How a poisoning attack works
A scammer imitates a user’s past transactions by using an address that appears similar at both the beginning and the end, with just the middle part being different. They then send transactions to and from this wallet in order to craft a misleading transaction history.
Recently stolen funds
There are about 14 attacks every minute and some of them are very well-planned. Real and fake addresses can match in over 15 characters, making them difficult to spot — especially on a phone. Users might be in a hurry and not paying close attention.
$113M
11 months ago1155.28 WBTC
$1M
6 months ago410 ETH
$1M
7 months ago1M USDT
$750K
11 months ago750K USDC
$674K
8 months ago199.98 ETH
How W3A protects users from poisoning attacks
We’ve analyzed over 100 million transactions to identify scam addresses and develop effective methods for quickly spotting suspicious activity.
and other wallets, payment services, exchanges
Protect your users within 1 day
Add a single API call to instantly detect fake addresses. Use W3A to spot scams, fake assets, and other risks by analyzing contracts and wallet activity.
Display risk alerts your way
Keep your withdrawal form as is. Show risk messages in any way that fits your service —beneath the input field, in a popup or as a label. It's completely up to you.
Give it a try?
Enhance your services beyond free address poisoning protection to offer even safer transactions for your clients.