Behind Solana Celebrity Tokens: The Feast of Project Party and the Rat Store
The rise and manipulation of Solana chain celebrity tokens: a carefully designed wealth harvest
Recently, a batch of tokens named after celebrities have emerged on the Solana chain, such as $TRUMP, $MELANIA, $RYAN, etc., which has attracted market attention. Most of these tokens are issued on the Meteora platform and show striking similarities: extremely high full dilution valuation (FDV), exaggerated trading volumes and drastic price volatility. On the surface, the celebrity effect has driven the market popularity of these tokens, but in fact, there is a systematic wealth harvesting mechanism behind this.
Meteora Platform: Innovation becomes a tool
Meteora platform has attracted numerous projects with its unique DLMM model, which has low slippage and flexible liquidity management mechanism. However, these features designed to improve capital efficiency have been maliciously exploited and become tools for project parties and insider traders to make profits.
System operation: every step of the way
In typical cases, the project party usually takes the following steps:
- Pre-create tokens;
- Create a DLMM trading pool on Meteora;
- Inject unilateral liquidity.
Analysis found that project parties often pre-create DLMM pools of tokens and USDC trading pairs, injecting only unilateral liquidity. This means that at the opening, a large number of limit sell orders have been preset, waiting for liquidity to influx, and the zero slippage characteristic of DLMM trading further amplifies the profit margin of the project party.
Insider Trading: Accurate Time and Information Advantages
$MELANIA, $ENRON, $LIBRA and other cases, insider traders have grasped the contract address (CA), trading pool information and opening time in advance. For example:
- $LIBRA created tokens on the 14th, but created a trading pool 20 minutes before the opening of the 15th (https://www.php.cn/link/02c9aaa85c90be06dc2e1a1effe79e73);
- $ENRON created tokens on January 25th, and the Meteora pool was not set up until one hour before the transaction on February 4th (https://www.php.cn/link/0c1afc055393604da9a0074c7a02d80e).
GMGN data shows that nearly $4.5 million of funds poured in within 2 seconds of the opening of $LIBRA.
A trader address (8bZsrR5aRHDZYkWPLQoDFZUKsHCTeJ8uqhPnoMn7baG3) seized the lead with a single $1.4 million transaction and made 170 transactions in the opening block. This shows that it has insider information.
Money-making mode: Systematic operation
The sniper trader adopted a systematic profit strategy:
- Quickly exchange tokens, partially exchanged to USDC;
- Scatter the remaining tokens to multiple sub-accounts for distribution;
- Dump tokens in bulk and add unilateral liquidity to new trading pairs, and convert them all into USDC after making a profit.
In the end, the account made a profit of US$17 million, while the project party's income alone reached US$10 million.
Warning and Reflection
$LIBRA case is not an isolated case, and tokens such as $ENRON and $MELANIA also show similar operating modes. Investors need to be wary of the capital harvesting trap of "celebrity Meteora unilateral liquidity". The high liquidity mechanism of the Meteora platform has been abused, seriously damaging market liquidity and investor confidence. Investors should invest carefully and raise their risk awareness.
The above is the detailed content of Behind Solana Celebrity Tokens: The Feast of Project Party and the Rat Store. For more information, please follow other related articles on the PHP Chinese website!

Ethena Labs has announced the official launch of its USDe stablecoin on the Hyperliquid exchange and HyperEVM network. This expansion integrates USDe as a yield-bearing digital dollar within the Hyperliquid ecosystem

Miners have been a shortage of reasonably priced graphic cards for months, to the annoyance of gamers. The demand for video cards from Profe ione miners is even that high

Backed by millions in past payouts and fresh liquidity, Cedar's Solana launch on May 6th 2025, 12pm EST delivers unmatched rewards and real-world utility.

Within just 100 days of being back in office, his meme coin, $TRUMP, earned over $320 million in trading profits.

The meteoric rise of meme-based cryptocurrencies has captivated the financial world, turning internet culture into tangible wealth.

In his latest video, the market commentator known as CryptoInsightUK laid out a multi-step argument for why XRP could “very realistically go to $10 plus this cycle

Crypto trader who turned $1 Solana (SOL) into $40M now backs FloppyPepe (FPPE) as his top crypto ICO token pick for 2025.

On May 4, 2025, the crypto world witnessed a breakthrough BTC transfer milestone. A bridgeless BTC transfer between Bitcoin and Cardano mainnets was successfully demonstrated by BitcoinOS.

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

VSCode Windows 64-bit Download
A free and powerful IDE editor launched by Microsoft

SublimeText3 Chinese version
Chinese version, very easy to use

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
