Blockchain & Cryptocurrency Glossary

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

  • search-icon Clear Definitions
  • search-icon Practical
  • search-icon Technical
  • search-icon Related Terms

Dusting Attack

1 min read
Pronunciation
[duh-sting uh-tak]
Analogy
Like sprinkling a fine powder on multiple footprints to trace where each person walks.
Definition
A privacy attack where an adversary sends tiny amounts of cryptocurrency (dust) to many addresses, then tracks spending patterns to de‑anonymize users by linking addresses.
Key Points Intro
Dusting attacks compromise wallet anonymity by tagging UTXOs.
Key Points

Dust distribution: Sends minimal-value outputs to target addresses.

Transaction tracing: Monitors when dust moves to link addresses.

Clustering: Joins multiple addresses into a single identity cluster.

Mitigation: Wallets ignore dust or consolidate with privacy techniques.

Example
An attacker sends 1 satoshi to thousands of Bitcoin addresses; when victims spend that dust, on‑chain analysis reveals clusters of addresses belonging to the same user.
Technical Deep Dive
Adversary uses mempool monitoring to detect dust spends and applies graph analysis (address clustering, change detection) to infer relationships. Countermeasures include wallet filters that refuse dust UTXOs.
Security Warning
Even tiny amounts can erode privacy; use coin‑control features and avoid spending unsolicited dust.
Caveat
Dust filtering may lock out legitimate small payments; balance privacy with usability.

Dusting Attack - Related Articles

No related articles for this term.