1 Scam Reports

Other: Drainer

7

Typosquatting domain, using Drainer2.js to steal NFTs. The receiver address in the drainer script is 0x1E897644454e44C500a0F2c158050853474B811d This address has many outgoing transactions which lead to a much larger wallet 0x6910940164948FDafb087BfdfE75C0CeBdCf503e. This wallet has many outgoing transactions to 0xd5b6625c2bf78b9bd951f2d0bae275e3dc1c7612 which is being used to off-ramp many millions worth of funds to Binance 0x28C6c06298d514Db089934071355E5743bf21d60

0
7
Reported Addresses and Domains
Reported Domain

collabland-verify.io

Reported Address
Ethereum logo
0x1E897644454e44C500a0F2c158050853474B811d
Reported Address
Ethereum logo
0x6910940164948FDafb087BfdfE75C0CeBdCf503e

+ 1 more

Reports by Category

Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo