LIVE · ON-CHAIN · Generated Wednesday · April 29, 2026 · 10:16 UTCIssue №2026119 · bluewingintel.com
BlueWingIntel
Fraud Watch · Daily · BTC · ETH · SOL · TRX · BNB · Free
Issue №2026119
Wednesday · April 29, 2026 · 10:16 UTC
Ed. #1 · First Edition
$17.49M flowed into Tornado Cash in the last 24 hours.
179 discrete deposits across four pool denominations, computed live from on-chain logs. Tornado's smart contracts were sanctioned in August 2022 — the contracts themselves are immutable and keep accepting ETH. This is what the chain actually shows, not an API estimate.
Editor's note — what this edition actually is
This is Fraud Watch №1. Every figure below is pulled live from public sources at generation time.
No sample data, no padding. Sections without live signal are hidden, not filled. We lead with
Tornado Cash deposit counts because the signal is timely, computable on free public RPC, and
missing from every free competitor. Our proprietary labeled-wallet database seeds with every run.
Lead · Mixer Inflows · Tornado Cash · Last 24h
$17.49M in · 179 deposits · 7461.80 ETH
Pool
Deposits
ETH in
Contract
0.1 ETH
48
4.80 ETH
0x12D66f87…
1 ETH
37
37.00 ETH
0x47CE0C6e…
10 ETH
22
220.00 ETH
0x910Cbd52…
100 ETH
72
7200.00 ETH
0xA160cdAB…
Computed via eth_getLogs against the four canonical Tornado Cash ETH pools.
Contracts were designated by OFAC on 2022-08-08; they remain immutable and continue accepting deposits.
Anyone who deposited in the last 24 hours has, by Treasury position, touched sanctioned infrastructure.
Our Focus · USDT-TRC20 on TRON · The Rail Nobody Covers
$181.2K
across 2 notable transfers in the latest Tronscan window — live from the chain, not an aggregator.
TRON USDT moved ~$62B at last issuance count and is the dominant stablecoin venue for pig-butchering, ransomware off-ramps, and sanctions evasion. Sell-side doesn't cover it. Chainalysis dashboards it but won't publish it. This is BlueWing's lane.
DPRK breached LayerZero's infrastructure, forged a bridge message, and walked $290 million out of KelpDAO in one transaction. Aave is holding hundreds of millions in bad debt. The dominoes are still falling. DeFi United is scrambling to catch them.
Live X Alerts · PeckShield / SlowMist / ZachXBT · Last 72h
@CertiKAlert2026-04-29 09:59
#CertiKInsight 🚨
We have seen an exploit involving @AftermathFi.
~$900K USDC drained so far suivision.xyz/account/0x1a65…
Still under investigation.
Stay vigilant!
#CertiKInsight 🚨
We have seen an exploit involving @syndicateio through a compromise of the Commons bridge.
This address acquired ~18.5M SYND and sold them for ~$330 K, which has been bridged to Ethereum.
basescan.org/address/0x58e2e…
Stay Vigilant!
nitter.net/syndicateio/status/204…
Syndicate (@syndicateio)
I
#PeckShieldAlert @KyberNetwork Exploiter has laundered 2,900 $ETH ($6.8M) to #Tornadocash
KyberSwap fell victim to a reentrancy attack on November 23, 2023, which resulted in a loss of ~$47M.
🚨SlowMist TI Alert🚨
We have detected a malicious transaction exploiting a flawed EIP-7702 account, resulting in a loss of 1,988.5 $QNT (approx. 54.93 $ETH).
The root cause is that the admin identity of a QNT reserve pool is held by an EOA (0xc6ddf90790b433743bd050c1d1d45f673a3413f4), which delegated its code to a `Ba
🥳Unphishable is participating in the current @thedaofund × @Giveth Ethereum Security Quadratic Funding round!
If you care about #Web3 security and want to help users stay safe from phishing scams, please consider supporting us.🫶
Unphishable (unphishable.io) is a free, browser-based phishing simulation platform with 3
🚨. @ZetaChain has been exploited. Based on initial analysis, the following outlines the root cause.
Root Cause
The core vulnerability lies in the call function of ZetaChain's GatewayZEVM contract, which lacks both access control and input validation. This allows any arbitrary user to invoke cross-chain calls through
Forensic reports · when a daily scan is not enough
Stop guessing. Start citing.
A risk verdict in thirty seconds, a filable report in three days, or the full intelligence package in ten. Same evidence discipline every BlueWing PDF has shipped since day one: SHA-256 manifests, confidence-graded findings, and a transaction hash behind every claim.
Free · Risk Check
Thirty seconds · Public
$0
Paste the address. Green, yellow, or red in under thirty seconds. OFAC and sanctions, drainer and scam-registry hits, exposure tags, one-line plain-English summary. Enough to know whether to walk away or pick up the phone. No credit card.
First 3 lookups · no email needed Then 2 / day · 10 / week · email-verified Cloudflare Turnstile bot protection
For the deal that needs a paper trail. Full transaction history, a three-hop connected-wallet graph, mixer entry flags, supply-concentration analysis, drainer-ring identification, multi-chain on the single entity. Watermarked PDF with SHA-256 evidence manifest, independently verifiable by your counterparty. Priced to close on a corporate card. No RFP. No committee.
For serious matters where counsel is already involved. Everything in Pro, plus the OSINT layer that holds up under scrutiny: GitHub scam-site enumeration, IPFS metadata, WHOIS pivots, social and homoglyph cross-reference, up to three chains with a five-hop network graph. Structured JSON export for the data room. Optional on-chain anchoring for chain-of-custody. Used by attorneys in live crypto-fraud matters.