Detect Malicious Tokens. Before Users Get Burned.
Dedaub tokin delivers precise, real time token safety insights—across all major chains.
- Detect scam tokens in real time — via API, across major chains.
- Scan bytecode — exposing infinite minting, risky liquidity pools, and more.
- Deep static analysis — to uncover hidden or dormant threats.

Detect Malicious Tokens. Before Users Get Burned.
Dedaub tokin delivers precise, real time token safety insights—across all major chains.
- Detect scam tokens in real time — via API, across major chains.
- Scan bytecode — exposing infinite minting, risky liquidity pools, and more.
- Deep static analysis — to uncover hidden or dormant threats.

Multi-Layer Protection
Customizable Token Rules
Build your risk models. Combine any of the 28 detection flags to classify tokens according to your platform's security standards.
Bytecode-Based Analysis
We decompile bytecode to recover the logic of over 99.98% of tokens. That means, full analysis—even when the source code is missing or obfuscated.
High Precision
Delivers fast and reliable detection, with thorough coverage of malicious tokens.
Multi-Dimensional Detection
Combines static analysis, run-time behavior and on-chain signals (e.g., liquidity levels, holder distribution).
Cross-Pool Token Analysis
Many tokens behave differently across liquidity pools. We analyze each one—Uniswap V2, V3, and forks—independently to catch hidden risks per pool.
Multi-Chain Coverage
The analysis engine supports all major EVM-compatible networks, providing token safety checks across the ecosystem.
Customizable Token Rules
Build your risk models. Combine any of the 28 detection flags to classify tokens according to your platform's security standards.
Bytecode-Based Analysis
We decompile bytecode to recover the logic of over 99.98% of tokens. That means, full analysis—even when the source code is missing or obfuscated.
High Precision
Delivers fast and reliable detection, with thorough coverage of malicious tokens.
Multi-Dimensional Detection
Combines static analysis, run-time behavior and on-chain signals (e.g., liquidity levels, holder distribution).
Cross-Pool Token Analysis
Many tokens behave differently across liquidity pools. We analyze each one—Uniswap V2, V3, and forks—independently to catch hidden risks per pool.
Multi-Chain Coverage
The analysis engine supports all major EVM-compatible networks, providing token safety checks across the ecosystem.
$Billions secured in TVL through proactive blockchain security measures
How we protect you
Trusted
Trusted by security teams at leading DeFi protocols and Web3 companies globally for reliable token risk assessment.
Expertise
Leverage years of smart contract security expertise and cutting-edge static analysis technology.
Knowledge
Access comprehensive threat intelligence and security insights from industry-leading blockchain security researchers.
Trusted
Trusted by security teams at leading DeFi protocols and Web3 companies globally for reliable token risk assessment.
Expertise
Leverage years of smart contract security expertise and cutting-edge static analysis technology.
Knowledge
Access comprehensive threat intelligence and security insights from industry-leading blockchain security researchers.
Advanced Malicious Token Detection API
CHAINLINK BUILD PROGRAM PARTNERSHIP
ARBITRUM DAO SECURITY ADVISOR
OASIS PROTOCOL SAPPHIRE'S SECURITY PARTNER
FOUNDING COLLABORATOR OF THE SEAL 911
UNISWAP FOUNDATION SECURITY SECURITY PROVIDER
MEMBER OF ZKSYNC SECURITY COUNCILAdvanced Malicious Token Detection API
CHAINLINK BUILD PROGRAM PARTNERSHIP
ARBITRUM DAO SECURITY ADVISOR
OASIS PROTOCOL SAPPHIRE'S SECURITY PARTNER
FOUNDING COLLABORATOR OF THE SEAL 911
UNISWAP FOUNDATION SECURITY SECURITY PROVIDER
MEMBER OF ZKSYNC SECURITY COUNCILAdvanced Malicious Token Detection API
{
"chain": "ethereum",
"contract_address": "0xc7e10f58f88b9d38d4b12628d644737E31666080820",
"features": {
"mint_or_burn_function": true,
"can_selfDestruct": false,
"transfer_guarded_by_storage": true,
"transfer_from_guarded_by_storage": false,
"trading_cooldown": false,
"view_function_modifies_state": false,
"has_blacklist_or_whitelist": false,
"external_call": false,
"timebomb": false,
"has_pause_functionality": false,
"pause_status_can_be_modified": false,
"has_owner_functionality": false,
"has_tax_functionality": false,
"tax_can_be_modified": false
},
"name": "SAFARI GEM",
"symbol": "SFR",
"supply": 1e+27,
"is_open_source": true,
"is_liquid": false,
"is_proxy": false,
"owner_address": null,
"send_tax": 0
}Advanced Malicious Token Detection API
{
"chain": "ethereum",
"contract_address": "0xc7e10f58f88b9d38d4b12628d644737E31666080820",
"features": {
"mint_or_burn_function": true,
"can_selfDestruct": false,
"transfer_guarded_by_storage": true,
"transfer_from_guarded_by_storage": false,
"trading_cooldown": false,
"view_function_modifies_state": false,
"has_blacklist_or_whitelist": false,
"external_call": false,
"timebomb": false,
"has_pause_functionality": false,
"pause_status_can_be_modified": false,
"has_owner_functionality": false,
"has_tax_functionality": false,
"tax_can_be_modified": false
},
"name": "SAFARI GEM",
"symbol": "SFR",
"supply": 1e+27,
"is_open_source": true,
"is_liquid": false,
"is_proxy": false,
"owner_address": null,
"send_tax": 0
}





