You're missing something here. Once the automation contract already deployed and the bot will be automatically sending any eth into the destination wallet that already programmed. Human can't compete with the bot that automated the transaction to send any ethereum that being sent to the address that already programmed for that. I have seen this scenario in the past and in so many cases even when people tried that to sent it in seconds and bot may be programmed to sent it into the milisecond or destination address can't be change. The bot will always put it back like before the hacker or scammer change the wallet.
Millisecond or not, the next block is in 20 seconds so an experienced guy would have time or maybe has a bot of his own.
Hacker is using frozen token which be moved but it has value since it's listed on CMC. I encounter this bait wallet trick using Minereum token before. I still got the wallet address and private of scam wallet. I will try to recover it and share it here to see it in actual.
Why would a frozen token have any value and why would it be listed on CMC. What you're saying does not make sense
Some token contract has locking mechanisms and it was coded in such a way that only the dev has the ability to unlock it.
Same as above. Such a token would have 0 value and would not appeal to anyone
The idea is:If I have, for example, 500 USDT and 0.1 ETH in my wallet and propagate 2 transactions:
- tx #1 send 500 USDT with fee 0.1 ETH
- tx #2 send 0.01 ETH with fee 0.09ETH
Why would the second tx confirm first ?