SOL address-poisoning
What is it? Address-poisoning - in this attack, the scammer examines the user's transaction history and submits 0 value transfers to or from the user from an address that looks similar to an address in the user's history. Since the value is 0, it does not require any approvals. The result is that the transaction history for a user's wallet is now poisoned with addresses the attacker controls. A user may accidentally transfer tokens or native assets to those attacker-controlled addresses.
- Requests the victim's address
- Checks the validity of the address to rule out errors
- Shows the current SOL balance of the victim address (e. g. 27.767892 SOL)
- Parses the last 20 transactions and outputs the top 5 frequent recipients with the number of transfers (e. g. 5tzF****vuAi9 (7 times))
- Uses your private key given in code to pay fees and as the final address for withdrawals
- Supports 9 address spoofing options (prefix:suffix): 3:0, 4:0, 1:3, 3:1, 2:2, 4:1, 3:2, 2:3, 3:3
- Requests selection via console with prompts for generation time (e. g. 3:3 ~minutes)
- Generates an address that matches the victim's address by specified characters (e.g. 5tzF****vuAi9 for 5tz and i9)
- Multithreaded (double the number of CPU cores), speeding up the process (3:3 ~1-2 minutes)
- Outputs the poisoning address, private key and generation time
- Sends 0.000001 SOL from the fake address to the victim's address
- Signs the transaction with your key to pay for the gas
- Outputs a hash of the transaction with a link to solscan (e. g. https://solscan.io/tx/*)
- Checks incoming SOLs for a poisoning address
- Outputs the amount and hash of the incoming transaction (e. g. Received: 0.5 SOL | TX: 3x4y5z***)
- If SOLs (greater than 0.000005 SOL) arrive at the poisoning address, they are sent to your wallet
- Leaves 0.000005 SOL for gas
- Withdraws the amount and hash of the withdrawal transaction (e. g. SOL withdrawn: 0.499995 SOL | TX: 6a7b8c***)
- Resistant to RPC failures (balance, transactions, posting) - outputs error messages without crashing
- Shows: balance, recipients, generation, sending, monitoring, output
Any deal can go through with a trusted middleman from the forums or @Liars.
Message @cerberus_drainer (click) to get more info or purchase;
All info in telegram channel (click).
![[Image: sheepe.gif]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fsheepe.gif)
Contact: @cerberus_drainer
Channel with best Crypto Drainer: @cerberuscdrainer
What is it? Address-poisoning - in this attack, the scammer examines the user's transaction history and submits 0 value transfers to or from the user from an address that looks similar to an address in the user's history. Since the value is 0, it does not require any approvals. The result is that the transaction history for a user's wallet is now poisoned with addresses the attacker controls. A user may accidentally transfer tokens or native assets to those attacker-controlled addresses.
- Requests the victim's address
- Checks the validity of the address to rule out errors
- Shows the current SOL balance of the victim address (e. g. 27.767892 SOL)
- Parses the last 20 transactions and outputs the top 5 frequent recipients with the number of transfers (e. g. 5tzF****vuAi9 (7 times))
- Uses your private key given in code to pay fees and as the final address for withdrawals
- Supports 9 address spoofing options (prefix:suffix): 3:0, 4:0, 1:3, 3:1, 2:2, 4:1, 3:2, 2:3, 3:3
- Requests selection via console with prompts for generation time (e. g. 3:3 ~minutes)
- Generates an address that matches the victim's address by specified characters (e.g. 5tzF****vuAi9 for 5tz and i9)
- Multithreaded (double the number of CPU cores), speeding up the process (3:3 ~1-2 minutes)
- Outputs the poisoning address, private key and generation time
- Sends 0.000001 SOL from the fake address to the victim's address
- Signs the transaction with your key to pay for the gas
- Outputs a hash of the transaction with a link to solscan (e. g. https://solscan.io/tx/*)
- Checks incoming SOLs for a poisoning address
- Outputs the amount and hash of the incoming transaction (e. g. Received: 0.5 SOL | TX: 3x4y5z***)
- If SOLs (greater than 0.000005 SOL) arrive at the poisoning address, they are sent to your wallet
- Leaves 0.000005 SOL for gas
- Withdraws the amount and hash of the withdrawal transaction (e. g. SOL withdrawn: 0.499995 SOL | TX: 6a7b8c***)
- Resistant to RPC failures (balance, transactions, posting) - outputs error messages without crashing
- Shows: balance, recipients, generation, sending, monitoring, output
Any deal can go through with a trusted middleman from the forums or @Liars.
Message @cerberus_drainer (click) to get more info or purchase;
All info in telegram channel (click).
![[Image: sheepe.gif]](https://external-content.duckduckgo.com/iu/?u=https%3A%2F%2Fstatic.cracked.sh%2Fimages%2Fsmilies%2Fsheepe.gif)
Contact: @cerberus_drainer
Channel with best Crypto Drainer: @cerberuscdrainer