Community Frequently Asked Questions
Clear, transparent answers on how we protect your money and identity.
How do malicious actors typically steal seed phrases?
Hackers use various methods, including phishing websites that mimic legitimate wallets, malicious extensions, and keyloggers installed via fake software downloads. Some advanced attacks even involve supply chain compromises where legitimate applications are hijacked to extract your 12 to 24 recovery words.
What are the early warning signs of a compromised wallet?
The most common indicators include unauthorized token approvals granting external contracts access to your assets, unknown outbound transactions, or unexpected "dust" tokens appearing in your balance. Often, attackers will run automated scripts (drainers) that sweep your funds the moment they get access, leaving virtually no time to react.
How can I maximize my security moving forward?
We highly recommend migrating your funds to a hardware wallet (cold storage) and generating your seed phrase completely offline. Never type your recovery phrase into a website unless you are 100% sure of its authenticity, avoid interacting with unknown smart contracts, and regularly monitor your active token allowances.
Why does the scanning take roughly 7 to 15 seconds?
We perform a multi-layer deep scan. The delay is by design. Behind the scenes, we securely tunnel your hash across several fragmented and highly-encrypted databases containing over 20+ Million compromised crypto records gathered from historical Dark Web marketplace dumps, honeypots, and known malware networks.
What do I do if my seed phrase is checked as LEAKED?
- Do NOT deposit any more funds to any addresses associated with this phrase.
- Create a completely new, offline-generated wallet immediately (using a hardware wallet like Ledger or Trezor if possible).
- Transfer all existing funds from the compromised wallet to the new wallet ASAP.
- Assume that bots are actively tracking your old wallet. Gas fees and speedy transactions matter.
Is the CheckMyCryptoBreach service fully private?
Yes. The system employs Zero-Knowledge Proofs (ZKP) concepts in data handling and requires ZERO personal information. There are no user accounts, no tracking cookies, and no IP retention for analytics. It is 100% anonymous check functionality meant for public good.
