- Home
- Rug Checker
- Sonic
Sonic Rug Checker, Honeypot Detector & Token Scanner
Free Sonic rug pull detector and honeypot scanner. Check any Sonic token for scams, security vulnerabilities, liquidity locks, and contract risks. Get instant security analysis.
Search by token name, symbol, or contract address on Sonic
Sonic Token Security Checks & Rug Pull Detection
Our Sonic scanner performs comprehensive security analysis
Liquidity Lock Detection
Verify if liquidity is locked on Sonic and check lock duration to assess rug pull risk.
Honeypot Scanner
Simulate transactions on Sonic to detect honeypot tokens that prevent selling.
Contract Security
Analyze Sonic contract code for dangerous functions and permissions.
Holder Distribution
Check top holder concentration on Sonic to identify centralization risks.
How to Use the Sonic Rug Checker
Enter Token Information
Paste the Sonic token contract address, name, or symbol in the search box above.
Get Instant Analysis
Our Sonic scanner analyzes the token contract, liquidity, and holder data in real-time.
Review Security Report
Get a detailed security score and breakdown of all potential risks including rug pull indicators.
About Sonic Token Security
Sonic (the evolution of Fantom) delivers 10,000+ TPS with sub-second finality using an improved Lachesis aBFT consensus mechanism. The chain introduced S tokens (replacing FTM) and a unique fee monetization model where dApp developers earn up to 90% of gas fees generated by their contracts. The ecosystem includes SpookySwap, Beethoven X, and new native protocols. The FTM-to-S migration and rebranding period creates significant confusion that scammers exploit with fake migration tools and bridge interfaces.
Common Sonic Scam Types
Sonic Security FAQ
Is Sonic safe after the Fantom migration?
Sonic itself is a legitimate chain evolution, but the migration created opportunities for scammers. Be cautious of any token claiming to facilitate migration or offering migration rewards.
What risks are unique to Sonic?
The Fantom-to-Sonic transition creates confusion that scammers exploit. Fake migration tokens, bridge scams, and legacy token impersonation are common risks.
How do I verify Sonic tokens?
Use our scanner for comprehensive security analysis. For migration-related tokens, only use official Sonic channels and bridges. Never trust unsolicited migration token offers.
How do FTM-to-S migration scams work?
Scammers deploy fake "FTM Migration" or "Sonic Swap" tokens that claim to convert your FTM to S tokens. The legitimate migration only happens through the official Sonic Gateway at sonic.fantom.network. Any token or contract asking you to send FTM to receive S outside this portal is fraudulent. Our scanner flags migration-themed tokens from unverified deployers with suspicious contract functions.
What fee monetization scams appear on Sonic?
Sonic's unique developer fee-sharing model (devs earn 90% of gas fees) attracts scammers who deploy honeypot dApps designed to generate gas fees from failed transactions. They create contracts that encourage repeated interactions but always revert, pocketing the gas fees. Our scanner identifies contracts with abnormally high revert rates and those with fee-extraction patterns disguised as legitimate dApp interactions.
Check Other Blockchains
Scan tokens across 40+ blockchains
Important Disclaimer
This Sonic rug checker and honeypot detector are provided for informational purposes only. While our tools strive for accuracy, no scanner can guarantee 100% detection of scams. Always conduct your own research (DYOR) and never invest more than you can afford to lose.

