In previous articles, we also introduced some specific tools and methods for tracking whale wallets. From a certain perspective, by tracking the wallets of whales or airdrop hunters, we can indeed find a better reference for our daily transactions, and even discover new currencies with high gains in the early stages.

The so-called tracking wallet means that you monitor the wallet transaction records of certain whales or airdrop hunters, and then follow its records to perform the same operation. For example, if you find that a whale bought PEPE on the second day after it was launched, you can also buy PEPE.

But this kind of operation is actually risky?

Because a major feature of the blockchain is that all actions on the chain are publicly verifiable, and those encrypted wallet addresses that have made hundreds or even thousands of times in a short period of time will often be noticed and added to the list. Monitoring list, the owner behind the wallet (whale or airdrop hunter) will definitely know that his wallet is being targeted by many people!

Therefore, at this time, some "whales" may have a wrong idea: Since so many leeks are staring at my wallet address and following me to buy and buy, wouldn't it be very profitable for me to cut them directly? They don’t know who I am anyway!

Next, we will use a specific example to explain to you how these crooked whales cut leeks!

The main example shared today is: a certain wallet issues coins and purchases by itself, attracting those who pay attention to its own wallet to follow and buy, and then directly cut leeks.

Recently, there is a MEME Coin that is relatively popular on social media, and its name is HOPPY. As shown below.

When you get this HOPPY, I believe you will not participate immediately, because there are too many similar coins, and you don’t know how many days it will return to zero. But when you find that a certain wallet address you are monitoring begins to buy HOPPY for several days in a row, will you directly follow its transaction?

For example, a wallet address named egas.eth has been buying a certain amount of HOPPY every day since July 18, and there is no sign of selling yet. As shown below.

According to normal thinking, when a similar transaction develops in our detection list, most people will immediately go to the DEXScreener or DEXTools platform to query the token and purchase it. Because at this point you would think that following the transactions from the egas.eth wallet would be a smart move. These two tools, DEXScreener or DEXTool, have been introduced in Li Huawai’s article before. They are aggregation platforms for decentralized exchanges. They are dedicated platforms for tracking and purchasing new coins. Almost all new coins can be used. Trade inside.

By further querying the on-chain transaction records of the egas.eth wallet, we can find the contract address of the HOPPY token, as shown in the figure below.

Then, you may go directly to DEXTools to search for the token and enter the trading interface, as shown in the figure below.

Attention: From this step, you may fall into the trap set by the owner behind the egas.eth wallet! Because when anyone issues coins, although the contract address is unique, the names can be repeated. For example, as you can see from the picture above, there will be many tokens named "HOPPY". Moreover, many people have a habit of only remembering the last few digits of the contract address. For example, you will remember that the last few digits of the HOPPY token contract address are "1543".

So, let’s carefully compare the contract addresses of genuine HOPPY tokens and pirated HOPPY tokens. As shown below.

It can be seen that the names of the two tokens are HOPPY, and the number of digits in the contract is also "1543". And if you happen to happen to enter the trading interface of pirated HOPPY tokens, then you will see that the price of the token is still very good. As shown below.

As you can see from the K-line in the picture above, the token has been rising steadily since it was issued on July 18. Coupled with your "trust" in the egas.eth wallet (egas.eth bought the pirated HOPPY mentioned above), you are likely to make a buying operation at this time.

After you buy it, do you feel great watching the HOPPY tokens in your wallet increase several times? You may think that you have performed a relatively perfect follow-up transaction operation.

But when you feel like selling, you will find out: the HOPPY token you bought cannot be sold at all! Can't sell!

The reason why you can't sell it is actually very simple, because the contract token itself of the pirated HOPPY token you bought may have problems. The problem is: except for the creator of the contract, others can only buy it, but not the contract token. SELL! Now, you are in tragedy!

Wallet address of egas.eth:

0x000f4432a40560bbff1b581a8b7aded8dab80026

Genuine HOPPY contract address (Ethereum chain):

0x8c130499d33097d4d000d3332e1672f75b431543

Pirated HOPPY contract address (BNB chain):

0xd3915e8592d9b9a099daf59dbadc2110ee361543

We all know that trading new coins (junk coins) is an extremely high-risk operation. If you are lucky, it will increase several times or even dozens of times in a few days. If you are not lucky, it will go back to zero. But if you lose your principal due to being fooled, it is not only a matter of luck, but also a matter of your own mentality and methods.

So, how can we avoid similar behavior? How can we avoid stepping into such a trap next time?

Here are a few simple methods, such as:

- Use the Bubblemaps tool to query the addresses of large wallets holding coins and their correlations

- Use the ArkhamIntel tool to query the whereabouts of a specific large wallet asset

- Use the DEXScreener tool to view the token’s liquidity pool size, trading volume, FDV, MCAP, K-line and other data

- You can also use the DEXTools tool to query data such as transaction volume, K-line, number of currency holders, and the platform also provides a DEXT score, which is very suitable for newcomers (you can simply understand that the higher the DEXT score, the more reliable the project is)

- Use the Scanner function in the DeDotFi tool to analyze token contracts to identify potential risks and suspicious details. A similar tool is Token Sniffer.

We have introduced and explained the above tools in previous articles. Interested friends can search for historical articles to view them.

Okay, the above is all the content shared through "Hua Li Huawai" today. Let us finally summarize and review together. This article mainly introduces some risks of following whales or airdrop hunter wallets for trading, and briefly outlines several targeted methods to deal with them. I hope today’s sharing can be helpful to everyone.

Special thanks for this article: 0x_gremlin, 0xTHades, Senka (cover design)

Disclaimer: The above content is only a personal perspective and analysis. It is only for science learning and communication among enthusiasts and does not constitute any investment advice. Investment is risky, please treat it rationally, increase risk awareness, and abide by the relevant laws and regulations of the country and region where you are located!