What Is Address Poisoning?
Address poisoning is a psychological attack targeting cryptocurrency users. It doesn't bypass the blockchain's security — it bypasses yours. Rather than exploiting technical vulnerabilities, scammers manipulate human behavior by exploiting how people verify wallet addresses.
How the Attack Works
The scheme operates in three stages:
- Address Creation: Attackers use "vanity generators" to create wallet addresses matching the first and last 5+ characters of target addresses
- Dust Transaction: They send minimal or zero-value transactions to the victim's wallet, placing the lookalike address prominently in recent activity
- User Error: Victims copy the poisoned address from transaction history instead of their address book, inadvertently sending funds to scammers
Real Financial Losses
The threat is substantive. Documented cases include a December 2025 incident involving $50 million in USDT and a May 2024 loss of 1,155 Wrapped Bitcoin. A 2026 study found poisoning attacks targeted over 17 million victims with confirmed losses exceeding $83.8 million.
Protection Strategies
- Name Services: Use ENS (.eth) or SNS (.sol) to eliminate address spoofing
- Address Books: Never copy-paste from transaction history
- Full Verification: Check entire address strings, not just endpoints
- Hardware Wallets: Use devices like Ledger or Trezor for physical confirmation
The fundamental lesson: ignore suspicious dust transactions and remain vigilant when verifying cryptocurrency addresses.