Etherscan Reconfigures Blockchain Explorer Settings to Filter Out Potential Scams
Zero-token value transfers will no longer be visible by default as a way of preventing “address poisoning” hacks.

Etherscan has reconfigured its default blockchain viewing settings in a move to protect users against a common type of phishing scam, the company tweeted on Monday.
The blockchain explorer will now hide zero-value token transfer displays on its website by default. The setting aims to prevent users from becoming victims of "address poisoning" hacks, in which attackers send virtually valueless tokens to a user's wallet addresses to bait them into sending tokens to a scam address.
"In recent times, address poisoning attacks have phished unsuspecting users and spammed everybody else," said Etherscan. "Preventing scams and attacks in a neutral and scalable way is an infinite cat-and-mouse game."
Zero-value token transfers have drained $19 million from victims' wallets between late November 2022 and Feb. 13, 2023, according to Coinbase. To view zero-value token transfers, users will have to disable the feature in the website's setting page.
More For You
Protocol Research: GoPlus Security

What to know:
- As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
- GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
- Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.
Más para ti
New React bug that can drain all your tokens is impacting 'thousands of' websites

Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.
Lo que debes saber:
- A critical vulnerability in React Server Components, known as React2Shell, is being actively exploited, putting thousands of websites at risk, including crypto platforms.
- The flaw, CVE-2025-55182, allows remote code execution without authentication and affects React versions 19.0 through 19.2.0.
- Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.











