How a poisoning attack works
A scammer imitates a user’s past transactions by using an address that appears similar at both the beginning and the end, with just the middle part being different. They then send transactions to and from this wallet in order to craft a misleading transaction history.
Recently stolen funds
There are about 14 attacks every minute and some of them are very well-planned. Real and fake addresses can match in over 15 characters, making them difficult to spot — especially on a phone. Users might be in a hurry and not paying close attention.
$126M
1 year ago1155.28 WBTC
$26M
over 1 year ago10000 ETH
$20M
almost 2 years ago20M USDT
$5M
over 1 year ago2000 ETH
$4M
over 2 years ago4M USDT
How W3A protects users from poisoning attacks
We’ve analyzed over 100 million transactions to identify scam addresses and develop effective methods for quickly spotting suspicious activity.
and other wallets, payment services, exchanges
Protect your users within 1 day
Add a single API call to instantly detect fake addresses. Use W3A to spot scams, fake assets, and other risks by analyzing contracts and wallet activity.
Display risk alerts your way
Keep your withdrawal form as is. Show risk messages in any way that fits your service —beneath the input field, in a popup or as a label. It's completely up to you.
Give it a try?
Enhance your services beyond free address poisoning protection to offer even safer transactions for your clients.