March 30, 2022

Beosin analysis of the flow of funds in response to the Ronin security incident

According to the tracking results of the Beosin-Trace safety tracking platform:

Hacker address: 0x098b716b8aaf21512996dc57eb0615e2383e2f96


Funds stolen from addresses:


0x1A2a1c938CE3eC39b6D47113c7955bAa9DD454F2


Up to now, after the stolen amount has flowed through 15 transit addresses, it has flowed into the exchange addresses:


HUOBI: 0x73f8fc2e74302eb2efda125a326655acfodc2d1b, total 2500ETH


HUOBI: 0x28ffe35688ffffd0659aee2e34778b0ae4e193ad, 1250ETH


FTX: 0xc098b2a3aa256d2140208c3de6543aaef5cd3a94, 1229.96ETH


Crypto.com: 0x6262998ced04146fa42253a5c0af90ca02dfd2a3, 0.99ETH


Hacker address balance: 175,913.70 ETH


Beosin-Trace security tracking platform will keep tracking the flow of stolen funds in real time.





@Ronin_Network ’s exploiter transferred 2,018 ETH to the new address (0x429a66e7bD829F9453CEE5239Bfeaf5657A11A3e) and transferred 2,000 ETH to @TornadoCash in 20 installments.


Related Project

Related Project Secure Score

Guess you like
Learn More
  • Monthly Recap — Over 30 Blockchain Security Incidents Occurred in March

    April 02, 2022

  • Beosin is tracing the whereabouts of the funds in the Ronin attack

    March 30, 2022

  • A brief Analysis of the Li.Finance Attack

    March 21, 2022

  • Attacked 40 Times and Lost Around $1.7 Million: An analysis of Paraluni’s Exploit

    March 14, 2022

Join the community to discuss.