About
Learn more about State of the Chain and Blockaid
Blockaid is the onchain security platform for monitoring, detecting, and responding to onchain and offchain threats. Founded in 2022 by former Israeli cyber intelligence operatives, Blockaid quickly became the security solution of choice for leading web3 companies like Metamask, Coinbase, Stellar, World App, and more.
With the most comprehensive security platform for web3 projects, Blockaid provides an end-to-end solution that can help any company building in the space keep their users safe - including tools like smart contract monitoring, transaction simulation, dApp scanning, token security tools, on-chain and off-chain threat hunting capabilities, and more.
Operating out of offices in New York and Tel Aviv, the company has raised $33 million from top venture capital firms in cybersecurity, fintech, and web3 — Ribbit, Variant, Cyberstarts, Sequoia, and Greylock. Blockaid continues growing its network of partners as the most trusted name in web3 security.
For more information, visit https://blockaid.io.
State of the Chain is based on aggregated data from Blockaid's onchain detection and response (ODR) systems.
- Anonymized transactions scanned via Blockaid's API (not including Metamask PPOM)
- Onchain contract deployments and interactions
- Token creation and trading activity
- dApp connections and user interactions
- Wallet drainer campaigns and malicious infrastructure
Blockaid ODR is active on all major blockchain networks and Blockaid's Wallet Security solution is used by the leading wallets across Web3. In 2024 alone, our systems have:
- Scanned over 2.4 billion transactions
- Secured more than 787 million dApp connections
- Protected over $101 billion worth of user funds
- Detected and blocked more than 71 million attacks
- Identified over 15 million malicious dApps
Our data analysis combines real-time monitoring with historical pattern analysis to identify threats and security trends. This includes:
- Proactive scanning of new dApps and smart contracts for potential threats
- Analysis of token creation patterns to identify potential scams
- Tracking of known malicious actors and their infrastructure
- Monitoring of transaction patterns to detect suspicious activity