Recently, I found that everyone in the community is very interested in how to use multiple accounts to get airdrops to maximize profits and how to detect and prevent witch attacks.

The first stop for airdrop interaction - essential wallet tools

In the crypto world, the first thing to prepare is the METAMASK wallet, which is the key to future on-chain operations. When downloading and registering, please be sure to write down the mnemonic on paper to ensure safety. The mnemonic should not be simply copied to the chat window or taken a photo to save, as this is extremely risky. In order to protect the wallet funds, please use a special notebook to handwrite the mnemonic to prevent loss and theft.

Once you have completed the wallet registration, you have taken the first step to participate in the airdrop project. Most projects use METAMASK to interact. Some public chain mainnets may have been added to METAMASK, while others need to be added manually. When adding manually, please make sure to provide accurate and complete information.

It should be noted that not all projects require the use of METAMASK wallets. In order to attract traffic, some public chains have developed their own wallets for users to interact with. However, the steps for downloading and registering are basically the same. The key is to always keep a backup of the wallet mnemonics. (Remember to classify them, otherwise you won’t be able to find them later)

The second stop of airdrop interaction - three-piece encryption social package

After registering the basic wallet, you need to download three essential software to register in the crypto world: Discord, Telegram and Twitter. These three are social media platforms commonly used in future airdrop tasks and official activities, so we must register.

Similarly, you can download and register by searching on Google. For beginners, please be sure to use the official website and do not click on the links in these three websites easily. Some phishing websites use this method to steal users' wallet information. Clicking on an unsafe link may lead to jumping to the wallet signature page. If you click on the signature, your funds may be stolen by hackers.

During the airdrop interaction process, for some situations where you need to participate in a batch of accounts to obtain greater benefits, if you do not have enough accounts, you can purchase accounts through Google search on related websites. Search keywords such as 'xxx wholesale' to find relevant channels. After the purchase is completed, these accounts can be bound to the wallet for subsequent task operations.

The third stop of airdrop interaction——Fingerprint Browser

If you use multiple accounts and wallets, then an essential tool is a fingerprint browser (such as Ads Power), because the fingerprint browser can isolate the IP of each different account and imitate the real user, thus preventing Sybil attacks. This will be explained in more detail below.

  1. Use of fingerprint browser: When using multiple accounts and wallets, fingerprint browser (such as Ads Power) is a key tool that can isolate the IP address of each different account and imitate real user behavior to prevent witch attacks. Other overseas service provider websites, such as oxyLabs, IPRoyal, etc., can also be used to achieve IP isolation.

  2. Tools for batch generation of wallets: When interacting in batches and participating in airdrops, it is necessary to use auxiliary tools. Token Tool is a fully functional website that can perform other operations in addition to assisting interactions. Among them, batch generation of wallets is one of the commonly used functions. Users can choose different public chains, enter the number of wallets to be generated, deposit a certain amount of interaction, and save the private key and mnemonic. The generated wallet is generated by a third-party platform and is only suitable for airdrops. It is recommended to discard it immediately after receiving the airdrop.

  3. Collecting income to the exchange: In order to collect income to the exchange, you can use OKX's sub-wallet to collect it. The collection process is as follows: enter the OK official website and log in - Personal Center - Sub-account (a separate account can generate 5 sub-accounts) - Create a sub-account - Enter name and password - Select a normal sub-account - Open the asset control column to allow deposits to sub-accounts - Submit all - Open to switch - Click to switch - Deposit - Add a new wallet (open 20 more) - Deposit to different addresses. When withdrawing money, enter the corresponding addresses one by one.

Through the above operations, the address can be protected from witches.

The fourth stop of airdrop interaction - tools for tracing airdrops


Thanks for sharing these tools and methods for exploring potential airdrops. To summarize:

  1. DeFiLlama: A tool for tracking airdrops. In addition to checking the TVL of a project, it can also find potential airdrops. On the homepage of DeFiLlama, click DeFi, and then find the Airdrops page, which lists all the projects that DeFiLlama has researched and has airdrop expectations, and ranks them according to their TVL.

  2. Airdrops.io: A third-party aggregation platform that helps users summarize projects with airdrop opportunities. The platform is divided into four major sections: the latest, the hottest, the most potential, and the pledged ones. Users can click on any project to view related airdrop information.

  3. ROOTDATA: An auxiliary project query website that collects data from the earliest projects. The homepage shows the projects that have recently completed financing. Users can filter projects with strong backgrounds and airdrop expectations. You can also view projects that have recently launched the mainnet and testnet.

  4. CryptoRANK: A support website that provides a variety of data query functions. Users can follow projects that have recently received funding to obtain information about airdrops.

  5. Task-based referendum tools: Platforms such as Galxe.com, Rabbithole.gg, and Quest 3 (quest3.xyz) publish tasks. In particular, some well-known projects may publish tasks on these platforms to attract traffic and product experience. Completing the tasks will get you different rewards.

  6. Governance platform: Participate in the governance and voting of projects, such as Snapshot and Guild. Join the project camp, participate in voting and governance, and improve the quality of wallet chain behavior.

  7. Donation platforms: such as GITCOIN, which increase the weight of the account through project donations and help obtain more airdrop opportunities.

These tools and methods provide multiple ways to tap into potential airdrops and cover different types of projects and platforms.


The fifth stop of airdrop interaction: airdrop collection


When we have invested in more projects, it is very likely that some airdrops have been sent to your wallet. At this time, in addition to making calendar notes, we can also use third-party tools.

Here I recommend Earni.fi airdrop claiming tool. Enter the address and it will help us check which airdrops are available. Unfortunately, some airdrops require membership to see. When you see an airdrop available, remember to claim it or take a snapshot as soon as possible, otherwise your previous efforts will be wasted.

The sixth stop of airdrop interaction - cross-chain bridge

After the airdrop mission is determined, it is sometimes necessary to transfer assets from one network (network a) to another network (network b). In order to achieve this cross-chain operation, cross-chain tools are often required. At present, some commonly used third-party cross-chain bridges include orbiter, layerswap, stargate, etc. These bridges can universally support all networks compatible with the Ethereum Virtual Machine (EVM). In addition, there are some officially provided cross-chain bridges that can become the tools we focus on.

The following are some commonly used third-party cross-chain bridges:

https://www.orbiter.finance/

https://www.layerswap.io/app

https://stargate.finance/

And some official bridges:

Starknet official bridge: https://starkgate.starknet.io/

Zksync official bridge: https://portal.zksync.io/bridge/

Base official bridge: https://bridge.base.org/

By using these cross-chain bridges, users can easily transfer assets from one network to another, realizing the circulation of assets between different blockchains. The choice of these bridges depends on the needs of users and the networks involved. (At this time, try to choose a cross-chain bridge with low handling fees, otherwise it will be very uncomfortable to transfer funds)

Airdrop Interaction Station 7 - Airdrop Interaction Auxiliary Tools

When conducting airdrop activities, it is often necessary to check the real-time data on the chain. Here are some recommended professional websites, including Ultrasound, which focuses on providing real-time Ethereum Gas fee queries. Gas fees are directly related to our costs, so we should try to reduce this cost if we can save expenses.

GAS query: https://debank.com/

Ethereum GAS and burning query: https://ultrasound.money/

Project lock-up amount query: https://defillama.com/

NFT free mint monitoring: https://mint.fun/feed/trending

Network add: https://chainlist.org/

On-chain K-line: https://www.dextools.io/

Exchange K-line: https://www.aicoin.com/zh-CN/download

Cancel Token authorization: https://revoke.cash/zh

I will pick out a few key points to explain to you. First, as long as you link your wallet to DeBank, all the on-chain transaction information on your wallet will be presented to you, which is convenient for calculating your gas fee expenditure during the airdrop process; the second is Token authorization, which is very important. If our wallet is not authorized, some unsafe websites will cause the wallet to be unsafe, and you can use revoke to cancel the authorization to avoid risks. This website can actually be used in daily interactions, and I suggest you save it.

The eighth stop of airdrop interaction - Witch prevention

The witch detection logic usually includes analyzing the following three aspects of data:

  1. Same physical hardware: Using the same physical hardware may be identified as a witch. To circumvent this problem, it is recommended to use a fingerprint browser, especially to avoid the same IP address. At the same time, use different mobile phones/computers and different browsers to interact to imitate the behavior of real users.

  2. Batch operations of on-chain interactions: Too frequent or concentrated batch operations may attract attention. To avoid this problem, you can set different interaction amounts, spread out the time of batch operations, and ensure that the interaction amount is not too small to simulate real user behavior to the greatest extent possible.

In general, the key to circumventing witch detection is to imitate the behavior of real users as much as possible, including using fingerprint browsers, avoiding the same IP, using different devices and browsers, setting different interaction amounts, etc.

We remind everyone to act with caution and do your own research (Do Your Own Research, DYOR), because the crypto market is unpredictable and being fully prepared will help you better cope with future uncertainties.

This content is only for popular science learning and communication among crypto enthusiasts, and does not constitute investment advice or suggestions. Please treat it rationally, establish correct concepts, and enhance risk awareness. In addition, users who are keen on exploring and learning Web3, GameFi, and inscription projects are also welcome to follow me on the homepage and enter the community to communicate with many crypto enthusiasts.

#sol #BTC

I am Xiao Yu. If you like my articles, please click on my avatar and follow me.