ByAUJay
Summary: Web3 gaming analytics break when you treat “daily active wallets” as “daily active users.” Here’s a concrete, implementation-first playbook to reconcile on-chain DAW with real user counts, hardened for account abstraction (ERC‑4337) and EIP‑7702-era UX, and wired to marketing KPIs like LTV/CAC, cohort retention, and UA efficiency.
Target audience: Enterprise game publishers and studios who need SOC2-aligned reporting, procurement-ready scope, and measurable ROI from Web3 features.
Analytics for Web3 Games: Tracking Active Wallets vs. Users
Pain — Your dashboards say “growth,” Finance says “where are the users?”
- You report “4–7M daily active wallets in Web3 gaming,” yet UA dashboards, CRM, and store analytics don’t agree; deduped users are far lower. Duplicates from multi-wallet players, bots, and sponsored transactions inflate DAW and distort LTV/CAC. (dappradar.com)
- New account-abstraction UX (ERC‑4337 smart accounts, passkeys, session keys, gas sponsorship) multiplies identifiers per person across chains and devices — great for conversion, terrible for user-level analytics if you don’t re-architect identity. (docs.erc4337.io)
- Result: wasted UA budget, broken retention cohorts (D1/D7/D30), missed seasonal launches, and procurement challenges because Finance can’t reconcile “wallets” to “users” under SOC2/GDPR controls.
Agitation — The risk is not theoretical
- Q3 2025 gaming still drove ~25% of all wallet activity across dapps, but daily active wallets drifted from ~5.8M in Q1 to ~4.66M in Q3 — volatility that can mislead resourcing if you equate wallets to people. Budgeting and hiring off DAW alone risks overbuild and missed P&L targets. (dappradar.com)
- Hit games drive chain-level spikes and drops (e.g., Pixels on Ronin), proving how fragile raw wallet metrics are for forecasting; chain activity can fall even with stable player bases if wallet UX changes. (cointelegraph.com)
- With EIP‑7702 enabling EOAs to behave like smart accounts and broad adoption of session keys, one human may present multiple “active accounts” per week. If your BI assumes 1:1 (wallet:user), your LTV, payback, and cohort retention are overstated — and Marketing’s CAC looks “better than reality.” (eips.ethereum.org)
Money phrase: “If you don’t solve identity, every ROI metric becomes an optimism bias.”
Solution — 7Block Labs’ methodology to reconcile wallets and users (and prove ROI)
We design and ship a reporting stack that reconciles on-chain DAW with off‑chain user identity, resilient to ERC‑4337 and EIP‑7702, and compliant with SOC2/GDPR. Our scope is engineered to pass procurement and deliver measurable gains in UA efficiency.
1) Event and identity blueprint (12–15 days)
- Adopt SIWE (EIP‑4361) for session binding across web and native clients; this gives you a signed, origin-bound login that survives wallet UX changes. (eips.ethereum.org)
- Standardize contract events for analytics. Emit player-scoped events with indexed topics for address, session key, and action type so you can attribute both owner and delegated actor:
// Solidity: analytics-friendly events event PlayerAction( address indexed owner, // canonical player address address indexed actor, // session key or smart account uint256 indexed actionType, // e.g., 1=craft, 2=trade, 3=quest bytes32 sessionId, // app session uint256 amount, bytes32 gameObjectId // asset/entity reference );
- For embedded/custodial-like UX (e.g., email/SSO wallets), log the platform identity key (hashed, salted) in your auth service; never put PII on-chain. Coinbase passkeys and major wallet SDKs now support passkey auth flows that you can bind to your user graph. (help.coinbase.com)
- Use session keys for gameplay loops to remove signature spam but keep tight scopes: per‑contract, per‑function selector, value/time caps. This is now first-class in thirdweb’s Wallets API (ERC‑4337 and EIP‑7702). (portal.thirdweb.com)
2) Multi-wallet identity resolution that survives 4337/7702 (10–20 days)
- Deterministic linking
- SIWE login binds app sessions to the signing address. Store a normalized “subject” record keyed by user_id with a set of observed addresses and network metadata. (eips.ethereum.org)
- Use attestation rails (EAS) to cryptographically link user_id ↔ wallet(s) off-chain or on-chain, with revocation. EAS has mature schemas, explorers, and multi-chain support. (attest.org)
- Heuristic linking
- Apply funding-source, co-usage, and counterparty heuristics to group addresses likely controlled by the same entity. Chainalysis and Nansen document production-grade patterns (deposit, first-funder, signer, multisig relationships). We replicate the defensible subset in your data lake with transparent confidence scores. (chainalysis.com)
- Account abstraction aware
- Track owner vs actor: owner (canonical account) and actor (session key/smart account) are distinct; don’t collapse them. Thirdweb exposes granular policy and signer discovery, letting you recover which session key performed a call. (portal.thirdweb.com)
Data model sketch:
-- Pseudocode (Snowflake/BigQuery style) CREATE TABLE dim_user ( user_id STRING PRIMARY KEY, -- app user pii_hash STRING, -- salted hash of email/SSO id created_at TIMESTAMP ); CREATE TABLE map_user_wallet ( user_id STRING, chain STRING, address STRING, source STRING, -- siwe|eas|heuristic confidence FLOAT, -- 1.0 (deterministic), 0.5 (heuristic) first_seen TIMESTAMP, last_seen TIMESTAMP ); CREATE TABLE fact_onchain_action ( ts TIMESTAMP, chain STRING, tx_hash STRING, owner_address STRING, actor_address STRING, -- session key or smart account action_type INT64, amount NUMERIC, game_object STRING );
3) A DAW→DAU reconciliation pipeline you can defend in audit (15–25 days)
- Ingestion
- Index on-chain events you own (contract ABIs) and external state (transfers, approvals). Use a first-party indexer or a provider that surfaces 4337 userOps and 7702 tx types distinctly to avoid double counting. (docs.erc4337.io)
- Normalization
- Enrich on-chain events with resolved user_id via map_user_wallet. Keep audit columns: “link_source,” “link_confidence,” and “as_of_block” so BI can slice by strictness.
- Reconciliation
- Report DAW (unique addresses), DAU_strict (deterministic links only), and DAU_blended (deterministic + high-confidence heuristics). This prevents executive confusion and surfaces the “linking gap” as a KPI you can improve.
Reconciliation example:
-- Daily Active Wallets SELECT DATE(ts) AS d, COUNT(DISTINCT owner_address) AS daw FROM fact_onchain_action GROUP BY 1; -- Strict DAU (SIWE/EAS only) SELECT DATE(f.ts) AS d, COUNT(DISTINCT m.user_id) AS dau_strict FROM fact_onchain_action f JOIN map_user_wallet m ON f.owner_address = m.address AND m.source IN ('siwe','eas') GROUP BY 1; -- Blended DAU (add heuristic links >= 0.8 confidence) SELECT DATE(f.ts) AS d, COUNT(DISTINCT m.user_id) AS dau_blended FROM fact_onchain_action f JOIN map_user_wallet m ON f.owner_address = m.address AND m.confidence >= 0.8 GROUP BY 1;
4) Bot/Sybil and campaign integrity (ongoing)
- Flag clusters funded from the same exchange deposit or newly-created addresses with correlated timing; these are commonly used in airdrop farming and can pollute your retention cohorts. Leverage deposit and event-based heuristics documented by Chainalysis; calibrate against your ground truth. (chainalysis.com)
- For campaigns, require SIWE-bound sessions and optionally issue EAS attestations for eligibility/allowlists to prevent multi-wallet abuse without hamstringing UX. (eips.ethereum.org)
5) Account abstraction UX without analytics debt
- ERC‑4337
- Track userOps via EntryPoint and bundler metadata; treat Paymaster-sponsored tx as attributable to the same user_id even when the gas payer is your Paymaster. The ERC‑4337 docs detail bundler and validation flows you can instrument. (docs.erc4337.io)
- EIP‑7702 (as of Jan 2026)
- EIP‑3074 is withdrawn; EIP‑7702 is the active Core proposal enabling EOAs to set code and act like smart accounts. Many SDKs (e.g., thirdweb) already expose “EIP‑7702 mode” and session keys. Ensure your parser distinguishes 7702 tx types for correct actor vs owner attribution. (eips.ethereum.org)
- Passkeys
- Adopt passkey login where appropriate; Coinbase’s smart wallet/base account documents passkey flows and session lifetimes you can map to user graph nodes. (help.coinbase.com)
6) Reporting for UA, product, and Finance
- Cohorts: D1/D7/D30 retention by DAU_strict to remove bot/multi-wallet noise; compare against DAU_blended for sensitivity analysis.
- Unit economics: ARPDAU, ARPPU, and “sponsored gas per retained user.” Flag campaigns where DAW spikes but DAU_strict fails to move.
- Chain/channel mix: If a game migrates chains (e.g., Ronin), expect DAW distortions; use stable user_id to maintain KPI continuity across migrations. (cointelegraph.com)
7) Compliance and procurement guardrails (Enterprise-grade)
- SOC2 alignment: Role-based access to raw PII, hashed join keys in analytics tables, audit columns on identity links, rotation and revocation procedures for attestations/session keys.
- GDPR/CCPA: Pseudonymization at ingest, data minimization (no on-chain PII), right-to-erasure enacted by deleting the link row while preserving irreversible on-chain events.
What “good” looks like in practice (with current tech)
Example A — Session-key scopes that preserve attribution
- Configure session keys with granular constraints (target contract, selector, per‑tx and lifetime limits). Thirdweb’s API supports precise policies and lifetimes; log the session key address and expiry to your telemetry. (portal.thirdweb.com)
// thirdweb example: narrow session key createSessionKey({ account, contract, sessionKeyAddress, durationInSeconds: 3600, grantFullPermissions: false, policies: [{ target: GAME_CONTRACT, selector: "0x12345678", // craft() maxValuePerUse: 0, valueLimit: { type: "Allowance", periodSeconds: 3600, amount: 0 } }] });
Impact: players craft/sell without signature spam; analytics can attribute by actor (session key) but roll up to owner user_id.
Example B — EAS-linked multi-wallet identity
- Publish an off-chain EAS attestation (to avoid gas) that asserts user_id ↔ address. Store the UID and resolver URL; revoke on account compromise. EAS offers off-chain attestations with verifiable signatures and on-chain anchors when needed. (easscan.org)
Example C — Store-friendly onboarding with passkeys + non-custodial wallets
- Immutable Passport shows a mainstream pattern: SSO, non‑custodial wallet, security integrations (Blockaid), and >1M signups. Use a similar login-handoff to bind store users to on-chain addresses without seed phrases. (immutable.com)
Proof — Benchmarks and GTM metrics to expect
- Macro context: Web3 gaming daily active wallets ranged from ~5.8M in Q1 2025 to ~4.66M in Q3; gaming retained ~25% share of total wallet activity despite volatility. Your analytics must normalize these swings to user-level KPIs. (dappradar.com)
- Onboarding uplift: Ecosystem identity solutions (e.g., Immutable Passport) crossed 1M signups, indicating broad acceptance of email/SSO + wallet flows. Expect higher “wallet created → first on-chain action” conversion when removing seed phrases and enabling passkeys. (immutable.com)
- Session keys in production SDKs (thirdweb, Alchemy) now support granular scopes and expirations; teams are using them to cut drop-off from repeated signatures in core loops — a measurable ARPDAU and retention lever. (portal.thirdweb.com)
A realistic 90-day KPI set we contract to:
- Reconciliation accuracy: ≥95% of on-chain actions tied to a user_id via SIWE/EAS in target markets.
- UA efficiency: 10–20% reduction in “wasted” spend by eliminating duplicate wallets in attribution (measured as DAW→DAU_strict delta in paid cohorts).
- Retention clarity: ≤5% variance between app-analytics DAU and on-chain DAU_strict; separate bot/multi-wallet noise by reporting DAU_blended.
- Reporting latency: sub‑15 minutes from on-chain event to BI dashboard for top chains.
We implement these with your existing BI stack and our engineering-led services:
- Need protocol-level changes or new game loops? Our smart contract development and custom blockchain development services teams ship the code paths and analytics events.
- Scaling to multiple chains or migrating? Our cross‑chain solutions and blockchain integration groups harden data pipelines and identity mapping.
- Running a tokenized economy or marketplace? We cover DeFi mechanics, DEX integrations, and NFT marketplaces with analytics-grade event models.
- Security and compliance? Our security audit services include analytics instrumentation reviews, SOC2 control mapping, and abuse resistance.
Implementation checklist (emerging best practices, 2025–2026)
- Identity and auth
- SIWE for deterministic session binding; EAS for revocable wallet links; passkeys for passwordless UX. (eips.ethereum.org)
- Account abstraction
- Instrument ERC‑4337 userOps (EntryPoint v0.6/0.7/0.8 where applicable) and EIP‑7702 transaction types distinctly; never collapse owner and actor. (docs.erc4337.io)
- Session keys
- Restrict by contract/function/value/time; log key_id and expiry; rotate on device changes; revoke on suspicious patterns (burst interactions, abnormal counterparties). (portal.thirdweb.com)
- Heuristics
- Start with conservative deposit/first-funder/counterparty heuristics; document confidence; allow BI toggles to include/exclude. (chainalysis.com)
- Campaign integrity
- Use attested allowlists and SIWE-gated actions for Play-to-Airdrop to reduce multi-wallet abuse without extra friction. (easscan.org)
- Chain migration continuity
- Maintain stable user_id across migrations (e.g., to Ronin); DAW will shift, but DAU_strict continuity protects KPI baselines. (cointelegraph.com)
- Data governance
- Pseudonymize PII; audit columns on all identity joins; retention windows for raw logs; automated revocation workflows to satisfy GDPR/CCPA and SOC2 evidence.
Procurement-friendly, timeboxed delivery
- Weeks 1–2: Blueprint — schemas, SIWE/EAS integration, contract event review; security and privacy posture aligned to SOC2.
- Weeks 3–6: Build — indexers, linkers, session-key policies, data models, dashboards; AB tests on onboarding flows.
- Weeks 7–12: Harden — accuracy backtesting, fraud flags, load tests, runbooks; go-live, with KPIs signed off by Finance and UA.
If you can’t measure real users, Wallet KPIs become vanity. If you can, you’ll ship UA campaigns with confidence, model LTV correctly, and cut waste.
Book a 90-Day Pilot Strategy Call.
Sources
- DappRadar, State of Blockchain Gaming Q3 2025: ~4.66M daily active wallets; gaming ~25% share. (dappradar.com)
- ERC‑4337 docs: bundlers, alt mempool, EntryPoint handling and instrumentation. (docs.erc4337.io)
- EIPs: EIP‑3074 (Withdrawn), EIP‑7702 (Core proposal to set code for EOAs). (eips.ethereum.org)
- Thirdweb Wallets: session keys for ERC‑4337 and EIP‑7702 with granular scopes. (portal.thirdweb.com)
- Alchemy smart wallet demo: session key lifecycle and permissions. (alchemy.com)
- Immutable Passport: 1M+ signups; security integrations; developer docs. (immutable.com)
- Coinbase Smart Wallet/Base Account: passkey-based auth and session behaviors for production UX. (help.coinbase.com)
- Chainalysis/Nansen: clustering heuristics and related-wallet identification methods for defensible entity graphs. (chainalysis.com)
- Ronin/Pixels chain-level impact illustrating DAW volatility vs players. (cointelegraph.com)
Related 7Block Labs capabilities
Like what you're reading? Let's build together.
Get a free 30‑minute consultation with our engineering team.

