
Special Icon Definitions and Detection Criteria

Category
|
Definition
|
Detection Criteria/Features
|
---|---|---|
Rat Nest
|
Internal stakeholders holding significant token amounts, indicating insider trading suspicions
|
– Internal holdings account for 10.04% of total supply
– Suspected: Holders with identical creation times, funding sources, and transfer times
– Confirmed: Wallets holding tokens early with insider information
|
Phishing Wallet
|
Wallets receiving tokens, potentially involved in phishing attacks
|
– Token inflows, especially frequent small-amount transfers
|
New Wallet
|
Recently created wallets, not inherently malicious but warrant monitoring
|
– Newly created wallets with no specific malicious traits
|
Detection Mechanisms and Analytical Techniques
-
Behavioral Analysis: Examines transaction frequency, amounts, and timing to identify irregular patterns.
-
Social Network Analysis: Maps connections between wallets to detect coordinated activities.
-
Machine Learning: Uses algorithms to uncover patterns missed by traditional methods.
-
On-Chain Data Analysis: Scrutinizes blockchain data for inconsistencies or suspicious activities.
Potential Methods to Evade Detection: Theoretical Exploration
-
For Rat Nests
-
Diversify Creation and Funding Sources: Avoid identical creation times, funding sources, or transfer timings by creating wallets at different times with varied funding. However, gmgn.ai may still identify correlations through relational analysis.
-
Mimic Legitimate Early Holders: Attempt to emulate legitimate early investors, but the nature of insider information and early token holdings is hard to conceal.
-
Challenges: Studies suggest blockchain analytics tools can detect insider trading patterns via transaction timestamps and fund flows, making evasion difficult.
-
-
For Phishing Wallets
-
Normalize Transaction Patterns: Reduce inflows from multiple sources and mimic normal trading by increasing outflows or receiving larger sums from fewer sources. However, phishing attacks often involve frequent small inflows, which are hard to disguise.
-
Challenges: Evidence indicates gmgn.ai can flag suspected phishing wallets quickly through inflow analysis (e.g., source diversity, transaction volume).
-
Legal and Ethical Considerations
Conclusion
Unauthorized reproduction prohibited. Credit required when sharing.
PandaAcademy, a Web3 educational brand by PandaTool, positions as an open skills academy for the Web3 era.
本文由PandaAcademy原创,如若转载,请注明出处:https://academy.pandatool.org/en_US/solana/1026
。PandaAcademy是PandaTool旗下的Web3学习中心,专注于向普通用户提供区块链和加密货币知识输出