{"id":6698,"date":"2023-11-23T12:10:16","date_gmt":"2023-11-23T12:10:16","guid":{"rendered":"https:\/\/qa-front.dev.techhub.cloud\/blog\/?p=6251"},"modified":"2025-09-11T14:14:32","modified_gmt":"2025-09-11T14:14:32","slug":"address-poisoning-attacks","status":"publish","type":"glossary","link":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/","title":{"rendered":"Address poisoning attacks"},"content":{"rendered":"<p>Cryptocurrency scams are not new to the industry, they take various disguises.<\/p>\n<p>To <a href=\"https:\/\/paybis.com\/blog\/are-blockchain-wallets-safe\/\">safeguard your crypto assets<\/a> and refrain from financial losses, it&#8217;s beneficial to recognize when and how you&#8217;re being targeted to exercise safety measures\/steps that make sure you are secure from these <a href=\"https:\/\/paybis.com\/blog\/how-to-spot-avoid-crypto-scams\/\">cryptocurrency scams<\/a>.<\/p>\n<p>This article emphasizes address poisoning attacks, and sheds light on how you can safeguard yourself from such attacks.<\/p>\n<h2>What is Address Poisoning Attack?<\/h2>\n<p>Address poisoning or address spoofing is a deceptive tactic wherein scammers send bits of cryptocurrencies to a wallet owner using a fake address resembling the victim&#8217;s. The owner, misled by the resemblance, unknowingly sends funds to the scammer&#8217;s address.<\/p>\n<p><strong>This is a ploy to trick you into sending your assets to the scammer&#8217;s address.<\/strong><\/p>\n<p>Interestingly, unlike other types of crypto scams, like <a href=\"https:\/\/paybis.com\/blog\/glossary\/phishing\/\">phishing attacks<\/a>, these do not involve sophisticated tech or <a href=\"https:\/\/paybis.com\/blog\/glossary\/crypto-malware\/\">malware<\/a>.<\/p>\n<p>They are not limited to any specific wallet. From <a href=\"https:\/\/paybis.com\/bitcoin-wallet\/\">Bitcoin wallets<\/a> to multi-chain wallets, anyone can be targeted.<\/p>\n<h2>How Do They Work?<\/h2>\n<p>Address poisoning attacks follow a simple mechanism with and heavily rely on users\u2019 negligence.<\/p>\n<p>Here is how scammers plan this notorious sting.<\/p>\n<p><picture class=\"attachment-pinterest\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6252 size-full\" src=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg\" alt=\"How Does Address Poisoning Attack Work\" width=\"1080\" height=\"1350\" srcset=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg 1080w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work-240x300.jpg 240w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work-819x1024.jpg 819w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work-120x150.jpg 120w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work-768x960.jpg 768w\" sizes=\"auto, (max-width: 1080px) 100vw, 1080px\" \/><\/picture><\/p>\n<h3>Step 1: Pick the Target<\/h3>\n<p>Blockchains being transparent and public in nature allows everyone to have access to the transactions carried out by wallet addresses, and scammers keep an eye on the <strong>addresses that frequently make transactions<\/strong> or <strong>addresses that hold a lot of crypto assets<\/strong>.<\/p>\n<h3>Step 2: Generate Fake Addresses<\/h3>\n<p>Crypto wallet addresses being a combination of alphanumerics that are as long as 64 characters in length are very difficult to memorize. Often, while making transactions, users only cross-check the first and last four digits of the wallet address.<\/p>\n<p>Scammers, being well aware of this behavior, generate a crypto wallet address using tools like <a href=\"https:\/\/vanity-eth.tk\" target=\"_blank\" rel=\"noopener\">Vanity ETH<\/a> whose alphanumeric string closely resembles your or your friends wallet addresses.<\/p>\n<p>Eg. <strong>Your friends address<\/strong> \u2192 0x11\u2026\u2026\u2026\u202673BF | <strong>Fake address <\/strong>\u2192 0xb1\u2026\u2026\u2026\u202673bF<\/p>\n<p><picture class=\"attachment-pinterest\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-6253\" src=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example.jpg\" alt=\"Fake address example\" width=\"1920\" height=\"1080\" srcset=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example.jpg 1920w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example-300x169.jpg 300w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example-1024x576.jpg 1024w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example-150x84.jpg 150w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example-768x432.jpg 768w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/Fake-address-example-1536x864.jpg 1536w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><\/picture><\/p>\n<h3>Step 3: Address Poisoning<\/h3>\n<p>Once the scammer has set up a near-identical wallet address, they plot the trap and send a near-zero amount of cryptocurrency to the target address. This leaves your transaction history \u201cpoisoned\u201d.<\/p>\n<p>Now your wallet&#8217;s transaction history is full of the scammer&#8217;s identical wallet address.<\/p>\n<p>Post poisoning, the scammers now wait for you to make a transaction to your friend&#8217;s address. They hope that you unknowingly copy and paste the scammers address from the transaction history.<\/p>\n<h3>Step 4: Trap the Victim<\/h3>\n<p>Users\u2019 negligence to check all the characters before making the transaction enables the scam\u2019s success.<\/p>\n<p>If, due to negligence, a user sends his\/her funds out to the phony address, it would be too late to recover the funds by the time they realize their mistake.<\/p>\n<hr \/>\n<h2>Useful links<\/h2>\n<ul>\n<li><a href=\"https:\/\/paybis.com\/blog\/what-is-kyc\/\">What is KYC<\/a><\/li>\n<li><a href=\"https:\/\/paybis.com\/blog\/cryptojacking-how-to-protect-yourself-your-computer\/\">What is cryptojacking? How to detect and prevent it<\/a><\/li>\n<li><a href=\"https:\/\/paybis.com\/blog\/safest-way-to-invest-money\/\">The Safest Way to Invest Money<\/a><\/li>\n<li><a href=\"https:\/\/paybis.com\/blog\/are-blockchain-wallets-safe\/\">Are Blockchain Wallets Safe? Best Security Practices<\/a><\/li>\n<\/ul>\n<hr \/>\n<h2>Examples of Address Poisoning Attacks:<\/h2>\n<h3>Scenario 1 \u2013 Address Poisoning Attack Targeting the Average Joe<\/h3>\n<p>Peter, a cryptocurrency enthusiast living in the neighborhood is a long-term trader and has a substantial amount of funds lying in his wallet and regularly sends crypto to his good friend John with wallet address (0x1223\u2026..0987).<\/p>\n<p>Scammers keep a close eye on Peter\u2019s transaction activities through a blockchain explorer.<\/p>\n<p>They then use tools like vanity-eth.tk to create a fake address (0x1233\u2026..0987) showing similarity to John\u2019s address.<\/p>\n<p>Having set up a similar address the scammer then sends bits of cryptocurrencies to Peter\u2019s address filling up his transaction history with the fake address, causing address poisoning.<\/p>\n<p>Peter is oblivious to this and sends crypto to John as per usual \u2014 just copy-pasting from what he thought was John\u2019s address from a previous transaction.<\/p>\n<p>Peter realizes that he has been scammed when John tells him he never got his money.<\/p>\n<p>In this scenario, the scammers win due to Peter\u2019s negligence.<\/p>\n<h3>Scenario 2 \u2013 Address Poisoning Attack via Fake Smart Contracts<\/h3>\n<p>Mark, an active trader, is well known for making money via cryptocurrency arbitrage, Mark actively transfers funds between multiple cryptocurrency exchanges to get the best deals.<\/p>\n<p>Keeping note of Mark&#8217;s daily activities, scammers target Mark and his wallet address following which scammers employ a fake token contract and send bits of the phony token to the victim. The fake tokens are always a counterfeit of popular cryptocurrencies like USDT or USDC.<\/p>\n<p>The scammer then executes a transaction utilizing the \u201ctransferFrom\u201d function of this fake token contract, making it seem as if the target&#8217;s address is transferring 0 tokens to the recipient (the scammer\u2019s address).<\/p>\n<p>This tactic is employed in the hope that the target will duplicate the most recent recipient&#8217;s address, under the false belief that they have previously engaged in a transaction with this address.<\/p>\n<p>Mark, being lazy to scan his wallet address each time while arbitrage trading, copy\/pastes the scammers address mistaking that for his address from the previously made transaction.<\/p>\n<p>In this scenario, mask loses his funds.<\/p>\n<h2>Result of address poisoning attacks<\/h2>\n<p>Address poisoning attacks may result in the following:<\/p>\n<ul>\n<li>Severe financial loss as a result of user negligence.<\/li>\n<li>Severe damage to trust and security in the cryptocurrency ecosystem, undermining confidence in blockchain technology.<\/li>\n<li>Victims may face emotional distress and a loss of faith in the crypto community.<\/li>\n<\/ul>\n<p>Address poisoning attacks highlight the need for vigilance and security measures to protect the global blockchain industry against such scams.<\/p>\n<h2>Safeguard Yourself From Address Poisoning Attacks<\/h2>\n<p>Address poisoning attacks could result in hefty financial losses. Follow these methods in order to safeguard yourself from these blockchain attacks.<\/p>\n<h3>Cross-check your wallet address<\/h3>\n<p>Make sure to cross-check the \u2018complete\u2019 wallet address (alphanumeric strings) before proceeding with your transactions.<\/p>\n<h3>Avoid copying\/pasting addresses<\/h3>\n<p>Refrain from copying\/pasting wallet addresses from the transaction history as they may have been poisoned with fake\/phony addresses. Instead, manually enter it or ask the other party for their address each time.<\/p>\n<h3>Use NFT domains<\/h3>\n<p>Use NFT domain names like those from ENS or Unstoppable domains. They are easy to read, memorize, and triple-check.<\/p>\n<h3>Choose reputed wallets<\/h3>\n<p>When managing cryptocurrencies, always make sure to choose the best cryptocurrency wallets such as Paybis.<\/p>\n<p>Paybis is a non-custodial cryptocurrency wallet that provides you with a safe and intuitive cryptocurrency storage\/trade experience.<\/p>\n<h3>Make test transactions<\/h3>\n<p>Always be sure to make a test transaction with a smaller amount of token\/crypto just to make sure you have sent the amounts to the right crypto address.<\/p>\n<h3>Address books\/contacts<\/h3>\n<p><a href=\"https:\/\/paybis.com\/crypto-wallet\/\">Crypto wallets<\/a> such as MetaMask and Trust Wallet allow you to store wallet addresses similar to how you store contact numbers on your smartphone.<\/p>\n<p>This would prevent you from copy\/pasting addresses and make sure you are sending funds to the right wallet address.<\/p>\n<h2>Conclusion<\/h2>\n<p>Address poisoning attacks manifest the darker side of the cryptocurrency realm. They showcase how a blend of technological manipulation and human negligence can lead to substantial financial losses.<\/p>\n<p>As the crypto-sphere continues to expand, the ingenuity of scammers evolves in parallel, making it vital for individuals and communities to foster a culture of vigilance and education.<\/p>\n<p>At Paybis, we strive to keep you updated with the best practices to stay safe and navigate the digital assets space responsibly. <a href=\"https:\/\/paybis.com\/blog\/\">Read more from our blog<\/a> and get a step closer to becoming a crypto expert.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Address poisoning or address spoofing is a deceptive tactic wherein scammers send bits of cryptocurrencies to a wallet owner using a fake address resembling the victim&#8217;s. The owner, misled by the resemblance, unknowingly sends funds to the scammer&#8217;s address.<\/p>\n","protected":false},"featured_media":0,"template":"","glossary_letter":[286],"glossary_term":[277,281],"class_list":["post-6698","glossary","type-glossary","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Address Poisoning Attacks (Crypto) - Paybis Blog<\/title>\n<meta name=\"description\" content=\"Address poisoning attacks are on the rise. In this, scammers exploit your negligence and trick you into sending them crypto. Learn more here\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Address Poisoning Attacks (Crypto) - Paybis Blog\" \/>\n<meta property=\"og:description\" content=\"Address poisoning attacks are on the rise. In this, scammers exploit your negligence and trick you into sending them crypto. Learn more here\" \/>\n<meta property=\"og:url\" content=\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Paybis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Paybis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-11T14:14:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@paybis_com\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/\",\"url\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/\",\"name\":\"Address Poisoning Attacks (Crypto) - Paybis Blog\",\"isPartOf\":{\"@id\":\"https:\/\/paybis.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg\",\"datePublished\":\"2023-11-23T12:10:16+00:00\",\"dateModified\":\"2025-09-11T14:14:32+00:00\",\"description\":\"Address poisoning attacks are on the rise. In this, scammers exploit your negligence and trick you into sending them crypto. Learn more here\",\"breadcrumb\":{\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#primaryimage\",\"url\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg\",\"contentUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/paybis.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/paybis.com\/blog\/#website\",\"url\":\"https:\/\/paybis.com\/blog\/\",\"name\":\"Paybis Blog\",\"description\":\"A Tribute to Blockchain Tech and Cryptocurrency Adoption\",\"publisher\":{\"@id\":\"https:\/\/paybis.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/paybis.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/paybis.com\/blog\/#organization\",\"name\":\"Paybis Blog\",\"url\":\"https:\/\/paybis.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png\",\"contentUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png\",\"width\":268,\"height\":72,\"caption\":\"Paybis Blog\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Paybis\/\",\"https:\/\/x.com\/paybis_com\",\"https:\/\/www.instagram.com\/paybis\/\",\"https:\/\/www.linkedin.com\/company\/paybis-com\",\"https:\/\/www.youtube.com\/c\/Paybis\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Address Poisoning Attacks (Crypto) - Paybis Blog","description":"Address poisoning attacks are on the rise. In this, scammers exploit your negligence and trick you into sending them crypto. Learn more here","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Address Poisoning Attacks (Crypto) - Paybis Blog","og_description":"Address poisoning attacks are on the rise. In this, scammers exploit your negligence and trick you into sending them crypto. Learn more here","og_url":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/","og_site_name":"Paybis Blog","article_publisher":"https:\/\/www.facebook.com\/Paybis\/","article_modified_time":"2025-09-11T14:14:32+00:00","og_image":[{"width":1080,"height":1350,"url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@paybis_com","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/","url":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/","name":"Address Poisoning Attacks (Crypto) - Paybis Blog","isPartOf":{"@id":"https:\/\/paybis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#primaryimage"},"image":{"@id":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg","datePublished":"2023-11-23T12:10:16+00:00","dateModified":"2025-09-11T14:14:32+00:00","description":"Address poisoning attacks are on the rise. In this, scammers exploit your negligence and trick you into sending them crypto. Learn more here","breadcrumb":{"@id":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#primaryimage","url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg","contentUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/11\/How-Does-Address-Poisoning-Attack-Work.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/paybis.com\/blog\/glossary\/address-poisoning-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/paybis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Glossary"}]},{"@type":"WebSite","@id":"https:\/\/paybis.com\/blog\/#website","url":"https:\/\/paybis.com\/blog\/","name":"Paybis Blog","description":"A Tribute to Blockchain Tech and Cryptocurrency Adoption","publisher":{"@id":"https:\/\/paybis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/paybis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/paybis.com\/blog\/#organization","name":"Paybis Blog","url":"https:\/\/paybis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png","contentUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png","width":268,"height":72,"caption":"Paybis Blog"},"image":{"@id":"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Paybis\/","https:\/\/x.com\/paybis_com","https:\/\/www.instagram.com\/paybis\/","https:\/\/www.linkedin.com\/company\/paybis-com","https:\/\/www.youtube.com\/c\/Paybis"]}]}},"_links":{"self":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary\/6698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/media?parent=6698"}],"wp:term":[{"taxonomy":"glossary_letter","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary_letter?post=6698"},{"taxonomy":"glossary_term","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary_term?post=6698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}