
Intro
I've wanted to have my own dashboard so I can monitor different EVM-based sanctions for certain contracts, and I've finally found some spare time on the weekend to do it!
The app steps through blocks to watch for events from certain contracts (0x40c57923924b5c5c5455c48d93317139addac8fb
, 0xdAC17F958D2ee523a2206206994597C13D831ec7
) and then indexes the ones that I have noted as "evm-sanction"-worthy.
Findings #1
- As of mainnet block
15294674
there is no overlap of sanctioned addresses in ChainAnalysis Sanctions Oracle and USDT Blacklist.
Findings #2
-
Address
0x881d40237659c251811cec9c364ef91dc08d300c
was added to the USDT blacklist twice, with 7 months apart - Tx1, Tx2 -
Address
0x967bb571f0fc9ee79c892abf9f99233aa1737e31
was added to the USDT blacklist twice, with 3 minutes apart - Tx1, Tx2 -
Address
0x707176b584d0ae0c77d3035da8686f8b58cda73b
was added to the USDT blacklist twice, with 8 days apart - Tx1, Tx2 -
Added
0xfae3ff7e05d921c1d48bbe6676ef5c902e32c801
was added to the blacklist twice, with 8 days apart - Tx1, Tx2
Findings #3
- Address
0x6f5901e3c53a51fce8edc15f6fa2b01b24226dcc
was the quickest to be added and removed from the blacklist, with only being blacklisted for 4 blocks - Tx1, Tx2
Findings #4
- Address
0x5441bfcda141759eaae9737a28cb2f9fd43e8869
got blacklisted at block 9554129 then tried to unblacklist itself three times (Tx1, Tx2, Tx3) before being unblacklisted 604,210 blocks later.