§ เครื่องมือ · ตัวตรวจสอบ

Lightning address verifier — phishing & LNURL-pay check

Paste a Lightning address (alice@domain), fetch the LNURL-pay endpoint, validate the response, and cross-check against known providers. Catches typosquats.

อัปเดตล่าสุด · 6 พฤษภาคม 2569

🇺🇸 บทความ EN อ่านบทความภาษาอังกฤษ →

เครื่องมือใช้งานภาษาไทยได้เต็มที่ — ส่วนบทความอธิบายด้านล่างยังเป็นภาษาอังกฤษ

Paste any Lightning address (alice@domain) and we'll fetch its LNURL-pay endpoint, validate the response, and cross-check against known providers. All client-side.

Why this matters

A Lightning address — alice@walletofsatoshi.com — looks like email and works like email, which is exactly why it’s a phishing-friendly format. As Lightning adoption grew through 2024-2026, so did the number of typosquatted domains designed to drain a payment that was meant for a real provider. A user who types walletofsatoshis.com (extra s) instead of walletofsatoshi.com is sending sats to whoever bought the typo domain, not to the wallet provider.

This tool does the basic verification that nobody does manually: it parses the address, calls the LNURL-pay endpoint at https://<domain>/.well-known/lnurlp/<user>, validates the response shape against the LUD-06 spec, and cross-checks the domain against a curated list of known-good providers and known phishing patterns. Everything happens in your browser — there’s no telemetry, and the address you check is not sent to any server other than the one you’re checking.

What “verified” means here

Three things are checked, and they are not equivalent in strength:

  1. Endpoint exists and returns a valid LNURL-pay response. This means the domain operates a Lightning-payment server and isn’t just a bare HTTP host. Most fraud sites won’t bother running a real LNURL-pay endpoint, so this is a useful filter — but a determined attacker could absolutely run one.
  2. Domain is on our known-providers list. This is the strongest signal, because the list is curated to legitimate Lightning-address providers operating in 2026. If the domain matches, you’re almost certainly sending to the real provider — just be sure you typed the user part correctly.
  3. No suspicious typo-squat pattern detected. The tool flags domains that look like typo variants of well-known providers (walletofsatoshis.com vs walletofsatoshi.com, etc.), or that use phishing-suggestive subdomains like *-secure or *-verify. These are heuristics — not exhaustive — so absence of a flag does not mean the domain is clean.

A domain that’s not on our list and doesn’t match a typo pattern is unknown rather than verified. That’s an honest result, not a “trust” result.

What the tool can’t tell you

Common typosquat patterns we’ve seen

If you receive a Lightning address from a stranger or an unverified source, run it through this tool before sending anything, and confirm the recipient via a separate channel.

How to do this manually

curl 'https://walletofsatoshi.com/.well-known/lnurlp/alice'

The response should be a JSON object with tag: "payRequest", a callback URL, minSendable and maxSendable in millisats, and a metadata field. If the response is HTML or 404, the address is invalid.