The following contents are organized and provided by PlatONWorld to spread more information and not represent the position of PlatONWorld. The contents are from third-party platforms, and the accuracy, authenticity, completeness, validity, and real-time nature of the information are not guaranteed.
【LAT】
Total issuance | Circulation | Pledge rate | Total pledge | Number of addresses |
10,506,250,000 | 2,910,780,000 | 30.49% | 1,498,617,144.96 | 224,116 |
【Quotes】
Trading pair | 24 hours high | 24 hours low | 24-hour trading volume |
LAT/USDT | 0.008864 | 0.008204 | 23,098,714 |
BTC/USDT | 21617.58 | 19835.12 | 11,316 |
ETH/USDT | 1746.00 | 1666.98 | 72,216 |
【10 days node data】
2022 | Active | Candidate | Exiting | Exited |
Sep 10 | 201 | 14 | 3 | 166 |
Sep 9 | 201 | 14 | 3 | 166 |
Sep 8 | 201 | 14 | 3 | 166 |
Sep 7 | 201 | 14 | 3 | 166 |
Sep 6 | 201 | 14 | 3 | 166 |
Sep 05 | 201 | 14 | 3 | 166 |
Sep 04 | 201 | 14 | 3 | 166 |
Sep 03 | 201 | 14 | 3 | 166 |
Sep 02 | 201 | 14 | 3 | 166 |
Sep 01 | 201 | 14 | 3 | 166 |
【Industry News】
LooksWhale project Discord server attacked
September 10 – The LooksWhale Project Discord server has been attacked, as monitored by CertiK. Community users are asked not to click on links, cast or approve any transactions.
Beosin: Analysis of the hacking of the DPC token contract on BNBChain
According to the Beosin EagleEye platform monitoring, the DPC token contract was hacked with a loss of approximately $103,755. analysis by the Beosin security team revealed that the attackers first used the tokenAirdop function in the DPC token contract to prepare for the conditions to receive the reward, then the attackers used USDT to exchange the DPC tokens and then added liquidity to obtain LP tokens, and then pledges the LP tokens in the token contract. The previous preparations are made to satisfy the claiming condition. The attacker then repeatedly calls the claimStakeLp function in the DPC token to repeatedly claim the reward. Because of the ” ClaimQuota = ClaimQuota.add(oldClaimQuota[addr]);” in the getClaimQuota function, the rewards can keep accumulating. Finally the attacker calls the claimDpcAirdrop function in the DPC contract to extract the rewards (DPC tokens) and exchange them for Udst to leave the market. The stolen funds are still stored at the attacker’s address and will be followed up by the Beosin security team.
👇👇👇
PlatONWorld — the base of PlatON ecological long-termists!
Welcome everyone to continue to pay attention to PlatONWorld!
PlatONWorld | Official website platonworld.org
PlatONWorld | Telegram_EN Telegram_CN
PlatONWorld | WeChat:mcqueen678
Publisher:PlatONWorld-M6,Please indicate the source for forwarding:https://platonworld.org/?p=8094