Benchmarking what types of scams can be prevented is critically important to us. We default to transparency so that your expectations are aligned with the services we offer.

Scam benchmarks:

Scam TypeExampleSimulation APIs Coverage
Wallet DrainersA fraudulent new NFT mint site that drains all NFTs, tokens, or other assets within your wallet.
Seaport Listing ScamsExploits open approvals on the old OpenSea wyvern contract which allows assets to be listed and bought by an attacker on OpenSea for 0 ETH. This is how Kevin Rose was scammed.
Blur Listing ScamsExploits open approvals from assets you've previously sold/listed on Blur. Attacker is able to sell the asset to themselves for 0 ETH
Malicious signaturesSet Approval For All, eth_sign, and other arbitrary value transfer functions. Set Approval For All is allowed on verified marketplaces
ETH DrainersA scam website that claims to be a NFT mint but actually steals all the Ethereum from an account
Low trust domainsWebsites with very low reputation, which are often related to spam, malware, social engineering, and scams.
Homoglyphsøpeñ (malicious) vs (verified)
URL (malicious) vs (verified)
OFAC blocklistScreening information against OFAC's blocklistComing soon
Honeypot detectionSmart contracts that only allow for assets to be sent in and not sent out.Coming soon
Address screeningAggregating data from other blockchain data providersComing soon
Rug pullsWe cannot predict the intentions of a NFT project that minted legitimately but then proceeds to abandon the project.
Seed phrase compromiseWe cannot detect scams which lure a user into giving away their seed phrase to an attacker. However, if the method for the attack is a phishing website it is possible that the Phishing Detection Service's URL scanner may catch it.❌ (may be caught by the PDS)
MalwareMalicious file downloads from play-to-earn malware campaigns or any form of malware.Contact us

NOTE: For scam benchmarks on the Phishing Detection APIs please contact us at [email protected] Our Simulation API always calls the URL scanning API as long as a URL is provided, and combines them into one JSON response for easy integration.