This article is jointly published by X-explore and WuBlockchain.BackgroundIn the world of Web2, the underground industry lasts for years. After years of research and analysis, attacking methods of the underground industry can be divided into multi-IP address, multi-device, and multi-account attacks. There are some commonly used tools such as modem pool, multi-device opening tools, and auto captcha solver. With the rise of Web3, due to its anonymity and transparency, the underground industry q...