Cointime

Download App
iOS & Android

Hunting the Hunters: How to Find Airdrop Hunters

Historically, protocols and blockchain networks alike attract users and liquidity with the promise of tokens after product-market fit. These tokens represent two primary incentives:

  1. The ability to govern the direction of the product
  2. Monetary allocation

One of the most common criticisms of web2 is that its users have no ownership over the networks and applications that they contribute to and are a part of.

Web3 offers an alternative, community-based ownership model with tokens serving as a key part of this new paradigm.

Given the importance of a community-oriented mindset when thinking about token distribution, web3 projects seek to ensure they airdrop (i.e. distribute) tokens to active community participants who have a vested stake in the product’s success. 

While there is an active and valid debate about who constitutes as an "active community member," there is one party that is objectively a bad actor—users and bots engaging in sybil attacks.

What is a sybil attack?

Sybil attacks use a single network node to operate many fake identities, often simultaneously, within a Peer-to-Peer (P2P) network. 

A sybil attack leads to a small number of network actors gaining an undue share of influence, which in the context of an airdrop, means a larger share of governance tokens. 

In terms of airdrop hunting, this means inauthentically interacting with protocols and contracts.

Hop Exchange’s Airdrop Hunter Strategy

While many past airdrops have yet to truly crack down on bad actors, Hop Exchange introduced a new mechanic that leverages its community members to reduce the impact of sybil attacks:

"We are accepting reports of Sybil addresses that have not yet been uncovered. When Hop DAO is live, we will make a proposal to reward those who reported Sybil addresses with 25% of the tokens saved — subject to a 1-year lockup. Reports will be reviewed, and rewards will be tallied on a first-come, first-serve basis."

As one of the first community-based initiatives that rewards hunters of airdrop hunters, Hop unleashed the full power of the web3 developer community, including myself.

Discovering Airdrop Hunters

This is graphical representation of the addresses I identified as part of a Sybil attack. 

Sybil attack visualization.

Here’s how to read the sybil attack visualization:

Each address is a node in the graph, and all shown addresses are connected by on-chain transfers between each address denoted by each edge.

The sybil attacker exhibits two distinct patterns with the blue-colored edges denoting pattern one and the green-colored edges denoting pattern two.

Orange-colored nodes denote addresses that serve as on-chain connections between all sybil accounts where transfers occurred, and are included in the submission set due to deviations from the two main patterns outlined in this report.

Pattern #1

All addresses connected by blue edges used Hop Exchange to ping-pong back-and-forth between Gnosis Chain (formerly xDai) and Polygon. 

Each address prominently featured Hop transactions denominated in ~1000 $USDC (1 transaction in USDT) with a variable range of ± 250 dollars across the transactions, criss-crossing from one chain to another and back sequentially. 

Furthermore, each batch of transactions within each address took place over a very small timespan (on the order 1-3 hrs).

Pattern 1 transactions

Here is an example of this behavior:

‍https://explorer.hop.exchange/?account=0x4bc25a712b87c1e4a42df9ffac3662fe467b7e9a

How was pattern #1 discovered?

Pattern #1 was found by tracing on-chain Ethereum transfers using the Alchemy Transfers API. Upon investigation, a connected set of addresses, namely Pattern #2, was connected to Pattern #1 by tracing transfers between the hub address (0xb23691043293de4deeae3b565bd33bc059f264eb) and its associated spokes on the Avalanche mainnet. 

Pattern #2

For addresses connected by green edges, the attacking addresses used Hop Exchange multiple times over a period of several hours, conducting repeated exchanges primarily from Gnosis Chain (formerly xDai) to Polygon. 

All transactions typically utilized $200-$300 dollars in $DAI, $USDC, or $USDT. 

In aggregate, Pattern 2 occurred over the span of a week from Jan 15th, 2022 - Jan, 24th 2022.

Pattern 2 transactions.

Here is an example of this behavior: 

‍https://explorer.hop.exchange/?account=0x1cccff3de9b0a7c466acb31f33910691f1cb6e14

Connecting Pattern #1 and Pattern #2

Pattern #1 and #2 were found to be connected because the sybil attacker overlapped transactions on the Ethereum mainnet and the Avalanche mainnet.

Specifically, transfers between these addresses occurred on both networks denoting the connection in the two patterns.

  • 0x1100cc….d34e76a8e ←→ 0xb2369….59f264eb 
  • 0xb23691….f264eb ←→ 0x80d….19b9 

With over 30,000 addresses to comb through, it was challenging to find a connected subset, but the Transfers API was able to effectively trace transactions on Ethereum.

How to Find Airdrop Hunters

By searching the transfer history of all eligible addresses on Ethereum and Avalanche mainnet, we are able to trace shared on-chain activity to discover connected addresses.

To reduce the amount of brute-force computation required to find eligible addresses, we reduced the cluster search size by rejecting clusters with a low number of shared addresses.

After filtering out unlikely addresses, we queried Hop Exchange subgraphs across each of Hop’s different supported blockchains to generate a basic profile of each address cluster. 

If a cluster profile had repeated address behavior, it was earmarked for manual verification. 

Comments

All Comments

Recommended for you

  • Farcaster's social client Kiosk completes $10 million financing, led by Electric Capital

    Farcaster's integrated social client Kiosk has announced the completion of a $10 million financing round on the X platform, led by Electric Capital, with participation from a16z Crypto, USV, and Variant Fund. Kiosk aims to promote community building and commerce within applications, enabling creators to establish communities, share rich media content, mint NFTs, interact with like-minded individuals, and seamlessly customize channel economics, while emphasizing the integration of on-chain assets into social interactions and envisioning a more inclusive and interconnected Web3 experience.

  • A whale sold 224 WBTC worth $14.4 million in the past three hours

    According to on-chain analyst @ai_9684xtpa, address 0x486...1505e sold 224 WBTC tokens worth $14.4 million through Cowswap in the past three hours, making a profit of $830,000 (selling at an average price of $64,203). The seller had bought 371 WBTC tokens at an average price of $60,504 between November 2023 and April 2024, and still holds 280 WBTC tokens.

  • CryptoQuant CEO: BTC needs to remain above $80,000 for miners to remain profitable after halving

    Bitcoin mining revenue significantly decreased in May due to the impact of the fourth Bitcoin halving event. On May 1st, the total revenue from block rewards and transaction fees reached a new low of only $26.3 million.CryptoQuant CEO Ki Young Ju calculated that, based on current conditions, Bitcoin needs to stay above $80,000 for miners to remain profitable after the halving. However, most miners have taken proactive measures to upgrade their mining equipment to lower long-term operating costs and remain competitive.

  • BTC returns to above 65,000 USDT, up 2.08% in 24 hours

    OKX market shows that BTC has returned to above 65000 USDT, now reporting 65102 USDT, with a 24-hour increase of 2.08%.

  • Hundre Finance attackers have withdrawn 162.2 ETH worth of crypto assets from Curve

    According to PeckShield monitoring, the attacker of Hundre Finance withdrew 784,000 3Crv from Curve and exchanged it for 273 ETH. In addition, they also exchanged 305.6 WOO, 39 PAXG, 200,000 FRAX, and 100,000 DAI, totaling 162.2 ETH. The attacker then bridged 1,034 ETH (2.17 million USD), 842.8K DAI, 1.11 million USDT, 1.27 million USDC, and 457.3 FRAX from Optimism to Ethereum. They also exchanged a total of 480,000 USDC for 142.6 WETH, 306 WOO, and 39 PAXG. They also exchanged 1.11 million USDT for 500.3 thousand USD worth of DAI and 613.8 thousand USD worth of FRAX. Additionally, on April 15, 2023, approximately 786,000 USD worth of USDC was added to Curve3Pool.

  • LayerZero co-founder: "Self-reporting of witch activities" is not aimed at individuals, but at industrial witch studios

    Bryan Pellegrino, co-founder and CEO of LayerZero, stated on social media that the "Self-Report Sybil Activity" is not targeting individual users, but rather large industrial witch farms (studios).Earlier, LayerZero Labs launched the "Self-Report Sybil Activity" plan, which allows witch addresses to self-report related addresses on a designated page and receive an expected allocation of 15%, without answering any questions. The deadline is May 17th, 19:59:59.

  • Argentina’s House of Representatives Passes Bill to Regularize Cryptocurrency Taxation

    The Argentine Chamber of Deputies has passed a cryptocurrency tax normalization bill aimed at advancing a series of important government reforms. The bill introduces the possibility of regularizing previously undeclared cryptocurrency assets, up to a maximum of $100,000, without paying government collection fees. However, if the value of cryptocurrency assets exceeds this limit, the government will apply preferential tax rates based on the taxpayer's declaration date.

  • GNUS on Fantom was attacked, with a loss of about $1.27 million

    According to Beosin's monitoring, GNUS on Fantom was attacked, resulting in a loss of approximately $1.27 million. GNUS stated on the X platform that due to recent vulnerabilities, hackers were able to mint fake GNUS tokens on Fantom, transfer them to Ethereum and Polygon through the Axelar Bridge, and sell them to existing liquidity pools. We will take a snapshot of the blocks before the exploit. To ensure fairness, please do not purchase GNUS tokens after the exploit, as we will issue new tokens.

  • Sei Network: The Mainnet Beta Version Pacific-1 Is Now Released, and the Airdrop Is Open for Collection

    The Sei Network public chain announced on Twitter that the Sei mainnet test version Pacific-1 has been released and the airdrop is open for collection. Users can check their eligibility and participate in the cross-chain airdrop and Atlantic contributor rewards on the airdrop application page. It should be noted that users need to update their Compass wallet to the latest version 0.7.9, as versions 0.7.8 and below will not be able to receive tokens.

  • Blockchain Capital Twitter Account Suspectedly Hacked and Promoted Fake Token Airdrops

    The Twitter account of the cryptocurrency investment company Blockchain Capital was apparently hacked and promoted a false BCAP token free airdrop activity. Blockchain Capital's account posted several posts promising to give away "BCAP" tokens and directed users to a counterfeit website that imitated the VC company's original appearance.