Paste a token contract address for a basic safety assessment. Check verification, holder concentration, and red flags.
Always verify contracts directly on block explorers for the most accurate and up-to-date information.
Learn what the key safety checks mean and why they matter.
A verified contract means the developer has published the source code on a block explorer like Etherscan, allowing anyone to read and audit it. This does NOT mean the contract is safe or audited by professionals. It simply means the code is visible. Unverified contracts hide their code, making it impossible to know what the contract actually does. While verification alone does not guarantee safety, an unverified contract is a major red flag. Legitimate projects almost always verify their contracts.
Holder concentration refers to how the token supply is distributed among wallets. If the top 10 wallets hold more than 80% of the total supply, it is a significant red flag. These large holders (often called "whales") can dump their tokens at any time, crashing the price. In healthy token economies, the supply is distributed across thousands of holders. Check the "Holders" tab on Etherscan or BscScan to see the distribution. Be especially wary if the deployer wallet still holds a large percentage.
Many smart contracts have an "owner" who can modify contract parameters, such as changing fees, pausing trading, or minting new tokens. "Renouncing ownership" means the developer has permanently given up this control. While this sounds good, it is a double-edged sword. A renounced contract cannot be updated or fixed if bugs are found. Some scammers renounce ownership to build trust, but hide backdoor functions that still give them control. Always verify that renouncement is genuine by checking the contract code.
A honeypot is a malicious smart contract designed to trap your funds. You can buy the token, but when you try to sell, the transaction fails or only the contract owner can sell. Honeypots use various tricks: hidden sell restrictions, dynamic fees that go to 100% on sell, whitelisted wallets, or approval manipulation. They often show impressive price charts because nobody can sell. Before buying any token, try checking it on honeypot detection tools, and always start with a very small test transaction to see if you can sell before committing larger amounts.
The rapid adoption of cryptocurrency across Africa has brought tremendous opportunities for financial inclusion, cross-border payments, and wealth building. Nigeria, South Africa, Kenya, Ghana, and Egypt lead the continent in crypto adoption, with millions of users trading on both centralized and decentralized platforms. However, this growth has also attracted bad actors who exploit the relatively new and evolving regulatory environment to deploy scam tokens and fraudulent smart contracts. Understanding how to evaluate a smart contract before investing is one of the most important skills any African crypto investor can develop.
Smart contracts are self-executing programs stored on a blockchain. They power everything from token transfers to decentralized finance (DeFi) protocols. When you buy a token on a decentralized exchange like Uniswap or PancakeSwap, you are interacting directly with a smart contract. Unlike centralized exchanges where tokens undergo some vetting process, anyone can deploy a token contract on Ethereum, BSC, or Polygon for a small fee. This permissionless nature is both the strength and the vulnerability of decentralized finance.
Rug pulls are the most common scam type in the African crypto space. In a rug pull, developers create a token, generate hype through social media (often Telegram and WhatsApp groups), attract liquidity from investors, and then drain the liquidity pool, leaving holders with worthless tokens. In 2024 and 2025, several high-profile rug pulls specifically targeted Nigerian and Ghanaian investors through Telegram communities, promising unrealistic returns of 100% or more within days. The AfriToken rug pull alone affected thousands of investors across West Africa.
Honeypot tokens are another prevalent threat. These contracts are designed to allow buying but prevent selling, effectively trapping your investment. The price chart looks attractive because nobody can sell, creating the illusion of constant growth. Honeypots are particularly dangerous because they can fool even experienced traders who rely on price action analysis. Phishing scams, where attackers impersonate legitimate platforms or airdrop campaigns, are also widespread, particularly through WhatsApp and Telegram in East and West Africa.
Our scanner provides a starting point, but thorough due diligence requires manual verification. First, check the contract on the relevant block explorer: Etherscan for Ethereum, BscScan for BSC, or PolygonScan for Polygon. Look for a green checkmark indicating source code verification. Next, examine the "Holders" tab to check token distribution. If the top 10 holders own more than 80% of the supply, proceed with extreme caution. Review the contract's transaction history, paying attention to the contract creation date (newer contracts are riskier), the number of unique holders, and whether liquidity has been locked. Tools like TokenSniffer, GoPlus Security, and DEXTools can provide additional automated analysis.
The African crypto community has shown remarkable resilience and innovation in protecting itself. Community-driven scam databases, local Telegram warning channels, and peer education initiatives have helped countless investors avoid fraud. Projects like AfroTools aim to provide accessible, Africa-focused tools that empower users to make informed decisions. Remember: if an investment opportunity sounds too good to be true, it almost certainly is. Legitimate projects do not promise guaranteed returns, and no tool can replace careful research and healthy skepticism. Always invest only what you can afford to lose, and never share your seed phrase or private keys with anyone.