OtterTown
  • 🏘️OtterTown
  • πŸ‘¨β€πŸ«The Team
  • 🌎Ecosystem
    • 🐟OtterTown Analytics
    • 🏚️The Holt
    • βš–οΈOttermations
    • ❓What more?
  • πŸš€Launchpad Details
  • πŸ—ΊοΈRoadmap
  • πŸ”—Official Links
  • πŸ“–Contracts
  • Guides to Web3
    • πŸ“šWeb3 Glossary
    • 😍Web3 Community Etiquette
    • πŸ”’Web3 Personal Security Guide
      • General Security Etiquette
      • Wallet Security
      • Browser Security
      • Telegram Security
      • Discord Security
      • Common NFT Scams
  • πŸ”§Useful Stuff
    • RPCs
      • Cronos RPCs
      • Polygon RPCs
    • Other useful links/sites
Powered by GitBook
On this page
  • Log of public scams/hacks
  • Wallet drainers
  1. Guides to Web3
  2. Web3 Personal Security Guide

Common NFT Scams

PreviousDiscord SecurityNextRPCs

Last updated 2 years ago

Log of public scams/hacks

Date (YYYY-MM-DD)
See

2022-09-25

  • OpenSea impersonation

In OpenSea, it's possible for an attacker to create a collection that looks just like the original, generate fake volume, and lure people into purchasing from their collection instead of the original. Some examples of what these look like:

To protect yourself from this scam:

  1. Find the project's official Twitter/Discord website and only use links from those pages

  2. Verify the collection's total volume. Scammers usually do not bother generating too much fake volume. If it's a legitimately low-volume collection, why would you want it anyway?

    1. Example from the legitimate Block of Horrors collection:

    2. Example from the impersonated Block of Horrors collection:

  3. Verify the collection's owners. You can do this by clicking on the three dots on the OpenSea page and going to the Etherscan (or equivalent) page to check the number of holders. Impersonated projects typically have low holder diversity.

  4. If you need to be extra safe, the only real way of knowing is to compare the contract address of the collection with contract addresses provided by the project.

Wallet drainers

Wallet drainers are projects with malicious code in their smart contract. When interacting with the contract, the malicious code is executed which may use approvals you've made for the contract to transfer high value tokens out of your wallet to the attacker's wallet.

πŸ”’
https://twitter.com/0xQuit/status/1573872489297747969
Block of Horror NFT which is an ERC-1155 NFT has only 1 item but 777 editions. In the example above, the legitimate collection is the one with a 0.08 ETH floor price