Text this: Identifying malicious activities through anomaly detection in ethereum network

 _    _    _    _     _____      ___     _    _   
| \  / || | || | ||  / ____||   / _ \\  | \  / || 
|  \/  || | || | || / //---`'  / //\ \\ |  \/  || 
| .  . || | \\_/ || \ \\___   |  ___  ||| .  . || 
|_|\/|_||  \____//   \_____|| |_||  |_|||_|\/|_|| 
`-`  `-`    `---`     `----`  `-`   `-` `-`  `-`