A heated online clash between alleged cybercriminals has unexpectedly shed new light on illicit crypto funds reportedly linked to an earlier Bitfinex seizure.
The online dispute that triggered the exposure
The episode centers on an individual known as John, also referred to as Lick, who was recorded during a so-called “band for band” dispute in a private group chat. In this contest, participants attempt to prove control over large cryptocurrency holdings by moving assets in real time.
During the exchange, John screen-shared multiple wallets and shifted millions of dollars on-chain. According to blockchain investigator ZachXBT, the individual appeared to demonstrate control over roughly $23 million in crypto assets while arguing with another alleged threat actor. Moreover, the entire interaction was recorded and later analyzed.
The argument, which unfolded live, showed John rapidly consolidating funds from different addresses. However, what began as a bravado-driven stunt quickly evolved into critical evidence for on-chain analysts once the footage reached the public domain.
Wallet movements and the $23 million consolidation
In one segment of the video, John displayed an Exodus wallet featuring a Tron address holding about $2.3 million. In another portion, an additional $6.7 million in ether was transferred live into an Ethereum address later identified as 0xd8bc. By the end of the so-called band for band dispute, approximately $23 million had been gathered into that same wallet.
That said, ZachXBT emphasized that the recording was particularly valuable because it captured John issuing commands and confirming specific addresses while funds were being moved. The footage, he argued, underscores John’s active control over several wallets linked in the chain of transactions.
These on-chain movements provided investigators with a starting point to trace earlier flows. Moreover, they allowed analysts to cross-check the live video with recorded blockchain history, tightening the link between the alias and the addresses involved.
Links to Bitfinex-connected seizure addresses
By working backward from 0xd8bc, ZachXBT says he connected the wallet to another address, 0x8924, which John allegedly acknowledged owning. That second address received 1,066 WETH in November 2025 from wallet 0xc7a2. According to the investigator, 0xc7a2 had earlier received $24.9 million in March 2024 from a U.S. government address tied to the Bitfinex hack seizure.
Furthermore, ZachXBT noted that roughly $18.5 million still remains in that intermediary wallet. This connection suggests that a portion of the funds showcased in the recording may be directly linked to prior seizure activity related to the Bitfinex case.
The emerging network of addresses illustrates how tracing illicit crypto funds can gradually uncover relationships between apparently unrelated wallets. However, it also raises new questions about how assets previously tied to a government-controlled address ended up in the hands of a suspected threat actor.
Additional inflows and centralized exchange activity
ZachXBT also reported that wallet 0xd8bc received more than $63 million in further inflows during late 2025 from addresses associated with suspected victims. These funds, he said, add to the already significant pile of reportedly illicit crypto funds linked to the same cluster of wallets.
On Thursday, the same address received another 4,170 ETH, estimated at around $12.4 million, originating from a centralized exchange. Moreover, this fresh inflow from a regulated trading platform could give law enforcement additional data points if they pursue on-chain and off-chain leads.
That said, the public has not yet seen any official statement from authorities about this specific wallet cluster. The ongoing movements, however, highlight the complex interplay between hacked funds, government seizures, and exchange-based liquidity.
Parallels with past social engineering crypto cases
The situation echoes a $243 million social engineering hack in 2024, where two bad actors allegedly impersonated Google support staff before flaunting their gains on social media. In that earlier case, their public displays ultimately contributed to their downfall.
Miami police later arrested both suspects tied to the 2024 incident. Moreover, the episode became a textbook example of how criminals often undermine their own operational security by showcasing stolen wealth.
However, the John crypto flex video now serves as a fresh reminder of that same pattern. When high-risk actors treat wallet access as a status symbol, they may inadvertently hand investigators a detailed map of their on-chain footprint.
What the case reveals about on-chain investigations
This latest dispute shows how bravado and public disputes can accelerate forensic work on exodus tron ethereum transfers and other complex flows. Analysts like ZachXBT rely on visible on-chain activity, but also on moments when alleged threat actors expose themselves in real time.
In practical terms, the case underscores how quickly wallets linked to seizure activity, suspected victims, and centralized exchanges can be connected. Moreover, it demonstrates that recorded disputes and flex videos now rank among the most valuable raw data sources for crypto investigations.
In summary, the clash involving John, the wallet cluster around 0xd8bc and 0x8924, and the funds traced back to a Bitfinex-related government address illustrates how visibility, ego, and blockchain transparency can collide. The result is a clearer picture of digital money flows that may otherwise have remained in the shadows.

