Hawkeye
Last updated
Last updated
The Hawkeye page introduces three groundbreaking tools that redefine token analysis and expose insider activities like never before. At the heart of this is our Bundle Analysis tool, a proprietary system designed to help you uncover potential insider activity linked to any token. Let’s dive into how this works and what makes it industry-leading.
What is Bundle Activity?
When a token is deployed, the deployer or team behind it must acquire supply. There are two main ways they typically do this:
Directly Buying Supply on the Deploy Wallet
This involves the deployer wallet purchasing a large percentage of the token supply.
While straightforward, this method often signals fear, indecision, or panic, as it directly ties the deployer to the token’s success in a visible and traceable way.
"Bundling" the Token Supply
What is Bundling? The term originally referred to combining multiple buy transactions into the same block as the deployment transaction. This ensured that no one else could purchase tokens before the team’s own bundled buys.
Evolving Practices: Platforms have since developed tools and alerts to detect these same-block transactions, making it easier to identify insider activity. As a result, the bundling process has evolved into more discreet methods, such as sniping.
What is Sniping, and Why Does It Matter?
Sniping refers to sending automated buy transactions immediately after the token deploys, aiming to acquire supply in the earliest possible blocks (e.g., Block 1, Block 2, or Block 3).
Why This Matters:
The ability to snipe within these early blocks almost always requires specialized automation software.
Such activity is often a sign of insider involvement, as it demonstrates high conviction in the token before any public knowledge or external validation.
How Does Our Bundle Analysis Work?
The Bundle Analysis tool takes a multi-step approach to identify and categorize suspicious activity:
Transaction Analysis in Early Blocks
Our system examines transactions within the first few blocks after deployment.
These transactions are flagged as potentially suspicious since automation software is typically required to execute buys this quickly.
All flagged transactions are visually presented to the user for further evaluation.
Deep Dive into Funding Sources
The tool then traces the funding sources of the wallets involved in these early transactions.
If multiple wallets used to acquire supply are funded by the same source wallet, it becomes a clear indicator of coordinated activity by a single entity.
What Makes This Important?
When both conditions—early block transactions and shared funding sources—are met, it reveals a likely scenario of insider activity. For example:
If a token deploys in Block 1 and there are 10+ transactions in Blocks 2–4, this is already a red flag.
If further analysis shows that the wallets involved are funded by the same source, it’s a strong indication that a single entity is acquiring a large share of the token supply.
This kind of conviction, particularly at such an early stage, is typically only possible with insider knowledge or direct involvement in the token’s creation.
What Does This Mean for Users?
Our Bundle Analysis tool is designed to help you:
Detect suspicious activity in token launches.
Identify scenarios where one entity may hold a disproportionately large amount of early supply.
Gain unparalleled insights into potentially risky or manipulated tokens.
By exposing these practices, the tool empowers you to make more informed decisions, helping you avoid manipulated tokens and focus on legitimate opportunities.
Our Bundle Analysis tool not only identifies potential insider activity but also presents the data in a highly intuitive and actionable format. Below, we’ll walk through what users will see and explain how to interpret the visual insights provided by this tool.
Visual Breakdown of Transactions and Funding Sources
Early Transactions List
The interface displays a sequential list of transactions starting from the deployment.
It includes the deployment (Block 1) and every transaction from Blocks 1, 2, and 3, ensuring no early activity goes unnoticed.
Each transaction is color-coded based on its funding source, helping you quickly identify patterns and potential clustering of activity.
Funding Source Overview
Below the transaction list, users will see a breakdown of funding sources.
This section highlights wallets that funded multiple transactions within the first few blocks, showing how many wallets each funding source supported and the number of trades each wallet executed.
Color coordination between the funding sources and transactions helps users visually connect the dots between funders and buyers.
How to Identify Potentially Suspicious Activity
When analyzing the data, it’s important to balance caution with context. Here’s what to look for:
Large Number of Early Transactions
A high volume of transactions within the first few blocks (e.g., Blocks 1–3) can be a red flag, as these are often executed using automation software.
However, not all tokens with heavy early activity are malicious—some may simply attract automated trading bots programmed to buy new pairs based on pre-set criteria.
Concentration of Funding Sources
The tool highlights funding wallets that supported multiple buyers. If you notice one or two wallets funding most of the early transactions, this suggests coordinated activity by a single entity.
For example, if “Funding Wallet A” supports six wallets, and each wallet executes one transaction in Block 1 or 2, this strongly indicates bundling or insider supply acquisition.
High-Value Transactions in Early Blocks
Large transactions in the first few blocks can indicate significant conviction, likely backed by insider knowledge.
When paired with a concentrated funding source, this becomes a strong signal of coordinated early accumulation.
What to Avoid and Interpret Carefully
False Positives
Some wallets might share funding sources due to legitimate reasons, such as being funded from exchanges or pools. These cases require additional scrutiny to confirm potential insider activity.
Bundles Are Common
The practice of bundling and early supply acquisition is widespread and does not inherently indicate malicious intent. Many projects with bundled supply still have strong upside potential.
Use the Tool as a Supplement
The Bundle Analysis tool is designed to enhance your understanding, not replace it. It provides insights that others won’t have, but it’s not a definitive “buy” or “avoid” signal.
How to Use the Data
Treat Funding Wallets as Entities
By treating funding wallets as individual entities, you can map out activity more clearly. For example, if “Entity 1” funds six wallets that each make early transactions, it’s a strong indicator of coordinated behavior.
Context Matters
If most early transactions are tied to unique funding wallets, the deployment is less likely to involve insider activity.
Conversely, if a handful of funding wallets support the majority of early buys, it suggests concentrated insider involvement.
The Bottom Line
The Bundle Analysis tool provides unparalleled insights into token deployments and supply acquisition patterns. While it highlights potential insider activity, it’s not a definitive judgment. Always pair these insights with your own research and analysis to make informed decisions.
This tool empowers you with an edge, giving you the clarity to spot trends and anomalies that others might miss—all while reminding you to apply your fundamental trading instincts to the data presented.
In addition to the Bundle Analysis, the Hawkeye platform offers two supplementary tools designed to provide users with granular insights into token activities. These tools—Funder Analysis and Top Holder Analysis—focus on identifying funding sources and supply concentration to enhance your understanding of token behavior and ownership dynamics. Let’s break down how these tools work and how to interpret their outputs.
Funder Analysis Tool
The Funder Analysis tool is straightforward yet powerful. It allows users to input a wallet address (or multiple addresses), and Hawkeye will identify the corresponding funding wallets.
How It Works:
Enter a wallet address into the tool.
The system traces the funding source(s) for that wallet, showing you the origin of the funds used.
This can be especially useful for:
Tracking the origin of early transactions.
Investigating suspicious wallet activity.
Identifying potential links between wallets.
Use Case Example:
You notice a wallet making a high-value purchase on a token. By using the Funder Analysis tool, you can determine whether this wallet was funded by a known entity or cluster of wallets, potentially indicating insider activity or coordinated behavior.
Top Holder Analysis Tool
The Top Holder Analysis tool focuses on analyzing token ownership distribution. By inputting a token address, the system identifies the largest holders of that token and performs funding analysis on those wallets.
How It Works:
Provide a token address to the tool.
Hawkeye retrieves the top holders of the token.
The system traces the funding sources for these top wallets, identifying whether there are shared origins or clusters of ownership.
What to Look For:
Clusters of Ownership: If multiple top holders are funded by the same source, it suggests concentrated supply control by a single entity.
Diverse Funding Sources: A more decentralized distribution of funding sources may indicate less risk of manipulation or insider dominance.
Important Considerations:
False Positives: Shared funding sources don’t always indicate malicious activity. Pools, exchanges, or legitimate entities can fund multiple wallets.
Profitability Still Possible: Even if a token’s top holders are controlled by one or two entities, it doesn’t mean the token won’t perform well. However, caution is advised in these scenarios.
How to Use These Tools Effectively
Context is Key:
The tools provide insights, but they are not definitive buy/sell signals. Use them to complement your research and trading strategy.
Combine with Other Tools:
Pair these tools with the Bundle Analysis to form a clearer picture of a token’s supply dynamics and ownership patterns.
Spotting Patterns:
Use the Funder Analysis to trace individual wallets and verify if they are linked to known entities.
Use the Top Holder Analysis to identify clusters of control in token ownership and assess potential risks.
Apply Human Judgment:
Just because a token shows concentrated ownership or shared funding sources doesn’t mean it’s malicious. Consider external factors, such as the project’s goals, team, and community support.
Final Thoughts
Both the Funder Analysis and Top Holder Analysis tools offer valuable insights that go beyond surface-level metrics. By identifying funding sources and supply concentration, these tools give you a deeper understanding of token dynamics and help you make more informed investment decisions.
As always, remember that while these tools provide cutting-edge analytics, they are supplements to your expertise. Pairing these insights with your own research and judgment ensures you have the best possible edge in navigating the market.