Deployer + Holder Analysis

We will be analyzing deployer and holder wallets to keep our users safe from bad actors. We will accomplish this 4 ways:

  • Analyzing all addresses for patterns of activity that are strongly associated with scams

  • Determining a wallet's social identity from our database of social-fi activity, addresses scraped directly from twitter, and a probabilistic model for determining a wallet's social identity.

  • Blacklisting certain deployer and holder wallets that have been involved in rugs and other scams

  • Whitelisting certain addresses that are trustworthy and have minimal or no involvement with scams

Last updated