BlockchainSpider
  • What is BlockchainSpider?
  • Guides
    • Crawl a transaction subgraph
    • Collect label data
    • Collect transaction data
  • subgraph spiders
    • Overview
    • BFS
    • Poison
    • Haircut
    • APPR
    • TTR
  • label spiders
    • Overview
    • CryptoScamsDB
    • LabelCloud
    • OFAC
    • Tor
  • Transaction spiders
    • Overview
    • Collect by block order
    • Collect by transaction hash
  • Extractors
    • Overview
    • Deduplicate
    • Local community
  • Settings
    • APIKeys
    • Cache
    • Customizing your workflow
Powered by GitBook
On this page
  • The KuCoin incident
  • Start a crawl task
  • Visualization for results
  1. Guides

Crawl a transaction subgraph

PreviousWhat is BlockchainSpider?NextCollect label data

Last updated 3 years ago

The KuCoin incident

The Kucoin exchange was attacked by hackers in September 2020, and there was a large number of stolen funds that have not been tracked until now.

In this section, we will demonstrate how to crawl a transaction subgraph of on Ethereum and trace the illegal fund of the hacker!

Start a crawl task

Run on this command for tracing the subgraph of the source node as follow:

scrapy crawl txs.eth.ttr -a source=0xeb31973e0febf3e3d7058234a5ebbae1ab4b8c23

You can find the transactions on ./data/0xeb3...c23.csv on finished.

Visualization for results

Try to import the transactions and the importance of the addresses in the subgraph ./data/importance/0xeb3...c23.csv to .

The hacker is related to Tornado Cash, a mixing server, it shows that the hacker took part in money laundering!

KuCoin hacker
Gephi