Scam detection guide

How to Check if Crypto is a Scam (Step-by-Step)

Scams follow patterns. With a systematic checklist, you can detect the majority of fraudulent crypto projects before you invest a single dollar. Here is how to check step by step.

~8 min read · Updated April 2026

Table of Contents

1. Quick Answer

Scams follow detectable patterns. Most fraudulent crypto projects, fake airdrops, rug pulls, and phishing sites share common characteristics that you can identify with a simple checklist. You do not need to be a blockchain expert — you need a systematic process.

The eight red flags in this guide catch approximately 80% of scams. Running through them takes under two minutes. The step-by-step verification process in Section 4 adds additional layers that catch the more sophisticated schemes that pass the basic checklist.

No single check is perfect. But layered verification — checking contracts, on-chain data, community reports, and risk signals together — makes it significantly harder for scams to succeed.

2. The 8 Red Flags Checklist

Run through these eight indicators for any crypto project before you invest or connect your wallet. Hitting two or more flags means the project deserves serious scrutiny. If a project also lacks an open-source contract and has an anonymous team, treat it as a high-risk transaction regardless of how polished the website appears.

1

Guaranteed high returns

No legitimate investment guarantees 10-100% monthly returns. If the yield sounds impossible, it probably is. The promise of guaranteed returns is the most consistent feature of crypto scams.

2

Unsolicited contact

Anyone who reaches out first — via direct message, email, airdrop notification, or social media — with a crypto opportunity is almost certainly running a scam. Legitimate projects do not cold-contact potential users.

3

Fake or clone websites

Scammers copy real project branding, URLs, and interfaces to trick users into entering credentials or connecting wallets. Always verify the exact domain — one character difference means a different site entirely. Bookmark your real project URLs.

4

Pressure to act fast

Legitimate projects do not impose deadlines, limited-time offers, or "exclusive" windows to pressure you into a fast decision. Urgency is a manipulation tool. If you feel rushed, step back and verify independently.

5

Unknown or unaudited smart contracts

If the token contract has not been audited by a reputable firm and the team is anonymous, the risk is unquantifiable. Request the audit report and verify it comes from a known firm like Trail of Bits, OpenZeppelin, or Consensys Diligence.

6

Missing or anonymous team

Real projects have public, verifiable founders with professional backgrounds. Anonymous teams with no verifiable history are a red flag — it means the creators have no accountability if the project turns out to be a scam.

7

Tokenomics that benefit insiders

If the majority of the token supply is held by the team or insiders with quick unlock schedules, the project may be designed to drain liquidity after retail investors buy in. Check the token distribution and unlock timeline on the block explorer.

8

No transparent on-chain activity

A project with no verifiable transactions, no open-source code repository, and no block explorer record is not a real DeFi protocol. Every legitimate project leaves a traceable on-chain footprint.

Run any suspicious address through the risk checker

Before you connect your wallet or send funds to any new project, check the contract address and deployer wallet for risk signals. The Address Risk Checker cross-references multiple blacklists and behavior data simultaneously.

Check EVM Address → Check TRON Address →

3. Common Scam Types

Understanding the four most common crypto scam patterns helps you recognize them faster. Each type uses a different mechanism but shares the same goal: stealing funds or access credentials from victims.

Phishing scams

Fake websites, emails, or direct messages that impersonate real projects, exchanges, or wallet providers. They ask you to enter your seed phrase, private key, or login credentials on a site that looks identical to the real one. Detection: always verify the exact URL before entering any credential. Bookmark your real project URLs. Real projects will never ask for your seed phrase.

Rug pulls

Developers build a project, attract liquidity, and then abandon it after draining the pool. The token goes to zero and liquidity vanishes. Detection: check the token distribution on a block explorer. If a small number of wallets hold most of the supply, or if the LP tokens are not locked, the project carries elevated rug pull risk. Research the team and whether the LP is locked and for how long.

Fake airdrops

Malicious token airdrops that arrive in your wallet with a link to claim. The link leads to a phishing site that asks you to connect your wallet to "claim" the tokens — granting the scammer access to drain your funds. Detection: never click airdrop links. Never connect your wallet to an unknown site. If a token appears in your wallet unexpectedly and requires connecting to claim, it is almost always a scam.

Impersonation scams

Fake social media accounts, Discord servers, or Telegram groups that mimic real crypto projects or influencers. They offer "support" or "whale alerts" or "private investment opportunities" to lure victims. Detection: verify social handles with official project verification badges. Check whether the account has been active for a long time and has a consistent posting history. Real support teams do not DM you first.

Verify before you interact

Run the contract address, deployer wallet, and any linked addresses through a multi-source risk checker. This takes 30 seconds and surfaces blacklist hits, behavior warnings, and data coverage — giving you a full risk picture before you connect your wallet.

Check EVM Address → Check TRON Address →

4. How to Verify a Crypto Project

Follow this four-step verification process for any project you are considering. Each step adds a layer of evidence that the project is legitimate — or reveals warning signs that should stop you from proceeding.

Step 1: Verify the smart contract

Find the official contract address on the project website or GitHub repository — not from a link in a social media post. Then verify on a block explorer like Etherscan that the code is open source. Check whether the contract has been audited by a reputable firm and request the audit report to confirm it is genuine. An audited contract that matches the deployed code is a strong positive signal.

Step 2: Check activity on a block explorer

Search the contract address on Etherscan, BscScan, or Tronscan. Verify that transaction volume, token holders, and liquidity pool activity match the claims on the project website. Check whether the LP tokens are locked and for how long. A project with no on-chain activity despite a large community following is a serious mismatch worth investigating. For a deeper understanding of how community blacklists are built and why they sometimes lag behind new threats, see our guide to how blacklists work.

Step 3: Verify the team and community

Search for the project's founders and core team members on LinkedIn or professional networks. Verify they have verifiable professional histories. Search community channels — Discord, Telegram, Twitter — for reported incidents, complaints, or warning posts. Search for the project name plus "scam" or "rug pull" and see what surfaces. A project with no community presence or only very recently created accounts is a warning sign.

Step 4: Run addresses through a risk checker

Before connecting your wallet, run the contract address and the deployer wallet address through a multi-source risk checker. This cross-references community blacklists, security APIs, and behavior signals to surface any known risks. Check both the token contract and any associated multisig or treasury wallets the project has published. For a complete workflow for verifying whether a specific address is safe before you send funds, see our guide to checking individual wallet addresses.

Stop manually checking — use the risk checker instead

The Address Risk Checker automates steps 1 through 4 in a single lookup. Enter any EVM or TRON address to get blacklist results, behavior signals, and confidence level in seconds.

Check EVM Address → Check TRON Address →

5. Common Mistakes to Avoid

Relying on a professional-looking website

Scam projects invest in professional design because it works. A polished website, whitepaper, and tokenomics chart do not prove legitimacy. Use the checklist — design quality is not a verification step.

Skipping the block explorer check

Many users never look at on-chain data before investing. A project that claims $10M in TVL but has $50K in actual on-chain volume is lying. The block explorer does not lie. For an automated tool that checks block explorer data alongside blacklist and behavior signals, use the Crypto Wallet Scam Checker.

Trusting social media follower counts

Social media accounts can be inflated with bots. A Twitter account with 100K followers but no real engagement — no comments, no meaningful replies — is likely purchased. Engagement quality matters more than follower count.

Assuming the project is safe because others are using it

Being used by other people does not make a project safe. Many victims initially believed the project was legitimate because "so many people were in it." The first users who detect the warning signs and exit early are the ones who do not lose funds.

Ignoring low data coverage results

If a risk checker reports low confidence because the address has little on-chain history, the correct response is caution — not confidence. Limited data means the checker could not see enough to form a strong view. Treat it as an incomplete signal.

Frequently Asked Questions

How can I tell if a crypto project is a scam?

Most scams follow detectable patterns. The eight red flags covered in this guide — guaranteed returns, unsolicited contact, clone websites, urgency pressure, unaudited contracts, anonymous teams, unfair tokenomics, and no verifiable on-chain activity — catch the majority of fraudulent projects before you invest. No single check is foolproof, but running through all eight takes under two minutes and surfaces the most common indicators.

What is the most reliable way to check if a crypto project is legitimate?

The most reliable approach combines multiple checks: verify the smart contract is open source and has a recent audit from a reputable firm, confirm the team is publicly identifiable with a verifiable track record, check on-chain activity on a block explorer to confirm the protocol actually functions, search community channels for reported incidents, and run all contract and wallet addresses through a multi-source risk checker.

Can I check if a smart contract has been audited?

Yes. Most reputable audit firms — Trail of Bits, Consensys Diligence, OpenZeppelin, Runtime Verification — publish their audit reports publicly. Check the project website for an audit badge and verify it links to a real report from one of these firms. A project that claims to be audited but provides no report or links to an unknown firm is a red flag.

How do I check if a crypto address or contract is on a blacklist?

Search the address in community scam databases like EtherScamDB, the ethereum-lists repository, or ScamSniffer. For a faster multi-source check, use a risk checker that cross-references multiple blacklists and security APIs simultaneously. Run both the contract address and the deployer wallet address through a checker before interacting with any DeFi protocol.

Why do crypto scams almost always promise guaranteed returns?

Guaranteed high returns exploit a fundamental truth: if an investment genuinely offered 10-100% monthly returns, the market would arbitrage the opportunity away almost immediately. Scammers use impossible yield promises because they work — the desire for easy money overrides rational risk assessment. Legitimate DeFi protocols offer variable, market-determined yields that fluctuate with supply and demand.

What should I do if a project hits multiple red flags?

If a project hits two or more red flags from the checklist, treat it as high-risk regardless of how professional the website looks or how compelling the pitch is. Do not connect your wallet, do not send any funds, and do not enter your seed phrase on any related site. Run the contract and any associated wallet addresses through a risk checker. Report the project to community scam databases to help others avoid it.

← Back to Security Guide Hub

Related Tools

🍪

We value your privacy

We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic.

Manage Cookies