Original translation: GaryMa Wu talks about blockchain
резюмеThis report investigates a widespread and highly coordinated meme token farming pattern on Solana: token deployers transfer SOL to “sniper wallets”, enabling them to buy the token in the same block as the token is listed. By focusing on clear, provable funding chains between deployers and snipers, we identify a set of high-confidence extractive behaviors.
Our analysis shows that this strategy is neither an isolated phenomenon nor a fringe activity — in the past month alone, over 15,000 SOL in realized profits have been extracted from over 15,000 token issuances in this way, involving over 4,600 sniping wallets and over 10,400 deployers. These wallets exhibit an unusually high success rate (87% of sniping profits), clean exits, and a structured operating model.
Key findings:
Deployer-sponsored sniping is systematic, profitable, and often automated, with sniping activity most concentrated during U.S. business hours.
Multi-wallet farming structures are very common, often using temporary wallets and coordinated exits to simulate real demand.
· The obfuscation methods are constantly upgraded, such as multi-hop funding chains and multi-signature sniping transactions, to evade detection.
Despite its limitations, our one-hop funding filter still captures the clearest, most repeatable examples of “insider” behavior at scale.
This report proposes a set of actionable heuristics to help protocol teams and front-ends identify, flag, and respond to such activity in real time — including tracking early position concentrations, tagging deployer-associated wallets, and issuing front-end warnings to users on high-risk issuances.
While our analysis covers only a subset of same-block sniping activities, their scale, structure, and profitability suggest that Solana token issuance is being actively manipulated by a coordinated network and that existing defenses are insufficient.
MethodologyThis analysis started with a clear goal: to identify behaviors on Solana that indicate coordinated meme token farming, specifically where deployers are funding hacked wallets on the same block as the token launch. We divided the problem into the following phases:
1. Filter the same block snipingWe first filter for wallets that were sniped in the same block after deployment. Due to: Solana has no global mempool; the addresses of tokens must be known before they appear on the public frontend; and the extremely short time between deployment and first DEX interaction. This behavior is almost impossible to occur naturally, so same-block sniping becomes a high-confidence filter to identify potential collusion or privileged activity.
2. Identify the wallet associated with the deployerTo distinguish between highly skilled snipers and coordinated “insiders”, we tracked the SOL transfers between deployers and snipers before the token went live, and only marked wallets that met the following conditions: directly received SOL from deployers; directly sent SOL to deployers. Only wallets with direct transfers before the launch were included in the final dataset.
3. Linking sniping to token profitsFor each sniping wallet, we map its trading activities on the sniped token, specifically calculating: the total amount of SOL spent on buying the token; the total amount of SOL sold on DEX; and the realized net profit (not nominal profit). This allows us to accurately attribute the profit extracted from the deployer of each sniping.
4. Measuring size and wallet behaviorWe analyze the scale of such activities from multiple dimensions: the number of independent deployers and sniper wallets; the number of confirmed coordinated same-block sniping; the distribution of sniping profits; the number of tokens issued by each deployer; and the reuse of sniper wallets across tokens.
5. Traces of machine activityTo understand how these operations work, we grouped sniping activity by UTC hour. The results show a concentration of activity in specific time windows, with a significant drop-off in the late evening UTC hours, suggesting that this is more of a cron job or manual execution window aligned to the United States than a global, continuous automation.
6. Exit Behavior AnalysisFinally, we study the behavior of the deployers associated wallets when selling the targeted tokens: measuring the time between the first purchase and the final sale (holding time); counting the number of independent sell transactions used by each wallet to exit. This allows us to distinguish whether the wallet chooses to liquidate quickly or sell gradually, and examines the correlation between exit speed and profitability.
Focus on the clearest threatsWe first measured the scale of same-block sniping in the pump.fun issuance and the results were shocking: over 50% of tokens were sniped in the creation block — same-block sniping has gone from a fringe case to a dominant issuance pattern.
On Solana, same-block participation typically requires: pre-signed transactions; off-chain coordination; or deployers and buyers sharing infrastructure.
Not all same-block sniping is equally malicious, and there are at least two types of actors: “cast-the-net” bots — testing heuristics or small-scale speculation; and coordinated insiders — including deployers who fund their own buyers.
To reduce false positives and highlight true coordinated behavior, we added strict filtering to the final indicator: only sniping with direct SOL transfers between the deployer and the sniping wallet before launch is counted. This allows us to confidently lock in: wallets directly controlled by the deployer; wallets acting under the command of the deployer; wallets with internal channels.
Case study 1: Direct fundingThe deployer wallet 8qUXz3xyx7dtctmjQnXZDWKsWPWSfFnnfwhVtK2jsELE sent a total of 1.2 SOL to 3 different wallets, and then deployed a token called SOL > BNB. The 3 funded wallets bought the tokens in the same block they were created, before they were visible to the wider market. They then quickly sold their profits, performing a coordinated flash exit. This is a textbook example of farming tokens through pre-funded sniping wallets, and is directly captured by our funding chain method. Although the technique is simple, it is performed at scale across thousands of issuances.
Case Study 2: Multi-hop FundingThe wallet GQZLghNrW9NjmJf8gy8iQ4xTJFW4ugqNpH3rJTdqY5kA was associated with multiple token sniping. This entity did not directly inject funds into the sniping wallet, but instead transferred SOL through 5-7 layers of transit wallets to the final sniping wallet, thus completing the sniping in the same block.
Our existing methods only detect some initial transfers by the deployer, but fail to capture the entire chain of the final sniper wallet. These relay wallets are usually one-time use and are only used to transfer SOL, making them difficult to associate through simple queries. This gap is not a design flaw, but a trade-off in computing resources – tracing multi-hop fund paths in large-scale data is feasible, but the cost is huge. Therefore, the current implementation prioritizes high-confidence, direct links to maintain clarity and reproducibility.
We used Arkham’s visualization tool to show this longer chain of funds, graphically showing how the funds flowed from the initial wallet to the shell wallet and finally to the deployer wallet. This highlights the complexity of the obfuscation of the source of funds and also points the way for future improvement of detection methods.
Why focus on “wallets that directly fund and sniped on the same block”
In the remainder of this article, we only study wallets that directly received funds from the deployer before going live and sniped in the same block. The reasons are as follows: they contribute significant profits; they have the least obfuscation methods; they represent the most operational malicious subset; and studying them provides the clearest heuristic framework for detecting and mitigating more advanced extraction strategies.
DiscoverFocusing on the subset of “same-block sniping + direct funding chain”, we reveal a widespread, structured and highly profitable on-chain coordination behavior. The following data covers March 15 to date:
1. Sniping on the same block and funded by the deployer is very common and systematica. In the past month, it was confirmed that 15,000+ tokens were directly sniped by the funded wallets at the launch block;
b. Involving 4,600+ sniper wallets and 10,400+ deployers;
c. It accounts for approximately 1.75% of the total issuance of pump.fun.
2. The behavior is profitable on a large scalea. Directly obtain funds from the sniper wallet and achieve a net profit > 15,000 SOL;
b. The sniping success rate is 87%, and there are very few failed transactions;
c. The typical income of a single wallet is 1-100 SOL, and a few exceed 500 SOL.
3. Repeated deployment and sniping to target farm networksa. Many deployers use new wallets to batch create tens to hundreds of tokens;
b. Some sniping wallets perform hundreds of sniping in a day;
c. A “hub-and-spoke” structure is observed: one wallet funds multiple sniping wallets, all sniping the same token.
4. Sniping presents a human-centered time modela. The peak activity is between UTC 14: 00 – 23: 00; it is almost stopped between UTC 00: 00 – 08: 00;
b. It matches the US working hours, which means it is manually/cron timed triggering, rather than fully automatic 24 hours a day around the world.
5. One-time wallets and multi-signature transactions confuse ownershipa. The deployer injects funds into several wallets at the same time and signs the same transaction to snipe;
b. These burned wallets will no longer sign any transactions;
c. The deployer splits the initial purchase into 2-4 wallets to disguise the real demand.
Exit BehaviorTo gain a deeper understanding of how these wallets exit, we break down the data into two behavioral dimensions:
1. Exit Timing — the time from the first purchase to the final sale;
2. Swap Count — The number of separate sell transactions used to exit.
Data Conclusion1. Exit speed
a. 55% of the snipers were sold out within 1 minute;
b. 85% of positions were cleared within 5 minutes;
c. 11% completed within 15 seconds.
2. Number of sales
a. More than 90% of sniper wallets exit with only 1-2 sell orders;
b. Gradual selling is rarely used.
3. Profitability Trend
a. The most profitable ones are wallets that withdraw money in
b. Although the average single profit from longer holding or multiple sales is slightly higher, the number is extremely small and the contribution to the total profit is limited.
explain
These patterns suggest that deployer-funded sniping is not a transactional activity, but rather an automated, low-risk extraction strategy:
· Buy first → sell quickly → exit completely.
Single sell means no concern for price fluctuations, just taking advantage of the opportunity to dump.
A few more complex exit strategies are the exception, not the mainstream.
Actionable insights
The following recommendations are intended to help protocol teams, front-end developers, and researchers identify and respond to extractive or collaborative token issuance patterns by transforming observed behaviors into heuristics, filters, and alerts to increase user transparency and reduce risk.
in conclusionThis report reveals a persistent, structured, and highly profitable Solana token issuance extraction strategy: deployer-funded same-block sniping. By tracking direct SOL transfers from deployers to sniping wallets, we pinpoint a group of insider-style behaviors that exploit Solana’s high-throughput architecture for coordinated extraction.
Although this method only captures a portion of the same-block sniping, its scale and pattern show that this is not scattered speculation, but an operator with a privileged position, a repeatable system and clear intentions. The importance of this strategy is reflected in:
1. Distorting early market signals to make a token appear more attractive or competitive;
2. Endangering retail investors — they become the exit liquidity without knowing it;
3. Undermine trust in open token issuance, especially on platforms like pump.fun that pursue speed and ease of use.
Mitigating this problem requires more than just passive defenses, but better heuristics, early warning, protocol-level guardrails, and ongoing efforts to map and monitor collaborative behavior. Detection tools exist — the question is whether the ecosystem is willing to actually apply them.
This report takes the first step: providing a reliable, reproducible filter to target the most obvious coordinated behaviors. But this is just the beginning. The real challenge lies in detecting highly obfuscated, evolving strategies and building an on-chain culture that rewards transparency rather than extraction.
This article is sourced from the internet: Exiting the Liquidity Machine: Inside the Pumpfun Токен Launch Related: In the chaotic era of encrypted payment cards, is this a business that is difficult to sustain? Written by: Web3 farmer Frank How many U cards do you have now? From the early Dupay and OneKey Card, to the Card launched by exchanges Bitget and Bybit, to the encrypted payment card services of Infini, Morph and SafePal, and even Coinbase and MetaMask have entered the market. Since this year, encrypted payment cards (U cards) targeting the PayFi narrative have almost become the standard for Web3 project parties. As a new round of players rush to grab market share, promotional tweets and review information for various U cards are overwhelming, which reminds people of the colorful shared bicycles that filled the streets. The dazzling array of options has also shifted the markets focus from availability to comparisons of registration/usage thresholds, rates and other dimensions, trying to find the… Анализ #Рынок #Токен #Инструмент #© Copyright NoticeМассив Pre One-week token unlocking: STRK unlocks 3.8% of the circulating supply Next Must-watch next week | The GENIUS Act is expected to have a final vote in the Senate; May CPI data released (June 9-June Related articles SKR Open for Claiming, Is Solana Mobile Worth Watching? 6086cf14eb90bc67ca4fc62b 10 798 1 24H Hot Coins and News | Trump once again promised not to sell Bitcoin confiscated by the United States; US SEC said PoW 6086cf14eb90bc67ca4fc62b 39 795 1 After reverse hacking North Korean hackers, I saw how they workRecommended Articles 6086cf14eb90bc67ca4fc62b 25 858 3 Первый год Трампа на посту президента, семья запускает “криптовалютный станок для печати денег” 6086cf14eb90bc67ca4fc62b 7 785 Zcash is Just the Beginning, How Will a16z Redefine the Privacy Narrative in 2026? 6086cf14eb90bc67ca4fc62b 11 020 The Birth of the XT RWA Zone: Industry Turning Points Discussed at the AMA Session 6086cf14eb90bc67ca4fc62b 16 105 2 Нет комментариев Вы должны войти в систему, чтобы оставить комментарий! Немедленно войдите в систему Нет комментариев... Последние статьи Did Jane Street “Manipulate” BTC? Decoding the AP System, Understanding the Power Struggle Behind ETF Creation and Redemption Pricing 4 часа назад 197 Stop Comparing Bitcoin to Gold—It’s Now a High-Volatility Software Stock 4 часа назад 247 Matrixport Research: $25 Billion Gamma Unwinding Imminent, Liquidity Yet to Return Behind the Rebound 4 часа назад 229 ERC-5564: Ethereum’s Stealth Era Has Arrived, Receiving Addresses No Longer ‘Exposed’ 4 часа назад 241 Hong Kong Regulatory Green Light: Asseto Enables DL Holdings to Achieve Compliance for Two RWA Business Implementations 4 часа назад 232 Популярные сайтыTempoLighterGAIBПланерПланкаRaylsBCPokerVooi Bee.com Крупнейший в мире портал Web3. Партнеры CoinCarp Binance CoinMarketCap CoinGecko Coinlive Доспехи Загрузите приложение Bee Network APP и начните путешествие по web3 Белая книга Роли ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ © 2021-2026. Все права защищены. Политика конфиденциальности | Условия предоставления услуг Скачать приложение Bee Network APP и начните путешествие по web3 Крупнейший в мире портал Web3 Партнеры CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors Белая книга Роли ЧАСТО ЗАДАВАЕМЫЕ ВОПРОСЫ © 2021-2026. Все права защищены. Политика конфиденциальности | Условия предоставления услуг Поиск ПоискInSiteOnChainСоциальнаяНовости Hot to you: Охотники за воздухом Анализ данных Криптознаменитости Детектор-ловушка Русский English 繁體中文 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский智能索引记录
-
2026-03-02 13:53:44
综合导航
成功
标题:WTB: 3S-GE Motor ad tranny in MD/DC/VA/DE/WV area [Archive] - Toyota MR2 Message Board
简介:Anyone got one lemme know
-
2026-03-02 12:26:58
电商商城
成功
标题:FAU byk乳液怎么样 - 京东
简介:京东是专业的FAU byk乳液网上购物商城,为您提供FAU byk乳液价格图片信息、FAU byk乳液怎么样的用户评论、
-
2026-03-02 12:56:01
综合导航
成功
标题:(精选)景象的作文300字3篇
简介:在平平淡淡的日常中,大家最不陌生的就是作文了吧,借助作文可以宣泄心中的情感,调节自己的心情。那么,怎么去写作文呢?以下是
-
2026-03-02 12:55:29
图片素材
成功
标题:儿童节的作文 描写儿童节的作文 关于儿童节的作文 素材-作文网
简介:作文网精选关于儿童节的作文,包含儿童节的作文素材,关于儿童节的作文题目,以儿童节为话题的作文大全,作文网原创名师点评,欢
-
2026-03-02 12:16:53
综合导航
成功
标题:Ninja Boy - Play The Free Mobile Game Online
简介:Ninja Boy - click to play online. Free Ninja Boy game for yo
-
2026-03-02 13:06:08
教育培训
成功
标题:二年级春节作文(10篇)
简介:在日常学习、工作和生活中,大家对作文都再熟悉不过了吧,写作文可以锻炼我们的独处习惯,让自己的心静下来,思考自己未来的方向
-
2026-03-02 12:13:53
教育培训
成功
标题:【精选】续写的作文300字三篇
简介:在学习、工作或生活中,大家一定都接触过作文吧,作文是经过人的思想考虑和语言组织,通过文字来表达一个主题意义的记叙方法。那
-
2026-03-02 12:31:39
综合导航
成功
标题:Sitemap PIP - PIP Greenville, NC
简介:The Sitemap of PIP.
-
2026-03-02 12:27:39
综合导航
成功
标题:人族鎮守使-第2804章 青陽仙君的懷疑最新章節-台灣小說網
简介:台灣小說網整理人族鎮守使全集無彈窗在線閱讀,當前章節:第2804章 青陽仙君的懷疑
-
2026-03-02 13:03:47
综合导航
成功
标题:楠溪客 第3页 - 34楼
简介:楠溪客主要介绍温州特色小吃,各类名小吃,擅长做剁椒鱼头,奶汤鱼头,红烧鱼头,沸腾鱼,酸菜鱼等等各类菜肴,店铺位置位于温州
-
2026-03-02 12:51:01
图片素材
成功
标题:捅马蜂窝的作文1000字 描写捅马蜂窝的作文 关于捅马蜂窝的作文-作文网
简介:作文网精选关于捅马蜂窝的1000字作文,包含捅马蜂窝的作文素材,关于捅马蜂窝的作文题目,以捅马蜂窝为话题的1000字作文
-
2026-03-02 12:29:28
综合导航
成功
标题:Export data from Disconnected Mailbox to PST OST2
简介:Download Now! Convert from Offline Mailbox File to PST. Down
-
2026-03-02 13:04:55
教育培训
成功
标题:《匆匆》读后感作文
简介:在学习、工作乃至生活中,大家总少不了接触作文吧,作文是经过人的思想考虑和语言组织,通过文字来表达一个主题意义的记叙方法。
-
2026-03-02 12:30:52
综合导航
成功
标题:Matrixport Market Watch: Funding Structure Shifts During Crypto Market Correction Bee Network
简介:Macroeconomic disturbances and cooling risk appetite In lat
-
2026-03-02 13:02:54
教育培训
成功
标题:小学作文放风筝
简介:在日常的学习、工作、生活中,大家都不可避免地要接触到作文吧,作文是经过人的思想考虑和语言组织,通过文字来表达一个主题意义
-
2026-03-02 13:02:59
视频影音
成功
标题:《Ipnosi》1962电影在线观看完整版剧情 - xb1
简介:Ipnosi(1962)电影免费在线观看完整版剧情介绍,Ipnosi主要演员阵容、上映时间、最新预告片下载播放、高清海报
-
2026-03-02 12:39:36
游戏娱乐
成功
标题:开心泡泡龙,开心泡泡龙小游戏,4399小游戏 www.4399.com
简介:开心泡泡龙在线玩,开心泡泡龙下载, 开心泡泡龙攻略秘籍.更多开心泡泡龙游戏尽在4399小游戏,好玩记得告诉你的朋友哦!
-
2026-03-02 13:08:05
电商商城
成功
标题:MERCURY MW306R怎么样 - 京东
简介:京东是专业的MERCURY MW306R网上购物商城,为您提供MERCURY MW306R价格图片信息、MERCURY
-
2026-03-02 12:40:59
综合导航
成功
标题:大气简约红色商务PPT模板-果果圈模板
简介:大气简约红色商务PPT模板
-
2026-03-02 12:20:44
综合导航
成功
标题:What's Next in the Future of Audience Engagement? — Invision
简介:With all the hybrid and digital events of the past year, wha
-
2026-03-02 12:31:22
综合导航
成功
标题:The crypto market is experiencing a major correction. Is the bull market retracing its course or has it already ended? Bee Network
简介:Just four days into November, the crypto market has already
-
2026-03-02 13:08:30
综合导航
成功
标题:From 0 to 1: Deploying your first AI application on Gonka Bee Network
简介:introduction A New Paradigm for Decentralized AI Computing
-
2026-03-02 13:07:24
图片素材
成功
标题:先烈的作文20字 描写先烈的作文 关于先烈的作文-作文网
简介:作文网精选关于先烈的20字作文,包含先烈的作文素材,关于先烈的作文题目,以先烈为话题的20字作文大全,作文网原创名师点评
-
2026-03-02 12:11:46
综合导航
成功
标题:放假了作文300字3篇(优)
简介:在日常学习、工作或生活中,大家对作文都不陌生吧,作文是一种言语活动,具有高度的综合性和创造性。你知道作文怎样才能写的好吗
-
2026-03-02 12:29:30
综合导航
成功
标题:Perm Occupational Therapist-Day · GQR
简介:GQR Healthcare is representing a well-known health system se
-
2026-03-02 13:08:10
教育培训
成功
标题:【精】春天小学作文
简介:在日常学习、工作抑或是生活中,大家都不可避免地要接触到作文吧,写作文可以锻炼我们的独处习惯,让自己的心静下来,思考自己未
-
2026-03-02 13:07:44
综合导航
成功
标题:Chapter 2 of Story: AI-native infrastructure empowers the $70 trillion IP economy Bee Network
简介:Since launching its own website, Story has been paving the w
-
2026-03-02 12:13:47
教育培训
成功
标题:关于运动会三年级作文合集9篇
简介:在日复一日的学习、工作或生活中,大家总免不了要接触或使用作文吧,借助作文可以宣泄心中的情感,调节自己的心情。你知道作文怎
-
2026-03-02 13:06:10
综合导航
成功
标题:特种部队2最后一枪什么意思最新章节_特种部队2最后一枪什么意思小说免费全文阅读_恋上你看书网
简介:7308小队是最隐秘的战略突击队,没有服役年限。因为敌对国家与境外势力“关注”这支突击队,出于保护队员的需要,这支突击队
-
2026-03-02 12:27:48
游戏娱乐
成功
标题:众神大陆官服,众神大陆礼包,开服表,新服-03u《众神大陆》精灵157区02月26日 09:01火爆开启
简介:03游戏众神大陆,众神大陆传奇,零三游戏,正版传奇,官方正版授权,绿色服,网页游戏新服礼包,游戏攻略,开服表,网页游戏平