Bitcoin Forum
April 15, 2026, 08:18:43 PM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Local / 中文 (Chinese) / 钱包和交易所官网 - 供核对 on: November 15, 2024, 12:56:46 PM
仅供核对,做自己的调查!
币圈诈骗多,不小心就可能被一波带走。我这收集一些钱包和交易所信息,供细心玩家核对,有问题请指出,非常感谢!
硬件钱包仅从官网直接购买,有时需付20%进口关税

开源硬件钱包官网,仅列出可以存山寨币的:
      Trezor           https://trezor.io/       https://suite.trezor.io/web/       软件GPG签名指纹:EB48 3B26 B078 A4AA 1B6F 425E E21B 6950 A2EC B65C
      Bitbox           https://bitbox.swiss/                                               软件GPG签名指纹:DD09 E413 0975 0EBF AE0D EF63 5092 49B0 68D2 15AE
      Keystone       https://keyst.one/  
Trezor,    捷克公司,使用USB连接,最知名,用户数达百万,最安全的?                       与Electrum兼容性好,与Metamask兼容性好(新版不用bridge了)。
Bitbox,    瑞士公司,使用USB连接,用户规模相对较小,目前用户评论良好;                 与Electrum兼容性好,与Metamask不兼容。
keystone,中国公司,QR码,用户规模较小,二维码扫码方式看起来比USB安全。             与Electrum兼容性差,与Metamask兼容性好。Keystone 3 Pro于2023年底发布,个人看中QR码功能,再观察1-2年...  
onekey,   中国公司,使用USB连接,用户数达百万,没有通过walletscrutiny网站的测试。与Electrum兼容性一般,与Metamask兼容性一般。

开源软件钱包官网:
      Electrum (可多重签名)              https://electrum.org/            仅比特币    软件GPG签名指纹, 6694 D8DE 7BE8 EE56 31BE D950 2BD5 824B 7F94 70E6 (Thomas Voegtlin)
      Sparrow (可多重签名)               https://sparrowwallet.com/   仅比特币    软件GPG签名指纹, D4D0 D320 2FC0 6849 A257 B38D E946 1833 4C67 4B40
      Metamask(可配合Trezor使用)     https://metamask.io/            仅山寨币
      MEW (可配合Bitbox使用)           https://www.myetherwallet.com/wallet/access    仅山寨币(网页版)

币安官网   https://www.binance.com/  或邮箱发送任意内容至download@binance.com ,回复邮件有app下载链接
2  Alternate cryptocurrencies / Altcoin Discussion / Encounter phishing attack, consult! on: May 14, 2024, 12:51:43 PM
      The Ethernet address 0xd32133612bde371c92a718fb095f0ed39b752426 (or https://eth1.trezor.io/address/0xd32133612bdE371c92a718fB095f0ed39b752426) launched more than 16000 times phishing attacks.
Through brute force attempts, it generates a temporary address similar to the attacked address (only the first 4 and the last 6 digits/letters are the same), and then uses this temporary address to transfer money to other addresses associated with the attacked address, sending a small money.

      See transaction 0xcf513e5aec19482cac7a73fd3ac3e0bacd5f773137c19675938313921a2c8277  (or https://eth1.trezor.io/tx/0xcf513e5aec19482cac7a73fd3ac3e0bacd5f773137c19675938313921a2c8277).
There are non-existent transaction information, mimicking the transaction record of the victims. Is my private key (using Bitbox02 hardware wallet) still completely secure? What's going on with this transaction?

      Look at the transaction below, in the first column there are the exact addresses of the victims, in the second column there are the imitation addresses (only the first 4 and the last 6 are the same as the victim's addresses), and the third column is the amount of the transfer. These transactions were similar to ones, which were actually initiated by the victims, and the amount were completely accurate.

0xcf513e5aec19482cac7a73fd3ac3e0bacd5f773137c19675938313921a2c8277  mined 3 hours 10 mins ago
Func_2093253501 (0xa9059cbb)
0x0ea020B3eE001f55D5B8de0580553aBb47E9Ab22 >  Pepe      0 ETH

ERC20 TOKEN TRANSFERS

0x042CAFee319FdeBa773eA55903e656e68eB8f4F9  >  0x3AeC5625e7e3867a46e6f4346DD249C4094daA9d   22672.064 USDT

0x6F48aE8c7D0A041441DAF5dFF4a72a6C369e48DA > 0x44Af5E29531E07a29571C6B4f0101905abdaC737    11000 USDT

0xd64e57E069Aa1B46bfA3C104564b5d9Ea846cd74  >  0xDA8d28a540Dd325Cac1994CD88E65Bc689E97635  60 ETH
...
0x3aA7A20C6CC511E8809C54a11ad779f4d8335C0d >  0x1e00D3907E1daF505778776bc6B22794Bdc2b68d   10888.88 USDC

Fee 0.000454589130000416 ETH (4.937536712 Gwei/gas)    939 confirmations   0 ETH
3  Local / 中文 (Chinese) / 遇到钓鱼攻击,请教! on: May 14, 2024, 12:16:43 PM
这个以太坊地址0xd32133612bdE371c92a718fB095f0ed39b752426  (或者打开https://eth1.trezor.io/address/0xd32133612bdE371c92a718fB095f0ed39b752426 )发起了1万6千多次钓鱼攻击。
它通过暴力尝试,生成与链上大额余额地址相似的临时地址(仅开头4位和末尾6位相同),然后用这个临时地址向被攻击地址关联的其它地址转账,发起微量ETH交易。

想要请教的是,后面这个交易 0xcf513e5aec19482cac7a73fd3ac3e0bacd5f773137c19675938313921a2c8277  (或者打开https://eth1.trezor.io/tx/0xcf513e5aec19482cac7a73fd3ac3e0bacd5f773137c19675938313921a2c8277)
它给出了不存在的交易信息,模仿了被攻击者的交易记录。请教一下,我的私钥(用的Bitbox02硬件钱包)目前还是绝对安全的吗?这个虚拟交易是怎么回事?

看下面的转账,第一列是被攻击者的精确地址,第二列是模仿的地址(仅开头4位和末尾6位与被攻击者地址相同),第三列转账额。这交易信息,是被攻击人确实发起过的(第二列地址中间部分不同),金额也完全精确。
0xcf513e5aec19482cac7a73fd3ac3e0bacd5f773137c19675938313921a2c8277  mined 3 hours 10 mins ago
Func_2093253501 (0xa9059cbb)
0x0ea020B3eE001f55D5B8de0580553aBb47E9Ab22 >  Pepe      0 ETH

ERC20 TOKEN TRANSFERS

0x042CAFee319FdeBa773eA55903e656e68eB8f4F9  >  0x3AeC5625e7e3867a46e6f4346DD249C4094daA9d   22672.064 USDT

0x6F48aE8c7D0A041441DAF5dFF4a72a6C369e48DA > 0x44Af5E29531E07a29571C6B4f0101905abdaC737    11000 USDT

0xd64e57E069Aa1B46bfA3C104564b5d9Ea846cd74  >  0xDA8d28a540Dd325Cac1994CD88E65Bc689E97635  60 ETH
...
0x3aA7A20C6CC511E8809C54a11ad779f4d8335C0d >  0x1e00D3907E1daF505778776bc6B22794Bdc2b68d   10888.88 USDC

Fee 0.000454589130000416 ETH (4.937536712 Gwei/gas)    939 confirmations   0 ETH
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!