Tools to help you avoid crypto scams

  • Updated

Crypto scams often rely on confusion, lookalike tokens, and malicious approvals. A few simple tools can help you verify what you are seeing before you connect your wallet, approve a request, or swap a token.

This article explains how to:

  • Use contract addresses to confirm a token is the correct one.
  • Use blockchain explorers to investigate wallet activity and transactions.
  • Use approval and permission tools to revoke suspicious access.
  • Use token analysis tools to check for common scam patterns.

Start with the contract address

If you're unsure whether a token is legitimate, the contract address (or mint address on Solana) is the most reliable way to verify it.

Use a contract address for the following:

  • Confirm you're viewing the correct token.
  • Avoid copycat tokens that reuse familiar names or logos.
  • Check third-party risk signals before you interact.

To learn how to find and research a token’s address in Phantom, see How to research a token using its contract address.

Use a blockchain explorer to investigate activity

Blockchain explorers show public onchain activity for each network supported by Phantom. They are useful when:

  • A transaction is missing from your Recent Activity tab.
  • You want to confirm whether a transfer completed.
  • You want to review the exact tokens moved in a transaction.
  • You want to check whether spam transactions are appearing on an explorer.

To learn how to view your wallet history and look up a transaction, see How to view your wallet activity on a blockchain explorer.

What to look for when investigating a scam

When reviewing activity in an explorer, focus on:

  • Unexpected approvals or permissions. These can allow future token movement.
  • Transfers you don't recognize. Especially those that occur after you connected to a new app.
  • Lookalike token transfers. Scammers may send tokens with a similar name to confuse you.

If you see activity you don't recognize, revoke permissions as soon as possible.

Revoke approvals and disconnect suspicious apps

Many scams rely on approvals. If you approve a malicious request, an app or contract can gain access to your tokens.

Use Phantom and third-party tools to reduce risk:

Disconnect apps in Phantom

  1. Select your profile avatar in the upper-left corner.
  2. Go to SettingsConnected Apps.
  3. Disconnect any app you don't recognize.

Revoke approvals with external tools

Network-specific tools described in this section can help you review and revoke token permissions.

Revoke.cash (Ethereum and EVM networks)

  1. Go to revoke.cash.
  2. Connect your Phantom wallet and view all active token and app permissions.
  3. Select the approvals you want to revoke and confirm the action.

Famous Fox’s Revoker (Solana)

  1. Go to famousfoxes.com/revoke.
  2. Connect your Phantom wallet and review all active token approvals.
  3. Revoke any suspicious approvals with a single click.

Revoking approvals helps prevent future token movement by apps or contracts you no longer trust.

Use token analysis tools for additional signals

Token analysis tools can highlight common risk patterns, such as suspicious ownership settings, unlocked liquidity, or honeypot behavior. No single tool can guarantee safety, so treat results as one input in your decision.

The contract address research guide includes a list of tools by network, including:

For steps, see How to research a token using its contract address.

Safer browsing tips

  • Bookmark trusted apps and tools instead of relying on search results or ads.
  • Avoid selecting links embedded in token names or token descriptions.
  • Use Explore to return to apps you trust.
  • Verify a token’s contract address before you swap, especially for trending tokens.

Quick checklist

Use this checklist before you connect your wallet or approve a request:

  • Confirm the token’s contract or mint address.
  • Research the token using trusted tools.
  • Review wallet activity in a blockchain explorer if something looks wrong.
  • Disconnect apps you don't recognize.
  • Revoke approvals you don't recognize.

If you believe your wallet is compromised, create a new wallet and move your assets to it. Avoid transferring suspicious tokens.

Was this article helpful?

3 out of 3 found this helpful
Can't find what you're looking for?

Start a chat