-
bitcoin $87959.907984 USD
1.34% -
ethereum $2920.497338 USD
3.04% -
tether $0.999775 USD
0.00% -
xrp $2.237324 USD
8.12% -
bnb $860.243768 USD
0.90% -
solana $138.089498 USD
5.43% -
usd-coin $0.999807 USD
0.01% -
tron $0.272801 USD
-1.53% -
dogecoin $0.150904 USD
2.96% -
cardano $0.421635 USD
1.97% -
hyperliquid $32.152445 USD
2.23% -
bitcoin-cash $533.301069 USD
-1.94% -
chainlink $12.953417 USD
2.68% -
unus-sed-leo $9.535951 USD
0.73% -
zcash $521.483386 USD
-2.87%
How to avoid address poisoning scams where a scammer sends you 0 tokens?
Address poisoning tricks users with zero-value transfers to fake legitimacy—always manually verify checksums on Etherscan before sending funds.
Dec 08, 2025 at 12:59 pm
Understanding Address Poisoning Mechanics
1. Scammers generate thousands of wallet addresses and send negligible token amounts—often 0.00000001 or exactly zero-value transactions—to them.
2. These transactions appear in blockchain explorers and wallet histories, creating a false impression of prior interaction with the sender’s address.
3. Victims who later copy-paste that address for legitimate transfers may unknowingly send funds to the scammer’s controlled wallet.
4. The poisoned address often mimics real project contracts or exchange deposit addresses, increasing deception through visual similarity.
5. Wallet interfaces rarely flag such micro-transactions as suspicious, allowing them to blend seamlessly into transaction logs.
Wallet-Level Defense Strategies
1. Disable auto-import of addresses from transaction history in MetaMask, Trust Wallet, and Phantom by toggling off “Suggest tokens” and “Auto-add tokens” features.
2. Manually verify every address before initiating a transfer—even if it appears in your recent history—by cross-checking checksums on Etherscan or Solscan.
3. Use wallet extensions that support address labeling; assign custom names only after confirming ownership via official project channels.
4. Avoid clicking “Send to this address” buttons embedded in explorer pages—always copy manually and paste into a clean send interface.
5. Enable hardware wallet confirmation for all outgoing transactions so each address must be visually verified on-device before signing.
Blockchain Explorer Verification Protocols
1. Paste any suspicious address into Etherscan, BscScan, or Solscan and examine its transaction tab—not just the token transfers but also internal transactions and contract creation details.
2. Check if the address has ever received ETH or native gas tokens; legitimate project addresses usually hold balances or have verified contracts.
3. Look for patterns like multiple identical zero-value transfers sent within seconds across different wallets—a hallmark of automated poisoning scripts.
4. Verify whether the address is verified: unverified contracts with no source code or audit links should trigger immediate caution.
5. Use the “Token Holders” tab to see if the address holds any meaningful balance—if it only contains dust or zero-value entries, treat it as compromised.
Transaction Signing Hygiene
1. Never sign a transaction without reading the full payload in your wallet extension—especially when interacting with unfamiliar dApps or bridges.
2. Reject any approval request asking for unlimited allowance to an unknown token contract, even if the token symbol looks familiar.
3. Use tools like Revoke.cash or Blockaid to scan active allowances and revoke permissions for contracts you no longer use.
4. When sending tokens, always double-check the recipient field after pasting—some malicious sites inject JavaScript that swaps the address upon paste event.
5. Avoid using mobile wallets for high-value transfers unless they offer on-screen address confirmation with full checksum visibility.
Frequently Asked Questions
Q: Can zero-value transactions be reversed or blocked on-chain? No. Once confirmed, even zero-value transfers are immutable and cannot be undone or filtered retroactively by nodes or wallets.
Q: Do hardware wallets protect against address poisoning? Hardware wallets prevent private key exposure but do not stop users from copying poisoned addresses—on-device address verification remains essential.
Q: Is there a way to detect poisoned addresses programmatically? Some open-source scripts analyze Etherscan API responses for clusters of zero-value inbound transfers, but no mainstream wallet integrates real-time detection natively.
Q: Why do scammers prefer zero-value over tiny-value transfers? Zero-value transactions cost less gas and avoid triggering spam filters in explorers or wallet notifications designed for non-zero token movements.
Disclaimer:info@kdj.com
The information provided is not trading advice. kdj.com does not assume any responsibility for any investments made based on the information provided in this article. Cryptocurrencies are highly volatile and it is highly recommended that you invest with caution after thorough research!
If you believe that the content used on this website infringes your copyright, please contact us immediately (info@kdj.com) and we will delete it promptly.
- Ripple, Banks, & Cash: The Digital Treasury Revolution and Washington's New Blueprint
- 2026-01-31 22:40:02
- Bitcoin's High-Wire Act: Leverage Ratio Spikes, Volatility Looms on the Horizon
- 2026-01-31 22:20:02
- Spur Protocol's SON Token: A Listing Saga and Its Murky Price Outlook
- 2026-01-31 22:15:04
- Bitcoin Price Breakdown Looms as Institutions Pull Billions: BTC Faces Critical Juncture
- 2026-01-31 22:10:07
- Tria Airdrop's Second Act: Season 2 Kicks Off, XP Details Unveiled
- 2026-01-31 22:05:08
- Silver Liquidation Raised Eyebrows: What Happened, and What It Means
- 2026-01-31 22:00:07
Related knowledge
How to generate a new receiving address for Bitcoin privacy?
Jan 28,2026 at 01:00pm
Understanding Bitcoin Address Reuse Risks1. Reusing the same Bitcoin address across multiple transactions exposes transaction history to public blockc...
How to view transaction history on Etherscan via wallet link?
Jan 29,2026 at 02:40am
Accessing Wallet Transaction History1. Navigate to the official Etherscan website using a secure and updated web browser. 2. Locate the search bar pos...
How to restore a Trezor wallet on a new device?
Jan 28,2026 at 06:19am
Understanding the Recovery Process1. Trezor devices rely on a 12- or 24-word recovery seed generated during initial setup. This seed is the sole crypt...
How to delegate Tezos (XTZ) staking in Temple Wallet?
Jan 28,2026 at 11:00am
Accessing the Staking Interface1. Open the Temple Wallet browser extension or mobile application and ensure your wallet is unlocked. 2. Navigate to th...
How to set up a recurring buy on a non-custodial wallet?
Jan 28,2026 at 03:19pm
Understanding Non-Custodial Wallet Limitations1. Non-custodial wallets do not store private keys on centralized servers, meaning users retain full con...
How to protect your wallet from clipboard hijacking malware?
Jan 27,2026 at 10:39pm
Understanding Clipboard Hijacking in Cryptocurrency Wallets1. Clipboard hijacking malware monitors the system clipboard for cryptocurrency wallet addr...
How to generate a new receiving address for Bitcoin privacy?
Jan 28,2026 at 01:00pm
Understanding Bitcoin Address Reuse Risks1. Reusing the same Bitcoin address across multiple transactions exposes transaction history to public blockc...
How to view transaction history on Etherscan via wallet link?
Jan 29,2026 at 02:40am
Accessing Wallet Transaction History1. Navigate to the official Etherscan website using a secure and updated web browser. 2. Locate the search bar pos...
How to restore a Trezor wallet on a new device?
Jan 28,2026 at 06:19am
Understanding the Recovery Process1. Trezor devices rely on a 12- or 24-word recovery seed generated during initial setup. This seed is the sole crypt...
How to delegate Tezos (XTZ) staking in Temple Wallet?
Jan 28,2026 at 11:00am
Accessing the Staking Interface1. Open the Temple Wallet browser extension or mobile application and ensure your wallet is unlocked. 2. Navigate to th...
How to set up a recurring buy on a non-custodial wallet?
Jan 28,2026 at 03:19pm
Understanding Non-Custodial Wallet Limitations1. Non-custodial wallets do not store private keys on centralized servers, meaning users retain full con...
How to protect your wallet from clipboard hijacking malware?
Jan 27,2026 at 10:39pm
Understanding Clipboard Hijacking in Cryptocurrency Wallets1. Clipboard hijacking malware monitors the system clipboard for cryptocurrency wallet addr...
See all articles














