Products

Address Poisoning Crypto

Published on
Wednesday, April 2, 2025

Address Poisoning in Crypto: What It Is, How It Works, and Why You Should Care

When you’re moving funds on-chain, one wrong character in an address can mean the difference between a successful transaction—and a complete loss.

Scammers know this.
And that’s exactly why address poisoning is becoming a go-to tactic in their playbook.

It’s subtle, it’s clever, and for the untrained eye… it can be incredibly costly.

What is Address Poisoning?

Address poisoning is a type of scam where bad actors create lookalike wallet addresses—ones that closely resemble those you’ve recently interacted with.

They then send tiny amounts of tokens (like ETH, USDT, or USDC) to your wallet, using these copycat addresses. The idea? Their fake address now shows up in your transaction history. So next time you go to copy-paste an address you “recognize,” you might accidentally send funds to the scammer instead.

It’s a simple trick—but it works.

How Scorechain Detects Address Poisoning (In Near Real-Time)

At Scorechain, we’ve built a dedicated Address Poisoning Detector to flag these malicious addresses and help VASPs, compliance teams, and investigators stay ahead.

Here’s how it works under the hood:

  1. Monitoring suspicious transactions: We continuously scan all value transfers on-chain to detect transactions sending very small amounts of well-known tokens like ETH, USDT, USDC, or LINK.

  2. Reviewing the victim's recent activity: We analyze the wallet’s previous transaction history to identify legitimate interactions.

  3. Flagging honeypots: If we find a recent address in the wallet’s history that shares the same starting/ending characters as the suspicious one, we flag it as a “honeypot”—a trap designed to exploit copy-paste habits.

To do this effectively, we’ve had to solve some tough challenges:

  • Index every transaction across multiple chains and evaluate every value transfer.

  • Maintain a curated list of legitimate tokens, and fetch metadata for unknown ERC-20s.

  • Normalize token symbols to catch trickery with special characters (e.g., Cyrillic letters).

  • Filter out burn/mint addresses and known exceptions.

  • Optimize everything with robust caching for real-time detection.

It’s a complex process—but the results speak for themselves.

Two Real-World Examples of Poisoning

Example 1: ETH Dust Attack

from 0x11D867b268B969393E30194263777DcAD54de1a3 

to 0xc07c50EE9B308344ADB21b04aBB5eD7556307EDB

from 0xC07c16aDf2fDa8f6aD7A9122DE19d770Ff4e7EDb 

to 0x11D867b268B969393E30194263777DcAD54de1a3

💡 What’s happening here?
The scammer creates a wallet address visually similar to the original recipient’s and sends a tiny amount of ETH back to the sender. This fake address now appears in the wallet’s history, waiting to be mistaken for the real one.

Example 2: Fake USDT Contract

from 0x85A0bee4659ECef2e256dC98239dE17Fb5CAE822

to 0xBc66860E3e2758575b086FFaFE61e2d8de46bbf2

from 0x85A0bee4659ECef2e256dC98239dE17Fb5CAE822

to 0xBC66BE4d1FE956c99e91833E34c918D951f7bbf2
Token: Fake USDT

💡 Here, the scammer replicates the transaction, using a fake USDT token contract and an address that looks almost identical to the original recipient’s. The result? A misleading entry in the transaction history that could trick the user next time they send funds.

What We’ve Found (So Far) In terms of Data.

After running the Poisoning Detector across four EVM-compatible chains (Ethereum, BSC, Base, and Polygon) for just one month, here’s what we uncovered:

  • 4,249 poisoning entities identified

  • 1.37 million addresses linked to poisoning attacks:


    • 1,369,603 honeypot addresses

    • 2,588 scammer-controlled addresses

    • 747 fake tokens detected

  • One single entity was responsible for 10% of all poisoning attempts

  • Chain breakdown:


    • Ethereum: 50% of activity

    • BSC: 45%

    • Polygon: 3%

    • Base: 2%

  • Most spoofed tokens:


    • USDT + USDC: 35%

    • ETH: 13%

✅ How to Stay Ahead

Address poisoning is easy to overlook—but dangerous if ignored. Especially for platforms and teams managing high volumes of transactions or user funds, the risk is very real.

Scorechain’s Address Poisoning Detector makes it possible to:

  • Automatically flag and trace scam addresses

  • Link attackers across multiple transactions and chains

  • Keep users, funds, and reputations safe

Copy-paste traps are real. Our MetaMask SafeTransfer plugin helps you spot poisoned addresses before it's too late. 

https://snaps.metamask.io/snap/npm/scorechain-safetransfer/

350+ COMPLIANCE & DIGITAL ASSET TEAMS TRUST US

You could also be interested in

Want to take your Crypto Compliance to the next level?

BOOK A Demo

Talk with one of our experts

  • No Surprises. Just Straightforward Pricing
    At Scorechain, what you see is what you pay—no hidden fees, no tricky tiers.
  • One Platform. Everything You Need
    Get everything—from monitoring to risk scoring to reporting to travel rule—in one powerful, easy-to-use system.
  • Your Data Stays Yours—Always
    Unlike some providers, we don’t analyze, mine, or share your data. Ever. What’s yours stays yours—period.
  • 350+ Compliance & Digital Asset teams have trusted us since 2015
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.