Close Menu
    Trending
    • Bitcoin’s Slide To $82K Sets Off A $1.7 Billion Chain Reaction
    • DEVgrants: Here to Help | Ethereum Foundation Blog
    • Metaplanet Raises $137 Million To Buy Bitcoin And Pay Debts
    • ETH, XRP, ADA, BNB, and HYPE
    • Circle Says Stablecoin Infrastructure Updates to Spur Use
    • Solana (SOL) Crashes Back To $112, A Level That Could Decide Everything
    • Here’s Why The Ethereum Validator Network Is So Strong
    • Crypto Market Structure Bill Passes Through Senate Committee
    CryptoGate
    • Home
    • Bitcoin News
    • Cryptocurrency
    • Crypto Market Trends
    • Altcoins
    • Ethereum
    • Blockchain
    • en
      • en
      • fr
      • de
      • it
      • ja
    CryptoGate
    Home»Altcoins»Solana’s WET Presale Relaunches After Bot Farm Snipes Supply
    Altcoins

    Solana’s WET Presale Relaunches After Bot Farm Snipes Supply

    CryptoGateBy CryptoGateDecember 6, 2025No Comments3 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    A Solana presale occasion encountered distribution points after a bot farm reportedly used over 1,000 wallets to snipe practically the complete Moist (WET) token sale in seconds. 

    Hosted by way of the decentralized trade aggregator Jupiter, the presale sold out nearly immediately. However real patrons successfully had no likelihood to take part as a result of a single actor dominated the presale, in line with organizers.

    Solana automated market maker (AMM) HumidiFi, the group behind the presale, confirmed the assault and scrapped the launch totally. The group stated it will create a brand new token and maintain an airdrop to authentic contributors whereas explicitly excluding the sniper. 

    “We’re creating a brand new token. All Wetlist and JUP staker patrons will obtain a pro-rata airdrop. The sniper just isn’t getting shit,” HumidiFi wrote. “We are going to do a brand new public sale on Monday.” 

    Supply: Jupiter

    Bubblemaps identifies alleged sniper after tracing over 1,000 wallets

    On Friday, the blockchain analytics platform Bubblemaps announced that it had recognized the entity behind the presale assault, having noticed uncommon pockets clustering throughout the token sale. 

    In an X thread, the corporate reported that at the very least 1,100 out of the 1,530 collaborating wallets displayed an identical funding and exercise patterns, suggesting {that a} single actor managed them. 

    Bubblemaps CEO Nick Vaiman informed Cointelegraph that their group analyzed presale contributors utilizing their platform and noticed patterns, together with new wallets with no prior onchain exercise, all being funded by a handful of wallets.

    These additionally obtained funding in a good time window with comparable Solana (SOL) token quantities. 

    “Regardless of among the clusters not related collectively onchain, the behavioral similarities in measurement, time, and funding all level to a single entity,” Vaiman informed Cointelegraph.

    Bubblemaps said that the sniper funded hundreds of latest wallets from exchanges, which had obtained 1,000 USDC (USDC) earlier than the sale.

    The analytics firm stated one of many clusters “slipped,” permitting them to hyperlink the assault to a Twitter deal with, “Ramarxyz,” who additionally went on X to ask for a refund.

    Bubblemaps demonstrated the wallets collaborating within the presale. Supply: Bubblemaps

    Associated: Pepe memecoin website exploited, redirecting users to malware: Blockaid

    Sybil assaults have to be handled as a “essential” safety menace

    The assault follows different Sybil assault incidents in November, the place clusters managed by single entities sniped token provides. 

    On Nov. 18, a single entity claimed 60% of aPriori’s APR token airdrop. On Nov. 26, Edel Finance-linked wallets allegedly sniped 30% of their own EDEL tokens. The group’s co-founder denied that they’d sniped the provision and claimed they’d put the tokens in a vesting contract. 

    Vaiman informed Cointelegraph that Sybil assaults have gotten extra frequent in token presales and airdrops. Nonetheless, he stated the patterns are “completely different each time.” He stated that for security, groups ought to implement Know Your Buyer (KYC) measures or use algorithms to detect sybils.

    He stated they might additionally manually evaluate presale or airdrop contributors earlier than allocating tokens. 

    “Sybil exercise must be handled as a essential safety menace to token launches,” Vaiman informed Cointelegraph. “Tasks ought to have devoted groups or outsource Sybil detection to professionals who can help.”