Time Tells All: Deanonymization of Blockchain RPC Users with Zero Transaction Fee (Extended Version)

📅 2025-08-29
📈 Citations: 0
Influential: 0
📄 PDF
🤖 AI Summary
Blockchain RPC services, while enabling convenient public-chain access, introduce severe privacy risks: existing deanonymization techniques either incur transaction fees or require active network eavesdropping. This paper presents the first zero-cost, purely passive deanonymization attack. It establishes cross-domain temporal correlations by synchronizing TCP acknowledgment timestamps from users’ IP traffic with on-chain transaction broadcast/confirmation timestamps. Our method requires no traffic injection—only passive network monitoring and publicly available blockchain data—leveraging time-series alignment and empirical measurements to construct an end-to-end deanonymization framework. Evaluated on Ethereum, Bitcoin, and Solana, the attack achieves >95% success rate in linking users’ real-world IP addresses to their on-chain pseudonyms. This is the first empirical demonstration of high-precision, systematic linkage between RPC clients’ network identities and blockchain identities, exposing a fundamental privacy vulnerability inherent in current RPC architectures.

Technology Category

Application Category

📝 Abstract
Remote Procedure Call (RPC) services have become a primary gateway for users to access public blockchains. While they offer significant convenience, RPC services also introduce critical privacy challenges that remain insufficiently examined. Existing deanonymization attacks either do not apply to blockchain RPC users or incur costs like transaction fees assuming an active network eavesdropper. In this paper, we propose a novel deanonymization attack that can link an IP address of a RPC user to this user's blockchain pseudonym. Our analysis reveals a temporal correlation between the timestamps of transaction confirmations recorded on the public ledger and those of TCP packets sent by the victim when querying transaction status. We assume a strong passive adversary with access to network infrastructure, capable of monitoring traffic at network border routers or Internet exchange points. By monitoring network traffic and analyzing public ledgers, the attacker can link the IP address of the TCP packet to the pseudonym of the transaction initiator by exploiting the temporal correlation. This deanonymization attack incurs zero transaction fee. We mathematically model and analyze the attack method, perform large-scale measurements of blockchain ledgers, and conduct real-world attacks to validate the attack. Our attack achieves a high success rate of over 95% against normal RPC users on various blockchain networks, including Ethereum, Bitcoin and Solana.
Problem

Research questions and friction points this paper is trying to address.

Deanonymizing blockchain RPC users by linking IP addresses to pseudonyms
Exploiting temporal correlation between transaction confirmations and TCP packets
Achieving high success rates with zero transaction fee costs
Innovation

Methods, ideas, or system contributions that make the work stand out.

Exploits temporal correlation in transaction timestamps
Uses passive network monitoring without transaction fees
Links IP addresses to blockchain pseudonyms effectively
🔎 Similar Papers
No similar papers found.
S
Shan Wang
The Hong Kong Polytechnic University, Hong Kong, China; Southeast University, Nanjing, Jiangsu, China
M
Ming Yang
Southeast University, Nanjing, Jiangsu, China
Y
Yu Liu
Southeast University, Nanjing, Jiangsu, China
Y
Yue Zhang
Shandong University, Qingdao, Shandong, China
S
Shuaiqing Zhang
Southeast University, Nanjing, Jiangsu, China
Zhen Ling
Zhen Ling
Professor, Southeast University
NetworkIoT
Jiannong Cao
Jiannong Cao
IEEE Fellow; Chair Professor, Hong Kong Polytechnic University
Distributed computingMobile and pervasive computingWireless sensor networksCloud computingBig Data
Xinwen Fu
Xinwen Fu
University of Massachusetts Lowell
Computer security and privacy