# Blog

- [Security](/guides/blog/security.md): Deep dives dedicated to security topics.
- [Smart contract honeypot analysis](/guides/blog/security/smart-contract-honeypot-analysis.md): Do you want to spot a honeypot in a Solidity contract code? Here, we describe some of the common types of honeypots that appeared on the Base network in July and August 2024.
- [Rug pullls](/guides/blog/security/rug-pullls.md): Uncover the dark side of crypto: Learn how to spot and avoid the next rug pull before it's too late!
- [Pump Scammer Analysis](/guides/blog/security/pump-scammer-analysis.md): In today's post, we will look deeper at a specific Arbitrum scammer.
- [Smart money scammer](/guides/blog/security/smart-money-scammer.md): Another week, another scam report.
- [Token Sewage Spill on Base](/guides/blog/security/token-sewage-spill-on-base.md): How can scammers benefit from cheap fees on L2 networks?
- [Tokenomics](/guides/blog/tokenomics.md): Tokenomics, the fusion of "token" and "economics," refers to the study of how cryptocurrencies are designed, created, and managed. In this section, we'll delve into tokenomics and its effects.
- [Presales](/guides/blog/presales.md)
- [Liquidity](/guides/blog/liquidity.md): Tutorials and guides.
- [Liquidity pools](/guides/blog/liquidity/liquidity-pools.md): Liquidity pools are crucial for peer-to-peer trading in decentralized finance (DeFi). Here’s everything you need to know about how they work.
- [Getting Slipped? Or getting MEV’d?](/guides/blog/getting-slipped-or-getting-mevd.md): Have you ever encountered the term MEV bot or slippage? This post will explore what these terms mean and how they work.
- [Smart Token Sniper](/guides/blog/smart-token-sniper.md): Pew pew, let's look a smart sniper.
- [Token Comparison Workflow](/guides/blog/token-comparison-workflow.md): What makes one coin more attractive than another?  Let's see how can you compare two tokens.
- [The Value of Merging On-Chain and Off-Chain Data in Token Analysis](/guides/blog/the-value-of-merging-on-chain-and-off-chain-data-in-token-analysis.md): Combining on-chain and off-chain data is crucial for comprehensive token analysis, providing a fuller picture of market trends and project fundamentals.
- [The bad, worse, and the worst](/guides/blog/the-bad-worse-and-the-worst.md): Today, we are going to show you three interesting tokens that went undetected as honeypots and managed to drain money from buyers.
- [Caller tokens analysis](/guides/blog/caller-tokens-analysis.md)
- [In-depth token analysis](/guides/blog/in-depth-token-analysis.md): This analysis provides a deep on-chain examination of selected tokens, focusing on their transactional behavior, holder distribution and key metrics driving network activity.
- [In depth: RFC](/guides/blog/in-depth-token-analysis/in-depth-rfc.md): This is an on-chain in depth token analyis report.
- [In depth: Magnetix](/guides/blog/in-depth-token-analysis/in-depth-magnetix.md): This is an on-chain in depth token analyis report.
- [In depth: WhiteRock Finance](/guides/blog/in-depth-token-analysis/in-depth-whiterock-finance.md): A comprehensive analysis of the WhiteRock Finance project to identify any potentially suspicious elements.
- [In depth: Zebec Network](/guides/blog/in-depth-token-analysis/in-depth-zebec-network.md): A comprehensive analysis of the Zebec Network project to identify any potentially suspicious elements.
- [In depth: PlayMind](/guides/blog/in-depth-token-analysis/in-depth-playmind.md)
- [In-depth wallet analysis](/guides/blog/in-depth-wallet-analysis.md): Smart money wallet analysis reveals trends, strategies, and alpha signals.
- [Wallet report #1](/guides/blog/in-depth-wallet-analysis/wallet-report-1.md): Wallet DQTJuBowmUGdDquduB2uUF94xHkSEAiA4fejtzMytEf7
- [Wallet report #2](/guides/blog/in-depth-wallet-analysis/wallet-report-2.md): Wallet j4aUumfC9BaZExfM5MDW5Sx98xBZ67YpidLLu1miJec
- [Wallet report #3](/guides/blog/in-depth-wallet-analysis/wallet-report-3.md): Wallet 8Nty9vLxN3ZtT4DQjJ5uFrKtvan28rySiGVJ5dPzu81u
