Neutral safety archive
Crypto Safety Guides
Learn practical crypto safety concepts for wallets, seed phrases, links, signatures, approvals, fake tokens, DEX swaps, claims, airdrops, presales, and incident response.
Archive policy: Eonwell does not verify, endorse, accuse, promote, or rate any specific project, wallet, token, exchange, website, or service. This category exists to explain crypto safety concepts and verification habits in a neutral educational format.
Crypto Safety Basics
Start with essential crypto safety habits for links, wallets, transactions, approvals, and beginner risk reduction.
Crypto Safety Checklist
A neutral beginner checklist for reducing common crypto risks before connecting wallets, clicking links, signing messages, approving contracts, or sending funds.
Safety BasicsWhat Is Crypto Security?
A simple guide to crypto security, including wallet protection, link verification, approvals, signatures, phishing, and transaction risk.
Safety BasicsCommon Crypto Scams Explained
A neutral archive page explaining common crypto scam patterns such as fake airdrops, fake presales, phishing links, wallet drainers, and impersonation.
Safety BasicsHow to Verify Before You Click
Learn a practical verification habit for crypto links, claim pages, presale pages, wallet apps, and token websites before clicking.
Safety BasicsHow to Use a Separate Wallet
A neutral guide to separating main wallets, trading wallets, claim wallets, test wallets, and high-risk interaction wallets.
Safety BasicsWhat Is a Burner Wallet?
Understand what a burner wallet is, when people use one, and why it can reduce—but not eliminate—crypto interaction risk.
Safety BasicsCrypto Security Mistakes Beginners Make
A beginner-focused safety page explaining common mistakes such as trusting fake links, sharing seed phrases, signing unknown messages, and ignoring contract approvals.
Wallet Security
Learn safer wallet habits for hot wallets, cold wallets, browser extensions, and wallet connection decisions.
How to Protect Your Crypto Wallet
A practical neutral guide to protecting a crypto wallet from phishing, malicious approvals, exposed seed phrases, fake apps, and risky wallet connections.
Wallet SecurityHot Wallet Security Checklist
A safety checklist for hot wallets used in browsers, mobile apps, DEX swaps, token claims, airdrops, and daily crypto activity.
Wallet SecurityCold Wallet Security Checklist
A neutral checklist for cold wallet security, including storage, transaction review, seed phrase handling, and separation from daily-risk activity.
Wallet SecurityHardware Wallet Safety Guide
A beginner-friendly guide to hardware wallet safety, including recovery phrase protection, device verification, signing habits, and fake device risk.
Wallet SecurityBrowser Extension Wallet Safety
Learn safety habits for browser extension wallets, including phishing prevention, extension hygiene, approval review, and website connection checks.
Wallet SecurityWhat to Check Before Connecting Wallet
A neutral checklist for reviewing a website, domain, wallet prompt, network, and interaction purpose before connecting a crypto wallet.
Seed Phrase & Private Key Safety
Understand how seed phrases and private keys control wallets, and why exposure should be treated seriously.
Seed Phrase Safety Checklist
A focused safety checklist for protecting seed phrases from phishing, screenshots, cloud backups, fake support agents, and device compromise.
Private KeyPrivate Key Safety Checklist
A neutral guide to private key safety, including storage, import risk, exposure response, and the difference between wallet access and wallet ownership.
Seed PhraseWhy You Should Never Share Seed Phrase
Understand why seed phrases control wallet access and why no legitimate support agent, claim page, presale page, or exchange should ask for one.
Seed PhraseHow to Store Seed Phrase Safely
A practical neutral guide to storing seed phrases offline, avoiding digital exposure, and reducing single-point-of-failure risk.
Seed PhraseCloud Backup Risks for Seed Phrases
Learn why storing seed phrases in cloud notes, screenshots, emails, password managers, or synced files can increase wallet compromise risk.
Seed PhraseWhat to Do If Seed Phrase Is Exposed
A calm incident-response guide for seed phrase exposure, including moving assets, creating a new wallet, and avoiding further interaction with the exposed wallet.
Links, Phishing & Impersonation
Recognize fake websites, fake apps, fake support accounts, suspicious DMs, and lookalike domains.
What Is Crypto Phishing?
A neutral explanation of crypto phishing, including fake websites, fake wallet prompts, fake claim pages, fake support accounts, and malicious links.
PhishingHow to Spot Fake Crypto Websites
Learn how fake crypto websites imitate wallets, exchanges, claim pages, presales, DEXs, bridges, and project pages.
PhishingHow to Check Official Links
A neutral guide to checking official crypto links through websites, documentation, social profiles, explorers, announcements, and bookmarked sources.
PhishingHow to Avoid Fake Wallet Apps
A safety guide for avoiding fake wallet apps, fake browser extensions, copied branding, malicious downloads, and fake support links.
PhishingHow to Avoid Telegram DM Scams
A neutral guide to Telegram crypto scams, including fake admins, fake support, fake presale links, fake claim links, and impersonation.
PhishingHow to Check Domain Spelling
Learn how lookalike crypto domains use small spelling changes, fake subdomains, alternate endings, and copied branding.
Token & Contract Safety
Check token contracts, fake tokens, honeypot risk, token symbols, and contract address verification.
How to Avoid Fake Tokens
A neutral safety guide for avoiding fake tokens that copy names, symbols, logos, narratives, or project branding.
Token SafetyHow to Verify Token Contract
Learn how to verify a token contract address using official sources, explorers, contract pages, and careful address comparison.
Token SafetyHow to Check Token Contract Address
A beginner-friendly guide to checking token contract addresses before adding tokens, swapping, claiming, or reviewing token pages.
Token SafetyWhat Is a Honeypot Token?
A neutral explanation of honeypot tokens, where buying may appear possible but selling or transferring can be restricted.
Token SafetyHow to Check If a Token Is Honeypot
Learn neutral warning signs and verification habits for checking whether a token may restrict selling or transferring.
Token SafetyWhy Token Symbols Can Be Fake
Understand why token names, symbols, and logos are not enough to identify a real token contract.
Approvals, Signatures & Wallet Drainers
Understand token approvals, wallet signatures, unlimited permissions, and wallet drainer patterns.
What Is Token Approval?
A neutral explanation of token approvals, spender permissions, allowance, unlimited approval, and why approvals matter for wallet safety.
SignaturesWhat Is Wallet Signature Risk?
Learn why wallet signatures can be risky, how messages differ from transactions, and why users should read signing prompts.
Wallet DrainersWhat Is a Wallet Drainer?
A neutral guide to wallet drainers, malicious approvals, fake claim pages, harmful signatures, and asset theft flows.
Wallet DrainersHow Wallet Drainers Work
A high-level safety explanation of how wallet drainers abuse approvals, signatures, fake links, and social engineering.
SignaturesHow to Read Wallet Signature Requests
A practical guide to reading wallet signature prompts before signing messages, transactions, approvals, claims, or dApp requests.
ApprovalsUnlimited Approval Risk Explained
Understand unlimited token approvals, why dApps request them, and why they can create long-term wallet risk.
ApprovalsHow to Revoke Token Approvals
A neutral guide to revoking token approvals using approval checkers, explorer tools, and wallet safety practices.
DEX & Swap Safety
Review DEX-specific risks such as slippage, liquidity, fake tokens, pair checks, and swap execution.
DEX Safety Checklist
A neutral checklist for DEX safety, including token verification, slippage, liquidity, price impact, pair addresses, and wallet approvals.
DEX SafetyHow to Swap Safely on DEX
Learn safer habits for swapping on decentralized exchanges, including token checks, liquidity checks, slippage settings, and approval review.
DEX SafetyHow to Check Token Before Swapping
A neutral pre-swap checklist for checking token contracts, liquidity, holders, taxes, honeypot risk, and official sources.
DEX SafetySlippage Risk Explained
Understand slippage risk in DEX swaps and why high slippage can increase the chance of poor execution or unexpected results.
DEX SafetyLiquidity Risk Explained
Learn how low liquidity, removable liquidity, fake liquidity, and thin pools can affect DEX trading safety.
Presale, Airdrop & Claim Safety
Reduce risk around fake presales, fake airdrops, fake claim pages, and suspicious wallet prompts.
Presale Safety Checklist
A neutral checklist for reviewing presale links, contribution addresses, token contracts, claim pages, tokenomics, vesting, and risk signals.
Claims & PresalesHow to Avoid Presale Scams
Learn common presale scam patterns including fake sale pages, fake payment addresses, fake support accounts, fake bonuses, and fake claim pages.
Claims & PresalesHow to Avoid Fake Airdrops
A neutral safety guide for fake airdrops, fake eligibility pages, malicious wallet prompts, and fake claim campaigns.
Claims & PresalesHow to Avoid Fake Claim Pages
Learn how fake claim pages imitate real campaigns and how to verify claim pages before connecting a wallet or signing anything.
Claims & PresalesClaim Page Safety Checklist
A practical checklist for token claim pages, airdrop claims, presale claims, wallet prompts, network selection, and fake claim warnings.
Incident Response & Recovery
Learn calm first steps after suspected wallet compromise, phishing, bad approvals, or seed phrase exposure.
What to Do If Wallet Is Hacked
A calm first-response guide for suspected wallet compromise, including moving assets, revoking approvals, checking transactions, and creating a new wallet.
Incident ResponseWhat to Do After Clicking a Phishing Link
A neutral incident-response page for users who clicked a suspicious crypto link, connected a wallet, or interacted with a fake page.
Incident ResponseWhat to Do After Approving a Bad Contract
A safety response guide for accidental bad approvals, including revoking permissions, checking spender addresses, and moving assets when needed.
Incident ResponseHow to Move Assets After Wallet Exposure
A neutral guide to moving assets after wallet exposure, seed phrase exposure, malicious approval, phishing, or suspected compromise.
Incident ResponseHow to Build a New Wallet After Compromise
A practical guide to starting fresh after wallet compromise, including new seed phrase generation, clean devices, asset migration, and safer habits.