669 Scam Reports

Contract Exploit Scam

1

at 10 PM yesterday i realized that My tokens were gone. so i looked for the data through the solscan website

2
1
Reported Address
Reported Address
Solana logo
3UAZrhGrcCitUfkaqBCiCR5Q45CYAbSvVJZuAp8ZQBxj

Contract Exploit Scam

1

I never thought I’d fall victim to an online scam, but it happened. I lost $87,000 to a fake investment website, http://chsizzy.com, and it left me feeling devastated and completely helpless. I had no idea where to turn or if I’d ever see my money again. That’s when I was referred by a friend to contact SecureTrack1. From the very moment i contacted them, their team was kind, understanding, and supportive. They guided me through everything and kept me updated every step of the way. If you’ve been scammed like I was, don’t give up, I highly recommend SecureTrack What-app : +420 739 395 565 Tele*gram : securetrack1

0
1
Reported Address
Reported Address
Bitcoin logo
1EMuskYdgB3BtwxpEP46txN5EAN8KnA7dE

Contract Exploit Scam

1

Not sure,, but it’s possible that I may have copied my seed phrase to receive an airdrop.?

0
1
Reported Address
Reported Address
Solana logo
7kCL2HxbcvoVvJaF7awjznm36CkPbz11mKk9wn6oySQQ

Contract Exploit Scam

1

clicked on fake airdrop website via https://x.com/heyannonai and lost my ANON, then this https://x.com/titanspaceweb3 guy contacted me offering to help, then he drained my whole wallet. see screen grabs

0
1
Reported Addresses and Domains
Reported Address
Ethereum logo
Sonic
0xaE153bCb8024e766f8309D6B50ee622d1D320fB5
Reported Domain

https://x.com/titanspaceweb3

Contract Exploit Scam

1

The contract seems to have exploited to take the holding fund, The hacker looks like send to one of the central exchange too.

0
1
Reported Addresses
Reported Address
Binance Smart Chain logo
Fund Collected here
0xb0E779E5C48c0c40FAec7964F86F8159E3c48584
Reported Address
Binance Smart Chain logo
Bitget Account
0xb3Ca00891e0bb16707269aefA067b59cfb36b4eA

Contract Exploit Scam

1

I was the victim of a cryptocurrency scam involving a fraudulent token. The token allowed me to purchase it, but when I tried to sell, the smart contract blocked the transaction. After contacting the individual behind the token (suspected scammer), they demanded my wallet’s private key, claiming it was necessary to "unlock" the tokens. I suspect this was a deliberate rug pull scam. Below are the key details of the case: The token’s smart contract appears to have malicious code, which restricts holders from selling their tokens. I suspect the scammer has gained significant profit by blocking sales and manipulating the token’s liquidity. I have screenshots of my communication with the scammer and proof of the transactions. I believe this scammer may have targeted others and am willing to provide additional evidence to support your investigation.

0
1
Reported Addresses and Domains
Reported Address
Ethereum logo
0x10516D77259ad7E744f24147162E33810F29abe8
Reported Domain

https://dexscreener.com/base/0x10516D77259ad7E744f24147162E33810F29abe8

Contract Exploit Scam

1

On 19th early morning at 3:20AM Sydney time, the attacker moved various cryptocurrencies from my Ledger hardware wallet and exodus wallet worth 100000K . The major portion was Cardano which was more than 40%. I am still not sure on the cause of the compromised . I have all the transaction details available.

0
1
Reported Address
Reported Address
Cardano logo
addr1qxyvf49jc4zjnq62h7dclpclqqrxpvps8ntda3vekwgkj5ugcn2t93299xp540um37r37qqxvzcrq0xkmmzenvu3d9fshx8wkx

For security reasons and to protect investigations, this report is currently only shared with Law Enforcement Partners.

Contract Exploit Scam

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce pellentesque vulputate iaculis. Integer lacus sapien, auctor quis nisi non, pulvinar accumsan ligula. Vivamus quis odio ut est iaculis lobortis ut eu leo. Nam mattis varius gravida. Vivamus aliquet vestibulum ex et rutrum. Mauris eu tempor mi, ac porttitor magna. Etiam id fermentum orci, et malesuada lacus. Morbi facilisis malesuada hendrerit. Fusce eu magna auctor, fringilla libero eget, sodales elit.

1
Reported Addresses
Reported Address
Ethereum logo
address-1
Reported Address
Ethereum logo
address-2
Reported Address
Ethereum logo
address-3

+ 1 more

Contract Exploit Scam

1

Cannot swap, the swap fail everytime

1
1
Reported Addresses and Domains
Reported Address
Ethereum logo
0x05f226755b11cb3666340551ebbaa615cdfefdd6
Reported Domain

trumpmeme.net

Contract Exploit Scam

1

El día 2 de enero de 2025, detecté que mis fondos en BNB y BUSD fueron drenados de mi billetera con dirección 0xFc1....9C. Esta billetera la utilizo exclusivamente para el juego MOBOX y su staking de MBOX y BNB. Detalles importantes del caso: La billetera estaba vinculada únicamente a contratos de MOBOX, sin otras autorizaciones activas. Se detectó la presencia de un "sweeper bot" que drena automáticamente los activos tan pronto ingresan a la billetera. Esto se confirmó cuando intenté enviar 2 BUSD en BNB para pagar gas fees y fueron inmediatamente sustraídos. Los únicos activos afectados fueron BNB y BUSD, mientras que los tokens en staking (MBOX, BNB y VBOX) permanecieron intactos, lo que sugiere un ataque selectivo. La billetera fue creada y utilizada exclusivamente a través de la aplicación oficial de MOBOX desde sus inicios, sin interacciones con otros protocolos o aplicaciones. El comportamiento del ataque sugiere que solo se pudieron extraer los activos configurados para ser gastados por las direcciones de MOBOX. Como consecuencia del ataque, no puedo acceder a mis fondos en staking ni transferirlos a una nueva billetera segura. Este incidente parece ser parte de una serie de casos similares que afectan a usuarios de MOBOX, sugiriendo un posible compromiso en los contratos inteligentes de la plataforma más que una vulnerabilidad individual de la billetera.

1
1
Reported Addresses and Domains
Reported Address
Binance Smart Chain logo
0x4f8692663462e785c63c0ff8cb338a73a22d64e8
Reported Address
Binance Smart Chain logo
0x3ab86c663369B4c4bE14253b888840C91270D5dE
Reported Domain

https://www.mobox.io/#/

For security reasons and to protect investigations, this report is currently only shared with Law Enforcement Partners.

Contract Exploit Scam

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce pellentesque vulputate iaculis. Integer lacus sapien, auctor quis nisi non, pulvinar accumsan ligula. Vivamus quis odio ut est iaculis lobortis ut eu leo. Nam mattis varius gravida. Vivamus aliquet vestibulum ex et rutrum. Mauris eu tempor mi, ac porttitor magna. Etiam id fermentum orci, et malesuada lacus. Morbi facilisis malesuada hendrerit. Fusce eu magna auctor, fringilla libero eget, sodales elit.

0
Reported Addresses
Reported Address
Ethereum logo
address-1
Reported Address
Ethereum logo
address-2
Reported Address
Ethereum logo
address-3

+ 1 more

Contract Exploit Scam

1

I saw a YouTube video with very detailed instructions that described a way to make passive money on ETH with a "slippage bot" and "smart contracts." I am not well-versed in this, but unfortunately smart enough to follow the instructions. After I could not retrieve my money, I asked Claude AI to analyze the code and it told me I had been scammed. Here is what it told me: Thank you for sharing the code. I've analyzed it and I now understand what happened. This appears to be a malicious contract designed to steal ETH. The withdrawal() function doesn't actually send funds back to you - instead, it sends them to an address that's constructed from pieces in various getMempool* functions, which when combined create the address 0xC02499dc1a818f2AF77AE44fD28263D539759923 (the address where your ETH is currently located). This is a common scam where the contract is presented as a "trading bot" or "slippage bot" but is actually designed to transfer ETH to the scammer's wallet. The red flags in this code include: The withdrawal() function that sends to a hardcoded address (disguised through string concatenation) Fake "mempool" related functions that only serve to construct the scammer's address Many functions that appear to do complex operations but are actually just decoys Unfortunately, since the ETH has already been transferred to the scammer's address, it cannot be recovered. The address 0xC02499dc1a818f2AF77AE44fD28263D539759923 is a regular externally owned account (not a smart contract), so there's no way to programmatically retrieve the funds. INSTRUCTIONS I FOLLOWED IN THE YOUTUBE VIDEO DESCRIPTION: 1. Download MetaMask Extension: https://metamask.io/download ▪️2. Access Remix: https://remix.ethereum.org 3. Click on the 'Contracts' folder and then create a New File. Rename it as you like, e.g., 'bot.sol'. Make sure it ends with .sol for the Ethereum language. 4. Paste this code into Remix: https://pastebin.com/raw/dGPup7CP 5. Go to the Solidity compiler tab in Remix and compile the bot. 6. Go to the 'Deploy & run transactions' tab, select 'Injected Provider' as the environment and then 'Deploy'. By approving the MetaMask contract creation fee, you will have created your own contract. 7. Check your Contract Address on Etherscan: https://etherscan.io 8. Fund your bot to be able to frontrun transactions. Note: Make sure your deposit is more than 0.5 ETH (to prevent negating slippage) to your exact contract/bot address. 9. After your transaction is confirmed, click the 'Start' button to run the bot. To stop the bot and withdraw funds - click the 'Withdraw' button.

0
1
Reported Addresses and Domains
Reported Address
Ethereum logo
0xC02499dc1a818f2AF77AE44fD28263D539759923
Reported Domain

https://www.youtube.com/watch?v=N14mABwsVp4

Reported Domain

https://pastebin.com/raw/dGPup7CP

Contract Exploit Scam

1

Saw this coin on dextools. Had a good safety rating. Purchased $680 worth. Etherscan shows that i purchased 64,151,702.258054713 coins, but my balance is only 6666 coins.

0
1
Reported Addresses and Domains
Reported Address
Ethereum logo
0x121dad97aabb31d0e0a20e7548a237226db0a4eb
Reported Domain

https://www.bridge-link.xyz/

Contract Exploit Scam

1

I had money in my SafePal wallet and it is linked to the blsfw.top DApp, in a smart contract. blsfw offered me an offer, which I did not accept, I would have to add funds totaling $3000 to receive a quantity of ethereum, but even though I did not accept it, they took all my money from the wallet and are forcing me to accept this offer.

0
1
Reported Addresses and Domains
Reported Address
Ethereum logo
0x4da8b1b8e816898cc6df139589c7148b770d94e7
Reported Domain

https://blsfw.top/?pid=16271104

Reported Address
Ethereum logo
0x4da8b1b8e816898cc6df139589c7148b770d94e7

+ 5 more

For security reasons and to protect investigations, this report is currently only shared with Law Enforcement Partners.

Contract Exploit Scam

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce pellentesque vulputate iaculis. Integer lacus sapien, auctor quis nisi non, pulvinar accumsan ligula. Vivamus quis odio ut est iaculis lobortis ut eu leo. Nam mattis varius gravida. Vivamus aliquet vestibulum ex et rutrum. Mauris eu tempor mi, ac porttitor magna. Etiam id fermentum orci, et malesuada lacus. Morbi facilisis malesuada hendrerit. Fusce eu magna auctor, fringilla libero eget, sodales elit.

0
Reported Addresses
Reported Address
Ethereum logo
address-1
Reported Address
Ethereum logo
address-2
Reported Address
Ethereum logo
address-3

+ 1 more

Reports by Chain

Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo
Backed By
TRM logoSolana logoCircle logoOpensea logoAave logoBinance logoCivic logoHedera logoRasomwhe.re logo