
Ethereum Name Service | ENS
$6.29
Coin info
Rank
#158
Market Cap
$256,100,750
Volume (24h)
$93,488,175
Circulating Supply
38,380,013.54
Total Supply
100,000,000
Do you think the price will rise or fall?
Rise 40%
Fall 60%
About Ethereum Name Service
The Ethereum Name Service (ENS) is a distributed, open, and extensible naming system based on the Ethereum blockchain. ENS’s job is to map human-readable names like ‘alice.eth’ to machine-readable identifiers such as Ethereum addresses, other cryptocurrency addresses, content hashes, and metadata. ENS also supports ‘reverse resolution’, making it possible to associate metadata such as canonical names or interface descriptions with Ethereum addresses. ENS has similar goals to DNS, the Internet’s Domain Name Service, but has significantly different architecture due to the capabilities and constraints provided by the Ethereum blockchain. Like DNS, ENS operates on a system of dot-separated hierarchical names called domains, with the owner of a domain having full control over subdomains. Top-level domains, like ‘.eth’ and ‘.test’, are owned by smart contracts called registrars, which specify rules governing the allocation of their subdomains. Anyone may, by following the rules imposed by these registrar contracts, obtain ownership of a domain for their own use. ENS also supports importing in DNS names already owned by the user for use on ENS. Because of the hierarchal nature of ENS, anyone who owns a domain at any level may configure subdomains - for themselves or others - as desired. For instance, if Alice owns 'alice.eth', she can create 'pay.alice.eth' and configure it as she wishes. ENS is deployed on the Ethereum main network and on several test networks. If you use a library such as the ensjs Javascript library, or an end-user application, it will automatically detect the network you are interacting with and use the ENS deployment on that network.
Price perfomance
Depth of Market
Depth +2%
Depth -2%

We recommend

Ethereum Name Service
Rank #158
$6.29
-7.41%

The Sandbox
Rank #165
$0.08355
-6.19%

Decentraland
Rank #197
$0.09237
-5.43%

Zilliqa
Rank #314
$0.004178
-9.27%

Flow
Rank #432
$0.03174
-11.47%

WAX
Rank #666
$0.006422
-4.65%

Handshake
Rank #1977
$0.005021
-17.87%

Mirror Protocol
Rank #4262
$0.004637
-2.17%

Virtua
Rank #7997
$0.0003340
-33.31%

Big Crypto Game
Rank #17593
$0.003978
+0%

Tezos Domains
Rank #28792
$0.004297
+4.46%

Namecoin
Rank #30705
$0.9443
-2.12%
News
See more12 Mar 2026, 04:00
Critical Alert: Bonk.fun Domain Hijacked in Security Breach, Letsbonk Founder Urges Immediate Caution

BitcoinWorld Critical Alert: Bonk.fun Domain Hijacked in Security Breach, Letsbonk Founder Urges Immediate Caution In a concerning development for the cryptocurrency community, the founder of Letsbonk has issued an urgent warning about a domain hijacking incident affecting the popular BONK-based platform. Tom, the founder of Letsbonk.fun, announced via social media platform X that the domain bonk.fun has been compromised following a team account hack. This security breach represents a significant threat to users of the meme coin issuance platform. Consequently, he strongly advised all users to avoid accessing the domain until further notice. The incident highlights ongoing security vulnerabilities within the rapidly evolving cryptocurrency infrastructure. Understanding the Bonk.fun Domain Hijacking Incident The security breach at bonk.fun occurred through a compromised team account, according to the platform’s founder. Domain hijacking involves unauthorized control over a website’s domain name registration. Attackers typically gain access through phishing, social engineering, or credential theft. Once control is established, they can redirect traffic, intercept communications, or deploy malicious software. For cryptocurrency platforms, this type of attack carries particularly severe consequences. Users attempting to access the legitimate service might instead encounter phishing pages designed to steal wallet credentials or private keys. Tom’s public warning serves as a crucial protective measure for the platform’s user base. By alerting the community through official channels, he aims to prevent potential financial losses. The Letsbonk platform operates within the Solana ecosystem, specifically focusing on the BONK meme coin community. This incident follows a pattern of increasing attacks targeting cryptocurrency infrastructure. Security experts have documented similar domain hijackings across various blockchain projects throughout 2024 and early 2025. These attacks often exploit human vulnerabilities rather than technical weaknesses in blockchain protocols themselves. The Technical Mechanics of Domain Compromise Domain hijacking typically follows a recognizable pattern that security professionals have extensively documented. Attackers first identify target platforms with valuable user bases or financial transactions. They then research team members through social media and professional networks. Phishing campaigns often mimic legitimate communications from domain registrars or hosting providers. Once credentials are obtained, attackers modify domain name system (DNS) records to point to malicious servers. The entire process can sometimes occur within hours, leaving limited response time for platform operators. For cryptocurrency platforms, the risks extend beyond typical website compromises. Malicious actors can create convincing clones of legitimate trading interfaces. These fake pages prompt users to connect wallets and authorize transactions that drain funds. Alternatively, attackers might deploy cryptocurrency wallet drainers through compromised domains. These sophisticated scripts automatically transfer assets when users interact with the interface. The financial incentives for targeting cryptocurrency domains have increased substantially as digital asset values have recovered throughout 2025. Historical Context of Cryptocurrency Domain Security Domain hijacking incidents have plagued the cryptocurrency industry for several years. Major exchanges and DeFi platforms have faced similar challenges. For instance, in 2023, a prominent decentralized finance protocol experienced a domain redirect attack that resulted in significant user losses. The table below illustrates recent comparable incidents: Platform Year Attack Method Reported Impact Compound Finance 2023 DNS poisoning Temporary service disruption Curve Finance 2024 Registrar compromise Front-end exploit attempted Several NFT projects 2024 Social engineering Discord and domain combined attack These incidents demonstrate a clear pattern of increasing sophistication in attacks. The BONK ecosystem has experienced remarkable growth since its inception as a Solana-based meme coin. This expansion has naturally attracted both legitimate interest and malicious attention. Security researchers note that meme coin communities often prioritize accessibility and viral growth over security infrastructure. This creates vulnerabilities that experienced attackers systematically exploit. The Letsbonk platform specifically enables users to create and launch their own BONK-based tokens, making it a potentially lucrative target for attackers seeking to compromise multiple projects simultaneously. Immediate Impacts and User Protection Measures The bonk.fun domain hijacking carries several immediate implications for the cryptocurrency community. First, users who accessed the compromised domain might have exposed their wallet credentials or private keys. Second, the incident undermines trust in the broader BONK ecosystem at a critical growth period. Third, it highlights the persistent security challenges facing decentralized platforms that rely on traditional web infrastructure. Security professionals recommend specific protective measures during such incidents: Immediately cease all interactions with the affected domain Monitor connected wallets for unauthorized transactions Verify communications through multiple official channels Consider using wallet revoke tools to review permissions Enable additional security layers like hardware wallet confirmation The Letsbonk team’s transparent communication represents a positive security practice. By promptly acknowledging the breach, they empower users to take protective actions. This approach contrasts with historical incidents where platforms delayed disclosures, increasing user exposure. The cryptocurrency industry has gradually developed better incident response protocols through painful experiences. Regulatory developments in 2024 have also encouraged more transparent breach reporting, particularly in jurisdictions with comprehensive digital asset frameworks. Broader Implications for Platform Security Domain security represents a fundamental challenge for web3 platforms that operate through traditional internet infrastructure. While blockchain networks themselves provide cryptographic security, the interfaces users interact with remain vulnerable to conventional web attacks. This creates what security experts call the “web2-web3 security gap.” Platforms must implement robust protection measures for their domain registrations and DNS configurations. Recommended practices include: Multi-factor authentication on all registrar accounts Domain locking features to prevent unauthorized transfers Regular security audits of all external-facing accounts Incident response plans specifically for domain compromise scenarios Decentralized alternatives like ENS (Ethereum Name Service) where feasible The bonk.fun incident will likely accelerate security improvements across similar platforms. The BONK community has demonstrated remarkable resilience through previous market fluctuations. This security challenge presents another test of that resilience. How quickly and effectively the Letsbonk team resolves the situation will influence community confidence. It will also provide valuable lessons for other projects within the rapidly expanding Solana ecosystem. Conclusion The bonk.fun domain hijacking incident serves as a critical reminder about cryptocurrency security vulnerabilities. While blockchain technology provides unprecedented financial sovereignty, the interfaces connecting users to these systems remain susceptible to traditional attacks. The Letsbonk founder’s prompt warning demonstrates improved industry practices regarding incident disclosure. Users must remain vigilant about domain authenticity, especially during security incidents. The broader cryptocurrency ecosystem continues evolving its security posture through such challenging experiences. This bonk.fun domain compromise will undoubtedly influence security protocols across similar platforms throughout 2025 and beyond. FAQs Q1: What should I do if I accessed bonk.fun after the hijacking? Immediately disconnect any wallet connections made through the site. Monitor your wallet transactions carefully for unauthorized activity. Consider using wallet security tools to review and revoke any permissions granted during your visit. Q2: How can I verify legitimate communications from Letsbonk? Always cross-reference announcements through multiple official channels. Check the platform’s verified social media accounts, community forums, and official documentation. Be skeptical of direct messages claiming to be from team members. Q3: What makes cryptocurrency domains particularly attractive to hackers? Cryptocurrency domains facilitate direct financial transactions, unlike most traditional websites. Successful compromises can lead to immediate financial gains through stolen assets or ransom demands. The pseudonymous nature of cryptocurrency also makes tracing and recovering stolen funds exceptionally difficult. Q4: Are decentralized domain systems more secure than traditional ones? Decentralized systems like ENS (Ethereum Name Service) eliminate central points of failure but introduce different considerations. They’re resistant to traditional domain hijacking but require careful private key management. Many platforms use hybrid approaches with traditional domains for accessibility and decentralized backups for resilience. Q5: How long do domain hijacking incidents typically take to resolve? Resolution time varies significantly based on the attack’s sophistication and the registrar’s responsiveness. Simple credential compromises might be resolved within hours, while sophisticated attacks involving social engineering or legal impersonation can take days or weeks. The priority is always ensuring the domain is secure before restoring access. This post Critical Alert: Bonk.fun Domain Hijacked in Security Breach, Letsbonk Founder Urges Immediate Caution first appeared on BitcoinWorld .
10 Mar 2026, 14:55
Trust Wallet Deploys Vital Real-Time Scam Address Screening to Thwart $500M Crypto Threat

BitcoinWorld Trust Wallet Deploys Vital Real-Time Scam Address Screening to Thwart $500M Crypto Threat Trust Wallet, a leading self-custody cryptocurrency wallet, has launched a vital new security feature designed to combat one of the fastest-growing threats in digital finance: address poisoning. This real-time scam address screening function aims to prevent users from inadvertently sending funds to fraudulent wallets, addressing a threat responsible for over $500 million in damages globally. The announcement, reported by Cointelegraph, marks a significant escalation in the ongoing battle for user protection within the decentralized ecosystem. Trust Wallet’s Real-Time Scam Address Screening Explained The newly deployed screening technology operates by analyzing transaction details in real-time before a user confirms a send operation. When a recipient address matches known patterns or is associated with previous poisoning attacks, the system triggers an immediate warning. This proactive defense mechanism is integrated directly into the wallet’s user interface, providing a critical safety net. Initially, the feature will provide coverage across 32 Ethereum Virtual Machine (EVM)-compatible blockchains. This comprehensive list includes major networks like Ethereum , BNB Smart Chain , Polygon , Optimism , Arbitrum , Avalanche , and Base . The broad chain support is crucial because attackers frequently exploit cross-chain interoperability. Address poisoning, also known as “address spoofing,” has evolved into a sophisticated phishing technique. The attack vector exploits a common user behavior: copying addresses from transaction history. An attacker first sends a minuscule, often negligible amount of cryptocurrency—sometimes just dust—from a fraudulent wallet to a victim’s address. Consequently, this malicious address appears in the victim’s transaction history. Later, when the user intends to send a legitimate transaction, they may accidentally copy the attacker’s address from their history instead of the correct one. The wallet then sends the full amount to the scammer’s controlled address, resulting in irreversible loss. The Escalating Threat of Address Poisoning Attacks Trust Wallet’s security team has identified address poisoning as a critical and expanding threat. To date, blockchain analysts have tracked over 225 million such attacks, leading to cumulative damages exceeding $500 million . This staggering figure likely represents only reported or detected incidents, with many more going unrecorded. The attacks target both novice and experienced users, as the scheme relies on human error rather than technical exploits. Furthermore, the rise of token airdrops and frequent DeFi interactions has increased the volume of transactions in user histories, creating more opportunities for malicious addresses to hide in plain sight. Industry-Wide Security Implications and Responses The introduction of real-time screening by a major wallet provider sets a new precedent for security standards. Other wallet services and blockchain analytics firms have been developing similar heuristic and database-driven solutions. For instance, some platforms maintain shared threat intelligence lists of known fraudulent addresses. However, Trust Wallet’s implementation is notable for its scale and real-time nature, acting as an integrated layer rather than a separate tool. This move reflects a broader industry shift from reactive security—relying on post-hoc analysis and blacklists—to proactive, preventative measures that intervene at the point of transaction. Security experts emphasize that while technological solutions are essential, user education remains paramount. The classic advice of “always double-check every character of a recipient address” is still valid. Additionally, using address book features, QR codes, or ENS (Ethereum Name Service) domains can significantly reduce risk. The new screening feature acts as a powerful secondary defense, catching mistakes that even vigilant users might make. This layered security approach—combining technology, design, and education—is becoming the gold standard for protecting digital assets. Technical Implementation and Future Roadmap The screening function leverages a combination of on-chain analytics and reported incident data to identify potentially poisoned addresses. The system checks for patterns such as address similarity (where a scam address is generated to look visually similar to a legitimate one), association with known phishing campaigns, and anomalous transaction histories. The real-time aspect is computationally challenging, requiring efficient data processing to avoid delaying user transactions. Trust Wallet has optimized this process to provide near-instantaneous warnings without impacting the user experience. Looking ahead, the wallet’s development team has indicated plans to expand the feature’s capabilities. Potential future enhancements could include machine learning models that predict new poisoning techniques, integration with decentralized identity solutions, and expanded support for non-EVM chains like Solana and Bitcoin. The ongoing arms race between security developers and attackers ensures that such features will require constant updates and refinement. The table below summarizes the core aspects of the threat and the new solution: Aspect Address Poisoning Threat Trust Wallet’s Screening Solution Primary Method Sending dust to pollute transaction history Real-time address validation before sending User Impact Irreversible loss of sent funds Visual warning and transaction interruption Initial Coverage All EVM and non-EVM chains 32 EVM-compatible blockchains at launch Industry Losses > $500 million identified Aims to reduce future losses significantly Prevention Type Relies on user vigilance Provides automated, integrated protection Conclusion Trust Wallet’s deployment of real-time scam address screening represents a vital and timely advancement in cryptocurrency security. By directly tackling the pervasive threat of address poisoning, the feature provides a necessary safety layer for millions of users. The integration across 32 major blockchains demonstrates a commitment to ecosystem-wide protection. As the digital asset space continues to grow, the importance of such proactive, user-centric security measures cannot be overstated. This development not only protects individual assets but also strengthens overall trust in the self-custody model, which is fundamental to the decentralized vision. The fight against crypto fraud requires constant innovation, and this new screening function is a significant step forward in securing the future of decentralized finance. FAQs Q1: What exactly is address poisoning in cryptocurrency? Address poisoning is a phishing technique where a scammer sends a tiny amount of crypto from a fraudulent wallet to a victim’s address. The scam address then appears in the victim’s transaction history. The attacker hopes the victim will later accidentally copy that scam address when making a real payment, sending funds directly to the attacker. Q2: How does Trust Wallet’s new screening feature work? The feature works in real-time as a user prepares to send cryptocurrency. It checks the recipient address against known threat databases and analyzes it for suspicious patterns. If the system identifies a high risk of address poisoning or other fraud, it displays a clear warning to the user, allowing them to cancel the transaction. Q3: Which blockchains are supported by this security feature? At launch, the screening covers 32 EVM-compatible networks. Major supported chains include Ethereum, BNB Smart Chain, Polygon, Optimism, Arbitrum, Avalanche, and Base. Support for additional EVM and non-EVM chains is expected in future updates. Q4: Can this feature completely prevent me from losing funds to scams? While it is a powerful preventative tool, no single feature can guarantee complete safety. The screening is designed to catch address poisoning and known fraudulent addresses. Users must still practice fundamental security: double-checking addresses, using address books, and being wary of unsolicited requests. Q5: Does the real-time screening slow down my transactions? Trust Wallet has optimized the process to minimize latency. The security check happens almost instantaneously in the background, so it should not create a noticeable delay for users when confirming transactions. The goal is to provide protection without compromising user experience. This post Trust Wallet Deploys Vital Real-Time Scam Address Screening to Thwart $500M Crypto Threat first appeared on BitcoinWorld .
9 Mar 2026, 16:32
ENS Technical Analysis March 9, 2026: Weekly Strategy

ENS showed a modest weekly gain within the downtrend, holding $5.65 support is key for a bullish reversal. Bitcoin's bearish context requires caution in altcoins, a $6.11 breakout creates a strateg...
1 Mar 2026, 14:59
ENS Technical Analysis March 1, 2026: Volume and Accumulation

ENS volume remains low at 11.85M, failing to confirm the price rise, with weak participation dominating in the downtrend. Volume increases during accumulation at support levels, while carrying dist...








































