# Article OutlineI. Introduction A. Background information on EOA address B. CertiK monitoring and its importance C. Details on the transfer of ETHsII. What is phishing? A.