
Axie Infinity | AXS
$2.59
Coin info
Rank
Market Cap
Volume (24h)
Circulating Supply
Total Supply
Do you think the price will rise or fall?
Rise 40%
Fall 60%
Price perfomance
Depth of Market
Depth +2%
Depth -2%

$2.59
Rise 40%
Fall 60%
#201
$443,858,374
$43,565,740
166,139,112.15
270,000,000
Rank #126
$0.01706
-1.2%
Rank #128
$0.3066
-1.02%
Rank #156
$0.3098
-3.33%
Rank #373
$0.07796
-0.26%
Rank #432
$12.42
+0.52%
Rank #827
$0.4459
-3%
Rank #982
$0.06071
-1.95%
Rank #987
$0.005125
-1.03%
Rank #1218
$0.0009750
+0.19%
Rank #1293
$0.9837
+2.07%
Rank #1495
$0.05309
-1.27%
Rank #10664
$0.052
-32.75%
AXS is the governance token for the Axie Infinity game. Token holders will be able to shape and vote for the direction of the game universe. This is unlike traditional games where all decisions are made by the game developers. AXS holders will be able to stake their tokens to earn more AXS and even vote for governance proposals.
14 Jul 2025, 11:25
Roman Storm, one of the developers behind the Tornado Cash cryptocurrency mixer, is asking the public to help him raise legal defense funding before his July 14 federal trial begins. Storm faces charges of money laundering and sanctions violations and is looking for $1.5 million in donations over the next few weeks to sustain his legal fight against the US DOJ. In a post on X Saturday, Storm wrote , “We’re facing a critical shortfall. I need to raise $500K in the next few days and $1.5M within a couple of weeks to sustain our fight, covering legal fees, expert witnesses, and research as the case extends beyond the initial 2-week projection.” The developer reiterated that his case is beyond his own personal defense. “ My team is working nonstop to defend code as free speech, protect software development, and push back against government overreach that threatens us all ,” he reckoned, directing followers to the donation site. Crypto community and KOLs behind Tornado Cash developer Storm’s appeal has garnered several responses from figures and organizations within the crypto community, with most of them pledging their financial support in the social media campaign. If Roman Storm loses his case (and custody isn't required for "money transmitting"), bitcoin miners will be the next target. https://t.co/BaKDCGHQCL — Mallard Beakman ₿⚡🥕 (@Bill_Fowler_) July 12, 2025 Bill Warren, a developer and contributor to Meta Cartel DAO, revealed the organization had used all of the funds in its treasury to support Storm’s legal cause. “ Our DAO Meta Cartel gave all we had left in our treasury to support this case… if you actually believe in privacy and decentralization, please contribute ,” Warren posted . Julian Zawistowski of the Golem Foundation confirmed that his team had donated 50 ETH. “ We’ve always walked the walk when it comes to important causes. Octant App is the best example of that. Time for others in our industry to step up too, ” Zawistowski stated. An Ethereum developer quoted the 35-year-old software engineer’s message and told followers that if they “can find $500M for pump in 12 minutes,” he hoped they could “find a couple million for Roman.” He concluded his post saying the Ethereum Foundation would be matching donations over the weekend. Telegram evidence puts the prosecution in jeopardy Days before the trial, Storm’s lawyers tried to dismiss evidence from the US government in the form of Telegram messages, arguing that they were improperly handled. They sent a letter to the Southern District Court of New York on July 12 to present their “unreliable evidence” argument. One of the messages mentioned in the letter talked about a $600 million Axie Infinity hack, which the government claims was authored by Tornado Cash developer Alexey Pertsev and sent to Storm and co-founder Roman Semenov. According to the indictment, Pertsev supposedly wrote via an encrypted app, “Heya, anyone around to chat about axie? Would like to ask a few general questions about how one goes about cashing out 600 mil.” Yet, the defense is adamant that the message was a forwarded Telegram post originally written by a CoinDesk reporter, and not Pertsev. “ The government’s self-selected extraction does not show the author of forwarded Telegram messages ,” Storm’s lawyers wrote in the filing. “ The misleading nature of the extracted Telegram chat messages is demonstrated by the fact that the government itself has wrongfully attributed the origin of the purported message .” The prosecution apologized for making a formatting error during the discovery process, but told the court that the final evidence provided to the defense in December 2024 was “plainly adopted by Pertsev.” “We’re being contacted by CoinDesk,” which included the forwarded message in question. Prosecutors are pressing for their case to be included in the Tuesday hearing, telling the court that “ one of the co-conspirators asked, sum and substance, I’d like to ask you some questions about how you go about laundering $600 million worth of stolen crypto .” KEY Difference Wire : the secret tool crypto projects use to get guaranteed media coverage
14 Jul 2025, 08:58
Roman Storm, co-founder of the sanctioned Tornado Cash cryptocurrency mixer, has accused federal prosecutors of fundamentally mishandling key evidence ahead of his July 14 criminal trial in Manhattan. The dispute centers on a Telegram message reading “Heya, anyone around to chat about axie? Would like to ask a few general questions about how one goes about cashing out 600 mil,” which referenced the $600 million Axie Infinity exploit. According to court filings dated July 12, 2025 , prosecutors initially claimed the message was authored by Storm’s co-developer Alexey Pertsev. Source: Court Listener Defense attorneys revealed the message was actually written by Andrew Thurman, a former CoinDesk senior tech reporter, then forwarded to a Tornado Cash chat by Pertsev. The revelation emerged just days before Storm’s trial on charges of conspiracy to commit money laundering and sanctions violations related to Tornado Cash, which allegedly facilitated over $1 billion in illicit transactions. Government’s Evidence Chain Under Tight Scrutiny The controversy stems from Dutch authorities’ extraction of what prosecutors claim is Pertsev’s phone following his arrest in the Netherlands, where he was sentenced to 64 months in prison for money laundering through Tornado Cash. DOJ pursues federal charges against Roman Storm, cofounder of Tornado Cash, after dropping unlicensed money transmission charge. #TornadoCash #RomanStorm https://t.co/ZGXe7IGREZ — Cryptonews.com (@cryptonews) May 16, 2025 Storm’s defense argues that the government’s extraction contains multiple fatal flaws, including missing author information for forwarded Telegram messages and incomplete file retrieval by FBI Agent Dickerman from Dutch authorities. The defense contends that prosecutors cannot authenticate the extraction’s completeness because they were limited in what files they could obtain from Dutch law enforcement. This authentication challenge becomes more significant given that the government admitted in court filings that its original September 2023 production of extracted text messages to the defense did not include “forwarded” tags on forwarded messages. Prosecutors provided a corrected version in December 2024, which they plan to use at trial, but defense attorneys argue this timeline raises serious questions about the government’s handling of evidence. The misattribution carried real consequences in court proceedings when Assistant U.S. Attorney Ben Arad referenced the message during a July 8 pretrial hearing, telling the judge it demonstrated the co-founders’ awareness of wrongdoing. According to the hearing transcript, Arad told the court: “For example, when the Ronin hack happened, one of the co-conspirators asked, sum and substance, I’d like to ask you some questions about how you go about laundering $600 million worth of stolen crypto.” The defense characterized this as providing “false information” to both the court and potentially the grand jury that issued the indictment. Defense attorneys wrote in their filing: “Given that the government mistakenly attributed the reporter’s Telegram message to Pertsev at the Pretrial Conference, it appears that the government itself was unaware of this issue until the defense raised it.” Enforcement Challenges Echo Across Crypto Cases The evidence dispute highlights a pattern of prosecutorial challenges emerging across high-profile cryptocurrency cases, particularly when international evidence gathering intersects with complex digital communications. Just last month, the DOJ faced similar authentication issues in the case of Russian crypto CEO Iurii Gugnin, who was charged with orchestrating a $530 million fraud scheme through his Miami-based platform Evita. A Russian crypto firm CEO used his crypto company, Evita, to funnel $530 million of overseas payments via US banks and crypto platforms. #Evita #CryptoFraud #IuriiGugnin https://t.co/hk5kgucF95 — Cryptonews.com (@cryptonews) June 10, 2025 That case also involved cross-border evidence collection and questions about the authenticity of digital communications used to establish criminal intent. Storm’s defense has consistently argued that the case threatens to criminalize open-source software development, with the Ethereum Foundation pledging $500,000 toward his legal defense and matching up to $750,000 in community contributions. As part of the DOJ’s crypto fraud crackdown, the recently seized $225 million in USDT was linked to a global “pig butchering” scam that defrauded over 400 victims through a network of international exchanges and wallets. The post Tornado Cash Developer Storm Claims DOJ Bungled Critical Telegram Evidence appeared first on Cryptonews .
9 Jul 2025, 01:00
BitcoinWorld Urgent: US Sanctions North Korea Over Dangerous Crypto Cyber Activity The world of cryptocurrency, with its promise of decentralization and innovation, unfortunately also attracts nefarious actors. A recent announcement from the U.S. Treasury Department serves as a stark reminder of this reality, highlighting the persistent threat posed by state-sponsored cyber criminals. This time, the focus is squarely on North Korea and its audacious attempts to fund its illicit programs through digital means. US Sanctions North Korea: A Direct Response to Digital Threats In a significant move to counter global cybercrime and illicit finance, the U.S. Treasury has taken decisive action, imposing US sanctions North Korea . Specifically, the sanctions target North Korean national Song Kum Hyok. His alleged role? Orchestrating the placement of DPRK (Democratic People’s Republic of Korea) IT workers into unsuspecting foreign companies. But these weren’t just any IT workers; they were reportedly covert operatives, leveraging their positions for cyber espionage and, crucially, for massive cryptocurrency thefts. This action underscores the U.S. government’s commitment to disrupting North Korea’s ability to generate revenue through illegal cyber activities, which directly funds its weapons of mass destruction (WMD) and ballistic missile programs. The Treasury’s statement made it clear: Song Kum Hyok facilitated the deployment of these workers, who then exploited their access to company networks. This isn’t just about financial theft; it’s about national security. The funds generated are then funneled back to the regime, fueling its dangerous ambitions. This sanction serves as a warning to companies worldwide to enhance their due diligence, especially when hiring remote IT personnel, as the threat of infiltration is real and carries severe consequences. Unmasking North Korean IT Workers and Their Global Reach How do these North Korean IT workers operate, and why are they so effective? It’s a sophisticated scheme. These individuals often present themselves as freelance developers or employees of legitimate-looking front companies. They leverage their technical skills to gain employment in various sectors, from IT services to software development and even finance. Once embedded, they can engage in a range of malicious activities: Intellectual Property Theft: Stealing sensitive company data, designs, or proprietary software. Network Exploitation: Gaining unauthorized access to internal systems for future attacks or data exfiltration. Financial Fraud: Directly participating in or facilitating cryptocurrency thefts and other financial crimes. These workers are often highly skilled and operate under strict instructions from the DPRK government. Their primary goal is to generate hard currency, bypassing international sanctions that restrict North Korea’s access to traditional financial systems. The anonymity and speed offered by cryptocurrency make it an attractive target for these state-sponsored operatives, allowing them to move large sums of money across borders with relative ease. The Alarming Rise of Crypto Cyber Activity by DPRK: What’s the Impact? The DPRK’s reliance on crypto cyber activity has surged in recent years, becoming a cornerstone of its illicit fundraising strategy. These activities range from direct hacks of cryptocurrency exchanges and decentralized finance (DeFi) protocols to sophisticated phishing campaigns targeting individual crypto holders. The sheer scale of these operations is staggering, with estimates suggesting billions of dollars stolen over the past few years. But what does this mean for the average crypto user or investor? The impact is multifaceted: Erosion of Trust: High-profile hacks undermine confidence in the security of the crypto ecosystem. Financial Losses: Individuals and companies suffer direct financial losses from stolen assets. Regulatory Scrutiny: Increased illicit activity leads to greater regulatory oversight, potentially impacting innovation and accessibility. Reputational Damage: Projects and platforms that are successfully attacked face significant reputational harm. It’s a constant cat-and-mouse game between cybersecurity experts, law enforcement, and these persistent threat actors. Every successful theft not only enriches the regime but also provides valuable intelligence and techniques for future attacks. The Shadowy Operations of the Lazarus Group: Who Are They? When discussing North Korea’s cyber capabilities, it’s impossible to ignore the notorious Lazarus Group . This state-sponsored hacking collective is widely recognized as one of the most prolific and dangerous cyber threat actors globally. Active since at least 2009, the Lazarus Group has been implicated in a string of high-profile cyberattacks, including the 2014 Sony Pictures hack, the 2017 WannaCry ransomware attack, and numerous cryptocurrency heists. Their methods are diverse, employing everything from sophisticated social engineering to zero-day exploits. Their connection to the North Korean government is well-documented by intelligence agencies worldwide. They serve as a vital arm of the regime, tasked with generating funds and conducting espionage. In the crypto space, their exploits are particularly infamous: Ronin Bridge Hack (2022): One of the largest crypto heists in history, with over $600 million stolen from Axie Infinity’s Ronin Network. Harmony Horizon Bridge Hack (2022): Another significant breach, resulting in over $100 million in stolen crypto. Numerous Exchange Hacks: Throughout the years, many centralized exchanges have fallen victim to Lazarus Group’s sophisticated attacks. Their operations are characterized by meticulous planning, advanced technical skills, and a relentless pursuit of financial gain for their benefactors. Understanding their tactics is crucial for anyone involved in the digital asset space. Tracing and Combatting Illicit Crypto Funds: A Global Challenge Once stolen, these illicit crypto funds don’t just disappear. They enter a complex web of laundering techniques designed to obscure their origins and make them usable by the North Korean regime. This is where the global fight against financial crime truly comes into play. Tracing these funds requires sophisticated blockchain analytics tools and international cooperation. Common laundering methods include: Mixers/Tumblers: Services that pool and mix cryptocurrencies from various sources to obscure transaction trails. Chain Hopping: Converting one cryptocurrency to another multiple times across different blockchains. Decentralized Exchanges (DEXs) and Cross-Chain Bridges: Leveraging these platforms to move funds rapidly and anonymously. Shell Companies and Sanctioned Entities: Using front companies or sanctioned individuals to facilitate transfers through traditional financial systems once crypto is converted to fiat. The challenge lies in the decentralized nature of blockchain and the speed at which transactions occur. However, significant progress is being made. Blockchain analytics firms like Chainalysis and Elliptic work closely with law enforcement agencies to trace these funds, often identifying patterns and ultimately leading to seizures or arrests. International bodies like the Financial Action Task Force (FATF) also play a critical role in setting global standards for anti-money laundering (AML) and countering the financing of terrorism (CFT) in the crypto space. What Can You Do? Actionable Insights for Security While governments and law enforcement work to combat these large-scale threats, individual crypto users and businesses also have a role to play. Here are some actionable insights: Strong Security Practices: Always use strong, unique passwords and enable two-factor authentication (2FA) on all your crypto accounts and email. Be Wary of Phishing: Double-check URLs, email senders, and never click on suspicious links. Scammers often impersonate legitimate entities. Hardware Wallets: For significant holdings, consider using a hardware wallet, which keeps your private keys offline. Software Updates: Keep all your software, operating systems, and antivirus programs updated to patch known vulnerabilities. Due Diligence for Hiring: Companies, especially those in tech, must implement robust background checks and verification processes for remote hires to prevent infiltration by malicious actors like the North Korean IT workers. Stay Informed: Keep abreast of the latest cybersecurity threats and best practices in the crypto space. A Resilient Stand Against Digital Malice The U.S. Treasury’s sanction against Song Kum Hyok is more than just a punitive measure; it’s a clear signal that the international community is intensifying its efforts to dismantle North Korea’s illicit financial networks. The convergence of state-sponsored cyber warfare and cryptocurrency presents a formidable challenge, but one that is being met with increasing sophistication and collaboration. As the digital landscape continues to evolve, so too must our defenses. Vigilance, strong security protocols, and global cooperation are our strongest weapons in ensuring the integrity of the crypto ecosystem and preventing it from being exploited by those who seek to sow chaos and fund dangerous agendas. To learn more about the latest crypto market trends , explore our article on key developments shaping Bitcoin’s price action and institutional adoption. This post Urgent: US Sanctions North Korea Over Dangerous Crypto Cyber Activity first appeared on BitcoinWorld and is written by Editorial Team
6 Jul 2025, 20:59
The cryptocurrency market has been on a quiet streak for the past few days, following a rally last week that took Bitcoin above $110,000. There will also be many economic developments and altcoin events in the new week. You can follow these in our special weekly calendar. In addition, there will also be large amounts of token unlocks in many altcoins next week. Here is the token unlock calendar that we have prepared specially for you as Bitcoinsistemi.com. (All times are stated as UTC+3 Türkiye time) NAVI Protocol (NAVX) Date: July 7, 2025, 03:00 Amount to Unlock: $1.24 million (5.30% of market cap) Market Value: $23.41 million Hashflow (HFT) Date: July 7, 2025, 13:00 Amount to Unlock: $1.34 million (2.27% of market cap) Market Value: $58.15 million Alchemy Pay (ACH) Date: July 7, 2025, 15:00 Amount to Unlock: $1.58 million (0.91% of market cap) Market Value: $173.19 million Neon (NEON) Date: July 7, 2025, 23:00 Amount to Unlock: $4.98 million (20.24% of market cap) Market Value: $24.62 million Space and Time (SXT) Date: July 8, 2025, 03:00 Amount to Unlock: $1.68 million (1.73% of market cap) Market Value: $97.16 million Xterio (XTER) Date: July 8, 2025, 03:00 Amount to Unlock: $1.40 million (7.25% of market cap) Market Value: $19.38 million Port3 Network (PORT3) Date: July 8, 2025, 09:00 Amount to Unlock: $1.05 million (5.04% of market cap) Market Value: $20.91 million Movement (MOVE) Date: July 9, 2025, 03:00 Amount to Unlock: $7.95 million (1.96% of market cap) Market Value: $405.60 million Xai (XAI) Date: July 9, 2025, 09:00 Amount to Unlock: $1.90 million (2.29% of market cap) Market Value: $82.80 million Related News: Watch Out: Many Economic Developments and Altcoin Events in the Coming Week - Here's the Day-by-Day, Hour-by-Hour List Cheelee (CHEEL) Date: July 10, 2025, 12:00 Amount to Unlock: $43.81 million (14.68% of market cap) Market Value: $298.33 million Axie Infinity (AXS) Date: July 11, 2025, 03:00 Amount to Unlock: $4.98 million (1.38% of market cap) Market Value: $360.89 million io.net (IO) Date: July 11, 2025, 03:00 Amount to Unlock: $7.10 million (6.06% of market cap) Market Value: $117.08 million BitMEX (BMEX) Date: July 11, 2025, 03:00 Amount to Unlock: $1.12 million (3.13% of market cap) Market Value: $35.64 million Nereus Token (NRS) Date: July 11, 2025, 03:00 Amount to Unlock: $2.32 million (50.05% of market cap) Market Value: $4.63 million Immutable (IMX) Date: July 11, 2025, 08:00 Amount to Unlock: $11.61 million (1.46% of market cap) Market Value: $792.47 million Moca Network (MOCA) Date: July 11, 2025, 17:00 Amount to Unlock: $17.03 million (7.25% of market cap) Market Value: $234.70 million Aptos (APT) Date: July 12, 2025, 03:00 Amount to Unlock: $50.75 million (1.75% of market cap) Market Value: $2.90 billion Game7 (G7) Date: July 12, 2025, 03:00 Amount to Unlock: $1.63 million (17.24% of market cap) Market Value: $9.48 million DIMO (DIMO) Date: July 12, 2025, 21:00 Amount to Unlock: $1.05 million (7.47% of market cap) Market Value: $14.16 million Covalent X Token (CXT) Date: July 13, 2025, 03:00 Amount to Unlock: $1.89 million (8.54% of market cap) Market Value: $22.25 million BounceBit (BB) Date: July 13, 2025, 16:00 Amount to Unlock: $3.58 million (7.09% of market cap) Market Value: $50.53 million *This is not investment advice. Continue Reading: Watch Out: Massive Token Unlocks Coming to 21 Altcoins Next Week – Here’s the Day-by-Day, Hour-by-Hour List