Overview
Fake tokens are malicious tokens designed to impersonate legitimate projects. Scammers create tokens with similar names, symbols, or branding to trick users into buying worthless counterfeits.How Fake Tokens Work
- Target Selection: Scammer identifies a popular or trending token
- Impersonation: Creates a new token with identical or similar name/symbol
- Distribution: Fake token appears in wallets or DEX searches
- Deception: Users mistake it for the real token and buy
- Exit: Scammer sells or rugs, leaving victims with worthless tokens
Types of Fake Tokens
Name Squatting
- Exact or near-exact name copying
- Same symbol as legitimate token
- Different contract address (the key difference)
Airdrop Scams
- Unsolicited tokens appear in your wallet
- Designed to lure you to malicious websites
- Often have enticing names or values
Logo/Branding Copies
- Stolen logos and imagery
- Copied website designs
- Fake social media accounts
Pre-Launch Fakes
- Created before official token launches
- Exploit hype around upcoming projects
- Users think they’re getting early access
Detection Indicators
| Tag | Severity | Description |
|---|---|---|
fake_token | Critical | Token identified as impersonating another |
airdrop_scam | High | Unsolicited token likely part of scam |
phishing_token | Critical | Token designed to steal funds |
unverified_contract | Medium | Contract source code not verified |
API Example
Never share real API keys in screenshots, logs, or client-side code.
Red Flags
- Different contract address - Always verify against official sources
- No liquidity or minimal liquidity - Real tokens have established pools
- No transaction history - Legitimate tokens have trading activity
- Appeared in wallet unexpectedly - You didn’t buy or claim it
- Links to suspicious websites - Different from official project URLs
- No social presence - Not mentioned by official project accounts
Verification Steps
-
Check official sources
- Project’s official website
- Verified social media accounts
- CoinGecko/CoinMarketCap listings
-
Verify contract address
- Compare exact address character by character
- Use official links, not search results
-
Check on block explorer
- Verify contract is verified
- Check creation date and transaction history
- Look for legitimate trading activity
Protection Strategies
- Bookmark official sites - Don’t use search engines to find DEXes
- Verify contract addresses - Always check the exact address
- Ignore airdrops - Don’t interact with unsolicited tokens
- Use official links - Get addresses from verified sources only
- Check token age - New tokens impersonating old projects are suspicious
- Verify on multiple sources - Cross-reference contract addresses
Handling Fake Airdrops
If you receive unexpected tokens:- Don’t try to sell them - This can trigger malicious contracts
- Don’t visit linked websites - These are often phishing sites
- Hide the token - Most wallets let you hide unwanted tokens
- Report if possible - Help protect others from the same scam
Related Concepts
- Phishing - Deceptive attacks to steal credentials
- Drainers - Wallet-draining attacks
- Address Poisoning - Similar address scams
