Stay Safe in Crypto
Knowledge is your best defense. Use our resources and tools to navigate the world of digital assets securely and protect yourself from scams.

On-Chain Analysis Report
Enter any Ethereum wallet or contract address for a deep on-chain analysis.
What are Token Approvals?
When you use a decentralized application (DApp) like Uniswap, you grant it permission to spend your tokens. These permissions, called "approvals," remain active until you revoke them. Malicious or old contracts with unlimited approvals can be used to drain your wallet.
It's crucial to regularly review and revoke any suspicious or unnecessary approvals.
Check Approvals on EtherscanToken | Symbol | Balance |
---|
Hash | Type | From | To | Value | Time |
---|
Parent Hash | From | To | Value | Time |
---|
What To Do If You've Been Scammed
If you suspect you have been a victim, act quickly. Time is critical.
Know The Enemy: Common Scams
Recognizing a scam is the first step to avoiding one. Here are the most common types.
Phishing Scams
Fake websites, emails, or messages that look official, designed to trick you into revealing your private keys or seed phrase.
Giveaway Scams
Promises to multiply your crypto if you send some to their address first. They impersonate influencers or projects to appear legitimate.
Rug Pulls
Developers create a token, hype it up to attract investors, then abandon the project and run away with all the funds.
Malicious Airdrops
Unsolicited tokens appear in your wallet. When you try to swap or sell them, a malicious contract drains your other assets.
Interactive Scam Checklist
Unsure if an offer is legitimate? Answer the questions below.
Best Practices For Staying Safe
Adopt these habits to significantly reduce your risk in the crypto space.