[Crypto World] The on-chain analysis platform Bubblemaps recently set its sights on a sniper with the ID “Ramarxyz”—this guy plays hard.
The HumidiFi project’s WET token held a presale on the Jupiter platform, and it sold out in just 2 seconds. Sounds hot, right? But Bubblemaps uncovered a shocking secret: out of the 1,530 addresses that participated in the presale, at least 1,100 were controlled by the same person. That’s right—a single person used over a thousand sockpuppet accounts to grab 70% of the presale allocation, and then even went on to request a refund.
The operation was pretty sophisticated, too. This sniper transferred funds from an exchange to thousands of fresh wallets, with each wallet receiving exactly the same amount—precisely 1,000 USDC. After the presale ended, these wallets acted in unison. Such a Sybil attack left obvious traces on-chain, and ultimately, analysis tools caught them red-handed.
So, behind the presale selling out in two seconds, someone was using an industrialized process to farm profits. Retail participants thought they were just too slow, but in reality, they never stood a chance.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
8 Likes
Reward
8
6
Repost
Share
Comment
0/400
NFTragedy
· 12-06 12:01
1,100 wallets taking 70% of the share? How much free time do you need for that? And now they’re even asking for a refund, unbelievable.
---
The Sybil attack was so obvious and still got caught, not very skilled.
---
Each wallet gets a quota of 1,000u, you can’t hide anything on-chain. This guy is way too confident.
---
Sold out in two seconds? That’s hilarious. It’s just insiders playing with themselves.
---
The sniper got sniped—serves them right. I love seeing these kinds of fails.
---
I need to remember the name Ramarxyz. Project teams should be careful when they see it in the future.
---
One person with 1,100 sockpuppets—how much does that cost to operate? Aren’t they afraid of getting rugged?
---
Good thing there are tools like bubblemaps, otherwise I’d really have been fooled.
---
They took 70% and still have the nerve to ask for a refund? What kind of logic is that?
View OriginalReply0
TokenomicsDetective
· 12-05 11:29
1,100 wallets took 70%? Ramarxyz's move is outrageous, but to be honest, on-chain Sybil attacks have been everywhere for a long time.
The Sybil attack was so obvious and still got caught—how is Ramarxyz this bad? There's nothing much to gain on the technical side.
Another pre-sale to fleece retail investors, why are people still throwing money at these projects?
Trying to take it all with over a thousand sockpuppets? Is this guy really greedy or did he not even bother to hide?
Bubblemaps really grabbed attention this time. On-chain data never sleeps, that's not an exaggeration.
Refunds? Dream on. Ramarxyz is socially dead after this.
Feels like the WET project team's risk control is just for show—how did 1,100 wallets get in?
This technique looks familiar—it's the same old routine for token presales.
View OriginalReply0
Rugpull幸存者
· 12-05 11:24
This method is way too crude. 1000 USDC exactly the same? The blockchain is so transparent and they still dare to operate like this—no wonder they got exposed.
View OriginalReply0
AlphaWhisperer
· 12-05 11:18
One person with 1,100 wallets took 70% of the quota—how much effort did that take? And they even dare to ask for a refund? That's really unbelievable.
View OriginalReply0
NFTRegretful
· 12-05 11:10
Here are some differentiated comments:
1. 1100 wallets? How much free time does this guy have? How long must it have taken to farm all that?
2. Unbelievable, still dares to ask for a refund? Where’s the shame?
3. Pulling off a Sybil attack like this is truly an art form.
4. Jupiter should’ve added on-chain behavior detection to this presale. Are we going to see a repeat next year?
5. Ramarxyz’s move reminds me of those hilarious pre-sale incidents before—feels like déjà vu.
6. Took 70% and still making noise about a refund, what a character.
7. "Sold out in 2 seconds" sounds cool, but in reality, this guy took it all for himself. Hilarious.
View OriginalReply0
ForkTongue
· 12-05 11:02
One person, 1,100 wallets, 70% allocation—how much free time do they have, haha.
---
A Sybil attack this obvious can still get caught? The skill level of snipers in our circle really varies.
---
Now you want a refund? Bro, you’re just asking for trouble.
---
“Sold out in 2 seconds” sounds nice, but so that’s what really happened.
---
Bubblemaps deserves a lot of credit for this one—they basically ended this guy’s reputation.
---
1,000 USDC per wallet, the math problem is pretty obvious here.
---
Jupiter will need to come up with some new tricks to prevent this kind of operation in the future.
---
It looks ridiculous, but people actually do it. On-chain is just a playground full of scammers.
---
Pulling a Sybil attack and still daring to ask for a refund—this person is really bold.
---
You should have gotten caught at the bulk transfer step from the exchange; that move was way too sloppy.
One person controlled 1,100 wallets to grab 70% of the presale allocation; WET token sniper exposed by on-chain data
[Crypto World] The on-chain analysis platform Bubblemaps recently set its sights on a sniper with the ID “Ramarxyz”—this guy plays hard.
The HumidiFi project’s WET token held a presale on the Jupiter platform, and it sold out in just 2 seconds. Sounds hot, right? But Bubblemaps uncovered a shocking secret: out of the 1,530 addresses that participated in the presale, at least 1,100 were controlled by the same person. That’s right—a single person used over a thousand sockpuppet accounts to grab 70% of the presale allocation, and then even went on to request a refund.
The operation was pretty sophisticated, too. This sniper transferred funds from an exchange to thousands of fresh wallets, with each wallet receiving exactly the same amount—precisely 1,000 USDC. After the presale ended, these wallets acted in unison. Such a Sybil attack left obvious traces on-chain, and ultimately, analysis tools caught them red-handed.
So, behind the presale selling out in two seconds, someone was using an industrialized process to farm profits. Retail participants thought they were just too slow, but in reality, they never stood a chance.