#空投防骗手册 Disable Sensitive Permissions

When participating in airdrops, refuse to authorize wallet private keys or mnemonic phrases. Legitimate airdrops usually only require a wallet address or signature verification, without the need for asset transfer.

Independent Network Environment

Use a dedicated IP address and high-quality proxies to avoid being deemed a 'witch account' due to shared IPs, which could result in disqualification, while also reducing the risk of phishing attacks.

3. Identify Common Scam Tactics

Fake Links and Contracts

Fake airdrop websites often disguise themselves as well-known projects, luring users to connect their wallets and steal assets afterward. Check the spelling of the domain name and whether the contract address matches the official website.

Impersonating Customer Service or Team

Requesting personal information or inducing transfers under the pretense of 'assisting in receiving airdrops' requires confirmation of the other party's identity through official communities or multiple identity verifications.