Figure6

Figure6

Figure6: Statistics of the attackers’ wallet provided by the mining pool