Ethereum Network Attack Data
Data relating to the Ethereum network attacks between Sep 18 2016 and Oct 20 2016
The post that describes this data can be found at
- Ethereum Network Attacker’s IP Address Is Traceable
- The Ongoing Ethereum Attacks (Work In Progress)
Version 1 Script And Data - Oct 22 2016
Version 1 of the getETHNetworkAttackTxsV1 Perl script just extracts all the raw data relating to the 6 known attacker's offensive contracts.
The data extracted is 89.2 Mb and has been zipped down to 6.3 Mb zipped in the file ETHNetworkAttackTxsV1_20161022_1150.zip.
You will need to sync Parity with the tracing mode on. Clear your existing blockchain data if you already have synced it. Then run parity --tracing on
to sync the new blockchain data with the Parity tracing mode on.
Some sample data follows:
Geth Memory Crash Contract
curl localhost:8545 -X POST --header 'Content-type: application/json' --data '{"jsonrpc":"2.0", "method":"trace_filter", "params":[{"fromBlock": "2283397", "toBlock": "2301372", "toAddress": ["0xb284e6a25d0972f9a92fec45d2075067db2d49b0"]}], "id": "1"}'
$VAR1 = {
'jsonrpc' => '2.0',
'result' => [
{
'traceAddress' => [],
'transactionPosition' => '0x01',
'blockNumber' => '0x22d785',
'action' => {
'create' => {
'from' => '0x1d0fee96aa9750f87894b034d25e17edca8b76a3',
'value' => '0x00',
'init' => '0x60606040526000805561048f806100166000396000f3606060405236156100775760e060020a6000350463120eed7f81146100795780631251dbc3146100ad5780633ffaa2f3146100e6578063913fdfbd1461010757806397388497146102535780639df4254e1461025b578063dfb92b39146102d0578063f2f88614146102f5578063fa662ae214610373575b005b6004356000908152600260208181526040808420602435855290920190529020545b60408051918252519081900360200190f35b61009b6004356000818152600160205260409020805474010000000000000000000000000000000000000000900460ff16905b50919050565b61009b600435600081815260016020819052604090912090810154906100e0565b6100776004803590602480359081019101356044356000805460010190556040805160808101825233815260208181018490528183018790528251601f860182900482028101820190935284835283926060830191879087908190840183828082843782019150505050505081526020015060016000506000600060005054815260200190815260200160002060005060008201518160000160006101000a815481600160a060020a030219169083021790555060208201518160000160146101000a81548160ff02191690830217905550604082015181600101600050556060820151816002016000509080519060200190828054600181600116156101000203166002900490600052602060002090601f016020900481019282601f1061041957805160ff19168380011785555b506104499291505b80821115610454576000815560010161023f565b60005461009b565b6100776004356024356000828152600260205260408120600101548114156102a957604080822081518083019092528282526001602083810182815287865260029091529251825591519101555b50600091825260026020818152604080852080546001018082558652909201905290912055565b61038f60043560008181526001602052604090208054600160a060020a0316906100e0565b604080516020818101835260008083526004358082526001808452918590206002818101805488519581161561010002600019011691909104601f81018690048602850186019097528684526103ab9692959491939290918301828280156104835780601f1061045857610100808354040283529160200191610483565b61009b60043560008181526002602052604090208054906100e0565b60408051600160a060020a039092168252519081900360200190f35b60405180806020018281038252838181518152602001915080519060200190808383829060006004602084601f0104600f02600301f150905090810190601f16801561040b5780820380516001836020036101000a031916815260200191505b509250505060405180910390f35b82800160010185558215610237579182015b8281111561023757825182600050559160200191906001019061042b565b505050505050505050565b5090565b820191906000526020600020905b81548152906001019060200180831161046657829003601f168201915b505050505091506100e056',
'gas' => '0x052ae1'
}
},
'subtraces' => '0x00',
'transactionHash' => '0x403b4bf619ab760a5d88a73a87fb12606f150328075d9795ef34f5157525b887',
...
The data will be parsed into a more useable form in the following weeks and be made available here.
Enjoy. (c) BokkyPooBah 2016. The MIT licence.