At OP_NEXT Day 1 (2h15m) Ryan Rasmussen mentioned that

BitwiseInvest had to deal with dusting attacks shortly after BITB addresses were published.

I've noticed that many (22) of the wallet addresses which are no longer used have received address poisoning attack transactions.

example: https://mempool.space/address/bc1qky4xywjl59d9ge83pjdhqs7ge8d3wtwgd5edm3

Reply to this note

Please Login to reply.

Discussion

Still very unclear how exactly people are getting tricked by these.

Which wallets expose prior transactions input addresses front and center?

With sparrow it’s 2 clicks, and not an obvious user flow