Address Poisoning on TRON: How Scammers Steal Your USDT
Learn how address poisoning (dust spam) attacks work on TRON, how scammers create lookalike addresses, and how to protect yourself.
What Is Address Poisoning?
Address poisoning is one of the most common scams on the TRON network. Scammers exploit a simple human habit: copying the last transaction address from your history.
How the Attack Works
Step 1: Reconnaissance
The scammer monitors the blockchain for your transactions. When you send USDT to an exchange (e.g., Binance), they note the receiving address.
Step 2: Create a Lookalike Address
The scammer generates a new address that matches the first 2 and last 4 characters of the real exchange address. On TRON, addresses start with 'T' and are 34 characters long — most users only check the beginning and end.
Example:
TRqtSahVi28Rfd1uEW5ap6NzFoGWDwDUyuTRqtXk9mP7vJ2nLcQ8Wy3bFhKzR4ewDUyuStep 3: Dust Transaction
The scammer sends a tiny amount (0.001 USDT) from the fake address to your wallet. This transaction appears in your history.
Step 4: The Trap
Next time you want to send USDT, you open your transaction history, see what looks like the exchange address, copy it, and send your funds — directly to the scammer.
Scale of the Problem
Our spam detector has identified 204 confirmed spam addresses on TRON that are actively running address poisoning campaigns. Each address sends 100+ dust transactions to different victims.
How We Detect Spam Addresses
Our spam_detector procedure analyzes TRON transfers in real-time:
How to Protect Yourself
Check Any Address
Use our free tools to verify addresses before transacting:
*USDTBanList monitors TRON and Ethereum 24/7, detecting spam addresses, blacklist events, and sanctions in real-time.*
Check any wallet for free
Real-time USDT/USDC blacklist monitoring