Step 1 of 0

What links or contract addresses is the threat using?

Paste the URLs, wallet addresses, or contract addresses of the assets you want to block. One per line. The URLs can be domains, social links such as Twitter, or any other page hosting malicious content.

No eligible assets detected