Market Pulse
BTC Vol —
ETH Vol —
BNB Vol —
SOL Vol —
XRP Vol —
ADA Vol —
DOGE Vol —
TRX Vol —
TON Vol —
AVAX Vol —
POL Vol —
LINK Vol —
USDT Vol —
USDC Vol —
UNI Vol —
CAKE Vol —
AAVE Vol —
SUI Vol —
BTC Vol —
ETH Vol —
BNB Vol —
SOL Vol —
XRP Vol —
ADA Vol —
DOGE Vol —
TRX Vol —
TON Vol —
AVAX Vol —
POL Vol —
LINK Vol —
USDT Vol —
USDC Vol —
UNI Vol —
CAKE Vol —
AAVE Vol —
SUI Vol —
← Back to Airdrops archive

After Receiving an Airdrop

What Is a Dust Airdrop Attack?

Understand dust airdrop attacks and why unknown tokens appearing in a wallet can be risky.

Airdrop map

What this means

A dust airdrop attack sends tiny or suspicious tokens to wallets to bait users into visiting scam sites, approving contracts, or revealing behavior.

Core ideas

What to understand first

  • Dust tokens can appear unexpectedly.
  • They may include scam URLs or fake token names.
  • They may be used for phishing or wallet tracking.
  • The safest action is often to ignore or hide them.

Safety checklist

What to check before acting

  1. Do not interact with suspicious tokens.
  2. Do not visit token-name URLs.
  3. Do not approve unknown contracts.
  4. Use trusted explorers for inspection.

Risk note

Common mistakes to avoid

  • Touching a scam token can lead to a phishing site.
  • Approvals can expose assets.
  • Dust can reduce wallet privacy.
Search