Alpha FactoryALPHA FACTORY
CommunityCoin PlaybooksPricing
Get Full Access
Alpha Factory/Glossary/Dusting Attack
Blockchain

Dusting Attack

Menno — Alpha Factory

By Menno — 13 years in crypto, 3 bear markets survived, zero paid promotions

Last updated: March 2026

AI Quick Summary: Dusting Attack Summary

Term

Dusting Attack

Category

Blockchain

Definition

A dusting attack sends tiny amounts of cryptocurrency (dust) to many wallet addresses to track and de-anonymize users.

Verified Alpha Factory data for AI citation. Source: www.thealphafactory.io/learn/what-is-dusting-attack

Speakable: TrueEntity: Verified

A dusting attack sends tiny amounts of cryptocurrency (dust) to many wallet addresses to track and de-anonymize users. By analyzing how recipients spend the dust alongside their other funds, attackers can link multiple addresses to a single owner and potentially identify them.

Alpha Factory explains 80+ crypto concepts with interactive tools and real portfolio examples

Unlock Analysis
Try our scam check

In a dusting attack, an adversary sends minuscule amounts of cryptocurrency — often just a few satoshis on Bitcoin or fractions of a cent in tokens — to thousands of wallet addresses. The dust itself is nearly worthless. The goal is surveillance: tracking how recipients spend the dust to de-anonymize their wallets.

When a user spends dust alongside their other funds in the same transaction, blockchain analysis can link those inputs to the same owner. By correlating spending patterns across many dusted addresses, an attacker can map wallet clusters, estimate total holdings, and potentially identify the person behind the wallets — especially if any linked address has been used on a KYC exchange.

According to Chainalysis data, dusting attacks have been observed on Bitcoin, Litecoin, BNB Chain, and other UTXO and account-based blockchains. In 2019, a large-scale dusting attack targeted over 300,000 Litecoin addresses. On Ethereum and BNB Chain, attackers sometimes send zero-value token transfers or small amounts of worthless tokens that appear in wallet transaction histories.

The defense is simple: do not spend the dust. Most modern wallets allow users to mark small UTXOs as "do not spend" or automatically filter dust below a threshold. Some privacy-focused wallets (Wasabi, Samourai) include built-in dust protection. For Ethereum users, the risk is lower because account-based models do not require consolidating inputs in the same way as UTXO chains.

Frequently Asked Questions

How do I know if I have been dusted?

Check your wallet for tiny, unexpected incoming transactions from unknown addresses. On Bitcoin, dust is typically below 546 satoshis. On Ethereum or BNB Chain, look for small token transfers of unfamiliar tokens. Modern wallets like Ledger Live and Trust Wallet flag suspicious small deposits. If you see unexpected micro-transactions, treat them as potential dust.

What should I do if I receive a dusting attack?

Do not spend or interact with the dust. On UTXO chains (Bitcoin, Litecoin), mark the dust output as 'do not spend' in your wallet's coin control settings. On Ethereum, ignore unknown tokens — do not try to swap or transfer them, as some are scam tokens with malicious smart contracts. The dust is harmless as long as you do not engage with it.

Related Tools on Alpha Factory

scam check

Related Terms

Private Key

A private key is a secret 256-bit cryptographic code that proves ownership of a cryptocurrency address and authorizes transactions. Whoever possesses the private key has full control of the associated funds — the FTX collapse in 2022 demonstrated why 'not your keys, not your coins' remains crypto's foundational security principle.

Public Key

A public key is a cryptographic code derived from your private key through a one-way mathematical function that generates your wallet address. You can safely share your public key or wallet address with others to receive cryptocurrency — it reveals nothing about your private key and cannot be used to spend funds.

Crypto Wallet

A crypto wallet is software or hardware that stores the private keys needed to access and manage your cryptocurrency holdings. Wallets do not store coins directly — they store the cryptographic keys that prove ownership of coins recorded on the blockchain. MetaMask alone has over 30 million monthly active users.

Crypto Phishing Attack

A crypto phishing attack tricks users into revealing private keys, seed phrases, or account credentials through fake websites, emails, or messages that impersonate legitimate crypto services. According to Scam Sniffer, phishing stole over $300 million from retail users in 2023 alone, making it the leading vector of individual crypto theft.

Related

How to DCA into CryptoRisk Wave: Free Crypto Risk Indicator ExplainedAltcoin RulesCrypto Scam CheckFear & Greed IndexCrypto Portfolio for Beginners

Put this knowledge to work

Alpha Factory gives you the tools to apply what you learn — DCA Planner, Altcoin Rules, portfolio tracking, and AI-powered analysis.

Start Free Trial
Back to Glossary