Honeypot Tokens
Web3 / wallets security
Honeypot tokens are malicious smart contracts designed to trap investors by allowing purchases but preventing sales through hidden code restrictions, zero-knowledge proofs, or delegated permissions. These tokens typically employ sophisticated mechanisms that make them appear legitimate during the purchase phase, luring retail investors to buy, but contain embedded restrictions that prohibit token holders from selling their positions. The scammers retain administrative functions to sell their own allocations freely while victims cannot exit. Honeypot tokens function as a predatory variant of scams, exploiting blockchain transparency paradoxically—the code is publicly visible but intentionally obfuscated through complexity or misdirection. Example: Many tokens launched on Ethereum and BSC during 2021-2022 contained sell restrictions that checked sender addresses against a whitelist, silently reverting sell transactions from retail addresses while allowing the deployer's address to exit unrestricted positions. Why it matters for crypto security: Honeypots exemplify the importance of code auditing and testing before investing. Users should test small token transfers, use contract analysis tools to identify admin functions and restrictions, and verify liquidity lock contracts before purchasing any new tokens to avoid irreversible financial traps.
Explore the full Web3 Glossary — 2,062+ expert-curated definitions. Need guidance? Talk to our consultants.