扫码下载
BTC $79,065.70 +4.81%
ETH $2,400.73 +4.14%
BNB $645.91 +2.56%
XRP $1.45 +1.98%
SOL $88.30 +3.93%
TRX $0.3288 -1.33%
DOGE $0.0974 +3.56%
ADA $0.2538 +3.11%
BCH $463.91 +4.18%
LINK $9.47 +1.72%
HYPE $41.29 +5.01%
AAVE $95.06 +4.21%
SUI $0.9678 +3.30%
XLM $0.1789 +0.69%
ZEC $325.64 +5.09%
BTC $79,065.70 +4.81%
ETH $2,400.73 +4.14%
BNB $645.91 +2.56%
XRP $1.45 +1.98%
SOL $88.30 +3.93%
TRX $0.3288 -1.33%
DOGE $0.0974 +3.56%
ADA $0.2538 +3.11%
BCH $463.91 +4.18%
LINK $9.47 +1.72%
HYPE $41.29 +5.01%
AAVE $95.06 +4.21%
SUI $0.9678 +3.30%
XLM $0.1789 +0.69%
ZEC $325.64 +5.09%

GoPlus:用户需尽快检查钱包是否收到黑客地址转入的 Gas,及时转出资产并更换安全钱包

2025-02-14 20:47:31
收藏

ChainCatcher 消息,据 GoPlus 在 X 发文表示,GoPlus 已确定攻击者的相关地址,并已将其全部拉黑处理。值得注意的是,攻击者曾用0x9AE开头的钱包向多个地址发送 Gas,但尚未进行 Token 转移,用户还有机会转移资产到安全钱包。

攻击者用于发放 Gas 的地址:0x9AEf1CA082c17f9D52Aa98ca861b50c776dECC35

攻击者盗币归集地址 1:0x49add3e8329f2a2f507238b0a684d03eae205aab

归集地址 2:0x7831d05afc72a10bd475eb4777680b4e9204695a

归集地址 3:0xb312a2c9ab9700dac49798f457b4c28e28f1c4fc

归集地址 4:0xc657b6e6c59af5bcff4de626dab52832e77d2996

请用户保持警惕,定期检查钱包安全。

app_icon
ChainCatcher 与创新者共建Web3世界