Crypto Scam Tracker
Disclaimer
The websites, wallet addresses, and other identifiers listed on this page are associated with suspected cryptocurrency scams based on reports submitted to Token Trace and publicly available information. Listings may be derived from victim reports, investigative research, or other sources and may not be independently verified in all cases. This tracker is provided for informational and awareness purposes only. Inclusion of a website, wallet address, or entity does not constitute a legal determination or formal accusation of wrongdoing. Similarly, the absence of a website or address from this tracker does not imply legitimacy or safety. Users should conduct their own due diligence before interacting with any website, platform, or cryptocurrency address. Token Trace reserves the right to edit, update, or remove listings at any time.
If you believe a website should be reviewed for inclusion in this tracker, please submit the information through the Community Intelligence Form.
Scam Type Glossary
Phishing - Is a fraudulent attempt to obtain sensitive information, such as private keys/12 word phrases or login credentials, from individuals involved in cryptocurrency transactions. Typically, scammers use deceptive tactics, such as fake websites or emails, to trick users into disclosing their confidential information, which is then exploited to gain unauthorized access to their cryptocurrency holdings.
Investment - Involves enticing individuals to invest in fraudulent or nonexistent cryptocurrency ventures by making false promises of significant returns. These scams typically employ deceptive marketing strategies, such as fake endorsements or misleading information about the investment opportunities. Once victims invest their funds, the scammers disappear or fabricate obstacles, ultimately causing investors to suffer financial losses with little to no chance of recovering their money.
Online Work - Fraudulent schemes that offer individuals opportunities to earn cryptocurrency through remote work or online tasks. Scammers often deceive victims by promising lucrative earnings, but in reality, the victims either receive little to no compensation for their work or end up being directed to fake platforms designed to steal their personal information or funds.
ICO - Uses deceitful practices where organizers launch a fraudulent Initial Coin Offering, enticing investors with false promises of high returns on a non-existent or poorly executed cryptocurrency project. These scams often result in financial losses for investors who contribute funds to the fake ICO.
Impersonation - When malicious actors impersonate legitimate entities, such as exchanges, projects, or influencers, in the cryptocurrency space. These scammers use deceptive tactics, such as creating fake websites or social media profiles, to trick individuals into providing sensitive information or sending funds, leading to financial harm or loss of funds.
Recovery - Involves fraudsters posing as individuals or organizations that claim to help victims recover funds lost in previous cryptocurrency scams or transactions. These scammers typically request upfront fees or personal information, exploiting the victims' desperation and ultimately leaving them with further financial losses and no actual recovery assistance.
Giveaway - Are schemes where scammers falsely claim to organize giveaways of cryptocurrencies or tokens, often impersonating well-known figures or projects in the crypto space. Victims are lured into sending a certain amount of cryptocurrency to participate, only to realize that there is no actual giveaway, resulting in financial losses for those who fall for the scam.
Blackmail - Perpetrators typically exploit individuals by threatening to reveal sensitive or embarrassing information about them unless a ransom is paid in cryptocurrency. The scammer may claim to have compromising data, such as personal photos or private messages, and demand payment in a specific cryptocurrency to prevent the release of the information. Victims are often coerced into transferring funds to the scammer's wallet, with the promise that once payment is received, the incriminating material will be deleted or kept confidential.
