Documentation Index
Fetch the complete documentation index at: https://docs.webacy.com/llms.txt
Use this file to discover all available pages before exploring further.
Overview
Address poisoning is a social engineering attack where attackers send small transactions from addresses that look similar to ones you’ve previously interacted with. The goal is to trick you into copying the wrong address when making future transfers.How It Works
- Monitoring: Attacker watches your transaction history
- Address Generation: Creates address with similar start/end characters
- Poisoning: Sends tiny transaction (dust) to your wallet
- Deception: Fake address appears in your transaction history
- Theft: Victim copies poisoned address for next transfer
Example Attack
Your regular recipient:Detection Indicators
| Tag | Severity | Description |
|---|---|---|
address_poisoning | High | Address involved in poisoning attacks |
Why It’s Effective
- Transaction history UI: Most wallets show truncated addresses
- Copy habits: Users often copy from recent transactions
- Similar appearance: Human eyes struggle with hex comparison
- Low cost: Generating similar addresses is computationally cheap
Vulnerable Scenarios
High Risk
- Copying addresses from transaction history
- Using auto-complete in wallet apps
- Sending large transfers without verification
Lower Risk
- Using saved address book entries
- Scanning QR codes directly
- Verifying full addresses character by character
API Example
Protection Strategies
- Verify full addresses - Check every character, not just start/end
- Use address books - Save verified addresses in your wallet
- Double-check large transfers - Extra verification for significant amounts
- Ignore dust transactions - Don’t interact with unexpected small deposits
- Use QR codes - When available, scan rather than copy/paste
- Enable address validation - Some wallets can warn about similar addresses
