扫码下载
BTC $77,551.00 -1.05%
ETH $2,316.25 -0.64%
BNB $636.87 -0.39%
XRP $1.44 -0.44%
SOL $86.30 +0.12%
TRX $0.3226 -1.71%
DOGE $0.0982 +0.44%
ADA $0.2513 +0.21%
BCH $454.87 -1.24%
LINK $9.41 +0.43%
HYPE $41.10 -0.65%
AAVE $94.46 -0.29%
SUI $0.9472 -0.52%
XLM $0.1728 -1.38%
ZEC $356.29 +3.17%
BTC $77,551.00 -1.05%
ETH $2,316.25 -0.64%
BNB $636.87 -0.39%
XRP $1.44 -0.44%
SOL $86.30 +0.12%
TRX $0.3226 -1.71%
DOGE $0.0982 +0.44%
ADA $0.2513 +0.21%
BCH $454.87 -1.24%
LINK $9.41 +0.43%
HYPE $41.10 -0.65%
AAVE $94.46 -0.29%
SUI $0.9472 -0.52%
XLM $0.1728 -1.38%
ZEC $356.29 +3.17%

GoPlus:用户需尽快检查钱包是否收到黑客地址转入的 Gas,及时转出资产并更换安全钱包

2025-02-14 20:47:31
收藏

ChainCatcher 消息,据 GoPlus 在 X 发文表示,GoPlus 已确定攻击者的相关地址,并已将其全部拉黑处理。值得注意的是,攻击者曾用0x9AE开头的钱包向多个地址发送 Gas,但尚未进行 Token 转移,用户还有机会转移资产到安全钱包。

攻击者用于发放 Gas 的地址:0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35

攻击者盗币归集地址 1:0x49add3e8329f2a2f507238b0a684d03eae205aab

归集地址 2:0x7831d05afc72a10bd475eb4777680b4e9204695a

归集地址 3:0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc

归集地址 4:0xc657b6e6c59af5bcff4de626dab52832e77d2996

请用户保持警惕,定期检查钱包安全。

app_icon
ChainCatcher 与创新者共建Web3世界