A few weeks ago, an Etherscan user, Nima, shared an unpleasant experience after receiving more than 89 Address Watch Alert emails shortly after making just two stablecoin transfers.
Address poisoning attacks are getting out of hand. I just sent two stablecoin transactions and received +89 emails from my Etherscan address watch alert notifications.
— Nima 👁️ (@0xNimaRa) February 13, 2026
It took them <30 mins to create all of these on mainnet.
So many will fall victim to this. pic.twitter.com/H1nGaMMprE
As Nima noted, these alerts were triggered by address poisoning transactions created purely to insert lookalike addresses into the wallet’s transaction history. The main goal is to trick users into copying the wrong address when making their next transfer.
Address poisoning has existed on Ethereum for several years. But incidents like this highlight how automated and high-volume these campaigns have become. What used to be occasional spam can now be executed at scale, often inserting poison transfers within minutes of a legitimate transaction.
To understand why these attacks appear more widespread today, it helps to look at two things: how address poisoning campaigns have evolved, and why they are so easy to run at scale.
We also highlight one simple rule to remember to help protect yourself against these attacks.
1. Address Poisoning Has Become Industrialized
Address poisoning was once viewed as a niche trick used by opportunistic attackers. Today, it increasingly resembles an industrialized operation.
A 2025 study analyzing address poisoning activity between July 2022 and June 2024 identified roughly 17 million poisoning attempts targeting about 1.3 million users on Ethereum, with confirmed losses of at least $79.3 million.
The table below illustrates the scale of address poisoning activity across Ethereum and BSC between July 2022 and June 2024, based on findings from the Blockchain Address Poisoning study. On chains like BSC, where transaction fees are significantly lower, poison transfers occur 1,355% more frequently.
| Network | Poison Transfers | User Addresses | Total Losses (USD) |
|---|---|---|---|
| Ethereum | 17,365,954 | 1,330,948 | $79,344,412 |
| BSC | 252,703,515 | 16,107,774 | $4,490,804 |
| Total | 270,069,469 | 17,438,722 | $83,835,216 |
Attackers often monitor blockchain activity to identify potential targets. Once a transaction is detected, automated systems generate lookalike addresses that mimic the beginning and ending characters of legitimate addresses the user has interacted with. Poison transfers are then sent to the target address so the spoofed address appears in the transaction history.
Potential targets are addresses that are more likely to be profitable for attackers. Addresses that make frequent transfers, hold significant token balances, or involved in large transfers tend to receive more poisoning attempts.
Competition Drives Efficiency
One surprising insight from the 2025 research is that different attack groups often compete with one another. In many poisoning campaigns, multiple attackers send poison transfers to the same address at roughly the same time.
Each attacker attempts to insert their lookalike address into the user's transaction history before the others. Whoever succeeds first increases the chances that their address will later be copied.
The address below demonstrates the scale of this competition. In this case, 13 poison transfers were planted within a couple minutes of a legitimate USDT transfer.

The common tactics used in address poisoning attacks include dust transfers, spoofed token transfers, and zero-value token transfers.
2. Why These Attacks Are Easy to Run at Scale
At first glance, address poisoning may seem ineffective. After all, most users will not fall for the scam. But the economics of these attacks tell a different story.
A Numbers Game
Researchers found that a single poisoning attempt has a success rate of ~0.01% on Ethereum. In other words, only about 1 out of every 10,000 poisoning transfers results in a user mistakenly sending funds to the attacker.
Instead of targeting only a handful of addresses, poisoning campaigns often send thousands or even millions of poison transfers. When enough attempts are made, even a tiny success rate can generate significant profits.
A single successful attack involving a large transfer can easily cover the cost of thousands of failed attempts.
Victim lost $50M to address poisoning
— Specter (@SpecterAnalyst) December 19, 2025
Swapped for $ETH and transferred to two wallet
I'm really speechless wtf
Victim: 0xcB80784ef74C98A89b6Ab8D96ebE890859600819
Theft: 0xBaFF2F13638C04B10F8119760B2D2aE86b08f8b5
0xBcb94F7609973E5ea7d2CbeDAf0C5518b911e6cb… pic.twitter.com/pZUV4eqakA
Lower Transaction Costs Encourage More Poisoning Attempts

The Fusaka upgrade, activated on December 3, 2025, introduced scalability improvements that reduced transaction costs on Ethereum. While this benefits users and developers, it also lowers the cost of each poisoning transfer, allowing attackers to send far more poisoning attempts.
Network activity increased noticeably after Fusaka. In the 90 days following the upgrade, Ethereum processed on average 30% more transactions per day than in the 90 days before it. During the same period, the number of new addresses created each day increased by ~78% on average.
Besides, we observed a notable increase in dust transfer activity, where attackers send a very small amount of the same token a user has previously transferred.
The table below highlights how dust transfer activity changed across several major assets in the 90 days following the Fusaka upgrade. For stablecoins such as USDT, USDC, and DAI, dust transfers refer to amounts below $0.01, while for ETH they refer to transfers below 0.00001 ETH.
| Asset | Before Fusaka (90d) | After Fusaka (90d) | Increase | % Change |
|---|---|---|---|---|
| USDT | 4.2M ↗ | 29.9M ↗ | +25.7M | +612% |
| USDC | 2.6M ↗ | 14.9M ↗ | +12.3M | +473% |
| DAI | 142,405 ↗ | 811,029 ↗ | +668,624 | +470% |
| ETH | 104.5M ↗ | 169.7M ↗ | +65.2M | +62% |
Dust transfers (below $0.01) show a clear surge shortly after the Fusaka upgrade, with activity rising sharply before gradually tapering off while still remaining at an elevated level compared to pre-Fusaka levels. In contrast, transfers above $0.01 remain relatively stable throughout the same period.


In many campaigns, attackers first mass-send tokens and ETH to newly generated spoofed addresses, which then forward dust transfers to the target address individually. Because dust transfers involve negligible token amounts, they can be executed cheaply and at scale as transaction costs decrease.

It is important to note that not all dust transfers are poison transfers. Dust transfers can also occur as part of legitimate activity, such as token swaps or other small-value interactions between addresses. However, when reviewing dust transfer lists, a large portion of them are more likely to be poisoning attempts.
3. The One Rule to Remember
👉👉👉 Always verify the destination address before sending funds 👈👈👈
Here are a few tips to help reduce the risk when using Etherscan:
- Make Your Addresses Recognizable

Use private name tags on Etherscan for addresses you frequently interact with. This helps legitimate addresses stand out clearly among lookalikes.
Using a domain name such as ENS can also make addresses easier to recognize across the explorer.
You should also use your wallet’s address book to whitelist frequently used addresses so you always know exactly where you are sending funds.
- Use Address Highlighting
Etherscan’s Address Highlight feature helps you visually distinguish between similar-looking addresses. If two addresses look nearly identical but are not highlighted the same way, that is a strong signal they are not the same.
If you do not see this feature working, ensure it is enabled in Site Settings.
- Always Double-Check Before Copying
Etherscan also provides popup reminders when copying addresses that might be associated with suspicious activity, including:
- Low-value token transfers
- Spoofed token transfers
- Tokens with poor reputation
- Tokens without updated info
When you see these reminders, take a moment to confirm that the address you are copying is the one you truly intend to interact with.

If you would like a more comprehensive checklist to avoid these attacks, you can refer to our detailed guide here.
Remember, there are no undo buttons in crypto. If funds are sent to the wrong address, recovering them is extremely unlikely.
Final Thoughts
Address poisoning attacks appear to be becoming more prevalent on Ethereum, particularly as lower transaction costs make high-volume strategies cheaper to execute. These attacks also affect user experience, as transaction histories across many user-facing interfaces can become cluttered with poison transfer spam.
Protecting against these attacks requires both user awareness and better interface design. For users, the most important habit is simple: always verify the destination address carefully before sending funds.
At the same time, tools and interfaces can play an important role in helping users detect suspicious activity more quickly.

At Etherscan, we continuously improve our explorer interfaces and API services to help users detect these attacks more easily. We actively label spoofing addresses, flag and hide zero-value token transfers, and tag spoofed tokens so our curated data can surface potential address poisoning attempts without users needing to manually sift through large volumes of transactions.
As poisoning campaigns scale through automation and high-volume dust transfers, surfacing these signals becomes increasingly important for helping users distinguish suspicious activity from legitimate transactions.
If you have any feedback or suggestions on how we can improve these protections further, feel free to reach out to us on X at @etherscan.