Scam Encyclopedia
Comprehensive guides covering 200+ scam types across 15 categories. Learn to recognize, avoid, and report every type of fraud.
201
Scam Types
15
Categories
12
Languages
24/7
Updated Daily
Cross-Chain Bridge Exploits: Web3's Critical Threat
Hackers exploit cryptocurrency bridge vulnerabilities to steal millions by manipulating token transfers between blockchains.
Crypto Romance Scams: Love, Lies & Lost Crypto
Scammers pose as romantic interests to build trust, then pressure victims into cryptocurrency investments that vanish forever.
Fake Crypto Exchange Scams: How to Protect Your Assets
Scammers impersonate legitimate cryptocurrency exchanges to steal deposits and private keys. Learn how to spot and avoid these sophisticated platforms.
Fake ICO/IDO Scams: How to Spot Crypto Investment Fraud
Fraudsters create fake Initial Coin Offerings to steal millions from crypto investors through elaborate schemes that disappear after funding.
Fake Crypto Wallet Apps: Spotting Counterfeit Digital Wallets
Scammers create identical-looking wallet apps to steal your cryptocurrency. Learn to identify and protect your digital assets from this critical threat.
Flash Loan Exploits: How DeFi Attacks Drain Millions
Flash loans enable attackers to borrow massive crypto amounts instantly with no collateral, then exploit price vulnerabilities to steal millions in seconds.
Honeypot Token Scams: How Scammers Lock Your Crypto
Honeypot tokens appear to be legitimate cryptocurrency investments but contain hidden code that prevents you from selling or withdraws your funds when you try to exit.
Rug Pull Scams: How Crypto Exit Fraud Works
Rug pulls are cryptocurrency scams where developers abandon projects and steal investor funds, often within days of launch.
Seed Phrase Phishing: Crypto Wallet Security Guide
Scammers trick cryptocurrency users into revealing their seed phrases, gaining complete control of digital wallets and stealing all assets.
Token Approval Exploit: How Scammers Drain Web3 Wallets
Attackers trick users into approving unlimited token transfers, then silently drain wallets without additional signatures.