Futures
Access hundreds of perpetual contracts
CFD
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
Bitcoin node flood raises fears of surveillance or Sybil attack
Bitcoin’s peer-to-peer network is facing fresh scrutiny after a sharp rise in IP and IP-like addresses shared through ADDR messages
Summary
A live monitor maintained by researchers at Karlsruhe Institute of Technology showed daily unique addresses rising to about 250,000 after spending years below 65,000.
The spike started around mid-April 2026 and drew attention from Bitcoin developer Jameson Lopp. He questioned whether the data showed fake node addresses being spread across Bitcoin’s P2P network, calling it “possibly preparation for a sybil attack.”
ADDR messages help Bitcoin nodes learn about other nodes on the network. Bitcoin’s developer documentation says the addr message relays peer connection information and supports decentralized peer discovery across the network.
That system helps new nodes build connections and receive transactions and blocks. It also means poor or false peer information can create concern, since some control messages are not authenticated and can contain incorrect or harmful information.
Moreover, a Sybil attack occurs when one actor creates many fake identities to gain influence in a peer-to-peer system. Related crypto.news security background notes that a Sybil attacker can try to flood a network with fake nodes and isolate honest participants.
An eclipse attack is another concern. In that case, an attacker surrounds one node with controlled peers and gives it a limited view of the blockchain. Protos noted that Bitcoin Core has added protections such as address-table bucketing and ADDR rate limits, but no open network can remove every form of Sybil risk.
Other explanations remain possible
The address surge does not prove an attack. Protos noted that it could reflect real node growth, routine network changes, or broad IP rotation. Bitcoin is open and permissionless, so users can run nodes or rotate addresses without explaining why.
Surveillance is another possible explanation. Earlier crypto.news privacy coverage noted that researchers have studied deanonymization attacks on Bitcoin’s networking layer, including methods that try to link transactions to source IP addresses.
The debate also follows past disputes over Bitcoin node statistics. Protos reported that a September 2025 claim about suspected fake Bitcoin Knots nodes was later partly walked back after Start9 said many of the flagged nodes were regular customer devices.