My Alerts

Help users, protocol operators, traders, and everyone to perceive suspicious transactions, get instant alerts and take actions. The Monitoring allows you to have the ability to view and manage all threats detected by Nefture in real time.

Get actionable alerts for suspicious events happening on-chain in real-time that threaten digital assets.

Stay ahead of threats by continuously monitoring on-chain activity that could jeopardize your users and digital assets. With real-time alerts and risk scores assigned to each suspicious event, you'll always be informed of potential risks.

My Alerts

The My Alerts section shows alerts for the threats you’re monitoring. This view is personalized, focusing on the alerts we have flagged.


Key Benefits

  • Automated Protection: Once you import the address you want to safeguard, Nefture automatically generates monitors based on your on-chain activity. No manual setup is required.
  • Custom: Configure the threat monitor to prioritize threats that directly impact your assets, ensuring your attention is always directed to the most critical areas.

Three Steps to Get Started with Monitoring

  1. Add your Wallet Addresses
    • Begin by adding the wallet addresses you want to monitor in /wallets
  2. Manage and Add Custom Monitors
    • Our built-in, early detection engine identifies and create monitors automatically.
    • You can also add custom protocols and contracts to monitor by clicking on Add Monitor
  3. Receive Real-Time Alerts:
    • The setup is complete, you will start receiving instant alerts, enabling you to respond swiftly to threats.

Note: There are no limitations on the number of addresses that can be monitored.

You can configure alerts when a suspicious activity is detected as one that might impact your activity, ensuring you receive real-time notifications via Slack, email, or a custom webhook URL. These alerts are actionable, empowering you to prevent potential loss of funds.

These alerts are actionable, providing you with the necessary information to prevent potential loss of funds and safeguard your assets effectively.

Risk Categories

Nefture continuously monitors and collects a wide range of on-chain indicators to identify potential exploits and suspicious activities as early as possible. This proactive approach is powered by real-time risk detection, utilizing machine learning models and detection algorithms developed through extensive security research and expertise in analyzing previous exploits.

More information about Nefture real-time monitoring:

  • Threat Stream and Attack Indicators: Nefture monitors all on-chain contracts and transactions for suspicious activity, detecting potential malicious actions before they impact other contracts and protocols. This process enables Nefture's algorithms to detect malicious activity at an early stage, allowing our customers sufficient time to take mitigating actions while continuously gathering more data to improve detection accuracy.

Threat Event Types & Categories

CategoryEventDescription
InfoExploiter ActivityWhen a previously identified exploiter conducts a transaction on the blockchain, an event is triggered to indicate the activity, enabling post-hack fund tracking.
GovernanceAdmin Role ChangedThis event is triggered when an administrator role changes, allowing participants to know who has access to sensitive functions and data, helping to prevent unauthorized access and malicious attacks.
FinancialAddress BlacklistedThis event signifies that a new address has been blacklisted by a centralized entity, such as Circle or Tether.
FinancialToken DepegA Token Depeg event occurs when the value of a token deviates from its underlying asset, creating opportunities for exploitation in protocols dependent on that asset's parity.
ExploitsSuspicious Contract DeployedUpon deployment of a new contract on the blockchain, it undergoes comprehensive analysis to detect abnormalities in its bytecode, deployer authenticity, function simulations, and other indicators of risk.
ExploitsHigh Gas TransactionA high gas transaction indicates a significant transaction within a specific block, suggesting that the sender may be attempting to prevent the transaction from being front-run due to its inherent value.
ExploitsFunds Transfer to a MixerFollowing an exploit, this event is triggered when the exploiter transfers funds into a mixing service, typically marking the aftermath of a hack.
GovernanceAccess Role Granted / RevokedThis event tracks changes in access roles within smart contracts. A sudden change, especially to a high-risk account, could indicate a compromise or exploit in the contract's authorization mechanisms.
GovernanceImplementation UpdateTriggered when a new version of a contract's code is deployed, this event monitors potential attack vectors such as proxy upgrades initiated by admins or governance proposals.
GovernanceContract Owner ChangedOccurs when ownership of a smart contract is transferred. Since owners can control critical parameters, any change in ownership is important to monitor and inspect.
GovernanceGovernance Proposal CreatedA Governance Proposal event marks when stakeholders suggest and vote on changes to a protocol. This mechanism can be exploited by malicious actors to modify the protocol for launching an attack.
GovernanceGovernance Proposal ExecutedThis event indicates the execution of a governance proposal, where actual changes are implemented. It is particularly important after the timelock period, as it marks the proposal taking effect.
GovernanceGovernance Proposal Drains TreasuryAlerts when a governance proposal transfers a majority (>50%) of a DAO's token balance to a specific address, potentially indicating a malicious action.
GovernanceSuspicious Proposer in Governance ProposalTriggers an alert when the proposer of a governance proposal is identified as malicious, potentially indicating an attempt to exploit the governance process.
GovernanceMultiSig Owner AddedThis event monitors changes in ownership of MultiSig wallets, which control protocols or treasuries, as any addition of new owners can pose a threat to the protocol's security.
GovernanceMultiSig Owner RemovedSimilar to the addition of owners, this event is triggered when a MultiSig owner is removed, potentially signaling a threat to the security of protocols or treasuries governed by the MultiSig.