GoPlus Security Warning:
Please remain vigilant regarding emerging honeypot risks on the BSC network, specifically involving tokens like #4Agent. We have confirmed that the Gork4.2-themed token, #4AGENT (contract address 0x15eadc6a76ebe63758ca917a0a1f526b00ca1111), is operating as a honeypot. Unfortunately, this scheme has already entrapped smart money investors and KOLs, resulting in collective losses amounting to 170 #BNB, or approximately $100,000.
The malicious developer, who is operating under the address 0xc7a15250ef489f2ba958b250baefa820a65855fe, has already begun dispersing the stolen funds. Specifically, 123.7 #BNB was transferred to the wallet 0xFcc7873C52AE1ADA55a01d6c2976dB381C514EB5. Additionally, another 46 #BNB was swapped for #ETH through Orbiter and subsequently bridged to 0x96f4885d32ffc2b6ba9e429ac777440e3df7e775.
Tracing the funds reveals that the developer's initial capital originated from #Bitget. Further investigation into cross-chain history connects this same developer to two similar unverified malicious projects launched in the past: 0x4C2F9c8dD68bE5B137E5dB2116D0B44d7197e2eD (DEBOT) and 0xf46bd4c8A725e5650F927E35b55c3DBACA9CDF2d (U Lottery).
To safeguard your assets against honeypot scams, we strongly recommend reviewing the GoPlus security detection data available on your market or trading platform prior to investing in any MEME tokens.