🕵️♂️Active Protection
Unlike traditional detection engines, Active-Protection represents a revolutionary approach to security.
Operating entirely autonomously, it functions independently of your browser wallet activity. This innovative system vigilantly monitors your protected wallet addresses across more than seven different blockchains.
It actively searches for signs of attempted attacks and employs a variety of sophisticated mitigation techniques to ensure your safety.
Protected Addresses
Sentinel3 automatically adds the addresses to Active Protection you attempt transactions with while Sentinel3 is running.
If you wish to protect addresses that you haven't attempted transactions with, you may add them manually in the Active Protection section of the dashboard.
Active Protection is a separate security system detached from Sentinel3's core detection performed while you browse Web3 sites.
There is no need for you to add your wallets to Active Protection to be covered by Sentinel3's detection while browsing.
Only add wallets that you are not using while browsing with Sentinel3; for example, cold wallets are used solely to send and receive assets
Attack Types Detected Only By Active Protection
Address Poisoning
Crypto address poisoning is a deceptive technique where an attacker leverages various methods to insert their own crypto addresses into areas where users commonly view transaction activity, such as Etherscan, wallet activity logs, or other transaction records.
The goal is to have the user mistakenly use the attacker's address for a transaction, thinking it's a legitimate address they intended to transact with.
This could happen, for example, when a user copies and pastes addresses from these records without thoroughly verifying them.
Since the poisoned address closely resembles a legitimate one, it's easy to overlook the discrepancy, leading to funds being sent to the attacker's address instead of the intended destination.
Example
Last updated