Here is a form of a cyber attack that is largely unknown to users in the crypto space and I feel it’s time to bring it to your attention.

Throughout my “Crypto Jargon” series I have discussed many types of cyber attacks and crypto-related threats that you should look out for and this one is certainly one of them.

It is an attempt to de-anonymize cryptocurrency wallets (and their owners) which can result in phishing, extortion or more sinister threats, so take a moment to learn about it.

What is Dust?

The term itself is referring to tiny amounts of Bitcoin or another cryptocurrency.
These can be between one to a few hundred satoshis for instance (if we refer to bitcoin) or when you’re trading, on many exchanges you will have such tiny amounts of various coins that are left over and cannot be used in trades, so they appear to be “stuck”. This happens in Binance a lot, also in Kucoin and other exchanges, where such small amounts do not meet the limit for a single trade. These are called dust.

Technically speaking, the dust limit is calculated according to the size of inputs and outputs, which normally computes to 546 satoshis for legacy Bitcoin transactions (non-SegWit), and 294 satoshis for native SegWit transactions. This means that any regular transaction equal to or smaller than 546 satoshis will be considered spam and are likely to be rejected by the validating nodes. This is why most of the scam attacks using dust are sending larger transactions, sometimes up to a thousand or a few thousand satoshis.

A Dusting Attack is aiming to discover the owner of a crypto wallet. The attacker would send multiple dust transactions to various wallet addresses then will use a combined analysis of those various addresses in an attempt to identify which ones belong to the same wallet. Once a wallet is identified, the attacker may use this in phishing attacks or cyber-extortion threats. This can also be an attempt from a government regulator to identify individuals or companies that operate with cryptocurrencies for tax or other AML reasons.

To avoid becoming a victim of such attacks one must simply NOT MOVE the dust coins they recieve. Since dusting attacks rely on a combined analysis of multiple addresses, if a dust fund is not moved, attackers are not able to make the connections between these wallets to “de-anonymize” them.

Along with dusting and other de-anonymizing attacks, it is also important to be wary of the many other security threats that occur in the cryptospace, such as Cryptojacking,  Ransomware, Phishing and a few more which you will find explained in this post.

👉 👉 Sign Up for the Crypto Corner Newsletter and get more insight on the crypto markets, new releases and updates, plus my personal choice of coins to trade.

📖Dictionary: “Crypto Jargon A-Z” is the most comprehensive crypto glossary:

📖Guide: “Learn Crypto” is the ultimate beginners guide to cryptocurrencies that helps you avoid the mistakes all newbies make when investing in crypto:


Earn with NEXO – earn interest on all crypto assets you hold up to 14% APR find out more with this link.

Use Brave Browser for extra security and earn crypto at the same time. It is privacy-oriented and blocks unnecessary cookies and much more:

Get your own blockchain domain – no yearly fees and censorship-free with Unstoppable Domains:

Aurox – my top charting tool and indicator for finding the right entry and exit points for trading on any of the top exchanges and trading pairs. Give it a try and sign up for free:

Token Metrics: the most detailed statistics and analysis for all major cryptocurrencies and price predictions to help you find the right coins to trade and the right time to buy/sell – give it a try and get 10% discount if you choose to upgrade with this link:

🔑Top Crypto Wallets:

🛒Where I buy crypto

💹Top Crypto Exchanges

  • Binance (biggest, KYC required)
  • Kucoin (crypto only, 5BTC daily withdrawal, no KYC)
  • Bittrex (crypto only, KYC required)
  • Bityard (stocks, commodities and crypto, no KYC)
  • Margex (100x leverage, no KYC)

Enjoying this content? Go check out “Crypto Jargon A-Z” — eBook out now on Kindle.

It’s an Amazon Best Seller and it’s the most up-to-date Crypto Dictionary with more than 700 terms, acronyms and trading slang related to cryptocurrencies and blockchain tech.

Just go to and grab your digital copy today.


Related posts:

Long vs Short, Breakout vs Fakeout, Bear Trap vs Bull Trap, Black Swan – Explained

Token Swap, Token Burn, Eeater Address & Vanity Address – Explained

Bitcoin Private Key and Seed Phrase: All You Need to Know

Crypto Wallets – Complete Guide (Bitcoin, Ethereum, Ripple and other crypto wallets explained)

15 thoughts on “What is Crypto Dust | Dusting Attacks Explained

  1. I really like your blog.. very nice colors & theme. Did you make this website yourself or did you hire someone to do it for you? Plz answer back as I’m looking to construct my own blog and would like to find out where u got this from. thanks


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s