Cointime

Download App
iOS & Android

Hunting the Hunters: How to Find Airdrop Hunters

Historically, protocols and blockchain networks alike attract users and liquidity with the promise of tokens after product-market fit. These tokens represent two primary incentives:

  1. The ability to govern the direction of the product
  2. Monetary allocation

One of the most common criticisms of web2 is that its users have no ownership over the networks and applications that they contribute to and are a part of.

Web3 offers an alternative, community-based ownership model with tokens serving as a key part of this new paradigm.

Given the importance of a community-oriented mindset when thinking about token distribution, web3 projects seek to ensure they airdrop (i.e. distribute) tokens to active community participants who have a vested stake in the product’s success. 

While there is an active and valid debate about who constitutes as an "active community member," there is one party that is objectively a bad actor—users and bots engaging in sybil attacks.

What is a sybil attack?

Sybil attacks use a single network node to operate many fake identities, often simultaneously, within a Peer-to-Peer (P2P) network. 

A sybil attack leads to a small number of network actors gaining an undue share of influence, which in the context of an airdrop, means a larger share of governance tokens. 

In terms of airdrop hunting, this means inauthentically interacting with protocols and contracts.

Hop Exchange’s Airdrop Hunter Strategy

While many past airdrops have yet to truly crack down on bad actors, Hop Exchange introduced a new mechanic that leverages its community members to reduce the impact of sybil attacks:

"We are accepting reports of Sybil addresses that have not yet been uncovered. When Hop DAO is live, we will make a proposal to reward those who reported Sybil addresses with 25% of the tokens saved — subject to a 1-year lockup. Reports will be reviewed, and rewards will be tallied on a first-come, first-serve basis."

As one of the first community-based initiatives that rewards hunters of airdrop hunters, Hop unleashed the full power of the web3 developer community, including myself.

Discovering Airdrop Hunters

This is graphical representation of the addresses I identified as part of a Sybil attack. 

Sybil attack visualization.

Here’s how to read the sybil attack visualization:

Each address is a node in the graph, and all shown addresses are connected by on-chain transfers between each address denoted by each edge.

The sybil attacker exhibits two distinct patterns with the blue-colored edges denoting pattern one and the green-colored edges denoting pattern two.

Orange-colored nodes denote addresses that serve as on-chain connections between all sybil accounts where transfers occurred, and are included in the submission set due to deviations from the two main patterns outlined in this report.

Pattern #1

All addresses connected by blue edges used Hop Exchange to ping-pong back-and-forth between Gnosis Chain (formerly xDai) and Polygon. 

Each address prominently featured Hop transactions denominated in ~1000 $USDC (1 transaction in USDT) with a variable range of ± 250 dollars across the transactions, criss-crossing from one chain to another and back sequentially. 

Furthermore, each batch of transactions within each address took place over a very small timespan (on the order 1-3 hrs).

Pattern 1 transactions

Here is an example of this behavior:

‍https://explorer.hop.exchange/?account=0x4bc25a712b87c1e4a42df9ffac3662fe467b7e9a

How was pattern #1 discovered?

Pattern #1 was found by tracing on-chain Ethereum transfers using the Alchemy Transfers API. Upon investigation, a connected set of addresses, namely Pattern #2, was connected to Pattern #1 by tracing transfers between the hub address (0xb23691043293de4deeae3b565bd33bc059f264eb) and its associated spokes on the Avalanche mainnet. 

Pattern #2

For addresses connected by green edges, the attacking addresses used Hop Exchange multiple times over a period of several hours, conducting repeated exchanges primarily from Gnosis Chain (formerly xDai) to Polygon. 

All transactions typically utilized $200-$300 dollars in $DAI, $USDC, or $USDT. 

In aggregate, Pattern 2 occurred over the span of a week from Jan 15th, 2022 - Jan, 24th 2022.

Pattern 2 transactions.

Here is an example of this behavior: 

‍https://explorer.hop.exchange/?account=0x1cccff3de9b0a7c466acb31f33910691f1cb6e14

Connecting Pattern #1 and Pattern #2

Pattern #1 and #2 were found to be connected because the sybil attacker overlapped transactions on the Ethereum mainnet and the Avalanche mainnet.

Specifically, transfers between these addresses occurred on both networks denoting the connection in the two patterns.

  • 0x1100cc….d34e76a8e ←→ 0xb2369….59f264eb 
  • 0xb23691….f264eb ←→ 0x80d….19b9 

With over 30,000 addresses to comb through, it was challenging to find a connected subset, but the Transfers API was able to effectively trace transactions on Ethereum.

How to Find Airdrop Hunters

By searching the transfer history of all eligible addresses on Ethereum and Avalanche mainnet, we are able to trace shared on-chain activity to discover connected addresses.

To reduce the amount of brute-force computation required to find eligible addresses, we reduced the cluster search size by rejecting clusters with a low number of shared addresses.

After filtering out unlikely addresses, we queried Hop Exchange subgraphs across each of Hop’s different supported blockchains to generate a basic profile of each address cluster. 

If a cluster profile had repeated address behavior, it was earmarked for manual verification. 

Comments

All Comments

Recommended for you

  • Bank of Japan to Maintain Interest Rates in April

    On April 21, according to Nikkei News: The Bank of Japan will maintain interest rates unchanged in April.

  • Iranian Military: Ready to Respond Decisively to 'Enemy's Breach of Promises'

    On April 21, local time, Abdollahi, commander of the Khatam al-Anbiya Central Command of the Iranian Armed Forces, stated that Iran is prepared to respond decisively to the 'enemy's breach of promises.' Abdollahi emphasized that the current Iranian military possesses 'authority, readiness, and comprehensive strategic capabilities.' He noted that the Islamic Revolutionary Guard Corps and other defense forces have demonstrated combat capabilities in relevant operations, putting 'Israel and the United States in a difficult and fatigued position,' forcing them to 'seek a ceasefire.' Abdollahi also stressed that the Iranian armed forces maintain a high level of unity with the government and the people under the supreme leader's unified command, and will respond 'decisively, resolutely, and promptly' to any threats and actions. (CCTV News)

  • Another Iranian Oil Tanker Returns to Iran After Breaking US Blockade

    On April 21, according to CCTV News, maritime intelligence company 'TankerTrackers' reported that a tanker belonging to the National Iranian Tanker Company returned to Iran after unloading approximately 2 million barrels of crude oil in Indonesia, crossing the relevant maritime blockade line. The tanker is currently en route to Iran's main oil export hub, Khark Island, and is expected to arrive on April 22 local time. It is reported that the tanker set sail from Iran in late March, heading towards the Riau Islands of Indonesia.

  • White House: US and Iran on the Verge of Reaching an Agreement

    On April 21, White House Press Secretary Kayleigh McEnany stated in an interview with Fox News on the evening of the 20th that the United States and Iran are on the "verge of reaching an agreement." McEnany remarked, "The US has never been closer to achieving a truly good deal." However, she did not disclose any information regarding the current status of the negotiations. McEnany noted that even if an agreement is not reached, President Trump has multiple options and is not afraid to utilize these measures. Previous actions have demonstrated that Trump is not just "bluffing."

  • Kelp DAO Attacker Transfers 30,800 ETH to Special Address

    On April 21, news emerged that, according to monitoring by PeckShield, the Kelp DAO attacker transferred 30,800 ETH to a special address starting with 0x00000, possibly indicating a destruction action.

  • Trump: 'Midnight Hammer' Completely Dismantled Iran's Nuclear Dust Base

    On April 21, U.S. President Trump stated that the 'Midnight Hammer' operation has completely destroyed the 'nuclear dust' base within Iran. As a result, the cleanup will be a long and arduous process. The fake news media, including CNN and other corrupt media networks and platforms, have failed to give our great pilots the credit they deserve, instead always attempting to belittle and undermine them. They are losers!!! (Dongxin News Agency)

  • BTC Drops Below $76,000

    Market data shows that BTC has dropped below $76,000, currently priced at $75,999.63, with a 24-hour increase of 1.68%. The market is experiencing significant volatility, so please ensure proper risk management.

  • Japan Officially Allows Export of Lethal Weapons Through Cabinet Resolution

    On April 21, according to Kyodo News, the Japanese government officially revised the 'Three Principles on Transfer of Defense Equipment' and its operational guidelines during a cabinet meeting, which will, in principle, allow the export of lethal weapons. (Xinhua News Agency)

  • Trump Claims Iran Will Negotiate

    On April 21, during a phone interview with CNN, U.S. President Trump stated that Iran "will negotiate" and expressed confidence in potential talks set to take place in Pakistan. Trump remarked, "They will negotiate; if they don't, they will face unprecedented problems." He also expressed hope that both sides could reach a "fair agreement" and emphasized that Iran "will not have nuclear weapons." Additionally, he defended military actions against Iran by stating there was "no choice" and claimed that they would ultimately "wrap things up."

  • Amazon to Invest Additional $5 Billion in Anthropic

    On April 21, Amazon announced on Monday that it will invest an additional $5 billion in the artificial intelligence company Anthropic, bringing the total investment to as much as $20 billion. Anthropic develops the Claude chatbot and programming tools, and plans to invest over $100 billion in Amazon's cloud technology and chips over the next decade.