{"id":3572,"date":"2023-07-10T19:09:14","date_gmt":"2023-07-10T19:09:14","guid":{"rendered":"https:\/\/de.fi\/blog\/?p=3572"},"modified":"2023-09-25T23:42:05","modified_gmt":"2023-09-25T23:42:05","slug":"honeypot-checker-keep-crypto-safe","status":"publish","type":"post","link":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe","title":{"rendered":"Using a Honeypot Checker: Keep Your Crypto Safe Across 15+ EVM Chains"},"content":{"rendered":"\n<p>Are you puzzled by the term &#8216;crypto honeypots&#8217; and why it&#8217;s a buzzword in the <a href=\"https:\/\/de.fi\/\" target=\"_blank\" rel=\"noopener\">DeFi<\/a> space? The simple answer is this: honeypots are sophisticated scams that have the potential to quickly steal your funds. Because of this, honeypot checkers are vital to securing any onchain crypto portfolio.<\/p>\n\n\n\n<p>This article will provide you with insights regarding what a honeypot is, why it&#8217;s dangerous, and how to use our cutting-edge honeypot detector for a comprehensive analysis of tokenomic risk across ETH, BSC, or most other popular EVM chains.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Check for Honeypots<\/h2>\n\n\n\n<p>Navigating the crypto space without a reliable honeypot checker is like walking blindfolded on a minefield. Let&#8217;s introduce you to our Scanner <a href=\"https:\/\/de.fi\/scanner\" target=\"_blank\" rel=\"noopener\">free smart contract auditing<\/a> tool, a revolutionary honeypot detector designed to empower you in your crypto journey.<\/p>\n\n\n\n<p><iframe class=\"youtube-video\" title=\"YouTube video player\" src=\"https:\/\/www.youtube.com\/embed\/uuTF0ltcLVQ\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n\n\n\n<p>To use our groundbreaking Scanner tool, the process is as simple as it is effective. It starts with you entering the smart contract address of the token or contract that you want to audit. No matter what token or contract you have in mind, our tool is robust and versatile enough to handle it, as it supports more than 40 different chains. This support extends across a huge array of platforms, giving you a broad spectrum of audit capabilities to ensure no stone is left unturned.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-align-center\"><em><span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/de.fi\/scanner\" rel=\"sponsored nofollow\">T<\/a><\/strong><a href=\"https:\/\/de.fi\/scanner\"><strong>ry Scanner Now!<\/strong><\/a><\/span><\/em><\/h3>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"845\" src=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/scanner-honeypot-check.png\" alt=\"main de.fi scanner tool screen\" class=\"wp-image-3575\"\/><\/figure>\n<\/div>\n\n\n<p>The Scanner performs a thorough audit of your contract in a matter of seconds &#8211; yes, seconds. This speed is coupled with an unparalleled depth of analysis to ensure you receive a report that is as quick as it is complete. The audit scrutinizes every nook and cranny of the contract, digging deep into its mechanics, behaviors, and patterns. This detailed report comes at no cost to you. That&#8217;s right &#8211; our tool is completely free, making it an invaluable companion for any savvy crypto investor.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"854\" src=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/defi-scanner-results-page.png\" alt=\"defi scanner results\" class=\"wp-image-3576\"\/><\/figure>\n<\/div>\n\n\n<p>A significant component of this report is the honeypot check. This is a dedicated section that alerts you if your token could potentially be a honeypot. It flags the possibility of your investment being a trap for your funds, thus allowing you to steer clear of potential financial heartache.<\/p>\n\n\n\n<p>Our tool goes beyond simply alerting you; it also provides you with the opportunity to examine the underlying code causing the flagged issues. This detailed examination grants you a deeper understanding of your investment, providing you insights into its functionality, behavior, and potential risks.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"843\" src=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/scanner-honeypot-detection-info.png\" alt=\"honeypot detection results within scanner tool\" class=\"wp-image-3577\"\/><\/figure>\n<\/div>\n\n\n<p>However, our scanner doesn\u2019t stop at just analyzing smart contract risk. It takes a holistic approach to ensure you&#8217;re as informed as possible about your potential investment. It delves into tokenomic risk analysis, examining factors like the distribution of token holdings and liquidity.<\/p>\n\n\n\n<p>For instance, the top 10 token holders analysis is a critical examination that highlights the distribution of tokens among the top holders, providing insights into the potential for market manipulation. Similarly, the liquidity analysis sheds light on the liquidity health of the token, offering crucial information that can impact your decision to invest.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/de.fi\/scanner\"><img loading=\"lazy\" decoding=\"async\" width=\"1121\" height=\"150\" src=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/scan_smart_contracts_with_de.fi_-1.png\" alt=\"\" class=\"wp-image-3601\"\/><\/a><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">What Is a Honeypot?<\/h2>\n\n\n\n<p>In the rapidly evolving world of DeFi, honeypots are an increasingly prevalent and insidious type of scam. The term &#8220;honeypot token&#8221; can seem strange, even appealing, but don&#8217;t be fooled.<\/p>\n\n\n\n<p>A honeypot in DeFi is essentially a cleverly disguised trap. On the surface, these tokens bring an allure of profitability, often accompanied by promises of high returns and rapid growth. This appeal is a lure designed to draw in investors looking for quick profits. Once investors buy into these seemingly attractive tokens, the grim reality becomes apparent.<\/p>\n\n\n\n<p>Unlike legitimate tokens, honeypot tokens have a devious catch &#8211; there&#8217;s no way out. Scammers design honeypot smart contracts in such a way that your funds are essentially trapped. Selling or trading these tokens is impossible due to their design which leaves your investment stuck indefinitely.<\/p>\n\n\n\n<p>That&#8217;s where a robust and reliable honeypot checker comes into play. It&#8217;s an essential tool that safeguards your hard-earned investments from falling into such nefarious traps. With the advent of our advanced honeypot detector, and specifically, the honeypot detector for Ethereum (ETH), detecting and avoiding honeypots on ETH has become simpler, more efficient, and safer than ever before.<\/p>\n\n\n\n<p>This level of protection extends beyond ETH. Whether you&#8217;re dealing with Binance Smart Chain (BSC), Base, Arbitrum, Optimism, Polygon, AVAX or any other Ethereum Virtual Machine (EVM) compatible chain, our honeypot detector is an invaluable ally. It helps to shield you from the potential dangers lurking in the world of DeFi scams.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Are There Other Things to Avoid?<\/h2>\n\n\n\n<p>When navigating the DeFi landscape, understanding and identifying potential pitfalls is as important as spotting opportunities. In addition to honeypots, several other red flags are frequently encountered in tokens and contracts. These issues may pose serious threats to the safety and profitability of your investments. It&#8217;s therefore critical for DeFi users to be aware of them. Here are the five most common issues you might encounter beyond a token being a honeypot.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Ownership Renouncement<\/h3>\n\n\n\n<p>When contract creators renounce ownership, they can no longer make changes to the contract. While this is sometimes seen as a positive, demonstrating that the project can&#8217;t be altered maliciously, it can also be problematic. For instance, if an exploit or bug is discovered in the contract, there&#8217;s no way to fix it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Contract Re-Entrancy<\/h3>\n\n\n\n<p>This occurs when an external contract hijacks the control flow, leading to malicious re-entries. It&#8217;s a common vulnerability that can result in the theft of funds from the contract.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Front-Running Attacks<\/h3>\n\n\n\n<p>Front-running occurs when an attacker gains knowledge of a transaction in the mempool (the holding area for pending transactions) and places their transaction first with a higher gas fee, influencing the outcome of the original transaction.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Minting Functions<\/h3>\n\n\n\n<p>Some tokens retain the ability to mint new tokens after the initial supply has been set and distributed. This function can lead to inflation and dilution of token value.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. Delegate Call Functionality<\/h3>\n\n\n\n<p>Although delegate call has legitimate uses, such as upgrading contracts, it can also be exploited to alter contract logic and state, leading to security issues.<\/p>\n\n\n\n<p>The Scanner tool automatically looks for these common issues, alongside detecting honeypots. Its audit process evaluates contracts for these common red flags, providing a comprehensive analysis of potential vulnerabilities. By identifying these risks before investing, users can avoid falling victim to <a href=\"https:\/\/de.fi\/rekt-database\" target=\"_blank\" rel=\"noopener\">crypto hacks &amp; scams<\/a>.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><a href=\"https:\/\/de.fi\/\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"200\" src=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/defi-dashboard-cta.png\" alt=\"defi dashboard\" class=\"wp-image-3399\"\/><\/a><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Enhance Your Safety With De.Fi<\/h2>\n\n\n\n<p>Worried you\u2019re <a href=\"https:\/\/de.fi\/blog\/what-ngmi-means-crypto\" target=\"_blank\" rel=\"noopener\">NGMI<\/a>? Wondering how to keep your capital safe until the <a href=\"https:\/\/de.fi\/blog\/prepare-next-crypto-bull-run\" target=\"_blank\" rel=\"noopener\">next bull run<\/a>? Enhance your web3 safety and protect your assets with De.Fi. We provide a range of valuable tools and resources. De.Fi offers comprehensive solutions to help users navigate the decentralized finance landscape securely, such as Scanner and our De.Fi Shield, your personal web3 <a href=\"https:\/\/de.fi\/shield\" target=\"_blank\" rel=\"noopener\">revoke permissions tool<\/a> &amp; antivirus.<\/p>\n\n\n\n<p>We help investors make informed decisions and avoid potential pitfalls. De.Fi equips users with the knowledge and insights needed to protect their funds, understand smart contracts, and stay updated on the latest security practices. Visit our <a href=\"https:\/\/www.youtube.com\/@DEDOTFI\" target=\"_blank\" rel=\"noopener\">YouTube channel<\/a> and explore our tools to bolster your web3 safety and ensure a secure crypto experience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article will provide you with insights regarding what a honeypot is, why it&#8217;s dangerous, and how to use our cutting-edge honeypot detector for a comprehensive analysis of tokenomic risk across ETH, BSC, or most other popular EVM chains.<\/p>\n","protected":false},"author":2,"featured_media":3573,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[7],"class_list":["post-3572","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-defi-security","tag-defi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Honeypot Checker Tools: Detect ETH &amp; BSC Crypto Scams<\/title>\n<meta name=\"description\" content=\"Research what a crypto honeypot is, why it&#039;s dangerous, and how to use our cutting-edge honeypot detector. \u2713 Learn more now with the De.Fi blog.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Honeypot Checker Tools: Detect ETH &amp; BSC Crypto Scams\" \/>\n<meta property=\"og:description\" content=\"Research what a crypto honeypot is, why it&#039;s dangerous, and how to use our cutting-edge honeypot detector. \u2713 Learn more now with the De.Fi blog.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\" \/>\n<meta property=\"og:site_name\" content=\"De.Fi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-10T19:09:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-25T23:42:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/how_to_detect_a_honeypot_.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"787\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"De.Fi Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dedotfi\" \/>\n<meta name=\"twitter:site\" content=\"@dedotfi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"De.Fi Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe#article\",\"isPartOf\":{\"@id\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\"},\"author\":{\"name\":\"De.Fi Security\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/person\/bc7c94cb5e037c8978c6059885825591\"},\"headline\":\"Using a Honeypot Checker: Keep Your Crypto Safe Across 15+ EVM Chains\",\"datePublished\":\"2023-07-10T19:09:14+00:00\",\"dateModified\":\"2023-09-25T23:42:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\"},\"wordCount\":1199,\"publisher\":{\"@id\":\"https:\/\/de.fi\/blog\/#organization\"},\"keywords\":[\"Defi\"],\"articleSection\":[\"De.Fi Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\",\"url\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\",\"name\":\"Honeypot Checker Tools: Detect ETH & BSC Crypto Scams\",\"isPartOf\":{\"@id\":\"https:\/\/de.fi\/blog\/#website\"},\"datePublished\":\"2023-07-10T19:09:14+00:00\",\"dateModified\":\"2023-09-25T23:42:05+00:00\",\"description\":\"Research what a crypto honeypot is, why it's dangerous, and how to use our cutting-edge honeypot detector. \u2713 Learn more now with the De.Fi blog.\",\"breadcrumb\":{\"@id\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/de.fi\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Using a Honeypot Checker: Keep Your Crypto Safe Across 15+ EVM Chains\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/de.fi\/blog\/#website\",\"url\":\"https:\/\/de.fi\/blog\/\",\"name\":\"De.Fi Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/de.fi\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/de.fi\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/de.fi\/blog\/#organization\",\"name\":\"De.Fi\",\"url\":\"https:\/\/de.fi\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp\",\"contentUrl\":\"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp\",\"width\":223,\"height\":234,\"caption\":\"De.Fi\"},\"image\":{\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/twitter.com\/dedotfi\",\"https:\/\/t.me\/dedotfi\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/person\/bc7c94cb5e037c8978c6059885825591\",\"name\":\"De.Fi Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/de.fi\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6f2f941b8d00bf81e01f135977bd5284977931ec40bfd2c06000150d2a6d661d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6f2f941b8d00bf81e01f135977bd5284977931ec40bfd2c06000150d2a6d661d?s=96&d=mm&r=g\",\"caption\":\"De.Fi Security\"},\"url\":\"https:\/\/de.fi\/blog\/author\/defisecurity\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Honeypot Checker Tools: Detect ETH & BSC Crypto Scams","description":"Research what a crypto honeypot is, why it's dangerous, and how to use our cutting-edge honeypot detector. \u2713 Learn more now with the De.Fi blog.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe","og_locale":"en_US","og_type":"article","og_title":"Honeypot Checker Tools: Detect ETH & BSC Crypto Scams","og_description":"Research what a crypto honeypot is, why it's dangerous, and how to use our cutting-edge honeypot detector. \u2713 Learn more now with the De.Fi blog.","og_url":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe","og_site_name":"De.Fi Blog","article_published_time":"2023-07-10T19:09:14+00:00","article_modified_time":"2023-09-25T23:42:05+00:00","og_image":[{"width":1500,"height":787,"url":"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/07\/how_to_detect_a_honeypot_.png","type":"image\/png"}],"author":"De.Fi Security","twitter_card":"summary_large_image","twitter_creator":"@dedotfi","twitter_site":"@dedotfi","twitter_misc":{"Written by":"De.Fi Security","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe#article","isPartOf":{"@id":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe"},"author":{"name":"De.Fi Security","@id":"https:\/\/de.fi\/blog\/#\/schema\/person\/bc7c94cb5e037c8978c6059885825591"},"headline":"Using a Honeypot Checker: Keep Your Crypto Safe Across 15+ EVM Chains","datePublished":"2023-07-10T19:09:14+00:00","dateModified":"2023-09-25T23:42:05+00:00","mainEntityOfPage":{"@id":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe"},"wordCount":1199,"publisher":{"@id":"https:\/\/de.fi\/blog\/#organization"},"keywords":["Defi"],"articleSection":["De.Fi Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe","url":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe","name":"Honeypot Checker Tools: Detect ETH & BSC Crypto Scams","isPartOf":{"@id":"https:\/\/de.fi\/blog\/#website"},"datePublished":"2023-07-10T19:09:14+00:00","dateModified":"2023-09-25T23:42:05+00:00","description":"Research what a crypto honeypot is, why it's dangerous, and how to use our cutting-edge honeypot detector. \u2713 Learn more now with the De.Fi blog.","breadcrumb":{"@id":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/de.fi\/blog\/honeypot-checker-keep-crypto-safe#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/de.fi\/blog\/"},{"@type":"ListItem","position":2,"name":"Using a Honeypot Checker: Keep Your Crypto Safe Across 15+ EVM Chains"}]},{"@type":"WebSite","@id":"https:\/\/de.fi\/blog\/#website","url":"https:\/\/de.fi\/blog\/","name":"De.Fi Blog","description":"","publisher":{"@id":"https:\/\/de.fi\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/de.fi\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/de.fi\/blog\/#organization","name":"De.Fi","url":"https:\/\/de.fi\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp","contentUrl":"https:\/\/de.fi\/blog\/wp-content\/uploads\/2023\/06\/spaces_XOyvZ43P03BZ8mN6KNWT_icon_1hV2Waqet2YS2jtkV0f3_Logo.webp","width":223,"height":234,"caption":"De.Fi"},"image":{"@id":"https:\/\/de.fi\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/twitter.com\/dedotfi","https:\/\/t.me\/dedotfi"]},{"@type":"Person","@id":"https:\/\/de.fi\/blog\/#\/schema\/person\/bc7c94cb5e037c8978c6059885825591","name":"De.Fi Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/de.fi\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6f2f941b8d00bf81e01f135977bd5284977931ec40bfd2c06000150d2a6d661d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6f2f941b8d00bf81e01f135977bd5284977931ec40bfd2c06000150d2a6d661d?s=96&d=mm&r=g","caption":"De.Fi Security"},"url":"https:\/\/de.fi\/blog\/author\/defisecurity"}]}},"_links":{"self":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts\/3572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/comments?post=3572"}],"version-history":[{"count":17,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts\/3572\/revisions"}],"predecessor-version":[{"id":5718,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/posts\/3572\/revisions\/5718"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/media\/3573"}],"wp:attachment":[{"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/media?parent=3572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/categories?post=3572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/de.fi\/blog\/wp-json\/wp\/v2\/tags?post=3572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}