Get more out of our Search
You can now search addresses, protocols, tokens and much more. Activate search by clicking “/” on your keyboard
Top Crypto Hacks
DeFi scams, hacks and exploits explained by Solidity Engineers.
FAQ
What is the REKT Database?
Our database is a key weapon within the De.Fi crypto wallet tracker safety armory that helps users combat the threat of crypto scams. It has been built manually and painstakingly by the De.Fi Security Department. What the team has created is a valuable store of all key information concerning known CeFi or DeFi hack events and exit scams, which will help to prevent other malicious actors from attempting the same exploits in the future.
The REKT Database contains the following key information:
A database of more than 3000 scams, DeFi hacks, exchange exploit events, phishing attacks, and other types of web3 attacks
The total of all funds lost across all these events (yes, we calculate this number)
Categorization of hacks & scams by their nature and issues
Analytical breakdown of hacks & scams by chains
A full breakdown of all technical issues that occurred
And more!
As you can see, this will become an important resource for all DeFi users and everyone interested in building this industry into a safe and accessible community where anyone can thrive.
How do I review specific events?
You can click the “DETAILS” arrow for each column to expand the information included about a certain crypto hack or scam.
Every event entry includes the following details in its breakdown:
Project name
Token ticker
Accessible address on the appropriate chain
Date of the rug pull, based on an analysis of on-chain activity
Tech issue, verified by one of our Solidity engineers
Malicious function
Funds lost, based on movements between fraudsters’ addresses
Detailed description of the event
Links to proofs, project media
Can I review events by category?
Yes, you can use the “Type” filter at the top of the screen to review events by the type of issue involved. These event types have been categorized into two overarching categories with various subtypes:
Exit Scam
Exit Scam involves harmful actions planned by the development team, who aimed to steal depositors’ and investors’ funds. Mostly this category contains real facts of the malicious actions from the project team side, based on the on-chain analysis. Types of exit scams include Abandoned, Honeypot, or Rugpull.
Exploit
Exploits generally involve an external or, in some circumstances, an internal attack vector that employs a smart contract with malicious logic. These are some of the biggest crypto hacks and are generally due to flaws and weaknesses in a project’s smart contract code which are used to hijack a project and drain users’ funds. Types of exploits include Access Control, Phishing, Flash Loan Attacks, Reentrancy, or Oracle Issues. While many exploits focus on DeFi protocols, hacked coin exchanges also fall under this category.
What was the biggest hack or scam in crypto history?
The Terra/Luna implosion of 2022 was by far the greatest scam event in crypto history from a dollars lost perspective with over $40 Billion being liquidated. However, this is a complicated case because it was not strictly a scam and it was partly caused by market conditions.
What was the biggest Bitcoin hack or scam?
By dollar value, The Silk Road exploit is considered to be the largest of all Bitcoin hacks in history as the coins are now worth $3.4 Billion.
Do I have to pay to access the REKT Database?
No, the REKT Database is 100% free. We are committed to this service because we believe in the mission of keeping DeFi safe for everyone.
Why do you maintain this database?
Looking back to the first few months of the DeFi Summer in 2020, the market was full of questionable projects, which had been forked from high-quality protocols with well-judged economic models.
These developments had been driven by the exponential growth of DeFi early on, as users tried to make life-changing amounts of money overnight and scammers looked to take advantage of this desire.
As a result, a whole range of ‘fast food’ scam projects appeared. These were backed by malicious developers who employed a range of tactics to appear trustworthy while attracting TVL and dazzling their unsuspecting victims with promises of significant DeFi yield farming returns or crypto airdrops .
It was against this backdrop that our team started the hard work of helping DeFi users to remain safe by avoiding these scams. Our work involved completing smart contract audits based on community requests and releasing the Open Audits Database to help users understand which projects could be trusted.
It’s been many years since DeFi summer and crypto has evolved significantly, but our core mission has not changed. We are here to help crypto users and developers across the world gain the insights they need to interact with the amazing world of DeFi securely.
Is there a cryptocurrency hack & scam API?
As with other De.Fi Safety services such as the audits database, our revoke permissions tool, and smart contract scanner, The REKT Database API of crypto hacks and scams is open for everyone to use.
Companies, projects, and individuals can request API access to the REKT Database and freely use its data for their needs.
To obtain the API key and start testing it, navigate to the De.Fi API page and click on “API Dashboard”. After the quick process of signing up, you will be able to access your unique API key.
Our API strategy aligns perfectly with the overriding mission of De.Fi to keep users safe and secure within DeFi, by providing them with high-quality tools and working to improve security across the decentralized finance industry.
DISCLAIMER
All the information published in this database has been aggregated in good faith and with regards to information purposes only. De.Fi does not make any warranties about the completeness, reliability and accuracy of the information provided in the database. Any action taken upon the information in the Rekt Database is at one’s own risk. Under no circumstances shall De.Fi be held liable for any loss and/or damages in conjunction with the use of the website.
The exploit reports may contain hyperlinks to external sites. It is of utmost importance to the Rekt Database Team to only provide quality links to ethical and useful website. However, it must be stated that De.Fi is not in any shape or form associated with these websites.
Therefore, De.Fi has no control over the content, privacy policies or “Terms of Service” found on these websites.