In the realm of Web3, 'hidden associated addresses' are like assassins lurking in the dark, ready to pose significant risks to users at any moment. It is not uncommon for project parties to control the market with multiple alias addresses, or for hackers to use associated addresses to launder funds, while traditional tools struggle to identify these hidden relationships. This makes users feel as if they are walking on a path full of traps, constantly facing unknown dangers when making investments and transactions.
@Bubblemaps.io The 'evidencing module of relational connections' acts like a sharp pair of eyes, capable of recording evidence of address associations such as 'operating from the same IP, frequent transfers, synchronized transactions' in the form of 'on-chain evidencing NFTs'. When users view an address, they can clearly see 'this address has a documented connection with 3 high-risk addresses' and can retrieve associated evidence, such as 'transfer initiated from the same IP in March 2024', etc.
An investor discovered a documented connection between a certain project party's address and a 'known controlling address' when reviewing the address. After further examining the evidence, they confirmed that both addresses had transferred funds to an exchange during the same time period and decisively abandoned the investment. Subsequently, the project indeed collapsed due to market manipulation. A security team also discovered the connection records of a hacker address with 10 'puppet addresses' through the evidencing module and successfully traced back the stolen assets.
The evidencing function of relational connections leaves clear traces of hidden relationships on the chain, making them impossible to conceal. It provides users with a more transparent Web3 environment, allowing them to identify potential risks in advance and avoid unnecessary losses.