Blacklist/Rug List

The Blacklist/Rug List feature is a powerful tool designed to protect users from malicious developers and fraudulent token launches. By leveraging advanced code analysis and historical data, this feature helps identify and warn against potential scams, ensuring safer investment decisions in the cryptocurrency space.

Key Features:

  • Code Analysis: Every token created has underlying code that can be audited. Our system analyses this code to identify similarities with previous token launches. This information is crucial for detecting patterns of fraudulent activity.

  • Historical Performance Tracking: Evaluate the performance of tokens with similar code to understand their historical outcomes. This feature helps identify trends where the same developer might be launching multiple pump-and-dump schemes.

  • Wallet Activity Monitoring: Track the wallets associated with previous dumps. By identifying these wallets, our system can flag suspicious activity and warn users when these wallets engage in new token launches.

  • Reporting Mechanism: Users can report suspected developers running pump-and-dump schemes. If found guilty through our analysis, these developers are added to our scam list database, enhancing community safety.

  • Warning Labels: Wallets identified as participating in fraudulent schemes are labelled with warnings. This alerts users when these wallets buy into new tokens, providing an extra layer of protection.

  • Past Performance Analysis: Show past performances of tokens with similar contracts, highlighting patterns of pump-and-dump behaviour. This feature helps users make informed decisions based on historical data.

  • Developer Tracking: Identify and track developers who repeatedly launch scam tokens. This enables the community to be aware of malicious actors and avoid their projects.

  • Community Reports: Encourage users to report suspicious activities. These reports are reviewed, and validated cases are added to the blacklist, continuously updating and improving the system’s reliability.

Examples of Use Cases:

  • Fraud Detection: Utilise code analysis and historical performance data to detect potential scams before investing. This helps in avoiding pump-and-dump schemes and protecting investments.

  • Real-Time Alerts: Receive warnings when flagged wallets or developers engage in new token launches, allowing for timely and informed decision-making.


Last updated