,,,,0xa31f00e0bb9be004ebc09056b924817edeca2b23,,,,FN,,,,,,,,,,,,,,,,,,FP mitigated,,,,,,,,,,,,, +4/28/2023,20234,,ForTube,Mainnet,,,,,0x3bfe2a46f0050c76ea95b65abfa826bbfb27596d ,,,,FN (beta detected - see link in the comment),,ATTACK-DETECTOR-2,"ri, 28 Apr 2023 09:21:34 GMT",0x4b4fa751b2cb82ff9aa53406f48e83a44babb7c60d2354e13905efa7a2ddffe7,Apr-28-2023 09:22:47 AM +UTC,1 min 13 sec,73,,,,,,,,No Victim,,,perf issue; detected by beta,,,,,,,,,,,,, +4/28/2023,20234,,0vix,Polygon,,,,,"0x702ef63881b5241ffb412199547bcd0c6910a970,0xBEF0a2A4885EA5Df895047F49c202525B73DCc68",,,,FN (beta detected - see link in the comment),,ATTACK-DETECTOR-3,"Fri, 28 Apr 2023 16:45:30 GMT",0x10f2c28f5d6cd8d7b56210b4d5e0cece27e45a30808cd3d3443c05d4275bb008,2023-04-28 10:45:16,6 hours,21600,,,,,,,,No Victim,,,perf issue; detected by beta,,,,,,,,,,,,, +5/2/2023,20235,,Level Finance,BSC,,,,,0x70319d1c09e1373fc7b10403c852909e5b20a9d5,,,,FN,,,,,,,,,,,,,,,,,,Based on base bots there should have been an alert; funding missing; funded by diff account,,,,"0xA5aBFB56a78D2BD4689b25B8A77fd49Bb0675874,0xB5C42F84Ab3f786bCA9761240546AA9cEC1f8821,0x4265af66537F7BE1Ca60Ca6070D97531EC571BDd,0xcC5368f152453D497061CB1fB578D2d3C54bD0A0,0xBD8638C1fF477275E49aaAe3E4691b74AE76BeCd,0xf584A17dF21Afd9de84F47842ECEAF6042b1Bb5b,0x04Db83667F5d59FF61fA6BbBD894824B233b3693,0xe423BB0a8b925EABF625A8f36B468ab009a854e7,0x6cd4c40016F10E1609f16fB4a84CAe4700a4DaD6,0x8826C45DAB800697C48ea87322Ac0a6Ed70cE4A4,0x3d54A363bC92a2da545f39a0F09dE62a2cC7E62d,0x6023C6afa26a68E05672F111FdbB1De93cBAc621,0x360071D15cce5542E6B7209752eA479b84b28625,0xa0E6B7aE9F4D284df33D41B1355aC28CBDC64F8c,0x8f886b4b10344289cEAd777953f95FA0317bcD33,0x6442b001c5AcCE8cb71986ad65B22684821A927A,0x4D91cf959C86888df1ed20877b27Fa0C7BC08147,0xB64E280e9D1B5DbEc4AcceDb2257A87b400DB149,0x9a1409a1b7826A80B6C6D33f85a342Cd9448FB54,0x92A0A11A57C28d4C86a629530fd59B83B1276003,0x804bbb7a06c0934571aAD137360215ef1335e6A1,0xBe2B6C5E31F292009f495DDBda88e28391C9815E,0x87CC04d6FE59859cB7eB6d970EBc22dCdCBc9368,0xB07953F23545796710957faec97F05B21146AC2d,0x8BFf27E9Fa1C28934554e6B5239Fb52776573619,0x63B487204A76bA4962d384Dc41F7B06e880c8d80,0x4385d6E60AE5f53E63d0A69Af4434A249014DCB2,0x31A3CDCC3a04fd8a1888e33E38b9D2bb72D6b1dc,0x4aa34261769BA17FAA10B99BaCF63Baca4238205,0x8e532B2dBa81C4474e1ee2e0a35cd25347f2ad3B,0x1Ab33A7454427814a71F128109fE5B498Aa21E5d,0x5aE081b6647aEF897dEc738642089D4BDa93C0e7,0xe5f3b669fd58AF914111759da054f3029734678C,0x08A12FFedf49fa5f149C73B07E31f99249e40869,0x95883611685a20936EC935B0A33F82e11D478e3D,0x22E7F559bE09B6A758F02A84dDC64f45642206a1,0x977087422C008233615b572fBC3F209Ed300063a,0x4980c82cF6A4bf0A3265985d4bC01120A0C6bb22,0xf1fe97ceA2cd0bA34A73e26635C77C410030fE8e,0x2Ed6ceD074B2E822d3Afc1949A4433Bf4654A43A,0x712A2e08C67cD7153f04FdB3037d4696300921d0,0xc31bcCd2106Dae0b27c2C7E1385E12cEF4512f5E,0xD463EeC58D1Eb7F94865e2F2c09f097f7EB0B895,0x30f00859A0b4893b8201cb6478434EB8dDb9195a,0xe3197276dC213F62d49b0Ee77E61b6a927609eAe,0xC0717eb8ad66d0b3BF16Bbe0bAC0fb605a715A35,0x4a46649eC023DF2DCF18Ee381281408b3432428b,0xD804Ea7306abE2456Bdd04a31F6f6a2F55Dc0d21,0x9c1A19038dF30636e15e67303d9ed3474d76e015,0x03D5c199c4Abf2451D7b64b73A8078fC5a05eBa9,0xA5aBFB56a78D2BD4689b25B8A77fd49Bb0675874",#REF!,,,,,,,, +5/2/2023,20235,,NeverFall,BSC,,,,,0x53b757db8b9f3375d71eafe53e411a16acde75ee,,,,FN (beta detected - see link in the comment),,,2023-05-02 16:45:22 (UTC),0xccf513fa8a8ed762487a0dcfa54aa65c74285de1bc517bd68dbafa2813e4b7cb,"Tue, 02 May 2023 17:00:02 GMT",14min 40 sec,880,,,,,,,,Yes,,,perf issue; detected by beta,,,,"0x5ABDe8B434133C98c36F4B21476791D95D888bF5,0x97a08A9Fb303b4f6F26C5B3C3002EBd0E6417d2c",#REF!,,,,,,,, +5/5/2023,20235,,DeusDAO,Arb/Mainnet,,,,,0x189cf534de3097c08b6beaf6eb2b9179dab122d1,,,,FN,,,,,,,,,,,,,,,,,,likely miss due to arb/mainnet split of alerts; already fixed,,,,"0xBC1b62dB243B51dabCd9540473324f36E094EC55, 0xDE1E704dae0B4051e80DAbB26ab6ad6c12262DA0",#REF!,,,,,,,, +5/5/2023,20235,,DeusDAO,BSC,,,,,0x5a647e376d3835b8f941c143af3eb3ddf286c474,,,,FN,,,,,,,,,,,,,,,,,,,,,,"0xDE1E704dae0B4051e80DAbB26ab6ad6c12262DA0,0x5929dbBc11711D2B9e9ca0752393C70De74261F5,0x1472b3081d81B792E697aEA90ACCbbc4AdC5bAF9",#REF!,,,,,,,, +5/6/2023,20235,,Block Forest,BSC,,,,,0x2d2bcd3caed4b51b7090c78cfd73ea091a4b44de ,,,,FN (beta detected - see link in the comment),,,May-06-2023 04:24:13 PM +UTC,0x5a89e083e8e3ad75c38be65a6a92d7e32249cf9b5ceb304bf1ae2409241993ff,"Fri, 21 Apr 2023 05:43:36 GMT",1 hour 19 min,1296000,,,,,,,,No Victim,,,perf issue; detected by beta,,,,"0x538107874AEEAE2E0685B517a1A86dD5238c38b1,0x97a22Ab59234Ba7dd11d5c72E206Ed19F045B06c,0xC4e83B0EF81B4C7CAb394f1C0D4A39bf8bc4e248,0xb6576CB02dc030e819b59C57a5819Df638cB09ab",#REF!,,,,,,,, +5/6/2023,20235,,Floki Ino,Mainnet,,,,,0x662d2dc484d65a3ba4da80e36eaa9a400af0726b ,,,,FN,,,,,,,,,,,,,,,,,,"mulichain funding; no funding alert, but other high precisition bots?",,,,"0xb1F4b66104353eC63D8d59D3da42C0b4Fb06E7f3,0x30Ac70e2dc5092f64031685bb23D50f782C27566,",#REF!,,,,,,,, +5/9/2023,20235,,Weeb,Mainnet,,,,,0xe9ba23Db4CAB47621d72B7A51EF166992A025B16,,,,FN,,,,,,,,,,,,,,,,,,binance funding; no funding alert,,,,"0x9E3D5B091e7728080D9b2E1AAF20EE63db6b65BB,0x2E38EB45e9d7b253A1c2Dc8e611B2c70e460AEDb",#REF!,,,,,,,, +5/10/2023,20235,,Trust Trident,BSC,,,,,0xa3aa817587556C023e78B2285D381C68CEe17069,,,,TP,,ATTACK-DETECTOR-2,"Sat, 13 May 2023 23:19:01 GMT",0xfe80df5d689137810df01e83b4bb51409f13c865e37b23059ecc6b3d32347136,2023-05-13 23:17:25,1min 36 sec,96,,,,,,,,No Victim,,,,,,,"0xeaF83465025b4Bf9020fdF9ea5fB6e71dC8a0779,0xa645995e9801F2ca6e2361eDF4c2A138362BADe4,0x61f834516504fC02b3cd80D41722df08fD030141,0x358EfC593134f99833C66894cCeCD41F550051b6",#REF!,,,,,,,, +5/10/2023,20235,,Snooker,BSC,,,,,0x6b67f9e79180e08cb42132754bc9f88558b1e535,,,,FN,,,,,,,,,,,,,,,,,,TC didnt trigger as this wasnt a new account when TC funds were deposited,,,,"0xA3f5ea945c4970f48E322f1e70F4CC08e70039ee,0x7957096Bd7324357172B765C4b0996Bb164ebfd4,0x05e2899179003d7c328de3C224e9dF2827406509",#REF!,,,,,,,, +5/12/2023,20235,,LW Token,BSC,,,,,0xffc21396bc3c981f057b4ec993edb2a305ef8a62,,,,FN,,,,,,,,,,,,,,,,,,,,,,0xD7aa5ae820dE27b7Ad8b2d2D92781B68943086bD,#REF!,,,,,,,, +5/13/2023,20235,,BitPaid,BSC,,,,,0x878a36edfb757e8640ff78b612f839b63adc2e51,,,,FN,,,,,,,,,,,,,,,,,,,,,,"0x858DE6F832c9b92E2EA5C18582551ccd6add0295,0x40F75eD09c7Bc89Bf596cE0fF6FB2ff8D02aC019",#REF!,,,,,,,, +5/14/2023,20235,,LandNFT,BSC,,,,,0x96b89c2560bcc43c342c12ba9c33dab7eb571a90,,,,TP,,ATTACK-DETECTOR-2,"Sun, 14 May 2023 15:48:12 GMT",0xe4db1550e3aa78a05e93bfd8fbe21b6eba5cce50dc06688949ab479ebed18048,May-14-2023 4:39:50 PM,- 49min,-2940,,,,,,,,,,,,,,,0x1a62fe088F46561bE92BB5F6e83266289b94C154,#REF!,,,,,,,, +5/20/2023,20235,,Tornado Cash DAO,Mainnet,,,,,"0x092123663804f8801b9b086b03b98d706f77bd59,0x592340957ebc9e4afb0e9af221d06fdddf789de9",,,,FN (beta detected - see link in the comment),,,May-20-2023 07:34:35 AM +UTC,,"Sun, 21 May 2023 12:54:35 GMT",29 hours and 20 min,105600,,,,,,,,Yes,,,perf issue?,,,,"0x12d66f87a04a9e220743712ce6d9bb1b5616b8fc,0x47ce0c6ed5b0ce3d3a51fdb1c52dc66a7c3c2936,0x910cbd523d972eb0a6f4cae4618ad62622b39dbf,0xa160cdab225685da1d56aa342ad8841c3b53f291,0xd4b88df4d29f5cedd6857912842cff3b20c8cfa3,0xfd8610d20aa15b7b2e3be39b396a1bc3516c7144,0x07687e702b410Fa43f4cB4Af7FA097918ffD2730,0x23773E65ed146A459791799d01336DB287f25334,0x22aaA7720ddd5388A3c0A3333430953C68f1849b,0x03893a7c7463AE47D46bc7f091665f1893656003,0x2717c5e28cf931547B621a5dddb772Ab6A35B701,0xD21be7248e0197Ee08E0c20D4a96DEBdaC3D20Af,0x4736dCf1b7A3d580672CcE6E7c65cd5cc9cFBa9D,0xd96f2B1c14Db8458374d9Aca76E26c3D18364307,0x169AD27A470D064DEDE56a2D3ff727986b15D52B,0x0836222F2B2B24A3F36f98668Ed8F0B38D1a872f,0x178169B423a011fff22B9e3F3abeA13414dDD0F1,0x610B717796ad172B316836AC95a2ffad065CeaB4,0xbB93e510BbCD0B7beb5A853875f9eC60275CF498,0xca0840578f57fe71599d29375e16783424023357,0x3f615ba21bc6cc5d4a6d798c5950cc5c42937fbd,0x5efda50f22d34f262c29268506c5fa42cb56a1ce,0x2f50508a8a3d323b91336fa3ea6ae50e55f32185,0xCEe71753C9820f063b38FDbE4cFDAf1d3D928A80,0xffbac21a641dcfe4552920138d90f3638b3c9fba,0x179f48c78f57a3a78f0608cc9197b8972921d1d2,0xb04E030140b30C27bcdfaafFFA98C57d80eDa7B4,0x77777feddddffc19ff86db637967013e6c6a116c,0x3efa30704d2b8bbac821307230376556cf8cc39e,0x746aebc06d2ae31b71ac51429a19d54e797878e9,0xd90e2f925DA726b50C4Ed8D0Fb90Ad053324F31b,0x5f6c97C6AD7bdd0AE7E0Dd4ca33A4ED3fDabD4D7,0xf4B067dD14e95Bab89Be928c07Cb22E3c94E0DAA,0x58E8dCC13BE9780fC42E8723D8EaD4CF46943dF2,0x01e2919679362dFBC9ee1644Ba9C6da6D6245BB1,0x2FC93484614a34f26F7970CBB94615bA109BB4bf,0x26903a5a198D571422b2b4EA08b56a37cbD68c89,0xB20c66C4DE72433F3cE747b58B86830c459CA911,0x2573BAc39EBe2901B4389CD468F2872cF7767FAF,0x527653ea119f3e6a1f5bd18fbf4714081d7b31ce,0x653477c392c16b0765603074f157314cc4f40c32,0x88fd245fedec4a936e700f9173454d1931b4c307,0x09193888b3f38c82dedfda55259a82c0e7de875e,0x5cab7692d4e94096462119ab7bf57319726eed2a,0x756c4628e57f7e7f8a459ec2752968360cf4d1aa,0x722122df12d4e14e13ac3b6895a86e84145b6967,0x94a1b5cdb22c43faab4abeb5c74999895464ddaf,0xb541fc07bc7619fd4062a54d96268525cbc6ffef,0x94c92f096437ab9958fc0a37f09348f30389ae79,0xd82ed8786d7c69dc7e052f7a542ab047971e73d2,0xdd4c48c0b24039969fc16d1cdf626eab821d3384",#REF!,,,,,,,, +5/29/2023,20235,,Jimbo's Protocol,Arb,,,,,0x102be4bccc2696c35fd5f5bfe54c1dfba416a741,,,,FN,,,,,,,,,,,,,,,,,,,,,,"0x271944d9D8CA831F7c0dBCb20C4ee482376d6DE7,0xC3813645Ad2Ea0AC9D4d72D77c3755ac3B819e38, ",#REF!,,,,,,,, +5/22/2023,20235,,LunaFI,Polygon,,,,,0x11576cb3d8d6328cf319e85b10e09a228e84a8de,,,,FN,,,,,,,,,,,,,,,,,,,,,,"0xE6E5f921C8CD480030EFb16166C3f83ABC85298D,0xfc604b6fD73a1bc60d31be111F798dd0D4137812,0x77D97db5615dFE8a2D16b38EAa3f8f34524a0a74,0x58edA02E51dBBFD5190F779573BB3eFBD41AFc68,0x14e849B39CA7De7197763b6254EE57eDBE0F3375,0x1311DCADf3330dD0AEB4d03177F9568880Febb34,0x07244afb53Ad824366a19Cb3c972030064555E75,0x2Bb91032F277BDc0DA7De271Ba03B3341B73b4c1",#REF!,,,,,,,, +5/23/2023,20235,,CSToken,BSC,,,,,0x2cdeee9698ffc9fcabc116b820c24e89184027ba,,,,TP,,ATTACK-DETECTOR-2,"Tue, 23 May 2023 15:44:37 GMT",0x906394b2ee093720955a7d55bff1666f6cf6239e46bea8af99d6352b9687baa4,May-23-2023 04:43:30 PM +UTC,- 58min,-3480,,,,,,,,No Victim,,,,,,,"0x8BC6Ce23E5e2c4f0A96429E3C9d482d74171215e,0x6BC2823De2c3718D3669C2E7036E1D888C4107a1,",#REF!,,,,,,,, +5/23/2023,20235,,Local Traders,BSC,,,,,0xd771dfa8fa59bd2d1251a0481fca0cf216276dd7,,,,FN,,,,,,,,,,,,,,,,,,,,,,"0x5C65BAdf7F97345B7B92776b22255c973234EfE7,0x303554d4D8Bd01f18C6fA4A8df3FF57A96071a41",#REF!,,,,,,,, +5/24/2023,20235,,GPT Token,BSC,,,,,0x054a3574d8082112575843dd944ff42c58dda38d,,,,TP,,ATTACK-DETECTOR-2,"Wed, 24 May 2023 15:52:47 GMT",0xb77cb34cd01204bdad930d8c172af12462eef58dea16199185b77147d6533391,2023-05-24 16:00:38,7min 13 sec,-407,,,,,,,,No Victim,,,,,,,"0xa1679abEF5Cd376cC9A1C4c2868Acf52e08ec1B3,0x77a684943aA033e2E9330f12D4a1334986bCa3ef",#REF!,,,,,,,, +5/28/2023,20235,,Baby Doge,BSC,,,,,0xcbc0d0c1049eb011d7c7cfc4ff556d281f0afebb,,,,TP,,ATTACK-DETECTOR-2,"Sun, 28 May 2023 01:53:00 GMT",0x098e7394a1733320e0887f0de22b18f5c71ee18d48a0f6d30c76890fb5c85375,May-28-2023 02:11:53 AM +UTC,-18min 53 sec,-1027,,,,,,,,No Victim,,,,,,,"0xc748673057861a797275CD8A068AbB95A902e8de,0xc736cA3d9b1E90Af4230BD8F9626528B3D4e0Ee0",#REF!,,,,,,,, +5/29/2023,20235,,El Dorado Exchange,Arb,,,,, 0x80826E9801420E19a948b8Ef477Fd20f754932DC,,,,,,,,,,,,,,,,,,,,,,,,,,"0xCCD3891c1452b7CB0E4632774B9365DC4eE24f20,0x5566d132324181427eD4f46989121030BC6689C7,0x496900EabcDF5544507ED29Cda3c7f9d0aCE7208,0xcB5518365D8888Ea390213240043091F35F46C6C,0x038cC240A4337a5758700235f4efA3fCd1B521F6,0x24b6137A5fe9d058baf654bb73aB857F57DF8BB4,0x6064DCb3CCc4Bb33e6E4F5C20D126aB15fA14f0d,0xe8Bb48Df26cb53F89EE09cB65F3bF079D44d25Cb,0x9DC362DB8B1C1034a8b34551ece88ded9b40Feee, 0x92EF7A443a1a2EAd17e1EBB7E1613efdb8c3B41c,0x5c1D800Bf2154fe78018e12Ab0b63E94ed23eebc,0x75b814ab2d7E1144d8deba303B024e8fDfE599ec,0x63587f908681b9200c14A22cF6B53935E665Eae9,0x985A1608E8096EA9bebf2100D2319CE7F7F3b7Ae,0xDfE6BB98833dae0f5cD76f488Fc7726b140Fc6e9,0x09d196538F9a09a377C38b5C4400a45D113357F6,0x046600975BED388D368F843A67E41545e27A2591,0xf52A5EDa9e44B3d5182809C2365D6F52F967521f,0x170244A426B016c69e09131428A78117fFE6d7fb,0x3838bfE876823527FDBdA77C9F6dc86cc10C5B77,0x734f022e72150CE6d1156aaE692c4393cA2709Df,0xffcfe373b4DBD373263B8B77462790A9E42B866a,0xd996775bC652E3d48E2693f08cF52CEB0ec0E21f,0x96569ff8f1Eb073f0FFd5cCBf855b7A5431C3B2E,0x730c4CD9499033DDb2BF5465098e108089b6F123,0x00962B56fe689faCC6ec66D38867f1238304B18f,0x865cD1dCDdAB2048bb6Ab015a69561854c23Ab6d,0x9eCb49340c3F29e1517244579782B8b693f9B28b,0x57b78bff7297635414c55443ff4e3dae8a55a74a,0xC8b346Cd04D367bbb234732F36Ee6a5bE6a54c8f,0xEc08B5a75473FD581BE6628d4e2Ed08b49078dF0,0xFC36bE177868b05F966E57bfc01617501b1f6926,0xb23Cd479195c3Ad24c569C5e1f8641Da5a4b3CE4,0x5655fBeb5e066AE5fcCe763ed21daC39Bd3B144C,0xcc86d1C43aA2DA48D08e82E82eb2a0850e219bc8,0x23155eFD762A120Be5DC61b83c891478908Fe5D4,0x500fd1c44502670384B8DafeceDE9ed5fe32f017,0x122383C611805a9E29eab8d94F130DC047bF81AC,0x26AA71BE9CCD794a4c9043Be026c68496b45Aa73,0x2108397905F6d3A9b277c545948C6d6E1Ca22D06,0x16a6bd70684c0626bc3c69eF62EF5860849df851,0x44D8a4e73A25860d9d61Cb8e0Efc48701656eE82,0x23Cfbf835e6D4Ab8A45dCa7115869e88cbA5957D,0x12A8aeF0f1B3af754359bb6Df0F6eE19C58E330D,0x2BAe69F0d73241E20b477e4b6e87E964b84E2EB7,0x0142FeF53eBB44Ed2C00c16478DC619fc3e64321,0xB00885eef0610C1A9D0f4c125Abe959B63F6B2BF,0x86aF1E551C081eC2269f62708C291af1627fA4ED,0x39Eb2A5196a00186D15c28E9fe35A36fD1e6f06c,0x9321061001f07420bF1F068d46feC6E5485690A2,0xE3CA515c9C430f2E270E293ab2793070014F720d,0x494b1C5Db70F0e4fE577A53685184B47279C5901,0x881DB48147c014111ef2aC6587E3cF2d9206171d,0xe8594Bb25fb88bBefd61D219Ffbd32a0de77b383,0x1c547fBa2C20BB5d432970947b4849143A8E4fF8,0x2380B6F99266121FFaF0c457cFAdcd0dc5846560,0x872b327cc9494a31C87134b5162525B7224C525E,0xDAFFD168bdAc2CfE3B52d3050b4F743B42D00d91,0x5d47e35FC6A1f3e22a5cD1Acd5bAb918Be49F531,0x86fE7bDb5fc80B33474B7572790436c3bD3df30E,0x586aF3A3D29B5CE55226369c1De102D899E33D0c,0xc7d1489611726553A28ACAff05fdb2ca452fdD10,0xf321de3e71B35E087f2cD5D59F5A2C6621570f2F,0xa6c5C7D189fA4eB5Af8ba34E63dCDD3a635D433f,0x8eDa8226c679103535A0620E3f32f50C3B8a0d1B,0x9e5b541B3404bB833b4590F352361C0dE797e7eE,0x149D5F5E5d5bcFDaf8EC6eEF33d3556660A31e96,0x6B254d95a80a78E33A3e9662F0e313d78d1a11F7,0x38dA3747b00f836f68C97ff3f15a2D5947E43c8B",#REF!,,,,,,,, +5/31/2023,20235,,unshETH,Mainnet,,,,,"0xecfede31e564c97ab05abe88786dfb2a642f69f2,0x5a113147A564B4c5e17A274Bfa99F3Cc19E4843f",,,,FN,,,,,,,,,,,,,,,,,,"had large profit, but no other alert in other stages. filed bug against txt msg agent, which did have a signal.",,,,"0xe8ef2e07e2fca3305372cb0345c686efbec75658,0xef1203e0680fe690c2923ce508556c92c9abd48e,0x1a890EBCD20a9fB551C0440428805BC24eF62641,0xA857904691bbdEca2e768B318B5f6b9bfA698b7C,0x51A80238B5738725128d3a3e06Ab41c1d4C05C74,0xE76Ffee8722c21b390eebe71b67D95602f58237F,0x846982C0a47b0e9f4c13F3251ba972Bb8D32a8cA,0x0Ae38f7E10A43B5b2fB064B42a2f4514cbA909ef,0x35f899CE6cC304AeDFDB7835f623A30473b26457,0xe60779cc1b2c1d0580611c526a8df0e3f870ec48,0xA8b326Ca02650Ac968C554d6C534412e49c92BC4,0xf728dB9182e7c3a9dFfbD71f9506d04f129Ac9C8,0x33890B88F98a9D511678954AD8DB0510B6953Cfc,0x954d5088d88291146ce58270add820e809ff3d7e,0x5153b553d8ae3cbbb5ac97f5e4c8e5776d30ee09,0x2955c9cba43e769017caf257dd96c0dd9d79bd3a,0xbafa44efe7901e04e39dad13167d089c559c1138,0xac3e018457b222d93114458476f3e3416abbe38f,0xae78736cd615f374d3085123a210448e74fc6393,0x7f39c581f595b53c5cb19bd0b3f8da6c935e2ca0,0xbe9895146f7af43049ca1c1ae358b0541ea49704,0xC02aaA39b223FE8D0A0e5C4F27eAD9083C756Cc2,0xE95A203B1a91a908F9B9CE46459d101078c2c3cb,0xf951E335afb289353dc249e82926178EaC7DEd78,0x16D5A408e807db8eF7c578279BEeEe6b228f1c1C,0xdAC17F958D2ee523a2206206994597C13D831ec7,0xb27308f9F90D607463bb33eA1BeBb41C27CE5AB6,0xAAF448d30F01b429FB6e7F9AF6A8FF66e694F312,0x718C26E5e60829a36feE8DF1d791F340aaa91B4b,0x7461092AA5234b42A17ee8Cc51CfDE6Ef4BeCbc7,0x9d14855cc4c89d4647bc39bc9cfe458ce46c1a36,0xc258fF338322b6852C281936D4EdEff8AdfF23eE,0xbb4cdb9cbd36b01bd1cbaebf2de08d9173bc095c,0x00EFE5523fb4C78FC0e1eec26d916310027f25B1,0x4a364f8c717cAAD9A442737Eb7b8A55cc6cf18D8,0x8731d54E9D02c286767d56ac03e8037C07e01e98,0xCa46058a5682B13c44F4Dd2558aFDEbf3A28f41f,0x2170ed0880ac9a755fd29b2688956bd959f933f8,0x55d398326f99059ff775485246999027b3197955,0x0Ae38f7E10A43B5b2fB064B42a2f4514cbA909ef,0x91d6d6aF7635B7b23A8CED9508117965180e2362,0x5ba96b2BE2b4e88fa51506198ccfAAE57Fb6f246,0x10ED43C718714eb63d5aA57B78B54704E256024E,0x73F3BF38C6bdBc69042049c022080D14885Ff32D,0xa974c41748e8464Baf978e3268CDdb0d6A1fdBDA,0x2C8a4058DB744808FFFA97E29c8E1b7cBF7AAd01,0xC9C33A4Aa8fb9F50579EE4d89Fb8a45EECCD6f0a,0x1b0aedcd95ea7e93291c1f13365e4bd7660bba92,0x03661968d242FF17c25436cA63483B566e7c108B,0x7e353A711a07cD2720837A3608736d9158A1D8d7,0xe85c4D91DC0D9dB0a59300e18acFA2A498419E83,0x35636b85b68c1b4a216110fb3a5fb447a99db14a,0xd027ef82db658805c9ba8053196cd6ed1dd407e4,0x953212fBA33c20763400370A0481C5129AE752d9,0xe6297a3f7a7ec264ca8e293f927d86e532b5da9a,0xf04eab7928a24ff134b2e061e55c4844bd188017,0x0ae38f7e10a43b5b2fb064b42a2f4514cba909ef,0x51a80238b5738725128d3a3e06ab41c1d4c05c74,0x9eFB28060e0c4Ea2538a2B5Ede883E86219182B2,0x69E3877a2A81345BAFD730e3E3dbEF74359988cA,0xd6eE2f6586A60d997356da434AA6E0461AA43dB5,0x855f1b323fdd73af1e2c075c1f422593624ed0dd,0xEbb95E5b6840717D4b6c548B7ceF5450A940CFa4,0x55638A11757CEa2DD6130Aa42Ddc09149BDcAf84",#REF!,,,,,,,, +6/1/2023,20236,,Cellframe,BSC,,,,,"0x1e2a251b29e84e1d6d762c78a9db5113f5ce7c48,0x2525c811ecf22fc5fcde03c67112d34e97da6079",,,,TP (locally),,ATTACK-DETECTOR-2,,0x943c2a5f89bc0c17f3fe1520ec6215ed8c6b897ce7f22f1b207fea3f79ae09a6,Jun-01-2023 02:07:55 AM +UTC),,,,,,,,,,,,,"had highly precise bots, but not in different stages. should loosen the criteria to either different stages or multiple high precision bots.",,,,"0xf3E1449DDB6b218dA2C9463D4594CEccC8934346,0x06155034f71811fe0D6568eA8bdF6EC12d04Bed2,0xd98438889Ae7364c7E2A3540547Fad042FB24642,0x1c15f4E3fd885a34660829aE692918b4b9C1803d",#REF!,,,,,,,, +6/1/2023,20236,,DDCoin,BSC,,,,,"0xa100c4b1962dcdb44201ce123833bf275e5f8847,0x0a3fee894eb8fcb6f84460d5828d71be50612762",,,,TP (locally),,ATTACK-DETECTOR-2,,0xd92bf51b9bf464420e1261cfcd8b291ee05d5fbffbfbb316ec95131779f80809,Jun-01-2023 07:00:14 AM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x50ab0D88045F540b8B79C8A7Dc25790dB493BBC5,0x976cfB9e0447D86f1e4c835c66062CAe113AF404,",#REF!,,,,,,,, +5/31/2023,20235,,ERC20Token,Mainnet,,,Can't find any data regarding this exploit,,0x0e816b0d0a66252c72af822d3e0773a2676f3278,,,,TP (locally),,ATTACK-DETECTOR-2,,0xcff84cc137c92e427f720ca1f2b36fbad793f34ec5117eed127060686e6797b1,Jun-07-2023 04:14:11 AM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,,#REF!,,,,,,,, +6/7/2023,20236,,Instante Token,Polygon,,,"Can see tokens being transferred between uniswap, compound and yearn but not sure of the exact protocol/token that was exploited",,0xb3d204ee119547faa7be6796a31ca773c24b1fdc,,,,FN,,,,0xff5515268d53df41d407036f547b206e288b226989da496fda367bfeb31c5b8b,Jun-06-2023 12:22:36 PM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,,#REF!,,,,,,,, +6/6/2023,20236,,UN Token Compromise,BSC,,,,,"0xa247e81645d6b7fc800afecd836fef16f504d908,0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366",,,,FN,,,,0xff5515268d53df41d407036f547b206e288b226989da496fda367bfeb31c5b8b,Jun-06-2023 12:22:36 PM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x1aFA48B74bA7aC0C3C5A2c8B7E24eB71D440846F,0x5F739a4AdE4341D4AEe049E679095BcCbe904Ee1,0xa4B5bB109c6508A8Ca880D2b4915139706783b77",#REF!,,,,,,,, +6/6/2023,20236,,Murati AI,BSC,,,,,0x8887a9387ee149a81a17145065a7b13132f732cd,,,,TP (locally),,ATTACK-DETECTOR-2,,0x354da299a497cfb606cb98410e4406eee2ece45d4f79d8a51780125f4264cd2a,Jun-06-2023 03:15:42 PM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x69C2fcAe7e30b429166BD616A322e32BeC036bCf,0xdb79f966bF3EdE1E6c1183C9fC3a67D740c2eee0,0xbb610dF4c1D9fd8E1dCAd9fdd2dc9d685f412919,0x73857B78A330d06331A286E5727759A76e97CFEE,0x470d85F7424B8aFA283DFebCC6D745b525b649da",#REF!,,,,,,,, +6/10/2023,20236,,Atlantis Loan,BSC,,,,,0xeade071ff23bcef312dec938ece29f7da62cf45b,,,,TP,,ATTACK-DETECTOR-2,"Sun, 11 Jun 2023 10:36:58 GMT",0x3b0df86f548946d9dda9fb4177ae27bf33f06315c73ea50945ab9e53a041d7e1,Jun-10-2023 09:53:40 AM +UTC,24h 43min,88980,,,,,,,,No Victim,,,,,,,"0x87b79e34eac2eb77324269d3115cb8ba847ee016,0x0503FEaa5854E55E5607e40371e2a1b0d1B9df7F,0x788A791FF9641A5e1fF3596487b120c348bE1Db3,0xfEAd9619e88464e5aD1Ea9Df458dcc147F03ea0C,0x558B96Ee93Ea9C7ec9839BEAfab641d75F94E9a3,0x4e9bF21Ce718Dde4be2E0F5b167181b8AdAd12F6,0x59123a930E52b52EdB27F91135253331F36cd87c,0xCc7Fc8666F6e62cB44aa781de841eE6Be3BbE54c,0x219db7E6F8A609645E8559F8553A48C6e6b17f57,0xd7C38eb724a4610A9fB78F3f9F6C400577e30AC2,0xC182Ea25C72cE276F80748497775499059F6c74e,0x02A7dE4598DA1F18CB6AB85D342b4688FEC66E6B,0x2F4ba3A96B9B5b660C78310FddE4987c09a2eEba,0x5c81c0f55A15Dbc97749A83c843044702768A2A2,0x2C5056167cb2797a7D82996800F896D4F0684343,0x350bD6EFE303F5D6E10bD9e9d6347bc4a3E708c0,0x1e3C741e1d94b88871dCE2A9b55CC2b2b10AD04f,0x26458660BC2f9112e43De7f0DAE003298c6a6DC4,0x96FfC0C6e91FD65460Bd1dd180500fA5bDa11940,0x20c7E6eb3FaB3990A0DB8b2EEd57FF7d799603f9,0x14f235Bb338804D194679BEF1eD7F619F4fE684F,0x8DF3719eB4C9F17ecF30bA298CC2Da7c88162894,0x6A3EbE48a297a61048ddbeB0eF62da4E35eF11f2,0x7c0697155617b7A797CB7517d483DbBdB17089CF,0xd47084cC0e974e5B88958FCA5FaFB7f7726C4058,0x24ce0E8a115b850DD9f8f28125534f102059A307,0x17a1693A62695610993ee389CAa6473749EDbf28",#REF!,,,,,,,, +6/11/2023,20236,,Trust the Trident,BSC,,,,,"0x4beb05bf9bd4585ae2f4feb74112f18b423abb84,0x0060129430df7ea188be3d8818404a2d40896089",,,,TP (locally),,ATTACK-DETECTOR-2,,0xe968e648b2353cea06fc3da39714fb964b9354a1ee05750a3c5cc118da23444b,Jun-11-2023 10:37:49 AM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0xa645995e9801F2ca6e2361eDF4c2A138362BADe4,0x358EfC593134f99833C66894cCeCD41F550051b6,0x9523B023E1D2C490c65D26fad3691b024d0305D7,0x61f834516504fC02b3cd80D41722df08fD030141,0xeaF83465025b4Bf9020fdF9ea5fB6e71dC8a0779",#REF!,,,,,,,, +6/12/2023,20236,,Sturdy Finance,Mainnet,,,,,"0x1e8419e724d51e87f78e222d935fbbdeb631a08b,0x0b09c86260c12294e3b967f0d523b4b2bcdfbeab",,,,TP (beta detected),,ATTACK-DETECTOR-2,,0xeb87ebc0a18aca7d2a9ffcabf61aa69c9e8d3c6efade9e2303f8857717fb9eb7,Jun-12-2023 01:06:35 AM +UTC,,,,,,,,,,,,,perf issues; detected by https://explorer.forta.network/alert/0xa55019a66394624a9de0b9f0bfb00f0ed6e0104175c6054c663b4b193a930c48,,,,"0xb7499a92fc36e9053a4324aFfae59d333635D9c3,0x88f8CCC064bA2D39cF08D57B6e7504a7B6bE8E4e,0x48Cc0719E3bF9561D861CB98E863fdA0CEB07Dbc,0x904290A4e88b984Bab24527601a3d83fF1B7450E,0x86f282c2003FAcF4185F00B5e49A80Db884fEC33,0x131cCc65CDB8Ea905bA6E66Eba503EeEF275d8f2,0x102A01611efCE588DC071714607be3c96F1318D6,0xA422CA380bd70EeF876292839222159E41AAEe17,0xA4D147b9DA5d1669CC207a9b0B4d86C79135A53d,0x46339B1B9bC2145FCd272AFc99002a931f8C2cFf,0x23Df30FE1d2a8C6f4602db382D727561097F899E,0x73D3e0baEE58fEd4A7d187EBDbf778f93a5Aa9Ad,0xe5d78eB340627B8D5bcFf63590Ebec1EF9118C89,0x55Cc38d75197fBD03CEDe8F1588DcFf0f30E36d4,0x960993Cb6bA0E8244007a57544A55bDdb52db97e,0x4CfA9DDeC7A7C381fc3bd438C5A3CF568a633A3D,0xA3e9B5e1dc6B24F296FfCF9c085E2546A466b883,0xe16AE5f666ee66b4FE2168Ef4377bBB4Af14B215,0x150A51977Bc273dfe84B5530D45ED44D175E88f1,0x0701FAe0924f30acc9673d69F0274611090926B4,0x86616a01f098a0768c7b0d559120820eb7d89288,0x86616a01f098a0768c7b0d559120820eb7d89288,0x01c05337354aae5345d27d2A4A70B56a17aF2b4a,0xe12B0fd4E480de4659eb3742e1465257E58CD750,0xA77D72A6C3fA97F091E9aa9F0C87e9efCB552628,0xf83e4943D76B9A94DA0aFb06E4F30DF773f78938,0x98A60C175fF02fC099383c6F6504a82aD8B85248,0x6AdCd1C2a36eFbA34801384cc4A18f754A4de20E,0x8A128385580D0BeCdD30000D8120bf2327c32f21,0x603036fCFA50114770351E65787D98b2C5b78D88,0x1c8727682dBe7eC36E00d4D8f39dF84fcA8E8912,0x1bFb9035214025BD182cc13B2C03Cc40cbAa2882,0x4AFA73ADA5D44E2710BB4dbcC013b9FC4b8893c3,0x5747D28D9317A930279CB6c958C06f802d988828,0x84dcDE91a81FE6199641f5a11cC858dd90D2759C,0x2420EE2Df56f9C61CA70d94fb509A7B3C04Dc19c,0x9787bDC2Ff7F39Ff981ecc347DfAcF6D57b8783E,0x9ff79b260334Fa61F6b24190e8FaEc46Bc97b9d3,0xf62B771940105dfB095d0BC5F12a6Dc47Aaf9142,0x617b89B0E0c87267a2AE3F77fc1b7F83379456dA,0xf3C27b49409d62Bc50e3497c035a5208f0f8A401,0x846da1F9CbF0e945a790B5bf518A265639039B29,0xFE34b244B51fe4972BA827968E0dc4baa6F7575a,0xc6C3187D47E49ED5071E2100edD5C9b0CB093457,0x7AF222326FCC7806ae7e1754C973c87202fd6599,0x4F47e0a441f02B9f7F90638E03F69F245f7559f9,0xcD137da80193b60de953aBf74bAD89408A552c47,0x81Ce0B194Cea336C22244139Ff71426AC5fc750E,0x19cEFfa15261dcf890328b619039416C40A6b8F8,0xe2Cac13bbff65d30BA31C1709B73c60573cFbDA0,0xCD3c2aB95cF91665D590751CdD3d7959C41951f4,0xCD3c2aB95cF91665D590751CdD3d7959C41951f4,0x9700E0B9d22fE10fF00170462c98aBfFa2505DE2,0xd14A2bd5043F1909A6b20B14E465309FdAc3bf50,0xaE9dfa3beAF1CFB5cAf41B87C0cdC389D62e7105,0xCD3c2aB95cF91665D590751CdD3d7959C41951f4,0xCD1B342cd04A29D7ae86aE54FfCCB8b4580a7192,0x66C6074c5A5144877a12E542BBb8dD37110D7567,0x3E233E6F1C6709Be546Ee2Ef10bAFCe59819577a,0x46f58f3c032064fCaec8484a008e82e27b821f06,0xf8C91E5BfFDD79Ef7D1d6F9ae3391E021fFCBD73,0xfE3b8248f5bFDE88233c87eE17D49143849f9f28,0x40d174027481Dc17C3A714995fCb7Fb5bc7C5f07,0x368122b4743959e08727a70591a266dEE3Ff4F4a,0x3bC6db5e3e3C1e262ae0b28AE35f02e485F3dda3,0x640f7B78830db57BAfDF6F462d2B458dA80825D3,0x85Ad7A2085d391aF549A4413B84Bd9Fa38eD201A,0xE60bFF4746C1acCBcCFc8dC46fbc0dCAA9552E61,0x01Eac83b91158e09EaE57a86eE4538134ff47e26,0x51f2591c31332eF79dc2ad37dE876D2A48F1013f,0xAC2EfC7Ec1e06883b181aA167BF2e1feb07615A3,0x1c8727682dBe7eC36E00d4D8f39dF84fcA8E8912,0x7eD6f3f22Fb3F85E1071b5F6e616d5f0E0E32a49,0x994A8C1AD6C6A65E8D8c6b37A9c8F964A6C985A8,0xa5A96C4E5873dBae8e41058f891A05Ad9aE3C71e,0x88eE44794bAf865E3b0b192d1F9f0AC3Daf1EA0E,0x0Eef4D49B71bad9C6390C7D5E5495b948E5DF280,0xC972d37d48038D289251347A7E52AeDe64B47a40,0x6cC542d4cD29Aa9528d1af83A196aBeCfEE61a8b,0x822802f970CCd9aEB13d0368A2409804d28E1253,0x86A42b7A448c1568d21b00C90eaB53B8417eEaDc,0x701A570C15903a2B09FB41a12DEf0265EBdc53be,0xD7BC0dcb0B6ee14BDB204172ABA01458Abe91aC3,0x4FFa140fc6D5115C808AAF3afda2151F849fcdC3,0x822802f970CCd9aEB13d0368A2409804d28E1253,0xf093E07033efA4eD8167f33A5034AF8E049212F7,0x8eA4b4C9bd07E2fa10dfA712B683F2461397cf19,0x31D5B63b54259b37e74C767706f135ac1C9B8879,0x31780CC26C7C66A7A72bdE665147De4001b302eC,0xc0ddd95419E2375B7cdc9C12a8Db464584E158f3,0x7e704825B55Ba9bE27483BeD912E44cc5a0162bc,0xd9D5c29A4c11d099b7D61C0F2b66B24B1290e127,0xcD23DB9B3FF90Cf200C60Efaa9b9F6Fbd139635F,0x8209BB16a39FD6B76799e7f34702e316cF1129F0,0xD9345caCa72e1376c00e534ed86A08CFCe129337,0xB508171E31273887CB530B5268834C218B3A1303,0xb1ebf8f77ae002d487e7bde22c6180be0af6a3d4,0x5bb3b2782341ac5e0a72dad797d0c27dbebfaadc,0xe1ee5b789ba4ea5287999034fdf293361b53e024,0x403c736f7a79e45bee42fd42a6f89a0a46e38012,0x35616ab2ee92688afe80ebde1dcbeda91f90862c,0x3e0a984a5b4cd60b566c4d851555c7d213ea0eda,0x589bb2ab56b725c50fe3a583eee557023ab4f6e6,0x53799cb6aded2490bf2b15b8f0706e71f05597f1,0x26e3a8953769fe1befc784cb1d42ed0b23742e8c,0x901247d08bebfd449526da92941b35d756873bcd,0x10aa9eea35a3102cc47d4d93bc0ba9ae45557746",#REF!,,,,,,,, +6/12/2023,20236,,Keep3r Network,Mainnet,,,,,"0x24ae929ebe12589c5c193af5d7b03da05f5bfb7c, 0x277b86a6adc925993419715278c8e318d8e27b85, 0x91fa0770f46b0608a1f5273568621ddfe944c14f",,,,FN,,,,0x25c2d4dbfd38d1dcf10dcfaedf922c7d159aa93c3ac62daeb784718405f237dc,Jun-12-2023 05:04:59 AM +UTC,,,,,,,,,,,,,FP mitigated (high TC funding),,,,"0x1cEB5cB57C4D4E2b2433641b95Dd330A33185A44,0xFC48aC750959d5d5aE9A4bb38f548A7CA8763F8d,0x11b7a6bc0259ed6cf9db8f499988f9ecc7167bf5,0xeDDe080E28Eb53532bD1804de51BD9Cd5cADF0d4,0x976b01c02c636Dd5901444B941442FD70b86dcd5,0x3f6740b5898c5D3650ec6eAce9a649Ac791e44D7,0x053D7DD4dde2B5e4F6146476B95EA8c62cd7c428,0xeb02addCfD8B773A5FFA6B9d1FE99c566f8c44CC",#REF!,,,,,,,, +6/14/2023,20236,,Hashflow,Mainnet,,,,,"0xbdf38b7475ff810325aa39e988fb80e0aa007e84, 0xddb19a1bd22c53dac894ee4e2fbfdb0a06769216",,,,TP (locally),,ATTACK-DETECTOR-2,,0xdedda493272b6b35660b9cc9070d2ea32ee61279b821184ff837e0a5752f4042,Jun-14-2023 03:13:23 PM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x79cdFd7Bc46D577b95ed92bcdc8abAba1844Af0c,0xb3999F658C0391d94A37f7FF328F3feC942BcADC,",#REF!,,,,,,,, +6/15/2023,20236,,CFC Token,BSC,,,,,0x106016cdc3878c7ff2b386303000db0001d838eb,,,,TP (locally),,ATTACK-DETECTOR-2,,0xa3c130ed8348919f73cbefce0f22d46fa381c8def93654e391ddc95553240c1e,Jun-15-2023 07:06:48 AM +UTC,,,,,,,,,,,,,,,,,"0xdd9B223AEC6ea56567A62f21Ff89585ff125632c,0x595488F902C4d9Ec7236031a1D96cf63b0405CF0",#REF!,,,,,,,, +6/15/2023,20236,,DEPUSDT,Mainnet,,,,,0x7021c1b142eb634fa0749cda270c7aff74dc3b7f,,,,TP (locally),,ATTACK-DETECTOR-2,,0xf0a13b445674094c455de9e947a25bade75cac9f5176695fca418898ea25742f,Jun-15-2023 08:40:59 AM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,,#REF!,,,,,,,, +6/17/2023,20236,,Pawnfi,Mainnet,,,,,0x8f7370d5d461559f24b83ba675b4c7e2fdb514cc,,,,TP (locally),,ATTACK-DETECTOR-2,,0xe855cc3bad87933bf742fd474bd0ae0ec58d45e9c1a0643b9700dafe8faf0864,Jun-17-2023 02:44:11 AM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x85018CF6F53c8bbD03c3137E71F4FCa226cDa92C,0x5f0A4a59C8B39CDdBCf0C683a6374655b4f5D76e,0x73625745eD66F0d4C68C91613086ECe1Fc5a0119,0x0B89032E2722b103386aDCcaE18B2F5D4986aFa0,0x6A55080D5bA7cFf935Fb6aC54f4af4486EE24B1C,0x0b7d8EdA67cE2555abe41d2dF2102D62becf38BD",#REF!,,,,,,,, +6/18/2023,20236,,Midas Capital,BSC,,,,,0x4b92cc3452ef1e37528470495b86d3f976470734,,,,TP (locally),,ATTACK-DETECTOR-2,,0x66654f116cd26ddf72b25ac9a2be5bdf2bed99201bba8e5bddac375eebec2537,Jun-17-2023 05:12:17 PM +UTC,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x02706A482fc9f6B20238157B56763391a45bE60E,0x93B32a8dfE10e9196403dd111974E325219aec24,0xF8527Dc5611B589CbB365aCACaac0d1DC70b25cB,0x5f8a3d4ad41352A8145DDe8dC0aA3159C7B7649D,0xb2b01D6f953A28ba6C8f9E22986f5bDDb7653aEa",#REF!,,,,,,,, +6/18/2023,20236,,Ara Blocks,BSC,,,,,0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366,,,,FN,,,,0xd87cdecd5320301bf9a985cc17f6944e7e7c1fbb471c80076ef2d031cc3023b2,Jun-18-2023 4:37:08 PM,,,,,,,,,,,,,"many alerts, but no attack detector; pot perf issue?",,,,"0x7BA5dd9Bb357aFa2231446198c75baC17CEfCda9,0x5542958FA9bD89C96cB86D1A6Cb7a3e644a3d46e,",#REF!,,,,,,,, +6/20/2023,20236,,Z-Era,BSC,,,,,0xafe015d862b6e1c54c2870d89557a90dafb7fefe,,,,TP (locally),,ATTACK-DETECTOR-2,,0x96fcd4a61fa270f0e1608b0b88b6dbc0a91b8da9f7f34de36d3495ad4102c397,Jun-20-2023 12:27:48 PM +UTC,,,,,,,,,,,,,,,,,"0xCc0a1c56401C5d62D4cCEB96b145e958191125DC,0x2125d8a86EBf1DB75d01f537CDcD83E8c2A38d92",#REF!,,,,,,,, +6/20/2023,20236,,Bunny Protocol,BSC,,,,,0xe2512f5a3714f473ab2bc3d95e3459fde7cc4b28,,,,FN,,,,0x24a68d2a4bbb02f398d3601acfd87b09f543d935fc24862c314aaf64c295acdb,Jun-21-2023 08:26:55 PM +UTC,,,,,,,,,,,,,,,,,"0xc54AAecF5fA1b6c007d019a9d14dFb4a77CC3039,0xb4B84375Ae9bb94d19F416D3db553827Be349520",#REF!,,,,,,,, +6/20/2023,20236,,Baby Doge 2,BSC,,,,,0xee6764ac7aa45ed52482e4320906fd75615ba1d1,,,,TP (locally),,ATTACK-DETECTOR-2,,0xbaf3e4841614eca5480c63662b41cd058ee5c85dc69198b29e7ab63b84bc866c,Jun-21-2023 12:23:34 PM +UTC,,,,,,,,,,,,,,,,,"0xc748673057861a797275CD8A068AbB95A902e8de,0xc736cA3d9b1E90Af4230BD8F9626528B3D4e0Ee0",#REF!,,,,,,,, +6/23/2023,20236,,Shido Global,BSC,,,,,"0x69810917928b80636178b1bb011c746efe61770d, 0xcdb3d057ca0cfdf630baf3f90e9045ddeb9ea4cc",,,,TP (locally),,ATTACK-DETECTOR-2,,0x72f8dd2bcfe2c9fbf0d933678170417802ac8a0d8995ff9a56bfbabe3aa712d6,Jun-23-2023 11:00:40 PM +UTC,,,,,,,,,,,,,,,,,"0x733Af324146DCfe743515D8D77DC25140a07F9e0,0xd0A167d1973cA8f76723C6FEa1E6f608DBC1d464,0xa963eE460Cf4b474c35ded8fFF91c4eC011FB640",#REF!,,,,,,,, +6/27/2023,20236,,Themis,Arb,,,,,"0xdb73eb484e7dea3785520d750eabef50a9b9ab33,0x05a1b877330C168451F081bFaF32D690Ea964Fca",,,,TP,TP,ATTACK-DETECTOR-2,"Tue, 27 Jun 2023 18:33:18 GMT",0xff368294ccb3cd6e7e263526b5c820b22dea2b2fd8617119ba5c3ab8417403d8,Jun-27-2023 06:33:09 PM +UTC,9 seconds ,9,,,,,,,,No victim,,,,,,,"0x75F805e2fB248462e7817F0230B36E9Fae0280Fc,0xe611e633C1E88d4f026fec5Bc1E40E8A477f41aD,0x6a9591Df4BDcCfA273D5760459fb9B00CeA6B4F1,0x86d0A7A8Bd588f702e154c4d6d2B95E5329a25cC,0xF053325F55e01F6f3D51AF45b42E730BD52f946a,0x7A89D78f1896957388fC4534Fc490cd8C1E24739,0x993b16ff4b16488912A9BC6cbE1F56CF2b34e259,0xb1f4463bFBf3F96b030BEAf0046ed6d33042754f,0xe3B47c688e61e74d159725EE6011D6F31A9037Eb,0x1762A96724ab7ae072ABD7dB7A43fFc66261669E,0x1467B18945135c6866b7f9d64729bcDAD60C9295,0x10c73B8e7E5DC0d25a1A717f4BF9026d955382dE,",,,,,,,,, +6/28/2023,20236,,Unagi,Mainnet,,,,,"0x00000006e09c1905203d59C506113F5dd677f7FA,0x34744E2C314FB4e59C16AfB7A8bD3C87e0389309",,,,FN,,,,0xeaed60c62c6dfcfb5884c382baf3ec5a97d60dab8ee418e40450ca9ddefea2dc,Jun-28-2023 06:20:11 AM +UTC,,,,,,,,,,,,,Identified as MEV,,,,"0x4aD0b81f92B16624BBcF46FC0030cFBBf8d02376,0xBc5991cCd8cAcEba01edC44C2BB9832712c29cAB,0x178Bf8fD04b47D2De3eF3f6b3D112106375ad584,0x3aF5Ba94C29a8407785f5f6d90eF5d69a8EB2436,0x77607588222e01bf892a29Abab45796A2047fc7b,0x634b0273D7060313FAA60f96705116c9DE50fA1f,0x49b09e7E434a3A4A924A3b640cBBA54bF93B5677,0xBF8734c5A7b3e6D88aa0110beBB37844AC043d0A,0x7F20551E082ba3E035F2890cBD1EC4E275b9C8C0,0xDe07f45688cb6CfAaC398c1485860e186D55996D,0x9ce3018375d305CE3C3303A26eF62D3d2EB8561A,0x7f75d72886D6A8677321E5602d18948aBCb4281A,0x1Eb06EaE3263a35619dC87812a8e7Ec811B59E63,0xB088D7C71ea9eBAed981c103Fc3019B59950d2C9,0x8eF11c51a666C53Aeeec504f120cd1435E451342,0x7C765C474D231fd915dc78832b478F309071cba7,0xb00AA15F78A278Be2FCb2aa7de899F3F863780f8,0xdF60b2CC40AFd588Bf650977A2d6C6AF39939f4C,0x0349Cf57BaE5C0d9be56b9C478Ea3797c7BcFddB,0x9501B3a6DcE1Bbe6094356391F3992e08EE90E3a,0x09DAb27cC3758040eea0f7b51df2Aee14bc003D6,0x6aBE5f87E3F4dC87301064F63CA5b244d119980d,0xC13A321d800d2477D35BFE342f14368752Bdc82f,0xAa6a0f286A0DEF717e9167B770C795Cb4D72c15B,0x8a539e173b5ecEe47401A82671f59DE95A082c56,0x61Bc30d0347DE4A5766beD1e6f7049543DA0CA77,0xfDa4236ADF86eBF0058BAD69Fb2e5991cfd233a2,0xc63942159F8aDf59D180EAB1333F23495aEF12Ad,0x85cb4Da19994f20cdd55527155C650CB3E613CA3,0x7F52020A55a24011cC54e4eadcF37Edc7e69F8F5,0xCC16943C30dFBbF53b3eB1FAb374a38FC79AC2F4,0x549452631ec594C0580d0bf313D2dF22304f574F,0x8c8C11C0caE2e5Da0407c7B2A823167B5436c746,0x7C420415803BEb2B8BE06973a1488f2F5cB02551,0x83fC00D3De9707Dc43a38224f37a525b89aB0C6A,0xA0DBE01b746D10eB739E7f637F65fBc2e3e9D1Bc,0xF4Fe5Cc9425B58544AFd24D8a2b14D7EBa261019,0xcF10DDfEd92d9538cA15ba5c1e89E5c6619a5d3c,0xeB49133796491205ac324D7b796D5ebD852377e3,0x1eda1B993860E2EEC59Bae8E0D8F646Ea9dd154F,0xbac5f0964006BD3871189dC0Da01E67d7C435C9F,0x994cC3a3fC0e1cB9A16f5eD06Cf52169c09ab480,0x434d68Ffc1C4DaE115E2176EdDf6539A5b8ce7D9,0x7bF9075D5e3FCD7819A978cF3E8Bb836aDBEf3E8,0x159569426128deF2afBd3F5da5d230298f1D5Ab7,0x6250002E436fc3df09cB09D654A46270c4344345,0x48424fb48C1d148B38A9d6f29D05aD09003c9Af0,0x20A00e85dE13a49f872c033d6E4ba30Ba6C4e5f5,0x07dA6bBA8529FC564f930aB7cCb7d7abbe6Ff56b,0xe859231d5ef4051D300698B9D46C421de1D7D5e0,0x27cfEEf8aF7442f60DC4D1C4f7337f901Fd8a573,0xFcF409263A5B4d51a658241d7cf78405FAFB0A4E,0x09C4B30aAF16F96c7B086Ce5692418420EBF6f08,0xc7A60D14e4D8d1bBe7eEfe2B03EDD8D9d23Cc332,0x99D0F7d0ec94FF01A3d9534BFFDabf9b7d86cfED,0x8ad4810b0ec62D78627C65b1eF19495E4204b7ee,0x546C0b07bC01Cb761C8fC15A6e4F84cBBd4E1D21,0xed0941e5dC9141A2b029C65862044A4Cac9e56E9,0xE1bdaa7EE392935eB276A421752ABE986fD52914,0xf4E2007bb865B78bc0EAc0cC242e974Efd49C06d,0xe2CEDA90aa1E43647EF306810a903b32c9a3Aa94,0x7c5D6df0646aD1Dc77FFB52E2430bE779729ed69,0xBeCA7b566FAd28cCbe6dcE59d42D37768Ab3CD8B,0x1C595009B331fE85FD658aA0B6B7bE95B6921021,0x273BA31C706b9D9FdAe1FD999183Bfa865895bE9,0x8dcb98361a49550593B57747Ab2825983EF43662,0x6e8a1e3b0B59C029809eDEE5bb9dF96FF34812a9,0x7D55C795359eB049FF482c8Bd5E0523F0fB40B6f,0x1C064EA662365c09c8E87242791dAcbb90002605,0xa2F203F34314b001A223D674dB9A2dF28A5339a4,0x1c595009b331fe85fd658aa0b6b7be95b6921021,0xbeca7b566fad28ccbe6dce59d42d37768ab3cd8b,0x992810716963dcf7df436840c7e5c80baf896a32",,,,,,,,, +6/30/2023,20236,,Biswap,BSC,,,,,0xa1e31b29f94296fc85fac8739511360f279b1976,,,,FN,,,,0xa9fdedc440865dee38a1285bdc2f8a79947934ac67065d6b8e3a89a259f7ead0,Jun-30-2023 12:15:11 PM +UTC,,,,,,,,,,,,,,,,,"0x46492B26639Df0cda9b2769429845cb991591E0A,0x24Ba8d2A15Fe60618039c398Cf9FD093b1C1FEB5,0x965F527D9159dCe6288a2219DB51fc6Eef120dD1,0xdbc1a13490deef9c3c12b44fe77b503c1b061739,0x858E3312ed3A876947EA49d572A7C42DE08af7EE,0x3a6d8cA21D1CF76F653A67577FA0D27453350dD8,0xf5D6fed0f4735Ff2036cE4be535bD32e77dAE9fe",#REF!,,,,,,,, +6/30/2023,20236,,MyAI token,BSC,,,,,0xc47fcc9263b026033a94574ec432514c639a2d12,,,,TP,,ATTACK-DETECTOR-2,,0x346f65ac333eb6d69886f5614aaf569a561a53a8d93db4384bd7c0bec15ae9f6,Jun-30-2023 01:04:42 PM +UTC,,,,,,,,,,,,,,,,,"0x40d1E011669c0dc7Dc7c7Fb93E623d6A661Df5Ee,0x390d9078cb06f3cD4a17a39693b489446724a093",#REF!,,,,,,,, +7/1/2023,20237,,PolyNetwork,Mainnet,,,,,"0xc8ab4aa93949c377c32c069272425bd42738c42f,0xA87fB85A93Ca072Cd4e5F0D4f178Bc831Df8a00B,0xe0Afadad1d93704761c8550F21A53DE3468Ba599,0x23f4CA51aa75d9d3f28888748d514173394Cc671,0xfD3E731AFf8B930337302f26EEf015CFA022b778,0x11c924f0b50c51cbf9ac31a20365a38f24d4a4e8,0x2f6c25e3c93c0fc7fdde2ece8e370ae152a57b82",,,,FN(beta detected) - reliability issue,,,,0x120da2ca5df2b63e83c35c177a96e2f0823a4f0370058e7a68c931f8a2916353,Jul-01-2023 06:47:47 PM +UTC,,,,,,,,,,,,,"FUNDING-TORNADO-CASH alert during funding (https://explorer.forta.network/alert/0xa05c50b53729fec721e5e84c25ca2214f6d4d49fed12e3a478451d5db103a874), stolen Private keys hack so no contract deployment for preparation. No base bot alert for exploitation as well. LARGE TRANSFER-OUT and Unusual native swaps alerts during laundering (https://explorer.forta.network/alert/0x956687bd7a14dc059e24a80e7b2d9d93881d2545e53371578792a771c11fa4b3). Would have triggered AD but was fp mitigated by Positive Reputation bot (https://explorer.forta.network/alert/0xc082e0195440d5ef803f6778aa1c0c33bd11235aa8bee0830d87e57e778e8b60)",,,,"0x14413419452Aaf089762A0c5e95eD2A13bBC488C,0x5a51e2ebf8d136926b9ca7b59b60464e7c44d2eb,0x250e76987d838a75310c34bf422ea9f1AC4Cc906,0x2cdfc90250EF967036838DA601099656e74bCfc5,0x81910675DbaF69deE0fD77570BFD07f8E436386A,0xDb0f18081b505A7DE20B18ac41856BCB4Ba86A1a,0xcF2afe102057bA5c16f899271045a0A37fCb10f2",,,,,,,,, +7/3/2023,20237,,Azuki DAO,Mainnet,,,,,"0x85d231c204b82915c909a05847cca8557164c75e,0x8eadc7cc0a77594e3fa999e80e1ccb7f4e1c04e0",,,,FN,,,,0x4c50c1da8a25bcaf7c47661423f435a339c8dd3ce8f0e8e1c3a21dcc52e84acc,Jun-30-2023 04:37:47 PM +UTC,,,,,,,,,,,,,"Signature maleability attack, no contract deployment, preparation and funding. stolen funds still in attacker's address so no laundering",,,,"0xED5AF388653567Af2F388E6224dC7C4b3241C544,0x711867b009c28f79972fd36A0D13A24c1FBC3C99,0x8189AFBE7b0e81daE735EF027cd31371b3974FeB","0xdd32777a398150fe57b55f3d32156bc962253ee5039e6ca15afc81ab6233cacf,0xc87768f5436d80fd62bc534801dd93db434f1db19c5ae128f3bcdad65db56cfd,0x246f69886bcc63ed3e4c91beaefc2740384df19579b7d9ac1424db265e70ad20",,,,,,,, +7/4/2023,20237,,Bamboo AI,BSC,,,,,"0x16c4da1afe64634ab72968d8f7f9a80518b84e61,0x7F7D46AA776Ed3f676B0E2c6368D86f1564FF5A2,0x00703face6621bd207d3b4ac9867058190c0bb09",,,,FN(beta detected) - reliability issue,,,,"0xda41af9d60d62eef28444b4c42f80754140767efb8ecef1b68b4fb1c11baa789,0x88a6c2c3ce86d4e0b1356861b749175884293f4302dbfdbfb16a5e373ab58a10",Jul-04-2023 12:06:26 PM +UTC,,,,,,,,,,,,,triggered suspicious contract creation and high gas usage. Should have triggered. Beta detected ATTACK-DETECTOR-2,,,,"0x0557713d02a15a69dea5dd4116047e50f521c1b1,0xED56784bC8F2C036f6b0D8E04Cb83C253e4a6A94",,,,,,,,, +7/4/2023,20237,,Bao Community,Mainnet,,,,,"0x00693a01221a5e93fb872637e3a9391ef5f48300,0x3f99d5cd830203a3027eb0ed6548db7f81c3408f",,,,FN,,,,0xdd7dd68cd879d07cfc2cb74606baa2a5bf18df0e3bda9f6b43f904f4f7bbdfc1,Jul-04-2023 01:30:47 PM +UTC,,,,,,,,,,,,,"No TC funding alert (https://etherscan.io/address/0xebfc5f4958b07da556678e2015d32722949645ac#internaltx, +https://etherscan.io/tx/0x4b29881a14789413e0a540aa9e82dbd79c835bc9d98662d83ece56f3f488e2c6) +No alert during exploit contract deployment(https://etherscan.io/address/0x3f99d5cd830203a3027eb0ed6548db7f81c3408f#internaltx). Was deployed 70 days before exploit by another EOA. +No TC laudering alert +https://etherscan.io/tx/0xc0320b451a29b711abd075eed1bd5184e3b7ebf62510b46e9197ffdf4e4c374f +https://etherscan.io/tx/0xb472e9581b0ec70b9a856eb86102c6fdd57fc45764daca562183f981b5070431 +https://etherscan.io/tx/0x4f3ef45d638b705ccb22a9221522ab009b5b8530c6ea5689adf91b681594d131",,,,"0x5ee08f40b637417bcC9d2C51B62F4820ec9cF5D8,0xb0f8Fe96b4880adBdEDE0dDF446bd1e7EF122C4e,0xf4edfad26EE0D23B69CA93112eccE52704E0006f,0x3dFc49e5112005179Da613BdE5973229082dAc35,0x8Bf70DFE40F07a5ab715F7e888478d9D3680a2B6,0x885D90A424f87D362C9369C0F3d9A2d28AF495F4,0x235b30088E66d2D28F137b422B9349fBa51E0248,0x840e75261c2934f33C8766F6eA6235330DC1D72d,0x7492Aa25Dcb4013925c199Ded466Fdf9baa6A380,0x3dCe48CfC0bEA704ec1640b34b33eC55F97D3056,0x9Ec01C8315FB3062C9C790c368b0001A84E94A74,0x1390c3ffb3f45864641f08bcc66211935B10D753,0xe7f3a90AEe824a55B0F8969b6e29698966EE0191,0x0a39eE038AcA8363EDB6876d586c5c7B9336a562,0x675F82DF9e2fC99F8E18D0134eDA68F9232c0Af9,0xdae71239d7f277824700dfc45b575e6aa21e2294,0x15174daafd4a72f282cf875a839d1abe9bf444c1,0x8fbcb931409d7118949b92c0ed2d692f6bcb3d92,0x0e7b7f385dc87e515b44e05233c340d474ea9d7c,0x123Ec6701097d1C95771d0b8Fa48B0d88E7D7B62,0x7945b0A6674b175695e5d1D08aE1e6F13744Abb0,0xce391315b414d4c7555956120461d21808a69f3a,0xa1e3F062CE5825c1e19207cd93CEFdaD82A8A631",0x7374f3c6ee721802f04eb7237f60c9d3f8a045098803b9da573f4bf8b7328306,,,,,,,, +7/5/2023,20237,,Rodeo Finance,Arb,,,,,"0x20de06dcf497911aca02529628383c7599dacfb9,0xbc7070605e9052c8c2c8b04732fcb85199d8246b",,,,FN,,,,0xd786d24dc9fd2972d87fd67c3807756fc927d90d07bd43bc06b67224711d2944,Jul-04-2023 06:30:49 PM +UTC,,,,,,,,,,,,,"No alert during funding(Unknown source, https://arbiscan.io/tx/0x0dc2ca1799545ad996efb91fcf19faf548ace7775e91fd7a94cf270803cea635) +No preparation alert during exploit contract deployment (https://arbiscan.io/tx/0x4c46d995f1a6a91d81e0d166ba6ff8d895176ea76ec1eea10bedabb135d488fc) +High gas use alert during the exploitation. +(https://explorer.forta.network/alert/0x5a58ee0a94fafbd4fcafc54050ef3319206c1826cee6d1f786311f92f0ed0f08) +FLD_Laundering and text messaging alerts during laundering +(https://explorer.forta.network/alert/0x1d4ffc79a5609709123aae2f255859735eee4cee0165d5be48cec8ee8d582260, +https://explorer.forta.network/alert/0x8de472e1a47eb1a7b7ba855a930bebf317b5d0cc661e06da52cfaafb17ba3759) +Should have triggered ATTACK-DETECTOR-3, possible perf issue or entity clustering group issue",,,,"0x8accf43Dd31DfCd4919cc7d65912A475BfA60369,0x9D6A853Da8BF51386240Ad1ed19E13C48dF3a2A7,0x6f456005A7CfBF0228Ca98358f60E6AE1d347E18,0x5e4d7F61cC608485A2E4F105713D26D58a9D0cF6,0x0032F5E1520a66C6E572e96A11fBF54aea26f9bE,0x3D288C83b6030f86d83E5C8Dc4150382004471A8,0xaB7d6293CE715F12879B9fa7CBaBbFCE3BAc0A5a,0x033f193b3Fceb22a440e89A2867E8FEE181594D9,0x45a58482c3B8Ce0e8435E407fC7d34266f0A010D,0x5180Dce8F532f40d84363737858E2C5Fd0C8aB39,0xC4327DC9Ef2511706D233e813b822f196bc027ac",,,,,,,,, +7/6/2023,20237,,Multichain,Mainnet,,,,,"0x9d5765ae1c95c21d4cc3b1d5bba71bad3b012b68,0xefeef8e968a0db92781ac7b3b7c821909ef10c88,0x418ed2554c010a0c63024d1da3a93b4dc26e5bb7,0x622e5f32e9ed5318d3a05ee2932fd3e118347ba0,0x48bead89e696ee93b04913cb0006f35adb844537,0x027f1571aca57354223276722dc7b572a5b05cd8",,,,FN,,,,"0xda80a8c8d5a8fdf0208a6fd01c39af018e400763b1d08f3543f52353345fe62e,0x448f2a6a6c071cdce254937e06305a033538e1aeb9339227d0e59e0458e6185c,0xb9f52d5eb0d67c1038debe8e0f60ed265bd4937db0cfe5ef15b3f1fa28f31f8d,0xbd29fe07555c28527fb0207aa0ac2b67d4afef0426793c35b76d005613477fc4",Jul-06-2023 06:10:35 PM +UTC,,,,,,,,,,,,,"stolen private key exploit, no funding or preparation. No base bot alert during exploitations. Funds still on-chain, no laundering yet (https://etherscan.io/address/0x48bead89e696ee93b04913cb0006f35adb844537)",,,,"0x0a992d191DEeC32aFe36203Ad87D7d289a738F81,0xBd3fa81B58Ba92a82136038B25aDec7066af3155,0x8efd012977DD5C97E959b9e48c04eE5fcd604374,0xC564EE9f21Ed8A2d8E7e76c085740d5e4c5FaFbE",,,,,,,,, +7/7/2023,20237,,LUSD,BSC,,,,,"0x0000004883ab5434202dc9d8d5bfbcd87247dee3,0x724CEFeF59D673359bcA2b5A9DbA47e8Feb30b4D",,,,FN - Beta Detected (reliability issue),,,,0x1eeef7b9a12b13f82ba04a7951c163eb566aa048050d6e9318b725d7bcec6bfa,Jul-07-2023 02:24:46 PM +UTC,,,,,,,,,,,,,"No funding alert, Binance funding(https://bscscan.com/tx/0x5b757f9392fc91d9f3478b5341ec1c936c6bf8b2d32e5c30ecf0acf630bc8da1) +suspicious contract creation alert during preparation (https://explorer.forta.network/alert/0xf583bbaf88fbe98652a243e996929350eaee5791240c40dcdadb55c00fe0f147) +no exploitation alert, flashloan bots should have triggered +no laudering alert(binance laundering) +https://bscscan.com/tx/0x55a44d29511e7990dd79530f0a5df589ecc37f258ebd2004b3afc17bcac79d7c +https://bscscan.com/tx/0xf3a15f278a16ae9fb03b31ca9f9f9ab96468de67666a40498d0dc4a5655bae44",,,,0x3cD632C25A4Db4c1A636cFb23B9285Be1097A60d,,,,,,,,, +7/8/2023,20237,,CivFund,Mainnet,,,,,"0xbf9df575670c739d9bf1424d4913e7244ed3ff66,0xc0ccff0b981b419e6e47560c3659c5f0b00e4985,0xf466f9f431aea853040ef837626b1c59cc963ce2",,,,TP,TP,ATTACK-DETECTOR-2,"Sat, 08 Jul 2023 15:17:58 GMT",0xc42fc0e22a0f60cc299be80eb0c0ddce83c21c14a3dddd8430628011c3e20d6b,Jul-08-2023 02:40:59 AM +UTC,12 hours 36 minutes,45360,,,,,,,There was a contract creation 2 mins before the exploit transaction,Yes,,,,,,,"0x7CAEC5E4a3906d0919895d113F7Ed9b3a0cbf826,0xF169BD68ED72B2fdC3C9234833197171AA000580,0xcB9985eb9433A757841D44ec8fCf5c585781bC44,0xdBED965C57BF74ab4Ba3e3FfaBf715c4B49F8835,0x20776BeB58704bFC6b38aa88D3e1D81c9C1c15E3,0xd26cc7c8d96f6ca5291758d266447f6879a66e16","0xf530a5b26274c38be75d40f161bbf22774846cb7896aa19d677be330ac02ea95,0xf36aba91b097b9c7cef0dc02a9198f570dca44a5eebcb606408c7568241c5de5,0xc6f7df745036197185662e48f6f4f6d7dfabeaf781ab4b4c5802644439948919,0xc3979fb23dcebaab141105f1e1ed1537be7d11c7f0e6ecd422ebb751d90e4b40,0xa018ac9bf6f63c0207cf92e9a2296f7b6f08ad83772ed2acb1cff3ef0c3fafe6,0x8ef4593f1eb1e75a8aa9ddd4ce2108714016e196ca70c738a444cf775a7052a4,0x7d6f7045a32ae82a21255710ca5ace0f2a118d10e89abd839d1611e525a5e518,0x724859c7c18be36bff806e21c3a5ff6734a0696400f93bd4f992e2ca9cda46e1,0x5916a355b4087f5fd3a08f06c5551b64902e4b8a3bba0c4e97e67086715d81d3,0x4f9d52c1e30eef6b08047e2ba6e7e9779d269a6b1030682e646936d0a17abdac,0x45fe375cc2e3364e89bddffe3f20e8372cf18b4c96445106b157f04c096ec236,0x31f6c533993171a24dce5039eff0352008d263f88e7a4ebc6fc01bee9bdc5a8c,0x1912bbae1e5c575e78a6faaec103b00eea845bc02775c36f7c3488394d94377b,0x0d1167653256732f3ff220ab242d8f1a31c1e81f5f87e92eeb71707a44b0a6e9",,,,,,,, +7/9/2023,20237,,Arcadia Finance,Mainnet,,,,,"0x5c75e94dd0ab9c10bfd1b8073dafef031d3c050d,0x56A35FAe9b0416360e1752A9abE78D89F51517CF",,,,TP,TP,ATTACK-DETECTOR-2,"Mon, 10 Jul 2023 01:24:23 GMT","0xefc4ac015069fdf9946997be0459db44c0491221159220be782454c32ec2d651,0x56A35FAe9b0416360e1752A9abE78D89F51517CF",Jul-10-2023 01:21:59 AM +UTC,2 minutes 24 seconds,144,,,,,,,,Yes,,,,,,,"0x00CB53780Ea58503D3059FC02dDd596D0Be926cB,0x046fc9f35EB7Cb165a5e07915d37bF4022b8dE33,0x950A8833b9533A19Fb4D1B2EFC823Ea6835f6d95,0xD2A34731586bD10B645f870f4C9DcAF4F9e3823C,0x2dE7BbAAaB48EAc228449584f94636bb20d63E65,0xC000d75D4221Ba9D7A788C81DCc0A4714B4aE9e5,0x3Ae354d7E49039CcD582f1F3c9e65034fFd17baD,0xD417c28aF20884088F600e724441a3baB38b22cc,0x68847530E93789Cc2e602130f6B53C55E1159Bb9,0x200C24184c50796fB72343C7578b6639F515757E,0x9aa024D3fd962701ED17F76c17CaB22d3dc9D92d,0xEe7403d3f2660928b2B39BAb80A820975520aFe0,0xAF17879139487d9704E61c4C726525F0C1764Be8","0xf230c34c8fdbc3b7f7b4376bc7ce52b21710c7560716334f8f3fcd2af5d2e21c,0xcc2321a579682058f47ddf5992ef87d28104ed33f4a113b160555346b8c3c147,0x8497558838586d7e999b1c3c44ef7cc4883eb86460a8970d744eea423b6211bf,0x6948c621b5a7dc2b76bc629f69fd12cffa9dda3a6516fa81121595ab25a89250,0x4cd35945862a1af4e75a6381668c777687d54622c8db130c1604f92e8507dc79,0x3ed78b1f3ac60f26d1148593c07df2b7895d912d88a35289ae5eff3a35e9776e,0x173673f48242f779f4bd538bd15a2995552439ef1c3e0725b5e32074e0065ba2",,,,,,,, +7/9/2023,20237,,Arcadia Finance,Opt,,,,,"0xd3641c912a6a4c30338787e3c464420b561a9467,0x01a4d9089C243CCaEbE40AA224ad0CaB573B83c6",,,,TP,TP,ATTACK-DETECTOR-2,"Mon, 10 Jul 2023 01:16:17 GMT",0xca7c1a0fde444e1a68a8c2b8ae3fb76ec384d1f7ae9a50d26f8bfdd37c7a0afe,Jul-10-2023 01:16:07 AM +UTC,10 seconds,10,,,,,,,,No Victim,,,,,,,"0x00CB53780Ea58503D3059FC02dDd596D0Be926cB,0x046fc9f35EB7Cb165a5e07915d37bF4022b8dE33,0x950A8833b9533A19Fb4D1B2EFC823Ea6835f6d95,0xD2A34731586bD10B645f870f4C9DcAF4F9e3823C,0x2dE7BbAAaB48EAc228449584f94636bb20d63E65,0xC000d75D4221Ba9D7A788C81DCc0A4714B4aE9e5,0x3Ae354d7E49039CcD582f1F3c9e65034fFd17baD,0xD417c28aF20884088F600e724441a3baB38b22cc,0x68847530E93789Cc2e602130f6B53C55E1159Bb9,0x200C24184c50796fB72343C7578b6639F515757E,0x9aa024D3fd962701ED17F76c17CaB22d3dc9D92d,0xEe7403d3f2660928b2B39BAb80A820975520aFe0,0xAF17879139487d9704E61c4C726525F0C1764Be8","0xa46eed295e1bb0881e47a8b504b41e71b4928d84cb735eb62cb6fb590877339f,0x3427e9a637e7ce9601ebac7dd1007530f4105e4a02b422ed2f7588f45402ae3f,0x2c2d52e5835629ddedbd4bd13e3d37bf089d9bd17b6d85e3bc233ea86e389381,0x0c32083f92dc9e21c4d5beb96c8dac61da2a89962030fadaf9f9f27868dd19f0",,,,,,,, +7/11/2023,20237,,Liberti,Mainnet,,,,,"0xfd2d3ffb05ad00e61e3c8d8701cb9036b7a16d02,0xdfcdb5a86b167b3a418f3909d6f7a2f2873f2969",,,,FN,,,,0xcb0ad9da33ecabf75df0a24aabf8a4517e4a7c5b1b2f11fee3b6a1ad9299a282,Jul-11-2023 07:49:11 AM +UTC,,,,,,,,,,,,,"No base bot alert during funding (0xc41c5412c837f7e53989b7aed99ff95e71486d5cb4ae9046d20472787b3d4254), suspicious contract creation(not ML) alert during preparation (https://explorer.forta.network/alert/0xf47190153acf8c4d436dc93abc93cf0504262d0ff469e947ae0e84e95c499952), NETHFORTA-25,ANOMALOUS-TOKEN-TRANSFERS-TX and Large Profit alerts during exploitation and forta-text-messages alert during messaging.No laundering yet, funds still at attacker's address. No FP or end user alert so attack detector should have alerted",,,,"0x429032A407aed3D5fF84caf38EFF217eB4d322A9,0x74476caE04C5aaf33f60760eD150bf3Fa879a51b,0x2610d161Cb8CEfBB9687Fb4a8ac8E5a6bf440C20","0xbfd6b2d5928be70106fb165edd0fae05d02a537978ffc225209a4a45a9a6ef22,0x9866f666b72c5931dbc3354db672ac2b7e29195c2e256fcd62363d7ba7ad3844,0x54dd4d87d8957e7948ded6a4b8d95ed21f22744c91dc59a3dcb7aee7c24766c9,0x2eefb92b2b2b7fd71c15955917021b8f0b1240680b6e680284c9d1ce4c2dfceb,0x24fd60e18fb405f2a8f78c99c6e0b439a7970235e18ed3c3158091750431ee06,0x1f95e2afb640e5962aa1ac03cbb4f9daf325791de1d2f0f6c89c2a5016bf95fd",,,,,,,, +7/11/2023,20237,,Platypus Finance,Avax,,,,,"0xc64afc460290ed3df848f378621b96cb7179521a,0x16a3c9e492dee1503f46dea84c52c6a0608f1ed8",,,,TP,TP,ATTACK-DETECTOR-2,"Tue, 11 Jul 2023 16:58:31 GMT",0x91957c647a06122616a41fa78570b6dcdfd8e366aaf5b7dd9b36d29f88669742,Jul-11-2023 04:19:32 PM +UTC,39 minutes,2340,,,,,,,,No Victim,,,,,,,"0xbe52548488992Cc76fFA1B42f3A58F646864df45,0x66357dCaCe80431aee0A7507e2E361B7e2402370,0xe0D166DE15665bC4B7185B2e35E847E51316E126,0x39dE4e02F76Dbd4352Ec2c926D8d64Db8aBdf5b2,0xB8E567fc23c39C94a1f6359509D7b43D1Fbed824,0x30C30d826be87Cd0A4b90855C2F38f7FcfE4eaA7,0x4658EA7e9960D6158a261104aAA160cC953bb6ba,0xC828D995C686AaBA78A4aC89dfc8eC0Ff4C5be83,0x81E63d0EEBA2D85609A6b206737e98e39B888F4C,0x8B4A45da5B0705Ae4f47EBeFC180C099345cF57e,0xDeD29DF6b2193B885F45B5F5027ed405291A96C1,0xb3393f4e609c504da770ebc968540784cc4e016c,0x27912AE6Ba9a54219d8287C3540A8969FF35500B,0x91BB10D68C72d64a7cE10482b453153eEa03322C,0x233Ba46B01d2FbF1A31bDBc500702E286d6de218,0x89E9EFD9614621309aDA948a761D364F0236eDEA,0x73256EC7575D999C360c1EeC118ECbEFd8DA7D12,0x22d4002028f537599be9f666d1c4fa138522f9c8,0x5857019c749147EEE22b1Fe63500F237F3c1B692,0xdaCDe03d7Ab4D81fEDdc3a20fAA89aBAc9072CE2,0xB0523f9F473812FB195Ee49BC7d2ab9873a98044,0x68c5f4374228BEEdFa078e77b5ed93C28a2f713E,0xfF6934aAC9C94E1C39358D4fDCF70aeca77D0AB0,0x7125B4211357d7C3a90F796c956c12c681146EbB,0x2Cd5012b5f7cc09bfE0De6C44df32a92D2431232,0x061da45081ACE6ce1622b9787b68aa7033621438,0x1f6B6b505D199B9bd0a6642B8d44533a811598da,0x0d26d103c91f63052fbca88aaf01d5304ae40015,0x909b0ce4fac1a0dca78f8ca7430bbafeeca12871,0xc1daa16e6979c2d1229cb1fd0823491ea44555be,0xAEf735B1E7EcfAf8209ea46610585817Dc0a2E16,0x776628A5C37335608DD2a9538807b9bba3869E14,0xa16bbab03B61810BA8633343D9FfC04B086506B5,0xDEA7bf752Ef25301DbB2e9288338A1a9013EC194,0x6a1340A262BaE9b076a9f8862eBfabea25039e4e,0x2E19709471FB25078dB982DD6b94A8Cb2C29E2Aa,0x06f01502327De1c37076Bea4689a7e44279155e9,0x836648A8cE166Ba7CaFb27F0E6AD21d5C91b7774,0x209a0399A2905900C0d1a9a382fe23e37024dC84,0xc09c12093b037866Bf68C9474EcDb5113160fBcE,0xc7388D98Fa86B6639d71A0A6d410D5cDfc63A1d0,0xFC95481F79eC965A535Ed8cef4630e1dd308d319,0x6FD4b4c38ED80727EcD0d58505565F9e422c965f,0x035D7D7F209B5d18e2AB5C2072E85B32e1D43760,0xF01cEA00598d87Cb9792a01B040d04b0bd8Ca781,0x4E5704991b43C1D33b9Ccd1BC33B211bf068385A,0xC73eeD4494382093C6a7C284426A9a00f6C79939,0xA2A7EE49750Ff12bb60b407da2531dB3c50A1789,0x7716307350c0819eD05C3e7f6c478b27CAED5361,0x4b851118a4A4948799f24d0CBE17FA3dad09e2D5,0x2aD5fC90F95f236F5276E795A5A46381bFE5aa92,0x12141b8FD20b4bBdd5F4e911bF91575258A3eABD,0xad589CFB73922700Dc46cA39CDF83B9618ac91E0,0x542dd5F38fcb3AAb28d6418CF3e1d36329A79aC7,0xa63e0c77D92d9Ee15bBeB0c219D80748605b2Cf6,0x2CC7492Aa8846c834364d2039707c583d4077BCb,0xE08947eE864Af325D9F98743B3b905875Ae0Ec99,0x551C259Bf4D88edFdAbb04179342a73dAa759583,0x027A24Fa0168DA4fC7AF9Bf5331D42692889AFaa,0x979702f708dd794A0e5E616E89C1656a2C55d681,0x551C259Bf4D88edFdAbb04179342a73dAa759583,0x4f734D89531b6c9A1242C196297316E928AEeFBa,0xd78d5f6A5bF62a88212203077D1A28F812307145,0x2DebC993c5f9Cac766Efa3EdCb1b6e40aDb4F6E2,0x6689C9Eb9a8A0Dd8BbD0935Ce0cD7FeD72E8667E","0xe06e39f9c5ec02f8eb27afd405def65c10d9d0d0b407735df43ac596b80ad77e,0xccb63dbb46339eaf69cbef24b4088da974f780e163c3496e95579bd095911109,0xc707fc751e1af18dbe5ffec2b72e650ef603eb48751d11b29755ee6d63f6a33a,0xb44945b9053d8a6234d8ff00bb9cc56f292e85f624c7d46496dc5ecfdcc225bb,0xa748c9759fe9eb36dc37a6c98c092c04e1b4a556d221f4ada032ed651b31b261,0x9e83ff2ad0da036c1eee9048786e388c1b0c3a35d8cab33175a39955282b2c1f,0x884ed9f7992bf99a18aec94756fb452fb35c1fbe01b79c06e32f81c35ce6d826,0x75bc398440960cc4a6d4fbd4525fd290e149f03f146981907f7e35ce61441fdc.0x70f6ec3f1fb350877b793fcc3ce43047ac9fed7203b17ac9d29b979a99972519,0x1bbd7b9a3188da03ff4bc1e47a0695bc1dfb7d138c3970c131231375de81577b,0x1b08293ce736e44a39dddeda1ed98c7799d8e519896d1864755794bffcebac15,0x1637ac12aa594179efdf85b8302d44c38f6a9f40148d86ffa7fd0f24c65dff7d,0x052e52e1d55327fc1aef52bc6b532eccc7fe7fc750aa0bfd7f9c00693fc49a42",,,,,,,, +7/11/2023,20237,,Rodeo Finance,Arb,,,,,"0x2f3788f2396127061c46fc07bd0fcb91faace328,0xe9544ee39821f72c4fc87a5588522230e340aa54",,,,FN (beta detected - FP Mitigated),,,,0xb1be5dee3852c818af742f5dd44def285b497ffc5c2eda0d893af542a09fb25a,Jul-11-2023 07:45:25 AM +UTC,,,,,,,,,,,,,"No base bot alert during funding(tx-https://arbiscan.io/tx/0x0ba649bc75a28f786288fc9c618269e9a4c9e1572770a9de73b9e47a4f405723). No base bot alert during preparation (tx - https://arbiscan.io/tx/0x3eace33baf649103e091a49a9aa3c2f06747728be3665785d06efe90ef531d86). Flashloan and large profit alert during exploitation(tx - https://arbiscan.io/tx/0x3eace33baf649103e091a49a9aa3c2f06747728be3665785d06efe90ef531d86). Attacker Bridged funds with Across protocol to mainnet, LARGE-TRANSFER-OUT alert (https://explorer.forta.network/alert/0x05f1ffeb83d81fce2b655584978112979e49900240e748be7eea045648f460d9).Attack detector would have triggered but was fp mitigated (https://explorer.forta.network/alert/0x635fe9d4473a96127c76233c908368b32e189f9cc2491edc10ed6c6e847d0f75)",,,,"0x8accf43Dd31DfCd4919cc7d65912A475BfA60369,0x6f456005A7CfBF0228Ca98358f60E6AE1d347E18,0x5e4d7F61cC608485A2E4F105713D26D58a9D0cF6,0x0032F5E1520a66C6E572e96A11fBF54aea26f9bE,0x3D288C83b6030f86d83E5C8Dc4150382004471A8,0xaB7d6293CE715F12879B9fa7CBaBbFCE3BAc0A5a,0x9D6A853Da8BF51386240Ad1ed19E13C48dF3a2A7,0x45a58482c3B8Ce0e8435E407fC7d34266f0A010D,0x5180Dce8F532f40d84363737858E2C5Fd0C8aB39,0xC4327DC9Ef2511706D233e813b822f196bc027ac,0x033f193b3Fceb22a440e89A2867E8FEE181594D9,",,,,,,,,, +7/12/2023,20237,,Ethscriptions,Mainnet,,,,,0x8558db5f3f9201492028fad05087b6a1d9c11273,,,,FN,,,,0x419b19c6f6375b6ec4bf07dd2c0b0dd8178fbc1db2aaaaa020e607b27929cd22,Jul-12-2023 03:32:59 AM +UTC,,,,,,,,,,,,,"Attack didn't follow the usual pattern of funding, preparation etc. just exploitation by withdrawing ethscriptions from marketplace contract. ",,,,0x3ca843b98a2fe8ef69bb0f169afad3812c275f5e,,,,,,,,, +7/17/2023,20237,,NewFi,BSC,,,,,"0x3a10408fd7a2b2a43bd14a17c0d4568430b93132,0x18703A4fD7b3688607AbF25424B6Ab304DEf2512",,,,TP,TP,ATTACK-DETECTOR-2,"Mon, 17 Jul 2023 14:00:38 GMT",0x557628123d137ea49564e4dccff5f5d1e508607e96dd20fe99a670519b679cb5,Jul-17-2023 02:00:19 PM +UTC,19 seconds,19,,,,,,,,No Victim,,,,,,,0xB8dC09Eec82CaB2E86C7EdC8DD5882dd92d22411,"0xbc693bea97e2db6c9d055cde1e88839b863a69e70079aaaed87e6152e36f9af6,0x3c93a94b4915a61e7ed9659fe832889daf916c915e2731a994940aeaeaed5ea8",,,,,,,, +7/18/2023,20237,,BNO,BSC,,,,,"0xdc109426972ae14d5b3d7e91b47d42ff1fd3c8cc,0xa6566574edc60d7b2adbacedb71d5142cf2677fb",,,,FN,,,,0x33fed54de490797b99b2fc7a159e43af57e9e6bdefc2c2d052dc814cfe0096b9,Jul-18-2023 12:55:37 AM +UTC,,,,,,,,,,,,,"tornando cash funding(no funding base bot alert, example tx - 0x29f311cb61aea2ed2a43537e57fac6b99206ed876278565fb7e8130e23988725), no alert from preparation base bots during attack contract deployment (tx0x731b87a416bbf645a453f0617d6e4ff2388c04d8bcf2864722b20ae7dd2b34bf), high gas +use alert during exploitation (https://explorer.forta.network/alert/0x04013d0d9abf5a79d3b4a022f5d8b7a06380d0ee190f468a2d56caf4bc34ece2). No laundering yet, funds still onchain at 0xdc109426972ae14d5B3D7e91B47D42fF1fd3C8cc",,,,"0xdCA503449899d5649D32175a255A8835A03E4006,0xa4dBc813F7E1bf5827859e278594B1E0Ec1F710F,0x4B9c234779A3332b74DBaFf57559EC5b4cB078BD",,,,,,,,, +7/18/2023,20237,,ApeDAO,BSC,,,,,"0x10703f7114dce7beaf8d23cde4bf72130bb0f56a,0x45aa258ad08eeeb841c1c02eca7658f9dd4779c0",,,,TP,TP,ATTACK-DETECTOR-2,"Tue, 18 Jul 2023 14:01:48 GMT",0x8d35dfd9968ce61fb969ffe8dcc29eeeae864e466d2cb0b7d26ce63644691994,Jul-18-2023 02:01:37 PM +UTC,11 seconds ,11,,,,,,,,No Victim,,,,,,,"0xB47955B5B7EAF49C815EBc389850eb576C460092, 0xee2a9D05B943C1F33f3920C750Ac88F74D0220c3","0xff4676ef8bfd3eae14610e8033fffb730db53743ea4c8cd097676b5dbc6f0c31,0x7e6789b7ced823162c794643054f463331a46c1190ff681f1e61bc668eaa600f",,,,,,,, +7/20/2023,20237,,FFIST,BSC,,,,,"0xcc8617331849962c27f91859578dc91922f6f050,0xe84ef3615b8df94c52e5b6ef21acbf0039b29113",,,,TP,TP,ATTACK-DETECTOR-2,"Thu, 20 Jul 2023 00:42:18 GMT",0x199c4b88cab6b4b495b9d91af98e746811dd8f82f43117c48205e6332db9f0e0,Jul-20-2023 12:07:06 AM +UTC,35 minutes 12 seconds,2112,,,,,,,,Yes,,,,,,,"0x80121DA952A74c06adc1d7f85A237089b57AF347,0x7a3adf2f6b239e64dab1738c695cf48155b6e152","0xcd03c6e1b775bcaffbddf3c3149429b44f14c679575fac3d8b90253f216565bd,0xace8119c9e48ab34398da944a2ec6c326b17e06baee2ea0e09d1d17d337fb2d9,0x98dd919c80af9628be0c309747dc0703c8c0f3858d397a6030f1c3a50a6c231e,0x8166b874fbb7138e2fab3472186b72c1463fb1f0c606f0336f2e8ba0f8d5d1a1,0x6d0319215e4e4313f60fbfeaa4b32b4c2a34baa5984ac532215db4af8df2e349,0x32809a652438020809a3323b1a1f9d321d85f2b94f82c190afcf2a31552a591f,0x18e089da7d9650d54b099503828ba9c0d16754e7a8702cc827d53c9687c49e46,0x0cc480ed0e0826f4da292e968705667cbe8df7eb3db96c7e50ed7945b57f145b",,,,,,,, +7/21/2023,20237,,Irena,BSC,,,,,"0x59e143d1ee59abea79be7d8a6bc8524588123456,0xE70d716BDe81575D372EA329800D953C5dD0b3E9",,,,FN,,,,0xd0f743b22111a13aa4be9fbba515ca53a301b21c7f744ec8c313dd0a25767779,Jul-21-2023 07:11:13 AM +UTC,,,,,,,,,,,,,"Triggered Suspicious Contract Creation alert and ice-phishing-suspicious-transfer. Both are classified in the same stage(preparation) so bot didn't trigger. The suspicious transfer happened in exploitation though.Money laundering through binance. +[chriseif] - what about funding?",,,,"0x9eeB6c5ff183E6001c65a12D70026b900AE76781,0xdDD165504E22B4E8b18F2E0954FC90BD30F01117,0xd9693D41E577064Df9D7e90fe3D000825ceB947d",,,,,,,,, +7/21/2023,20237,,Conic,Mainnet,,,,,"0x160b431bdc7c2cedb2838e5e74c26886aad65d8f,0x3d32c5a2e592c7b17e16bddc87eab75f33ae3010,0x10db234e02c3889d8e408c7084e8ce10892bdad7,0x743599ba5cfa3ce8c59691af5ef279aaafa2e4eb,0x8d67db0b205e32a5dd96145f022fa18aae7dc8aa",,,,TP,TP,ATTACK-DETECTOR-3,"Fri, 21 Jul 2023 10:24:36 GMT",0x8b74995d1d61d3d7547575649136b8765acb22882960f0636941c44ec7bbe146,Jul-21-2023 10:35:11 AM +UTC,-11 minutes,-660,,,,,,,,No Victim,,,,,,,"0x4D080be793fb7934a920cbDd95010b893AEda545,0x9aE380F0272E2162340a5bB646c354271c0F5cFC,0x013A3Da6591d3427F164862793ab4e388F9B587e,0xeC037423A61B634BFc490dcc215236349999ca3d,0xDF848c4E02AE9D0492ED796B5e2e4F414B28c7c6,0x92bffb71BBe241ba9cdFb3A4e56E48dC4F118ED7,0xCb7c67bDde9F7aF0667E8d82bb87F1432Bd1d902,0x3F41480DD3b32F1cC579125F9570DCcD07E07667,0x5F2e1Ac047E6A8526f8640a7Ed8AB53a0b3f4acF,0xf4A364d6B513158dC880d0e8DA6Ae65B9688FD7B,0xC67e9Cdf599369130DD0841Ee5CB8eBF9BB661C4,0x5296e0cc7b64808dDD0a4932BB03072440ce3E95,0x74eA6D777a4aEC782EBA0AcAE61142AAc69D3E2F,0x07b577f10d4e00f3018542d08a87F255a49175A5,0x369cBC5C6f139B1132D3B91B87241B37Fc5B971f,0xAbb735648a076d570AfF2A61D8D141099823EAe9,0xf432110e5206356CD6448dA16b05394a89B44CeF,0x40293380F5292Bb13905608b35a936c332f07f94,0x3565A68666FD3A6361F06f84637E805b727b4A47","0xed47fe79bb05b4a63a81b1b77952182427612af678f7232c0f066d83ec99b844,0xecf73e10bae133999596e59e006d743716dca8936d1ee417dcd44ebba574fb440xea2d16d70c9962c5a04564c9157ef7ae69dfe1b70791f1f43863810bf93fba3d,0xcc43523d4d71ecec90daf7db6625efd512a40610307ffb4e1235827bf13c1a7a,0xaffb21bbf4996cb12c3092509655dd5b318e12840fb7416c21983070dc74bfab,0x8ac08678037936709200dc2141290a481ad01cf810b5aef022109e651ebbc865,0x899a18a9164ef2702cb4343ca51cabe83dca2bf9b033b8e61b1626d58e48c012,0x8748e58971150c346cbb395028165781a1069e6698f4641c2f11d9abd3e01a3f,0x63053806e3abd5ba4e3bc36a22e300ceb7b1fdd5178e7ba349e9dbc2b6c061bc,0x5cb04bcee41de044abd2d5edb07a039a08cdeb0537d9480d95d59af92b1b78cb,0x5992b9990854d23c373115fc6eb06a49ce67f7cd0071045eda9224f5b3d55f68,0x564861b42bc1688283fee2bcd734895f840d8fb93abcfdbe6a4702ebc3e67120,0x54892801fdf390b4791e7f31b57e79e4b37adb082198911b94b69d6516a0a42f,0x396ed3be18540df73accc1f2fedb150dd60ad24613bb4ca4ac32dc07c8105605,0x34c095d029ff7a72cc59685412e1620035ecfcdac62c9e298449c103152e9fe8,0x2a4c682b6ed234f91b441ee0368ebcd5a20f74053a616783e6180343976f76c7,0x06f327ddc8c5a7158d86546fbde99ff4b849927e9789ae4335956c1f875ded33",,0,,,,,, +7/24/2023,20237,,PalmSwap,BSC,,,,,"0x5cf403ecf47f133b917cb9e3f24b7a7afd718af1,0x0fe7457f5909778b15d8e46768678abbf0c98329,0xf84efa8a9f7e68855cf17eaac9c2f97a9d131366,0x55252a6d50bfad0e5f1009541284c783686f7f25",,,,FN,,,,0x62dba55054fa628845fecded658ff5b1ec1c5823f1a5e0118601aa455a30eac9,Jul-24-2023 05:23:38 PM +UTC,,,,,,,,,,,,,"Triggered only the victim-identifier bot,flashloan bots didnt trigger during preparation and exploitation (flashloan was from radiant). 80% of the fund was returned to the protocol, so no money laundering.",,,,"0xd990094a611c3de34664dd3664ebf979a1230fc1,0xa68f4b2c69c7f991c3237ba9b678d75368ccff8f,0x806f709558cdbba39699fbf323c8fda4e364ac7a,0x29745314B4D294B7C77cDB411B8AAa95923aae38,0x04C7c8476F91D2D6Da5CaDA3B3e17FC4532Fe0cc,0x305496cecCe61491794a4c36D322b42Bb81da9c4,0x8b47515579c39a31871D874a23Fb87517b975eCC,0x6876B9804719d8D9F5AEb6ad1322270458fA99E0",,,,,,,,, +7/24/2023,20237,,MetaLabz,BSC,,,,,0xf576c7f17bc5a834f8bfe6f810a09eb44818c739,,,,FN,,,,0x6d14276f14d7b7f72f201c72b6cf54689211ccb2d295d19e4bb5e9006fda177c,Jul-24-2023 03:01:56 PM +UTC,,,,,,,,,,,,,"No base bot alert during preparation (https://bscscan.com/tx/0x54b926b7c1a952922ebb23f7fb21d04cdc82f85ab7b549ef8114abab4c311c47) and exploitation.LARGE-TRANSFER-OUT alert during laundering (https://explorer.forta.network/alert/0x1931dcb950cc4e5be10f1fb95336f77e62268d573c56dca1a2fea45196e2dc86). EOA has many past txs (80000+), possible reason many base bots didn't trigger",,,,"0x165B8FDDFCbEd154338B5d4B33B76836002D9701,0xf42A313E7a32E49B39c742516d6F2Da256A33035,0xF14D3692B0055Db9Ca4c04065165d59B87E763f1",,,,,,,,, +7/25/2023,20237,,Eralend,zkSync,,,,,0xf1d076c9be4533086f967e14ee6aff204d5ece7a,,,,FN,,,,"0x99efebacb3edaa3ac34f7ef462fd8eed85b46be281bd1329abfb215a494ab0ef,0x7ac4da1ea1b0903dfabda56f713ea5e4a960a3fc34467a844d037f86ee8bfe98",Jul-25-2023 10:24 AM +UTC,,,,,,,,,,,,,Unsupported network,,,,"0x1181D7BE04D80A8aE096641Ee1A87f7D557c6aeb,0xD6CA0951ea8F18C63e5dCA1646e0a4B53d5d3fa0,0x0171cA5b372eb510245F5FA214F5582911934b3D,0xc8DDC91D8CeCd4a940B173A240ba664A0C79e314,0x1BbD33384869b30A323e15868Ce46013C82B86FB,0x00A1C271df375660f47293fd84B53572fded0107,0xE58f0614728E4220CbC592DB8e44c11720CabbaA",,,,,,,,, +7/26/2023,20237,,Carson,BSC,,,,,"0x25bcbbb92c2ae9d0c6f4db814e46fd5c632e2bd3,0x9cffc95e742d22c1446a3d22e656bb23835a38ac",,,,TP,TP,ATTACK-DETECTOR-2,"Wed, 26 Jul 2023 17:35:09 GMT",0xed52a42b2f45e4dea8d07f70d645931e4f6da65e9ab281cd3dbb9d9d21febb45,Jul-26-2023 05:39:24 PM +UTC,-4 minutes 15 seconds,-255,,,,,,,,No Victim,,,,,,,"0x0aCD5019EdC8ff765517e2e691C5EeF6f9c08830,0xE77a017DB4C7754bF272D19FfE0149779b9800B5","0xe47009b0c7feab90b2e2aa26bc66cc7b293d3c673f928908b8b8b1aeb61eb076 +0x8c06b4cbb63f0ad7aa8a8a837b5ccf0a45258ce8e551232fd0f6e4bd5fc75184 +0x28c28bb7bb30f41c424479194229603ed2f29654a816f2faf65a04ec8b6fa414 +",,0,,,,,, +7/22/2023,20237,,AlphaPo,Mainnet,,,,,"0x040a96659fd7118259ebcd547771f6ecb9580d17,0x6d2e8a20b8afa88d92406d315b67822c01e53c38",,,,TP,FN,ATTACK-DETECTOR-2,"Sat, 22 Jul 2023 02:57:35 GMT",0xd77012e22dbf51aceb4b759db83ef767af165c258d1c423187a6f10324d1d064,Jul-22-2023 02:32:47 AM +UTC,25min,1500,,,,,,,,No Victim,,,,,,,0x6dfc34609a05bC22319fA4Cce1d1E2929548c0D7,,,,,,,,, +7/31/2023,20237,,JPEGd,Mainnet,,,,,0x6ec21d1868743a44318c3c259a6d4953f9978538,,,,TP,TP,ATTACK-DETECTOR-2,"Sun, 30 Jul 2023 13:10:51 GMT",0xa84aa065ce61dbb1eb50ab6ae67fc31a9da50dd2c74eefd561661bfce2f1620c,Jul-30-2023 01:10:35 PM +UTC,26 sec,26,,,,,,,,Yes,,,,,,,0x836a808d4828586a69364065a1e064609f5078c7,"0xd9dac984f4fc01b8b41bef6df0a9ad9582430747a4ab25cce484e14c10dbfb0f,0xc81659c74708977e8ce040977cbbe7d07856828eb1887d30988f5051a0c70104,0xc01b34526194afb172a70d2aa04ce1dadc31842c9465adc4babb5e85c9bfd23c,0xad6d18f913da68ab417d2e96dcdb5be890d007fae9fa0ac25cc2869a91316d2b,0xa4ccec00be80d4b0b68e31bb89bd47af9dbd1a1e5c36e628d42aa7b8a38433d7,0x86fc59ac84eb399bcdb670087473cbf5333fad45bccc3bd7be3656e5b79c0b1b,0x8250ad95f1896a14ceac6651916158d98cdbb2b457d5afe7ff951169c215c983,0x67f68b81b494a936750b1e54d7a0e6dbe3eee75f6dd2961cfbac170be30a014d,0x430525a3a5428fa6fd4a866f1eb994ca69070fe8d323e291c820347e191ba951,0x0ae3fa86467e69a8cf92972c7e2327bcc103a4adebdf05afffda2ed9b9b2a12c,0x06be8440ba6baf433ba9a67456836ec601019fd50f25b7471c17765ab6f5c034",,0,,,,,, +7/31/2023,20237,,Alchemix,Mainnet,,,,,0xdce5d6b41c32f578f875efffc0d422c57a75d7d8,,,,TP,TP,ATTACK-DETECTOR-2,"Sun, 30 Jul 2023 14:53:55 GMT",0xb676d789bb8b66a08105c844a49c2bcffb400e5c1cfabd4bc30cca4bff3c9801,Jul-30-2023 03:34:47 PM +UTC,-41 minutes,-2460,,,,,,,,No Victim,,,,,,,"0xc4c319e2d4d66cca4464c0c2b32c9bd23ebe784e,0x0100546f2cd4c9d97f798ffc9755e47865ff7ee6","0xfbd85ef339e3b3bab2f16246caafecd2f9e58e09df446295262eea5774055f43,0xf2a9ef63b7481e823fa7bc74c85273279e5fbce122c38a24409da22a918781f1,0xbc25305bc4ea46b3a89b35c4aa5d8007da68c41de41ff3313a79e824dc3273d5,0x99acae4edfd5a725c4bd1cf1855bed6f57e3be4bd263b5a852243b65734c712a,0x8422425879ba79910232cc8211bffe423c99d6b80dbf8b0f26f267d6f5747bc8,0x5c3f687215e29f172a8f3abfcea4c8f07f2e9d61f5f6c1da0b8be03e52e17fb3,0x587190b632145f51e51c2b2365a1ca062ccc86676fe8d41f29da631f3222f995,0x52c0eec8e7741472c90f64b5622791f92f4cd343b4610dd991740fff08112c93,0x2a1125da8bc132f87c9a632bcae59b15043e614b3d6aa9b677f9ecb97f038b44,0x06332cd2dc528797561cc26dc058fd7d7a78d53c5e8178f8064aa16602623390",,1,,,,,, +7/31/2023,20237,,Metronome,Mainnet,,,,,0xc0ffeebabe5d496b2dde509f9fa189c25cf29671,,,,FN,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +7/31/2023,20237,,Curve,Mainnet,,,,,0xb752DeF3a1fDEd45d6c4b9F4A8F18E645b41b324,,,,TP,TP,ATTACK-DETECTOR-2,"Sat, 29 Jul 2023 13:41:59 GMT",0x2e7dc8b2fb7e25fd00ed9565dcc0ad4546363171d5e00f196d48103983ae477c,Jul-30-2023 07:08:23 PM +UTC,-30 hours,-108000,,,,,,,,No Victim,,,,,,,0xed4064f376cb8d68f770fb1ff088a3d0f3ff5c4d,"0xe74e81aa84d39cc4178dbf0011f5db4303c9fec3a55d969c4bb101c89e0a11c8,0xd84f71afb4b2d5775a4f5a2adb098603ed008f509a0880c64c85e94bb78fac88,0x8c26d0ed4ebf899ea299aa1f25d3f0d02230fb4d04d69dd5747f1b783262b283,0x6346401d83a6b2c9acbb329c0b4c28de7bfa5b07b439ed2315776b2b01e0cf2f,0x62b15974a6d2d7e0fb887a61c54efefc411fe65b6ae0c19486a4fbffcc45a653",,1,,,,,, +8/1/2023,20238,,LeetSwap,Base,,,,,0x5b030f90db67190373dbf3422436df4c62f60a60,,,,,,,,0xbb837d417b76dd237b4418e1695a50941a69259a1c4dee561ea57d982b9f10ec,Aug-01-2023 01:20:41 AM +UTC,,,,,,,,,,,,,Unsupported network,,,,"0xa2899c776bAAF9925d432F83C950D5054A6CF59C,0xd3Ea3BC1F5A3F881bD6cE9761cbA5A0833a5d737,0x987a758b221Eabd262CAE4fbb4D75C579275D8AA",,,,,,,,, +8/2/2023,20238,,Uwerx,Mainnet,,,,,0x6057a831d43c395198a10cf2d7d6d6a063b1fce4,,,,TP,TP,ATTACK-DETECTOR-2,"Wed, 02 Aug 2023 08:45:18 GMT",0x3b19e152943f31fe0830b67315ddc89be9a066dc89174256e17bc8c2d35b5af8,Aug-02-2023 08:44:59 AM +UTC,19 sec,19,,,,,,,,Incorrect victim(Balancer: Vault),,,,,N/A,,"0x4306B12F8e824cE1fa9604BbD88f2AD4f0FE3c54,0xa41529982BcCCDfA1105C6f08024DF787CA758C4","0x88216a0a04c7c429d85f3ad878b0928ba3a73c28707b98f9f52e534e50dd5397,0x4d09978fe16e61c3dc48088480e895bfa918ec3c76cdc9304243e4820094438a +",,0,,,,,, +8/1/2023,20238,,Neutra Finance,Arb,,,,,0x39b842bb7287afc516db176b76c5cbbd8caa1e84,,,,FN,,,,0x6301d4c9f7ac1c96a65e83be6ea2fff5000f0b1939ad24955e40890bd9fe6122,Aug-01-2023 07:59:35 PM +UTC,,,,,,,,,,,,,,,"https://github.com/forta-network/starter-kits/issues/281,https://github.com/forta-network/starter-kits/issues/283,https://github.com/forta-network/starter-kits/issues/284",,"0xdA51015b73cE11F77A115Bb1b8a7049e02dDEcf0,0x6609BE1547166D1C4605F3A243FDCFf467e600C3,0x22F4730e21e40Dc751c08826d93010A64185e53f,0x695A69e76C97F5708e5D0fd113DF8EC1459233B3,0x98165Afd2EbcA903dc6537E01146a048C1c23cdB,0x1B872bb0080159F9BDb77E5b1B006c6cb70D718a,0x2ea3CA79413C2EC4C1893D5f8C34C16acB2288A4,0x4E94703760323534A0Ed949ae4d21De17b90e0Bb,0xfeBaF8DCCD4c0c8E6Fd02bDa81983b5ae6D95038,0xdE751C92fB38183953614E26a32af99649A4E5AF,0x6Bfa4F1DfAfeb9c37E4E8d436E1d0C5973E47e25,0xaf40618F6E3d6Cd4D0bA6AC4366ee6edF12ac1dA,0xfba3b455211a3a09689788Ac3A14B4F8Baf012B4,0xCe6dfa93316E419D2daEf5461ceE73c1857AA386,0xB23a604bD486F07bB52A8b5B17Ec989282141B84,0xA1Afd44dCcd68C90a48FB63A1baC878012329f9A,0x276BB5c63EEaef97f0e8fd33a1e23b911F9F8B77",,,0,,,,,, +8/3/2023,20238,,0xd61492,Arb,,,,,0x826b180cd3d6fd0a646875f920bb2cf52b7f0b0b,,,,FN,,,,0x864c8cfb8c54d3439613e6bd0d81a5ea2c5d0ad25c9af11afd190e5ea4dcfc1f,Aug-03-2023 10:25:24 AM +UTC,,,,,,,,,,,,,,,"https://github.com/forta-network/starter-kits/issues/286,https://github.com/forta-network/starter-kits/issues/287,,https://github.com/forta-network/starter-kits/issues/288,https://github.com/forta-network/starter-kits/issues/290,https://github.com/forta-network/starter-kits/issues/291,https://github.com/forta-network/starter-kits/issues/292,https://github.com/forta-network/starter-kits/issues/293",,0xd614927acfb9744441180c2525faf4cedb70207f,,,0,,,,,, +8/7/2023,20238,,Cypher Protocol,Solana,,,,,HHm4wK91XvL3hhEC4hQHo544rtvkaKohQPc59TvZeC71,,,,,,,,2FhJkrWntu6md6QUqqnWX61wqbt3RJHS8qQpSQXcKb2WNujgqxyxjB9WPZ4XFo3vZi632i3FHYw1HYMCVU9vpGsh,"August 07, 2023 18:33:22 +UTC",,,,,,,,,,,,,,,,,DgWb9csw8CGvnPhEbgH22D55dT8Ein7tcg3gkt1gfLEE,,,0,,,,,, +8/7/2023,20238,,Steadify,Arb,,,,,"0x9cf71f2ff126b9743319b60d2d873f0e508810dc,0xe10d4a5bd440775226c7e1858f573e379d0aca36",,,,FN,,,,0x5983968bdffcebaecc1ca56aece3d21767086959ffa883df21c00c378caa9cef,Aug-07-2023 04:35:28 PM +UTC,,,,,,,,,,,,,,,https://github.com/forta-network/starter-kits/issues/294,,"0x9c30a3Fd65da5c8666E8dDC4515836DA7A2D3b49,0x42800c56E88181Eb0be127f38DD38dd5D05E8A37,0x30fB5A410f0c3523a88719F71Fb7D0C0dc263167,0xfb77100E24591f1f9CbE84406Ad923a0d26B4931,0x27FD499EDd396420f924eEdBCc673d946f903e6A,0x55E83F07527b79289A82377D23C830Fa710F0d62,0x607F3b0F15039dA9f70De3091EDfdfC279108CfF",,,0,,,,,, +8/13/2023,20238,,Zunami Protocol,Mainnet,,,,,"0x5f4c21c9bb73c8b4a296cc256c0cde324db146df,0xa21a2b59d80dc42d332f778cbb9ea127100e5d75",,,,FN,,,,"0x2aec4fdb2a09ad4269a410f2c770737626fb62c54e0fa8ac25e8582d4b690cca,0x0788ba222970c7c68a738b0e08fb197e669e61f9b226ceec4cab9b85abe8cceb",Aug-13-2023 10:26:35 PM +UTC,,,,,,,,,,,,,FP mitigated (shows up in beta version) due to large TC deposit of almost 10ETH,,N/A,,"0xe47f1cd2a37c6fe69e3501ae45eca263c5a87b2b,0x2ffCC661011beC72e1A9524E12060983E74D14ce,0xb056B9A45f09b006eC7a69770A65339586231a34,0x9903ABbd0006350115D15e721f2d7e3eb6f13b97,0x946C3397D917898Be9034fe8206717ab84c4451a,0xE8dB196D31fce86f74c9725D0045f1C0f6287a46,0x7e3e10eA28affD3Fc47c5491fEf8351ACB530d71,0x4a062f1501f5FF149b973b70f7027d87622445F3,0x9848EDb097Bee96459dFf7609fb582b80A8F8EfD,0x12aDa2ba6fE3D0E7c03a2C6B2488b4Bd22b84998,0x45DF43f61428e270dFaDCB8E9bd6e93d68831343,0x06A62C6e449BA3026E238E1350c7e25a3d409544,0xdd28FEBC515939A3e60B364D5f7cB471F23795B5,0x5255e95cE870F6C92Bdc533221CFa011Dec4d3f9,0xb40b6608B2743E691C9B54DdBDEe7bf03cd79f1c,0x68934F60758243eafAf4D2cFeD27BF8010bede3a,0xBdCA4F610e7101Cc172E2135ba025737B99AbD30,0x16d44a8b78BF1cF48D6Eb0C202CAcA53f5aD507b,0xdC1AEb773Bd7dEd31170C1Ffe54Dd3639459bE07,0xf36bdf167722FD90d021c42c642eAA48EE37f62a,0x294a5EE0d021b4FAe28A76382C9B11D1D886f604,0x9dE83985047ab3582668320A784F6b9736c6EEa7,0x3b62cf2f3Ec02412D9083c1E5a81Be319F197809,0xC6A13D923FB29AF45f116889956763538D73cC51,0xe47f1CD2A37c6FE69e3501AE45ECA263c5A87b2b,0x0b49D1Dd3F045c986F7816c2Ad56F01D8FB29C82,0xb056B9A45f09b006eC7a69770A65339586231a34,0xF6A9a9dD2ddAF055A2e27EC63D282f63D30f2A5e,0xDc0B52c04CdC0099aeFcCa8B0675A00cF8f6d7dC,0x7226836d03229Be7625682E51CE7187254034170",,,0,,,,,, +8/9/2023,20238,,Earning Farm,Mainnet,,,,,"0xee4b3dd20902fa3539706f25005fa51d3b7bdf1b,0x21d986da6595369d628bf1f85d7b02fbbebae173",,,,TP,TP,ATTACK-DETECTOR-2,"Wed, 09 Aug 2023 07:34:37 GMT",0x6e6e556a5685980317cb2afdb628ed4a845b3cbd1c98bdaffd0561cb2c4790fa,Aug-09-2023 07:34:23 AM +UTC,14 sec,14,,,,,,,,Incorrect victim(aSTETH),,,"chriseif: TC funding alert was missing in the AD alerts, likely due to the long time delay.",,N/A,,"0x863e572B215Fd67C855d973F870266cF827AEa5e,0x5655c442227371267c165101048E4838a762675d","0xef0acb2c0f5a96ffdf633507e212fa630479cdbe27e99add409f656e4b5ce6c8,0xedc6ce3d5e83bf0f84650140528bcea551fbfb68413f854d578d6096a5aa0a8b,0xe38b9ecfe1a0620f56e6a915a24971699e16195e53aa71f89b2974d057a3b3ad, +0xdceef15749cc6049c65989721767308666f05fd36aa7999c781488b292c9c25d,0xd8aa4b5ca8eb1328ed667198d9abaf5f649cca65204f1de61ca03b84b436cafa,0xd4322fb53a09da17a9382bed057d7452f072d71247fbf61e79211bf1b7c94d62,0xbd36ec0d5247329e608e1f313009c25885e48f0192669394ff9fbb9a669ea041,0x3cf699b61c538f93e2a9d6214168dfa8a6dcbc15c993210f95c0429fef067252,0x3b99a03a782a38ff9cebb4732cab716ff6253b30f8ca8111248c32dddba4002c,0x3958b8b59704b1ba0d70f92a8fac4cc4c1eef1dcbc2f8b2abc24d92522cd6995,0x1f0e8d1147b6075e71bdc925871efff4a2677e0eddfa9acd77b83659ae75fb57,0x14bb69a3d2c185bcc57db906d470adced124d5cd45d59abaa3227426f7689e5d,0x0acd48c5e0a489b7515dfac63a05acaedf74dc1c4e1535aea8eb895408eb15b5 +","0xc72821154adfee753336fcd958d31ac5ea0be5d8b33a171230a9231aaa233584,0xb564a63c47a1e2d20dc666f4411ff4aee4e5d1116a022102b87071ff4ea68fb1,0xb48823b74f72faac383c100f0c5e0cad28d5f7fde87e7fb384ec5bc73dd892f9,0xa9ecae191f739e4d4cd2315a3dc3f4ce33e07d35120ba8dc762633ea2afefe3b,0x8089a0337ea3d93cbbe9016049a410a84dd825af0feb84fd9c78071eda2b8f0b,0x61cb135b4520c61c366f37656907b9e978e7d15c180a76218ce2548763391e91, +0x133a003a8bf1ebd3b19009e4b0038ff2155c561773985adc3912af26965000d0 +",7,,,,,, +8/10/2023,20238,,VisualizeValue,Mainnet,,,,,0x78767df0e5ebe44dd4ed7de89dfea99368eea844,,,,FN,,,,0x3104984bc5f71dd86a6cd4f25a860354d0eaa62603b9c51c9e6f29c6b4a707a5,Aug-09-2023 06:42:47 PM +UTC,,,,,,,,,,,,,"Had alerts in 3 stages (flashbot, tc funding, asset drained) but threshold too low. ",,https://github.com/NethermindEth/Forta-Agents/issues/450,,0x0082578eedFD01ec97c36165469D012D6DC257CC,,,0,,,,,, +8/14/2023,20238,,RocketSwap,Base,,,,,0x96c0876f573e27636612cf306c9db072d2b13de8,,,,,,,,0x25c11d664f89ef9237ecf2e8ff1f067821cb829694b184c7ee74e6d0a3f9bfba,Aug-14-2023 10:53:35 PM +UTC,,,,,,,,,,,,,,,,,"0x1B8128c3A1B7D20053D10763ff02466ca7FF99FC,0x4cf76043B3f97ba06917cBd90F9e3A2AAC1B306e,0x6653dD4B92a0e5Bf8ae570A98906d9D6fD2eEc09,0x304063953727b53048500dfd877A17d1C4f6EaFf,0x2ec62d08277FfC42eB5af71c7595C1a9f9458A3c,0x234Ccb5c64FDB3958C47E8efBe122b2d54633a96,0x0054C66Cb7B352dC79FD5F6A024D6F8A215Ff2ce,0x86cd8533b0166BDcF5d366A3Bb0c3465E56D3ad5,0x1a7975836BD4f1a53e5251F41b6DA5FF5FD105f5",,,0,,,,,, +8/18/2023,20238,,Exactly Protocol,Opt,,,,,"0x3747dbbcb5c07786a4c59883e473a2e38f571af9,0xe4f34a72d7c18b6f666d6ca53fbc3790bc9da042,0x6dd61c69415c8ecab3fefd80d079435ead1a5b4d,0xab88376b09f1b6f921521651d9c3edc42522768d",,,,FN,,,,"0x3d6367de5c191204b44b8a5cf975f257472087a9aadc59b5d744ffdef33a520e,0xe8999fb57684856d637504f1f0082b69a3f7b34dd4e7597bea376c9466813585,0x1526acfb7062090bd5fed1b3821d1691c87f6c4fb294f56b5b921f0edf0cfad6",Aug-18-2023 09:11:33 AM +UTC,,,,,,,,,,,,,,,"https://github.com/forta-network/starter-kits/issues/295,https://github.com/forta-network/starter-kits/issues/296,https://github.com/forta-network/starter-kits/issues/297,https://github.com/forta-network/starter-kits/issues/298,https://github.com/forta-network/starter-kits/issues/299",,"0xaEb62e6F27BC103702E7BC879AE98bceA56f027E,0xFAc96a321F79642015d32BBcfdA4b9d1867d49f4,0xbD60DEa86EBc79AA294AD856Ac104b34771A09B2,0xAdEfc7F878E533b479e36Af349Bd3D8cbFa08311,0x29bAbFF3eBA7B517a75109EA8fd6D1eAb4A10258,0xa430A427bd00210506589906a71B54d6C256CEdb,0x81C9A7B55A4df39A9B7B5F781ec0e53539694873,0xc4d4500326981eacD020e20A81b1c479c161c7EF,0x22ab31Cd55130435b5efBf9224b6a9d5EC36533F,0x92024C4bDa9DA602b711B9AbB610d072018eb58b,0xBd1ba78A3976cAB420A9203E6ef14D18C2B2E031,0x675d410dcf6f343219AAe8d1DDE0BFAB46f52106,0x5E454beFf7378781376Dcf5CB733FB4259E1c7E9",,,0,,,,,, +8/19/2023,20238,,Thales Market,BSC,,,,,0xca1c859a40f39b0bac46551fa5e9fb969898ae70,,,,FN,,,,0x2fd26d3a973aac49e8331d0c5783a1da1ef67920fb0983f2f8f4a818e11416e1,Aug-19-2023 10:17:05 AM +UTC,,,,,,,,,,,,,,,,,"0xe9e7CEA3DedcA5984780Bafc599bD69ADd087D56,0xCd9c0E99396627C7746b4363B880939Ac2828d3E,0x6B33b99E3D3213DF963375E6d94aBa968351f803,0x4A5A6f3a79589305786DA6d4e03D82b95942602A,0xfA891c76C3e08f5d06d9840034770397993b5DcC,0x95d93c88c1b5190fA7FA4350844e0663e5a11fF0,0xE0B31640B07E4BCFAFc190d7DDE951BA3286Dd63,0x3124A11216273018C8F37181b4505d36573D9701,0x98c98Aef57fB2Deb9A4abEC0d36d1ca801dD7a8e,0x9A10967bc67b635BC79691ce69fE29C865D49C8c,0x8Eb4eB483f0DfB0910d24351d11b4D098d82080D,0x28D2e5e76b2E99e7e6fe4F43ebf669aAC16b89Ba,0x5b7B5Bb93622A6589A3E693FA7c23690d8F7d298,0x465B66A3e33088F0666dB1836652fBcF037c7319,0x67B26Fa8da6Cac07Ec2Ab137Ef74C083c71ACde9,0xda5Bd4aBAFbE249bdC5684eAD594B0ac379687fd,0x68d0A97cC7718a93c4403C07f6CB3C7ABc239792,0x8ba51d5b8C2693ecC4c355dC778b6a0Ae775A776,0x64933Ff8BF781cb5542E0705806DD6CBc2AEac66,0xA3AB485700F1997aF105b23aB04A0c7A22Eabf69,0x3dfE6FAb38D20d189cD7d28b04f8714c289De2AE,0x2feC450fb878d7bEdd60aB02df029D5f2Db7eC52,0x4D7E825f80bDf85e913E0DD2A2D54927e9dE1594,0x72ca0765d4bE0529377d656c9645600606214610,0xc62E56E756a3D14ffF838e820F38d845a16D49dE,0x8FE726b27e89Cd484981B2D27160186920Af2d17,",,"0xfb56e9c7addb7a7be505ddd3e0c01a67cee81ffc29ac413ada19cf6ab0a83a70,0xf6836babd120ccd3a4186d7ebc9a7c7b4cb9b09a825a28bcdfb2afe162f8f4a3,0xee460760b88a4f6c999e83e6b8ff6bdbd8f604e883b35e3917cb977fabc51aeb,0xee2d459437a2e08b6c59db86b332538e3e83b176c4ceac534362ea74613c7a12,0xeb9073c8d41bd4f14698d94617045a4568dbaca3c9a932e6f07ee2c13cba5ea8,0xe7af953c267de3309e2883e83335a4ee4443f9cb20b179b1c6433a283dcfca3b,0xe655eec48df41bb4ba45357c0da6a593b63dc2f548088887e245ccc66ed8a56a,0xe33ef00622be2a3f4fad255de915bc60cf3302949261e8c939395f287468d383,0xd95745611dfb82e26e36a6ecdd804a22d1992a3fd879cc929bb8385b0410f5ed,0xd609d2cdf69f95febf6a18e2c87d8d0e8a3bc3bf7047ca91b0a1d1296db03076,0xd5d5d3c4cf0eb1396b4147320a511eea65342b8acfd561bd4d37e31bafba42f4,0xd46a6127712edc726f8ade6f758d147380520b624dfc4837bd4858c4b9c09001,0xbfd6c834e09fc532b62b4d153923a9ac8d61a52c62a8e889afb85be85bbfaae5,0xa47d905f2bac5cc72d7cad94dd730639c6735e16b48496590217d39d420dc841,0xa11749c436ff1e4c4e4d856edb093830f285c12b8b6c6c211695d00b9c4acc82,0x93c8bd08c98956199a30ed046a365ee46a436d2464cdf5bc0d41287d3f1b9d5f,0x932db505fded1cbeda9034a4f2e3fbc545ff69a9c1ea7c8e34e58f214eba38dc,0x8dc6026fe410d2355d222d1edef18546fe5f71697c48df28c91d8a6eb1e6cb86,0x8b6242b60c19e25a60e974307c6a4a128d825a025467faacace6f125384b115b,0x719ef6785069228b9867cb0b5d6019d546fbb68ce95fc18352933ee39774a208,0x7176f0dde0c901493ca5f5c2011dfd164aac78c126c24d273e9215f52a0f1f8f,0x70cff812922397e1cd04629c68ec1d59c4ed5e459b9545ccda5749318dab16ad,0x6bd6abafb0ec581c9fedbb6718e3c9b23c42de4ecedb915a6b8883b3462ddf25,0x6aafe878b6963ba47588b9121462a887cb01fbc08f88656bbbd5c8502777f0a0,0x69988af0d6b964e6186f2a0dc741a29aec1457156bdbbfad4e1f303d11f50b0a,0x58d232c6586279ed2b54357735bfc55c886419a6a0932eb3094ca42e7c85ff7f,0x4f1f28bd4066d97b84bf56975d7e5bd856d1cdcab44ea536df667133d8f7cf8c,0x4c87692a38a09483f45ae7120e113d9bd272d7f0cb6a7ac94312e52b047d658f,0x3dc146ea27e23befdda71626eb36807ecf347e47d3439fb3752d92b16dfd28c3,0x3d829c3069e755e55bf9dfde2dd19f78ba362255db09115b4fa4eb1907e4d4e9,0x2ae293ce45f9f9c81a791e9d72cb18dd7cbbf5228dd6624aee9a5c11f553fd1b,0x249cdc10b81832803b553bb2a70410423d0db6eaa8533b4eec7f621b1cdf32b7",32,,,,,, +8/19/2023,20238,,Harbor Protocol,Comdex,,,,,comdex1sma0ntw7fq3fpux8suxkm9h8y642fuqt0ujwt5,,,,,,,,0AF67BB72216064B99535986DB5889AD9E1DD8213D0A7F733142A6037CA629DB,"Aug 19th 2023, 01:05:23",,,,,,,,,,,,,,,,,"comdex17p9rzwnnfxcjp32un9ug7yhhzgtkhvl9jfksztgw5uh69wac2pgs4jg6dx,comdex1nc5tatafv6eyq7llkr2gv50ff9e22mnf70qgjlv737ktmt4eswrqdfklyz,comdex1xt4ahzz2x8hpkc0tk6ekte9x6crw4w6u0r67cyt3kz9syh24pd7s6erldv",,,0,,,,,, +8/20/2023,20238,,Terra,DNS Hijacking,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +8/19/2023,20238,,BTC20Token,Mainnet,,,,,0x6ce9fa08f139f5e48bc607845e57efe9aa34c9f6,,,,TP,FN,ATTACK-DETECTOR-2,"Fri, 18 Aug 2023 04:55:19 GMT",0xcdd93e37ba2991ce02d8ca07bf6563bf5cd5ae801cbbce3dd0babb22e30b2dbe,Aug-19-2023 01:48:11 PM +UTC,- 32 hours 43 mins,-1963,,,,,,,,No victim,,,,,N/A,,"0xE86DF1970055e9CaEe93Dae9B7D5fD71595d0e18,0x7234c91bd835a6Ed108c8e986E0663B14F9DE14e,0xDb81b8cfB2718f7289ae2365DE800ac2c787E385",,"0xf844329f5934e50f69dae2fa226f6266bed1e552faadcd5258564ab13c640bf1,0x19e9b1858d3efbe64e97bb2ff6c08a7122dbbe176963ff743257933e88286a39",2,,,,,, +8/22/2023,20238,,Snowball,Avax,,,,,0xfd637806e0d22ca8158ab8bb5826e6feda82c15f,,,,FN ,,,,0x1904c099a63b91398b52a9960a36b43aeb60e806c0d5e33d8a913d9c12f18e95,Aug-22-2023 03:00:02 AM +UTC,,,,,,,,,,,,,,,,,"0xC38f41A296A4493Ff429F1238e030924A1542e50,0xfdCcf6D49A29f435E509DFFAAFDecB0ADD93f8C0,0x294aB3200ef36200db84C4128b7f1b4eec71E38a,0x028933a66DD0cCC239a3d5c2243b2d96672f11F5,0x05faF04e3416e40Af70ecA1deEfe2E8B6feC3703,0x5df42ace37bA4AceB1f3465Aad9bbAcaA238D652,0xf7B8D9f8a82a7a6dd448398aFC5c77744Bd6cb85,0xACc69DEeF119AB5bBf14e6Aaf0536eAFB3D6e046,0x3d88b8022142ea2693ba43BA349F89256392d59b,0x2F0b4e7aC032d0708C082994Fb21Dd75DB514744,0xCEB829a0881350689dAe8CBD77D0E012cf7a6a3f,0x425A863762BBf24A986d8EaE2A367cb514591C6F,0xF2FA11Fc9247C23b3B622C41992d8555f6D01D8f,0x252B5fD3B1Cb07A2109bF36D5bDE6a247c6f4B59,0xc7D536a04ECC43269B6B95aC1ce0a06E0000D095,0x14559fb4d15Cf8DCbc35b7EDd1215d56c0468202,0x5a068C00E32D18A354755Cddb01aC65ca074Aa06,0x10A2B0cc29d36f2816cDC3F3db17a4f0f91E7313,0xee9797F49E729DdDCa58f357feBe5ba1ffaa6c1b,0x83952E7ab4aca74ca96217D6F8f7591BEaD6D64E,0x215D5eDEb6A6a3f84AE9d72962FEaCCdF815BF27,0xAd86ef5fD2eBc25bb9Db41A1FE8d0f2a322c7839,0x9675064a9b93dC4156366A4E5f1400185D751375,0x2dA2409cDf11C607375AC9A43c18faB2152b5884,0xcb42072b73FbD80a4c8005336c2ea78f770c223B,0xcb42072b73FbD80a4c8005336c2ea78f770c223B,0xbfF6149B2a1EeB145B84e897d2af5AfA3bFf6119",,,0,,,,,, +8/25/2023,20238,,STV,BSC,,,,,0x4b44B52EF15f7Aab9A0A6cFDfa8D2c5Eeeb6d8C3,,,,FN ,,,,0xf2a0c957fef493af44f55b201fbc6d82db2e4a045c5c856bfe3d8cb80fa30c12,Aug-26-2023 02:40:49 AM +UTC,,,,,,,,,,,,,,,"https://github.com/forta-network/starter-kits/issues/300,https://github.com/forta-network/starter-kits/issues/301,https://github.com/forta-network/starter-kits/issues/302,https://github.com/forta-network/starter-kits/issues/303,https://github.com/forta-network/starter-kits/issues/304,https://github.com/forta-network/starter-kits/issues/305,https://github.com/forta-network/starter-kits/issues/306",,"0x657334B4FF7bDC4143941B1F94301f37659c6281,0x2120F8F305347b6aA5E5dBB347230a8234EB3379",,,0,,,,,, +8/27/2023,20238,,Balancer,Mainnet,,,,,"0xB23711b9D92C0f1c7b211c4E2DC69791c2df38c1,0xed187f37e5ad87d5b3b2624c01de56c5862b7a9b,0x429313e53a220c4a5693cad1da26ae5045b5762f,0x64E08fa89C2bAE9F123cc8a293775f0E6CC86760,0xBC794F1ff9AD7711A9d2E69Be5b499e290B8fD3c",,,,TP,TP,ATTACK-DETECTOR-2,"Sun, 27 Aug 2023 09:35:22 GMT","0x8982a779e373a5068824c042389e37718e5d71d0b91e08e8d6972cfd2b44ad86,0x773fa597c4b58f86ee91b2c57d0d4b12014a60b939a6eb186d50ec45300bfa4a",Aug-27-2023 09:34:59 AM +UTC,23 secs,23,,,,,,,,Victim properly identifed(Balancer: Vault),,,,,,,"0x0b576c1245F479506e7C8bbc4dB4db07C1CD31F9,0xDB8d758BCb971e482B2C45f7F8a7740283A1bd3A,0x813EE7a840CE909E7Fea2117A44a90b8063bd4fd,0x5F43FBa61f63Fa6bFF101a0A0458cEA917f6B347,0x39A79EB449Fc05C92c39aA6f0e9BfaC03BE8dE5B,0xBF904F9F340745B4f0c4702c7B6Ab1e808eA6b93,0x4E11AEec21baF1660b1a46472963cB3DA7811C89,0x897888115Ada5773E02aA29F775430BFB5F34c51,0x5F5222Ffa40F2AEd6380D022184D6ea67C776eE0,0xE39B5e3B6D74016b2F6A9673D7d7493B6DF549d5,0xfeA793Aa415061C483D2390414275AD314B3F621,0xf77018c0d817dA22caDbDf504C00c0d32cE1e5C2,0x97207B095e4D5C9a6e4cfbfcd2C3358E03B90c4A,0xBA12222222228d8Ba445958a75a0704d566BF2C8,0xA331D84eC860Bf466b4CdCcFb4aC09a1B43F3aE6,0x8F42aDBbA1B16EaAE3BB5754915E0D06059aDd75,0xf5dECDB1f3d1ee384908Fbe16D2F0348AE43a9eA,0x6048A8c631Fb7e77EcA533Cf9C29784e482391e7,0x6337949cbC4825Bbd09242c811770F6F6fee9FfC,0xB848f50141F3D4255b37aC288C25C109104F2158,0x239e55F427D44C3cc793f49bFB507ebe76638a2b,0xf302f9F50958c5593770FDf4d4812309fF77414f,0xBd35248F8325DD1cB2bBf9D01E80A6bb99a792Dd,0xD3cf852898b21fc233251427c2DC93d3d604F3BB,0x5DbAd78818D4c8958EfF2d5b95b28385A22113Cd,0xC128468b7Ce63eA702C1f104D55A2566b13D3ABD,0x05277CE7D1e365d660624612d8b8b9B55bFD4518,0x2a18B396829bc29F66a1E59fAdd7a0269A6605E8,0xBC230b1a66A138cD9cFC7b352390025978dFAdde,0x866D4B65694c66fbFD15Dd6fa933D0A6b3940A36,0xfeb1A24C2752E53576133cdb718F25bC64eBDD52,0xa98Bce70c92aD2ef3288dbcd659bC0d6b62f8F13,0xce88686553686DA562CE7Cea497CE749DA109f9F,0x5ef4c5352882b10893b70DbcaA0C000965bd23c5,0xb2007B8B7E0260042517f635CFd8E6dD2Dd7f007,0x4fb47126Fa83A8734991E41B942Ac29A3266C968,0x7869296Efd0a76872fEE62A058C8fBca5c1c826C,0x67F8DF125B796B05895a6dc8Ecf944b9556ecb0B,0xC128a9954e6c874eA3d62ce62B468bA073093F25,0x2E96068b3D5B5BAE3D7515da4A1D2E52d08A2647,0x6f5a2eE11E7a772AeB5114A20d0D7c0ff61EB8A0,0x1c99324EDC771c82A0DCCB780CC7DDA0045E50e7,0x5aDDCCa35b7A0D07C74063c48700C8590E87864E,0x1311Fbc9F60359639174c1e7cC2032DbDb5Cc4d1,0xcA96C4f198d343E251b1a01F3EBA061ef3DA73C1,0xdAB2583911E872a00A851fB80dCC78a4B46BA57c,0xf1665E19bc105BE4EDD3739F88315cC699cc5b65,0xe5F96070CA00cd54795416B1a4b4c2403231c548,0xE3881627B8DeeBCCF9c23B291430a549Fc0bE5F7,0x0F3e0c4218b7b0108a3643cFe9D3ec0d4F57c54e,0x96484f2aBF5e58b15176dbF1A799627B53F13B6d,0x45bF48D996d22afc9BC150DF7FB4d13A49088602,0x9bF951848288cCD87d06FaC426150262cD3447De,0xB496FF44746A8693A060FafD984Da41B253f6790,0xc3ccacE87f6d3A81724075ADcb5ddd85a8A1bB68,0x0f08eEf2C785AA5e7539684aF04755dEC1347b7c,0x83E443EF4f9963C77bd860f94500075556668cb8,0x72D07D7DcA67b8A406aD1Ec34ce969c90bFEE768","0xfd2643ba8295d88c19747717ca443637b71aec6c2307264d930190c75fbb6316,0xf49cd20303318daf9e4a7ee45c071b0197603bc09e501a0d53a6b7bfe2acd47e,0xed1abf7b40776bd55dc210b79d84f1a000c5547b745187b51cf626f7dd97ee1d,0xddbb880a9dbaa00219e2201196dccb03c6ca15efbc9d8092433d08b0694f0e49,0xdbc40f5704de5014fc0f489307f99592f4859db76218f61a48699fbf28c05b76,0xd7b943b5d141cfd0575be5f414f30e70a012385e385838015855cc4f4a609603,0xc7a7b2e05119bec6a403584ece57c09ebca695cb40f3544b426b8640ca8a7677,0xc587128a36511c74a32e41b9c44ce0929a98e841e790923b97888148a185ba90,0xbdf876acc6410b4f58993c918053f70c544ef18326b27e419540e75045b0df06,0xbb7b89418fb47f9e4d45793005e472776a171570c9dc4ee9ebc523d5809085c2,0xb753ba1fcf36ec14fa3d2e96870b6d6bb7e49ce1ce6aae2eccda5e4f1de2b1a9,0xab01f0048bd463776470f74884a6c7e2b73f89be31bb117844864f472d837ecb,0xa68c0189242fed2c4b58fb64461e4c04acd8b252158a527c55cc53a0961b8055,0xa3126c995288a0f7ea533cd95fd7b831da0c9b7bd4e1498af72fb1e70f6c5d10,0xa276a6e57f293cdf492e55705d16a47d389ef5510cb17f8f08871932873c11b3,0x9d6e788fd7102f83038a525b4ac89db83354ec6b5f8805d3143100310453f65b,0x907dec9853ee85b1e044ba5fcdfbad18f712f0ab35fb4c917005131e9c11fd51,0x895aea9aafcefd91fca32e68a36e13b50784a8f7fe665c8066a4be999fd47a00,0x87944f90b9a69e6041006a523da89023299d278f0c921c009127eb21edf60308,0x862772b7651c0ac969896c4d7789d2b74a7b611a8a6c5e4e077f29d11768ed89,0x81f67e529a1854c23e151a0c321aa6bc6050507755119c74164ba025e8eaae97,0x78de4dfbcfdbeb7e57c0a4f52b7fba9a33282ee1e9cecbb676cf856a62666d8c,0x6bd8b21946aebe3861a90ab75e013eb6e13a7f34e1b95b83c1c20a9333123f94,0x6adfb05e1f3e85039325f55e4271396e1e444341473fec44dfa46dbeefb0e584,0x6325853b540ea9ec3170420a9deba1b7eb7e5961ccd80ebeb7f37856def8d810,0x480603d65deadae43ac0a683c59d8cdb12edbd9e56947458461075ee86b558ee,0x41a301480878f31b524b2d8758d8851ab1a21f0c96b582ef61e8bb1087628fbf,0x332690ef5f2e53ce22415afa2573d0ad96a325860ffc2657591441fd24de20ac,0x2f31d64b63fbdd93636d1b3e365744d4f284cdb38b272cf5fc9fc117ac8695bb,0x2ee7dc9f67fb0ab33de8ba3241223f992c71183ab941d9fb51f40536e11cbe76,0x11eba2a706db71a645bb6a90477e6d619184058971221489aecfa97f964bb9db,0x0ca3d96cafb096abe4a905d838beaaf178591d82f53108a8a5ad3fe0687ea0b2","0xffa70d94d3f85a88e8ec2ea7e83193c486b336a17326ced913293203bc55c07a,0xfcbf1c3d20fcfae7ebc7c963c78ca16b4454e64a8f6d8c459aab78bb45c1760e,0xf78eb236821a7f712271bb18ad9c9165f8eb84fcaa4a90d129d15e3970e75706,0xf6a2abadb3af9ee1acb00a785fabaa309a52a7383e2e5348c98df8cfb9497b50,0xef0acb2c0f5a96ffdf633507e212fa630479cdbe27e99add409f656e4b5ce6c8,0xedc6ce3d5e83bf0f84650140528bcea551fbfb68413f854d578d6096a5aa0a8b,0xe7b861572583003fbc3b26f2c9ccf23864518112c8e6544d3bd6cb044a4763ab,0xe38b9ecfe1a0620f56e6a915a24971699e16195e53aa71f89b2974d057a3b3ad,0xdceef15749cc6049c65989721767308666f05fd36aa7999c781488b292c9c25d,0xd8aa4b5ca8eb1328ed667198d9abaf5f649cca65204f1de61ca03b84b436cafa,0xd6ea735582d2e1507bd9e4ee4bee0b84045d0c272525ce8d5f14c76728a5398b,0xd4322fb53a09da17a9382bed057d7452f072d71247fbf61e79211bf1b7c94d62,0xcfa3822d890781650086088ea1b5ad325df7c839f3c8302f17a125fde52cd7e9,0xc72821154adfee753336fcd958d31ac5ea0be5d8b33a171230a9231aaa233584,0xc027b30b72f2dc98a0b4bd41a93d6b40b2e0640c4210d56bf06f18c59512857c,0xbf40169aee349d8ec15c013e27035c55d4232c5cb7a4124d489755dd863931e1,0xbd36ec0d5247329e608e1f313009c25885e48f0192669394ff9fbb9a669ea041,0xbcc77dc869a5b7b65eee39c6788151bba96561a014da53c0bfa3825c16dd35e3,0xbad27671008034f12dae38816b87525511f937018e06ee2c26f7f32df885adad,0xb67a12ee5ed65de1adff1c5346739c55f3364f86a084fb37672be1c602427aab,0xb64bda1c27aec084a275d09e6346e0c57d982277aa3a467400c7275c1cc9660b,0xb48823b74f72faac383c100f0c5e0cad28d5f7fde87e7fb384ec5bc73dd892f9,0xa9ecae191f739e4d4cd2315a3dc3f4ce33e07d35120ba8dc762633ea2afefe3b,0xa05f602fe95017a2a8d69d3974050296779b14a355e80bffe9bacd7bd3183df2,0x97361e49e69587d7812c74ff763a531a6caa655f7b551e094ba14cc499f885ea,0x930db1866c59aa4c517e8c5a5c94a6e882548c384d996bad3d761196e79e8405,0x8e6634292d171961c04e139c7973b146fcb3e505f1ed7b26b1fb6eb9ee2705f1,0x8d26f42b4a7745f53955a714362e48e44dadaf9b242d60c39d76428b23b0fc88,0x88216a0a04c7c429d85f3ad878b0928ba3a73c28707b98f9f52e534e50dd5397,0x83845400fcbcd5bf608fe70e0660f08ae37300b5f24ad8dc3b8f728d3fabccf6,0x7e6424fdd16b528c011f35d8f5cb1772484b96a653c3d98332600d736a1b314a,0x7dae529223f9106a7a90cd7fb8180dbcc8c98988d031b803b71fab608d52bb64,0x7a0a429d6272c66854be0869d9249bb852cfc965ef437802883cd02350600b9e,0x6a9c4a81f8ba2c26851d521d3d114078f38f3370f94f282ff80667ff3cf1ab35,0x694508b9cf0745c5be01156d2c36fa3eb5c24c2959b77f48b30b13b306724bea,0x61d8562893c07460d04d6ff997229a38e0d8024f3067fa916175b5ad9c09141b,0x61cb135b4520c61c366f37656907b9e978e7d15c180a76218ce2548763391e91,0x5b407842c407493e5e53370ae517d0a4f9c267fd5e189b613eded80b0caf3803,0x4d09978fe16e61c3dc48088480e895bfa918ec3c76cdc9304243e4820094438a,0x4847a4d40f9e87ea67bad33b574e1566e7266fc196c0b8fc51c6d80c068dd11d,0x44bc8b2a5a7b4a73b116602f77934241efe40edf13d50c7700ae64c5ae72eb55,0x3cf699b61c538f93e2a9d6214168dfa8a6dcbc15c993210f95c0429fef067252,0x3cbf0100cf77f1d323d0f7508e3a92e269c7ea0bafac760971308192ac46fedc,0x3c4861e1f10b767c103bb1e7d81ece9e973a0503ae62ecd8154532cc434cc6e2,0x3beeaa518b6b9a49efc7cb8217ab4a9aa4813be2b7ed59b631c820a98302e8f5,0x3b99a03a782a38ff9cebb4732cab716ff6253b30f8ca8111248c32dddba4002c,0x3afc405e272612699861650574bca15b5039acdeee8b3dd60647a1d56faf2e24,0x39683e7752f1ff893adea0fd2b725c7d415f9183080ba17c12767cfd2f7f913f,0x3958b8b59704b1ba0d70f92a8fac4cc4c1eef1dcbc2f8b2abc24d92522cd6995,0x306ef188effb7f6b14bd6c7e8d2435b0357b770617df81cead11b4414ad472dc,0x1f0e8d1147b6075e71bdc925871efff4a2677e0eddfa9acd77b83659ae75fb57,0x1bfd0936f988595b6197d640a161efdb1dfa14089b8bb54264e061f873c7b658,0x1bd7c3db78053dbf3353f8f8794b8322b44f15400dc21aa5a6706c8deeefc536,0x1bc2fc83cc5763d54ddeb846dfb499bca232d4df4fffa3019691047c5179bca5,0x16eb986d0f7bb0192d8a8331e1a86efe3bfe61269f76807acaf600acf81bc59e,0x15f31f7aeadabcf899e4af487d38ec98d463b0cb2eff0333f5b9ebc23bd5961b,0x14c6afdc06f0a55e31e0cbbd74d72310753a2160e99ba8b56127c750215916a7,0x14bb69a3d2c185bcc57db906d470adced124d5cd45d59abaa3227426f7689e5d,0x13e5b1cea3e1b6eb9e9bd1e187dd0e91591a51cf84b4045b210534ce8b7eb029,0x13405c376655abd8416d661a106038c62a84cc90bf522363c45b45dfeea2421f,0x12fd6eca0fe36b35c056845a8f3af26bb0d419ccf4da713ece4eab469df4efd0,0x12e9676cd6ef038c6a4f85c9ec6fb4c690e1adfb544860f12d4ec908c5e05331,0x0b8efc516b3eddcf7a63b4efac7e914f79be6effba1385ec93b86069ac38e02d,0x0acd48c5e0a489b7515dfac63a05acaedf74dc1c4e1535aea8eb895408eb15b5,0x07a1fc9c91935f146304e0ee73fad487f14a29e7c0f2de7a6b87c6cb57f9f9af,0x00e3b408034ff370813f25662be10ec2d734a2927937d7159656f7274a191e55",66,,,,,, +8/29/2023,20238,,BitBrowser,"Mainnet,zkSync",,,,,"0x97d773d21cdbc296de82e8a93c8dc3b2ef68eff4,0x1358ff3a2f8D7177fDc9928cC40461c3aE1a62c1,0xB9691e098A49448B45a1BDB5bE475586b1cFA82F,0x7db8a4e6bfc610c6f2825ee22543a8d0d01b396f,0x79e352e466054bf2dc51ad0a48c4936c2b5837a4,0x2630b127ca76eac69b5fff8d563de99f7ea12da5,0x1f6f4af46905e08d7fcbf79524a2447e0abae0d2,0xff182d7344e73f780148c6320bbeee4ea6c7ba3b,0xf9422ad2a94671554aa0994b82567db095da387d,0xf4febd9658fee2bae4b9f12561b19999a8e6c7e1,0xde41c293f3db619468cbad146d67099d6e802f9f,0xca962fa17f6fb2bee2ac4fed72eb2e9e5c42f5ed,0xc75a66eae9883a73d266b66fbe1999edb0bbbfe9,0xb771f775ccde3af903db797db49f64c268fb235a,0xaf8c927fcb454958060e6372987df0091fe48ac5,0xa1dfae757ff0df8e0ef5f14cf27ab2ea496b3443,0xFf182d7344e73f780148c6320bBEEe4Ea6C7ba3b,0xAcA25aaDb22EbA6E5ff23ED731ce5ed133D3E072,0x974eac2920c62c472722a6b203218476d2a24d86,0x8aa5b0786d8690ae9b6acaa3051a3b4be5569699,0x8153bc105aac75acf3d18a60f0b9ccaccffcb638,0x7f1bf3d55a27e5f365dca1e479a209eb49f976b4,0x72ab2f9962407bc0b7dca62d96951b919bdb26ee,0x6050be50433010dcf08efb4bae4fe3f13fad7bd5,0x5D8a0c4EC279e633c6ADDB2fc3f8F0e0e03baEB8,0x292b0fc339a876a69214dac18a4b6e302ae875ba,0x0915bd5503d23a66924cc8353a474dc2a35d89dd,0x920107cab36528614C299FEDA1cda2904654D505",,,,FN (out of scope),,,,,,,,,,,,,,,,,,Private Key Compromise of users keys that were stored on a bitbrowser server; so really not a protocol attack. Will exclude from recall calculation.,,,,,,,,,,,,, +9/2/2023,20239,,dAppSocial,Mainnet,,,,,0x7d9bc45a9abda926a7ce63f78759dbfa9ed72e26,,,,FN,,ATTACK-DETECTOR-2,,0xbd72bccec6dd824f8cac5d9a3a2364794c9272d7f7348d074b580e3c6e44312e,Sep-02-2023 12:58:59 PM +UTC,,,,,,,,,,,,,,,,,0x319Ec3AD98CF8b12a8BE5719FeC6E0a9bb1ad0D1,,,0,,,,,, +9/4/2023,20239,,Stake,Mainnet,,,,,"0x3130662aece32F05753D00A7B95C0444150BCd3C,0x94f1b9b64e2932f6a2db338f616844400cd58e8a,0xba36735021a9ccd7582ebc7f70164794154ff30e,0xbda83686c90314cfbaaeb18db46723d83fdf0c83,0x7d84d78bb9b6044a45fa08b7fe109f2c8648ab4e",,,,FN,,,,"0x98610e0a20b5ebb08c40e78b4d2271ae1fbd4fc3b8783b1bb7a5687918fad54e,0x4629b7622c1beba84fdbbac78432fe06707894c8ed40811b1b70815e8a7efe7a,0xd37b233487b08906d765aeb5c74f394d8544ae8b4e68e5b0a6ef7a2646597700,0xf8164a54d943386839d7ff6c85e282da4409dda69702899204b9c25e028f7e18,",Sep-04-2023 12:48:23 PM +UTC,,,,,,,,,,,,,Hot Wallet Compromise,,,,0x974CaA59e49682CdA0AD2bbe82983419A2ECC400,,,0,,,,,, +9/5/2023,20239,,FloorDAO,Mainnet,,,,,"0x4453aed57c23a50d887a42ad0cd14ff1b819c750,0x6ce5a85cff4c70591da82de5eb91c3fa38b40595",,,,FN,,,,0x1274b32d4dfacd2703ad032e8bd669a83f012dde9d27ed92e4e7da0387adafe4,Sep-05-2023 07:25:11 AM +UTC,,,,,,,,,,,,,Beta Detected. suppressed due to low anomaly score,,,,"0xf59257E961883636290411c11ec5Ae622d19455e,0x759c6De5bcA9ADE8A1a2719a31553c4B7DE02539,0xb1Cc59Fc717b8D4783D41F952725177298B5619d,0xB386c1d831eED803F5e8F274A59C91c4C22EEAc0",,,0,,,,,, +9/14/2023,20239,,Remitano,Mainnet,,,,,0x74530e81E9f4715c720b6b237f682CD0e298B66C,,,,FN,,,,0xe0725362fd774de0d8416d5e3d028063508ffa61f68087c576320e42159677a9,Sep-14-2023 12:45:47 PM +UTC,,,,,,,,,,,,,Hot Wallet Compromise,,,,0x2819c144D5946404C0516B6f817a960dB37D4929,,,0,,,,,, +9/5/2023,20239,,GMBL Computer,Arb,,,,,"0x2d6f1b2cb415d830fd47917535a9232f68acbd41,0x45f71a7382e95facec3e4fa266f476902a356334",,,,FN,,,,"0xb368c710712d0ef7151e87c4c99074efe1c0632eaa49c4d967b21e085303a714,0x9ba3374d1245d449e883d0325dea3f6d2e02e8703b7a438f0f66f7c399ec6bd7",Sep-05-2023 11:40:15 PM +UTC to Sep-05-2023 11:53:10 PM +UTC ,,,,,,,,,,,,,off-chain system manipulation,,,,"0xE9A5aF50874c0ef2748b5DB70104B5ccb5557f6d,0x70EB6E93E1f8bFB850126E23A1964Fd3DB789948",,,0,,,,,, +9/5/2023,20239,,Connext,Arb,,,,,0x44Af5FcedFb77a2d9Cb973B404e30FC27e666708,,,,FN,,,,0x519556955fb1ec904673ac357ab3e7dfea24d8fc3fad5554aada6566ac71036b,Sep-05-2023 01:01:40 PM +UTC to Sep-05-2023 01:14:10 PM +UTC,,,,,,,,,,,,,off-chain dos,,,,"0x58b9cB810A68a7f3e1E4f8Cb45D1B9B3c79705E8,0xEE9deC2712cCE65174B561151701Bf54b99C24C8,0x8c556cF37faa0eeDAC7aE665f1Bb0FbD4b2eae36,0x2983bf5c334743Aa6657AD70A55041d720d225dB,0xfDe99b3B3fbB69553D7DaE105EF34Ba4FE971190,0x2fD7E61033b3904c65AA9A9B83DCd344Fa19Ffd2,0x429b9eb01362b2799131EfCC44319689b662999D",,,0,,,,,, +9/9/2023,20239,,BFCToken,BSC,,,,,0x7cb74265e3e2d2b707122bf45aea66137c6c8891,,,,FN,,,,0x8ee76291c1b46d267431d2a528fa7f3ea7035629500bba4f87a69b88fcaf6e23,Sep-09-2023 07:16:35 PM +UTC,,,,,,,,,,,,,,,,,"0x595eac4A0CE9b7175a99094680fbe55A774B5464,0x71e1949A1180C0F945fe47C96f88b1a898760c05",,,0,,,,,, +9/7/2023,20239,,Fortress / Retool Compromise,CLOUD TOOL COMPROMISE (OUT OF SCOPE),,,,,,,,,,,,,,,,,,,,,,,,,,,hot wallet compromise on several chains,,,,,,,,,,,,, +9/11/2023,20239,,Banana Token,FLAW IN CONTRACT LOGIC(No attack),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +9/20/2023,20239,,Balancer,Mainnet,,,,,"0xf99825f51f6d922ebbf1527809e99a4b9f0a29d6,0x00006deacd9ad19db3d81f8410ea2b45ea570000,0x645710af050e26bb96e295bdfb75b4a878088d7e,0x0000626d6dc72989e3809920c67d01a7fe030000",,,,FN,DNS Hijacking (Out of scope),,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +9/23/2023,20239,,Mixin,Mainnet,,,,,"0x52e86988bd07447c596e9b0c7765f8500113104c,0xb5d631a74ad9c9efcf96d6e9e2fabcb75c67eafa,0x3b5fb9d9da3546e9ce6e5aa3cceca14c8d20041e",,,,FN,,,,,,,,,,,,,,,,,,Hot Wallet Compromise,,,,0xDdf85Df96934ABEf903aCF6B3Ebb9B4d1fa8Cb40,,,0,,,,,, +9/5/2023,20239,,Heavens Gate,Mainnet,,,,,0x6CE9fa08F139F5e48bc607845E57efE9AA34C9F6,,,,TP,TP,ATTACK-DETECTOR-2,"Tue, 05 Sep 2023 10:00:51 GMT",0xe28ca1f43036f4768776805fb50906f8172f75eba3bf1d9866bcd64361fda834,Sep-05-2023 09:57:35 AM +UTC,3 mins 16 secs,196,,,,,,,,Incorrect victim (attack contract address),,,,,,,"0x7b768470590B8A0d28fC714d0A70754d556D14eD,0xf829d7014Db17D6DCe448bE958c7e4983cdb1F77,0x738dab4AF8D21b7aafb73545D79D3B4831eE79dA,0x8EBd6c7D2B79CA4Dc5FBdEc239a8Bb0F214212b8","0xf31e05d047c2c8e72e68ef4c501298653bf3469b63fd28596bd1d4ecec4056c7,0x8c985bb9019dc04cbedf2bb7c5e74527cb0106a7cb3798a6f71aa550a95692c3,0x81b2d66ec7c3e08f3d8292fffe94e76b65098bd9a810a198a7be2b68b11d8401,0x66434b093987a673d8901130350f7d761c6cc9d47706a1bc132087f2ea7ce166","0xe14bb696da42698d3bd210be5fb645b5611451767a161c76694f445402171699,0xd836ba30ade8e837844f95aec6f28b9258874c799d2a6d410f13ff16f524e05d,0xa18d20677c75923348461c093f53cffbb77b7efeb8e7c5bac352a54b6544ff42,0x732332925f3f971b1195130401574eead83618058f4b45016b15431df9812d6e,0x6b224d0bf29bf8b6de81f9e2e5cbba20f56aafe9a14d31a34fef119d535446f1,0x32cb92797fb598d77d1a83013f950955cde5edc62410955900653d328aa71c80",6,,,,,, +9/12/2023,20239,,CoinEx,Mainnet,,,,,"0xce013682eddefaca8c94fe56a43a04212ebe4673,0x8bf8cd7F001D0584F98F53a3d82eD0bA498cC3dE,0xCC1AE485b617c59a7c577C02cd07078a2bcCE454,0x483D88278Cbc0C9105c4807d558E06782AEFf584",,,,TP,TP,ATTACK-DETECTOR-2,"Tue, 12 Sep 2023 14:16:57 GMT",0xb6a07c2c591e43abc63add833aaf4d6ab47e66f05cf6b49a9dda7c2317b2d61c ,Sep-12-2023 01:20:59 PM +UTC to Sep-12-2023 02:47:35 PM +UTC,55 mins 58 secs,3358,,,,,,,,No victim,,,Hot wallet compromise ,,,,"0x33Ddd548FE3a082d753E5fE721a26E1Ab43e3598,0x53Eb3Ea47643E87e8f25dd997A37B3b5260e7336",,,0,,,,,, +9/11/2023,20239,,0x0,Mainnet,,,,,"0xcf28E9B8aa557616BC24CC9557fFA7Fa2c013D53,0xc44ea7650b27f83a6b310a8fed9e9daf2864a65b",,,,TP,TP,ATTACK-DETECTOR-2," Mon, 11 Sep 2023 21:13:53 GMT",0x00b375f8e90fc54c1345b33c686977ebec26877e2c8cac165429927a6c9bdbec,Sep-11-2023 09:10:35 PM +UTC,3 mins 18 secs,198,,,,,,,,No victim,,,,,,,"0x3d18AD735f949fEbD59BBfcB5864ee0157607616,0x29d2bcF0d70f95cE16697e645e2B76d218d66109",0xd5996108097636e49912b9cbd66c8da8bdabde5906a98fe9e77b43fb53b3193e,,0,,,,,, +9/16/2023,20239,,uniclyNFT,Mainnet,,,,,0x92cfcb70b2591ceb1e3c6d90e21e8154e7d29832,,,,TP,TP,ATTACK-DETECTOR-2,"Thu, 14 Sep 2023 07:49:08 GMT",0xc42fe1ce2516e125a386d198703b2422aa0190b25ef6a7b0a1d3c6f5d199ffad,Sep-16-2023 02:50:35 PM +UTC,-55 hours 1 min 27 secs,-198097,,,,,,,,No victim,,,,,,,"0xd3C41c85bE295607E8EA5c58487eC5894300ee67,0xa499648fD0e80FD911972BbEb069e4c20e68bF22,0x94E0BAb2F6Ab1F19F4750E42d7349f2740513aD5,0x8696BDE5Cc30545b3b049f3529abBfB2B1e0C007,0x4A25E4DF835B605A5848d2DB450fA600d96ee818,0xA62fB0c2Fb3C7b27797dC04e1fEA06C0a2Db919a,0x9e5B1F637a03976F2c472265806AA1BCC969cA85,0xF33079d70dBb83b2886d726dBE761671f84bC889,0x8bf26A3bFfD9072cE12C7Bfd5e3b1fCE33768d2d,0xbAcC776b231c571a7e6ab7Bc2C8a099e07153377,0xE6E90bC9F3b95cdB69F48c7bFdd0edE1386b135a","0xd8c025b4ab906e84d90bf3fbade876c60b597c7df21f69b327d09952d540a264,0x9b158d1e5f3a5335d697818d6655e60df045504e4eb355f548896e3125d20a17,0x80e453b03b8b338c26350880a8a25c98febff8aef3888bfb55de943cc8c23cb1,0x04a164228c5d14f584125be6fff04474cc111788df43a1d67c382b0458f5d68d",,0,,,,,, +9/11/2023,20239,,Remilia (Milady),Mainnet,,,,, Insider Threat(Out of scope),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +9/20/2023,20239,,None Trading,Mainnet,,,,,‘critical exploit’ (Out of scope),,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, +9/24/2023,20239,,HTX (Huobi),Mainnet,,,,,"0xdb1d74467c9042517a354304256e0d658d8aec83,0x799982b75ba538f211871cba50fa1a42ada9ab5e",,,,,FN,,,0xe9eefff04322a1e9262aad139e7b03954709a7c2ffea5ba9d1026a24fb58c029,Sep-24-2023 10:00:47 AM +UTC,,,,,,,,,,,,,Hot Wallet Compromise,,,,"0x2Abc22eb9A09EbBE7b41737CCde147F586EfeB6A,0x18709E89BD403F470088aBDAcEbE86CC60dda12e",,,0,,,,,, +9/26/2023,20239,,Dice9 Victim,BSC,,,,,0x29707a50ba37274c8928ae0c6e157cfd35eb4a0c,,,,TP,TP,ATTACK-DETECTOR-2,"Tue, 26 Sep 2023 07:57:02 GMT",0x8fa1e3eaf6bae975ffd933e9a9e14edccbcc61bd02b2239179adeb5e17c013d5,Sep-26-2023 07:56:48 PM +UTC,14sec,-16935,,,,,,,,No victim ,,,,,,,0xD1CE9000dAe71a7130c193486761c324fbf94819,"0x149b95f38cfe03c078f1517dcd7007b42db76ed700b0002b02ce389c096b9a03,0x12b8ea2c0c812af8cdee057afaec8be6747da07319d17f3c87a013731ab1998c",,0,No,,,,, +10/1/2023,202310,,Fortress Loans,BSC,,,,,0x970e5a382f0f0d016b9e29fc4e9d9d611f487916,0x0d88d9dfa623e93f7f41c19051d50d1d24e20140,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Sun, 01 Oct 2023 23:24:41 GMT",0x98d4dc3438574dd92f7c06aa96975e9ecf68ebcbbf1f1113e9c14d2a8b8c4e7f,Oct-02-2023 01:46:35 AM +UTC,-2 hours 22 mins,"-8,520",,,,,,,,No victim ,,,Governance attack. Malicious proposal was mitigated,,,,"0x3ef88D7FDe18Fe966474FE3878b802F678b029bC,0x554530ecDE5A4Ba780682F479BC9F64F4bBFf3a1,0x8BB0d002bAc7F1845cB2F14fe3D6Aae1D1601e29,0x47BAA29244c342f1e6cDe11C968632E7403aE258,0x5F3EF8B418a8cd7E3950123D980810A0A1865981,0xE75b16cc66F8820Fb97f52f0C25F41982ba4daF3,0xa7FB72808de4FFcaCf9a815Bd1CcbE70F03b54ca,0x4C0933453359733b4867DfF1145A9a0749931A00,0x5F30fDDdCf14a0997a52fdb7D7F23b93F0f21998,0x8fc4f7A57BB19E701108b17d785a28118604a3D1,0x8ed1f4c1326E5d3C1b6E99Ac9E5EC6651E11e3Da,0x854c266b06445794fa543b1d8f6137c35924c9eb,0xe79ecdb7fedd413e697f083982bac29e93d86b2e,0x4437743ac02957068995c48e08465e0ee1769fbe,0xff6296fd1cf18fdfca02824801ebe1481b974391,0x073c0ac03e7c839c718a65e0c4d0724cc0bd2b5f","0x7b3996b7e4906bfea54be13686d5614cab34465763dad3fb6d1866f759578569,0x1a691f24f689c5f8bcbdce04b5e66a233557be1d341570f75892b067a6ad93bd",,0,,,,,, +10/3/2023,202310,,BigWhale,BSC,,,,,0xe6964ba0483b24ca142515345d2dc58820992d7c,Nil,,FALSE,FN,FN,,,0x21c87c4185cdd96ba0ca13fd29e4d641f3dac8e72124919dd55926c7d2c3bcdc,Oct-03-2023 05:02:53 AM +UTC,,,,,,,,,,,,,Private key leak,,,,0x30054BB89EDD62F9A57E6d7F02bdff25Db30751e,,,0,,,,,, +10/7/2023,202310,,Stars Arena,Avax,,,,,0xa2ebf3fcd757e9be1e58b643b6b5077d11b4ad7a,0x7f283edc5ec7163de234e6a97fdfb16ff2d2c7ac,,TRUE,FN,FN,,,0x4f37ffecdad598f53b8d5a2d9df98e3c00fbda4328585eb9947a412b5fe17ac5,Oct-07-2023 05:23:35 AM +UTC,,,,,,,,,,,,,,,,,"0xa481b139a1a654ca19d2074f174f17d7534e8cec,0x8af92c23a169b58c2e5ac656d8d8a23fc725080f",,,0,,,,,, +10/5/2023,202310,,BuildFinance,Mainnet,,,,,0x52e38d496f8d712394d5ed55e4d4cdd21f1957de,0xc3e13c070076bcb66e94422ae9acd83761c92960,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Tue, 03 Oct 2023 19:51:21 GMT",0xc89adad6860d5fdb58b357432e3b113e2ecf2c50f53ae18edcc70d3c7119e525,2023-10-05 21:07:47 (UTC),-2 days 1 hour 16 min 26 secs,"-177,386",,,,,,,,No victim,,,Governance attack,,,,0x3157439C84260541003001129c42FB6aBa57E758,"0xca2388fac5c2e9b5c83ab452001994818b1242ac031f6089643f84bdc335af3b,0x503eb2e6b5caa9e373ddad469871f0c6e6396348a1f19c3bca051f45a793d8c1",,0,,,,,, +10/11/2023,202310,,BlackHole,BSC,,,,,0xfdbfceea1de360364084a6f37c9cdb7aaea63464,"0x165FbB5cB2b0EDaF0349ced9b6753516557bF654,0xAda60b4f49b577Dc7f7Bb81D4f50EF0739C2293a,0x216CcfD4fB3f2267677598f96Ef1Ff151576480C",,FALSE,TP,TP,ATTACK-DETECTOR-2,"Wed, 11 Oct 2023 12:15:09 GMT",0xc11e4020c0830bcf84bfa197696d7bfad9ff503166337cb92ea3fade04007662,Oct-11-2023 02:14:33 PM +UTC,- 120min,-7200,,,,,,,,No victim,,,,,,,"0xcc61cc9f2632314c9d452aca79104ddf680952b5,0x2371E4Ad771020CE3D8252f1db3e5559FbA8eeb5","0xb513c23c6130a3868e871ddad84a8869cf15e5ab9298e27868e567d453c52814,0x4a6b37b6d5e51bcf7eaff5bcda4d0153570bbd1d218a9d6498d11a96a9e7578a,0x20d2f4194d583d4481797930fe3868b640e23aba4693dafd4beeceb8aa84d8a4",0xaad5438503c37648e1f2080b8452ecc24ba672ac843342f7d24c4590c91d4724,1,,,,,, +10/12/2023,202310,,Platypus Finance,Avax,,,,,"0x0cD4fD0EECD2c5Ad24DE7f17Ae35f9db6aC51Ee7,0x464073F659591507d9255B833D163ef1Af5ccc2C","0x4cfb527f51b391ecb1a5197edc7a38160c261b6f,0x86d6337C5B970705AB49D07c12b850a748603233,0x4425f757715e23d392cda666bc0492d9e5d5848ff89851a1821eab5ed12bb867",,TRUE,FN,FN,,,"0xab5f6242fb073af1bb3cd6e891bc93d247e748a69e599a3744ff070447acb20f,0x4425f757715e23d392cda666bc0492d9e5d5848ff89851a1821eab5ed12bb867",Oct-12-2023 03:29:49 AM +UTC to Oct-12-2023 06:17:09 AM +UTC,,,,,,,,,,,,,,,,,"0xbe52548488992Cc76fFA1B42f3A58F646864df45,0x66357dCaCe80431aee0A7507e2E361B7e2402370,0xe0D166DE15665bC4B7185B2e35E847E51316E126,0x39dE4e02F76Dbd4352Ec2c926D8d64Db8aBdf5b2,0xB8E567fc23c39C94a1f6359509D7b43D1Fbed824,0x30C30d826be87Cd0A4b90855C2F38f7FcfE4eaA7,0x4658EA7e9960D6158a261104aAA160cC953bb6ba,0xC828D995C686AaBA78A4aC89dfc8eC0Ff4C5be83,0x81E63d0EEBA2D85609A6b206737e98e39B888F4C,0x8B4A45da5B0705Ae4f47EBeFC180C099345cF57e,0xDeD29DF6b2193B885F45B5F5027ed405291A96C1,0xb3393f4e609c504da770ebc968540784cc4e016c,0x27912AE6Ba9a54219d8287C3540A8969FF35500B,0x91BB10D68C72d64a7cE10482b453153eEa03322C,0x233Ba46B01d2FbF1A31bDBc500702E286d6de218,0x89E9EFD9614621309aDA948a761D364F0236eDEA,0x73256EC7575D999C360c1EeC118ECbEFd8DA7D12,0x22d4002028f537599be9f666d1c4fa138522f9c8,0x5857019c749147EEE22b1Fe63500F237F3c1B692,0xdaCDe03d7Ab4D81fEDdc3a20fAA89aBAc9072CE2,0xB0523f9F473812FB195Ee49BC7d2ab9873a98044,0x68c5f4374228BEEdFa078e77b5ed93C28a2f713E,0xfF6934aAC9C94E1C39358D4fDCF70aeca77D0AB0,0x7125B4211357d7C3a90F796c956c12c681146EbB,0x2Cd5012b5f7cc09bfE0De6C44df32a92D2431232,0x061da45081ACE6ce1622b9787b68aa7033621438,0x1f6B6b505D199B9bd0a6642B8d44533a811598da,0x0d26d103c91f63052fbca88aaf01d5304ae40015,0x909b0ce4fac1a0dca78f8ca7430bbafeeca12871,0xc1daa16e6979c2d1229cb1fd0823491ea44555be,0xAEf735B1E7EcfAf8209ea46610585817Dc0a2E16,0x776628A5C37335608DD2a9538807b9bba3869E14,0xa16bbab03B61810BA8633343D9FfC04B086506B5,0xDEA7bf752Ef25301DbB2e9288338A1a9013EC194,0x6a1340A262BaE9b076a9f8862eBfabea25039e4e,0x2E19709471FB25078dB982DD6b94A8Cb2C29E2Aa,0x06f01502327De1c37076Bea4689a7e44279155e9,0x836648A8cE166Ba7CaFb27F0E6AD21d5C91b7774,0x209a0399A2905900C0d1a9a382fe23e37024dC84,0xc09c12093b037866Bf68C9474EcDb5113160fBcE,0xc7388D98Fa86B6639d71A0A6d410D5cDfc63A1d0,0xFC95481F79eC965A535Ed8cef4630e1dd308d319,0x6FD4b4c38ED80727EcD0d58505565F9e422c965f,0x035D7D7F209B5d18e2AB5C2072E85B32e1D43760,0xF01cEA00598d87Cb9792a01B040d04b0bd8Ca781,0x4E5704991b43C1D33b9Ccd1BC33B211bf068385A,0xC73eeD4494382093C6a7C284426A9a00f6C79939,0xA2A7EE49750Ff12bb60b407da2531dB3c50A1789,0x7716307350c0819eD05C3e7f6c478b27CAED5361,0x4b851118a4A4948799f24d0CBE17FA3dad09e2D5,0x2aD5fC90F95f236F5276E795A5A46381bFE5aa92,0x12141b8FD20b4bBdd5F4e911bF91575258A3eABD,0xad589CFB73922700Dc46cA39CDF83B9618ac91E0,0x542dd5F38fcb3AAb28d6418CF3e1d36329A79aC7,0xa63e0c77D92d9Ee15bBeB0c219D80748605b2Cf6,0x2CC7492Aa8846c834364d2039707c583d4077BCb,0xE08947eE864Af325D9F98743B3b905875Ae0Ec99,0x551C259Bf4D88edFdAbb04179342a73dAa759583,0x027A24Fa0168DA4fC7AF9Bf5331D42692889AFaa,0x979702f708dd794A0e5E616E89C1656a2C55d681,0x551C259Bf4D88edFdAbb04179342a73dAa759583,0x4f734D89531b6c9A1242C196297316E928AEeFBa,0xd78d5f6A5bF62a88212203077D1A28F812307145,0x2DebC993c5f9Cac766Efa3EdCb1b6e40aDb4F6E2,0x6689C9Eb9a8A0Dd8BbD0935Ce0cD7FeD72E8667E",,,0,,,,,, +10/13/2023,202310,,Beluga,Arb,,,,,0x4843E00Ef4c9f9f6e6aE8d7b0A787f1C60050b01,0x9e8675365366559053f964be5838d5fca008722c,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Fri, 13 Oct 2023 01:49:17 GMT",0x57c96e320a3b885fabd95dd476d43c0d0fb10500d940d9594d4a458471a87abe,Oct-13-2023 01:49:05 AM +UTC to Oct-13-2023 02:30:30 AM +UTC,12 secs to 41 minutes 13 secs,12 secs to 2473 secs,,,,,,,,No victim,,,,,,,"0x48945A091108bBbd54829B632B1dF94BB50F81D7,0x09090e22118b375f2c7b95420c04414E4bf68e1A,0x7fbdEb84D5966c1C325D8CB2E01593D74c9A41Cd,0x7CC32EE9567b48182E5424a2A782b2aa6cD0B37b,0xCFf307451E52B7385A7538f4cF4A861C7a60192B,0x6f864C139ef400790dC14f9aB6393F752b6C9FEd,0xff1a0f4744e8582DF1aE09D5611b887B6a12925C,0x7668bcBf650AE69297E411d2A8Ec91e07dd91c0B,0x6CD36fA3c7e784B86203DB110E30092564d40DE2,0x91d81E235150394d4203885D2D52A86262Ef41b8,0x20711d8dea21f86Ef96bcc39e86eAbd823C345F1,0x6621E58c692239874515a54Cc1D374a4101e884C,0x15A024061c151045ba483e9243291Dee6Ee5fD8A",0xbf73cdd8d27ddb1e30678ccefc22ebfa8099b368b806f467355a03803d9ea3d7,"0xaad5d42b451c0338376589208da8b77aa17ddc135403a3a2388079296296a18c,0x92f819b7320d85d331a680e95fb692d544aaeaf0b1e6f75cefd3f6fc369066ba,0x7b315010106c52bffa55dcaed2168db3a9d1529b4c9ca5f9cba25ee525e60839",3,,,,,, +10/13/2023,202310,,Wise Lending,Mainnet,,,,,0xe938d598fda06bf7eda5d25a15835ece97fd841e,0x035B62B1bd268B29E65d8adc51400ce22D71aC38,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Fri, 13 Oct 2023 14:40:39 GMT",0x10620efb40ec9c495fafe79c56891906debd62fa4d7a5baacdefe351c663a2f2,Oct-13-2023 02:39:35 PM +UTC,64 sec,64,,,,,,,,,,,The tx was front run by a whitehat. https://etherscan.io/tx/0x7ac4a98599596adbf12fffa2bd23e2a2d2ac7e8989b6ea043fcc412a29126555,,,,"0x66a0f676479Cee1d7373f3DC2e2952778BfF5bd6,0xfEf0d2f3A79b4338d8418003Dd9df89281242063,0xB4d2484EF7f91c8D4cd019460Ccbc384C1C24297,0x3f302D860b27FB06C794eE0916abC1D3A362Bf7e,0xeF897aE2477776131ef57AACAe2Cd10B574886Fa,0x84524bAa1951247b3A2617A843e6eCe915Bb9674,0x9D6d4e2AfAB382ae9B52807a4B36A8d2Afc78b07","0xb0c778c322ca443b618dc59d887497c38942fa2c1b790efc4a14bb32af6574a5,0x021f92f4f162d3bb21dfc5df302e74497b9d11fa37564fde2e3b8ef749f90cf8","0xa4d973b9f7fdba85a74c9545580fd57da3551e9664997e49aaf926fed6e16b2d,0x37c518e1aacdf08911e5ab57a4f41930f9a24176d7b3d610ad9cc119da70c710",2,,,,,, +10/18/2023,202310,,Hope Lending,Mainnet,,,,,0x1f23eb80f0c16758e4a55d48097c343bd20be56f,0x16AE74E51CC134FcB374Be1F59fD7ABc41816B96,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Wed, 18 Oct 2023 11:48:51 GMT",0xa414de03bbf7baccea6b5c95af9ebfbed43b1c3151debd29673df979a0f4b0b0,Oct-18-2023 11:48:59 AM +UTC,-8 sec,8,,,,,,,,No victim,,,The exploit tx was frontrun. https://etherscan.io//tx/0x1a7ee0a7efc70ed7429edef069a1dd001fbff378748d91f17ab1876dc6d10392,,,,"0xCeE234eEd85EaC4FE9f040fBEAc5Df10eaf71318,0x53FbcADa1201A465740F2d64eCdF6FAC425f9030,0x3a6D9BF8286a4aDa77c15EcF82D4c0C0AF95BE74,0x4173D500767f712042c0bf2A6395d5e33254a875,0xE94a20EF25d067743B9D965A8d46C1c035489b7d,0x71A0289684A6009F2d07636cacfc103e9f514385,0x17b5896703b36879A037Aa94F08622ab113C0AD4,0x4De8cb2b7997989e0dF45eE50535F03C2aD6F3b4,0xfA4200267993a1975A210E9311A1361cbf802fE2,0x3B6777F82ff45932A57986002f90eCdE94A00232,0x231118439630f93F8A12A2FaA66e95DB138D9B21,0x0E8b2b2014bED8724FE984644531c1d57032BdB2,0x9A665c32b9Bf70d6de23596F6e22093F82F4Cda6,0xf2458630b18C2B8A9429D82D5E25F6119ECC06E6,0xc353Bf07405304AeaB75F4C2Fac7E88D6A68f98e,0xf5c6d9fc73991f687f158fe30d4a77691a9fd4d8,0x25126f207db7dc427415ea640ce0187767403907,0xf5c6d9fc73991f687f158fe30d4a77691a9fd4d8,",0x2ef81a422a135c94573f3196052e1099a4869876cd6cc296842711a1eb1bb789,0x0ded755e24ffbdb5d0b988c671f3021cb4f931dc831ee48a9b80088b1bb53ef2,1,,,,,, +10/18/2023,202310,,MicDAO,BSC,,,,,0xcd03ed98868a6cd78096f116a4b56a5f2c67757d,,,FALSE,FN,FN,,,0x24a2fbb27d433d91372525954f0d7d1af7509547b9ada29cc6c078e732c6d075,Oct-18-2023 01:09:24 PM +UTC,,,,,,,,,,,,,,,,,"0xf6876f6AB2637774804b85aECC17b434a2B57168,0x928902c2499bd6D123F455b1de93F1A139Ef9B00",,,0,,,,,, +10/24/2023,202310,,MaestroBots ,Mainnet,,,,,0xce6397e53c13ff2903ffe8735e478d31e648a2c6,0xe6c6e86e04de96c4e3a29ad480c94e7a471969ab,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Tue, 24 Oct 2023 22:59:14 GMT",0xc087fbd68b9349b71838982e789e204454bfd00eebf9c8e101574376eb990d92,Oct-24-2023 10:53:47 PM +UTC to Oct-24-2023 11:30:59 PM +UTC,5min 27sec,327,,,,,,,,No victim,,,,,,,0x80a64c6D7f12C47B7c66c5B4E20E72bc1FCd5d9e,0x2c1b629e0deb19aede03a6fb1d3c62d484b400dff7cf5d2c4b96155ce491aafe,"0x5c96eda21c9c21dab8c7de54daa2687e222b1e618d3e4899d3946ac417858bb1,0x215f8ccff32892ca9df175e4fa5ef9520c4d4330f02200b9a305bf24fc7659b9",2,,,,,, +10/28/2023,202310,,Astrid Finance,Mainnet,,,,,0x792ec27874e1f614e757a1ae49d00ef5b2c73959,0xb2e855411f67378c08f47401eacff37461e16188,,TRUE,TP,TP,ATTACK-DETECTOR-2,"Sat, 28 Oct 2023 10:41:49 GMT",0x8af9b5fb3e2e3df8659ffb2e0f0c1f4c90d5a80f4f6fccef143b823ce673fb60,Oct-28-2023 10:41:35 AM +UTC,14sec,14,,,,,,,,,,,,,,,0xbaa87546cf87b5de1b0b52353a86792d40b8ba70,"0xb223d8c18c78c732d478f1e0dec581b78048a47de16cea6aea5a1d7c56f187cc,0x1c40dfc1c956b88f214882a6053519152aba05a415b245532df15f83e2ad3039",,0,,,,,, +10/31/2023,202310,,Unibot,Mainnet,,,,,0x413e4fb75c300b92fec12d7c44e4c0b4faab4d04,0x2b326A17B5Ef826Fa4e17D3836364ae1F0231a6f,,FALSE,FN (Beta Detected),FN,,,0xcbe521aea28911fe9983030748028e12541e347b8b6b974d026fa5065c22f0cf,Oct-31-2023 04:43:59 AM +UTC,,,,,,,,,,,,,,,,,"0x126c9FbaB3A2FCA24eDfd17322E71a5e36E91865,0xf819d9cb1c2a819fd991781a822de3ca8607c3c9",,0x2d32954c27058cfb00888899651658c46451f46727a8ffe0fc7b6a70b5c0a0f7,1,,,,,, +11/1/2023,202311,44,Onyx Protocol,Mainnet,,,,,0x085bDfF2C522e8637D4154039Db8746bb8642BfF,0x526e8E98356194b64EaE4C2d443cC8AAD367336f,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Wed, 01 Nov 2023 09:59:06 GMT",0xf7c21600452939a81b599017ee24ee0dfd92aaaccd0a55d02819a7658a6ef635,Nov-01-2023 09:58:47 AM +UTC,19 secs,19,FALSE,,ATTACK-DETECTOR-,"Wed, 01 Nov 2023 09:59:20 GMT",34,-14,,No victim,,,,,,,"0x714bD93aB6ab2F0bcfD2aEaf46A46719991d0d79,0x1961AD247B47F4f2242E55a0E5578C6cf01F8D12,0x830DAcD5D0a62afa92c9Bc6878461e9cD317B085,0x8f35113cFAba700Ed7a907D92B114B44421e412A,0xFEe4428b7f403499C50a6DA947916b71D33142dC,0x1933f1183C421d44d531Ed40A5D2445F6a91646d,0xbCed4e924f28f43a24ceEDec69eE21ed4D04D2DD,0x7497E945F23192d1dc3095409837F67927170F2D,0x307269CF921213bd2e16B22DcD4401aEC21D00bF,0xC0534bB221C0963B213F417585E3ca581993793a,0xf52459E8BC708d55400c167E0d77ED49641226D3,0x11B258A1c5Ec962F43AB523Be9b8fA317CB2Eb69,0x4476175752A4947DE953e26B40Fc8c1E145FEA82,0x0C19D213e9f2A5cbAA4eC6E8eAC55a22276b0641,0x3F2dD7adBCD464D5b0a766F7EB367bd20A249691,0x7aB16ed27ab8b22cb625db55C0e58521969cb091,0xA2cd3D43c775978A96BdBf12d733D5A1ED94fb18,0x7D61ed92a6778f5ABf5c94085739f1EDAbec2800,0x08eDF0F2AF8672029eb445742B3b4072c6158DF3,0xdec2F31C3984F3440540DC78Ef21b1369d4eF767",0xb6bf6d79a547c1a3695c872504b552cc7b520a397442d30a95549012058ae324,,0,,,,,, +11/7/2023,202311,45,MEV Bot 0x05f0,Mainnet,,,,,0x46d9b3dfbc163465ca9e306487cba60bc438f5a2,0xeaDF72Fd4733665854C76926F4473389FF1B78B1,,FALSE,FN (Beta Detected),FN,,,0xbc08860cd0a08289c41033bdc84b2bb2b0c54a51ceae59620ed9904384287a38,Nov-07-2023 11:24:23 PM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Tue, 07 Nov 2023 23:24:31 GMT",8,not detected on prod,,No victim,,,,,,,0x05f016765c6C601fd05a10dBa1AbE21a04F924A5,,,0,,,,,, +11/7/2023,202311,45,TheStandard,Arb,,,,,0x09ed480feaf4cbc363481717e04e2c394ab326b4,0xb589d4a36ef8766d44c9785131413a049d51dbc0,,FALSE,FN (Beta-alt Detected),FN,,,0x51293c1155a1d33d8fc9389721362044c3a67e0ac732b3a6ec7661d47b03df9f,Nov-06-2023 09:31:32 PM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Mon, 06 Nov 2023 21:27:48 GMT",224,not detected on prod,,No victim,,,,,,,0x2E9f9Cc46679DBb5D94a1397Bd922cA5F6dA99Cd,,,0,,,,,, +11/7/2023,202311,45,TrustPad,BSC,,,,,0x1a7b15354e2f6564fcf6960c79542de251ce0dc9,0x1694d7fAbf3B28f11D65DEEb9f60810DAa26909a,,FALSE,FN,FN,,,0x99ebe39bfeac8f4a46f5b617fbf220a664a394260d21c99ee65f4322eb126166,Nov-06-2023 04:31:32 PM +UTC,,,FALSE,,,,,,,,,,AD-6 alert by beta. FP mitigated by token impersonation bot.,Logic failed,https://github.com/forta-network/starter-kits/issues/477,,"0x129F4ac88b0446f9B46B176c93531e6cF4687657,0xadcfc6bf853a0a8ad7f9ff4244140d10cf01363c,0xE613c058701C768E0d04D1bf8e6a6dc1a0C6d48A",,0x24579a7fbfecc61c3e8120bfbef07bb9a0007c7e4c6718faa93d5148e31d51d2,0,,,,,, +11/7/2023,202311,45,Stakestone,Mainnet,,,,,0x9abe851bcc4fd1986c3d1ef8978fad86a26a0c57,0x9C52c485EdD3D22847A1614B8988Fbf520b33047,,FALSE,FN (Beta-alt Detected),FN,,,0xbf5b2d22fa88965ddfc6e6d685fc7cfc683340c49e126386759ed9e4027b1415,Nov-07-2023 11:43:47 PM +UTC,,,FALSE,,ATTACK-DETECTOR-7," Tue, 07 Nov 2023 23:55:40 GMT",720,not detected on prod,,No victim,,,,,,,"0xEc306E46549A7E8f4fCE823D3058f2D134133B17,0x7122985656e38BDC0302Db86685bb972b145bD3C,0x93F4d0ab6a8B4271f4a28Db399b5E30612D21116,0x2Fde62942759d7C0aaf25952Da4098423bC1264C,0xA62F9C5af106FeEE069F38dE51098D9d81B90572,0x3aa0670E24Cb122e1d5307Ed74b0c44d619aFF9b,0x396aBF9fF46E21694F4eF01ca77C6d7893A017B2,0x9485711f11B17f73f2CCc8561bcae05BDc7E9ad9,0x8f5420e76eEC29027800D4e3e8E879617bdE709b,0x129e49c0399E3C932D34c3b76A598214b5B82cf9",,,0,,,,,, +11/8/2023,202311,45,Mirage Finance,Mainnet,,,,,0x4843E00Ef4c9f9f6e6aE8d7b0A787f1C60050b01,0x564677E09B0Ab80FEeD1EE6B02c44ade3EE92DDB,,FALSE,TP,TP,ATTACK-DETECTOR-2," Wed, 08 Nov 2023 04:07:37 GMT",0xb3456a338d7b3e7936a4d08b34e265818c116b7871baef8df1492a35f9f3b1bc,Nov-08-2023 04:07:23 AM +UTC,14 secs,14,FALSE,,ATTACK-DETECTOR-2,"Wed, 08 Nov 2023 04:07:31 GMT",8,6,,No victim,,,,,,,"0x0d99F24E96c42432a758124496F4ce9C67f6aA7b,0x8073A55Ee02A1c832E8629980A1AC3f7E41C07BF",0x02a31e29bde829fe166fbba3484148a7d5b3c816135d3f063997183acfd9eeb3,,0,,,,,OKX,TRUE +11/10/2023,202311,45,RAFT,Mainnet,,,,,0xc1f2b71A502B551a65Eee9C96318aFdD5fd439fA,0x0A3340129816a86b62b7eafD61427f743c315ef8,,FALSE,TP,TP,ATTACK-DETECTOR-2," Sat, 11 Nov 2023 01:06:04 GMT",0xfeedbf51b4e2338e38171f6e19501327294ab1907ab44cfd2d7e7336c975ace7,Nov-10-2023 06:59:23 PM +UTC,6 hours 6 mins 41 secs,22000 secs,TRUE,,,,,,,No victim,,,Beta and Beta-alt detected it very early (before exploit). network issues maybe ,,,,"0x6C6492779Dcdd070F7a5C3D246af4794eA102F59,0x4C5Cb5D87709387f8821709f7a6664f00DcF0C93,0x183015a9bA6fF60230fdEaDc3F43b3D788b13e21,0x508d93785d4CE31a0F6Ff257Df53C9a6C3b79f39,0x7beBe1D451291099D8e05fA2676412c09C96dFbC",0xfa6ca76da0998b0cde1398fcd1ac8fc71b4794368a29d88054bff38fefa5f5be,"0xf7d051d1112f04f984a0fb75437e1c72dc3267ff7fd5e23a427b002deac1b158,0xeca8232ae67d3aa6dbf9da96cd2fdd6d978e8a7d50fcb801825a79837e11a6a7,0xdc44dde5fd8411dbcf3dd41d76e3f16a35d9c1dc4faaff91ed9a467640e0fc74,0x9599439944e82989fb482854cdb67d6afa6499cdddc2b8f2df0a6253765ef7e4,0x6a2245b0080b8eb25bda673a2f587cd4215355cf77dec92efcd086d0b30d7ce9,0x2f33b891d6c979e3322120251614275e5da5420d82c0430e5a3e8c3bf655d597",6,,,,,Tornado Cash,TRUE +11/11/2023,202311,45,FreeCash,BSC,,,,,0xDFa0E64dA6924bFC3889a556ce33B42816DC681d,0x1Fa5Feaa100452380c0865838d28584c10AFF13E,,FALSE,FN (Beta-alt Detected),FN,,,0x5a27afceeb5e75f894d3b18c82e18e93cab9be9c813f6b4e6e673e40b3df9741,Nov-11-2023 06:52:30 PM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Sat, 11 Nov 2023 18:47:20 GMT",-5 mins,not detected on prod,,No victim,,,,,,,"0xC16F8c0Dee8E8230f3a3C8a5235cC14939af3dd6,0x614C38cDb1A9FBa2D4d6B6BBD0299Cb1126eD960",,,0,,,,,TC,TRUE +11/16/2023,202311,46,Shiba Inu,BSC,,,,,0xb9bdc2537c6f4b587a5c81a67e7e3a4e6ddda189,0xDA148143379AE54e06d2429a5C80b19D4a9D6734,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Thu, 16 Nov 2023 00:57:58 GMT",0x75a26224da9faf37c2b3a4a634a096af7fec561f631a02c93e11e4a19d159477,Nov-16-2023 12:41:34 AM +UTC,16 mins 24 secs,984,FALSE,,ATTACK-DETECTOR-2,"Wed, 15 Nov 2023 21:51:17 GMT",-3 hours and 10 mins,11606,,No victim,,,,,,,"0xA4227de36398851aEBf4A2506008D0Aab2dd0E71,0x13B1F2E227cA6f8e08aC80368fd637f5084F10a5,0xa19D2674A8E2709a92e04403F721d8448f802e1f","0xbcc5ddea88ad3a1422b7df41d26e351ef1c0f38dac0afd2236a1c3cc72634786,0x7d793e5c2bc3a3569859922ef032e1f53820ad72e90819d07821b2fe1849319c",,0,,,,,Tornado Cash,TRUE +11/16/2023,202311,46,LinkDAO,BSC,,,,,0xdF6B0200B4e1Bc4a310F33DF95a9087cC2C79038,0x721a66c7767103e7dcacf8440e8dd074edff40a8,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Wed, 15 Nov 2023 23:44:43 GMT",0x4ed59e3013215c272536775a966f4365112997a6eec534d38325be014f2e15ee,Nov-15-2023 11:44:25 PM +UTC,18 secs,18,FALSE,,ATTACK-DETECTOR-2,"Wed, 15 Nov 2023 23:44:02 GMT",-23,41,,No victim,,,,,,,"0x6524a5fd3fec179db3b3c1d21f700da7abe6b0de,0xaf027427dc6d31a3e7e162a710a5fe27e63e275f,0x717d0a192f4c5f9bc8a2d45b01d696dab2bd1b7a",0xae9cf51addff52d534d73cf29db2f475a8f7af1cc56ed20e09a660c1f3a0fc92,,0,,,,,Tornado Cash,FALSE +11/18/2023,202311,46,Multichain,Avax,,,,,0x1D7E1Aa3D3057566D436EBBa9225C01f9A60a00d,0x84e736C55bc4E4a4994AA1acd2319288a8badc45,,FALSE,FN,FN,,,0x4f526ec20d9501c1b5137b73a704df0808f2c89bf25876d895aba14737b2ce00,Nov-18-2023 11:31:36 AM +UTC,,,FALSE,,,,,,,,,,"I see a suspicious contract creation also a explotation alert large profit, I guess the AD should have triggered with these two.",Logic failed,https://github.com/forta-network/starter-kits/issues/473,,"0x8186359af5f57fbb40c6b14a588d2a59c0c29880,0x6B25532e1060CE10cc3B0A99e5683b91BFDe6982,0x8efd012977DD5C97E959b9e48c04eE5fcd604374,0xeaf8190fd5042ec3144184241fd405bb1dec59e8,0x05f024c6f5a94990d32191d6f36211e3ee33504e",,,0,,,,,Unkown,FALSE +11/22/2023,202311,47,KyberSwap,Mainnet,,,,,0x50275e0b7261559ce1644014d4b78d4aa63be836,0xaF2Acf3D4ab78e4c702256D214a3189A874CDC13,,FALSE,FN,FN,,,0x09a3a12d58b0bb80e33e3fb8e282728551dc430c65d1e520fe0009ec519d75e8,Nov-22-2023 10:58:23 PM +UTC,,,FALSE,,,,,,,,,,Beta Detected. Suppressed due to low anomaly score,Logic failed,https://github.com/forta-network/starter-kits/issues/471,,"0xC7a590291e07B9fe9E64b86c58fD8fC764308C4A,0xe222fBE074A436145b255442D919E4E3A6c6a480,0xD8ac7f696Ae99CD7B689726Cf03c5711Dd8DcDb4,0x049BeffDB026D6D1D64cFc8fE29Bd12142967B09,0x58f1d0F9bFf9D695010C92FB93d100CeF5113f3E,0x98565FcAD2080C5c19C3136fa367cE371cD40bD6,0xF9c2b5746c946EF883ab2660BbbB1f10A5bdeAb4,0x4d47fd5a29904Dae0Ef51b1c450C9750F15D7856,0x8Fd8Cb948965d9305999D767A02bf79833EADbB3,0x7D5ba536ab244aAA1EA42aB88428847F25E3E676,0x35BE3F4fd8239A35a7F120756D4D69e5C5e10870,0xFBC887823dd414eDF76c5dA88FFCd9eEF2Ba87cC,0x93fC0aCf77EdD68E611f8A776C9995F350f84274,0xFd7B111AA83b9b6F547E617C7601EfD997F64703,0x36240069ff26cEcbdE04D9e49a2af8d39146263E,0x35E6f409565A98500001783EA090e6f669744C83",,"0xdc44dde5fd8411dbcf3dd41d76e3f16a35d9c1dc4faaff91ed9a467640e0fc74,0x386881bd7239270e84b0858d607722d19b4410c204a723f9b206da6e1b48caea,0x1f83ea159f6edf60ef55bda6d0c3f526dad8ce4600c69ada340150ee8bd13e84",3,,,,,TC,FALSE +11/25/2023,202311,47,TheNFT Project,Mainnet,,,,,0x2F746bC70f72aAF3340B8BbFd254fd91a3996218,0x85301f7b943fd132c8dBc33f8FD9d77109A84f28,,FALSE,FN (Beta-alt Detected),FN,,,0xd5b4d68432cbbd912130bbb5b93399031ddbb400d8f723c78050574de7533106,Nov-25-2023 08:17:23 AM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Sat, 25 Nov 2023 07:29:36 GMT",-48 mins,not detected on prod,,No victim,,,,Perf issue,,,"0x79a7D3559D73EA032120A69E59223d4375DEb595,0xBB9bc244D798123fDe783fCc1C72d3Bb8C189413,0x266830230bf10A58cA64B7347499FD361a011a02,0xE1eCaDb5FEC254c2c893C230b935Db30b8FfF0db",,,0,,,,,TC,TRUE +11/28/2023,202311,48,0x8fca86,Arb,,,,,0x9e1f1332ce7e3e36282525fcfdce7359d7360b88,0x8fcA86b7b452e6daae27f642d74554D819A73c75,,FALSE,FN,FN,,,0x27f13eaa3d72dbd32bda5d758e0ecbd689f6d23f60ec7b0c27a4042a6c68fa20,Nov-29-2023 03:05:09 AM +UTC,,,FALSE,,,,,,,,,,,Logic failed,,,"0x503b1d37cbf6adec32c6a2a5542848b5953f6cd8,0x1c30B841D6a8ac5c74E52714085D172B73926Cdb",,0x2064f70c7b5a7745b1ede66ed6568bf8f18ead2f8268dc77dfe150b694b83239,1,,,,,Union Chain,TRUE +11/29/2023,202311,48,Braintrust,Mainnet,,,,,0xeE98D7E575A600B5390488630C1805F5047c5b4d,0x6edC65D392e572eABbED279B64561646123086f8,,FALSE,FN (Beta Detected),FN,,,0x525d0a4831ecddf25aef02a2fe94b194d47ec46e8951544c1e10b40cf2185e0c,Nov-29-2023 07:41:23 AM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Wed, 29 Nov 2023 07:06:21 GMT",-35 mins,not detected on prod,,No victim,,,"There were sufficient base bots that triggered, cex funding and suspicious contract creation. the beta version triggered https://app.forta.network/alerts/0x1bb3600e5594cb819385203204bb480236ac0bab65d3963e77de0a7dc0b4860d - The prod version did not",Perf issue,,,"0x1a0d3d5a43e53510f80f16905bc96e907a47dd01,0x799ebfabe77a6e34311eeee9825190b9ece32824",,,0,,,,,Fixed Float,TRUE +11/29/2023,202311,48,AI Space,BSC,,,,,0x7cb74265E3E2D2B707122BF45aeA66137C6C8891,0x15FFd1D02B3918C9e56f75E30D23786D3eF2B5bc,,FALSE,FN,FN,,,0x0be817b6a522a111e06293435c233dab6576d7437d0e148b45efcf7ab8a10de0,Nov-29-2023 12:58:04 PM +UTC,,,FALSE,,,,,,,,,,,Logic failed,,,"0x6844ef18012a383c14e9a76a93602616ee9d6132,0x1219f2699893bd05fe03559aa78e0923559cf0cf",,"0x99b250a530e1f502cb683ec24d928cb145eecc6419ec199e8f1c13753d274898,0x6ff9bf5d5ea82d05c1224ef057bb29271e392f577768301ff4f6734797406868",2,,,,,TC,TRUE +11/30/2023,202311,48,Stake DAO,BSC,,,,,0x835b45d38cbdccf99e609436ff38e31ac05bc502,Nil,,FALSE,FN,FN,,,0xe0fef37bb7cbc74cf7d662d7131e8ba0076711844125c093595fd13d79bb5e6d,Nov-29-2023 02:04:58 PM +UTC,,,FALSE,,,,,,,,,,,Logic failed,,,"0x0735f098c80dd0cb39118b595d46ccd67b68672d,0xf79b275e0b602d82b822895074552e487412a41a,0xf479e1252481360f67c2b308F998395cA056a77f,0x4835BC54e87ff7722a89450dc26D9dc2d3A69F36",,,0,,,,,SWFT swap,TRUE +12/25/2023,202312,52,Telcoin,Polygon,,,,,"0x35d2775e5f95596509951b140d68fc5b9185ff98,0xdb4b84f0e601e40a02b54497f26e03ef33f3a5b7",0x10E5C8d3537856F141272E1C39BeFdab4Dd8BdE0,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Mon, 25 Dec 2023 17:24:13 GMT",0x35f50851c3b754b4565dc3e69af8f9bdb6555edecc84cf0badf8c1e8141d902d,Dec-25-2023 5:23:40 PM,33 sec,33,TRUE,,ATTACK-DETECTOR-PREPARATION,"Mon, 25 Dec 2023 17:22:47 GMT",-53 sec,86,,No victim,,,"Beta detected early; seems like we have reliability issues with the prod version. When comparing the alert of the beta version, it seems only needed the cex funding+suspicious contract creation, whereas the prod version had these two + execution one. Seems the AD (prod) was late to pick them up",Perf issue,,,,,,,,,,,Fixed float,TRUE +12/27/2023,202312,52,Thunder Terminal,Mainnet,,,,,0x2a2c200af4e659348c4182dd9806a340851df42e,Nil,,FALSE,FN,FN,,,0xed773474da7266a71640738f3a1df5d88c0b6ab2d6b252513acd289a269f2a75,Dec-27-2023 12:11:47 AM +UTC,,,FALSE,,,,,,,,,,Attacker launder faunds using Railgun. There was no contract deployment so there should be some high confidence bot related to balances that should have flagged this one,Logic failed,https://github.com/forta-network/starter-kits/issues/470,,Withdrawals on behalf of users,,,,,,,,Nill,Nill +12/29/2023,202312,52,INSC NFT,Mainnet,,,,,0x6965CC174C0D385dea0756CeA2FAdC4B642EaFfC,0xfF2598043e733BbCd08e698252fCe1126082e801,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Fri, 29 Dec 2023 03:09:47 GMT",0x459b5fb324a0b38de3fc6d5e5e5e2ee4b3d38a9928b22606e3b6f6adeac70a5b,Dec-29-2023 03:09:23 AM +UTC,24 sec,13,TRUE,,ATTACK-DETECTOR-2,"Fri, 29 Dec 2023 03:06:33 GMT",-2 mins 50 secs,194,,,,,"beta had the same base bots in the metadata than the production version but prod version was late. +beta: https://app.forta.network/alerts/0x598b885df1ee3e333ac2911bd53a07c7fae105667b1ddf8e6b4d2d20a6a995c1 +prod: https://app.forta.network/alerts/0x9d5fe947f3b9b698a046e69f50a5fb705e344881554387ca67cdbd3cf11c303c",Perf issue,,,0x8c578A6e31Fc94B1Facd58202be53a8385BACbf7,,,,,,,,Fixed Float,TRUE +12/29/2023,202312,52,AnnexFinance,BSC,,,,,0x996373C2F053537A6c5b7A49920254dc111A72b4,0xda927f95a8fd41b996cc08ef0f805f09aab3b184,,FALSE,FN,FN,,,0xc24a126447143d22897ee8e8dfeb14033084a1ccf9e5e3983c01104c78da2504,,,,FALSE,,,,,,,,,,The CEX bot did not trigger,Logic failed,https://github.com/forta-network/starter-kits/issues/458,,0xdA927f95a8Fd41B996cc08Ef0f805f09aAb3B184,,,,,,,,Fixed Float,TRUE +12/30/2023,202312,52,ChannelsFinance,BSC,,,,,0x20395D8e8a11CFD2541b942aFdb810b7dcc64681,0x07e536F23a197F6FB76F42aD01ac2Bcdc3BF738E,,FALSE,TP,TP,ATTACK-DETECTOR-3,"Sat, 30 Dec 2023 05:38:59 GMT",0x93372ce9c86a25f1477b0c3068e745b5b829d5b58025bb1ab234230d3473b776,Dec-30-2023 12:30:38 PM +UTC,-6 hours 51 minutes and 39 seconds,-24660,TRUE,,ATTACK-DETECTOR-3,"Sat, 30 Dec 2023 11:54:14 GMT",-35 mins,22500,,,,,,Early enough,,Channels,"0x860df3e99f6223d695ab51b2fb9eaa92fa903e8d,0xca797539f004C0F9c206678338f820AC38466D4b,0xba5b37100538cde248aaa4c92fb330fcf91f557c,0x33e68c922d19d74ce845546a5c12a66ea31385c4,0x7d247295a6938587c581f5bb8cbd98a72388e530,0x11797d61fd4bff9728113601782d4444503093d7,0x7140A671Da66C0BD411E3fc3B15C51C36dBB5cA3",,,,,,,,ChangeNow,TRUE +12/31/2023,202312,53,Orbit,Mainnet,,,,,"0x009b60Aab8E64C8F5FE449bd96fA78B1A7fFfcC5,0xDAdfa3Ccd40Fc3d5A0164c6f9444f60163cCBf3b,0xA70F8917a957757f5505a5535df1591C54f65b9D,0x9ca536d01B9E78dD30de9d7457867F8898634049",Nill,,FALSE,FN,FN,,,0x639d27e564214411ad8eb06cf00d85cd90f83503a53ab5bf35dd5c6e1148ae0a,Dec-31-2023 09:16:59 PM +UTC,,,FALSE,,,,,,,,,,Private key compromise issue,Logic failed,,,0x1Bf68A9d1EaEe7826b3593C20a0ca93293cb489a,,,,,,,,Nill,Nill +12/20/2023,202312,51,Transit,BSC,,,,,0xf7552ba0eE5BEd0f306658F4A1201f421d703898,0x7d7583724245EEEBB745eBcB1cee0091FF43082b,,FALSE,FN (Beta alt),FN,,,0x93ae5f0a121d5e1aadae052c36bc5ecf2d406d35222f4c6a5d63fef1d6de1081,Dec-20-2023 02:01:52 AM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Wed, 20 Dec 2023 01:39:39 GMT",-12 mins,not detected on prod,,,,,The beta alerted prior to the explotation phase https://app.forta.network/alerts/0xf764c5168e5b8932c2241fa8829b2924a19ff55b46aa4f58e9d9289704fd40dc. Still for some reason the AD did not picked up the TC alert though there was one https://app.forta.network/alerts/0xaa671e4d049c7de96423bd442e6ab83b66cd8b7e42e29fb6c38db3a159f73940 - ,Logic failed,https://github.com/forta-network/starter-kits/issues/468,,0x00000047bb99ea4d791bb749d970de71ee0b1a34,,,,,,,,Tornado Cash,TRUE +12/22/2023,202312,51,Pine,Mainnet,,,,,0x05324c970713450bA0Bc12EfD840034FCB0A4BAa,0x1d5586Da44328F28bfbBF59b808A87584355B3Ef,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Thu, 21 Dec 2023 16:20:18 GMT",0x88db033171344c7b89d50f48e1e50ef3a622371cf3ab997613469904838c83ad,Dec-21-2023 04:10:47 PM +UTC,10 mins 27 secs,660,TRUE,,ATTACK-DETECTOR-2,"Thu, 21 Dec 2023 16:09:22 GMT",-1 min 15 sec,711,,,,,In this particular case if we compare the alert of the production version https://app.forta.network/alerts/0x5d81c999e101e954fde0fff266ef62fb0716ba2740f4275fda1fc2f8af655cdb and the beta one https://app.forta.network/alerts/0xa0fc32b4154278cd93e7efda9667a9256b61251a321e99b6cb6a44280b73eac2 the same base bot fired however for some reson the production version was slower,Perf issue,,Pine,0x19C56cb20e6E9598fC4d22318436f34981E481F9,,,,,,,,ChangeNow,TRUE +12/12/2023,202312,50,Hypr,Mainnet,,,,,"0x3Ea6BA6d3415E4DFD380516c799aAfa94e420519, 0x5b8d598b354f5760b2a65f492154e7a3df46d1be",0xbA6fA6e8500cD8eEDa8EbB9DFbCC554fF4A3EB77,,FALSE,FN (Beta-alt Detected),FN,,,0x51ce3d9cfc85c1f6a532b908bb2debb16c7569eb8b76effe614016aac6635f65,Dec-13-2023 03:30:35 AM +UTC,,,FALSE,,ATTACK-DETECTOR-2,"Wed, 13 Dec 2023 03:24:32 GMT",-6 min,not detected on prod,,,,,There were sufficient base bots as there were enough base bots that triggered (CEX funding and suspicious smart contract). In fact beta version triggered https://app.forta.network/alerts/0xf0398943f82175bcc305312513ee674423c59ef58cfcb08b0aedf46513d4077f - I am assuming that the AD for some rason did not pick them out,Perf issue,,,0x40C31236B228935b0329eFF066B1AD96e319595e,,,,,,,,FixedFloat,TRUE +12/13/2023,202312,50,Peapods,Mainnet,,,"$230,000",,0x2ba9de5ebca7db023dd1f9abce9100e7590d0000,0x928B2DAe97FC5d40Cb0552815fb5ab071103e20a,,FALSE,TP,TP,ATTACK-DETECTOR-PREPARATION,"Wed, 13 Dec 2023 15:34:57 GMT",0x98d8237027797a51b1251aa239d1a85b7a209d15c9f7895b44b4ee7ee0c754fb,Dec-13-2023 03:39:11 PM +UTC,-4 mins 14 sec,-254,TRUE,,ATTACK-DETECTOR-2,"Wed, 13 Dec 2023 15:34:57",-4 mins 14 sec,0,,,,,It worked smooth. The base bot alerts are cex funding and contract creation,Early enough,,Peapods,0xdbB20A979a92ccCcE15229e41c9B082D5b5d7E31,,,,,,,,FixedFloat,TRUE +12/16/2023,202312,50,NFT Trader,Mainnet,,,"$3,000,000",,0xd717b85B5Da61a56aFEB57173c7336084243cDf0,"0x670b623230731146B516d9e110100310413cccbf,0x7DC184582B4F01039F2F94CB64E4112d191564B0,0x54937e193259b1e5a25F3548edA1807a4Eb36ac0,0x8E6E7296c26FEa664dDF240dedb6332C46Ff6937,0xc446e0A1E22B54e18303022FF8C5c8AB364d6ebb,0x15E02f1878D27F49aa3e6C567C12B0201E28E67c,0x88ab74f802c099f4206d71fbaeaA93396f5c89D5,0xA75A9C0FbEc1515513F35d17BBbBb2bdBdfd7837,0xAb8D41CEc36499782ca81108F65ff083F2aAa590,0x163ED3Eacc0711822533AF65c6D45D098bA2a470,0xe2e2f5D6472D39173Aa9b798809889Df0464Eb21",,FALSE,TP,TP,ATTACK-DETECTOR-2,"Sat, 16 Dec 2023 05:39:47 GMT",0x32af9431e4cc7eb7a4cc4eb85d71155b00f881e972bc389e48c9fff1dfad7011,Dec-16-2023 05:38:59 AM +UTC,48 secs,48,TRUE,,ATTACK-DETECTOR-2,"Sat, 16 Dec 2023 05:39:47 GMT",48,0,,,,,There was no alert prior to the explotation phase. preparation and explotation are the ones that are displayed. user was funded days before contract deployment. ,Logic failed,https://github.com/forta-network/starter-kits/issues/467,,"0xc310e760778ecbca4c65b6c559874757a4c4ece0, 0x13d8faF4A690f5AE52E2D2C52938d1167057B9af",,,,,,,,Tornado Cash,TRUE +12/16/2023,202312,50,Flooring Protocol,Mainnet,,,"$1,600,000",,0x4d0D746E0F66bf825418E6b3deF1a46Ec3c0B847,0x7e5433f02f4bf07c4f2a2d341c450e07d7531428,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Sun, 17 Dec 2023 00:50:54 GMT",0xa329b27fbe0f7b7f92060a9e5370fdf03d60e5c4835f09d7234e5bbecf417ccf,Dec-17-2023 12:43:35 AM +UTC,7 mins 21 sec,441,FALSE,,ATTACK-DETECTOR-2,"Sun, 17 Dec 2023 00:50:54 GMT",7 mins 21 sec,0,,,,,the base bot alert came from preparation and explotation. There was no funding alert as there was no coverage for funding.,Logic failed,https://github.com/forta-network/starter-kits/issues/462,,,,,,,,,,Railgun,TRUE +12/12/2023,202312,50,Aurory SyncSpace,Arbitrum,,,"$830,000",,0xec79BC14F4781e46d746Fe4A5F7A5346Bc57D514,nill,,FALSE,FN,FN,,,0xa40ca7e3c210e8ef62b4399b9ba6d31d6b7425b9d58ffe0b3b61adab40f32b30,Dec-12-2023 10:51:44 AM +UTC,,,FALSE,,,,,,,,,,There was no contract deployment and funding came from an account that funded via fixed float,Logic failed,,,0x11Bf4f05EB28b802ED3aB672594DEcB20ffe2313,,,,,,,,FixedFloat,FALSE +1/2/2024,20241,1,Radiant Capital,Arbitrum,Rounding error,Money Market,"$4,500,000",,0x826D5F4d8084980366f975e10db6C4Cf1f9dDE6D,0x39519c027b503f40867548fb0c890b11728faa8f,,FALSE,FN (Beta-alt Detected),FN,,,0x1ce7e9a9e3b6dd3293c9067221ac3260858ce119ecb7ca860eac28b2474c7c9b,Jan-02-2024 06:53:38 PM +UTC,,,FALSE,FALSE,ATTACK-DETECTOR-7,"Wed, 03 Jan 2024 00:45:04 GMT",5 hours 6 minutes,not detected on prod,,,,,"Althogh there was an alert, seems like a postmortem one considering the base bots that triggered are mentioning there has been a hack. The issue here is that the contract was labeled as safe https://app.forta.network/alerts/0x336f44dde88b6c35889f8da08fc328ca42af8c40acd09f3a1989a3c5ce680267",Logic failed,https://github.com/forta-network/starter-kits/issues/466,,0x3a2d44e354f2d88ef6da7a5a4646fd70182a7f55,,,,,,,,Union Chain,TRUE +1/3/2024,20241,1,Gamma,Arbitrum,oracle manipulation,liquidity managemenet and market making,"$6,800,000",,0x5351536145610aa448a8bf85ba97c71caf31909c,0x2ee5663ceac6bac7b75d255c870f9e3cd45af1a5,,TRUE,TP,TP,ATTACK-DETECTOR-PREPARATION,"Thu, 04 Jan 2024 03:31:29 GMT",0x025cf2858723369d606ee3abbc4ec01eab064a97cc9ec578bf91c6908679be75,Jan-04-2024 03:30:37 AM +UTC,52 secs,52,TRUE,FALSE,ATTACK-DETECTOR-PREPARATION,"Thu, 04 Jan 2024 03:30:53 GMT",15,36,,,,,"Attacker deployed several contracts. Each of them were deployed and invoked in the same tx. AD (Prod) detected between fifth and sixth contract. Although the first contract was detected as malicious the AD did not pick it up, this was ran locally and there was an alert which might give the indication it is a reliability issue. In addtion the beta version detected with the first malicious smart contract of the Attack. Also, christian pulled the logs and mentioned the AD (prod) never received the alert",Perf issue,,,0x3AB5DD69950a948c55D1FBFb7500BF92B4Bd4C48,,,,,,,,Tornado Cash,TRUE +1/5/2024,20241,1,LootFinance,Mainnet,Governance,NFT collection,-,,0x469A2F900Ef0504299bfD4D1812618A94b67e189,0xebba0f3e16ef2f5e87c38e49541b7ae3c7b78e8c,,FALSE,FN,FN,,,0xbc8c30b7db136e97251eaa9897853ddf125f155b7c63bbe4c06d704384a40556,Jan-05-2024 01:51:47 PM +UTC,,,FALSE,FALSE,,,,,,,,,TC fudning alert although the malicious smart contract flagged this as a safe contract,Logic failed,https://github.com/forta-network/starter-kits/issues/478,,0xFF9C1b15B16263C61d017ee9F65C50e4AE0113D7,,,,,,,,Tornado Cash,TRUE +1/6/2024,20241,1,CoinsPaid,Mainnet,Wallet compromise,payments,"$5,000,000",,0xe5f07CEB38Cd95356c1A2f83f65FA8b59569f9b1,nill,,FALSE,FN,FN,,,0x5c258d2733e7d4782f6f61b13259a0888ca3a539f88bcf69757ec1409b8ca24a,Jan-05-2024 06:13:23 PM +UTC,,,FALSE,FALSE,,,,,,,,,unauthorized transactions,Logic failed,https://github.com/forta-network/starter-kits/issues/470,,0x183A6cF1Fc6504138d92C9d663094EE774f80038,,,,,,,,nill,nill +12/05/2023,202312,49,Bearn DAO,bsc,oracle manipulation,Yield aggregator,"$769,000",,0xCE27b195Fa6dE27081a86b98b64f77F5FB328dd5,"0x1ccC8eE8Ad0f70E0Bb362d56035fF241755192b1,0xe1997bC971D5986AA57Ee8ffB57eb1DeBa4fDAaa",,FALSE,TP,TP,ATTACK-DETECTOR-2,"Tue, 05 Dec 2023 21:33:37 GMT",0x51913be3f31d5ddbfc77da789e5f9653ed6b219a52772309802226445a1edd5f,Dec-05-2023 09:53:03 PM +UTC,-20 mins,1200,TRUE,,ATTACK-DETECTOR-2,"Tue, 05 Dec 2023 20:48:02 GMT",- 1 hour 5 minutes,2700,,,,,Worked pretty well. As the production version alerted prior to the attack. However it was like 40 minutes later than the beta version.,Perf issue,,,0x21125d94Cfe886e7179c8D2fE8c1EA8D57C73E0e,,,,,,,,Tornado Cash,TRUE +12/08/2023,202312,49,Hexacoin,Mainnet,msg sender spoofing,,"$186,000,000",,0x1aD4c765d73635Ac8beDD09f1e18c5d1e0905549,0x87bFF052dAeC9F3A94b9797Aae1f9501d1F29CCD,,FALSE,FN,FN,,,0x05efe7e32fe95fe04854a352b7ad06dcdb11645a15c47efb3aaf90e30394d657,Dec-08-2023 06:42:59 AM +UTC,,,FALSE,,,,,,,,,,Third web vulnerability - There are malicious smart contract and TC funding but not an AD alert.,Logic failed,https://github.com/forta-network/starter-kits/issues/479,,,,,,,,,,Tornado Cash,TRUE +1/12/2024,20241,2,Wise Lending,Mainnet,,Money Market,"$464,000",,0xb90cf1d740b206b6d80854bc525e609dc42b45dc,0x91c49Cc7FBfE8f70AceEb075952cD64817f9d82c,,TRUE,TP,TP,ATTACK-DETECTOR-2,"Fri, 12 Jan 2024 19:29:43 GMT",0x67d6c554314c9b306d683afb3bc4a10e70509ceb0fdf8415a5e270a91fae52de,Jan-12-2024 07:28:35 PM +UTC,52 sec,52,TRUE,FALSE,ATTACK-DETECTOR-2,"Fri, 12 Jan 2024 19:28:07 GMT",28 sec,96,,,,,"Again, there were alerts for three phases (funding, preparation and explotation) although the two former were sufficient cex-funding and malicious smart contract deployment. Beta bot had the ability to catch it earlier. ",Perf issue,,,0x91c49Cc7FBfE8f70AceEb075952cD64817f9d82c,,,,,,,,Tornado Cash,TRUE +12/07/2023,202312,49,Time,Mainnet,msg sender spoofing,,"$190,000",,0xa16a5f37774309710711a8b4e83b068306b21724,0x2bb584c3a36f86D40550766752417c81D5E5faD4,,FALSE,FN,FN,,,,,,,FALSE,,,,,,,,,,Thing here is that it was frontran by a mev bot,Logic failed,,,,,,,yes,https://etherscan.io/tx/0xecdd111a60debfadc6533de30fb7f55dc5ceed01dfadd30e4a7ebdb416d2f6b6,,,unknown,FALSE +12/06/2023,202312,49,Elephant exploiter,bsc,oracle manipulation,,"$165,000",,0xbbcc139933D1580e7c40442E09263e90E6F1D66D,0x69BD13F775505989883768ebd23D528c708D6Bcf,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Wed, 06 Dec 2023 10:28:17 GMT",0xd423ae0e95e9d6c8a89dcfed243573867e4aad29ee99a9055728cbbe0a523439,Dec-06-2023 10:27:58 AM +UTC,19 secs,19,FALSE,,,,,,,,,,"This address had already executed another exploit - OKC, He already had native tokens that's why he did not fund prior to the attack. Tracking past exploiters could help.",Logic failed,https://github.com/forta-network/starter-kits/issues/351,,0xCb5a02BB3a38e92E591d323d6824586608cE8cE4,,,,,,,,Tornado Cash,TRUE +01/18/2024,20241,3,Rose,Arbitrum,Reward manipulation,,"$40,000",,0x54949211ca6cE328757D4138A474150D7BE4d1c8,0x6858f645d1f1031133203bd193d6a0e1d2b946e6,,FALSE,TP,FN,ATTACK-DETECTOR-2,"Sat, 13 Jan 2024 12:53:32 GMT",0xd54088b8a6a3345ea008991c1475f42b3ce67b49f41fa946bfb6072d48a02bf8,Jan-18-2024 08:36:30 AM +UTC,"4 days, 19 hs and 42 mins",-347578,TRUE,TRUE,,,,,,,,,Thing here is that the AD triggered for a previous attack so this address was already labeled. However it did not trigger for this last one. AD identified the attacker but not the victim.,Early enough,,,,,,,,,,,EOA's attacker,FALSE +01/17/2024,20241,3,"BMIZapper, BasketDAO",Mainnet,arbitrary external calls,Yield aggregator,"$114,000",,0x63136677355840F26c0695dD6DE5C9E4f514f8e8,0xae5919160a646f5d80d89f7aae35a2ca74738440,,FALSE,FN (Beta-alt Detected),FN,,,0x97201900198d0054a2f7a914f5625591feb6a18e7fc6bb4f0c964b967a6c15f6,Jan-17-2024 09:31:11 PM +UTC,,,FALSE,FALSE,ATTACK-DETECTOR-7,"Thu, 18 Jan 2024 00:58:20 GMT",102769,not detected on prod,,,,,"Although the beta detected, it was useless as it was way after the attack. ",Logic failed,https://github.com/forta-network/starter-kits/issues/480,,,,,,,,,,Fixed Float,FALSE +01/16/2024,20241,3,Socket,Mainnet,Function Parameter Validation,cosschain interoperability protocol,"$3,300,000",,0x50DF5a2217588772471B84aDBbe4194A2Ed39066,0xf2d5951bb0a4d14bdcc37b66f919f9a1009c05d1,,TRUE,TP,TP,ATTACK-DETECTOR-2,"Tue, 16 Jan 2024 19:11:43 GMT",0xc6c3331fa8c2d30e1ef208424c08c039a89e510df2fb6ae31e5aa40722e28fd6,Jan-16-2024 07:11:23 PM +UTC,20 secs,20,TRUE,FALSE,ATTACK-DETECTOR-1,"Tue, 16 Jan 2024 19:04:20 GMT",-417,437,,,,,beta version detected prior to the production version,Perf issue,,,,,,,,,,,Fixed Float,TRUE +1/22/2024,20241,4,"Concentric, Mozaic",Arbitrum,Wallet compromise,,"$1,700,000",,"0x105f52fcc329cef4cbe25bc946f8a3738414e4a1, 0x1f14e38666cdd8e8975f9acc09e24e9a28fbc42d, 0xc586e4b2f00ce6405741104f7394ff3df15850d3, 0x3F06D41f7a7B0Fce0b4cD201fa6a207363A2317d",nill,,FALSE,FN,FN,,,,,,,FALSE,FALSE,,,,,,,,,Attacker executed a social enginnering attack where he was able to gain control of a contract which gave him the possibility to drain assets. Exploiter then chose to consolidate funds on the same address he used for OKX exploit. ,Logic failed,,,0x8883d82E852F966ce88A9a9917D70d6f9E3933d9,,,,,,,,Unknown,nill +1/22/2024,20241,4,DAO SoulMate,Mainnet,insufficient access control,community,"$319,000",,"0xd129d8c12f0e7aa51157d9e6cc3f7ece2dc84ecd, 0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd",0xd129D8C12f0e7aA51157D9e6cc3F7Ece2dc84ecD,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Mon, 22 Jan 2024 17:14:50 GMT",0x1ea0a2e88efceccb2dd93e6e5cb89e5421666caeefb1e6fc41b68168373da342,Jan-22-2024 05:14:35 PM +UTC,15 secs,15,FALSE,FALSE,ATTACK-DETECTOR-2,"Mon, 22 Jan 2024 11:44:32 GMT",-19803,-19818,,,,,"Although there was a contract deployed, seems it was a private key compromise. The contract was used in order to do the swapp all in the same tx with the withdrawal",Logic failed,,,,,,,,,,,Railgun,TRUE +1/22/2024,20241,4,GAMEE,Polygon,Wallet compromise,Gaming,"$7,000,000",,0x16afA519642C932B073CD21D82162BDc7a471b86,nill,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Mon, 22 Jan 2024 22:05:04 GMT",0xdab0b4e0396e8b9c0d622f68624f92febdf1cf88bc94def8a9713b5f78d39922,Jan-22-2024 06:34:31 PM +UTC,17433 secs,17433,FALSE,FALSE,ATTACK-DETECTOR-2,"Mon, 22 Jan 2024 22:05:04 GMT",17433,0,,,,,it was a private key comrpomise,Logic failed,,,,,,,,,,,fixed float,TRUE +1/25/2024,20241,4,WallStreetMemes,Ethereum,Wallet compromise,Bet,"$7,000,000",,0xb528b27361750962b42a76aed88f8f805221ab4a,nill,,FALSE,FN,FN,,,,,,,FALSE,FALSE,,,,,,,,,it was a private key comrpomise,Logic failed,,,,,,,,,,,nill,nill +1/25/2024,20241,4,Nebula Revelation,Optimism,Reentrancy,Gaming,"$180,000",,0x1FD0a6A5e232EebA8020A40535AD07013Ec4ef12,0xd3cfde9265321cefd1e0dda4fd4162d23f305c7a830e200f207111b4b829c8d8,,FALSE,TP,FN,ATTACK-DETECTOR-PREPARATION,"Thu, 25 Jan 2024 12:12:12 GMT",0xf4fc3b638f1a377cf22b729199a9aeb27fc62fe2983a65c4d14b99ee5c5b2328,Jan-25-2024 12:15:15 PM +UTC,-183 secs,-183,TRUE,TRUE,SUSPICIOUS-CONTRACT-CREATION,"Thu, 25 Jan 2024 12:11:59 GMT",-196,13,,,,,The attack detector caught in on time. Thing here is that there was no victim identification as it was too early,Early enough,,Nebula revelation,0x5499178919C79086fd580d6c5f332a4253244D91,,,,,,,,Tornado Cash,TRUE +1/27/2024,20241,4,Citadel One,Arbitrum,oracle manipulation,Treasury backed protocol,"$106,000",,0xfCf88e5E1314cA3B6be7EEd851568834233F8b49,0xfcbf411237ac830dc892edec054f15ba7f9ea5a6,,FALSE,TP,TP,COMBINATION,"Sat, 27 Jan 2024 09:25:48 GMT",0xf52a681bc76df1e3a61d9266e3a66c7388ef579d62373feb4fd0991d36006855,Jan-27-2024 09:25:36 AM +UTC,12 secs,12,TRUE,FALSE,ATTACK-DETECTOR-2,"Sat, 27 Jan 2024 09:25:44 GMT",8,-4,,,,,"The address was funded by fixed float, then crosschain bnb to eth using a bridge called SWFT. The cex funding never alerted the fixed loat funding",Logic failed,https://github.com/forta-network/starter-kits/issues/504,,0x5ed32847e33844155c18944ae84459404e432620,,,,,,,,FixedFloat,TRUE +1/28/2024,20241,4,Barley Finance,Mainnet,Reentrancy,,"$130,000",,"0x7b3a6eff1c9925e509c2b01a389238c1fcc462b6, 0x68ff5202baae2a963d9dd4d31cdfa423bc548874, 0xc596523b77ceb9567279b572c653ecf4ba763cb7","0x9B3F99369FAf1B0762C997817607d89865928Fe1, 0x356E7481B957bE0165D6751a49b4b7194AEf18D5, 0xeb0D248d52047c64b5DC12336e40ef8A99F78BdC, 0x2cbEf94bE18F4E28f7BE398257c1cb0A5f05dbeD",,FALSE,TP,TP,ATTACK-DETECTOR-2,"Sun, 28 Jan 2024 17:55:11 GMT",0x995e880635f4a7462a420a58527023f946710167ea4c6c093d7d193062a33b01,2024-01-28 17:54:59,12 secs,12,FALSE,FALSE,ATTACK-DETECTOR-2,"Sun, 28 Jan 2024 17:55:11 GMT",12,0,,,,,There were sufficient bots that could have made the bot triggered earlier. Changenow+suspicious contract,Perf issue,,,,,,,,,,,ChangeNow,TRUE +1/30/2024,20241,5,Abracadabra,Mainnet,Rounding error,Money Market,"$6,500,000",,0x87f585809ce79ae39a5fa0c7c96d0d159eb678c9,"0x13af445f81b0deca5dcb2be6a4c691f545c95912, 0xE1091D17473b049CcCD65c54f71677Da85b77A45",,TRUE,TP,TP,ATTACK-DETECTOR-PREPARATION,"Tue, 30 Jan 2024 10:15:17 GMT",0x26a83db7e28838dd9fee6fb7314ae58dcc6aee9a20bf224c386ff5e80f7e4cf2,Jan-30-2024 10:14:35 AM +UTC,77 secs,77,TRUE,FALSE,SUSPICIOUS-CONTRACT-CREATION,"Tue, 30 Jan 2024 10:14:35 GMT",0,77,,,,,Contract was invoked at the same time of the creation. At its best the alert should have been at the time of the contract creation/invoke,Perf issue,,,,,,,,,,,Tornado Cash,TRUE +1/31/2024,20241,5,CheckDot,bsc,oracle manipulation,insurance,"$120,000",,0x1f9E20C161eEdbA06E8cA9edF5F780b9C45E68DF,0x056881ab37a8413408dFb15E79d0999577A901bE,,FALSE,TP,TP,ATTACK-DETECTOR-PREPARATION,"Wed, 31 Jan 2024 17:35:56 GMT",0xdd19e3a1657f8381b561c4d6c9b61be67380e10fd4d367ccad6e8cf28c114e72,Jan-31-2024 05:40:27 PM +UTC,-271 secs,-271,TRUE,TRUE,ATTACK-DETECTOR-2,"Wed, 31 Jan 2024 17:35:44 GMT",-283,12,,,,,The attack was not executed as blocksec alerted on time,Early enough,,,,,,,,,,,ChangeNow,TRUE +2/2/2024,20242,5,ADC Token,Mainnet,Reward manipulation,,"$40,000",,0x24A0c66f185874B251Eb70BEE2C2e35E39848419,0x2ffdce5f0c09a8ee3a568bc01f35894b2d77a6d6,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Fri, 02 Feb 2024 05:29:01 GMT",0xcf834aff4de9992f5da9c443600dad9c6277a8a00de5007842fece51564992db,Feb-02-2024 05:28:47 AM +UTC,14 secs,14,FALSE,FALSE,ATTACK-DETECTOR-2,"Fri, 02 Feb 2024 05:29:01 GMT",14,0,,,,,We do not have coverage for cases where the funding is coming from another attacker's EOA,Logic failed,https://github.com/forta-network/starter-kits/issues/351,,"0xdE46fcF6aB7559E4355b8eE3D7fBa0f2730CDdd8, 0xaE2C7af5fc2dDF45e6250a4C5495e61afC7AcF50",,,,,,,,EOA's attacker,TRUE +2/4/2024,20242,5,Reservoir Finance,Avalanche,insufficient access control,,"$4,000",,0x42561d7e5896052e6c93dd934f1fca5aa002c1e1,nill,,FALSE,FN,FN,,,0xd709b1719e7ec2517c7cdcba5c8e8ba1855733669ea445f3fc26bed265be47f1,,,,FALSE,FALSE,,,,,,,,,There was no contract deployment. Still it was flagged afterwards as the address was funded by changenow and deploy a new contract on polygon.,Logic failed,,,,,,,,,,,EOA's attacker,TRUE +2/5/2024,20242,6,Burned Finance,bsc,Reward manipulation,liquidity mining,"$66,000",,0xC9FBCf3EB24385491f73BbF691b13A6f8Be7C339,0xB5EEbf73448E22cE6a556f848360057f6Aadd4e7,,FALSE,FN,FN,,,0x1d0af3a963682748493f21bf9e955ce3a950bee5817401bf2486db7a0af104b4,,,,FALSE,FALSE,,,,,,,,,issue in the malicious smart contract bot,Logic failed,https://github.com/forta-network/starter-kits/issues/538,,,,,,,,,,Tornado Cash,FALSE +2/9/2024,20242,6,PlayDapp,Mainnet,Wallet compromise,Gaming,"$290,000,000",,0xd151050d43c28690766f50ce9ea8686c5d243a40,nill,,FALSE,FN,FN,,,,,,,FALSE,FALSE,,,,,,,,,Private key compromise issue,Logic failed,https://github.com/forta-network/starter-kits/issues/539,,,,,,,,,,nill,nill +2/18/2024,20242,7,FixedFloat,Mainnet,Wallet compromise,exchange,"$26,000,000",,0x85c4fF99bF0eCb24e02921b0D4b5d336523Fa085,nill,,FALSE,FN,FN,,,,,,,FALSE,FALSE,,,,,,,,,Private key compromise issue. However attacker used exch to launder funds,Logic failed,https://github.com/forta-network/starter-kits/issues/541,,,,,,,,,,Tornado Cash, +2/15/2024,20242,7,Particle trade,Mainnet,3rd party compromise,leverage trading,"$139,000",,0x2c903F97Ea69B393Ea03E7FAb8D64D722b3f5559,0xE55607B2967DDbE5FA9A6A921991545b8277Ef8F,,FALSE,FN (Beta-alt Detected),FN,,,0x2cc3c3cfbdf04441f3349e49768c909ac252ace6f78b24a25d4700a47883514a,Feb-15-2024 06:09:35 AM +UTC,,,FALSE,FALSE,ATTACK-DETECTOR-PREPARATION,"Wed, 14 Feb 2024 18:48:11 GMT",45616,not detected on prod,,,,,It was ran locally and there was an output. Both TC and malicious smart contract triggered,Perf issue,,Particle trade attack,,,,,,,,,Tornado Cash,TRUE +2/12/2024,20242,7,GAME,Mainnet,Reentrancy,,"$45,000",,0x145766A51ae96E69810fE76f6f68Fd0e95675A0B,"0x19eF7138032229cD3F2D8921598250C03B838391, 0x327aa670AABeAaC9B8F099E4827e04e957B66dCd, 0x8d4dE2Bc1a566b266bD4B387f62C21e15474D12a",,FALSE,TP,TP,ATTACK-DETECTOR-3,"Mon, 12 Feb 2024 18:48:19 GMT",0xf8a4df2a98dc869fc7e301fd319e768db380a68291f59d407392cd332c1958ee,Feb-12-2024 06:59:47 PM +UTC,-588 secs,-588,TRUE,TRUE,SUSPICIOUS-CONTRACT-CREATION,"Mon, 12 Feb 2024 18:24:43 GMT",-2104,1516,,,,,There were sufficient base bot alerts that should have made the bot triggered earlier. Either way the bot was warlier enough to trigger in time,Perf issue,,Game exploit,,,,,,,,,ChangeNow,TRUE +2/13/2024,20242,7,Azuma,Mainnet,Function Parameter Validation,,"$26,000",,0xea75aec151f968b8de3789ca201a2a3a7faeefba,,,FALSE,TP,FN,ATTACK-DETECTOR-2,"Mon, 08 Jan 2024 13:10:03 GMT",0x34f0b22d02eedf53d9d12d6b344c2f78fc1a260ce268ffb81b99b5e532fcacff,Feb-13-2024 11:23:59 PM +UTC,-38756 secs,-38756,TRUE,TRUE,,,,,,,,,This is a known attacker which has been flagged for other attacks,Early enough,https://github.com/forta-network/starter-kits/issues/351,,,,,,,,,,EOA's attacker,TRUE +2/13/2024,20242,7,Duelbits,Mainnet/bsc,Wallet compromise,Bet,"$4,600,000",,0x3933924FAf011aE8d24e44beE450b3d78E46a666,nill,,FALSE,FN,FN,,,0x3bf414c5a62704cc917242336394eeeed15a7e1a50e857c15e611dab92999aa4,,,,FALSE,FALSE,,,,,,,,,Private key compromise issue. However attacker used exch to launder funds,Logic failed,,,,,,,,,,,nill,nill +2/13/2024,20242,7,Synthetix,Mainnet,Reward manipulation,Synthetics,"$13,000",,0x92de7e617c958cd43e0f11b249566d718bbeca27,0x565F3e1dA04192A0949e2f0aA4F5a23E858F74Be,,FALSE,FN (Beta),FN,,,0x9963860ed56cd46b5eae835f9010d6872e5b8bd449f5640fa46c3409c7179c18,Feb-13-2024 03:02:35 AM +UTC,,,FALSE,FALSE,ATTACK-DETECTOR-PREPARATION,"Tue, 13 Feb 2024 01:50:21 GMT",-5534,not detected on prod,,,,,attack detector did not pick it up. After running it locally this is a perf issue,Perf issue,,,,,,,,,,,ChangeNow,TRUE +2/14/2024,20242,7,Dawn,Mainnet,Function Parameter Validation,Gas eficient protocol,$464,,0xea75aec151f968b8de3789ca201a2a3a7faeefba,0x89EcE22120d55e1F3eF2Bd3A10815c9AEE30ECbD,,FALSE,TP,FN,ATTACK-DETECTOR-2,"Mon, 08 Jan 2024 13:10:03 GMT",0x443f31678f5023d9810164a3d70b827f183df5e7067ee512fa460bb2c2345b3e,Feb-14-2024 02:53:59 PM +UTC,,,TRUE,TRUE,,,,,,,,,This is a known attacker which has been flagged for other attacks,Early enough,https://github.com/forta-network/starter-kits/issues/351,,,,,,,,,,EOA's attacker,TRUE +2/14/2024,20242,7,Miner,Mainnet,Function Parameter Validation,NFT collection,"$466,000",,0xea75AeC151f968b8De3789CA201a2a3a7FaeEFbA,0xBfF51C9C3D50d6168DFEF72133F5DBda453EbF29,,FALSE,TP,FN,ATTACK-DETECTOR-2,"Mon, 08 Jan 2024 13:10:03 GMT",0x75e3aeb00df69882a1b15d424e5e642650326ca3b923d7fd1922d57c51bc2c78,Feb-14-2024 01:48:23 PM +UTC,-3110400 secs,-3110400,TRUE,TRUE,,,,,,,,,Forta did not catch on time this attack but as the address executed other attacks - Forta alerted on time without flagging the victim,Logic failed,https://github.com/forta-network/starter-kits/issues/351,,,,,,,,,,EOA's attacker,TRUE +2/15/2024,20242,7,Dualpools,bsc,Rounding error,Money Market,"$40,000",,0x4645863205b47a0A3344684489e8c446a437D66C,0x38721b0d67DFdba1411BB277d95AF3D53FA7200E,,FALSE,FN,FN,,,0x90f374ca33fbd5aaa0d01f5fcf5dee4c7af49a98dc56b47459d8b7ad52ef1e93,Feb-15-2024 03:06:15 AM +UTC,,,FALSE,FALSE,,,,,,,,,"contract wrongly labeled as safe, also no funding bot alerted though being funded by TC",Logic failed,,,,,,,,,,,TC,TRUE +2/15/2024,20242,7,Loogn,bsc,Function Parameter Validation,Miscelaneous,"$1,000",,0x835b45d38cbdccf99e609436ff38e31ac05bc502,0x3559ee265Fc9C5c9A333b07E0199480b4A84f369,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Thu, 15 Feb 2024 11:32:55 GMT",0xd081d6bb96326be5305a6c00dd51d1799971794941576554341738abc1ceb202,Feb-15-2024 02:34:16 PM +UTC,-7200 secs,-7200,TRUE,TRUE,,,,,,,,,It was alerted on time. Thing here is that the contract was invoked several times. Only the last one was the exploit,Early enough,,,,,,,,,,,TC,TRUE +2/16/2024,20242,7,xPet,Arbitrum,Wallet compromise,Gaming,"$254,000",,0x22518a5c1f3e29b01d8b04145953ce20d3c99f31,,,FALSE,FN,FN,,Feb-16-2024 02:54:19 PM +UTC,0x058b8808e721f68c01c62ad70687f38f39d749bfc9d0e8f6be839c3af603dec6,,,,FALSE,FALSE,,,,,,,,,There were withdrawals and no contract deployment. There was no a postmortem analyisis but it might have been a PKC,Logic failed,,,,,,,,,,,unknown,nill +2/19/2024,20242,8,Rugged Art,Mainnet,Reentrancy,NFT collection,"$32,000",,0x9733303117504c146A4E22261F2685ddb79780eF,0x9bB0cA1E54025232E18f3874F972a851A910E9cB,,FALSE,,FN,,,0x5a63da39b5b83fccdd825fed0226f330f802e995b8e49e19fbdd246876c67e1f,Feb-19-2024 02:00:23 PM +UTC,,,FALSE,FALSE,ATTACK-DETECTOR-2,"Mon, 19 Feb 2024 13:17:08 GMT",-2580,not detected on prod,,,,,entity clustering seems not to have been working as the original address. Also the contract was labeled as safe,Logic failed,"https://github.com/forta-network/starter-kits/issues/572 +https://github.com/forta-network/starter-kits/issues/573",,,,,,,,,,Tornado Cash,FALSE +2/20/2024,20242,8,DeezNutz,Mainnet,Function Parameter Validation,,"$174,000",,0xd215ffaf0f85fb6f93f11e49bd6175ad58af0dfd,,,FALSE,TP,FN,ATTACK-DETECTOR-2,"Mon, 22 Jan 2024 17:16:48 GMT",0xbeefd8faba2aa82704afe821fd41b670319203dd9090f7af8affdf6bcfec2d61,Feb-21-2024 06:26:11 PM +UTC,-2592000 secs,-2592000,TRUE,TRUE,,,,,,,,,Same attacker than DAO soulmate,Logic failed,,,,,,,,,,,Railgun,TRUE +2/21/2024,20242,8,GAIN,Mainnet,Reward manipulation,,"$24,000",,0x0000000f95C09138DFEa7D9bCf3478fC2e13DCab,0x4e17d66d3008ae8f8e883953a843109c2fc12200,,TRUE,TP,FN,ATTACK-DETECTOR-2,"Sun, 11 Feb 2024 08:19:44 GMT",0x7acc896b8d82874c67127ff3359d7437a15fdb4229ed83da00da1f4d8370764e,Feb-21-2024 05:49:23 PM +UTC,-864000 secs,-864000,TRUE,TRUE,,,,,,,,,It was flagged due to another attack deployment and invoke happened all in the same tx,Logic failed,,,,,,,,,,,Binance,FALSE +2/23/2024,20242,8,Blueberry,Mainnet,oracle manipulation,leverage trading,"$1,340,000",,0x0512ac94E65f024471F18011719338C0E164b9B7,0x70B96d021a585dF77C66A1a16c28375Fd51f714d,,FALSE,FN,FN,,,0xb6748899565cff6c01190f507ea83a7d2efdfba13e119fd0f487f74ce899d25f,,,,FALSE,FALSE,,,,,,,,,Contract labeled as safe. Also a fn in the funding phase,Logic failed,"https://github.com/forta-network/starter-kits/issues/574 +https://github.com/forta-network/starter-kits/issues/575",,,,,,,,,,Tornado Cash,FALSE +2/23/2024,20242,8,WOOFi,Mainnet,insufficient access control,,"$2,700",,0x2F746bC70f72aAF3340B8BbFd254fd91a3996218,0x64D06F3f2dc4Ea4b03ddAC561536CD06b4467B93,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Fri, 23 Feb 2024 18:37:56 GMT",0x733780687f7d71c4b955732b6cf8fabf4906a8fb81d576f063d74441bd1ce2fc,Feb-23-2024 06:38:47 PM +UTC,-51 secs,-51,TRUE,TRUE,ATTACK-DETECTOR-2,"Fri, 23 Feb 2024 18:41:09 GMT",142,-184,,,,,Was caught in time,Early enough,,,,,,,,,,,Tornado Cash,FALSE +2/23/2024,20242,8,ZOOMER,Mainnet,oracle manipulation,Memecoin,"$14,000",,0xb0380B6D7a63E7CbF274C3b3C8838AbbD6BD4AbE,0xa4854022F4C16F0aBc3FdeC300427F6179A3043B,,FALSE,TP,TP,ATTACK-DETECTOR-PREPARATION,"Fri, 23 Feb 2024 15:32:23 GMT",0x06d7e7436414c658a33452d28400799f3637e83930dcec39b3bd065dabc6ef04,Feb-23-2024 03:41:35 PM +UTC,-540 secs,-540,TRUE,TRUE,,,,,,,,,Preparation label the attack was found early enough,Early enough,,Zoomer coin explot,,,,,,,,,Tornado Cash,TRUE +2/23/2024,20242,8,Jeffrey Zirlin (Axie Infinity),Mainnet,Wallet compromise,Gaming,"$9,700,000",,"0x39f817976c51a91b60145febad81067e69713105, 0x73f428e1037a310d472a24100da37fb1d8dec8b8, 0xa4017de6460bd63a77404dd2c2344d6135ed13b2",nill,,FALSE,FN,FN,,,0x36305616949691da46a85f7cc016ac7823e7bdb11ba7012da0aa213b53b94bd1,Feb-22-2024 11:24:35 PM +UTC,,,FALSE,FALSE,,,,,,,,,wallet was compromised,Logic failed,,,,,,,,,,,Tornado Cash,nill +2/25/2024,20242,8,Tornado Cash,Mainnet,Governance,Mixer,"$9,600,000",,0xfa6B7e8709DdbF1a734B463Ae9661760d4c438f0,nill,,FALSE,FN,FN,,,0xc02eda1edd8b563ad7c68cec11b42e9aff34721abafbba1a3fdf87b5d1fc62cb,Feb-23-2024 08:03:35 AM +UTC,,,FALSE,FALSE,,,,,,,,,It happened due to a passed proposal 2 month prior to withdrawals. Malicious contratc was not deployed,Logic failed,,,,,,,,,,,ChangeNow,nill +2/27/2024,20242,9,Serenity Shield,bsc,Wallet compromise,Data storage,"$586,000",,0x26b30F457f1e97E3DA22b9f43Fc03F3FA4D3F2ca,nill,,FALSE,FN,FN,,,0xbb115e9b4526190bac51994c0e12a0b6097c48d31b3d477e743267624e36f42c,Feb-27-2024 09:11:52 AM +UTC,,,FALSE,FALSE,,,,,,,,,PKC,Logic failed,,,,,,,,,,,Unknown,nill +2/28/2024,20242,9,Fx Protocol,Mainnet,arbitrary external calls,CDP protocol,"$5,000",,0x13A99ECCF9F4f1727a6218754b6667aA5113c731,0xc5023a6591dCd15C08c44bDa4bE75A5b54654f98,,FALSE,FN,FN,,,0xc5db99030c325a07122c1cc9dfe75d553724f0cbbe59747dc822aeb2fd1eb004,Feb-28-2024 09:18:23 PM +UTC,,,FALSE,FALSE,,,,,,,,,Deployed a contract and then invoked it but was too late considering it was frontran by a mev bot. In any case it was not detected it,Logic failed,,,,,,,,,,,Binance,TRUE +2/28/2024,20242,9,Smoofs,Polygon,Reentrancy,NFT collection,"$25,000",,0x149B268b8B8101E2b5DF84a601327484cB43221c,0x367120bf791cC03F040E2574AeA0ca7790D3D2E5,,FALSE,FN (Beta),FN,,,0x53658c2bfb3ee0da3c7ceb1d64bc72f4bbe81a0115838c36e242e58105a36729,Feb-28-2024 01:31:18 AM +UTC,,,FALSE,FALSE,ATTACK-DETECTOR-PREPARATION,"Tue, 27 Feb 2024 22:49:15 GMT",-10200,not detected on prod,,,,,The malicious one labeled it as safe. The beta version flagged it prior to the attack as soon as the contract was deployed,Logic failed,https://github.com/forta-network/starter-kits/issues/592,,,,,,,,,,ChangeNow,TRUE +2/28/2024,20242,9,Seneca,Mainnet,arbitrary external calls,,"$6,500,000",,0x94641c01a4937f2C8eF930580cF396142a2942DC,nill,,FALSE,FN,FN,,,0x23fcf9d4517f7cc39815b09b0a80c023ab2c8196c826c93b4100f2e26b701286,Feb-28-2024 12:09:59 PM +UTC,,,FALSE,FALSE,,,,,,,,,Seems like certtain contracts of the protocol were compromised. This made some users who approved these ones being scammed. It is pretty similar to a scam in the sense that wrong approval becomes a transfer from,Logic failed,https://github.com/forta-network/starter-kits/issues/470,,,,,,,,,,fixed float,TRUE +2/29/2024,20242,9,Shido Global,Mainnet,Wallet compromise,L1/L2,,,0x1982358C84DA9D0b4B96FC9e8564d132f7d0041F,0xa11a5144d3b0541e1114b9937b433671e7d95d50,,FALSE,TP,TP,ATTACK-DETECTOR-3,"Thu, 29 Feb 2024 03:09:36 GMT",0xed3000ddd8b4feb0902107f97a91815ecee8d7ccb57de9a9dbc50a4c07593cb3,Feb-29-2024 03:04:35 AM +UTC,300 secs,300,FALSE,FALSE,ATTACK-DETECTOR-3,"Thu, 29 Feb 2024 03:05:18 GMT",43,246,,,,,PKC. Address transfered the ownership of the contract and then withdraw. There was a gap there that could have been detected,Logic failed,"https://github.com/forta-network/starter-kits/issues/571 +https://github.com/forta-network/starter-kits/issues/570",,,,,,,,,,Layerswap,TRUE +2/29/2024,20242,9,Atlantis Loans,bsc,Governance,Money Market,"$650,000",,0xEADe071FF23bceF312deC938eCE29f7da62CF45b,0x59123a930E52b52EdB27F91135253331F36cd87c,,FALSE,FN,FN,,,0xc8be9bb15acecaf6b719ede0905d5e408df2f717994f42fec6048104e8ce94c3,Mar-03-2024 02:48:11 AM +UTC,,,FALSE,FALSE,,,,,,,,,Seems that this addres was an expiter of 2023 who tooked over the Atlantis contracts,Logic failed,,,,,,,,,,,, +3/5/2024,20243,10,WOOFi,Arbitrum,oracle manipulation,Dex,"$2,700",,0x9961190b258897bca7a12b8f37f415e689d281c4,"0xc3910dca5d3931f4a10261b8f58e1a19a13e0203, 0x66634590d7d631e3bf85ef4cd6c89ca7479e22bc, 0x2458464afec10e973ac61860718328ce8358be3a",,TRUE,TP,TP,ATTACK-DETECTOR-2,"Tue, 05 Mar 2024 15:43:07 GMT",0x57e555328b7def90e1fc2a0f7aa6df8d601a8f15803800a5aaf0a20382f21fbd,Mar-05-2024 03:42:06 PM +UTC,61 secs,61,TRUE,FALSE,ATTACK-DETECTOR-2,"Tue, 05 Mar 2024 15:43:10 GMT",64,-3,,,,,exploit happened at the same tx of contract deployment. Not much to do here,Early enough,,,,,,,,,,,, +3/5/2024,20243,10,GHT,Mainnet,oracle manipulation,Gaming,"$57,000",,0x096f0f03e4be68d7e6dd39b22a3846b8ce9849a3,,,FALSE,FN,FN,,,0xd17266bcdf30cbcbd7d0b5a006f43141981aeee2e1f860f68c9a1805ecacbc68,Mar-07-2024 04:37:47 AM +UTC,,,FALSE,FALSE,,,,,,,,,Gap between funding and contract creation and contract deployment and time of when it was invoked. Nevertheless seems that the contract is not specifically playing a key roll here. Seems more like a transferfrom() thing,,,,,,,,,,,,Tornado Cash,TRUE +3/6/2024,20243,10,ALP,bsc,insufficient access control,,"$10,000",,0xff61Ba33Ed51322BB716EAb4137Adf985644b94d,0x0eDf13F6BD033F0F267d46C6e9DFf9c7190e0FA0,,FALSE,TP,TP,,"Wed, 06 Mar 2024 08:33:07 GMT",0x9983ca8eaee9ee69629f74537eaf031272af75f1e5a7725911d8b06df17c67ca,Mar-06-2024 08:30:38 AM +UTC,149 secs,149,FALSE,FALSE,ATTACK-DETECTOR-2,"Wed, 06 Mar 2024 08:32:20 GMT",102,47,,,,,gap between fudnign a SC deployment,,https://github.com/forta-network/starter-kits/issues/613,,,,,,,,,,Tornado Cash,TRUE +3/8/2024,20243,10,Unizen,Mainnet,arbitrary external calls,Dex,"$2,600,000",,"0xB660CaE1A59336676ea1887B15Eb3C0BaDB90D78, 0x2ad8aed847e8d4d3da52aabb7d0f5c25729d10df, 0xc596523b77ceb9567279B572c653ECF4BA763CB7",0xa91e156787b248479e58739b711440b6c3822eb2,,TRUE,TP,TP,ATTACK-DETECTOR-2,"Fri, 08 Mar 2024 20:15:03 GMT",0xc12a4155c2c90707138e4aef8883c8f724371145823e2f661f19b93e5b3a9d6e,Mar-08-2024 08:13:35 PM +UTC,88 secs,88,FALSE,FALSE,ATTACK-DETECTOR-2,"Fri, 08 Mar 2024 20:16:43 GMT",180 secs,-93,,,,,Attack happened at the time of the Tx. There were more than one attacker. ,Logic failed,,,,,,,,,,,Tornado Cash,TRUE +3/12/2024,20243,11,Polyhedra,bsc,Wallet compromise,L1/L2,"$700,000",,0x36bF308F6a836f3FbF27c47A135da4992441e8C9,0x1EB905d1E7F046C027a1a726f6318032Bfb9377D,,FALSE,TP,FN,ATTACK-DETECTOR-PREPARATION,"Tue, 12 Mar 2024 19:44:09 GMT",0x591484d3c23a2fd9647e06c91de3aa9d039afafcbd32782b6154eb8cadf82629,Mar-12-2024 07:52:54 PM +UTC,-540 secs,-540,TRUE,TRUE,,,,,,,,,There was a contract deployment but this was PKC. In the transaction I don't see the malicious contract deployed ,Early enough,,,,,,,,,,,Tornado Cash,TRUE +3/13/2024,20243,11,NFP,bsc,Wallet compromise,AI content creation,"$16,000,000",,0x60275d1cC368CF021547a82a51cFb8C055390DA3,nill,,FALSE,FN,FN,,,0xbe8bf34647e2ac1f942313cd80d137c4cc11313959f5a3f3020745b2870ffa34,Mar-13-2024 02:55:44 PM +UTC,,,FALSE,FALSE,,,,,,,,,stolen keys,Logic failed,,,,,,,,,,,, +3/13/2024,20243,11,IT Token,bsc,Reward manipulation,,Not sure,,0xB495573Cd2246e7cc7D6d2B37d779463295e5ab0,0xA199A94379c9a518E3853516AC33fcA122A7Bb1d,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Wed, 13 Mar 2024 14:10:20 GMT",0xb33057f57ce451aa8cbb65508d298fe3c627509cc64a394736dace2671b6dcfa,Mar-13-2024 01:28:47 PM +UTC,2460 secs,2460,FALSE,FALSE,,,,,,,,,there's no coverage for this fundign source,Logic failed,,,,,,,,,,,SWFT swap,TRUE +3/14/2024,20243,11,MO Token,Optimism,Reward manipulation,,"$750,000",,0x4e2c6096985e0b2825d06c16f1c8cdc559c1d6f8,0x700a7002484f2f3b4516e4f3c550fb8d9b080ac1,,FALSE,TP,TP,ATTACK-DETECTOR-2,"Thu, 14 Mar 2024 04:17:40 GMT",0x4ec3061724ca9f0b8d400866dd83b92647ad8c943a1c0ae9ae6c9bd1ef789417,Mar-14-2024 04:16:41 AM +UTC,60 secs,60,FALSE,FALSE,,,,,,,,,there's no coverage for this fundign source,Logic failed,,,,,,,,,,,SWFT swap,TRUE +3/15/2024,20243,11,Zero Name Service,Mainnet,Wallet compromise,Name services,"$1,400,000",,0x6584A486F711eB8aC47aBf78A5C8e218Ee758fa9,0x5604f9ed375960130c17452b2c40fbafce5e0506,,FALSE,TP,FN,ATTACK-DETECTOR-3,"Sat, 16 Mar 2024 03:09:32 GMT",0x42ed3cbc4cfb761f3bceb105f71466d0e2954a955afc1afd509868bb44686c5d,Mar-16-2024 04:54:59 AM +UTC,-6300 secs,-6300,TRUE,TRUE,,,,,,,,,,Early enough,,,,,,,,,,,Tornado Cash,TRUE +3/15/2024,20243,11,Mozaic,Arbitrum,Wallet compromise,Yield farming,"$2,400,000",,0xD6d4e8038DF50803412d1b1Ad2c9845BACf7c52b,nill,,FALSE,FN,FN,,,0x52b78eec8556c24513f92e8344c069fca6a48ec2ae829e5508333ad416d726f4,Mar-15-2024 06:08:00 AM +UTC,,,FALSE,FALSE,,,,,,,,,PKC,Logic failed,,,,,,,,,,,nill,nill +3/16/2024,20243,11,Charlotte Fang,Mainnet,Wallet compromise,NFT collection,"$1,800,000",,"0x778Be423ef77A20A4493f846BdbcDDfc30252cE9, 0x792775AC07c386059Edb610fC4680c42c75de343, ",nill,,FALSE,FN,FN,,,0x275bc80a66c8e84756d7b36e3fd5f199fe9e586848687fd62d37f5ecb321bc50,Mar-16-2024 06:36:35 PM +UTC,,,FALSE,FALSE,,,,,,,,,"pkc. only withdrawal, not contract deployment",Logic failed,,,,,,,,,,,nill,nill +3/19/2024,20243,12,ParaSwap,Mainnet,Function Parameter Validation,Dex,"$24,000",,0x8C036AA7EF5b58922F72f9D9cFd70C9D18AdD40E,0xb4D4bBD2Da296FFf4AC832d193Dd8293Cd241937,,FALSE,FN,FN,,,0x3f4442cc6fd36f0f1d68d28ac48cfd5bce9ae9449efc495ddc62973886213b5e,Mar-26-2024 12:36:23 PM +UTC,,,FALSE,FALSE,,,,,,,,,It was frontran by a MEV bot.,Logic failed,,,,,,,,,,,Unknown,TRUE +3/20/2024,20243,12,Dolomite,Mainnet,arbitrary external calls,Money Market,"$1,800,000",,0x52522D35725836D48E12e64731FA170BCd9423bf,0x7f49ac8fDb38D24B686130E22579C7Efe69b19c0,,FALSE,TP,FN,ATTACK-DETECTOR-2,"Fri, 08 Mar 2024 11:41:34 GMT",0x4e5b294488736d467abcb8d8ef8536a1dcaf8848cb64fdf9f39c3b04c06271b2,Mar-20-2024 04:09:47 PM +UTC,-1036800 secs,-1036800,TRUE,TRUE,,,,,,,,,,,,,,,,,,,,,, +3/20/2024,20243,12,AirDAO,Mainnet,Wallet compromise,L1/L2,"$1,050,000",,0xFD1754f6Cb9DA53c6F26E3E2eE3DE875CC11C7AA,nill,,FALSE,FN,FN,,,0xdab3475f4d8283efdbced3a90ca9c88f81cd598622792aadc4b526ca1cc343fe,Mar-20-2024 06:19:59 AM +UTC,,,FALSE,FALSE,,,,,,,,,transfer initiated by the victim,Logic failed,,,,,,,,,,,,nill +3/23/2024,20243,12,ARK Token,bsc,insufficient access control,,"$200,000",,0xDd309ea4E99B772C1e6a798a6b159211Bb95b22c,0x94598EC1EB8F85D57fBa787Df6B49DBbaBb87F37,,FALSE,FN,FN,,,0xe8b0131fa14d0a96327f6b5690159ffa7650d66376db87366ba78d91f17cd677,Mar-23-2024 01:18:15 PM +UTC,,,FALSE,FALSE,,,,,,,,,Funded by binance- the model did not detect it,Logic failed,,,,,,,,,,,Binance,TRUE +3/23/2024,20243,12,Curio,Mainnet,insufficient access control,RWA,"$16,000,000",,0xdaAa6294C47b5743BDafe0613d1926eE27ae8cf5,0x1e791527aea32cddbd7ceb7f04612db536816545,,FALSE,TP,FN,,"Sat, 23 Mar 2024 17:42:34 GMT",0x4ff4028b03c3df468197358b99f5160e5709e7fce3884cc8ce818856d058e106,Mar-23-2024 05:53:23 PM +UTC,-660 secs,-660,TRUE,TRUE,,,,,,,,,The model was too precise and did not need the funding stage,Early enough,,,,,,,,,,,Unknown,TRUE +3/25/2024,20243,13,ZongZi,bsc,oracle manipulation,Memecoin,"$230,000",,0x2c42824eF89d6EFa7847d3997266b62599560a26,0x0bd0D9BA4f52dB225B265c3Cffa7bc4a418D22A9,,FALSE,FN,FN,,Mar-25-2024 08:25:45 AM +UTC,0x247f4b3dbde9d8ab95c9766588d80f8dae835129225775ebd05a6dd2c69cd79f,Mar-25-2024 08:25:45 AM +UTC,,,FALSE,FALSE,,,,,,,,,,Logic failed,,,,,,,,,,,Fixed float,FALSE +3/26/2024,20243,13,Lava,Arbitrum,Reward manipulation,Money Market,"$340,000",,0x851aa754c39bf23cdaac2025367514dfd7530418,0x3e52c217a902002ca296fe6769c22fedaee9fda1,,FALSE,TP,FN,,"Thu, 29 Feb 2024 15:55:48 GMT",0xcb1a2f5eeb1a767ea5ccbc3665351fadc1af135d12a38c504f8f6eb997e9e603,Mar-28-2024 10:57:33 PM +UTC,-30 days,,TRUE,TRUE,,,,,,,,,It was detected because of another tx but the victim was not detected,Early enough,,,,,,,,,,,Binance,TRUE +3/28/2024,20243,13,Prisma,Mainnet,Function Parameter Validation,Liquid restaking,"$11,600,000",,0x7E39E3B3ff7ADef2613d5Cc49558EAB74B9a4202,0xd996073019c74b2fb94ead236e32032405bc027c,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Thu, 28 Mar 2024 11:23:39 GMT",0x00c503b595946bccaea3d58025b5f9b3726177bbdc9674e634244135282116c7,Mar-28-2024 11:25:11 AM +UTC,-90 secs,-90,TRUE,TRUE,,,,,,,,,,Early enough,,,,,,,,,,,Fixed float,TRUE +4/1/2024,20244,14,ATM Token,bsc,oracle manipulation,,"$182,000",,0x499057D1AE21F2AFE0b46C154f9529201C44c6C1,0x521377c730F2780270A0468308b265662d6b4810,,FALSE,FN,FN,,,0xee10553c26742bec9a4761fd717642d19012bab1704cbced048425070ee21a8a,Apr-01-2024 04:08:49 PM +UTC,,,FALSE,FALSE,,,,,,,,,,Logic failed,,,,,,,,,,,SWFT swap,TRUE +4/1/2024,20244,14,OpenLeverage,bsc,Reward manipulation,Money Market,"$260,000",,0x5bB5b6D41c3e5E41d9b9eD33d12F1537A1293D5f,0xd0C8af170397C04525A02234b65E9a39969F4e93,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,Apr-01-2024 05:18:53 AM +UTC,0x210071108f3e5cd24f49ef4b8bcdc11804984b0c0334e18a9a2cdb4cd5186067,Apr-01-2024 05:19:02 AM +UTC,-13 secs,-13,TRUE,TRUE,,,,,,,,,,Early enough,,OpenLeverage Exploit,,,,,,,,,Tornado Cash,TRUE +4/4/2024,20244,14,WallStreetMemes,bsc,Reentrancy,Memecoin,"$7,000,000",,0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32,0x014eE3c3dE6941cb0202Dd2b30C89309e874B114,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Thu, 04 Apr 2024 16:23:52 GMT",0x5a475a73343519f899527fdb9850f68f8fc73168073c72a3cff8c0c7b8a1e520,Apr-04-2024 04:25:24 PM +UTC,-92 secs,-92,TRUE,TRUE,,,,,,,,,,Early enough,,Walstreet Exploit,,,,,,,,,Tornado Cash,TRUE +4/19/2024,20244,15,Hedgey Finance,Mainnet,,Token Vesting,"$44,700,000",,0xDed2b1a426E1b7d415A40Bcad44e98F47181dda2,0xC793113F1548B97E37c409f39244EE44241bF2b3,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Fri, 19 Apr 2024 07:01:04 GMT",0x2606d459a50ca4920722a111745c2eeced1d8a01ff25ee762e22d5d4b1595739,Apr-19-2024 07:06:47 AM +UTC,-342 secs,-342,TRUE,TRUE,,,,,,,,,,Early enough,,,,,,,,,,,Unknown,TRUE +4/14/2024,20244,15,GFA Token,bsc,insufficient access control,,"$15,500",,0x0740100ad48D22Bc648901520a313B46557f8ada,0xbF65cADB3F637e87271A4D9a62F03a634A61A19C,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Sun, 14 Apr 2024 16:41:30 GMT",0xe15d6f7fa891c2626819209edf2d5ded6948310eaada067b400062aa022ce718,Apr-14-2024 04:50:08 PM +UTC,-540 secs,-540,TRUE,TRUE,,,,,,,,,,Early enough,,GFA attack ,,,,,,,,,Tornado Cash,TRUE +4/14/2024,20244,15,Hackathon,bsc,Reward manipulation,,"$40,000",,0xF4C11ac8040936DA701015E196BC62E645592E6D,0x3907F01C1CAC4e758b97E89aAA761051021C5b77,,FALSE,TP,FN,EARLY-ATTACK-DETECTOR-1,"Sat, 03 Feb 2024 19:52:07 GMT",0xea181f730886ece947e255ab508f5af1d0f569fee3368b651d5dbb28549087b5,Apr-14-2024 01:43:56 PM +UTC,,,TRUE,TRUE,,,,,,,,,,Early enough,,,,,,,,,,,Previous attacker,TRUE +4/15/2024,20244,15,Chainge Finance,bsc,arbitrary external calls,Bridge,"$710,000",,0x6eEc0F4c017AFe3DfAdF32b51339C37E9fD59dFb,0x791c6542bC52eFE4F20Df0ee672b88579ae3Fd9A,,FALSE,FN,FN,,,0x051276afa96f2a2bd2ac224339793d82f6076f76ffa8d1b9e6febd49a4ec11b2,Apr-15-2024 11:42:54 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,SWFT Swap,TRUE +4/16/2024,20244,15,SATX,bsc,logic error,,"$27,000",,0xBEF24B94C205999ea17d2ae4941cE849C9114bfd,0x9C63d6328C8e989c99b8e01DE6825e998778B103,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Tue, 16 Apr 2024 15:54:12 GMT",0x7e02ee7242a672fb84458d12198fae4122d7029ba64f3673e7800d811a8de93f,Apr-16-2024 04:08:55 PM +UTC,-780 secs,-780,TRUE,TRUE,,,,,,,,,,Early enough,,,,,,,,,,,Tornado Cash,TRUE +4/16/2024,20244,15,Mars,bsc,Reward manipulation,,"$100,000",,0x306174B707EbF6d7301a0BCd898ae1666Ec176ae,0x797acb321Cb10154AA807FCd1e155C34135483CD,,FALSE,FN,FN,,,0x25e2af0a55581d5629a933af9fedd3c70e6d0c320f0b72700ca80e5cdd36c80b,Apr-16-2024 06:51:10 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,FALSE +4/24/2024,20244,16,SaitaChain,Mainnet,,,"$1,000,000",,0x0cFC28d16d07219249c6D6d6AE24E7132EE4CaA7,0x899266243FD2B9A0426B58BD6d534c6b813Ef27a,,FALSE,FN,FN,,,0x903d88a92cbc0165a7f662305ac1bff97430dbcccaa0fe71e101e18aa9109c92,Apr-24-2024 07:19:35 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +4/25/2024,20244,16,NGFS,bsc,,,"$190,000",,0xd03d360dfc1dac7935e114d564a088077e6754a0,0xC73781107d086754314f7720cA14aB8C5aD035E4,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,,0x8ff764dde572928c353716358e271638fa05af54be69f043df72ad9ad054de25,Apr-25-2024 11:18:05 AM +UTC,-81 secs,-81,TRUE,TRUE,,,,,,,,,,Early enough,,NGFS exploit,,,,,,,,,Tornado Cash,TRUE +4/25/2024,20244,16,PikeFinance,Arbitrum,,Money Market,"$300,000",,0x19066f7431df29A0910d287C8822936Bb7D89E23,0x1da4Bc596BFb1087f2F7999b0340Fcba03C47fbD,,FALSE,TP,TP,,,0x979ad9b7f5331ea8034305a83b5cd50aea88adec395fff8298dd90eb1b87667f,Apr-25-2024 11:48:09 PM +UTC,,,FALSE,FALSE,,,,,,,,,Address was funded in optimism by another EOA. Then use stargat to bridge to Arbitrum,,,,,,,,,,,,Binance,FALSE +4/27/2024,20244,16,EmberSword,Polygon,,Gaming,"$195,000",,0x268a663584B219A09c3C67Aaeb353cC3Ab0ef5F0,0xf423D93de1314D0549A6A8F6165238DAC97582b3,,FALSE,FN,FN,,,0x11a62441b20e74d586e761885659c3cb45cbc447c89c73c5fd892a634cb8af76,Apr-27-2024 06:20:29 PM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,ChangeNow,FALSE +2/22/2024,20244,16,Z123,bsc,oracle manipulation,,"$136,000",,0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32,0x61Dd07Ce0cEcF0d7BaCf5EB208C57D16bBdEE168,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Mon, 22 Apr 2024 07:55:29 GMT",0xc0c4e99a76da80a4cf43d3110364840151226c0a197c1728bb60dc3f1b3a6a27,Apr-22-2024 08:02:00 AM +UTC,-420 secs,-420,TRUE,TRUE,,,,,,,,,This attacker was the wall street meme one. 0x3026C464d3Bd6Ef0CeD0D49e80f171b58176Ce32,,,,,,,,,,,,Tornado Cash,TRUE +4/23/2024,20244,16,Magpie Protocol,Mainnet,Function Parameter Injection,Bridge,"$129,000",,0xC14cD93b3839De80fFC2D421a8d8d220cC6ad3Bf,nill,,FALSE,FN,FN,,,0xe0fff7e33dc463d7896c900820b8e62e9dae4071fcb43b02e39e48554cc869e6,Apr-23-2024 08:20:47 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,Nill +4/24/2024,20244,16,YIEDL,Mainnet,Function Parameter Validation,,"$300,000",,0x322696471792440499B1979E0a440491E870667a,0x53a3a3eb8897346864a291e6286319c9811be2dd,,TRUE,FN,FN,,,0x49ca5e188c538b4f2efb45552f13309cc0dd1f3592eee54decfc9da54620c2ec,Apr-24-2024 01:24:43 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,ChangeNow,TRUE +4/28/2024,20244,16,X-413,bsc,Reward manipulation,,"$1,400",,0x9f0324a01F6ad1cC78c71D6160AF8E9bce3DD1Ea,0xF9150295f87e3Ec02Ef4cCdef6c8f78D70dE3c63,,FALSE,FN,FN,,,0x0403021513d66c797edd7243cbf54ec24aeed0959b53c494791b480b4503a5d2,Apr-27-2024 07:39:19 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +4/30/2024,20244,17,Yield,Arbitrum,Reward manipulation,Money Market,"$181,000",,0x1abe06f451e2d569b3e9123baf33b51f68878656,0xd775Fd7b76424A553E4ADce6c2f99be419cE8d41,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Tue, 30 Apr 2024 01:20:02 GMT",0x6caa65b3fc5c8d4c7104574c3a15cd6208f742f9ada7d81ba027b20473137705,Apr-30-2024 01:19:59 AM +UTC,3 secs,3,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Unknown,TRUE +4/30/2024,20244,17,Pike (2),"Ethereum, Optimism, Arbitrum",,Money Market,"$1,600,000",,0x19066f7431df29A0910d287C8822936Bb7D89E23,0x1da4Bc596BFb1087f2F7999b0340Fcba03C47fbD,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Tue, 30 Apr 2024 22:13:14 GMT",0xe2912b8bf34d561983f2ae95f34e33ecc7792a2905a3e317fcc98052bce66431,Apr-30-2024 10:19:11 PM +UTC,-360 secs,-360,TRUE,TRUE,,,,,,,,,,Early enough,,,,,,,,,,,, +5/5/2024,20245,17,GNUS,Fantom,Wallet compromise,,"$1,270,000",,0x548c63A6A7299AB54762E1BFA6b56c1B94C2A820,,,FALSE,FN,FN,,,0xd7dbbf47e4454a94f30f0ff034e3fb0040895347a41d974d524f7af066b4677d,May-05-2024 08:52:32 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Unknown,TRUE +5/5/2024,20245,18,Saturn Token,bsc,Reward manipulation,,"$8,000",,0xc468D9A3a5557BfF457586438c130E3AFbeC2ff9,0xfcECDBC62DEe7233E1c831D06653b5bEa7845FcC,,FALSE,TP,FN,EARLY-ATTACK-DETECTOR-1,,0x948132f219c0a1adbffbee5d9dc63bec676dd69341a6eca23790632cb9475312,May-06-2024 03:09:14 PM +UTC,,,TRUE,TRUE,,,,,,,,,It was not falgged specifically for the contract,,,,,,,,,,,,Tornado Cash,TRUE +5/6/2024,20245,18,OSN Token,bsc,Reward manipulation,,"$110,000",,0x835B45D38cbDccf99E609436FF38E31Ac05bc502,0x4A5ACAc3B62eF37CF6Aaf21BAf133323a18daFc2,,FALSE,TP,FN,,,0x03db905062fe4afbae22a8abd5c1e76c709d03cda6d7a9baefc7dd7aa1ee6681,May-06-2024 06:13:21 AM +UTC,,,TRUE,TRUE,,,,,,,,,It was not falgged specifically for the contract,,,,,,,,,,,,Previous exploiter,TRUE +5/6/2024,20245,18,Perpy Finance,Arbitrum,insufficient access control,,"$130,000",,0xcbB4771d7299b711C3306beE8ad1E18586ECFb25,0x3dec73c9cfac55b3c219d153a77048747c515f418f7c59a80ec205929d169828,,FALSE,FN,FN,,,0xb6cce4d6f5d43e36ded448a0954912aec7e40a637b0966855f60dc158978253e,May-06-2024 05:16:12 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +5/8/2024,20245,18,GPU,bsc,Function Parameter Validation,,"$32,000",,0xcC78063840428c5aE53f3DC6D80759984788Cbc0,0x5234001627a376f5e0accb082548a283b1fa1586,,TRUE,FN,FN,,,0x5234001627a376f5e0accb082548a283b1fa1586,May-08-2024 10:01:39 AM +UTC,,,FALSE,FALSE,,,,,,,,,Neurablock detected,,,,,,,,,,,,Tornado Cash,TRUE +5/10/2024,20245,18,Galaxy Fox,Mainnet,insufficient access control,Gaming,"$330,000",,0xFcE19F8f823759b5867ef9a5055A376f20c5E454,nill,,FALSE,TP,FN,EARLY-ATTACK-DETECTOR-1,,0x12fe79f1de8aed0ba947cec4dce5d33368d649903cb45a5d3e915cc459e751fc,May-10-2024 12:00:35 AM +UTC,,,TRUE,TRUE,,,,,,,,,The contract invoke was in order to make the swap. Also this address was flagged for other contract creatios,,,,,,,,,,,,Tornado Cash,TRUE +5/14/2024,20245,19,Alex Lab XLink Bridge,bsc,Wallet compromise,Bridge,"$4,300,000",,0x27055aE433E9DCb30f6EbCC1A374Cf5CC03C484E,nill,,FALSE,TP,FN,,,0x47e123af93add709bc2516f6a5db057dfbb1d66a75b693cd7980cd3eb28c7357,May-14-2024 04:44:03 PM +UTC,,,TRUE,TRUE,,,,,,,,,It was not falgged specifically for the contract,,,,,,,,,,,,Tornado Cash,TRUE +5/14/2024,20245,19,Predy Finance,Arbitrum,Reentrancy,Dex,"$464,000",,"0x76b02ab483482740248e2ab38b5a879a31c6d008, 0xe1783b01639818ec1069890eff251f26ea936653",0x8afFdD350eb754b4652D9EA5070579394280CaD9,,FALSE,FN,FN,,,0xbe163f651d23f0c9e4d4a443c0cc163134a31a1c2761b60188adcfd33178f50f,May-14-2024 07:41:28 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,FixedFloat,FALSE +5/15/2024,20245,19,Sonne Finance,Optimism,Rounding error,Money Market,"$20,000,000",,0xae4A7cDe7C99fb98B0D5fA414aa40F0300531F43,"0x02FA2625825917E9b1F8346a465dE1bBC150C5B9, 0xa16388a6210545b27f669d5189648c1722300b8b, 0xeAcb3F631b22b83C00C39A7Aa81dd934e1eEaF77, 0x4DB82acaDd1E2FfE7Caa24d75c5a777bBE34413f, 0x15648Fb6De609a1130837041a13477FdF09D8070",,FALSE,FN,FN,,,0x67632758ce19a41648f28fba6d3d87c7248202238234137bb4741da097cfa029,May-14-2024 10:18:15 PM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Binance,FALSE +5/17/2024,20245,19,TCH,bsc,Signature maliability,,"$19,000",,0xB9596D6e53d81981b9f06Ca2Ca6d3E422232d575,0x258850eC735F6532FE34FE24EF9628992a9b7E84,,FALSE,FN,FN,,,0xa94338d8aa312ed4b97b2a4dcb27f632b1ade6f3abec667e3bf9f002a75dabe0,May-16-2024 03:42:08 PM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +5/20/2024,20245,20,Gala,Mainnet,Wallet compromise,Gaming,"$22,300,000",,0xe2Ca471124b124831e231fb835778840Ad100F97,nill,,FALSE,FN,FN,,,0xa6d90abe17d17743a9cecab84bcefb0fd0bbfa0c61bba60fd2f680b0a2f077fe,May-20-2024 07:32:11 PM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,nill,nill +5/22/2024,20245,20,Yon,bsc,insufficient access control,,"$118,000",,0xbc9271380b4589E08AF015069EEE7bb57869Cf06,0xCE16B676eB31B47DCbc284f193b4FF41268E4e70,,FALSE,FN,FN,,,0x5b3ffec387b5e77b3fc1c6423ea2cbc47b2a8dacd74eb9f20bdfd852f5c28215,May-22-2024 09:23:30 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Unknwon,TRUE +5/27/2024,20245,21,RedKey,bsc,,,"$10,584.70",,0x36A6135672035507B772279d99a9F7445f2D1601,0x471038827C05C87C23E9dba5331c753337FD918B,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,27 May 2024 05:00:42 GMT,0x8d5fb97b35b830f8addcf31c8e0c6135f15bbc2163d891a3701ada0ad654d427,May-27-2024 05:23:59 AM +UTC,-1380 secs,-1380,TRUE,TRUE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +5/29/2024,20245,21,Metadragon,bsc,,,"$181,000.00",,0xc468D9A3a5557BfF457586438c130E3AFbeC2ff9,0xDAEF6079Cb84405Dac688a9f6956C6830b7DdBc6,,FALSE,TP,TP,EARLY-ATTACK-DETECTOR-1,"Wed, 29 May 2024 08:45:26 GMT",0x872f1d93f95e73e37aeedd3e658b557c1901c5bbb86ba98c59bdb7213f0d24fa,May-29-2024 08:47:23 AM +UTC,-120 secs,-120,TRUE,TRUE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +5/28/2024,20245,21,Orion,bsc,,,"$150,000.00",,0x51177DB1Ff3b450007958447946A2EEe388288D2,0xF8BfaC82BdD7aC82D3AEEC98B9E1e73579509DB6,,FALSE,FN,FN,,,0x660837a1640dd9cc0561ab7ff6c85325edebfa17d8b11a3bb94457ba6dcae18c,May-28-2024 04:25:10 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,ChangeNow,TRUE +5/28/2024,20245,21,BTC,bsc,,,"$51,000.00",,0x762faC581205423F5029F01F699B78582485D054,0xc88D7A06b2797f0a5D19165c897e30618275cB30,,FALSE,TP,FN,EARLY-ATTACK-DETECTOR-1,"Sun, 26 May 2024 08:55:36 GMT",0x404caef2a7eab0c35d3e4770fb950373304f5c9d109281c2f56d09bbf5aaccac,May-27-2024 05:02:59 PM +UTC,,,TRUE,TRUE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +5/29/2024,20245,21,Scroll network,Mainnet,,,"$294,000",,0x55Db954F0121E09ec838a20c216eABf35Ca32cDD,0x55f5aac4466eb9b7bbeee8c05b365e5b18b5afcc,,TRUE,TP,FN,EARLY-ATTACK-DETECTOR-1,"Tue, 28 May 2024 22:33:07 GMT",0x661505c39efe1174da44e0548158db95e8e71ce867d5b7190b9eabc9f314fe91,May-28-2024 11:21:35 PM +UTC,-1680 secs,-1680,TRUE,TRUE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,TRUE +5/29/2024,20245,21,Excommunity,bsc,,,"$37,000.00",,0xb6911DEE6a5b1c65Ad1aC11A99AeC09C2Cf83c0e,0x30EEEc783c7C4d5b557c69620a54239BED9ABf1c,,FALSE,FN,FN,,,0x5446bf2b57749abdab01813a50ce36246177f3437599f3a56bc1554f596b2c3a,May-28-2024 06:05:33 PM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,ChangeNow,FALSE +5/31/2024,20245,21,Liquidity,bsc,,,"$160,000.00",,0x6951EB8a4A1DAb360F2230Fb654551335d560ec0,0xbDFbb387FBF20379c016998Ac609871C3357D749,,FALSE,FN,FN,,,0x1350cc72865420ba5d3c27234fd4665ad25c021b0a75ba03bc8340a1b1f98a45,May-31-2024 08:37:14 AM +UTC,,,FALSE,FALSE,,,,,,,,,,,,,,,,,,,,,Tornado Cash,FALSE \ No newline at end of file From 0cda94fdb1f4526d1a471756444368547693cc7a Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 4 Jun 2024 17:14:17 -0500 Subject: [PATCH 06/21] Update bot logic to fetch and use TP list --- early-attack-detector-py/src/agent.py | 43 ++++++++++++++++++++++----- 1 file changed, 35 insertions(+), 8 deletions(-) diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index 561b9841..c25c1219 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -21,6 +21,8 @@ FUNDING_TIME, EXTRA_TIME_BOTS, EXTRA_TIME_DAYS, + ETH_BLOCKS_IN_ONE_DAY, + THREE_SECOND_BLOCKS_IN_ONE_DAY ) from src.findings import ContractFindings from src.logger import logger @@ -30,6 +32,8 @@ get_function_signatures, get_storage_addresses, is_contract, + get_tp_attacker_list, + update_tp_attacker_list ) from src.storage import get_secrets @@ -41,7 +45,7 @@ def initialize(): """ - this function loads the ml model. + this function loads the ml model and fetches the list of true positive attackers """ global CHAIN_ID @@ -80,6 +84,9 @@ def initialize(): BETA = 'beta' in package['name'] logger.info(f"Beta: {BETA}") + global TP_ATTACKER_LIST + TP_ATTACKER_LIST = get_tp_attacker_list() + def exec_model(w3, opcodes: str, contract_creator: str) -> tuple: """ @@ -262,7 +269,10 @@ def detect_malicious_contract( findings = [] if created_contract_address is not None and code is not None: - if len(code) > BYTE_CODE_LENGTH_THRESHOLD: + from_label_type = "contract" if is_contract(w3, from_) else "eoa" + from_eoa_in_tp_list = from_label_type == "eoa" and from_ in TP_ATTACKER_LIST + + if (len(code) > BYTE_CODE_LENGTH_THRESHOLD) or from_eoa_in_tp_list: try: opcodes = EvmBytecode(code).disassemble() except Exception as e: @@ -275,12 +285,12 @@ def detect_malicious_contract( function_signatures = get_function_signatures(w3, opcodes) logger.info(f"{created_contract_address}: score={model_score}") - if model_score is None or model_score < MODEL_INFO_THRESHOLD: + if model_score is None or model_score < MODEL_INFO_THRESHOLD and not from_eoa_in_tp_list: if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_INFO_THRESHOLD}. Not creating alert.") return [] # If we are not in beta, we only create alerts if the score is above the threshold - if model_score < MODEL_THRESHOLD and not BETA: + if model_score < MODEL_THRESHOLD and not BETA and not from_eoa_in_tp_list: if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_THRESHOLD} and we are not in beta. Not checking for labels.") return [] @@ -299,10 +309,9 @@ def detect_malicious_contract( MODEL_THRESHOLD, error=error, ) - if model_score is not None and model_score >= MODEL_INFO_THRESHOLD: + if (model_score is not None and model_score >= MODEL_INFO_THRESHOLD) or from_eoa_in_tp_list: # If it's a potential alert, we create labels. Otherwise, we don't - if model_score >= MODEL_THRESHOLD: - from_label_type = "contract" if is_contract(w3, from_) else "eoa" + if (model_score >= MODEL_THRESHOLD) or from_eoa_in_tp_list: labels = [ { "entity": created_contract_address, @@ -326,7 +335,7 @@ def detect_malicious_contract( "entity": from_, "entity_type": EntityType.Address, "label": "attacker", - "confidence": model_score, + "confidence": 1.0 if from_eoa_in_tp_list else model_score, }, ] severity = FindingSeverity.Critical @@ -359,6 +368,24 @@ def handle_transaction( ): return real_handle_transaction(transaction_event) +def provide_handle_block(w3): + def handle_block(block_event: forta_agent.block_event.BlockEvent) -> list: + findings = [] + + DAILY_BLOCKS_DENOMINATOR = ETH_BLOCKS_IN_ONE_DAY if CHAIN_ID == 1 else THREE_SECOND_BLOCKS_IN_ONE_DAY + if block_event.block_number % DAILY_BLOCKS_DENOMINATOR == 0: + global TP_ATTACKER_LIST + TP_ATTACKER_LIST = update_tp_attacker_list(TP_ATTACKER_LIST) + return findings + + return handle_block + + +real_handle_block = provide_handle_block(web3) + + +def handle_block(block_event: forta_agent.block_event.BlockEvent): + return real_handle_block(block_event) def check_funding_labels(address: str, tx_timestamp: int, n_days: int=365, extra_time_bots: str=None, extra_time: int=180): t = time.time() From 7c966c1e1b16dfe55aff67f70daa1bbc801c9cfd Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Wed, 5 Jun 2024 09:35:03 -0500 Subject: [PATCH 07/21] Clarity for 'blocks in a day' constants --- early-attack-detector-py/src/constants.py | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/early-attack-detector-py/src/constants.py b/early-attack-detector-py/src/constants.py index b1add51c..b5fffc7f 100644 --- a/early-attack-detector-py/src/constants.py +++ b/early-attack-detector-py/src/constants.py @@ -35,5 +35,10 @@ ] EXTRA_TIME_DAYS = 180 -ETH_BLOCKS_IN_ONE_DAY = 7200 -THREE_SECOND_BLOCKS_IN_ONE_DAY = 28800 \ No newline at end of file +ONE_DAY = 60 * 60 * 24 +THREE_SECOND_BLOCK_TIME = 3 +ETH_BLOCK_TIME = 12 +ETH_BLOCKS_IN_ONE_DAY = ONE_DAY / ETH_BLOCK_TIME +# Amount of blocks in a day for faster chains +# Using 3 second block times as the average +THREE_SECOND_BLOCKS_IN_ONE_DAY = ONE_DAY / THREE_SECOND_BLOCK_TIME \ No newline at end of file From 93c190a155beb1a8e1851fa96703d722e247779b Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Wed, 5 Jun 2024 09:36:22 -0500 Subject: [PATCH 08/21] Add '.lower()' for checksum addresses --- early-attack-detector-py/src/utils.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index 81bdf135..47a0761a 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -144,9 +144,9 @@ def get_tp_attacker_list() -> list: parts = [part.strip() for part in entry.split(',')] for part in parts: if eth_address_pattern.match(part): - unique_attacker_addresses.add(part) + unique_attacker_addresses.add(part.lower()) else: - non_eth_entries.append(part) + non_eth_entries.append(part.lower()) return list(unique_attacker_addresses) From 46b1d0080fee1a14c72d87f34a45ec78d946ae00 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Wed, 5 Jun 2024 09:37:32 -0500 Subject: [PATCH 09/21] Add copyin of tp_list.csv in Dockerfile --- early-attack-detector-py/Dockerfile | 1 + 1 file changed, 1 insertion(+) diff --git a/early-attack-detector-py/Dockerfile b/early-attack-detector-py/Dockerfile index cacc1b7b..070c1cfc 100644 --- a/early-attack-detector-py/Dockerfile +++ b/early-attack-detector-py/Dockerfile @@ -24,6 +24,7 @@ ENV NODE_ENV=production LABEL "network.forta.settings.agent-logs.enable"="true" WORKDIR /app COPY ./src ./src +COPY ./tp_list.csv ./ COPY ./deployed_models ./deployed_models COPY package*.json ./ COPY requirements.txt ./ From 345b40ab77c1b064657e152db5039f4f2ecef789 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Wed, 5 Jun 2024 09:40:39 -0500 Subject: [PATCH 10/21] Update to nest 'is_contract' deeper; add needed parenthesis --- early-attack-detector-py/src/agent.py | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index c25c1219..5d1366ca 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -269,8 +269,7 @@ def detect_malicious_contract( findings = [] if created_contract_address is not None and code is not None: - from_label_type = "contract" if is_contract(w3, from_) else "eoa" - from_eoa_in_tp_list = from_label_type == "eoa" and from_ in TP_ATTACKER_LIST + from_eoa_in_tp_list = from_ in TP_ATTACKER_LIST if (len(code) > BYTE_CODE_LENGTH_THRESHOLD) or from_eoa_in_tp_list: try: @@ -285,12 +284,12 @@ def detect_malicious_contract( function_signatures = get_function_signatures(w3, opcodes) logger.info(f"{created_contract_address}: score={model_score}") - if model_score is None or model_score < MODEL_INFO_THRESHOLD and not from_eoa_in_tp_list: + if (model_score is None or model_score < MODEL_INFO_THRESHOLD) and not from_eoa_in_tp_list: if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_INFO_THRESHOLD}. Not creating alert.") return [] # If we are not in beta, we only create alerts if the score is above the threshold - if model_score < MODEL_THRESHOLD and not BETA and not from_eoa_in_tp_list: + if (model_score < MODEL_THRESHOLD and not BETA) and not from_eoa_in_tp_list: if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_THRESHOLD} and we are not in beta. Not checking for labels.") return [] @@ -310,6 +309,7 @@ def detect_malicious_contract( error=error, ) if (model_score is not None and model_score >= MODEL_INFO_THRESHOLD) or from_eoa_in_tp_list: + from_label_type = "eoa" if from_eoa_in_tp_list else "contract" if is_contract(w3, from_) else "eoa" # If it's a potential alert, we create labels. Otherwise, we don't if (model_score >= MODEL_THRESHOLD) or from_eoa_in_tp_list: labels = [ @@ -372,6 +372,8 @@ def provide_handle_block(w3): def handle_block(block_event: forta_agent.block_event.BlockEvent) -> list: findings = [] + # Choosing the denomincator based on chain's block time + # so as to update TP list approx. once daily DAILY_BLOCKS_DENOMINATOR = ETH_BLOCKS_IN_ONE_DAY if CHAIN_ID == 1 else THREE_SECOND_BLOCKS_IN_ONE_DAY if block_event.block_number % DAILY_BLOCKS_DENOMINATOR == 0: global TP_ATTACKER_LIST From cb611ed542d0a0ce9a1d31bc5ec0fc32a46e09f0 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 11 Jun 2024 17:53:33 -0500 Subject: [PATCH 11/21] Add 'handle_alert' and update 'initialize' for consuming alerts --- early-attack-detector-py/src/agent.py | 44 ++++++++++++++++++++++++--- 1 file changed, 40 insertions(+), 4 deletions(-) diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index 5d1366ca..1fcb004c 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -45,7 +45,9 @@ def initialize(): """ - this function loads the ml model and fetches the list of true positive attackers + this function loads the ml model, fetches the list of true positive attackers, + and returns `alert_config` to subscribe to the Suspicious Funding's "MALICIOUS-FUNDING" + alert id. """ global CHAIN_ID @@ -87,6 +89,18 @@ def initialize(): global TP_ATTACKER_LIST TP_ATTACKER_LIST = get_tp_attacker_list() + alert_config = { + "alertConfig": { + "subscriptions": [ + { + "botId": FUNDING_BOTS[8], + "alertId": "MALICIOUS-FUNDING" + } + ] + } + } + return alert_config + def exec_model(w3, opcodes: str, contract_creator: str) -> tuple: """ @@ -288,7 +302,8 @@ def detect_malicious_contract( if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_INFO_THRESHOLD}. Not creating alert.") return [] - # If we are not in beta, we only create alerts if the score is above the threshold + # If we are not in beta, we create alerts if the score is above the threshold + # or if `from_` is in the True Positive list if (model_score < MODEL_THRESHOLD and not BETA) and not from_eoa_in_tp_list: if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_THRESHOLD} and we are not in beta. Not checking for labels.") @@ -329,7 +344,7 @@ def detect_malicious_contract( "entity": created_contract_address, "entity_type": EntityType.Address, "label": "attacker", - "confidence": model_score, + "confidence": 1.0 if from_eoa_in_tp_list else model_score, }, { "entity": from_, @@ -372,7 +387,7 @@ def provide_handle_block(w3): def handle_block(block_event: forta_agent.block_event.BlockEvent) -> list: findings = [] - # Choosing the denomincator based on chain's block time + # Choosing the denominator based on chain's block time # so as to update TP list approx. once daily DAILY_BLOCKS_DENOMINATOR = ETH_BLOCKS_IN_ONE_DAY if CHAIN_ID == 1 else THREE_SECOND_BLOCKS_IN_ONE_DAY if block_event.block_number % DAILY_BLOCKS_DENOMINATOR == 0: @@ -389,6 +404,27 @@ def handle_block(block_event: forta_agent.block_event.BlockEvent) -> list: def handle_block(block_event: forta_agent.block_event.BlockEvent): return real_handle_block(block_event) +def provide_handle_alert(w3): + def handle_alert(alert_event: forta_agent.alert_event.AlertEvent) -> list: + findings = [] + + global TP_ATTACKER_LIST + if alert_event.alert.metadata.sender not in TP_ATTACKER_LIST: + TP_ATTACKER_LIST.append(alert_event.alert.metadata.sender.lower()) + + TP_ATTACKER_LIST.append(alert_event.alert.metadata.receiver.lower()) + + return findings + + return handle_alert + + +real_handle_alert = provide_handle_alert(web3) + + +def handle_alert(alert_event: forta_agent.alert_event.AlertEvent): + return real_handle_alert(alert_event) + def check_funding_labels(address: str, tx_timestamp: int, n_days: int=365, extra_time_bots: str=None, extra_time: int=180): t = time.time() bots = FUNDING_BOTS From 9521fa676a2e4bf30bf1a9472f89b7be077a8e80 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Thu, 13 Jun 2024 11:22:55 -0500 Subject: [PATCH 12/21] Fix typo: 'fp' => 'tp' --- early-attack-detector-py/src/utils.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index 47a0761a..bc4e5977 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -124,7 +124,7 @@ def alert_count(chain_id: int, alert_id: str) -> int: def get_tp_attacker_list() -> list: res = requests.get('https://raw.githubusercontent.com/forta-network/starter-kits/main/early-attack-detector-py/tp_list.csv') - logging.info(f"Made request to fetch fp list: {res.status_code}") + logging.info(f"Made request to fetch tp list: {res.status_code}") content = res.content.decode('utf-8') if res.status_code == 200 else open('tp_list.csv', 'r').read() df_fps = pd.read_csv(io.StringIO(content), sep=',') From be4986c1ac8d1634ea73ddbd2ad522a983517098 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Thu, 13 Jun 2024 15:27:24 -0500 Subject: [PATCH 13/21] Key access syntax in 'handle_alert' plus cleanup --- early-attack-detector-py/src/agent.py | 37 ++++++++++++++------------- 1 file changed, 19 insertions(+), 18 deletions(-) diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index 1fcb004c..5657bfb7 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -298,16 +298,17 @@ def detect_malicious_contract( function_signatures = get_function_signatures(w3, opcodes) logger.info(f"{created_contract_address}: score={model_score}") - if (model_score is None or model_score < MODEL_INFO_THRESHOLD) and not from_eoa_in_tp_list: - if ENV == 'dev': - logger.info(f"Score is less than threshold: {model_score} < {MODEL_INFO_THRESHOLD}. Not creating alert.") - return [] - # If we are not in beta, we create alerts if the score is above the threshold - # or if `from_` is in the True Positive list - if (model_score < MODEL_THRESHOLD and not BETA) and not from_eoa_in_tp_list: - if ENV == 'dev': - logger.info(f"Score is less than threshold: {model_score} < {MODEL_THRESHOLD} and we are not in beta. Not checking for labels.") - return [] + if not from_eoa_in_tp_list: + if model_score is None or model_score < MODEL_INFO_THRESHOLD: + if ENV == 'dev': + logger.info(f"Score is less than threshold: {model_score} < {MODEL_INFO_THRESHOLD}. Not creating alert.") + return [] + # If we are not in beta, we create alerts if the score is above the threshold + # or if `from_` is in the True Positive list + if model_score < MODEL_THRESHOLD and not BETA: + if ENV == 'dev': + logger.info(f"Score is less than threshold: {model_score} < {MODEL_THRESHOLD} and we are not in beta. Not checking for labels.") + return [] # obtain all the addresses contained in the created contract and propagate to the findings # We only do it if the model score is above the threshold env_t = time.time() @@ -324,7 +325,7 @@ def detect_malicious_contract( error=error, ) if (model_score is not None and model_score >= MODEL_INFO_THRESHOLD) or from_eoa_in_tp_list: - from_label_type = "eoa" if from_eoa_in_tp_list else "contract" if is_contract(w3, from_) else "eoa" + from_label_type = "eoa" if from_eoa_in_tp_list or not is_contract(w3, from_) else "contract" # If it's a potential alert, we create labels. Otherwise, we don't if (model_score >= MODEL_THRESHOLD) or from_eoa_in_tp_list: labels = [ @@ -383,7 +384,7 @@ def handle_transaction( ): return real_handle_transaction(transaction_event) -def provide_handle_block(w3): +def provide_handle_block(): def handle_block(block_event: forta_agent.block_event.BlockEvent) -> list: findings = [] @@ -398,28 +399,28 @@ def handle_block(block_event: forta_agent.block_event.BlockEvent) -> list: return handle_block -real_handle_block = provide_handle_block(web3) +real_handle_block = provide_handle_block() def handle_block(block_event: forta_agent.block_event.BlockEvent): return real_handle_block(block_event) -def provide_handle_alert(w3): +def provide_handle_alert(): def handle_alert(alert_event: forta_agent.alert_event.AlertEvent) -> list: findings = [] global TP_ATTACKER_LIST - if alert_event.alert.metadata.sender not in TP_ATTACKER_LIST: - TP_ATTACKER_LIST.append(alert_event.alert.metadata.sender.lower()) + if alert_event.alert.metadata['sender'].lower() not in TP_ATTACKER_LIST: + TP_ATTACKER_LIST.append(alert_event.alert.metadata['sender'].lower()) - TP_ATTACKER_LIST.append(alert_event.alert.metadata.receiver.lower()) + TP_ATTACKER_LIST.append(alert_event.alert.metadata['receiver'].lower()) return findings return handle_alert -real_handle_alert = provide_handle_alert(web3) +real_handle_alert = provide_handle_alert() def handle_alert(alert_event: forta_agent.alert_event.AlertEvent): From 04fd411c66829aaaaac3f95eb0fda3ad3e3d5ac4 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Fri, 14 Jun 2024 14:26:13 -0500 Subject: [PATCH 14/21] Bump version to '0.2.3' --- early-attack-detector-py/package-lock.json | 4 ++-- early-attack-detector-py/package.json | 2 +- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/early-attack-detector-py/package-lock.json b/early-attack-detector-py/package-lock.json index 1bba57db..d16f95dd 100644 --- a/early-attack-detector-py/package-lock.json +++ b/early-attack-detector-py/package-lock.json @@ -1,12 +1,12 @@ { "name": "early-attack-detector-py-beta", - "version": "0.2.2", + "version": "0.2.3", "lockfileVersion": 2, "requires": true, "packages": { "": { "name": "early-attack-detector-py-beta", - "version": "0.2.2", + "version": "0.2.3", "hasInstallScript": true, "dependencies": { "forta-agent": "^0.1.48" diff --git a/early-attack-detector-py/package.json b/early-attack-detector-py/package.json index a12fe86d..249c8d79 100644 --- a/early-attack-detector-py/package.json +++ b/early-attack-detector-py/package.json @@ -1,7 +1,7 @@ { "name": "early-attack-detector-py-beta", "displayName": "Early Attack Detector Beta", - "version": "0.2.2", + "version": "0.2.3", "description": "Attack detector focused on detection during preparation", "longDescription": "This bot is designed to detect attacks during the contract deployment phase, before the attack is executed.", "repository": "https://github.com/forta-network/starter-kits/tree/main/early-attack-detector-py", From a6e2635a9556bc5024cb65cf004143c5adc67fad Mon Sep 17 00:00:00 2001 From: Vxatz Date: Thu, 4 Jul 2024 14:37:59 +0300 Subject: [PATCH 15/21] chore: Use hops beta bot --- early-attack-detector-py/package-lock.json | 104 ++++++++++++--------- early-attack-detector-py/release.md | 14 ++- early-attack-detector-py/src/constants.py | 2 +- 3 files changed, 72 insertions(+), 48 deletions(-) diff --git a/early-attack-detector-py/package-lock.json b/early-attack-detector-py/package-lock.json index d16f95dd..cdf70f55 100644 --- a/early-attack-detector-py/package-lock.json +++ b/early-attack-detector-py/package-lock.json @@ -687,25 +687,25 @@ } }, "node_modules/@grpc/grpc-js": { - "version": "1.10.1", - "resolved": "https://registry.npmjs.org/@grpc/grpc-js/-/grpc-js-1.10.1.tgz", - "integrity": "sha512-55ONqFytZExfOIjF1RjXPcVmT/jJqFzbbDqxK9jmRV4nxiYWtL9hENSW1Jfx0SdZfrvoqd44YJ/GJTqfRrawSQ==", + "version": "1.10.10", + "resolved": "https://registry.npmjs.org/@grpc/grpc-js/-/grpc-js-1.10.10.tgz", + "integrity": "sha512-HPa/K5NX6ahMoeBv15njAc/sfF4/jmiXLar9UlC2UfHFKZzsCVLc3wbe7+7qua7w9VPh2/L6EBxyAV7/E8Wftg==", "dependencies": { - "@grpc/proto-loader": "^0.7.8", - "@types/node": ">=12.12.47" + "@grpc/proto-loader": "^0.7.13", + "@js-sdsl/ordered-map": "^4.4.2" }, "engines": { - "node": "^8.13.0 || >=10.10.0" + "node": ">=12.10.0" } }, "node_modules/@grpc/grpc-js/node_modules/@grpc/proto-loader": { - "version": "0.7.10", - "resolved": "https://registry.npmjs.org/@grpc/proto-loader/-/proto-loader-0.7.10.tgz", - "integrity": "sha512-CAqDfoaQ8ykFd9zqBDn4k6iWT9loLAlc2ETmDFS9JCD70gDcnA4L3AFEo2iV7KyAtAAHFW9ftq1Fz+Vsgq80RQ==", + "version": "0.7.13", + "resolved": "https://registry.npmjs.org/@grpc/proto-loader/-/proto-loader-0.7.13.tgz", + "integrity": "sha512-AiXO/bfe9bmxBjxxtYxFAXGZvMaN5s8kO+jBHAJCON8rJoB5YS/D6X7ZNc6XQkuHNmyl4CYaMI1fJ/Gn27RGGw==", "dependencies": { "lodash.camelcase": "^4.3.0", "long": "^5.0.0", - "protobufjs": "^7.2.4", + "protobufjs": "^7.2.5", "yargs": "^17.7.2" }, "bin": { @@ -721,9 +721,9 @@ "integrity": "sha512-lcHwpNoggQTObv5apGNCTdJrO69eHOZMi4BNC+rTLER8iHAqGrUVeLh/irVIM7zTw2bOXA8T6uNPeujwOLg/2Q==" }, "node_modules/@grpc/grpc-js/node_modules/protobufjs": { - "version": "7.2.6", - "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.6.tgz", - "integrity": "sha512-dgJaEDDL6x8ASUZ1YqWciTRrdOuYNzoOf27oHNfdyvKqHr5i0FV7FSLU+aIeFjyFgVxrpTOtQUi0BLLBymZaBw==", + "version": "7.3.2", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.3.2.tgz", + "integrity": "sha512-RXyHaACeqXeqAKGLDl68rQKbmObRsTIn4TYVUUug1KfS47YWCo5MacGITEryugIgZqORCvJWEk4l449POg5Txg==", "hasInstallScript": true, "dependencies": { "@protobufjs/aspromise": "^1.1.2", @@ -796,6 +796,15 @@ "node": ">=10" } }, + "node_modules/@js-sdsl/ordered-map": { + "version": "4.4.2", + "resolved": "https://registry.npmjs.org/@js-sdsl/ordered-map/-/ordered-map-4.4.2.tgz", + "integrity": "sha512-iUKgm52T8HOE/makSxjqoWhe95ZJA1/G1sYsGev2JDKUSS14KAgg1LHb+Ba+IPow0xflbnSkOsZcO08C7w1gYw==", + "funding": { + "type": "opencollective", + "url": "https://opencollective.com/js-sdsl" + } + }, "node_modules/@protobufjs/aspromise": { "version": "1.1.2", "resolved": "https://registry.npmjs.org/@protobufjs/aspromise/-/aspromise-1.1.2.tgz", @@ -1026,12 +1035,12 @@ } }, "node_modules/braces": { - "version": "3.0.2", - "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz", - "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==", + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.3.tgz", + "integrity": "sha512-yQbXgO/OSZVD2IsiLlro+7Hf6Q18EJrKSEsdoMzKePKXct3gvD8oLcOQdIzGupr5Fj+EDe8gO/lxc1BzfMpxvA==", "dev": true, "dependencies": { - "fill-range": "^7.0.1" + "fill-range": "^7.1.1" }, "engines": { "node": ">=8" @@ -1422,9 +1431,9 @@ "integrity": "sha512-W+KJc2dmILlPplD/H4K9l9LcAHAfPtP6BY84uVLXQ6Evcz9Lcg33Y2z1IVblT6xdY54PXYVHEv+0Wpq8Io6zkA==" }, "node_modules/fill-range": { - "version": "7.0.1", - "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz", - "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==", + "version": "7.1.1", + "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.1.1.tgz", + "integrity": "sha512-YsGpe3WHLK8ZYi4tWDg2Jy3ebRz2rXowDxnld4bkQB00cc/1Zw9AWnC0i9ztDJitivtQvaI9KaLyKrc+hBW0yg==", "dev": true, "dependencies": { "to-regex-range": "^5.0.1" @@ -1452,9 +1461,9 @@ "integrity": "sha512-36yxDn5H7OFZQla0/jFJmbIKTdZAQHngCedGxiMmpNfEZM0sdEeT+WczLQrjK6D7o2aiyLYDnkw0R3JK0Qv1RQ==" }, "node_modules/follow-redirects": { - "version": "1.15.5", - "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.5.tgz", - "integrity": "sha512-vSFWUON1B+yAw1VN4xMfxgn5fTUiaOzAJCKBwIIgT/+7CuGy9+r+5gITvP62j3RmaD5Ph65UaERdOSRGUzZtgw==", + "version": "1.15.6", + "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.6.tgz", + "integrity": "sha512-wWN62YITEaOpSK584EZXJafH1AGpO8RVgElfkuXbTOrPX4fIfOyEpW/CsiNd8JdYrAoOvafRTOEnvsO++qCqFA==", "funding": [ { "type": "individual", @@ -2999,22 +3008,22 @@ } }, "@grpc/grpc-js": { - "version": "1.10.1", - "resolved": "https://registry.npmjs.org/@grpc/grpc-js/-/grpc-js-1.10.1.tgz", - "integrity": "sha512-55ONqFytZExfOIjF1RjXPcVmT/jJqFzbbDqxK9jmRV4nxiYWtL9hENSW1Jfx0SdZfrvoqd44YJ/GJTqfRrawSQ==", + "version": "1.10.10", + "resolved": "https://registry.npmjs.org/@grpc/grpc-js/-/grpc-js-1.10.10.tgz", + "integrity": "sha512-HPa/K5NX6ahMoeBv15njAc/sfF4/jmiXLar9UlC2UfHFKZzsCVLc3wbe7+7qua7w9VPh2/L6EBxyAV7/E8Wftg==", "requires": { - "@grpc/proto-loader": "^0.7.8", - "@types/node": ">=12.12.47" + "@grpc/proto-loader": "^0.7.13", + "@js-sdsl/ordered-map": "^4.4.2" }, "dependencies": { "@grpc/proto-loader": { - "version": "0.7.10", - "resolved": "https://registry.npmjs.org/@grpc/proto-loader/-/proto-loader-0.7.10.tgz", - "integrity": "sha512-CAqDfoaQ8ykFd9zqBDn4k6iWT9loLAlc2ETmDFS9JCD70gDcnA4L3AFEo2iV7KyAtAAHFW9ftq1Fz+Vsgq80RQ==", + "version": "0.7.13", + "resolved": "https://registry.npmjs.org/@grpc/proto-loader/-/proto-loader-0.7.13.tgz", + "integrity": "sha512-AiXO/bfe9bmxBjxxtYxFAXGZvMaN5s8kO+jBHAJCON8rJoB5YS/D6X7ZNc6XQkuHNmyl4CYaMI1fJ/Gn27RGGw==", "requires": { "lodash.camelcase": "^4.3.0", "long": "^5.0.0", - "protobufjs": "^7.2.4", + "protobufjs": "^7.2.5", "yargs": "^17.7.2" } }, @@ -3024,9 +3033,9 @@ "integrity": "sha512-lcHwpNoggQTObv5apGNCTdJrO69eHOZMi4BNC+rTLER8iHAqGrUVeLh/irVIM7zTw2bOXA8T6uNPeujwOLg/2Q==" }, "protobufjs": { - "version": "7.2.6", - "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.2.6.tgz", - "integrity": "sha512-dgJaEDDL6x8ASUZ1YqWciTRrdOuYNzoOf27oHNfdyvKqHr5i0FV7FSLU+aIeFjyFgVxrpTOtQUi0BLLBymZaBw==", + "version": "7.3.2", + "resolved": "https://registry.npmjs.org/protobufjs/-/protobufjs-7.3.2.tgz", + "integrity": "sha512-RXyHaACeqXeqAKGLDl68rQKbmObRsTIn4TYVUUug1KfS47YWCo5MacGITEryugIgZqORCvJWEk4l449POg5Txg==", "requires": { "@protobufjs/aspromise": "^1.1.2", "@protobufjs/base64": "^1.1.2", @@ -3087,6 +3096,11 @@ } } }, + "@js-sdsl/ordered-map": { + "version": "4.4.2", + "resolved": "https://registry.npmjs.org/@js-sdsl/ordered-map/-/ordered-map-4.4.2.tgz", + "integrity": "sha512-iUKgm52T8HOE/makSxjqoWhe95ZJA1/G1sYsGev2JDKUSS14KAgg1LHb+Ba+IPow0xflbnSkOsZcO08C7w1gYw==" + }, "@protobufjs/aspromise": { "version": "1.1.2", "resolved": "https://registry.npmjs.org/@protobufjs/aspromise/-/aspromise-1.1.2.tgz", @@ -3284,12 +3298,12 @@ } }, "braces": { - "version": "3.0.2", - "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz", - "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==", + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.3.tgz", + "integrity": "sha512-yQbXgO/OSZVD2IsiLlro+7Hf6Q18EJrKSEsdoMzKePKXct3gvD8oLcOQdIzGupr5Fj+EDe8gO/lxc1BzfMpxvA==", "dev": true, "requires": { - "fill-range": "^7.0.1" + "fill-range": "^7.1.1" } }, "brorand": { @@ -3630,9 +3644,9 @@ "integrity": "sha512-W+KJc2dmILlPplD/H4K9l9LcAHAfPtP6BY84uVLXQ6Evcz9Lcg33Y2z1IVblT6xdY54PXYVHEv+0Wpq8Io6zkA==" }, "fill-range": { - "version": "7.0.1", - "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz", - "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==", + "version": "7.1.1", + "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.1.1.tgz", + "integrity": "sha512-YsGpe3WHLK8ZYi4tWDg2Jy3ebRz2rXowDxnld4bkQB00cc/1Zw9AWnC0i9ztDJitivtQvaI9KaLyKrc+hBW0yg==", "dev": true, "requires": { "to-regex-range": "^5.0.1" @@ -3654,9 +3668,9 @@ "integrity": "sha512-36yxDn5H7OFZQla0/jFJmbIKTdZAQHngCedGxiMmpNfEZM0sdEeT+WczLQrjK6D7o2aiyLYDnkw0R3JK0Qv1RQ==" }, "follow-redirects": { - "version": "1.15.5", - "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.5.tgz", - "integrity": "sha512-vSFWUON1B+yAw1VN4xMfxgn5fTUiaOzAJCKBwIIgT/+7CuGy9+r+5gITvP62j3RmaD5Ph65UaERdOSRGUzZtgw==" + "version": "1.15.6", + "resolved": "https://registry.npmjs.org/follow-redirects/-/follow-redirects-1.15.6.tgz", + "integrity": "sha512-wWN62YITEaOpSK584EZXJafH1AGpO8RVgElfkuXbTOrPX4fIfOyEpW/CsiNd8JdYrAoOvafRTOEnvsO++qCqFA==" }, "form-data": { "version": "4.0.0", diff --git a/early-attack-detector-py/release.md b/early-attack-detector-py/release.md index f99987e3..b1e139cc 100644 --- a/early-attack-detector-py/release.md +++ b/early-attack-detector-py/release.md @@ -1,16 +1,26 @@ # V0 +## V0.2.3 + +- [beta] Added True Positive list and Hops beta bot. + ## V0.2.2 -- [beta] Added squid, 1-hops, and SWFT Swap funding sources + +- [beta] Added squid, 1-hops, and SWFT Swap funding sources +- [prod] Added 1-hops, and SWFT Swap funding sources ## V0.2.1 + - [prod] Removed squid from funding sources temporarily ## V0.2.0 + - Updated model, new threshold. Updated docker version to be more lightweight. ## V0.1.0 + - Updated model ## V0.0.1 -- Initial version of the bot \ No newline at end of file + +- Initial version of the bot diff --git a/early-attack-detector-py/src/constants.py b/early-attack-detector-py/src/constants.py index b5fffc7f..3b5d1825 100644 --- a/early-attack-detector-py/src/constants.py +++ b/early-attack-detector-py/src/constants.py @@ -24,7 +24,7 @@ '0xf2ee3554a13ee126dae179918e89010afc1bfc1ffabd3a381b529632ebf7497a', # funding thorchain '0x29daabf74506f2aa4feb93fa8ec0f4ac61c4e9ba3f3190072bc680bc70e71bd7', # funding eXch '0x9324d7865e1bcb933c19825be8482e995af75c9aeab7547631db4d2cd3522e0e', # funding ChangeNow - '0x90596fcef715e22cc073fdc7018039e7af742276dda1baed03032411480c65fd', # funding with hops + '0x42e35e2f439bb673c8fdb705f48f502b532b4ab41088c30e84792d0bcc3b885a', # funding with hops '0xf1c75d2674ecf85be5e95b4959284ce8ed758885ddd7be64923c893ceff49efe', # SWFT swap ] FUNDING_TIME = 1 # How many days in the past to look for labels From 03ecb901b1f46e13e2a4f90cd53e168068259159 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Thu, 15 Aug 2024 13:45:16 -0500 Subject: [PATCH 16/21] Corretly process when 'from' is in TP list --- early-attack-detector-py/README.md | 1 + early-attack-detector-py/package-lock.json | 4 ++-- early-attack-detector-py/package.json | 2 +- early-attack-detector-py/src/agent.py | 15 ++++++++------- early-attack-detector-py/src/findings.py | 5 ++++- early-attack-detector-py/src/utils.py | 20 ++++++++++++-------- 6 files changed, 28 insertions(+), 19 deletions(-) diff --git a/early-attack-detector-py/README.md b/early-attack-detector-py/README.md index fc3479c2..bab17ae9 100644 --- a/early-attack-detector-py/README.md +++ b/early-attack-detector-py/README.md @@ -79,6 +79,7 @@ The metadata for each alert will contain the following fields: - funding_labels: [optional] When there are potential fundings, the hash(es) to the funding label(s) - model_score: Model score. In case where the alert was raised due to the high precision model, the score will be from the high precision model. - model_threshold: Recall threshold that was being used in the model at the moment of raising the alert +- from_eoa_in_tp_list: [optional] When the transaction initiator is found in a list of known attackers, this value will be set to `"True"`. - oko_contract_explorer: Link to contract explorer Example of high precision model: diff --git a/early-attack-detector-py/package-lock.json b/early-attack-detector-py/package-lock.json index cdf70f55..e057ca55 100644 --- a/early-attack-detector-py/package-lock.json +++ b/early-attack-detector-py/package-lock.json @@ -1,12 +1,12 @@ { "name": "early-attack-detector-py-beta", - "version": "0.2.3", + "version": "0.2.4", "lockfileVersion": 2, "requires": true, "packages": { "": { "name": "early-attack-detector-py-beta", - "version": "0.2.3", + "version": "0.2.4", "hasInstallScript": true, "dependencies": { "forta-agent": "^0.1.48" diff --git a/early-attack-detector-py/package.json b/early-attack-detector-py/package.json index 249c8d79..4bb27a83 100644 --- a/early-attack-detector-py/package.json +++ b/early-attack-detector-py/package.json @@ -1,7 +1,7 @@ { "name": "early-attack-detector-py-beta", "displayName": "Early Attack Detector Beta", - "version": "0.2.3", + "version": "0.2.4", "description": "Attack detector focused on detection during preparation", "longDescription": "This bot is designed to detect attacks during the contract deployment phase, before the attack is executed.", "repository": "https://github.com/forta-network/starter-kits/tree/main/early-attack-detector-py", diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index 5657bfb7..69ed9b7b 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -159,7 +159,7 @@ def detect_malicious_contract_tx( contract_address = calc_contract_address(w3, trace.action.from_, nonce) else: # For contracts creating other contracts, get the nonce using Web3 - nonce = w3.eth.getTransactionCount(Web3.toChecksumAddress(trace.action.from_), transaction_event.block_number) + nonce = w3.eth.getTransactionCount(Web3.to_checksum_address(trace.action.from_), transaction_event.block_number) contract_address = calc_contract_address(w3, trace.action.from_, nonce - 1) logger.warn( @@ -200,12 +200,12 @@ def detect_malicious_contract_tx( finding.metadata["funding_labels"] = ','.join(funding_labels) if float(finding.metadata['model_score']) >= MODEL_PRECISION_THRESHOLD: finding.metadata['high_precision_model'] = True - # If the model is working in high precision, or it has a 1-day funding alert, we raise the alert and continue - if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys(): + # If the model is working in high precision, has a 1-day funding alert, or the txn `from` is in the TP list, we raise the alert and continue + if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'from_eoa_in_tp_list' in finding.metadata.keys(): all_findings.append(finding) continue # This should only trigger in beta and if no critical alert has been raised - if BETA: + elif BETA: if ENV == 'dev': logger.info(f"Checking funding alerts for {trace.action.from_}") funding_alerts, funding_labels = check_funding_labels(trace.action.from_, tx_timestamp=tx_timestamp, n_days=365) @@ -243,12 +243,12 @@ def detect_malicious_contract_tx( finding.metadata["funding_labels"] = ','.join(funding_labels) if float(finding.metadata['model_score']) >= MODEL_PRECISION_THRESHOLD: finding.metadata['high_precision_model'] = True - # If the model is working in high precision, or it has a 1-day funding alert, we raise the alert and continue - if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys(): + # If the model is working in high precision, has a 1-day funding alert, or the txn `from` is in the TP list, we raise the alert and continue + if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'from_eoa_in_tp_list' in finding.metadata.keys(): all_findings.append(finding) continue # This should only trigger in beta and if no critical alert has been raised - if BETA: + elif BETA: if ENV == 'dev': logger.info(f"Checking funding labels for {transaction_event.from_}") funding_alerts, funding_labels = check_funding_labels(transaction_event.from_, tx_timestamp=tx_timestamp, n_days=365) @@ -322,6 +322,7 @@ def detect_malicious_contract( function_signatures, model_score, MODEL_THRESHOLD, + from_eoa_in_tp_list, error=error, ) if (model_score is not None and model_score >= MODEL_INFO_THRESHOLD) or from_eoa_in_tp_list: diff --git a/early-attack-detector-py/src/findings.py b/early-attack-detector-py/src/findings.py index fe2a8786..94427da7 100644 --- a/early-attack-detector-py/src/findings.py +++ b/early-attack-detector-py/src/findings.py @@ -11,6 +11,7 @@ def __init__( function_signatures: set, model_score: float, model_threshold: float, + from_eoa_in_tp_list: bool, error: str = None, ): self.metadata = { @@ -23,7 +24,9 @@ def __init__( "oko_contract_explorer" ] = f"https://oko.palkeo.com/{contract_address}/" self.metadata["model_score"] = str(model_score) - self.metadata["model_threshold"] = str(model_threshold) + self.metadata["model_threshold"] = str(model_threshold), + if from_eoa_in_tp_list: + self.metadata["from_eoa_in_tp_list"] = str(from_eoa_in_tp_list) self.description = ( f"{from_address} created contract {contract_address}" if error is None diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index bc4e5977..fa1a6908 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -22,7 +22,7 @@ def calc_contract_address(w3, address, nonce) -> str: """ address_bytes = bytes.fromhex(address[2:].lower()) - return Web3.toChecksumAddress(Web3.keccak(rlp.encode([address_bytes, nonce]))[-20:]) + return Web3.to_checksum_address(Web3.keccak(rlp.encode([address_bytes, nonce]))[-20:]) def is_contract(w3, address) -> bool: @@ -32,7 +32,7 @@ def is_contract(w3, address) -> bool: """ if address is None: return True - code = w3.eth.get_code(Web3.toChecksumAddress(address)) + code = w3.eth.get_code(Web3.to_checksum_address(address)) return code != HexBytes("0x") def get_function_signatures(w3, opcodes) -> set: @@ -56,7 +56,7 @@ def get_storage_addresses(w3, address) -> set: return set() tp_executor = ThreadPoolExecutor(max_workers=10) - checksumed_address = Web3.toChecksumAddress(address) + checksumed_address = Web3.to_checksum_address(address) futures = [tp_executor.submit(w3.eth.get_storage_at, checksumed_address, i) for i in range(CONTRACT_SLOT_ANALYSIS_DEPTH)] tp_executor.shutdown(wait=True) futures_result = [f.result() for f in futures] @@ -65,7 +65,7 @@ def get_storage_addresses(w3, address) -> set: tp_executor = ThreadPoolExecutor(max_workers=10) futures = [tp_executor.submit(is_contract, w3, address) for address in all_addresses] tp_executor.shutdown(wait=True) - address_set = set([Web3.toChecksumAddress(all_addresses[i]) for i, f in enumerate(futures) if f.result()]) + address_set = set([Web3.to_checksum_address(all_addresses[i]) for i, f in enumerate(futures) if f.result()]) return address_set @@ -90,7 +90,7 @@ def get_features(w3, opcodes, contract_creator) -> list: is_contract_local = is_contract(w3, opcode.operand) checked_contracts[opcode.operand] = is_contract_local if is_contract_local: - opcode_addresses.add(Web3.toChecksumAddress(f"0x{opcode.operand}")) + opcode_addresses.add(Web3.to_checksum_address(f"0x{opcode.operand}")) if opcode_name in {"PUSH4", "PUSH32"}: features.append(opcode.operand) @@ -124,8 +124,12 @@ def alert_count(chain_id: int, alert_id: str) -> int: def get_tp_attacker_list() -> list: res = requests.get('https://raw.githubusercontent.com/forta-network/starter-kits/main/early-attack-detector-py/tp_list.csv') - logging.info(f"Made request to fetch tp list: {res.status_code}") - content = res.content.decode('utf-8') if res.status_code == 200 else open('tp_list.csv', 'r').read() + if res.status_code == 200: + logging.info(f"Successfully made request to fetch tp list: {res.status_code}.") + content = res.content.decode('utf-8') + else: + logging.info(f"Made request to fetch tp list and failed. status code: {res.status_code}. Fetching from 'tp_list.csv'.") + content = open('tp_list.csv', 'r').read() df_fps = pd.read_csv(io.StringIO(content), sep=',') attacker_list = set(df_fps['Attacker'].tolist()) @@ -147,7 +151,7 @@ def get_tp_attacker_list() -> list: unique_attacker_addresses.add(part.lower()) else: non_eth_entries.append(part.lower()) - + return list(unique_attacker_addresses) def update_tp_attacker_list(current_tp_list) -> list: From da474bef52f84c339b1cbc606da39ee93049b67d Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Sun, 18 Aug 2024 15:33:55 -0500 Subject: [PATCH 17/21] Update name from 'from_eoa_in_tp_list' to 'known_past_attacker' --- early-attack-detector-py/README.md | 2 +- early-attack-detector-py/src/agent.py | 22 +++++++++++----------- early-attack-detector-py/src/findings.py | 8 ++++---- 3 files changed, 16 insertions(+), 16 deletions(-) diff --git a/early-attack-detector-py/README.md b/early-attack-detector-py/README.md index bab17ae9..916c6a44 100644 --- a/early-attack-detector-py/README.md +++ b/early-attack-detector-py/README.md @@ -79,7 +79,7 @@ The metadata for each alert will contain the following fields: - funding_labels: [optional] When there are potential fundings, the hash(es) to the funding label(s) - model_score: Model score. In case where the alert was raised due to the high precision model, the score will be from the high precision model. - model_threshold: Recall threshold that was being used in the model at the moment of raising the alert -- from_eoa_in_tp_list: [optional] When the transaction initiator is found in a list of known attackers, this value will be set to `"True"`. +- known_past_attacker: [optional] When the transaction initiator is found to be a known past attacker, (i.e. associated with a public disclosed attack in the past) this value will be set to `"True"`. - oko_contract_explorer: Link to contract explorer Example of high precision model: diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index 69ed9b7b..6eb59d16 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -201,7 +201,7 @@ def detect_malicious_contract_tx( if float(finding.metadata['model_score']) >= MODEL_PRECISION_THRESHOLD: finding.metadata['high_precision_model'] = True # If the model is working in high precision, has a 1-day funding alert, or the txn `from` is in the TP list, we raise the alert and continue - if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'from_eoa_in_tp_list' in finding.metadata.keys(): + if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'known_past_attacker' in finding.metadata.keys(): all_findings.append(finding) continue # This should only trigger in beta and if no critical alert has been raised @@ -244,7 +244,7 @@ def detect_malicious_contract_tx( if float(finding.metadata['model_score']) >= MODEL_PRECISION_THRESHOLD: finding.metadata['high_precision_model'] = True # If the model is working in high precision, has a 1-day funding alert, or the txn `from` is in the TP list, we raise the alert and continue - if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'from_eoa_in_tp_list' in finding.metadata.keys(): + if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'known_past_attacker' in finding.metadata.keys(): all_findings.append(finding) continue # This should only trigger in beta and if no critical alert has been raised @@ -283,9 +283,9 @@ def detect_malicious_contract( findings = [] if created_contract_address is not None and code is not None: - from_eoa_in_tp_list = from_ in TP_ATTACKER_LIST + known_past_attacker = from_ in TP_ATTACKER_LIST - if (len(code) > BYTE_CODE_LENGTH_THRESHOLD) or from_eoa_in_tp_list: + if (len(code) > BYTE_CODE_LENGTH_THRESHOLD) or known_past_attacker: try: opcodes = EvmBytecode(code).disassemble() except Exception as e: @@ -298,7 +298,7 @@ def detect_malicious_contract( function_signatures = get_function_signatures(w3, opcodes) logger.info(f"{created_contract_address}: score={model_score}") - if not from_eoa_in_tp_list: + if not known_past_attacker: if model_score is None or model_score < MODEL_INFO_THRESHOLD: if ENV == 'dev': logger.info(f"Score is less than threshold: {model_score} < {MODEL_INFO_THRESHOLD}. Not creating alert.") @@ -322,13 +322,13 @@ def detect_malicious_contract( function_signatures, model_score, MODEL_THRESHOLD, - from_eoa_in_tp_list, + known_past_attacker, error=error, ) - if (model_score is not None and model_score >= MODEL_INFO_THRESHOLD) or from_eoa_in_tp_list: - from_label_type = "eoa" if from_eoa_in_tp_list or not is_contract(w3, from_) else "contract" + if (model_score is not None and model_score >= MODEL_INFO_THRESHOLD) or known_past_attacker: + from_label_type = "eoa" if known_past_attacker or not is_contract(w3, from_) else "contract" # If it's a potential alert, we create labels. Otherwise, we don't - if (model_score >= MODEL_THRESHOLD) or from_eoa_in_tp_list: + if (model_score >= MODEL_THRESHOLD) or known_past_attacker: labels = [ { "entity": created_contract_address, @@ -346,13 +346,13 @@ def detect_malicious_contract( "entity": created_contract_address, "entity_type": EntityType.Address, "label": "attacker", - "confidence": 1.0 if from_eoa_in_tp_list else model_score, + "confidence": 1.0 if known_past_attacker else model_score, }, { "entity": from_, "entity_type": EntityType.Address, "label": "attacker", - "confidence": 1.0 if from_eoa_in_tp_list else model_score, + "confidence": 1.0 if known_past_attacker else model_score, }, ] severity = FindingSeverity.Critical diff --git a/early-attack-detector-py/src/findings.py b/early-attack-detector-py/src/findings.py index 94427da7..6d52f4f4 100644 --- a/early-attack-detector-py/src/findings.py +++ b/early-attack-detector-py/src/findings.py @@ -11,7 +11,7 @@ def __init__( function_signatures: set, model_score: float, model_threshold: float, - from_eoa_in_tp_list: bool, + known_past_attacker: bool, error: str = None, ): self.metadata = { @@ -24,9 +24,9 @@ def __init__( "oko_contract_explorer" ] = f"https://oko.palkeo.com/{contract_address}/" self.metadata["model_score"] = str(model_score) - self.metadata["model_threshold"] = str(model_threshold), - if from_eoa_in_tp_list: - self.metadata["from_eoa_in_tp_list"] = str(from_eoa_in_tp_list) + self.metadata["model_threshold"] = str(model_threshold) + if known_past_attacker: + self.metadata["known_past_attacker"] = str(known_past_attacker) self.description = ( f"{from_address} created contract {contract_address}" if error is None From ca37151b872b518800ad1c2238a7329c24d5dbde Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Sun, 18 Aug 2024 15:45:23 -0500 Subject: [PATCH 18/21] Update 'scikit-learn' to address error --- early-attack-detector-py/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/early-attack-detector-py/requirements.txt b/early-attack-detector-py/requirements.txt index d02b7be9..35405ccd 100644 --- a/early-attack-detector-py/requirements.txt +++ b/early-attack-detector-py/requirements.txt @@ -3,7 +3,7 @@ setuptools>=61.3.1 hexbytes>=0.2.2 evmdasm>=0.1.10 rlp>=2.0.1 -scikit-learn>=1.4.1 +scikit-learn==1.4.1.post1 bot-alert-rate>=0.0.4 web3==5.23.0 imbalanced-learn>=0.12.0 From 8f0cfc72eee9fc47e5f6feed1f1f8e0c9dbf0c07 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Sun, 18 Aug 2024 15:46:12 -0500 Subject: [PATCH 19/21] Revert 'to_checksum_address' to 'toChecksumAddress' --- early-attack-detector-py/src/agent.py | 2 +- early-attack-detector-py/src/utils.py | 10 +++++----- 2 files changed, 6 insertions(+), 6 deletions(-) diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index 6eb59d16..bd71a1de 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -159,7 +159,7 @@ def detect_malicious_contract_tx( contract_address = calc_contract_address(w3, trace.action.from_, nonce) else: # For contracts creating other contracts, get the nonce using Web3 - nonce = w3.eth.getTransactionCount(Web3.to_checksum_address(trace.action.from_), transaction_event.block_number) + nonce = w3.eth.getTransactionCount(Web3.toChecksumAddress(trace.action.from_), transaction_event.block_number) contract_address = calc_contract_address(w3, trace.action.from_, nonce - 1) logger.warn( diff --git a/early-attack-detector-py/src/utils.py b/early-attack-detector-py/src/utils.py index fa1a6908..32f6d11b 100644 --- a/early-attack-detector-py/src/utils.py +++ b/early-attack-detector-py/src/utils.py @@ -22,7 +22,7 @@ def calc_contract_address(w3, address, nonce) -> str: """ address_bytes = bytes.fromhex(address[2:].lower()) - return Web3.to_checksum_address(Web3.keccak(rlp.encode([address_bytes, nonce]))[-20:]) + return Web3.toChecksumAddress(Web3.keccak(rlp.encode([address_bytes, nonce]))[-20:]) def is_contract(w3, address) -> bool: @@ -32,7 +32,7 @@ def is_contract(w3, address) -> bool: """ if address is None: return True - code = w3.eth.get_code(Web3.to_checksum_address(address)) + code = w3.eth.get_code(Web3.toChecksumAddress(address)) return code != HexBytes("0x") def get_function_signatures(w3, opcodes) -> set: @@ -56,7 +56,7 @@ def get_storage_addresses(w3, address) -> set: return set() tp_executor = ThreadPoolExecutor(max_workers=10) - checksumed_address = Web3.to_checksum_address(address) + checksumed_address = Web3.toChecksumAddress(address) futures = [tp_executor.submit(w3.eth.get_storage_at, checksumed_address, i) for i in range(CONTRACT_SLOT_ANALYSIS_DEPTH)] tp_executor.shutdown(wait=True) futures_result = [f.result() for f in futures] @@ -65,7 +65,7 @@ def get_storage_addresses(w3, address) -> set: tp_executor = ThreadPoolExecutor(max_workers=10) futures = [tp_executor.submit(is_contract, w3, address) for address in all_addresses] tp_executor.shutdown(wait=True) - address_set = set([Web3.to_checksum_address(all_addresses[i]) for i, f in enumerate(futures) if f.result()]) + address_set = set([Web3.toChecksumAddress(all_addresses[i]) for i, f in enumerate(futures) if f.result()]) return address_set @@ -90,7 +90,7 @@ def get_features(w3, opcodes, contract_creator) -> list: is_contract_local = is_contract(w3, opcode.operand) checked_contracts[opcode.operand] = is_contract_local if is_contract_local: - opcode_addresses.add(Web3.to_checksum_address(f"0x{opcode.operand}")) + opcode_addresses.add(Web3.toChecksumAddress(f"0x{opcode.operand}")) if opcode_name in {"PUSH4", "PUSH32"}: features.append(opcode.operand) From 5b61e1d2cbbdfb5a5cb3d704d333c3baa0cc28fa Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Tue, 20 Aug 2024 14:38:25 -0500 Subject: [PATCH 20/21] Revert back to 'if BETA' from 'elif' --- early-attack-detector-py/src/agent.py | 12 ++++++++---- 1 file changed, 8 insertions(+), 4 deletions(-) diff --git a/early-attack-detector-py/src/agent.py b/early-attack-detector-py/src/agent.py index bd71a1de..d4cdeccf 100644 --- a/early-attack-detector-py/src/agent.py +++ b/early-attack-detector-py/src/agent.py @@ -203,9 +203,11 @@ def detect_malicious_contract_tx( # If the model is working in high precision, has a 1-day funding alert, or the txn `from` is in the TP list, we raise the alert and continue if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'known_past_attacker' in finding.metadata.keys(): all_findings.append(finding) + # if critical alert raised, no need to continue loop's current iteration continue - # This should only trigger in beta and if no critical alert has been raised - elif BETA: + # This should only trigger in beta and if no critical alert has been raised, + # due to `continue`ing once critical alert raised + if BETA: if ENV == 'dev': logger.info(f"Checking funding alerts for {trace.action.from_}") funding_alerts, funding_labels = check_funding_labels(trace.action.from_, tx_timestamp=tx_timestamp, n_days=365) @@ -246,9 +248,11 @@ def detect_malicious_contract_tx( # If the model is working in high precision, has a 1-day funding alert, or the txn `from` is in the TP list, we raise the alert and continue if 'high_precision_model' in finding.metadata.keys() or 'funding_labels' in finding.metadata.keys() or 'known_past_attacker' in finding.metadata.keys(): all_findings.append(finding) + # if critical alert raised, no need to continue loop's current iteration continue - # This should only trigger in beta and if no critical alert has been raised - elif BETA: + # This should only trigger in beta and if no critical alert has been raised, + # due to `continue`ing once critical alert raised + if BETA: if ENV == 'dev': logger.info(f"Checking funding labels for {transaction_event.from_}") funding_alerts, funding_labels = check_funding_labels(transaction_event.from_, tx_timestamp=tx_timestamp, n_days=365) From c239dedc10bea3784bef96572f36f5731f3f34e1 Mon Sep 17 00:00:00 2001 From: Roberto Cantu Date: Thu, 22 Aug 2024 17:07:22 -0500 Subject: [PATCH 21/21] Update 'package-lock' and 'release.md' --- early-attack-detector-py/package-lock.json | 17 +++++++++-------- early-attack-detector-py/release.md | 4 ++++ 2 files changed, 13 insertions(+), 8 deletions(-) diff --git a/early-attack-detector-py/package-lock.json b/early-attack-detector-py/package-lock.json index e057ca55..f5add5f8 100644 --- a/early-attack-detector-py/package-lock.json +++ b/early-attack-detector-py/package-lock.json @@ -965,11 +965,12 @@ } }, "node_modules/axios": { - "version": "1.6.7", - "resolved": "https://registry.npmjs.org/axios/-/axios-1.6.7.tgz", - "integrity": "sha512-/hDJGff6/c7u0hDkvkGxR/oy6CbCs8ziCsC7SqmhjfozqiJGc8Z11wrv9z9lYfY4K8l+H9TpjcMDX0xOZmx+RA==", + "version": "1.7.4", + "resolved": "https://registry.npmjs.org/axios/-/axios-1.7.4.tgz", + "integrity": "sha512-DukmaFRnY6AzAALSH4J2M3k6PkaC+MfaAGdEERRWcC9q3/TWQwLpHR8ZRLKTdQ3aBDL64EdluRDjJqKw+BPZEw==", + "license": "MIT", "dependencies": { - "follow-redirects": "^1.15.4", + "follow-redirects": "^1.15.6", "form-data": "^4.0.0", "proxy-from-env": "^1.1.0" } @@ -3248,11 +3249,11 @@ } }, "axios": { - "version": "1.6.7", - "resolved": "https://registry.npmjs.org/axios/-/axios-1.6.7.tgz", - "integrity": "sha512-/hDJGff6/c7u0hDkvkGxR/oy6CbCs8ziCsC7SqmhjfozqiJGc8Z11wrv9z9lYfY4K8l+H9TpjcMDX0xOZmx+RA==", + "version": "1.7.4", + "resolved": "https://registry.npmjs.org/axios/-/axios-1.7.4.tgz", + "integrity": "sha512-DukmaFRnY6AzAALSH4J2M3k6PkaC+MfaAGdEERRWcC9q3/TWQwLpHR8ZRLKTdQ3aBDL64EdluRDjJqKw+BPZEw==", "requires": { - "follow-redirects": "^1.15.4", + "follow-redirects": "^1.15.6", "form-data": "^4.0.0", "proxy-from-env": "^1.1.0" } diff --git a/early-attack-detector-py/release.md b/early-attack-detector-py/release.md index b1e139cc..0f5d48fe 100644 --- a/early-attack-detector-py/release.md +++ b/early-attack-detector-py/release.md @@ -1,5 +1,9 @@ # V0 +## V0.2.4 + +- [beta] Fixed True Positive list fetching logic. + ## V0.2.3 - [beta] Added True Positive list and Hops beta bot.