🚀 Gate Square “Gate Fun Token Challenge” is Live!
Create tokens, engage, and earn — including trading fee rebates, graduation bonuses, and a $1,000 prize pool!
Join Now 👉 https://www.gate.com/campaigns/3145
💡 How to Participate:
1️⃣ Create Tokens: One-click token launch in [Square - Post]. Promote, grow your community, and earn rewards.
2️⃣ Engage: Post, like, comment, and share in token community to earn!
📦 Rewards Overview:
Creator Graduation Bonus: 50 GT
Trading Fee Rebate: The more trades, the more you earn
Token Creator Pool: Up to $50 USDT per user + $5 USDT for the first 50 launche
A certain Monad Airdrop user mistakenly destroyed $112,000 in MON rewards due to multiple consecutive failed transactions.
BlockBeats news, on November 25, a crypto airdrop player continuously submitted failed transactions on the blockchain, ultimately burning all of their MON airdrop token rewards worth over $112,000, spending it all on failed transaction Gas fees. The wallet address “0x7f4” was originally assigned approximately $112,700 worth of Monad (MON) tokens for participating in the Monad ecosystem. However, in subsequent operations, the player submitted hundreds of failed on-chain transactions, where all transactions deducted Gas even if they failed, ultimately costing the entire airdrop reward. On-chain signs indicate that the wallet owner may have used a script to send a large number of transactions in a short period of time, without realizing that the first few had already failed, resulting in all subsequent transactions failing and Gas burning continuously. Therefore, before large transfers, it is advisable to conduct small test transactions to confirm that on-chain parameters are normal. At the same time, some Monad airdrop users also reported “missing rewards.” Cos, the founder of the security company Slow Fog, stated that the Monad official airdrop claim page has a vulnerability that allows attackers to “bind” a user's airdrop to a hacker's wallet address. Multiple users claimed that their entitled airdrops were bound to the hacker's address. Cos stated that this vulnerability allows hackers to “hijack” the user session of the claim page, redirecting the airdrop to themselves without wallet confirmation.