Address Poisoning Attacks: How They Scam Web3 Users

Learn how address poisoning attacks work, how to detect them, and protect yourself from losing crypto to lookalike wallet addresses. Complete guide with real case studies.

W
by Werner Vermaak
Expert Verified
January 20, 2026 • 10 minutes read
Address Poisoning Attacks: How They Scam Web3 Users

Introduction

In late December 2025, a very unlucky crypto trader lost a staggering $50 million in USDT due to an address poisoning attack, a simple social engineering scam which is easy to avoid with a Web3 security tool like Kerberus Sentinel3.

Crypto investors lost $3.1 billion in H1 2025 alone in various cryptocurrency hacks and scams ($250m on Solana alone according to a Kerberus report). Most of them rely on the oldest of human weaknesses: deceit and human error.

Most Web3 scam losses involve phishing and social engineering tricks that activate wallet drainer malware, however there’s another very simple crypto deception trick that gets especially profitable when FOMO in bull markets make crypto users less diligent.

Address poisoning (also referred to in crypto as transaction poisoning) exploits Web3 user habits and a sense of familiarity when copying and pasting addresses. While other Web3 attack vectors try and exploit smart contract vulnerabilities, address poisoners deliberately plant lookalike wallet addresses to fool their victims into sending funds to a scam address.

Address Poisoning Attack Overview: Visual explanation of how address poisoning attacks work

Web3 security researchers over 2 years identified more than 270 million address poisoning attack attempts targeting over 17 million wallets, resulting in at least $83.8 million in losses across Ethereum and Binance Smart Chain (BSC).

In one of the biggest scams of 2024, a whale lost $68 million in wrapped Bitcoin (WBTC) to an address poisoning attack. Fortunately, the scammer returned the money, but not everyone gets lucky!

Address Poisoning $68M Loss Case: Screenshot showing the $68 million WBTC address poisoning attack

Source: X

Address Poisoning: How It Works (Step by Step)

At its core, this type of attack is a matter of wallet address manipulation. How does this happen? It follows a series of steps that can be identified and mitigated.

Address Poisoning Attack Steps: Step-by-step visual guide showing how address poisoning attacks work

Source: Nano Banana

Step 1: Target Acquired

Attackers start by studying a victim’s transaction history and find the address(es) to target. Let’s use an example:

Original Ethereum Address:

0x742d35Cc6634C0532925a3b844Bc454e4638f44e

Step 2: Lookalike address created

The poisoner next creates similar-looking crypto addresses with specialized software called vanity address generators. The fake address will usually have the same first few and last few characters, since many interfaces truncate addresses to those parts.

Scam Ethereum Address:
0x742d353D0000003002000003400003004438f44e

Step 3: Dust to target address

Once the attacker has a fake but lookalike address, they “poison” the transaction history by making tiny or dust transfers from that address to the victim’s wallet.

Address Poisoning Dust Transaction: Visual showing how attackers send dust transactions to poison transaction history

The transaction leaves a permanent trace on the blockchain and appears in the victim’s transaction history. It then blends in easily in the target’s activity history, especially when displayed in mobile wallets or browser extensions.

Step 4: Victim reuses the scam address

The final parts of the scam relies on simple human error. People make mistakes, and bad actors count on that. Later, the victim checks their transaction history, and copies and pastes what they think is their trusted address. They look the same, but they’re not.

Address Poisoning Victim Copying Address: Illustration showing how victims accidentally copy the wrong address from transaction history

Step 5: Victim sends funds to scam address

Finally, the victim completes the rest of the transaction and unknowingly sends real funds to the attacker.
Cold facts: There is no wallet signature trickery involved. The transaction is fully valid and irreversible.

Why is Crypto Address Poisoning so Successful?

These attacks are not just random; they are systematic and large-scale. They are also very successful for many reasons. In short, address poisoning succeeds because it exploits normal user behavior like below, not technical vulnerabilities.

1. People trust their transaction history

Most users assume that addresses in their transaction history are safe because they were “used before.” Attackers exploit this trust. Especially for high frequency transactions,users who make several transfers are prone to taking shortcuts, increasing their risk of relying on recent transaction history.

2. Users love to copy and paste

Let’s face it, hexadecimal wallet addresses are very long, and nearly impossible to remember or manually type for the average Joe or Jane. For simplicity, users prefer to copy and paste from their transaction history. This creates a loophole that allows attackers to embed a recently created fake wallet address for their own gain.

3. Most wallet interfaces hide the full addresses

Most wallets truncate addresses, only displaying the beginning and ending numbers and letters. If those parts match, users rarely check the full 42-character string.

4. Blockchain transparency helps scammers

While transparency is a core tenet of blockchain, this also has its downside. All wallet activity is viewable on a public blockchain ledger such as Etherscan or Solscan.

This allows address poisoners to:

  • Identify very active wallets
  • See repeating transfer patterns
  • Target users with high balances

5. Bot automation makes address poisoning scalable

Tech-savvy bad actors use sophisticated bots to poison thousands of wallets per hour across multiple blockchains at near-zero cost.

Case Study: How One Address Copy-Paste Cost $50 Million (December 2025)

What happened

On December 20, 2025, a crypto trader lost nearly $50 million in USDT after falling victim to an address poisoning attack, a scam where hackers trick victims into sending funds to a fake wallet address that looks almost identical to the real one.

How the victim was tricked

The attacker first sent a tiny test transaction to the victim, inserting a fake address into the victim’s transaction history. This address matched the first and last few characters of the legitimate address, making it easy to confuse when copying and pasting.​
When the trader later transferred the USDT, they accidentally used the poisoned address from their history, sending the funds directly to the scammer. The stolen money was quickly swapped for ETH and laundered through privacy tools like Tornado Cash, making recovery almost impossible, despite the victim’s $1m bounty.

Why the poisoning worked

The attacker used automation to exploit how most wallets display addresses:

  1. Spoofed address generation: An automated script created a wallet address that matched the victim’s real destination address in the first five and last four characters.

  2. History poisoning: The attacker sent small transactions from this spoofed address to the victim’s wallet, planting it into the victim’s transaction history.

  3. The trap: When the trader later copied an address from their history for the big transfer, they likely selected the poisoned look-alike address because many interfaces hide the middle characters with ellipses

How to protect yourself:

Always carefully check wallet addresses before every transaction. Scammers hope that you won’t.

Other Recent Address Poisoning Cases

Which Chains Are Most Affected By Poisoning?

It makes sense that popular chains with a lot of stablecoin transfers will be the most prized targets since they are the most profitable for attackers. Crypto is a numbers game, and so are their scams.

Address poisoning works on any chain with a transparent transaction history, but it is most common on:

  • Ethereum & Layer 2s (Base, Arbitrum, Optimism)
  • Solana (increasing rapidly)
  • BNB Chain
  • Polygon
  • Avalanche
  • Tron (USDT transfers)

How to Detect Address Poisoning Attempts

The best way to mitigate poisoning attempts is to shut the door that attackers can use to compromise your security.

You’ll need to be vigilant (friendly reminder: this is crypto!) and do your checks and balances to ensure that a compromised address is not lurking in your transaction history and taking that wallet balance down to zero.

Here are some address poisoning red flags to watch out for:

Address Poisoning Red Flags: Visual guide showing warning signs of address poisoning attempts

  • Unexpected dust transactions - When a small and unknown transaction is sent to your wallet, always try to verify its origins. It may be a test transaction from someone you know, or the attacker may be injecting this fake address into your history to lay a future trap.

  • Lookalike addresses: Watch out for addresses that look similar. Scammers generate addresses that mimic legitimate wallet addresses.

5 DIY Steps to Avoid Falling Victim

Here is what you can do to improve your Web3 security and save yourself the pain of being an address poisoning victim.

  1. Don’t Trust, Verify

  • Users need to develop full-address verification habits, not just the first and last characters.
  • Instead of pasting addresses from transaction history, whitelist ones you trust.
  • Treat each new or unknown address as a potential threat until proven otherwise.
  1. Use Automated, Real-Time Web3 Security Monitoring

Web3 threat detection requires state-of-the-art monitoring and blockchain analysis tools that can spot threats from miles away.

A top Web3 security tool like Kerberus provides 24/7 monitoring to detect malicious addresses and thwart poisoning attacks. Users can choose between a browser extension and API for protection.

  1. Improve Your Web3 Wallet Hygiene

Web3 security requires users to be active, and not passive. Regularly update your Web3 wallet’s software and protect your private keys and seed phrases.

Use secure cold storage and multisig wallets. Enable all security features, such as biometric logins. You can never be too careful when it comes to your crypto asset protection.

  1. Do a Test Run

Send a minimum amount of crypto to an address before committing a larger amount. This test allows you to prevent a fake address attack.

  1. Use ENS or SNS Domains

You can use an Ethereum Name Service (ENS) domain or Solana Name Service as a readable name for your wallet address, such as AliceBob.ETH. It can be memorized and makes it easier to pick out potential address poisoning threats. Of course, be aware that lookalike ENS addresses can also be created.

How Kerberus Active Protection Stops Web3 Address Poisoning

Kerberus’ Sentinel3 extension is an automated, on-chain Web3 protection service that monitors and flags malicious transaction attempts. It has a 99.9% Web3 user protection record since 2023, and provides up to $30,000 in coverage for Web3 transactions, unlike any of its competitors.

Sentinel3’s Active Protection is an autonomous Web3 security system by Kerberus that protects you while you browse Web3 sites with peace of mind.

What to know about Active Protection:

  1. It operates independently from Kerberus Sentinel3’s core detection services
  2. It vigilantly monitors your protected wallet addresses on 7 of the most popular chains.
  3. It actively searches for any attack signs and uses cutting-edge mitigation techniques to keep you safe.

Kerberus Active Protection Overview: Visual showing what Active Protection is and how it works

How Kerberus Stops Address Poisoning with Active Protection (3 steps)

Kerberus Active Protection 3 Steps: Visual guide showing the 3-step process of how Active Protection stops address poisoning

Step 1: Identifies your protected Web3 addresses

Kerberus Sentinel3 has the following information:

  1. its users’ Web3 wallet addresses
  2. the addresses they frequently sent funds to

Step 2: Adds frequently used recipient addresses to Active Protection database

Sentinel3 automatically adds the screened addresses to Active Protection you attempt transactions with while Sentinel3 is running.

Step 3: Flags very similar recipient addresses and alerts Kerberus user

Kerberus Active Protection Alert: Visual showing how Kerberus alerts users when a similar address is detected

If a Kerberus user copies an address that is similar, but not identical to one of those addresses, the Kerberus extension automatically detects that and sends a red alert to the user, who cancels the transaction.

And just like that, you’ve warded off an address poisoning attack!

Recap

Address poisoning is deceptively simple, but it can cost you a big chunk of your portfolio if you’re not careful.

Follow the best practice tips in this guide to stay safe, by

  • verifying your addresses before making transactions
  • monitoring your wallet history for scam addresses
  • using Web3 security tools like Kerberus to proactively protect you

And here’s an important rule of thumb to heed well: while tools like Kerberus can flag malicious intent, a blockchain cannot. It does what users instruct it to do, and there is no recourse or rollback if someone is tricked into routing their hard-earned cash straight into the pockets of scammers.

Immutability is a feature, not a bug. You are your own bank, and the responsibility in crypto starts and ends with you.


Address Poisoning Knowledge Quiz

Test your knowledge and see how well you understand address poisoning attacks and how to protect yourself

1. What primary vulnerability do address poisoning attacks exploit?

Hint: Think about why a user might accidentally send money to the wrong person without a technical hack occurring.

2. What is the purpose of a 'vanity address generator' in this specific scam?

Hint: Consider how wallet interfaces usually display long hexadecimal strings and what parts remain visible.

3. Why do attackers send 'dust' (tiny amounts of crypto) to the victim's wallet?

Hint: The goal is to trick the user when they go to make a future transaction and look for a past recipient.

4. Which of the following is the most effective way to verify a destination address and avoid poisoning?

Hint: Because attackers can mimic the start and end of an address, where should you look to find the discrepancy?

5. How does the Kerberus 'Transaction Translation' feature assist users?

Hint: This feature acts as a 'preview' of what the transaction will actually do to your assets.

6. True or False: Once a user sends funds to a poisoned address, the blockchain can easily reverse the transaction.

Hint: Consider one of the core characteristics of blockchain technology regarding transaction finality.

Written by:

W

Werner Vermaak

Werner Vermaak is a Web3 author and crypto journalist with a strong interest in cybersecurity, DeFi, and emerging blockchain infrastructure. With more than eight years of industry experience creating over 1000 educational articles for leading Web3 teams, he produces clear, accurate, and actionable organic material for crypto users. His Kerberus articles help readers understand modern Web3 threats, real-world attack patterns, and practical safety practices in an accessible, research-backed way.

Read more about the author

Related Guides

See more guides
Browser Extension
Navigate Web3 Fearlessly

Install once & immediately get protected from scams, phishing and hacks. Zero losses for 250k+ users in 3 years. Now with up to $30,000 in coverage.

Get Protected Now
4.8 From 298+ reviews