Address Poisoning Attacks: How They Scam Web3 Users

Learn how address poisoning attacks work, how to detect them, and protect yourself from losing crypto to lookalike wallet addresses. Complete guide with real case studies.

W
by Werner Vermaak
Expert Verified
January 20, 2026 • 8 minutes read
Address Poisoning Attacks: How They Scam Web3 Users

Crypto investors lost $3.1 billion in H1 2025 in various cryptocurrency hacks and scams, ranging from sophisticated methods to simpler ones that rely on the oldest of human weaknesses: deceit and human error.

Most Web3 scam losses involve phishing and social engineering tricks that activate wallet drainer malware, however there’s another very simple crypto deception trick that gets especially profitable when FOMO in bull markets make crypto users less diligent.

Address poisoning (also referred to in crypto as transaction poisoning) exploits Web3 user habits and a sense of familiarity when copying and pasting addresses. While other Web3 attack vectors try and exploit smart contract vulnerabilities, address poisoners deliberately plant lookalike wallet addresses to fool their victims into sending funds to a scam address.

Address Poisoning Attack Overview: Visual explanation of how address poisoning attacks work

Web3 security researchers over 2 years identified more than 270 million address poisoning attack attempts targeting over 17 million wallets, resulting in at least $83.8 million in losses across Ethereum and Binance Smart Chain (BSC).

In one of the biggest scams of 2024, a whale lost $68 million in wrapped Bitcoin (WBTC) to an address poisoning attack. Fortunately, the scammer returned the money, but not everyone gets lucky!

Address Poisoning $68M Loss Case: Screenshot showing the $68 million WBTC address poisoning attack

Source: X

Address Poisoning: How It Works (Step by Step)

Section titled “Address Poisoning: How It Works (Step by Step)”

At its core, this type of attack is a matter of wallet address manipulation. How does this happen? It follows a series of steps that can be identified and mitigated.

Address Poisoning Attack Steps: Step-by-step visual guide showing how address poisoning attacks work

Source: Nano Banana

Attackers start by studying a victim’s transaction history and find the address(es) to target. Let’s use an example:

Original Ethereum Address:

0x742d35Cc6634C0532925a3b844Bc454e4638f44e

The poisoner next creates similar-looking crypto addresses with specialized software called vanity address generators. The fake address will usually have the same first few and last few characters, since many interfaces truncate addresses to those parts.

Scam Ethereum Address:
0x742d353D0000003002000003400003004438f44e

Once the attacker has a fake but lookalike address, they “poison” the transaction history by making tiny or dust transfers from that address to the victim’s wallet.

Address Poisoning Dust Transaction: Visual showing how attackers send dust transactions to poison transaction history

The transaction leaves a permanent trace on the blockchain and appears in the victim’s transaction history. It then blends in easily in the target’s activity history, especially when displayed in mobile wallets or browser extensions.

The final parts of the scam relies on simple human error. People make mistakes, and bad actors count on that. Later, the victim checks their transaction history, and copies and pastes what they think is their trusted address. They look the same, but they’re not.

Address Poisoning Victim Copying Address: Illustration showing how victims accidentally copy the wrong address from transaction history

Step 5: Victim sends funds to scam address

Section titled “Step 5: Victim sends funds to scam address”

Finally, the victim completes the rest of the transaction and unknowingly sends real funds to the attacker.
Cold facts: There is no wallet signature trickery involved. The transaction is fully valid and irreversible.

Why is Crypto Address Poisoning so Successful?

Section titled “Why is Crypto Address Poisoning so Successful?”

These attacks are not just random; they are systematic and large-scale. They are also very successful for many reasons. In short, address poisoning succeeds because it exploits normal user behavior like below, not technical vulnerabilities.

Most users assume that addresses in their transaction history are safe because they were “used before.” Attackers exploit this trust. Especially for high frequency transactions,users who make several transfers are prone to taking shortcuts, increasing their risk of relying on recent transaction history.

Let’s face it, hexadecimal wallet addresses are very long, and nearly impossible to remember or manually type for the average Joe or Jane. For simplicity, users prefer to copy and paste from their transaction history. This creates a loophole that allows attackers to embed a recently created fake wallet address for their own gain.

3. Most wallet interfaces hide the full addresses

Section titled “3. Most wallet interfaces hide the full addresses”

Most wallets truncate addresses, only displaying the beginning and ending numbers and letters. If those parts match, users rarely check the full 42-character string.

While transparency is a core tenet of blockchain, this also has its downside. All wallet activity is viewable on a public blockchain ledger such as Etherscan or Solscan.

This allows address poisoners to:

  • Identify very active wallets
  • See repeating transfer patterns
  • Target users with high balances

5. Bot automation makes address poisoning scalable

Section titled “5. Bot automation makes address poisoning scalable”

Tech-savvy bad actors use sophisticated bots to poison thousands of wallets per hour across multiple blockchains at near-zero cost.

Which Chains Are Most Affected By Poisoning?

Section titled “Which Chains Are Most Affected By Poisoning?”

It makes sense that popular chains with a lot of stablecoin transfers will be the most prized targets since they are the most profitable for attackers. Crypto is a numbers game, and so are their scams.

Address poisoning works on any chain with a transparent transaction history, but it is most common on:

  • Ethereum & Layer 2s (Base, Arbitrum, Optimism)
  • Solana (increasing rapidly)
  • BNB Chain
  • Polygon
  • Avalanche
  • Tron (USDT transfers)

The best way to mitigate poisoning attempts is to shut the door that attackers can use to compromise your security.

You’ll need to be vigilant (friendly reminder: this is crypto!) and do your checks and balances to ensure that a compromised address is not lurking in your transaction history and taking that wallet balance down to zero.

Here are some address poisoning red flags to watch out for:

Address Poisoning Red Flags: Visual guide showing warning signs of address poisoning attempts

  • Unexpected dust transactions - When a small and unknown transaction is sent to your wallet, always try to verify its origins. It may be a test transaction from someone you know, or the attacker may be injecting this fake address into your history to lay a future trap.

  • Lookalike addresses: Watch out for addresses that look similar. Scammers generate addresses that mimic legitimate wallet addresses.

Here is what you can do to improve your Web3 security and save yourself the pain of being an address poisoning victim.

  • Users need to develop full-address verification habits, not just the first and last characters.
  • Instead of pasting addresses from transaction history, whitelist ones you trust.
  • Treat each new or unknown address as a potential threat until proven otherwise.
  1. Use Automated, Real-Time Web3 Security Monitoring

    Section titled “Use Automated, Real-Time Web3 Security Monitoring”

Web3 threat detection requires state-of-the-art monitoring and blockchain analysis tools that can spot threats from miles away.

A top Web3 security tool like Kerberus provides 24/7 monitoring to detect malicious addresses and thwart poisoning attacks. Users can choose between a browser extension and API for protection.

Web3 security requires users to be active, and not passive. Regularly update your Web3 wallet’s software and protect your private keys and seed phrases.

Use secure cold storage and multisig wallets. Enable all security features, such as biometric logins. You can never be too careful when it comes to your crypto asset protection.

Send a minimum amount of crypto to an address before committing a larger amount. This test allows you to prevent a fake address attack.

You can use an Ethereum Name Service (ENS) domain or Solana Name Service as a readable name for your wallet address, such as AliceBob.ETH. It can be memorized and makes it easier to pick out potential address poisoning threats. Of course, be aware that lookalike ENS addresses can also be created.

Kerberus Address Poisoning Protection: Visual showing how Kerberus protects against address poisoning attacks

Kerberus’ Sentinel3 browser extension thwarts address poisoning attacks proactively with an automated, on-chain protection service that monitors and flags malicious activity. It has a 99.9% protection record since 2023, and offers up to $30,000 in coverage for Web3 transactions, unlike any of its competitors.

Unlike traditional methods that rely solely on user vigilance, the Kerberus solution uses a multi-layered approach:

  • On-Chain Protection: Actively monitors your wallet addresses across multiple blockchains for address poisoning attempts.
  • Real-time Detection: Automatically detects and blocks malicious Web3 sites used in these scams.
  • Transaction Translation: Shows clear asset changes before you sign, helping you spot swapped destination addresses.
  • Wallet Integration: Works independently in the background, adding security beyond traditional wallets.

Address poisoning is simple, but deadly.Follow the best practice tips in this guide to stay safe, by

  • verifying your addresses before making transactions
  • monitoring your wallet history for scam addresses
  • using Web3 security tools like Kerberus to proactively protect you

And here’s an important rule of thumb to heed well: while tools like Kerberus can flag malicious intent, a blockchain cannot. It does what users instruct it to do, and there is no recourse or rollback if someone is tricked into routing their hard-earned cash straight into the pockets of scammers.

Immutability is a feature, not a bug. You are your own bank, and the responsibility in crypto starts and ends with you.


Address Poisoning Knowledge Quiz

Test your knowledge and see how well you understand address poisoning attacks and how to protect yourself

1. What primary vulnerability do address poisoning attacks exploit?

Hint: Think about why a user might accidentally send money to the wrong person without a technical hack occurring.

2. What is the purpose of a 'vanity address generator' in this specific scam?

Hint: Consider how wallet interfaces usually display long hexadecimal strings and what parts remain visible.

3. Why do attackers send 'dust' (tiny amounts of crypto) to the victim's wallet?

Hint: The goal is to trick the user when they go to make a future transaction and look for a past recipient.

4. Which of the following is the most effective way to verify a destination address and avoid poisoning?

Hint: Because attackers can mimic the start and end of an address, where should you look to find the discrepancy?

5. How does the Kerberus 'Transaction Translation' feature assist users?

Hint: This feature acts as a 'preview' of what the transaction will actually do to your assets.

6. True or False: Once a user sends funds to a poisoned address, the blockchain can easily reverse the transaction.

Hint: Consider one of the core characteristics of blockchain technology regarding transaction finality.

Written by:

W

Werner Vermaak

Werner Vermaak is a Web3 author and crypto journalist with a strong interest in cybersecurity, DeFi, and emerging blockchain infrastructure. With more than eight years of industry experience creating over 1000 educational articles for leading Web3 teams, he produces clear, accurate, and actionable organic material for crypto users. His Kerberus articles help readers understand modern Web3 threats, real-world attack patterns, and practical safety practices in an accessible, research-backed way.

Read more about the author

Related Guides

See more guides
Browser Extension
Navigate Web3 Fearlessly

Install once & immediately get protected from scams, phishing and hacks. Zero losses for 250k+ users in 3 years. Now with up to $30,000 in coverage.

Get Protected Now
4.8 From 298+ reviews