Detect Malicious Tokens. Before Users Get Burned.
Customizable Token Rules
Build your risk models. Combine any of the 30 detection flags to classify tokens according to your platform's security standards.
Bytecode-Based Analysis
We decompile bytecode to recover the logic of over 99.98% of tokens. That means, full analysis — even when the source code is missing or obfuscated.
High Precision
Delivers fast and reliable detection, with thorough coverage of malicious tokens.
Multi-Layer Protection
TALK TO USMulti-Dimensional Detection
Combines static analysis, run-time behavior and onchain signals (e.g., liquidity levels, holder distribution).
Cross-Pool Token Analysis
Many tokens behave differently across liquidity pools. We analyze each one — Uniswap V2, V3, V4 and forks — independently to catch hidden risks per pool.
Multi-Chain Coverage
The analysis engine supports all major EVM-compatible networks, providing token safety checks across the ecosystem.
Multi-Layer Protection
TALK TO USCustomizable Token Rules
Build your risk models. Combine any of the 30 detection flags to classify tokens according to your platform's security standards.
Bytecode-Based Analysis
We decompile bytecode to recover the logic of over 99.98% of tokens. That means, full analysis — even when the source code is missing or obfuscated.
High Precision
Delivers fast and reliable detection, with thorough coverage of malicious tokens.
Multi-Dimensional Detection
Combines static analysis, run-time behavior and onchain signals (e.g., liquidity levels, holder distribution).
Cross-Pool Token Analysis
Many tokens behave differently across liquidity pools. We analyze each one — Uniswap V2, V3, V4 and forks — independently to catch hidden risks per pool.
Multi-Chain Coverage
The analysis engine supports all major EVM-compatible networks, providing token safety checks across the ecosystem.
Three Analysis Engines. One API Call.
Tok{In} combines static analysis, live simulation, and onchain intelligence into a single response — giving your platform a complete risk profile for every token, in milliseconds.
Static Analysis
Powered by the Dedaub Decompiler
Tok{In} decompiles raw bytecode to recover contract logic — even when source code is unavailable or obfuscated. The engine detects mint/burn functions, selfdestruct calls, pause logic, blacklists, timebombs, hidden taxes, trading caps, and privileged owner roles through pattern matching on decompiled IR.
- ● Covers 99.98% of deployed ERC-20 contracts
- ● Detects dormant functionality (e.g., disabled caps, wiped taxes)
- ● Identifies view functions that secretly modify state
Simulation Engine
Live Buy / Sell Testing Per Pool
Every token is tested with real swap simulations across each liquidity pool independently — covering Uniswap V2/V3/V4 forks and Aerodrome on Base. The engine measures actual transfer taxes, verifies buy and sell success, and exposes honeypot behavior that static analysis alone cannot catch.
- ● Simulates WETH, USDC, and USDT pairs
- ● Reports send tax and receive tax as separate percentages
- ● Detects pools where buys succeed but sells revert
Onchain Intelligence
Liquidity, Ownership & Creator Analysis
Beyond code, Tok{In} evaluates the onchain context surrounding each token: creator wallet concentration, pool liquidity depth, DEX presence, and supply distribution. Pools with less than $100 in reserves are flagged as illiquid. Creator holdings above safe thresholds signal centralization and dump risk.
- ● Tracks creator address, balance, and percentage of supply
- ● Evaluates liquidity across all paired pools per token
- ● Flags tokens with no viable DEX exit path
Built For
Tok{In} delivers real-time token risk intelligence for every platform that needs to validate safety before a trade, a listing, or an integration goes live.
Decentralized Exchanges (DEXs)
Screen every token before it reaches a swap. Catch honeypots, sell restrictions, hidden taxes, liquidity traps and pool-specific anomalies across Uniswap V2, V3 and forks — protecting users and your platform's reputation in one call.
Wallet Providers
Surface clear risk signals the moment a user touches an unsafe token. Flag impersonation attempts, hidden pause logic, transfer guards, uncapped minting and privileged roles — directly inside the wallet experience.
CASPs / VASPs
Harden listing, monitoring and compliance workflows. Evaluate supply manipulation risk, ownership concentration, liquidity depth and holder distribution before you enable trading or custody support.
AI Trading Agents & Automated Systems
Add a deterministic safety layer before every trade. Query structured JSON risk outputs via API or MCP, then enforce internal thresholds automatically — blocking honeypots, tax traps, infinite-mint tokens and liquidity mirages before execution.
30+ Detection Flags
Each flag maps to a specific scam pattern your users may encounter — from hidden mints to honeypot traps. Expand any flag for a deeper look at the security risk it covers.
Every platform has different risk tolerances. Tok{In} lets you combine any subset of these flags into custom risk models — so the safety signals your users see match the standards your platform enforces.
One Endpoint. Full Risk Profile.
Integrate Tok{In} with a single REST call. Get structured JSON back — covering static analysis flags, simulation results, liquidity data, and creator metrics — ready to feed your internal rules engine.
Getting Started
Three steps to start scanning tokens with the Tok{In} API.
Create an Account
Visit tokin.dedaub.com and log in to create your free account.
Get Your API Key
From the homepage, click "Get API Key" under the Developer API card.
Make Your First Call
Pass your key via the X-API-Key header to the token endpoint and receive structured risk data.
Create an Account
Visit tokin.dedaub.com and log in to create your free account.
Get Your API Key
From the homepage, click "Get API Key" under the Developer API card.
Make Your First Call
Pass your key via the X-API-Key header to the token endpoint and receive structured risk data.
$Billions secured in TVL through proactive blockchain security measures
Why Dedaub?
$3M
IN BUG BOUNTIES IN 11 SUCCESSFUL CLAIMS FOR IDENTIFYING CRITICAL ISSUES
$Billions
IN TVL SECURED VIA PROACTIVE WHITE-HAT HACKING and SEAL 911 WAR ROOMS
200+
SMART CONTRACT SECURITY AUDITS FOR LEADING DEFI PROTOCOLS
Trusted
Trusted by security teams at leading DeFi protocols and Web3 companies globally for reliable token risk assessment.
Expertise
Leverage years of smart contract security expertise and cutting-edge static analysis technology.
Knowledge
Access comprehensive threat intelligence and security insights from industry-leading blockchain security researchers.
Designed by World-Leading Security Experts
CHAINLINK BUILD PROGRAM PARTNERSHIP
ARBITRUM DAO SECURITY ADVISOR
OASIS PROTOCOL SAPPHIRE'S SECURITY PARTNER
FOUNDING COLLABORATOR OF THE SEAL 911
UNISWAP FOUNDATION SECURITY SECURITY PROVIDER
MEMBER OF ZKSYNC SECURITY COUNCILDesigned by World-Leading Security Experts
CHAINLINK BUILD PROGRAM PARTNERSHIP
ARBITRUM DAO SECURITY ADVISOR
OASIS PROTOCOL SAPPHIRE'S SECURITY PARTNER
FOUNDING COLLABORATOR OF THE SEAL 911
UNISWAP FOUNDATION SECURITY SECURITY PROVIDER
MEMBER OF ZKSYNC SECURITY COUNCIL





