This project is a simple and functional Drosera trap called whaletrap
, designed to detect significant changes in ERC20 token context and trigger a custom on-chain response. It was built and deployed using a VPS and the Drosera Protocol on the Hoodi testnet.
The Whale Trap monitors blockchain activity for signs of large movements in ERC20 tokens. Once a pattern is detected, it decides whether or not to respond based on the trap's logic. This is a Proof-of-Concept (PoC) to show how traps can be configured, tested, and automatically executed on-chain.
- Trap Address:
0x91Dd307fAad9F02314a752D2EaEd9474C42Ca704
- Response Contract:
0x8E686a7709825F652751A742f021CB9ff67D7F57
- Response Function:
respondWithERC20Context(address,uint256,uint256,int256,int256)
- Block Sample Size:
2
- Network: Hoodi Testnet
- Tx Hash:
0xffd268...
- Detects ERC20 context spikes or anomalies.
- Configurable trap hash and sample size.
- Executes on-chain logic without centralized interference.
- Uses Drosera's decentralized intent coordination and trap validation.
- The trap monitors block-by-block data using a small sample window.
- It compares current ERC20 values against expected patterns.
- If it meets the response condition, the response contract is triggered with contextual data.
This setup is ideal for monitoring:
- Sudden large ERC20 transfers
- Possible whale activity
- Triggering defensive or alerting mechanisms in DeFi apps
- Drosera Protocol
- Drosera Dev Portal
- Drosera GitHub
- Solidity
- Forge
- Hoodi Testnet RPC
- Add more advanced detection logic (average, trendlines)
- Store metadata or alert info in a log contract
- Visual dashboard using Drosera API
Built with guidance from the Drosera community.