Detecting Scams & Spam Tokens When Adding to MetaMask
Why this matters (quick summary)
Adding a token to MetaMask is as simple as pasting a contract address. That convenience is useful. But bad actors count on that convenience. Fake contract listings, spam tokens, and honeypot scams can appear in your wallet UI and trick you into approving or swapping. This guide shows practical, repeatable checks to help you detect scam tokens MetaMask displays, how to hide or remove them locally, and what to do if you already interacted with a malicious contract.
How I tested these checks (reproducible method)
I ran the same set of checks using a burner MetaMask account funded with small amounts (0.01–0.05 ETH) on mainnet and on an EVM-compatible test network. Steps I repeated so you can replicate:
I avoided interacting with contracts that had confirmed malicious code (no point losing funds). What I've found is repeatable and can be done by anyone with a burner account.
Quick checklist: detect scam token MetaMask (8 steps)
Deeper contract checks: find fake contract MetaMask attempts
MetaMask shows data it can read from the network. But a token can copy the name and symbol of a popular project while using a different contract address. How do you detect a fake contract MetaMask may show?
How to hide scam token MetaMask (remove/hide locally)
Removing a token from MetaMask does not remove it from the blockchain. It just hides the UI entry in your software wallet.
Extension (desktop):
Mobile (iOS/Android):
And yes, that will only hide it locally. But it clears the visual clutter and reduces accidental clicks.
If you don’t see the option exactly as above, follow add-tokens-mobile or add-custom-tokens-to-metamask for UI screenshots.
If you already interacted: immediate steps to mitigate loss
One honest note: if a malicious contract already had an approval and token transfers were executed, recovering funds on-chain is rare. But quick revocation and account isolation can stop additional losses.
Extension vs Mobile vs Hardware (comparison table)
| Feature / Form factor | Extension (desktop) | Mobile app | Hardware + MetaMask |
|---|---|---|---|
| Quick contract inspection (open explorer link) | Excellent (fast) | Good | Good (requires host) |
| Hide/remove token UI | Yes | Yes | Yes (MetaMask UI) |
| Test small swap safely | Easy (use extension to confirm tx) | Easy (in-app) | Safer (requires hardware confirmation) |
| Best for detecting honeypots via quick reads | Extension | Mobile | Extension + hardware for signing |
Who MetaMask is for — and who should look elsewhere
Who it works for: people who want a flexible software wallet to interact with DeFi, testnets, and multi-chain dApps using WalletConnect or injected providers. It’s handy for daily swaps, staking front-ends, and portfolio tracking.
Who should look elsewhere: if you need the highest offline security for large holdings, consider pairing MetaMask with a hardware device (see integrate-hardware-ledger-trezor). If you want a custodial fiat on-ramp, a self-custody software wallet may not be the right fit.
FAQ
Q: Is it safe to keep crypto in a hot wallet? A: Short answer: use hot wallets for daily activity and small balances. For large amounts, use hardware or cold-storage. I believe splitting funds between a daily hot wallet and a hardware-secured main wallet reduces risk.
Q: How do I revoke token approvals? A: Use the step-by-step guide at token-approvals-and-revoke. Revoke unlimited approvals and prefer approving exact amounts.
Q: What happens if I lose my phone? A: Losing a phone only means losing a device. If you have your seed phrase backed up, you can recover the wallet on another device (see backup-and-recovery-seed-phrase). If you didn't back up the seed phrase, funds may be unrecoverable.
Conclusion & next steps
Detecting scam tokens MetaMask shows is mostly about doing quick verification before you sign anything. Verify contract addresses, read holders and source code, test with tiny amounts, and hide or remove any spam tokens from your UI. In my experience, a small checklist used consistently prevents most mistakes.
Want hands-on walkthroughs? Start with add-custom-tokens-to-metamask, then read token-approvals-and-revoke and security-best-practices to lock down your setup.