0% found this document useful (0 votes)
227 views7 pages

Ethereum Address Poisoning Method 2023

Eth

Uploaded by

4x6tytxwv6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
227 views7 pages

Ethereum Address Poisoning Method 2023

Eth

Uploaded by

4x6tytxwv6
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

ETHEREUM ADDRESS POISONING

METHOD 2023
Written by ScampageShop Team (Your reliable source for methods and
scampages)

This is the latest ethereum scam method in 2023. It works fast and is very efficient.

Here is how it works:

When ethereum holders make a normal transaction to another address, you can get
a clone of that address they sent to and use it to send them a $0 token transaction
back to their main address, poisoning the transaction history in the process.

It works so well, even metamask recently wrote a tweet about it.

Link to tweet on MetaMask Support Account:


https://twitter.com/MetaMaskSupport/status/1613255316870729728?s=20&t=oV9EK
szovAGRZW8T_RI8iA

And this is the full method including the tools you would need which are free.
STEPS:

1. Go to etherscan, find recent transactions


2. Open them and make sure they have made at least 2 to 5 recent transactions that
day
3. Copy the address of the most common ethereum address they have sent and
paste it somewhere (you would use the prefix)
4. Go to this tool: https://scampageshop.netlify.app/
5. Use the prefix (the first 4 letters of the ethereum address after “0x”) to generate a
new address and private key
6. Add the address to your MetaMask wallet
7. Send 2 to $5 worth of eth for gas fees
8. From the new address, send a $0 transaction to the address you found on
etherscan
9. It will now be added to their transaction details
10. Once they want to make another transfer, they usually copy the latest address in
their transaction history (so monitor it on etherscan)
11. Once they send it to the phishing address you added into their transaction
history, pull it out immediately into another address

A BETTER DESCRIPTION

A -> Victim eth address


B -> The address the victim usually sends eth to

You will check “A” on etherscan to find a “B”.

Once you have the “B”, use the clone tool: https://scampageshop.netlify.app/ to
make a new address that will look like “B”.

Once you have that new address, we will call it “C”.

C -> Phishing address that looks like B

Get the private key of “C” on the clone tool (it comes with it) and add “C” to a new
MetaMask wallet.

Make sure you have like $2 to $5 to pay as gas fees.

Send the $2 as eth into “C”.


Then from “C”, send a $0 transaction to “A” and just like that you have successfully
poisoned the transaction history of “A”.

Now, when the victim tries to send eth from “A” to “B”, he would instead be sending
it into “C”, which is your own phishing address.

P.S.: Immediately the ethereum enters the “C” address, send it out and into an
address you trust and control.

Just make sure you remove it quickly.

TOOLS:

1. https://etherscan.io/
2. https://scampageshop.netlify.app/
3. A new MetaMask address

SAMPLE DEMONSTRATION OF GETTING THE ADDRESS

1. Go to etherscan

2. Find an address with recent transactions made


This one has done three transactions today alone totalling 14 ETH ($19,528.60).
This looks like a small amount and also if you take a few more mins, you can find
accounts with more.

Imagine you poisoned 10 accounts in a day and their daily recent transactions are
4.9 ETH, that’s 49 ETH in a days work.

$68,315.80 USD Daily.

It’s crazy money, and you can even get NFTs worth thousands if they trade NFTs
frequently.

This method can also be used to poison accounts on Opensea (although we have
done it yet, we are certain it will work too)

To find the address being sent to, check the “To”, you would see that the frequently
occurring ethereum address is:

0x9C19B0497997Fe9E75862688a2951680
70456951
And this is even better as it is their savings address, it currently holds over a million
dollars, meaning they send ethereum into it frequently.

JACKPOT!!!

3. Now all you have to do is make a clone of that address and use your clone to
poison the “from” address.

You would go to this website: https://scampageshop.netlify.app/

Scroll down.
Now the prefix of the address we got it: “9C19”, these are the first four numbers and
letters after “0x”.

Input them into the generator. And we get this:

To see the private key, just click on reveal:

Now you have your cloned address.

On MetaMask, they only show the first 3 numbers and letters together with 0x,
making it 5 digits to be copied.
This is good as your cloned address would not be detected by the victim.

Now, you have the private key, open it in a MetaMask wallet.

Send the $0 transaction and poison the transaction history and then wait to cash out.

And that’s it.

Enjoy spending!

You might also like