🚀 Gate Square “Gate Fun Token Challenge” is Live!
Create tokens, engage, and earn — including trading fee rebates, graduation bonuses, and a $1,000 prize pool!
Join Now 👉 https://www.gate.com/campaigns/3145
💡 How to Participate:
1️⃣ Create Tokens: One-click token launch in [Square - Post]. Promote, grow your community, and earn rewards.
2️⃣ Engage: Post, like, comment, and share in token community to earn!
📦 Rewards Overview:
Creator Graduation Bonus: 50 GT
Trading Fee Rebate: The more trades, the more you earn
Token Creator Pool: Up to $50 USDT per user + $5 USDT for the first 50 launche
A certain Monad Airdrop user mistakenly destroyed $112,000 in MON rewards due to multiple consecutive failed transactions.
On November 25, an Airdrop player in the Blockchain continuously submitted failed transactions, ultimately burning all of his MON Airdrop Token rewards worth over $112,000, spent entirely on the Gas fees of the failed transactions. The Wallet Address “0x7f4” was originally allocated approximately $112,700 worth of Monad (MON) tokens for participating in the Monad ecosystem. However, this player submitted hundreds of failed on-chain transactions in subsequent operations, with all transactions deducting Gas even if they failed, leading to the complete depletion of the Airdrop rewards. On-chain indications show that the wallet owner may have used a script to send a large number of transactions in a short period without realizing that the initial few had already failed, causing all subsequent ones to fail and the Gas to burn continuously. Therefore, before making large transfers, it is advisable to conduct small test transactions to confirm whether the on-chain parameters are normal. At the same time, some Monad Airdrop users also reported that “rewards were lost.” Cos, the founder of the security company Slow Mist, stated that the Monad official Airdrop claim page has a vulnerability that allows attackers to “bind” a user's Airdrop to the hacker's Wallet address. Multiple users claimed that their entitled Airdrops were bound to the hacker's address. Cos indicated that this vulnerability allows hackers to “hijack” the user session of the claim page and redirect the Airdrop to themselves without wallet confirmation.