Token Analyzer
Dive deep into token security and key performance metrics.
⚠️ Disclaimer The Token Analyzer does not provide financial advice. All results are generated automatically using data from our analysis engine and third-party sources, which may contain errors or inaccuracies.
Please note that even projects with millions in market cap can turn out to be scams or rug pulls. Always conduct your own research (DYOR) before making any investment decisions.
We do not take any responsibility for financial losses or decisions made based on this tool. If you notice any incorrect or missing data, please let us know. We’ll work to fix it as quickly as possible.
Blokiments Token Analyzer is a powerful tool that scans and aggregates token data in real time, providing clear, user-friendly warnings alongside a powerful dashboard for deeper inspection.
Try it here: https://blokiments.com/

Integrate the Analyzer into Your App, Website, or Bot
We offer an API that gives you direct access to token analyzer data for seamless integration into your platform, as well as a ready-to-use Telegram bot you can add to your community channels.
To get started or discuss integration options, reach out to us at [email protected] or connect with us in our Telegram group.
Why Is the Blokiments Token Analyzer One of the Best Tools for Reviewing Tokens?
The Blokiments Token Analyzer stands out by combining real-time data, advanced analytics, and user-friendly insights, giving you the clearest picture possible of any token.
Key Features:
Real-Time Data: All metrics are fetched when you click the refresh button, ensuring you always see the latest information.
Aggregated by Token: Data from all pools is merged, giving you a complete and accurate overview.
Advanced Security Checks: Our in-house rugpull database, integrations with trusted external data providers, and pattern-based scam detection rules help spot potential risks.
Clear Warnings: Easy-to-understand, automatically generated alerts for faster decision-making.
Off-Chain Metrics: Insights from Twitter sentiment, Telegram activity, GitHub development, and even a project’s website scan.
Is it free to use?
Yes. Anyone with a Blokiments account can use the Token Analyzer for free. Most actions are free; credits are only used when you choose to refresh certain reports.
How it works:
New token (never analyzed): We run a real-time analysis for free; no credits needed.
Previously analyzed token: You’ll see the most recent cached report (it may be hours or days old, depending on when it last ran).
Want the latest numbers? Click Refresh to run a real-time analysis. This costs 300 Blokiments credits.
Credits keep usage fair and cover the real costs of running live analyses, while still letting everyone use the analyzer with no feature limits for browsing and checking cached results.
Token Analyzer Usage
To start, go to the Blokiments home page: https://blokiments.com/
Choose the blockchain you want to analyze the token on.
Enter the token contract address.

When you open a token in the Blokiments Token Analyzer, the report is generated in real time. This means you may need to wait a few seconds while each module loads. Results appear one by one, so you can already start reviewing insights while the rest of the analysis continues in the background.
Here’s how to read and use the overview effectively:
Each module runs its own checks independently (liquidity, contract security, holders, deployer history, etc.).
IMPORTANT! - Some of the most important warnings may show up later in the loading process. Wait for all of the modules to load and then check the header for warnings.
A single WARNING may not be enough to dismiss a project, but if you see multiple Warnings or Critical reviews across different modules, that’s a strong indicator of danger.

If the token was analyzed before, you’ll first see a cached report (free).
For the most up-to-date results, hit the Refresh button (costs 300 credits). This re-runs all modules with live data.

Stay Critical and Do Your Own Research (DYOR)
The analyzer highlights risks and anomalies, but cannot guarantee accuracy.
Always combine results here with your own research before investing.
Token Analyzer Modules
The token analysis process is divided into several modules or categories that run an in-depth analysis. Each module loads separately, which prevents long page loading times. We have incorporated several detection rules into each module that search for common scam patterns and generate user-friendly warnings.
All reviews are classified into three categories:
INFO
An overview of certain token aspects that investors should consider. These do not indicate a direct scam risk but serve as a heads-up to help evaluate the token’s metrics more easily.
WARNING
This category indicates risk behavior associated with the token. Caution is strongly advised before investing. If multiple warnings appear across different categories, extreme care should be taken.
CRITICAL
Indicates a serious risk of fraud. If critical warnings are present, you should avoid buying this token, as there is a strong likelihood of being scammed
Overview module

This module provides a broad, high-level assessment of a token by combining background checks, trading activity signals, and ecosystem presence. The goal is to highlight potential red flags early and give investors a quick snapshot of overall project health.
Background checks we perform:
WARNING/CRITICAL: Manual security reviews - Cross-checks against our internally curated database of scams, fraud alerts, and manually reported risks.
WARNING: High trading activity with low social engagement - Flags situations where on-chain activity looks inflated but the project lacks genuine community presence, a possible sign of wash trading or manipulation.
INFO/WARNING: Recently launched token - Very new tokens may carry additional risks (short track record, untested security), but in some cases, this can simply mean an early-stage opportunity.
INFO: Presence on multiple networks - Reviews whether the token is deployed across other blockchains, which can add utility or signal wider adoption.
INFO: CEX listings and quality - Evaluates where the token is listed and the reliability of those centralized exchanges.
Liquidity module
This module checks the basic on-chain liquidity for a token on the selected network. It:
Sums the liquidity across all detected pools for the token.
Reviews the initial liquidity (who added it and how much).
Checks whether the liquidity is locked or burned (or still removable).
Looks at the liquidity history over time.
Background checks we perform:
WARNING/CRITICAL: Is total liquidity too low? Low liquidity means it can be hard to buy or sell without moving the price a lot. In the worst case, you might not be able to sell at all when you want to exit.
WARNING: Can the liquidity be removed? We estimate the risk that liquidity could be removed (“pulled”), which would leave traders stuck. To do this, we look at things like:
Was the token launched on a launchpad that locks liquidity?
Is the liquidity locked or burned, or is it unlocked and easy to remove?
Are there enough pools with meaningful liquidity, or just one/small ones?
Are there centralized exchange (CEX) listings that provide extra liquidity?
How many liquidity providers are there (many vs. one big holder)?
WARNING: Market cap vs. liquidity (L/MC ratio) - If the market cap is very large compared to the available on-chain liquidity, and there’s little or no CEX depth, that’s a sign the price might be fragile or inflated. This can increase the chance of sharp drops or manipulative behavior.
WARNING: Liquidity unlocking soon - Some projects without major CEX listings may lock liquidity for a short period to appear like a safe investment. However, once the lock expires, they could pull a rug pull. Always check liquidity lock duration and unlock dates before investing.
Security audit module
This module focuses on the security audit of a token’s smart contract and how it may impact investment decisions. It generates metrics and reviews using our in-house contract analysis engine, combined with data from external providers. The merged dataset is then evaluated alongside other project metrics to reduce false-positive scam alerts and provide more reliable risk assessments.
Blokiments does not validate nor assume responsibility for the accuracy of data obtained from these external auditors.
Background checks we perform:
CRITICAL: Honeypot contract - If the contract prevents selling (honeypot behavior), investors may be trapped.
CRITICAL: Token flagged as scam by external providers. - If multiple external data sources have already identified the token as a scam, treat it as extremely high risk.
CRITICAL: Token used in airdrop phishing scams - If this token has been tied to known phishing or dusting scams, it’s highly unsafe.
CRITICAL: Contract not verified - If the source code is not verified on-chain (e.g., Etherscan, BscScan), it prevents independent review and raises major red flags.
WARNING/CRITICAL: The buy/sell tax is too high. Excessive transaction taxes (especially >15%) can make trading impractical or serve as a hidden trap.
WARNING: Mintable token - If minting is not disabled, the supply can be inflated at any time, diluting holders.
WARNING: Contract matches known scam signatures - If the contract code resembles patterns from known scam projects, it’s a red flag.
WARNING: Token is freezeable - If the contract allows the issuer to stop all transfers at any time, which means your tokens could become temporarily non-transferable.
WARNING: External function calls - If the contract relies heavily on external function calls, it increases attack surface and dependency risks.
WARNING: Proxy contract - If the contract is a proxy, the implementation logic can be upgraded, meaning the rules can be changed after deployment.
INFO/WARNING: Metadata is mutable (on Solana) - If the token’s metadata can be changed after launch, the project team may alter critical information (name, symbol, supply). This can be benign, but still adds risk.
INFO: Contract has a blacklist (EVM only) - Some EVM contracts include blacklist functions that allow the team to block specific wallets. This can be abused, though sometimes used for compliance.
Token deployer module
This module analyzes the behavior and background of the token deployer (creator address). Since deployers often launch multiple tokens, their track record can provide strong signals about legitimacy or risk. A malicious deployer can undermine even a technically sound contract.
Background checks we perform:
CRITICAL: Creator has rug-pull history - Reviews if the deployer address is associated with past rug pulls or scam projects from our internal database or known risk lists.
CRITICAL: Deployer flagged in manual database - Cross-checks our manually curated database of known scam deployers and flagged teams/founders.
WARNING: High percentage of supply held by deployer - Flags situations where the deployer retains a large portion of the token supply, which increases the risk of sudden dumps.
WARNING: Creator marked as malicious by external providers - Checks external sources for deployers tied to scam wallets, honeypot patterns, or known malicious activity.
WARNING: Deployer created many different tokens - Identifies deployers who have launched a large number of tokens, often a sign of spammy or fraudulent behavior. Token quality and intent should be carefully reviewed.
Activity Review Module
The Activity Review module performs an in-depth analysis of the top 40 holders of a token (excluding CEXes, pools,..). For each wallet, it examines swaps, funding sources, trading history, behavioral patterns, and transfers. It then calculates various metrics based on this data. This module is one of the most important components, providing valuable insights into potential opportunities and helping to identify whether a token may be a scam.
The module works best with tokens that have limited CEX exposure and are available exclusively on a specific chain. For such tokens, the analyzer delivers highly accurate results since all trading activity occurs on-chain. For larger or more established tokens with multiple CEX listings, the data should be interpreted with caution, as a significant portion of trading happens off-chain and cannot be detected by the analyzer. In summary, this module is ideal for analyzing newer tokens and provides deep, valuable insights.

The Module Review provides a comprehensive overview of the top wallets, presented as follows:
Top Holders Actions: Understand what the top wallets are doing during the last 5% of the token’s lifecycle. We analyze their swaps to determine whether they are accumulating, selling, trading, or holding. This helps detect suspicious patterns, for example, if multiple wallets behave the same way, and provides insight into overall activity relative to wallet size.
Top Holders Classifications: We tag top wallets with one or more behavioral labels to give you an easy overview of their activity. These classifications can help identify potential scams or uncover early opportunities.
Top Holders Statistics: Displays key statistics such as the average entry market cap and average holding time for top wallets. This information helps you make smarter, data-driven trading decisions.
Top Holders Profits: Quickly see whether the top holders are in profit, at a loss, or primarily receiving tokens via transfers from other wallets. This insight helps you gauge the token’s current phase; for instance, if most wallets are already in profit, it might not be the best time to enter.
Are early buyers truly a significant risk factor?
This depends on several factors and needs to be correlated with other indicators. For example, if the token has no other warnings and around 25 early wallets among the top holders, additional context is needed. If the token is only a few hours old, a high number of early wallets is normal; the token is new, and naturally, most buyers are early participants. However, if the token is already a few days old, a large number of early wallets may be a red flag.
In genuinely organic tokens, you typically won’t see many early buyers after several days, apart from a few legitimate early investors. But if most of the top holders are tagged as early wallets, it could indicate suspicious activity or suggest that significant sell pressure may occur soon.
You should also correlate this with the average entry market cap and profit status of top wallets. If the average entry market cap is low, many wallets are in profit, and most of them are early buyers, then a strong sell-off is likely in the near future.
Callers module
Surfaces social “calls” (promotions/shills) tied to the token across our tracked channels. The module helps you spot early hype, coordinated pushes, and which callers historically move markets.
Background checks we perform:
First & latest call: Who called the token first and when, plus the most recent call time.
Caller breadth: Total calls and count of unique callers overall and in rolling windows (1d / 7d / 30d).
Quality & impact: For early calls, we track caller score, current profit %, ATH profit %, and volume moved after the call (when available).
Coordinated campaigns: Detects bursts of many calls from different accounts in a short window (likely paid or orchestrated promotion).
Socials module
Brings together signals from Twitter, Telegram, Discord, GitHub, and project websites to gauge real community traction vs. manufactured hype.
Background checks we perform:
Presence & basic hygiene: Do official links exist (Twitter, Telegram, Discord, GitHub, Website)? Is the website reachable and non‑malicious?
External platform sentiment: The summary of the external data sentiment.
Twitter/activity & quality: Posting frequency, recency, follower/following, engagement (likes/retweets/replies/quotes/views), community page stats, account age, reused handles, and suspensions.
GitHub signals (when applicable): Organization activity, repos, followers, forks/issues/watchers as a proxy for open‑source development and interest.
Holders module
Assesses who owns the supply, how concentrated it is, whether distribution looks organic, and whether top wallets show coordination. We tag special wallets (burn, pools, lockers, token owner/creator) so distribution stats reflect circulating holders rather than technical addresses.
Background checks we perform:
Holder counts: Total holders and holders with more than $5 of tokens (filters dust and airdrop noise).
Concentration: Share of supply owned by the top 1 / 10 / 20 / 50 / 100 / 200 / 500 holders; median holder rank; and HHI (market‑concentration index).
Locked supply: Portion of the on‑chain supply locked in trusted lockers or team vaults (detected and tagged so they don’t distort distribution).
Artificial inflation: Different detections of artificially inflated holders.
Bundled funding patterns: Whether many top holders have bundled holders, which often precedes coordinated dumps.
Airdrops to VIPs/KOLs: Large allocations to well‑known public wallets can be used to generate attention rather than genuine commitment.
Hidden mints: Sanity check for supply anomalies pointing to stealth minting.
Smart money module
Surface activity from wallets that historically trade well or influence markets: whales, experienced traders, and KOLs (key opinion leaders). The goal is to quickly see whether knowledgeable capital accumulates or stays away.
Background checks we perform:
Whale trading history: Time‑ordered buys/sells from whale wallets for this token. Used to spot accumulation, distribution, and pivots.
Important buyer counts: Unique smart‑money, experienced, KOL, and whale buyers derived from recent trading activity.
Detected KOLs: Tags/handles of KOL accounts linked to on‑chain wallets that interacted with the token.
Suspicious Patterns module
The module looks for trading behaviors that often precede rugs or orchestrated manipulation. We blend labeled‑wallet intel (bots/scammers), holder and trader ratios, and time‑bucketed trade data to surface anomalies you can verify at a glance.
Background checks we perform:
Known scam traders: Share of traders interacting with the token who are labeled as scammers in our databases.
Bot activity: Portion of makers (unique trading wallets) and traded volume attributable to detected bots, focused on the token’s top liquidity pair.
Holders vs. makers (24h): We check whether the number of unique makers in the last 24h is disproportionately high relative to total holders, a common pattern when wash‑trading inflates activity.
Holders vs. market cap: Flag tokens with an unusually high market cap but few holders.
Aggregated trade buckets: Time‑series of buys/sells and trade sizes (micro/small/medium/big) to spot unnatural distributions and bursts.
More automated pattern rules coming.
Advance scam detection module
This module fuses on‑chain behavior, social intelligence, and early‑trade forensics to spot higher‑order scam patterns that single signals often miss. In the UI, you’ll see three cards: Scam Sentiment, Twitter Sentiment, and Sniping Activity (first block and ~30s after launch). Each card rolls up raw metrics and triggers human‑readable reviews with INFO / WARNING / CRITICAL labels.

Background checks we perform:
Credible scam reports: Mentions from vetted “good actors” on Twitter/X calling the token a scam.
Promotions by known bad KOLs: Posts by influencers with a history of promoting rugs or pump‑and‑dumps (we list the handles we detect).
Scam Telegram groups: Appearances in pump groups or channels that routinely push scams.
Twitter activity & sentiment: Search result count, estimated views, and sentiment breakdown (Scam / Bearish / Bullish / Neutral). Extremely low activity can be a red flag for fake on‑chain volume.
Sniping forensics: Who sniped the tokens early, how many unique wallets, and what % of the total supply they acquired. We also check for coordinated sniping patterns.
Deployer deep scan module
Coming Soon!
Last updated
Was this helpful?


