Fig. 5From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesDistribution of available connection slots number of Mainnet addressesBack to article page