Back to Blog

预防加密货币“拉地毯”骗局:保护您的资产免于归零的技巧和策略

MetaSleuth
January 24, 2024

背景

对于所有加密货币爱好者而言,Web3 的世界充满了机遇、挑战和危机。每天,海量的新代币项目涌入市场,看似提供了无限的财富机会,但实际上,潜在的风险无处不在。随着高风险项目的不断涌现,用户常常措手不及。在这种情况下,我们应该如何评估项目的可靠性,避免“地毯式拉盘”(Rug Pulls)的陷阱,从而保护我们的财务安全?别担心,本文将为您提供一套全面的“地毯式拉盘”判断方法,助您最大程度地降低资产损失的风险。

1. 了解加密货币安全基础工具:防范“地毯式拉盘”的必备技巧

观察趋势图表并验证交易量

利用多链去中心化交易所(DEX)的加密货币分析工具,例如 DEX Screener,通过观察代币趋势图表,我们可以发现异常的买卖比例,从而避免虚假的交易量,后者通常由不良项目制造。同样,对于新发行的代币,如果您注意到异常高的交易量和巨额交易,请务必警惕。 https://dexscreener.com/

查看交易记录

DEX Screener 等工具可以列出所有交易记录,让我们可以轻松审查所有买卖操作涉及的地址。如果您发现同一个地址频繁进行交易(如下图所示),这也是一个非常可疑的信号。

使用“蜜罐”和代币风险监控功能

DEX Screener 和 Advantis.AI 等平台提供“蜜罐”(Honeypot)测试和一些基础的代币风险监控功能,这些也有助于用户评估投资风险。如下图所示,当用户搜索特定代币时,平台会自动显示该代币的风险级别,从而使用户能够及时决定是否撤资。

https://advantis.ai/
https://advantis.ai/

2. 如何使用 MetaSleuth 检测加密货币投资中的“地毯式拉盘”

检查部署者的资金来源

对于一个代币而言,除了代币本身的合约地址和交易对地址外,部署者的地址也至关重要。通过观察该地址在区块链上的资金关系,我们可以更好地评估项目的风险。

要查找部署者的地址,只需将代币的合约地址输入 metasleuth.io。在生成的资金流向图谱中,寻找“合约创建”边。该边上的交易是代币合约的创建交易,而交易的发起者即为部署者。然后,您可以进一步分析部署者的资金来源。

为了有效规避风险,用户可以关注以下常见的部署者资金来源,这些可能表明高风险:

  • 来自混合服务或无 KYC 的闪电贷服务(如 Fixedfloat)的资金。这是恶意代币部署者为避免身份被追溯而选择的方法。
  • 其他非法来源的资金。下图展示了一个“地毯式拉盘”网络,其中所有代币都在极短的时间内被“拉盘”。骗子利用上一轮“地毯式拉盘”的利润,将资金转移到下一个地址,该地址随后部署新代币,诱骗新的受害者。
https://metasleuth.io/result/bsc/0xde621749c3d39250d4a454fafbbeb18cabd824f5?source=64681083-27e7-4b42-a816-db6c0f9869f3
https://metasleuth.io/result/bsc/0xde621749c3d39250d4a454fafbbeb18cabd824f5?source=64681083-27e7-4b42-a816-db6c0f9869f3

检查流动性来源

欺诈项目方在制造虚假流动性方面非常擅长,如下图所示。他们将之前的收益分散到许多不同的地址。其中一些地址仅用于购买代币,而另一些地址则负责出售代币。这种虚假构建的流动性会诱使用户误以为该代币非常受欢迎,却不知道一旦他们投资,就会被欺骗。

https://metasleuth.io/result/bsc/0x4b854d6fc84bd5343a4ce68652564aaf750e0c65?source=b50ccfcd-f5c9-4d49-8138-1d9c40181aaf
https://metasleuth.io/result/bsc/0x4b854d6fc84bd5343a4ce68652564aaf750e0c65?source=b50ccfcd-f5c9-4d49-8138-1d9c40181aaf

留意顶级持有者

下图展示了一个代币的顶级持有者列表,其中排名第二的持有者拥有的数量几乎相当于流动性池。这意味着该持有者有能力随时从池中提取所有资金。

通过在 MetaSleuth 中进一步追踪该地址的资金来源,我们可以发现该地址是代币的部署者,他们在创建合约时为自己铸造了大量代币。此类项目风险极高。

总结

在投资之前,用户应进行充分的尽职调查(DYOR),利用成熟的分析平台(如 DEX Screener)和资金追踪平台(如 MetaSleuth)来辅助投资决策,并最大限度地规避风险。观察趋势图表和验证交易量、检查交易记录是常用的方法。此外,MetaSleuth 等工具在追踪部署者的资金来源和流动性来源方面至关重要,是规避风险的有效途径。确保代币项目的真实性和可靠性,可以帮助加密货币爱好者做出更明智的投资决策,从而在 Web3 世界中获得更好的回报并降低风险。

关于 MetaSleuth

MetaSleuth 是 BlockSec 开发的一个综合性平台,旨在帮助用户有效地追踪和调查所有加密货币活动。通过 MetaSleuth,用户可以轻松追踪资金、可视化资金流向、监控实时资金动向、保存重要信息,并通过分享发现与他人协作。目前,我们支持 13 种不同的区块链,包括比特币(BTC)、以太坊(ETH)、波场(TRX)、Polygon(MATIC)等。

网站:https://metasleuth.io/

Twitter: @MetaSleuth

Telegram: https://t.me/MetaSleuthTeam

Sign up for the latest updates
Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield
Security Insights

Tether Freezes $6.76M USDT Linked to Iran's IRGC & Houthi Forces: Why On-Chain Compliance is Now a Geopolitical Battlefield

Looking ahead, targeted freezing events like this $6.76M USDT action will only become more common. On-chain data analysis is improving. Stablecoin issuers are also working closely with regulators. As a result, hidden illicit financial networks will be exposed.

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 2 – Mar 8, 2026

During the week of March 2 to March 8, 2026, seven blockchain security incidents were reported with total losses of ~$3.25M. The incidents occurred across Base, BNB Chain, and Ethereum, exposing critical vulnerabilities in smart contract business logic, token deflationary mechanics, and asset price manipulation. The primary causes included a double-minting logic flaw during full token deposits that allowed an attacker to exponentially inflate their balances through repeated burn-and-mint cycles, a price manipulation vulnerability in an AMM-based lending market where artificially inflated vault shares created divergent price anchors to incorrectly force healthy positions into liquidation, and a flawed access control implementation relying on trivially spoofed contract interfaces that enabled attackers to bypass authorization to batch-mint and dump arbitrary tokens.

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Feb 23 – Mar 1, 2026

During the week of February 23 to March 1, 2026, seven blockchain security incidents were reported with total losses of ~$13M. The incidents affected multiple protocols, exposing critical weaknesses in oracle design/configuration, cryptographic verification, and core business logic. The primary drivers included oracle manipulation/misconfiguration that led to the largest loss at YieldBloxDAO (~$10M), a crypto-proof verification flaw that enabled the FOOMCASH (~$2.26M) exploit, and additional token design and logic errors impacting Ploutos, LAXO, STO, HedgePay, and an unknown contract, underscoring the need for rigorous audits and continuous monitoring across all protocol layers.

Go Deeper with MetaSleuth Investigation

Extend your crypto compliance capabilities with Blocksec's MetaSleuth Investigation, the first platform for tracing funds, mapping transaction networks and revealing hidden on-chain relationships.

Move from detection to resolution faster with clear visual insights and evidence-ready workflows across the digital assets ecosystem.

MetaSleuth Investigation