1. Quick Answer
Scams follow detectable patterns. Most fraudulent crypto projects, fake airdrops, rug pulls, and phishing sites share common characteristics that you can identify with a simple checklist. You do not need to be a blockchain expert — you need a systematic process.
The eight red flags in this guide catch approximately 80% of scams. Running through them takes under two minutes. The step-by-step verification process in Section 4 adds additional layers that catch the more sophisticated schemes that pass the basic checklist.
No single check is perfect. But layered verification — checking contracts, on-chain data, community reports, and risk signals together — makes it significantly harder for scams to succeed.
2. The 8 Red Flags Checklist
Run through these eight indicators for any crypto project before you invest or connect your wallet. Hitting two or more flags means the project deserves serious scrutiny. If a project also lacks an open-source contract and has an anonymous team, treat it as a high-risk transaction regardless of how polished the website appears.
Guaranteed high returns
No legitimate investment guarantees 10-100% monthly returns. If the yield sounds impossible, it probably is. The promise of guaranteed returns is the most consistent feature of crypto scams.
Unsolicited contact
Anyone who reaches out first — via direct message, email, airdrop notification, or social media — with a crypto opportunity is almost certainly running a scam. Legitimate projects do not cold-contact potential users.
Fake or clone websites
Scammers copy real project branding, URLs, and interfaces to trick users into entering credentials or connecting wallets. Always verify the exact domain — one character difference means a different site entirely. Bookmark your real project URLs.
Pressure to act fast
Legitimate projects do not impose deadlines, limited-time offers, or "exclusive" windows to pressure you into a fast decision. Urgency is a manipulation tool. If you feel rushed, step back and verify independently.
Unknown or unaudited smart contracts
If the token contract has not been audited by a reputable firm and the team is anonymous, the risk is unquantifiable. Request the audit report and verify it comes from a known firm like Trail of Bits, OpenZeppelin, or Consensys Diligence.
Missing or anonymous team
Real projects have public, verifiable founders with professional backgrounds. Anonymous teams with no verifiable history are a red flag — it means the creators have no accountability if the project turns out to be a scam.
Tokenomics that benefit insiders
If the majority of the token supply is held by the team or insiders with quick unlock schedules, the project may be designed to drain liquidity after retail investors buy in. Check the token distribution and unlock timeline on the block explorer.
No transparent on-chain activity
A project with no verifiable transactions, no open-source code repository, and no block explorer record is not a real DeFi protocol. Every legitimate project leaves a traceable on-chain footprint.
Run any suspicious address through the risk checker
Before you connect your wallet or send funds to any new project, check the contract address and deployer wallet for risk signals. The Address Risk Checker cross-references multiple blacklists and behavior data simultaneously.
Check EVM Address → Check TRON Address →3. Common Scam Types
Understanding the four most common crypto scam patterns helps you recognize them faster. Each type uses a different mechanism but shares the same goal: stealing funds or access credentials from victims.
Phishing scams
Fake websites, emails, or direct messages that impersonate real projects, exchanges, or wallet providers. They ask you to enter your seed phrase, private key, or login credentials on a site that looks identical to the real one. Detection: always verify the exact URL before entering any credential. Bookmark your real project URLs. Real projects will never ask for your seed phrase.
Rug pulls
Developers build a project, attract liquidity, and then abandon it after draining the pool. The token goes to zero and liquidity vanishes. Detection: check the token distribution on a block explorer. If a small number of wallets hold most of the supply, or if the LP tokens are not locked, the project carries elevated rug pull risk. Research the team and whether the LP is locked and for how long.
Fake airdrops
Malicious token airdrops that arrive in your wallet with a link to claim. The link leads to a phishing site that asks you to connect your wallet to "claim" the tokens — granting the scammer access to drain your funds. Detection: never click airdrop links. Never connect your wallet to an unknown site. If a token appears in your wallet unexpectedly and requires connecting to claim, it is almost always a scam.
Impersonation scams
Fake social media accounts, Discord servers, or Telegram groups that mimic real crypto projects or influencers. They offer "support" or "whale alerts" or "private investment opportunities" to lure victims. Detection: verify social handles with official project verification badges. Check whether the account has been active for a long time and has a consistent posting history. Real support teams do not DM you first.
Verify before you interact
Run the contract address, deployer wallet, and any linked addresses through a multi-source risk checker. This takes 30 seconds and surfaces blacklist hits, behavior warnings, and data coverage — giving you a full risk picture before you connect your wallet.
Check EVM Address → Check TRON Address →4. How to Verify a Crypto Project
Follow this four-step verification process for any project you are considering. Each step adds a layer of evidence that the project is legitimate — or reveals warning signs that should stop you from proceeding.
Step 1: Verify the smart contract
Find the official contract address on the project website or GitHub repository — not from a link in a social media post. Then verify on a block explorer like Etherscan that the code is open source. Check whether the contract has been audited by a reputable firm and request the audit report to confirm it is genuine. An audited contract that matches the deployed code is a strong positive signal.
Step 2: Check activity on a block explorer
Search the contract address on Etherscan, BscScan, or Tronscan. Verify that transaction volume, token holders, and liquidity pool activity match the claims on the project website. Check whether the LP tokens are locked and for how long. A project with no on-chain activity despite a large community following is a serious mismatch worth investigating. For a deeper understanding of how community blacklists are built and why they sometimes lag behind new threats, see our guide to how blacklists work.
Step 3: Verify the team and community
Search for the project's founders and core team members on LinkedIn or professional networks. Verify they have verifiable professional histories. Search community channels — Discord, Telegram, Twitter — for reported incidents, complaints, or warning posts. Search for the project name plus "scam" or "rug pull" and see what surfaces. A project with no community presence or only very recently created accounts is a warning sign.
Step 4: Run addresses through a risk checker
Before connecting your wallet, run the contract address and the deployer wallet address through a multi-source risk checker. This cross-references community blacklists, security APIs, and behavior signals to surface any known risks. Check both the token contract and any associated multisig or treasury wallets the project has published. For a complete workflow for verifying whether a specific address is safe before you send funds, see our guide to checking individual wallet addresses.
Stop manually checking — use the risk checker instead
The Address Risk Checker automates steps 1 through 4 in a single lookup. Enter any EVM or TRON address to get blacklist results, behavior signals, and confidence level in seconds.
Check EVM Address → Check TRON Address →5. Common Mistakes to Avoid
Relying on a professional-looking website
Scam projects invest in professional design because it works. A polished website, whitepaper, and tokenomics chart do not prove legitimacy. Use the checklist — design quality is not a verification step.
Skipping the block explorer check
Many users never look at on-chain data before investing. A project that claims $10M in TVL but has $50K in actual on-chain volume is lying. The block explorer does not lie. For an automated tool that checks block explorer data alongside blacklist and behavior signals, use the Crypto Wallet Scam Checker.
Trusting social media follower counts
Social media accounts can be inflated with bots. A Twitter account with 100K followers but no real engagement — no comments, no meaningful replies — is likely purchased. Engagement quality matters more than follower count.
Assuming the project is safe because others are using it
Being used by other people does not make a project safe. Many victims initially believed the project was legitimate because "so many people were in it." The first users who detect the warning signs and exit early are the ones who do not lose funds.
Ignoring low data coverage results
If a risk checker reports low confidence because the address has little on-chain history, the correct response is caution — not confidence. Limited data means the checker could not see enough to form a strong view. Treat it as an incomplete signal.