
A dusting attack is a tactic where malicious actors send very small amounts of cryptocurrency—often barely valuable—to your wallet in order to analyze, track, or scam you.
The process involves distributing “insignificant” assets to numerous addresses. When users interact with or combine these small amounts with their regular funds, attackers can more easily analyze transaction patterns, link wallet addresses, or trick users into visiting fraudulent sites for authorization, ultimately stealing assets.
On Bitcoin, this usually appears as tiny “change” sent to your wallet, with attackers hoping you'll spend it alongside your main balance in future transactions, thereby revealing address connections. On account-based blockchains like Ethereum, BSC, and Solana, dusting typically takes the form of “junk token airdrops,” often bundled with phishing links or fake customer support contacts designed to lure users into signing malicious authorizations.
Dusting attacks pose risks to both privacy and asset security. Ignoring them can lead to your on-chain identity being linked to your real-world identity.
Many users are curious about “free” tokens and might experiment with them, inadvertently providing attackers with an opportunity. If you authorize a malicious site, attackers can drain real assets from your wallet. Even without direct theft, the attacker can collect relational data between addresses for profiling, targeted spam, or further refined scams.
For everyday users, understanding this scheme helps prevent mistakes such as combining dust inputs with normal Bitcoin inputs. For teams or market makers, it helps avoid having operations and risk management compromised by “dusting + analytics” strategies.
The core sequence is: “mass dust distribution → induce interaction → collect relationships → escalate to fraud”.
Step one: Attackers send tiny amounts or small batches of newly created tokens to large numbers of addresses. In Bitcoin, these represent multiple “unspent transaction outputs” (UTXOs), similar to lots of tiny coins. On Ethereum/BSC, it’s often a completely unfamiliar token sent to your address.
Step two: Victims interact out of curiosity or due to default wallet settings. For example, a Bitcoin wallet may combine these dust amounts with normal balances during a transaction, making it easier for analysts to link multiple addresses. On EVM chains, victims may click on the website associated with an unknown token and sign an “authorization,” giving attackers permission to access their assets.
Step three: Attackers use on-chain analytics or scripts to track interactions, label active addresses and relationships, and then deploy targeted phishing or social engineering campaigns to boost conversion rates.
Dusting attacks can affect self-custody wallets, DeFi interactions, and even deposit/withdrawal operations at exchanges.
The key is “see but don’t interact,” using tools and best practices to limit your exposure.
Step 1: Do not touch dust. If unfamiliar tokens or tiny amounts appear in your wallet, avoid clicking, authorizing, transferring, or swapping them. Many wallets offer features to “hide/block tokens”—use them first.
Step 2: Review wallet settings. Disable “auto-display all new tokens,” enable token blacklists or spam filters, and prioritize wallet versions that allow suspicious asset marking.
Step 3: Secure your Gate account. Enable withdrawal address whitelisting and two-factor confirmation; set anti-phishing codes; verify contract addresses and networks before withdrawing. When you encounter unfamiliar tokens, do not attempt deposits—first check the contract and project info on a block explorer.
Step 4: Layer your addresses. Separate “receiving/airdrop testing” from “long-term holdings/operational funds.” On Bitcoin, avoid spending suspicious dust inputs with normal balances; use coin selection strategies to spend only necessary inputs when possible.
Step 5: Minimize authorizations. Regularly use security tools to review and revoke unnecessary token permissions on EVM chains; always be cautious with sites requesting “unlimited authorization.”
Step 6: Learn detection skills. Be highly alert for phrases like “customer support,” “urgent notification,” or “unlock balance.” Always verify project info and contracts through official channels and block explorers.
In the past year, dusting has shifted towards “bulk distribution on low-fee networks” and “token authorization-based phishing,” with fee structures influencing attack costs and chain selection.
Comparing data from 2024 onward: dusting attacks now frequently pair with social engineering and authorization phishing. Simple “free money” lures work less well on high-fee chains; attackers increasingly rely on persuasive tactics and UI deception for better results.
Both involve sending assets to your address—but motivations and interactions differ entirely.
Airdrops are typically promotional or user incentive campaigns run by projects; they’re transparent in source and rules and can be verified through official channels. Dusting attacks aim for privacy identification or phishing, often paired with fake websites/support and high-risk authorizations.
To distinguish them: check for official announcements and contract addresses; beware if immediate authorization or mnemonic entry is requested; watch out for promises of unrealistically high returns. For unknown tokens: never click or authorize—verify through the project’s official site and block explorer before engaging. If you’re unsure about an asset’s legitimacy as an exchange user (like at Gate), do not attempt deposits to avoid unnecessary risks.
Very likely. In a dusting attack, someone sends tiny amounts of tokens or NFTs to your wallet with the goal of tracking your transactions. These "dust" transfers are usually worth just a few cents—easy to overlook. But if you later move these assets, the attacker can use on-chain tracking to link multiple wallet addresses together and compromise your privacy.
Not directly. The goal of a dusting attack isn’t theft but tracking and deanonymization. Attackers monitor your on-chain activity using the "dust" tokens they sent. However, if you accidentally interact with a malicious contract (such as trying to sell these tokens), you could face additional scams or authorization risks.
Look for three main signs: extremely small value (usually less than $1), sent from an unfamiliar address, and the token contract looks risky or suspicious. You can check the token contract on block explorers like Etherscan—if you can't verify its source or find signs of malicious code, it's likely dust. The best practice is not to interact with unfamiliar tokens; simply hide or ignore them in your wallet.
Gate’s security features focus on trading risks at the platform level. If you use self-custody wallets or move assets on-chain, dusting threats still apply. Comprehensive protection includes enabling Gate account security settings, regularly reviewing self-custody wallet balances, treating unknown tokens as warning signs, and using privacy tools or mixers if needed for added protection.
The safest approach is total disregard. Don’t try transferring, selling, or interacting with those token contracts—any action could expose your on-chain activity further. If your wallet supports blacklisting features, hide the token; if privacy concerns remain high, consider moving primary assets to a new wallet. For long-term protection against tracking threats posed by dusting attacks, use privacy wallets or rotate addresses regularly.


