
MistTrack🕵️
@MistTrack_io
Followers
25K
Following
2K
Media
939
Statuses
2K
A crypto tracking and compliance platform for everyone. Built by @SlowMist_Team
Web3 Security
Joined March 2022
🚨MistTrack Alert🚨. After 5 months of silence, the @0xinfini exploiter has resumed activity:. 🔹 1,770 $ETH → 0x762d. F9FB.→ Swapped for 5.88M $DAI (not yet moved). 🔹 2,001 $ETH → 0x7142. fa41.→ Deposited into Tornado Cash. 💼 Original address 0xfcC8. 6e49 still holds.
🚨MistTrack Alert🚨. The @0xinfini was exploited and ~$50 million in funds was stolen. 1⃣Related transfer transactions:.11,455,666 USDC. 38,060,996 USDC.
1
2
6
@BigONEexchange Please flag as hacker address: @etherscan. 0x9Bf7a4dDcA405929dba1FBB136F764F5892A8a7a.0x0A360bD648EB86613961a2AA41dC1610c5305F4F.
0
0
2
🚨 Exchange @BigONEexchange was exploited with over $27M in losses across #Ethereum, #BSC, #TRON, #Solana & #Bitcoin. 💥 Transfer breakdown:. 1️⃣ Ethereum: 350 ETH + various tokens stolen.→ Some tokens swapped for $ETH via KyberSwap, 1inch, DODO → sent to 0x0A3. F4F.→
🚨SlowMist TI Alert🚨. The exchange @BigONEexchange was exploited due to a supply chain attack and loss exceeds $27 million. The production network was compromised, and the operating logic of account and risk control related servers was modified, enabling the attacker to withdraw
1
0
8
🔔Cross-chain Parsing Update. MistTrack now supports cross-chain analysis for 4 additional bridges:. 🔹#Rango.🔹#CelercBridge.🔹#Relay.🔹#MayanFinance. With this update, a total of 15 bridges are now supported. 🕵️Explore the updates on
🧩 New Bridges Added!🚀. We’ve added Cross-chain Parsing support for:.🔹 #Chainflip.🔹 #AllbridgeCore.🔹 #LIFI. 🖱️ Simply right-click on a "Bridge Node" and select "Cross-chain Parsing" to track what assets were swapped and where they went. 📈That brings the total to 11 bridges
0
2
8
RT @SlowMist_Team: Highlights & Insights from the 2025 Mid-Year Blockchain Security & AML Report by #SlowMist. Let’s walk through the key s….
0
4
0
RT @SlowMist_Team: 🧐In Q2 2025, @MistTrack_io Team received 429 crypto theft reports via our submission form — including multi-million doll….
0
4
0
RT @SlowMist_Team: 🔥SlowMist 2025 Mid-year Blockchain Security and AML Report is now available. 🛡️In the first half of 2025, the blockchai….
0
6
0
🚨 The address labeled "#CorkProtocol Exploiter 2" (0xFC0A6de0abd0985E7A910f8874c3ABF23F1CDff4) is actively transferring ETH to Tornado Cash. Currently, 3,010 $ETH (~$7.35M) has been laundered and the address balance is 719.83 ETH.🛡️.
1
0
6
RT @SlowMist_Team: 💰Over $50B USDT in deposits and $50B in withdrawals flowed through HuionePay in the past 18 months — now under global re….
0
7
0
RT @MetaMask: 🚨 It looks like the CoinMarketCap site is prompting users to "Verify Your Wallet" upon visiting the site. Exercise extreme c….
0
331
0
RT @zachxbt: The crime supercycle is indeed very real. While it’s true the industry has historically been ripe for abuse it has noticeably….
0
879
0
RT @_SEAL_Org: We released an updated version of @tayvano_'s guide on what to do if you've been infected by malware, tailored specifically….
0
54
0
💥Just now, @worldlibertyfi airdropped 47 $USD1 to WLFI subscribers — straight to their Ethereum wallets. 🚀MistTrack now supports full tracking and analysis of $USD1. 🧐Time to start tracing, MistTrackers!. Airdrop Contract⬇️. #USD1 #WLFI
2
2
10
🚨On May 29, the U.S. Treasury sanctioned Philippine-based #Funnull for its role in pig butchering scams. @Tether_to & @circle froze two related addresses:.♦️ 0xd5ed34. ed510 (17,594.75 $USDT and 0 $USDC frozen).♦️ TNmRfn. t8 (2,361 $USDT frozen). These addresses are linked
1
1
8
The exploiter address .0xEA6f30e360192bae715599E15e2F765B49E4da98.@etherscan please flag it . The exploiter's gas fee came from @Swapuz_team .
🚨SlowMist Security Alert🚨. We detected potential suspicious activity related to @Corkprotocol. As always, stay vigilant!
0
2
14
🚨MistTrack Alert:. ❄️@Tether_to has frozen ~$210K in $USDT across 91 addresses on #TRON, with amounts ranging from minor sums to over $100,000. Here are a few of the frozen addresses:. TYgzp7NXxfY7n1JUzPSxauFJuLf6ezdePs T9z9kZjWvpHcoPXtfcGKrpBHAZdTFho2AZ
0
0
3
RT @CetusProtocol: 🚨ANNOUNCEMENT . As of earlier today, we have confirmed that an attacker has stolen approximately $223M from Cetus Protoc….
0
821
0
As of now, the wallet addresses of the Cetus Exploiter are as follows:.ETH.@etherscan please flag it .0x89012a55cD6b88e407C9d4ae9B3425F55924919b.0x0251536BfcF144B88e1aFa8fe60184Ffdb4cAF16. SUI.0xe28b50cef1d633ea43d3296a3f6b67ff0312a5f1a99f0af753c85b8b5de8ff06.
@CetusProtocol @MistTrack_io 🔍 Attacker addresses:. Sui:. ETH:. Cross-chain transaction example:. Stay tuned for further updates.
0
1
6