Tok{In}

Detect Malicious Tokens. Before Users Get Burned.

Dedaub Tok{In} delivers precise, real-time token safety insights—across all major chains.
Detect Malicious Tokens. Before Users Get Burned.
Check Detect scam tokens in real-time via API, across major chains.
Check Scan bytecode exposing infinite minting, risky liquidity pools, and more.
Check Deep static analysis to uncover hidden or dormant threats.
Multi-Layer Protection

Multi-Layer Protection

TALK TO US
Customizable Token Rules

Customizable Token Rules

Build your risk models. Combine any of the 30 detection flags to classify tokens according to your platform's security standards.

Bytecode-Based Analysis

Bytecode-Based Analysis

We decompile bytecode to recover the logic of over 99.98% of tokens. That means, full analysis — even when the source code is missing or obfuscated.

High Precision

High Precision

Delivers fast and reliable detection, with thorough coverage of malicious tokens.

Multi-Dimensional Detection

Multi-Dimensional Detection

Combines static analysis, run-time behavior and onchain signals (e.g., liquidity levels, holder distribution).

Cross-Pool Token Analysis

Cross-Pool Token Analysis

Many tokens behave differently across liquidity pools. We analyze each one — Uniswap V2, V3, V4 and forks — independently to catch hidden risks per pool.

Multi-Chain Coverage

Multi-Chain Coverage

The analysis engine supports all major EVM-compatible networks, providing token safety checks across the ecosystem.

Three Analysis Engines. One API Call.

Tok{In} combines static analysis, live simulation, and onchain intelligence into a single response — giving your platform a complete risk profile for every token, in milliseconds.

Static Analysis

Powered by the Dedaub Decompiler

Tok{In} decompiles raw bytecode to recover contract logic — even when source code is unavailable or obfuscated. The engine detects mint/burn functions, selfdestruct calls, pause logic, blacklists, timebombs, hidden taxes, trading caps, and privileged owner roles through pattern matching on decompiled IR.

  • Covers 99.98% of deployed ERC-20 contracts
  • Detects dormant functionality (e.g., disabled caps, wiped taxes)
  • Identifies view functions that secretly modify state

Simulation Engine

Live Buy / Sell Testing Per Pool

Every token is tested with real swap simulations across each liquidity pool independently — covering Uniswap V2/V3/V4 forks and Aerodrome on Base. The engine measures actual transfer taxes, verifies buy and sell success, and exposes honeypot behavior that static analysis alone cannot catch.

  • Simulates WETH, USDC, and USDT pairs
  • Reports send tax and receive tax as separate percentages
  • Detects pools where buys succeed but sells revert

Onchain Intelligence

Liquidity, Ownership & Creator Analysis

Beyond code, Tok{In} evaluates the onchain context surrounding each token: creator wallet concentration, pool liquidity depth, DEX presence, and supply distribution. Pools with less than $100 in reserves are flagged as illiquid. Creator holdings above safe thresholds signal centralization and dump risk.

  • Tracks creator address, balance, and percentage of supply
  • Evaluates liquidity across all paired pools per token
  • Flags tokens with no viable DEX exit path

Built For

Tok{In} delivers real-time token risk intelligence for every platform that needs to validate safety before a trade, a listing, or an integration goes live.

Decentralized Exchanges (DEXs)

Screen every token before it reaches a swap. Catch honeypots, sell restrictions, hidden taxes, liquidity traps and pool-specific anomalies across Uniswap V2, V3 and forks — protecting users and your platform's reputation in one call.

Wallet Providers

Surface clear risk signals the moment a user touches an unsafe token. Flag impersonation attempts, hidden pause logic, transfer guards, uncapped minting and privileged roles — directly inside the wallet experience.

CASPs / VASPs

Harden listing, monitoring and compliance workflows. Evaluate supply manipulation risk, ownership concentration, liquidity depth and holder distribution before you enable trading or custody support.

AI Trading Agents & Automated Systems

Add a deterministic safety layer before every trade. Query structured JSON risk outputs via API or MCP, then enforce internal thresholds automatically — blocking honeypots, tax traps, infinite-mint tokens and liquidity mirages before execution.

30+ Detection Flags

Each flag maps to a specific scam pattern your users may encounter — from hidden mints to honeypot traps. Expand any flag for a deeper look at the security risk it covers.

Every platform has different risk tolerances. Tok{In} lets you combine any subset of these flags into custom risk models — so the safety signals your users see match the standards your platform enforces.

Supply Manipulation Risks

Flags that detect arbitrary supply changes, privileged ownership, and hidden balance or allowance modifications.

There is a public function that changes the token's total supply. Attackers have used hidden mint logic to generate massive numbers of tokens, instantly diluting holders and dumping into liquidity pools.

Owner-only functions grant privileged control of the token contract — minting, pausing, changing fees, or upgrading code. Many rug-pull tokens retained critical owner privileges that allowed developers to change rules at will. Even "renounced" ownership can hide backdoors through proxy contracts.

The contract's owner address reveals who controls privileged functions. If ownership is retained, the deployer can still pause trading, mint new tokens, or alter fees. Tracking the owner's wallet can reveal disproportionate supply holdings or links to other scams.

A list of function selectors that modify the token's balance storage slot. Expected selectors are transfer and transferFrom; additional selectors may indicate hidden mint/burn or fee-skimming logic.

A list of function selectors that modify the token's allowance storage slot. Expected selectors include approve, transferFrom, increaseAllowance, and decreaseAllowance; unexpected selectors may indicate allowance manipulation.

Contract Kill Switch & Hidden Logic

Flags that can disable or destroy the contract entirely.

The selfdestruct opcode permanently deletes a contract from the blockchain, making its tokens unusable. Malicious developers have used this as a "kill switch," deleting the token contract once they've drained enough liquidity.

Timebomb logic enables malicious features only after a specific timestamp or condition. A token may appear safe at launch but automatically enable a 100% sell fee after 24 hours. This delayed rug-pull tactic bypasses early detection and lures more victims before the trap springs.

Pause functions let an admin halt all token transfers. In scam contracts they are frequently abused to freeze everyone's tokens while developers exit liquidity.

If pause status is modifiable, developers can arbitrarily freeze and unfreeze the market. Trading seems normal at first, then suddenly stops when liquidity is at its peak. Victims are frozen while insiders dump.

In ERC-20 standards, view functions should only read data, never write to storage. If a function that appears read-only instead alters contract state, it signals deception. Malicious actors may disguise state-changing logic inside what looks like a harmless getter.

Transfer Restrictions (Honeypot Mechanics)

Flags that block or limit selling and trading.

The transfer function's execution depends on a storage variable (e.g., a flag or mapping check). This signals that transfers can be conditionally blocked by the contract owner or via some internal logic.

The transferFrom function's execution depends on a storage variable. Indicates that delegated transfers can be conditionally blocked.

A trading cooldown enforces a mandatory delay between transfers. Often marketed as "anti-bot," in scams it traps victims — preventing them from selling while insiders exit.

A trading cap limits how many tokens can be transferred in a single transaction. Scammers abuse them to block regular selling. Contracts have been found with transfer amounts set so low that no investor could meaningfully exit — a honeypot effect.

A modifiable trading cap means the maximum transfer amount can be changed after deployment. Developers may begin with normal parameters, then suddenly reduce the cap to trap sellers once trading volume grows.

Position caps limit how many tokens a single wallet can hold. Scammers weaponize this to block consolidation or normal transfers. Caps can make transactions fail unexpectedly and trap users in illiquid positions.

A changeable position cap is especially dangerous. Developers can reduce the cap to one token per wallet, effectively locking everyone out of trading except insiders — hidden rug-pull mechanics waiting to be triggered.

Blacklist and whitelist logic allows developers to control which addresses can trade. Scams often block victims from selling while letting insiders move freely. Some honeypots auto-blacklist every buyer as soon as they purchase.

Hidden Taxes & Fee Drains

Flags tied to transfer fees that can silently drain value.

Tax functions deduct fees on each transfer, often sent to a treasury or burned. Scammers exploit this by coding hidden or extreme fees. A common honeypot trick is setting sell taxes to 100%, leaving sellers with nothing.

When taxes can be updated, developers can start with a 1% fee and later raise it to 100%, stealing all proceeds from sells. Transparent tokens hard-code tax rates or bind them to community governance.

send_tax is the percentage loss from the sender's balance. receive_tax is the percentage the recipient didn't receive. All values are expressed as percentages. Measured via onchain simulation.

A test transfer was simulated onchain. If false, the transfer failed — the token may block transfers entirely (potential honeypot).

Code Integrity & Transparency

Flags that tell you if the code is safe and visible.

If a token's code is unverified, users cannot inspect its behavior — preventing detection of hidden backdoors like mint, blacklist, or trap logic. Verified source doesn't guarantee safety, but it allows audits and community review.

For proxy contracts: indicates whether the implementation contract's source code is verified. Only relevant when is_proxy is true. null for non-proxy contracts.

Proxy contracts separate logic from storage, allowing upgrades. Developers can launch with benign code, then upgrade to malicious logic once funds accumulate. Unless proxy upgrades are governed transparently, they give developers unchecked power to change rules.

External calls allow the token to interact with unknown contracts, opening the door to reentrancy and dependency risks. Malicious developers may route value through hidden external calls to siphon funds.

Liquidity & Market Health

Flags that measure whether the token trades normally.

Simulated swaps test whether tokens can really be traded. Many honeypots let users buy but block sells, trapping funds. Simulation also checks liquidity depth — abandoned or fake pools may have no usable reserves.

Liquidity determines whether tokens can be sold at a fair price. If no pool holds more than a minimal amount, the market is fake. Rug pulls typically involve draining liquidity pools, leaving tokens unsellable.

The token is in at least one DEX. Absence from any exchange is a strong signal that the token cannot be traded.

Returns true if the token cannot be bought through any of the listed pools or if all pools are too illiquid (less than $100).

Detects tokens launched via bonding curve platforms. Currently supports four.meme and flap.sh on BSC. Graduated tokens are still identified via address pattern matching.

Creator Centralization

Flags around token creator and insider risk.

Tracking the creator's wallet can reveal disproportionate supply holdings, links to other scam deployments, or patterns of serial rug pulls. Transparency around the creator's identity reduces risk.

A large creator balance signals potential for sudden whale dumps and market manipulation. When one wallet holds a dominant share of supply, it can crash the price at will.

The percentage of total supply held by the creator measures centralization risk. High concentration places all power in one wallet, betraying any claims of decentralization and enabling governance manipulation.

Total supply normalized by decimals, and circulating supply calculated as supply minus burned_supply. Represents the tokens still in active circulation.

Total supply held by known burn addresses (0x000...0000 and 0x000...dead), verified onchain via multicall. burned_supply_pct is the percentage of total supply burned.

Top 10 token holders returned as an array with owner_address, token_amount, and pct_held. Balances are verified onchain via multicall. Reveals concentration risk and potential insider control.

One Endpoint. Full Risk Profile.

Integrate Tok{In} with a single REST call. Get structured JSON back — covering static analysis flags, simulation results, liquidity data, and creator metrics — ready to feed your internal rules engine.

Request
curl -X 'GET' \
  'https://tokin-api.dedaub.com/token/ethereum/0x...' \
  -H 'accept: application/json' \
  -H 'X-API-Key: YOUR-API-KEY'
Response (abbreviated)
{
  "chain": "ethereum",
  "contract_address": "0x2328...7f",
  "features": {
    "mint_or_burn_function": true,
    "can_selfdestruct": false,
    "trading_cooldown": false,
    "has_blacklist_or_whitelist": true,
    "has_pause_functionality": true,
    "has_tax_functionality": true,
    "is_open_source": true,
    "is_liquid": true,
    "is_proxy": true,
    "send_tax": 0,
    "receive_tax": 1,
    "creator_percent": 0,
    "cannot_buy": false,
    "dex": [{
      "pair": "0xa954...db",
      "liquidity_type": "UniV2",
      "liquidity": 59292.70,
      "buy_success": true,
      "sell_success": true
    }]
  }
}

Easy Migration

Switching security solutions doesn't require rewriting your integration. Tok{In}'s flexible response format adapts to your existing risk calculator and boolean logic — minimizing the engineering overhead of migration and letting your team focus on what matters.

Supported Chains

  • Ethereum
  • Binance Smart Chain
  • Arbitrum
  • Base
  • Avalanche

DEX Coverage

  • Uniswap V2 + forks
  • Uniswap V3 + forks
  • Uniswap V4 + forks
  • Aerodrome on Base

Getting Started

Three steps to start scanning tokens with the Tok{In} API.

01

Create an Account

Visit tokin.dedaub.com and log in to create your free account.

02

Get Your API Key

From the homepage, click "Get API Key" under the Developer API card.

03

Make Your First Call

Pass your key via the X-API-Key header to the token endpoint and receive structured risk data.

$Billions secured in TVL through proactive blockchain security measures

TALK TO US

Why Dedaub?

Dedaub is a leading blockchain security technology and auditing firm that combines deep security research, academic rigor, and practical hacker expertise.

$3M

IN BUG BOUNTIES IN 11 SUCCESSFUL CLAIMS FOR IDENTIFYING CRITICAL ISSUES

$Billions

IN TVL SECURED VIA PROACTIVE WHITE-HAT HACKING and SEAL 911 WAR ROOMS

200+

SMART CONTRACT SECURITY AUDITS FOR LEADING DEFI PROTOCOLS

Trusted

Trusted

Trusted by security teams at leading DeFi protocols and Web3 companies globally for reliable token risk assessment.

Expertise

Expertise

Leverage years of smart contract security expertise and cutting-edge static analysis technology.

Knowledge

Knowledge

Access comprehensive threat intelligence and security insights from industry-leading blockchain security researchers.

Designed by World-Leading Security Experts

Dedaub has improved safety in the Web3 space by addressing vulnerabilities and collaborating with the Ethereum Foundation on EIPs and various upgrades.
Chainlink CHAINLINK BUILD PROGRAM PARTNERSHIP
Arbitrum ARBITRUM DAO SECURITY ADVISOR
Oasis Protocol OASIS PROTOCOL SAPPHIRE'S SECURITY PARTNER
Seal 911 FOUNDING COLLABORATOR OF THE SEAL 911
Uniswap UNISWAP FOUNDATION SECURITY SECURITY PROVIDER
zkSync MEMBER OF ZKSYNC SECURITY COUNCIL