原文翻譯:GaryMa Wu談區塊鏈
概括This report investigates a widespread and highly coordinated meme token farming pattern on Solana: token deployers transfer SOL to “sniper wallets”, enabling them to buy the token in the same block as the token is listed. By focusing on clear, provable funding chains between deployers and snipers, we identify a set of high-confidence extractive behaviors.
Our analysis shows that this strategy is neither an isolated phenomenon nor a fringe activity — in the past month alone, over 15,000 SOL in realized profits have been extracted from over 15,000 token issuances in this way, involving over 4,600 sniping wallets and over 10,400 deployers. These wallets exhibit an unusually high success rate (87% of sniping profits), clean exits, and a structured operating model.
Key findings:
Deployer-sponsored sniping is systematic, profitable, and often automated, with sniping activity most concentrated during U.S. business hours.
Multi-wallet farming structures are very common, often using temporary wallets and coordinated exits to simulate real demand.
· The obfuscation methods are constantly upgraded, such as multi-hop funding chains and multi-signature sniping transactions, to evade detection.
Despite its limitations, our one-hop funding filter still captures the clearest, most repeatable examples of “insider” behavior at scale.
This report proposes a set of actionable heuristics to help protocol teams and front-ends identify, flag, and respond to such activity in real time — including tracking early position concentrations, tagging deployer-associated wallets, and issuing front-end warnings to users on high-risk issuances.
While our analysis covers only a subset of same-block sniping activities, their scale, structure, and profitability suggest that Solana token issuance is being actively manipulated by a coordinated network and that existing defenses are insufficient.
MethodologyThis analysis started with a clear goal: to identify behaviors on Solana that indicate coordinated meme token farming, specifically where deployers are funding hacked wallets on the same block as the token launch. We divided the problem into the following phases:
1. Filter the same block snipingWe first filter for wallets that were sniped in the same block after deployment. Due to: Solana has no global mempool; the addresses of tokens must be known before they appear on the public frontend; and the extremely short time between deployment and first DEX interaction. This behavior is almost impossible to occur naturally, so same-block sniping becomes a high-confidence filter to identify potential collusion or privileged activity.
2. Identify the wallet associated with the deployerTo distinguish between highly skilled snipers and coordinated “insiders”, we tracked the SOL transfers between deployers and snipers before the token went live, and only marked wallets that met the following conditions: directly received SOL from deployers; directly sent SOL to deployers. Only wallets with direct transfers before the launch were included in the final dataset.
3. Linking sniping to token profitsFor each sniping wallet, we map its trading activities on the sniped token, specifically calculating: the total amount of SOL spent on buying the token; the total amount of SOL sold on DEX; and the realized net profit (not nominal profit). This allows us to accurately attribute the profit extracted from the deployer of each sniping.
4. Measuring size and wallet behaviorWe analyze the scale of such activities from multiple dimensions: the number of independent deployers and sniper wallets; the number of confirmed coordinated same-block sniping; the distribution of sniping profits; the number of tokens issued by each deployer; and the reuse of sniper wallets across tokens.
5. Traces of machine activityTo understand how these operations work, we grouped sniping activity by UTC hour. The results show a concentration of activity in specific time windows, with a significant drop-off in the late evening UTC hours, suggesting that this is more of a cron job or manual execution window aligned to the United States than a global, continuous automation.
6. Exit Behavior AnalysisFinally, we study the behavior of the deployers associated wallets when selling the targeted tokens: measuring the time between the first purchase and the final sale (holding time); counting the number of independent sell transactions used by each wallet to exit. This allows us to distinguish whether the wallet chooses to liquidate quickly or sell gradually, and examines the correlation between exit speed and profitability.
Focus on the clearest threatsWe first measured the scale of same-block sniping in the pump.fun issuance and the results were shocking: over 50% of tokens were sniped in the creation block — same-block sniping has gone from a fringe case to a dominant issuance pattern.
On Solana, same-block participation typically requires: pre-signed transactions; off-chain coordination; or deployers and buyers sharing infrastructure.
Not all same-block sniping is equally malicious, and there are at least two types of actors: “cast-the-net” bots — testing heuristics or small-scale speculation; and coordinated insiders — including deployers who fund their own buyers.
To reduce false positives and highlight true coordinated behavior, we added strict filtering to the final indicator: only sniping with direct SOL transfers between the deployer and the sniping wallet before launch is counted. This allows us to confidently lock in: wallets directly controlled by the deployer; wallets acting under the command of the deployer; wallets with internal channels.
Case study 1: Direct fundingThe deployer wallet 8qUXz3xyx7dtctmjQnXZDWKsWPWSfFnnfwhVtK2jsELE sent a total of 1.2 SOL to 3 different wallets, and then deployed a token called SOL > BNB. The 3 funded wallets bought the tokens in the same block they were created, before they were visible to the wider market. They then quickly sold their profits, performing a coordinated flash exit. This is a textbook example of farming tokens through pre-funded sniping wallets, and is directly captured by our funding chain method. Although the technique is simple, it is performed at scale across thousands of issuances.
Case Study 2: Multi-hop FundingThe wallet GQZLghNrW9NjmJf8gy8iQ4xTJFW4ugqNpH3rJTdqY5kA was associated with multiple token sniping. This entity did not directly inject funds into the sniping wallet, but instead transferred SOL through 5-7 layers of transit wallets to the final sniping wallet, thus completing the sniping in the same block.
Our existing methods only detect some initial transfers by the deployer, but fail to capture the entire chain of the final sniper wallet. These relay wallets are usually one-time use and are only used to transfer SOL, making them difficult to associate through simple queries. This gap is not a design flaw, but a trade-off in computing resources – tracing multi-hop fund paths in large-scale data is feasible, but the cost is huge. Therefore, the current implementation prioritizes high-confidence, direct links to maintain clarity and reproducibility.
We used Arkham’s visualization tool to show this longer chain of funds, graphically showing how the funds flowed from the initial wallet to the shell wallet and finally to the deployer wallet. This highlights the complexity of the obfuscation of the source of funds and also points the way for future improvement of detection methods.
Why focus on “wallets that directly fund and sniped on the same block”
In the remainder of this article, we only study wallets that directly received funds from the deployer before going live and sniped in the same block. The reasons are as follows: they contribute significant profits; they have the least obfuscation methods; they represent the most operational malicious subset; and studying them provides the clearest heuristic framework for detecting and mitigating more advanced extraction strategies.
發現Focusing on the subset of “same-block sniping + direct funding chain”, we reveal a widespread, structured and highly profitable on-chain coordination behavior. The following data covers March 15 to date:
1. Sniping on the same block and funded by the deployer is very common and systematica. In the past month, it was confirmed that 15,000+ tokens were directly sniped by the funded wallets at the launch block;
b. Involving 4,600+ sniper wallets and 10,400+ deployers;
c. It accounts for approximately 1.75% of the total issuance of pump.fun.
2. The behavior is profitable on a large scalea. Directly obtain funds from the sniper wallet and achieve a net profit > 15,000 SOL;
b. The sniping success rate is 87%, and there are very few failed transactions;
c. The typical income of a single wallet is 1-100 SOL, and a few exceed 500 SOL.
3. Repeated deployment and sniping to target farm networksa. Many deployers use new wallets to batch create tens to hundreds of tokens;
b. Some sniping wallets perform hundreds of sniping in a day;
c. A “hub-and-spoke” structure is observed: one wallet funds multiple sniping wallets, all sniping the same token.
4. Sniping presents a human-centered time modela. The peak activity is between UTC 14: 00 – 23: 00; it is almost stopped between UTC 00: 00 – 08: 00;
b. It matches the US working hours, which means it is manually/cron timed triggering, rather than fully automatic 24 hours a day around the world.
5. One-time wallets and multi-signature transactions confuse ownershipa. The deployer injects funds into several wallets at the same time and signs the same transaction to snipe;
b. These burned wallets will no longer sign any transactions;
c. The deployer splits the initial purchase into 2-4 wallets to disguise the real demand.
Exit BehaviorTo gain a deeper understanding of how these wallets exit, we break down the data into two behavioral dimensions:
1. Exit Timing — the time from the first purchase to the final sale;
2. Swap Count — The number of separate sell transactions used to exit.
Data Conclusion1. Exit speed
a. 55% of the snipers were sold out within 1 minute;
b. 85% of positions were cleared within 5 minutes;
c. 11% completed within 15 seconds.
2. Number of sales
a. More than 90% of sniper wallets exit with only 1-2 sell orders;
b. Gradual selling is rarely used.
3. Profitability Trend
a. The most profitable ones are wallets that withdraw money in
b. Although the average single profit from longer holding or multiple sales is slightly higher, the number is extremely small and the contribution to the total profit is limited.
explain
These patterns suggest that deployer-funded sniping is not a transactional activity, but rather an automated, low-risk extraction strategy:
· Buy first → sell quickly → exit completely.
Single sell means no concern for price fluctuations, just taking advantage of the opportunity to dump.
A few more complex exit strategies are the exception, not the mainstream.
Actionable insights
The following recommendations are intended to help protocol teams, front-end developers, and researchers identify and respond to extractive or collaborative token issuance patterns by transforming observed behaviors into heuristics, filters, and alerts to increase user transparency and reduce risk.
綜上所述This report reveals a persistent, structured, and highly profitable Solana token issuance extraction strategy: deployer-funded same-block sniping. By tracking direct SOL transfers from deployers to sniping wallets, we pinpoint a group of insider-style behaviors that exploit Solana’s high-throughput architecture for coordinated extraction.
Although this method only captures a portion of the same-block sniping, its scale and pattern show that this is not scattered speculation, but an operator with a privileged position, a repeatable system and clear intentions. The importance of this strategy is reflected in:
1. Distorting early market signals to make a token appear more attractive or competitive;
2. Endangering retail investors — they become the exit liquidity without knowing it;
3. Undermine trust in open token issuance, especially on platforms like pump.fun that pursue speed and ease of use.
Mitigating this problem requires more than just passive defenses, but better heuristics, early warning, protocol-level guardrails, and ongoing efforts to map and monitor collaborative behavior. Detection tools exist — the question is whether the ecosystem is willing to actually apply them.
This report takes the first step: providing a reliable, reproducible filter to target the most obvious coordinated behaviors. But this is just the beginning. The real challenge lies in detecting highly obfuscated, evolving strategies and building an on-chain culture that rewards transparency rather than extraction.
This article is sourced from the internet: Exiting the Liquidity Machine: Inside the Pumpfun 代幣 Launch Related: In the chaotic era of encrypted payment cards, is this a business that is difficult to sustain? Written by: Web3 farmer Frank How many U cards do you have now? From the early Dupay and OneKey Card, to the Card launched by exchanges Bitget and Bybit, to the encrypted payment card services of Infini, Morph and SafePal, and even Coinbase and MetaMask have entered the market. Since this year, encrypted payment cards (U cards) targeting the PayFi narrative have almost become the standard for Web3 project parties. As a new round of players rush to grab market share, promotional tweets and review information for various U cards are overwhelming, which reminds people of the colorful shared bicycles that filled the streets. The dazzling array of options has also shifted the markets focus from availability to comparisons of registration/usage thresholds, rates and other dimensions, trying to find the… #分析#市場#代幣#工具© 版權聲明文章版权归作者所有,未经允许请勿转载。 上一篇 One-week token unlocking: STRK unlocks 3.8% of the circulating supply 下一篇 Must-watch next week | The GENIUS Act is expected to have a final vote in the Senate; May CPI data released (June 9-June 相關文章 Reflect’s Early Bird Deposits Open; Perena Launches Season 1 Points Program (October 29th) 6086cf14eb90bc67ca4fc62b 17,945 1 Why is the market not buying into the reopening of the US government after a 43-day shutdown? 6086cf14eb90bc67ca4fc62b 18,649 In-depth analysis of the Virtuals protocol: the rise of the trillion-dollar proxy economy 6086cf14eb90bc67ca4fc62b 25,157 1 This week’s featured interactive projects: Kuru testnet swipe transactions; Zama union tasks; Yala stablecoin deposits 6086cf14eb90bc67ca4fc62b 25,929 3 Will Coinbase’s opening of its IPOs to retail investors across the US bring fresh capital to the market? 6086cf14eb90bc67ca4fc62b 17,159 The crossroads of the crypto market: political compliance or free and open source? 6086cf14eb90bc67ca4fc62b 36,745 暫無評論 您必須先登入才能發表評論! 立即登入 暫無評論... 最新的文章 Did Jane Street “Manipulate” BTC? Decoding the AP System, Understanding the Power Struggle Behind ETF Creation and Redemption Pricing 8小時前 314 Stop Comparing Bitcoin to Gold—It’s Now a High-Volatility Software Stock 8小時前 446 Matrixport Research: $25 Billion Gamma Unwinding Imminent, Liquidity Yet to Return Behind the Rebound 8小時前 414 ERC-5564: Ethereum’s Stealth Era Has Arrived, Receiving Addresses No Longer ‘Exposed’ 8小時前 355 Hong Kong Regulatory Green Light: Asseto Enables DL Holdings to Achieve Compliance for Two RWA Business Implementations 8小時前 390 熱門網站TempoLighterGAIB滑翔機普朗克雷爾斯BCPokerVooi Bee.com 全球最大的 Web3 入口網站 合作夥伴 CoinCarp Binance CoinMarketCap CoinGecko 幣活 盔甲 下載Bee Network APP開啟您的Web3之旅 白皮書 角色 常問問題 © 2021-2026.版權所有。. 隱私政策 | 服務條款 下載蜜蜂網路APP 並開始 web3 之旅 全球最大的Web3入口網站 合作夥伴 CoinCarp Binance CoinMarketCap CoinGecko Coinlive Armors 白皮書 角色 常問問題 © 2021-2026.版權所有。. 隱私政策 | 服務條款 搜尋 搜尋站內鏈上社群媒體新聞 熱門推薦: 擼毛打金 數據分析 必關大神 教我避坑 繁體中文 English 简体中文 日本語 Tiếng Việt العربية 한국어 Bahasa Indonesia हिन्दी اردو Русский 繁體中文智能索引记录
-
2026-03-02 06:28:56
综合导航
成功
标题:我们在成长中考作文
简介:在平平淡淡的日常中,大家都接触过作文吧,作文根据体裁的不同可以分为记叙文、说明文、应用文、议论文。你写作文时总是无从下笔
-
2026-03-02 06:32:40
综合导航
成功
标题:ABBC的四字词语_ABBC式词语大全_词组网
简介:词组网ABBC的词语频道,介绍ABBC的四字词语,ABBC式词语大全,ABBC词语有哪些,ABBC的词语用法,学组词,涨
-
2026-03-02 12:16:44
综合导航
成功
标题:乡村风光_700字_作文网
简介:远远望去,几座小房子嵌在荒凉的土地上,这就是农村。虽然有些偏僻,它的美丽却依然不打折扣。 农村里人家,几乎家家都种的有竹
-
2026-03-02 13:57:03
综合导航
成功
标题:PerformanceNodeEntry.duration property Node.js perf_hooks module Bun
简介:API documentation for property node:perf_hooks.PerformanceNo
-
2026-03-02 12:19:57
综合导航
成功
标题:Las cámaras de la DGT que controlan las líneas continuas, ¿dónde están y cómo funcionan?
简介:La DGT ha instalado cuatro cámaras en Madrid para controlar
-
2026-03-02 14:12:42
教育培训
成功
标题:精选水果二年级作文集锦九篇
简介:在日复一日的学习、工作或生活中,大家都经常看到作文的身影吧,借助作文人们可以实现文化交流的目的。你写作文时总是无从下笔?
-
2026-03-02 12:35:17
综合导航
成功
标题:关于小学学作文800字集锦七篇
简介:在平平淡淡的日常中,大家都写过作文,肯定对各类作文都很熟悉吧,作文是人们把记忆中所存储的有关知识、经验和思想用书面形式表
-
2026-03-02 13:54:47
综合导航
成功
标题:MR2 SW20 3SGTE 3RD GEN - $1,700 [Archive] - Toyota MR2 Message Board
简介:Utilizing the widely popular GT2871R dual ball bearing turbo
-
2026-03-02 14:04:01
综合导航
成功
标题:伙伴的作文400字
简介:无论是在学校还是在社会中,大家都尝试过写作文吧,借助作文人们可以反映客观事物、表达思想感情、传递知识信息。相信很多朋友都
-
2026-03-02 12:40:18
综合导航
成功
标题:Wroth sb.2. World English Historical Dictionary
简介:Wroth sb.2. World English Historical Dictionary
-
2026-03-02 13:51:32
综合导航
成功
标题:Events, Webinars, and Industry Conferences ICF
简介:ICF participates in a variety of industry conferences in add
-
2026-03-02 12:50:30
综合导航
成功
标题:【纵论天下】金灿荣:大国竞争搞谋杀非常不符合国际原则-新华网
简介:【纵论天下】金灿荣:大国竞争搞谋杀非常不符合国际原则 ---现任美国政府整个外交政策的思路,就是按照美国优先的原则重塑
-
2026-03-02 06:33:39
游戏娱乐
成功
标题:星神纪元(新服好福利)_绿色网页游戏 手机游戏公益服--送VIP送元宝 无限元宝GM 变态稀有游戏 高额返利
简介:2wi游戏平台专注精品网页游戏,精品手机游戏,让网页游戏和手机游戏玩家更爽更省钱玩游戏,更多福利更多惊喜!
-
2026-03-02 06:31:58
综合导航
成功
标题:“槐”念
简介:晚风静静地拾起那一片片落花,也拾起了我的回忆,连同我的思念,轻扣家的门扉那是仲夏的黄昏之时,柳垂下墨玉般的枝条,渐渐地注
-
2026-03-02 12:36:48
综合导航
成功
标题:关于考试的作文_关于考试前的作文_关于考试之后的作文_作文网
简介:作文网关于考试的作文提供大量精选关于考试的作文,包含关于考试的作文,我的考试作文,以考试为话题的作文,欢迎投稿发表您的作
-
2026-03-02 14:02:09
教育培训
成功
标题:[热门]学英语作文9篇
简介:无论在学习、工作或是生活中,大家都跟作文打过交道吧,作文可分为小学作文、中学作文、大学作文(论文)。你写作文时总是无从下
-
2026-03-02 06:30:22
教育培训
成功
标题:追寻高中作文
简介:在生活、工作和学习中,大家都不可避免地要接触到作文吧,通过作文可以把我们那些零零散散的思想,聚集在一块。一篇什么样的作文
-
2026-03-02 14:16:13
教育培训
成功
标题:难忘的秋游作文(共15篇)
简介:在日常学习、工作抑或是生活中,许多人都有过写作文的经历,对作文都不陌生吧,借助作文人们可以实现文化交流的目的。那么一般作
-
2026-03-02 12:57:00
教育培训
成功
标题:【经典】天空的作文500字
简介:在学习、工作乃至生活中,许多人都有过写作文的经历,对作文都不陌生吧,借助作文人们可以实现文化交流的目的。那要怎么写好作文
-
2026-03-02 06:35:45
新闻资讯
成功
标题:数据科学中的“帕累托法则”, 站长资讯平台
简介:一个多世纪以前,政治经济学教授维弗雷多·帕累托发表了他对于社会财富分配的研究结果。他所观察到的严重的不平等
-
2026-03-02 13:48:28
综合导航
成功
标题:面相 第28页 - 吉吉算命网
简介:面相 第28页_吉吉算命网
-
2026-03-02 12:36:11
图片素材
成功
标题:叫醒的作文1500字 描写叫醒的作文 关于叫醒的作文-作文网
简介:作文网精选关于叫醒的1500字作文,包含叫醒的作文素材,关于叫醒的作文题目,以叫醒为话题的1500字作文大全,作文网原创
-
2026-03-02 09:45:22
教育培训
成功
标题:同学的友谊优秀作文
简介:在日常学习、工作和生活中,大家都写过作文吧,作文是由文字组成,经过人的思想考虑,通过语言组织来表达一个主题意义的文体。一
-
2026-03-02 09:45:02
综合导航
成功
标题:宝宝八个月可以趴着转身但是脚没动正常吗? - 34知道 - 34楼
简介:宝宝的每一个小动作都牵动着家长的心。最近有妈妈问,宝宝 8 个月了,趴着的时候能转身,但脚却没动,这正常吗?…
-
2026-03-02 13:09:30
教育培训
成功
标题:【推荐】四年级数学作文合集九篇
简介:在学习、工作或生活中,大家最不陌生的就是作文了吧,作文是从内部言语向外部言语的过渡,即从经过压缩的简要的、自己能明白的语
-
2026-03-02 13:58:51
综合导航
成功
标题:New battlefield of geopolitical conflict: Israeli hackers stole $81.7 million in precise strikes on Iranian exchanges Bee Network
简介:Original author: ChandlerZ, Foresight News As the full-scal
-
2026-03-02 14:21:30
教育培训
成功
标题:关于快乐的五一的作文300字三篇
简介:在日常生活或是工作学习中,大家总少不了接触作文吧,写作文是培养人们的观察力、联想力、想象力、思考力和记忆力的重要手段。怎
-
2026-03-02 12:33:31
教育培训
成功
标题:实用的二年级秋天作文5篇[热]
简介:在学习、工作或生活中,大家最不陌生的就是作文了吧,作文是从内部言语向外部言语的过渡,即从经过压缩的简要的、自己能明白的语
-
2026-03-02 13:08:48
综合导航
成功
标题:ç¢§æ²æ²çæ¼é³_ç¢§æ²æ²çææ_ç¢§æ²æ²çç¹ä½_è¯ç»ç½
简介:è¯ç»ç½ç¢§æ²æ²é¢é,ä»ç»ç¢§æ²æ²,ç¢§æ²æ²çæ¼é³,
-
2026-03-02 12:22:35
图片素材
成功
标题:政府的作文20字 描写政府的作文 关于政府的作文-作文网
简介:作文网精选关于政府的20字作文,包含政府的作文素材,关于政府的作文题目,以政府为话题的20字作文大全,作文网原创名师点评