扫码下载
BTC $76,963.02 -1.37%
ETH $2,291.86 -2.79%
BNB $624.39 -1.66%
XRP $1.39 -2.27%
SOL $84.43 -2.39%
TRX $0.3261 +0.79%
DOGE $0.0981 -0.69%
ADA $0.2459 -2.29%
BCH $448.73 -1.06%
LINK $9.24 -2.24%
HYPE $41.46 -1.26%
AAVE $96.93 +0.44%
SUI $0.9257 -1.78%
XLM $0.1649 -3.20%
ZEC $352.51 -1.31%
BTC $76,963.02 -1.37%
ETH $2,291.86 -2.79%
BNB $624.39 -1.66%
XRP $1.39 -2.27%
SOL $84.43 -2.39%
TRX $0.3261 +0.79%
DOGE $0.0981 -0.69%
ADA $0.2459 -2.29%
BCH $448.73 -1.06%
LINK $9.24 -2.24%
HYPE $41.46 -1.26%
AAVE $96.93 +0.44%
SUI $0.9257 -1.78%
XLM $0.1649 -3.20%
ZEC $352.51 -1.31%

GoPlus:用户需尽快检查钱包是否收到黑客地址转入的 Gas,及时转出资产并更换安全钱包

2025-02-14 20:47:31
收藏

ChainCatcher 消息,据 GoPlus 在 X 发文表示,GoPlus 已确定攻击者的相关地址,并已将其全部拉黑处理。值得注意的是,攻击者曾用0x9AE开头的钱包向多个地址发送 Gas,但尚未进行 Token 转移,用户还有机会转移资产到安全钱包。

攻击者用于发放 Gas 的地址:0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35

攻击者盗币归集地址 1:0x49add3e8329f2a2f507238b0a684d03eae205aab

归集地址 2:0x7831d05afc72a10bd475eb4777680b4e9204695a

归集地址 3:0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc

归集地址 4:0xc657b6e6c59af5bcff4de626dab52832e77d2996

请用户保持警惕,定期检查钱包安全。

app_icon
ChainCatcher 与创新者共建Web3世界