Ethereum network overloaded again, strong suspicions of spam by Cryptovest



[ad_1]

Ethereum network overloaded again, strong suspicion of spam

The network is again undergoing what looks like a spam attack. A single address is sending and receiving transactions, consuming 24.85% of the gas, based on data from the Ethereum service station. This was the peak value in the early hours of Tuesday UTC, and later transactions began to gradually decrease their use of gas.

Whereas in the past the increase in activity was connected to flights or other project-related transactions, this time, the use seems like a real spam, which was also reflected in the comments on Etherscan .

"What's this? It's sending spam to the entire network. It looks like a clone of PlayerBook, but it makes no sense, it's recording strange names," wrote the EtherGuy user.

Another user explored the transactions and noticed a repetition scheme of the wallet addresses, loaded with Ethereum to pay taxes:

"This is a ring-based ring wallet system with around 150,000 to 200,000 ethereum in it The bots translate the addr …

This article was first published on Cryptovest

Disclaimer: Fusion Media would like to remind you that the data contained in this site are not necessarily real-time or accurate.All CFDs (stocks, indices, futures) and Forex prices are not provided by stock exchanges but by market makers, so prices may not be accurate and may differ from the actual price of market, which means that prices are indicative and not appropriate for commercial purposes, therefore, Fusion Media assumes no responsibility for any commercial losses that may occur as a result of use of this data.

Fusion Media or anyone involved with Fusion Media will not accept any liability for losses or damages as a result of relying on information including data, quotes, charts and purchase / sale signals contained on this site. Please be fully informed about the risks and costs associated with trading financial markets, it is one of the most risky forms of investment.

[ad_2]
Source link