NO.0x0001
- people have completed this challenge
Contributor:

🚨 Fake Token Airdrop Phishing Attack 🚨

Challenge: Identify Real vs. Fake Domains

Educational Purpose Only - Phishing Simulation

Scenario Description

One day, you receive an email claiming that you are eligible for a UNI token airdrop! The email contains a link that directs you to what appears to be a legitimate website. You click on the link and see the following transaction record:

Status:
Success 20 Block Confirmations
Block:
3504400
Timestamp:
5 mins ago (Mar-17-2025 02:34:36 AM UTC)
Transaction Action:
Call Function by 0x4276BF06...a1B7D03Ce on 0x4d264c6A...41F757Fe5
From:
0x4276BF06Aebd8A1F3D89a1fd5BF84bFa1B7D03Ce
Interacted With (To):
0x4d264c6Ab8933633cd8B052dE243Fa41F757Fe5
ERC-20 Tokens Transferred:
From 0x4276BF06...a1B7D03Ce To 0xE1a9d5C7...615506D4
For 8,888 ERC-20: app.un1swap.org (UNI)
Value:
0 ETH
Transaction Fee:
0.0000001689464305 ETH
Gas Price:
0.003237514 Gwei (0.000000000003237514 ETH)

Carefully observe the transaction record above. This is a common phishing attack technique where attackers create fake websites with domains that look very similar to legitimate ones, attempting to deceive users.

Your Task

Identify the real Uniswap domain and the fake phishing domain.

This challenge is locked. Please complete the beginner challenge1 first.