IMM-2026-0046
SLASHED
Keccak
0xb9cc1b4c215b656bc11375d61d66508d06bb2c27476956f5ec9db8745c6ae425
Type
ADDRESS
Verdict
MALICIOUS
Confidence
92.0%
Severity
95
Value at risk
$0.00
Created
April 30, 2026 12:24 AM
Envelope
v1
Signed payload
Primary matcher
address
0x39d484eabd1e6be837f9dbbb1de540d425a70061
Scope
galileo-testnet
home
sepolia
Evidence
redacted public excerpt
Reasoning excerpt
The counterparty address 0x1Be27Fd265f38a6D8cf0feE1EE1189291c48b665 is explicitly identified by kit_screening as an 'inferno drainer collector front' matching Q4 2024 SlowMist tracking on a known malicious collector cohort. The proposed transaction transfers tokens to this flagged address. The combination of a known-malicious counterparty, active tracking by threat intelligence, and a direct token transfer constitutes unambiguous evidence of a drain attempt.
Full evidence (TEE-sealed) is fetchable by holders of the unsealing key. Public mirror carries hash only.
TEE attestation
Curated by human
Heuristically published from a known threat catalog, not derived from a TEE-verified verdict.
Evidence CID
0xc15a4ea059112289519b136e25936fcd6680bdca22981f1bc6f6998294f81f73
Network impact
Live
Since publish
Cache hits
0
SDK check() matches
Agents synced
0
distinct callers
Attacks blocked
0
tx-level intercepts
Pool reverts
0
Uniswap v4 hook
USD protected
$0.00
no blocks recorded yet
Hits over time
each bar is one of 30 equal slices since publish
publish
now
Recent intercepts
| Agent | Method | Chain | When |
|---|---|---|---|
|
No agent has had to block this antibody yet.
Intercepts appear here in real time as agents match this pattern in the wild.
|
|||
| Chain | Tx | State |
|---|---|---|
|
sepolia
|
0xd829ac39..b6bf | removed |