Forta Firewall Scales to 25M Transactions in 10 Days
Forta Firewall Scales to 25M Transactions in 10 Days
🔥 25M Tx Later...

Forta Firewall continues its rapid expansion across multiple blockchain networks, screening 25 million transactions in just 10 days. The security protocol has demonstrated significant growth since May 2025:
- Now screens over 2M transactions daily
- Protects major networks including Celo, Mode, and Plume
- Reached 150M+ total screened transactions
- Secures 180+ apps with $4B in assets
The AI-powered system evaluates every transaction for threats before they reach the chain, providing real-time security and compliance for rollups.
Track live metrics: Forta Firewall Dune Dashboard
Over the weekend, Forta Firewall screened 3.6M+ transactions across rollups 📈 With adoption growing fast, Firewall scales effortlessly, keeping rollups secure and compliant with real-time threat prevention 🛡️ Built for scale. Powered by AI.
More than 12 million transactions screened on @plumenetwork, and not a single one made it through without passing Forta Firewall. Real-time protection, built into the chain. Security by default.
Forta Firewall is LIVE on @Celo and already screening every transaction in real time. Millions processed so far. Every tx evaluated before it hits the chain 🔗 Security is no longer optional, it’s built in 🛡️
Forta Firewall crossed 150 MILLION screened transactions over the weekend. Adoption is accelerating across rollups. On-chain protection, at scale.
Over 25M transactions screened in just 10 days 🚀 Forta Firewall is scaling, and scaling fast. Track the metrics on the Forta Firewall Dune Dashboard: dune.com/forta_team/for…
Forta Firewall has already scanned 70M+ transactions on @Celo. Every single one evaluated for potential threats before hitting the chain. That’s what security by default looks like.
Forta Firewall is available to every rollup building with @gelatonetwork 🛠️ Real-time exploit & compliance screening, no custom setup needed. Security + compliance, built-in.
What AWS is to Web2, Gelato is to Web3. Infra that powers rollups, wallets, and apps—at scale. From chain deployment to RPCs to Account Abstraction. One platform. All of Web3.
Forta Firewall is now live on @Celo 🔥 Every transaction screened. Every attacker stopped. Every user protected. Security by default.
Forta Firewall is scaling fast 📈 67M+ transactions already screened and growing daily. Powered by the $FORT token, securing chains in real time. Check the metrics on the new Dune dashboard: dune.com/forta_team/for…
Between @Celo, @modenetwork, @plumenetwork, and a few others we can’t name just yet 👀, Forta Firewall is now screening over 2 million transactions daily Ethereum L2s are scaling, and Forta Firewall is making sure they stay secure and compliant.
180+ apps. $4B in assets. @plumenetwork didn’t just launch, they armed up 🛡️ Forta Firewall screens every single transaction on Plume before it hits the chain. Learn more -> forta.org/blog/forta-fir…
And just like that… 100 million transactions screened by Forta Firewall 🚀 Real-time security and compliance for rollups, blocking threats before they hit the chain. Prevention is the new standard 🛡️
Forta Firewall 🤝 @plumenetwork On Day 1 of Plume mainnet, we’re proud to protect protocols with real-time, AI-powered transaction screening, stopping malicious activity before it hits the chain. Built for a permissionless and composable RWAfi future. The future is secure 🪶
Forta Firewall is now screening more than 2 million transactions every day, before they hit the chain. Real-time protection at scale. And growing fast.
In case you missed it 👀 Catch up on the latest from Forta 🧵👇
More than 70 MILLION transactions have now been screened by Forta Firewall 🛡️ Powered by $FORT. Securing chains in real time. Without security, the onchain economy can’t grow. Forta is making sure it does.
Address Poisoning Scam Costs User $386K in Simple Copy-Paste Attack

A user lost **$386,000** by sending funds to a fraudulent address that closely resembled a legitimate one in their transaction history. **How the attack works:** - Scammers plant near-identical addresses in a victim's transaction history - Users copying addresses from their history accidentally select the fake one - The attack exploits common habits rather than technical vulnerabilities This follows a similar **$600K USDT** address poisoning attack in February, where a look-alike address was planted 32 minutes before the victim's transaction. [Forta Firewall](https://forta.org/firewall?utm_source=twitter&utm_medium=social&utm_campaign=firewall-update&utm_content=ink-case-study) detected both incidents in real-time and can block such attacks on protected chains. **Protect yourself:** Always verify the complete address before sending transactions, not just the first and last few characters.
💸 Oops! $517K Drained Across 5 Chains Due to Token Approvals

**A $517K exploit hit multiple chains** - Arbitrum, BSC, Avalanche, Optimism, and Base - without any traditional hack. **The vulnerability:** Users had previously granted MAX_UINT token approvals, which attackers exploited through a permissionless multicall function. This allowed draining of funds across all five chains simultaneously. **Detection:** Forta Firewall caught the suspicious activity across all affected networks. **Key takeaway:** Token approvals represent a significant attack surface. When you approve a contract to spend your tokens with unlimited permissions (MAX_UINT), those approvals remain active indefinitely - creating ongoing risk even from contracts you no longer use. This follows a similar pattern to January's $13.3M USDC drain on Base, where existing max approvals were exploited via an arbitrary-call vulnerability. **Action item:** Review and revoke unnecessary token approvals regularly to minimize your exposure.
🚨 AI Slashes Crypto Exploit Costs
Ledger's CTO Charles Guillemet warns that AI is dramatically accelerating crypto security threats. Attack research that previously required months now completes in seconds, while expanding software creates more vulnerabilities. **Key Points:** - AI reduces exploit development costs toward zero - Traditional post-breach patches are no longer sufficient - Real-time, pre-execution threat prevention is now essential The shift demands fundamental changes in how crypto systems approach security monitoring and defense.
Denaria Finance Loses $165K in Smart Contract Attack on Linea

**Denaria Finance**, a perpetual trading platform on Linea, suffered a smart contract exploit resulting in approximately **$165,000 in losses**. The platform's interfaces are currently down as the team investigates the incident. **Key Details:** - Attack vector: Smart contract vulnerability - Platform affected: Perpetual trading protocol on Linea - Detection: Forta Firewall identified the exploit **The Broader Context:** This incident follows a pattern of DeFi exploits detected by Forta's monitoring system, including: - Recent Cyrus Finance exploit - October attacks on $FIRE ($57K) and $AIZPT ($20K) via price oracle manipulation The recurring theme: **pre-execution screening and real-time threat detection** can flag vulnerabilities before funds are drained, though implementation remains inconsistent across protocols.
Forta and Elliptic Partner to Integrate Scam Detection into Institutional Compliance Workflows
Scam activity continues to be a major source of losses in crypto. To address this, **Forta and Elliptic are partnering** to integrate scam intelligence into institutional compliance and risk workflows. The collaboration aims to: - Provide high-signal scam detection data - Enable faster institutional response to threats - Strengthen compliance processes with real-time insights This integration allows institutions to access Forta's detection capabilities alongside Elliptic's risk intelligence, creating a more comprehensive approach to identifying and responding to scam activity. [Read the full announcement](<http://forta.org/blog/forta-x-elliptic-bringing-scam-signals-into-broader-risk-and-compliance?utm_source=twitter&utm_medium=social&utm_campaign=elliptic&utm_content=elliptic-partnership>)