- Home
- Rug Checker
- Core
Core Rug Checker, Honeypot Detector & Token Scanner
Free Core rug pull detector and honeypot scanner. Check any Core token for scams, security vulnerabilities, liquidity locks, and contract risks. Get instant security analysis.
Search by token name, symbol, or contract address on Core
Core Token Security Checks & Rug Pull Detection
Our Core scanner performs comprehensive security analysis
Liquidity Lock Detection
Verify if liquidity is locked on Core and check lock duration to assess rug pull risk.
Honeypot Scanner
Simulate transactions on Core to detect honeypot tokens that prevent selling.
Contract Security
Analyze Core contract code for dangerous functions and permissions.
Holder Distribution
Check top holder concentration on Core to identify centralization risks.
How to Use the Core Rug Checker
Enter Token Information
Paste the Core token contract address, name, or symbol in the search box above.
Get Instant Analysis
Our Core scanner analyzes the token contract, liquidity, and holder data in real-time.
Review Security Report
Get a detailed security score and breakdown of all potential risks including rug pull indicators.
About Core Token Security
Core is a Bitcoin-powered L1 using the unique Satoshi Plus consensus, which combines Delegated Proof of Work (Bitcoin miners delegate hash power) with Delegated Proof of Stake. CORE token holders can stake to earn rewards while Bitcoin miners simultaneously validate the network. The chain has attracted $500M+ in TVL through non-custodial BTC staking (coreBTC) and EVM-compatible DeFi including SushiSwap, Colend, and Shadow Exchange. Its Bitcoin staking narrative creates specific scam vectors around fake BTC delegation rewards and Satoshi Plus validator impersonation.
Common Core Scam Types
Core Security FAQ
Are Core chain tokens safe?
Core's Bitcoin staking model is innovative, but tokens claiming staking rewards or validator benefits may be fraudulent. Verify through official Core channels.
What Core-specific risks should I know?
Scams often exploit the Bitcoin staking narrative — fake delegation rewards, impersonation of the Satoshi Plus consensus, and fraudulent yield tokens.
How do I check Core tokens?
Our scanner analyzes Core tokens for all standard EVM security risks. Additionally verify any staking or consensus-related claims through official Core documentation.
How do fake Satoshi Plus staking scams work?
Scammers deploy tokens claiming to offer "enhanced Satoshi Plus staking yields" or "delegated BTC mining rewards" beyond what the official protocol provides. Legitimate Core staking happens only through the official stake.coredao.org interface. Our scanner flags tokens promising Core staking multipliers or Bitcoin mining delegation rewards that aren't connected to the official Core staking contract addresses.
What coreBTC bridge scams should I watch for?
Core's non-custodial Bitcoin bridge (coreBTC) lets users bring BTC on-chain for DeFi. Scammers deploy counterfeit coreBTC tokens or fake bridge interfaces that steal Bitcoin deposits. The real coreBTC is minted only through Core's official bridge contract. Our scanner verifies whether BTC-named tokens on Core were minted through the legitimate bridge and flags independently deployed tokens impersonating coreBTC.
Check Other Blockchains
Scan tokens across 40+ blockchains
Important Disclaimer
This Core rug checker and honeypot detector are provided for informational purposes only. While our tools strive for accuracy, no scanner can guarantee 100% detection of scams. Always conduct your own research (DYOR) and never invest more than you can afford to lose.

