Cybersecurity by Dispensight
secureleaf@dispensight.com
AlphaExchangeAI (AEA) Token
Technical Forensics & Behavioral Analysis
Document ID: BC22LCN7EJE3GFAW
Prepared by: Abel Toth-Bartok
Date: 2025-11-11 19:51:34 PST

1. Executive Summary

This report provides a forensic assessment of the blockchain entity known as AlphaExchangeAI (AEA), operating on the Binance Smart Chain (BEP-20). Analysis of its smart contract, transaction activity, and wallet relationships demonstrates behavior consistent with synthetic transaction networks and proxy-controlled pseudo-assets.

Key Finding: AEA functions as a fabricated transaction ecosystem intended to simulate legitimacy and attract naive investors.

2. Contract Overview

Contract Address:
0xee634A826465a1799afc2cFEfBdB6Fa3766c8888

The contract owner retains administrative privileges for token minting and contract upgrades. No verified liquidity or decentralized exchange pairs were identified.

Source Verification Status: Partial (TokenV2 proxy)

Contract analysis reveals minimal source comments, suggesting deliberate obfuscation of functionality.

3. Wallet Correlation Evidence

Primary Wallet Observed:
0xee634A826465a1799afc2cFEfBdB6Fa3766c8888

This wallet simultaneously appears as a holder in multiple tokens including AlphaExchangeAI (AEA) and 1Piece. The repeated use of this wallet across unrelated tokens indicates a pattern of address recycling for the creation of an artificial ecosystem of seemingly popular projects.

This pattern is consistent with coordinated fraud operations where a single entity controls multiple token projects to create the illusion of a legitimate crypto ecosystem.

4. Transaction Analysis

Transaction Hash:
0xdbADe7eFA88fbe670e3075E3AFFAdDc30FA7af96

Observed Function Call: BrrrrrrrrrrrrrZ2826820544()

Associated Assets: Wrapped BNB (WBNB) and AEA

The transaction contains unverified and nonstandard function selectors which appear to spoof typical swap behavior. The function naming convention suggests mockery of legitimate financial operations.

5. Indicators of Synthetic Activity

Indicator Observation Risk Level
Identical burst transfers >360,000 transactions within minutes SEVERE
Proxy with owner admin Single control point for upgrades/mint CRITICAL
Cross-token wallet reuse Shared wallet across multiple suspect tokens HIGH
Zero price feed No market listing or liquidity HIGH
Non-standard function signatures Custom transaction signatures not part of standard specifications HIGH

6. Interpretation

Combined forensic artifacts indicate deliberate simulation of market adoption. The system performs as a transaction noise generator, producing meaningless volume to mislead observers and create false legitimacy metrics.

SecureLeaf analysts classify this as an engineered pseudo-asset network rather than a genuine blockchain project. The evidence strongly suggests this infrastructure is designed for:

  • Creating artificial trading volume
  • Simulating market interest and liquidity
  • Attracting unsophisticated investors
  • Potential rug-pull operations

7. Transaction Spoofing Evidence

Recent blockchain forensics reveal a coordinated spoofing loop involving multiple pseudo-token addresses. Transactions were traced through PancakeSwap v3 routers and mirrored token contracts such as WLFI (USD1), BANK (Lorenzo Protocol), and WBNB. All events originate and terminate from the same wallet cluster, indicating self-dealing designed to simulate liquidity.

Notable Findings:

  • Custom event TransferFlapToken() — not part of the ERC-20 or BEP-20 specification
  • Repeated transactions between AEA, WBNB, USD1, and BANK in short intervals
  • Gas fees identical across calls, consistent with script automation
  • Liquidity routes spoof PancakeSwapV3 contract, but actual liquidity depth is near zero
  • Function-level spoofing mimics swap confirmations to inflate BscScan analytics dashboards

Behavioral Pattern:

The contract rotates between multiple proxy pools, mimicking legitimate DeFi swaps. This is a known rug-preparation tactic where market legitimacy is fabricated through transactional noise. Transactions start and end within the same wallet ecosystem while simulating active trading volume.

Example Transaction:

Tx Hash:
0x1f1aba2a473278699f39afeed3d6d7140773a264dd3161f362e3ab3752ebefbe

Timestamp: Nov 12, 2025 (approx.)

Observed Smart Contracts: AEA, WLFI (USD1), Lorenzo BANK, PancakeSwap Router V3

Event Log Extract:

TransferFlapToken(from: 0x58Dc9f69..., to: 0x13f4EA83..., value: 581,378,010.928...)

Followed immediately by a Swap() event referencing identical sender/recipient addresses.

This demonstrates a closed-loop liquidity illusion where transactions create the appearance of market activity without any genuine value exchange.

8. Conclusion

AlphaExchangeAI (AEA) Token constitutes a fabricated pseudo-asset environment. Its design, transaction patterns, and wallet behavior strongly align with indicators of synthetic legitimacy and potential rug-pull infrastructure.

CLASSIFICATION: Fraudulent / Synthetic Network / Social Engineering Funnel
Recommendation: Investors should avoid interaction with this token. The evidence overwhelmingly indicates coordinated fraudulent activity designed to extract value from unsuspecting participants.

9. Appendix — Evidence Documentation

This analysis is supported by blockchain transaction data, smart contract code review, and wallet correlation analysis conducted between November 11-12, 2025. All evidence is verifiable through public blockchain explorers including BscScan.

Primary Data Sources:

  • BscScan transaction history and contract analysis
  • Smart contract source code (partial verification)
  • Wallet address correlation across multiple tokens
  • Transaction pattern analysis using automated forensic tools