One day, you receive an email claiming that you are eligible for a UNI token airdrop! The email
contains a link that directs you to what appears to be a legitimate website. You click on the link
and see the following transaction record:
Call Function by 0x4276BF06...a1B7D03Ce on 0x4d264c6A...41F757Fe5
From:
0x4276BF06Aebd8A1F3D89a1fd5BF84bFa1B7D03Ce
Interacted With (To):
0x4d264c6Ab8933633cd8B052dE243Fa41F757Fe5
ERC-20 Tokens Transferred:
From 0x4276BF06...a1B7D03Ce To 0xE1a9d5C7...615506D4
For 8,888 ERC-20: app.un1swap.org (UNI)
Value:
0 ETH
Transaction Fee:
0.0000001689464305 ETH
Gas Price:
0.003237514 Gwei (0.000000000003237514 ETH)
Carefully observe the transaction record above. This is a common phishing attack technique where
attackers create fake websites with domains that look very similar to legitimate ones, attempting to
deceive users.
Your Task
Identify the real Uniswap domain and the fake phishing domain.