Back to Blog

How to Make One Million in Two Minutes: Using MetaSleuth to Track "Smart" Money on Solana

MetaSleuth
April 29, 2024

MetaSleuth is a crypto tracking and investigation platform. It can help monitor market movements, track fund flow of criminal activities, and DYOR to avoid scams. It supports more than 20 blockchains and has been widely used by the community to perform investigations.

In this blog, we will show how to use MetaSleuth to track the "smart" money on the meme TIM token on Solana, which was criticized as the project insider who made millions of USD by buying TIM tokens. The address used in this blog is 9wAfrMnzrJ1XWXXDDmqh7gH7Q9ZBJjLhgou5GrUcHsZy. We use the address 9wAfr in this blog to denote 9wAfrMnzrJ1XWXXDDmqh7gH7Q9ZBJjLhgou5GrUcHsZy in the following.

First, input the address 9wAfrMnzrJ1XWXXDDmqh7gH7Q9ZBJjLhgou5GrUcHsZy inside the MetaSleuth. The tool will perform an intelligent analysis to show the initialized result (as shown in the following Figure).

Figure 1: The initialized result after inputting the address
Figure 1: The initialized result after inputting the address

On the left is the side panel of an address, which will be shown when you click an address on the main canvas. The node on the main canvas means an address, and the edge between nodes represents the aggregated token transfers for each token. That means if there are multiple transactions to transfer one token between two nodes, there will be only one edge between them. You can click the edge to show the detailed transactions for the token transfer.

From the result, we can find the token swap in Raydium, with 30.38 wSoL flowing into the Raydium and 288,723,795.50 TIM out. As we just said, the edge is the aggregated token transfers. We can click the edge to see more detailed information.

Figure 2: More detailed information at the edge
Figure 2: More detailed information at the edge

The transaction list shows the transactions between the address 9wAfrMnzrJ1XWXXDDmqh7gH7Q9ZBJjLhgou5GrUcHsZy and Raydium.

Figure 3: The transaction list
Figure 3: The transaction list

From the transaction list, we can see that the 9wAfr used 30.38 SoL to swap 288,723,795.50 TIM tokens from 04-28 02:33:33 to 04-28 02:25:49 in two minutes.

Track the Fund Flow

After receiving the TIM tokens, the address 9wAfr wants to sell TIM tokens for profit. Instead of directly selling the tokens using the 9wAfr address, it uses three layers of addresses to hide the trace. How is this achieved?

To track the fund flow, we first find the TIM tokens transferred out from the address 9wAfr. We can click the address 9wAfr to show the side panel, and select all the output TIM tokens.

Figure 4: The selecting progresses and results
Figure 4: The selecting progresses and results

After selecting the addresses that receive the TIM tokens, we can click the node of the address to track further the token flows. For instance, we can click on the address Ax39bkxVxfC9Riz9fSKHVWGjwLSdHv2zCnHFyNWq15eK, and we find that this address swaps the received TIM tokens to SoL and transferred SoL to DJGiuwGs1WtC1QkEj3GkGtdVoXuEk34uwWmvQvLi72SZ.

Figure 5: The further tracking results
Figure 5: The further tracking results

We can use similar methods to track other addresses that receive TIM tokens from 9wAfr. And we found there are three different status of the addresses.

  • Status 1: the received tokens are still in the addresses
  • Status 2: the received tokens have been swapped to SoL, and transferred to DJGiuwGs1WtC1QkEj3GkGtdVoXuEk34uwWmvQvLi72SZ
  • Status 3: the recevied tokens have been swapped to SoL, and transferred to Pa3AzeK4HHmvoj1sgtfjHQ37onbjoGXreZkxuW8uE4w

Note that, some of them transferred TIM tokens to another layer.

Deposit into Coinbase

Figure 6: The deposit addresses of different layers
Figure 6: The deposit addresses of different layers

We further found that the SoL will be swapped into USDC and transferred to the Coinbase deposit address CZPaGuP7scPw69bnjWycfTF5chmuqtaf2PnGR4Ji9yyn.

Profits

Let's calcuate the estimated profits of address the address 9wAfr.

Figure 7: The estimated profits of address the address 9wAfr
Figure 7: The estimated profits of address the address 9wAfr

We can find that the rate of return is more than 400x (using the current price of 0.00004995 SoL per TIM). The profit is (476 -1) x 30.38 SoL x 130 USD/SoL = 1.8 Million USD.

The graph shows the time to buy and the time to start selling the TIM tokens.

Figure 8: The time to buy and to start selling the TIM tokens
Figure 8: The time to buy and to start selling the TIM tokens

"Smart" Money?

The community suspected that the address analyzed in this blog and another one (DmHDP8BNRUMNkwqD145zudhJGKuEZgAMyZi7BsvEnMNv), which made millions of USD, were inside persons. The reasons are the following.

  • The two addresses are new addresses without transaction history
  • They received SoL shortly before the token launch and immediately bought a large number of TIM tokens
  • They used multiple layers of addresses to hide the fund flow

We do not know the real identities of these addresses. However, all the transactions are public. Anyone can leverage MetaSleuth to do their own research on any project and address.

Please read MetaSleuth documents and website for more information.

I have saved the analysis result; you can click it to see the details.

Figure 9: The analysis result
Figure 9: The analysis result

https://metasleuth.io/result/solana/9wAfrMnzrJ1XWXXDDmqh7gH7Q9ZBJjLhgou5GrUcHsZy?source=bb67b58b-25d8-4737-ba12-73440cdf6302

Subscribe and Enjoy 10% Off Discount

When signing up for MetaSleuth, use BLOCKSEC as the invitation code to enjoy 10% off for the subscription.

https://metasleuth.io/?invite-code=BLOCKSEC

drawing
Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation