{"id":3210,"date":"2023-10-12T15:51:38","date_gmt":"2023-10-12T15:51:38","guid":{"rendered":"https:\/\/omniatech.io\/pages\/?p=3210"},"modified":"2023-11-03T09:36:49","modified_gmt":"2023-11-03T09:36:49","slug":"why-use-token-honeypot-protection","status":"publish","type":"post","link":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/","title":{"rendered":"Why use Honeypot Protection"},"content":{"rendered":"<span class=\"rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\">2<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span>\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"288\" src=\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png\" alt=\"\" class=\"wp-image-3249\" style=\"aspect-ratio:1.7777777777777777;width:636px;height:auto\" srcset=\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png 512w, https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4-300x169.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:36px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>First of all, what is a honeypot?<\/strong><\/p>\n\n\n\n<p>Simply put, in the cryptocurrency realm, a honeypot represents a digital asset that can be bought but never sold.<br>More often than not, a honeypot is the attack vector of scammers, rug-pull actors and hackers trying to deploy various phishing scenarios in deceipting people to buy a specific ERC20 token in an attempt to steal their funds.<\/p>\n\n\n\n<p><strong>How risky is it?<\/strong><\/p>\n\n\n\n<p>The consequences of being a honeypot victim are as high as possible &#8211; it is equivalent to losing funds in a non-recoverable way.&nbsp;The reason why nothing can be done after such an attack is the fact that at that point &#8211; after buying such a malicious token &#8211; the attacker has complete control over your funds, and you\u2019ll be left with a worthless token.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"512\" height=\"284\" src=\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-5.png\" alt=\"\" class=\"wp-image-3250\" style=\"aspect-ratio:1.8028169014084507;width:640px;height:auto\" srcset=\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-5.png 512w, https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-5-300x166.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><figcaption class=\"wp-element-caption\">                                       Source: Chainalysis Crypto Crime Report 2023<\/figcaption><\/figure>\n\n\n\n<p><strong>How can I protect myself ?<\/strong><strong><br><\/strong>First of all, be very cautious about what is presented to you as \u201cinvestment opportunities\u201d, especially if you observe unnecessary pressure (time related, in most of the cases) to buy, trade or acquire a digital asset &#8211; be it native chain currency, token or NFT.&nbsp; Scammers and malicious actors are frequently using time pressure to create \u201cfear of missing out\u201d a.k.a FOMO, and to make their victims suspend their critical thinking.<br>While there are tools that can be used to perform security checks and due diligence, these are either too technical for most of the people or require expensive subscriptions that are prohibitive for majority of crypto users.&nbsp;<\/p>\n\n\n\n<p><strong><br><\/strong>The good news is that OMNIA has integrated such tools directly in the RPC endpoints such that users don\u2019t need to do anything too complex &#8211; they are protected by default against honeypot protection if they enabled these options with just a simple checkbox when generating their private endpoint.<br><br><strong>Important<\/strong>: OMNIA\u2019s public RPCs don\u2019t have this option enabled by default.<br>If you want to enable honeypot protection, head to OMNIA dashboard<a href=\"http:\/\/app.omniatech.io\/\"> app.omniatech.io<\/a> and generate your private endpoint for the chain &amp; network you want. Don\u2019t forget to tick the Honeypot protection checkbox when customizing the subscription.<br><br>In case of detection of such a malicious activity like interacting with a honeypot ERC20 smart contract, the RPC will not process that transaction to protect your funds and will return a dedicated error code.<\/p>\n\n\n\n<p>More information can be found at <a href=\"https:\/\/docs.omniatech.io\/defi\/honeypot-protection\">https:\/\/docs.omniatech.io\/defi\/honeypot-protection<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\"><\/span> <span class=\"rt-time\">2<\/span> <span class=\"rt-label rt-postfix\">min read<\/span><\/span> First of all, what is a honeypot? Simply put, in the cryptocurrency realm, a honeypot represents a digital asset that can be bought but never sold.More often than not, a honeypot is the attack vector of scammers, rug-pull actors and hackers trying to deploy various phishing scenarios in deceipting people to buy a specific ERC20 [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":3249,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[795,798,794],"tags":[53,414,810,9,411],"class_list":["post-3210","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-compliance","category-defi-tokenomics","category-privacy-security","tag-defi","tag-defi-attacks","tag-honeypot","tag-web3","tag-web3-security"],"acf":[],"wbAuthor":{"name":"Omnia Team","link":"https:\/\/omniatech.io\/pages\/author\/omniaprotocol\/"},"wbDate":"Oct 12, 2023","wbCategories":{"space":"<a href=\"https:\/\/omniatech.io\/pages\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a> <a href=\"https:\/\/omniatech.io\/pages\/category\/defi-tokenomics\/\" rel=\"category tag\">DeFi &amp; Tokenomics<\/a> <a href=\"https:\/\/omniatech.io\/pages\/category\/privacy-security\/\" rel=\"category tag\">Privacy &amp; Security<\/a>","coma":"<a href=\"https:\/\/omniatech.io\/pages\/category\/compliance\/\" rel=\"category tag\">Compliance<\/a>, <a href=\"https:\/\/omniatech.io\/pages\/category\/defi-tokenomics\/\" rel=\"category tag\">DeFi &amp; Tokenomics<\/a>, <a href=\"https:\/\/omniatech.io\/pages\/category\/privacy-security\/\" rel=\"category tag\">Privacy &amp; Security<\/a>"},"wbComment":0,"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Token Honeypot Protection<\/title>\n<meta name=\"description\" content=\"Protect yourself against honeypot ERC20 tokens that can be bought but never sold. OMNIA RPC performs on-the-fly checks and halts the transaction when interacting with such a malicious token.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Token Honeypot Protection\" \/>\n<meta property=\"og:description\" content=\"Protect yourself against honeypot ERC20 tokens that can be bought but never sold. OMNIA RPC performs on-the-fly checks and halts the transaction when interacting with such a malicious token.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"OMNIA\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-12T15:51:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-03T09:36:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"288\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Omnia Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Omnia Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/\",\"url\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/\",\"name\":\"Token Honeypot Protection\",\"isPartOf\":{\"@id\":\"https:\/\/omniatech.io\/pages\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png\",\"datePublished\":\"2023-10-12T15:51:38+00:00\",\"dateModified\":\"2023-11-03T09:36:49+00:00\",\"author\":{\"@id\":\"https:\/\/omniatech.io\/pages\/#\/schema\/person\/5265002cadcebfc0cfca31054160d57d\"},\"description\":\"Protect yourself against honeypot ERC20 tokens that can be bought but never sold. OMNIA RPC performs on-the-fly checks and halts the transaction when interacting with such a malicious token.\",\"breadcrumb\":{\"@id\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#primaryimage\",\"url\":\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png\",\"contentUrl\":\"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png\",\"width\":512,\"height\":288},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/omniatech.io\/pages\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why use Honeypot Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/omniatech.io\/pages\/#website\",\"url\":\"https:\/\/omniatech.io\/pages\/\",\"name\":\"OMNIA\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/omniatech.io\/pages\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/omniatech.io\/pages\/#\/schema\/person\/5265002cadcebfc0cfca31054160d57d\",\"name\":\"Omnia Team\",\"url\":\"https:\/\/omniatech.io\/pages\/author\/omniaprotocol\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Token Honeypot Protection","description":"Protect yourself against honeypot ERC20 tokens that can be bought but never sold. OMNIA RPC performs on-the-fly checks and halts the transaction when interacting with such a malicious token.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/","og_locale":"en_US","og_type":"article","og_title":"Token Honeypot Protection","og_description":"Protect yourself against honeypot ERC20 tokens that can be bought but never sold. OMNIA RPC performs on-the-fly checks and halts the transaction when interacting with such a malicious token.","og_url":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/","og_site_name":"OMNIA","article_published_time":"2023-10-12T15:51:38+00:00","article_modified_time":"2023-11-03T09:36:49+00:00","og_image":[{"width":512,"height":288,"url":"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png","type":"image\/png"}],"author":"Omnia Team","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Omnia Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/","url":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/","name":"Token Honeypot Protection","isPartOf":{"@id":"https:\/\/omniatech.io\/pages\/#website"},"primaryImageOfPage":{"@id":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#primaryimage"},"image":{"@id":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png","datePublished":"2023-10-12T15:51:38+00:00","dateModified":"2023-11-03T09:36:49+00:00","author":{"@id":"https:\/\/omniatech.io\/pages\/#\/schema\/person\/5265002cadcebfc0cfca31054160d57d"},"description":"Protect yourself against honeypot ERC20 tokens that can be bought but never sold. OMNIA RPC performs on-the-fly checks and halts the transaction when interacting with such a malicious token.","breadcrumb":{"@id":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#primaryimage","url":"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png","contentUrl":"https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png","width":512,"height":288},{"@type":"BreadcrumbList","@id":"https:\/\/omniatech.io\/pages\/why-use-token-honeypot-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/omniatech.io\/pages\/"},{"@type":"ListItem","position":2,"name":"Why use Honeypot Protection"}]},{"@type":"WebSite","@id":"https:\/\/omniatech.io\/pages\/#website","url":"https:\/\/omniatech.io\/pages\/","name":"OMNIA","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/omniatech.io\/pages\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/omniatech.io\/pages\/#\/schema\/person\/5265002cadcebfc0cfca31054160d57d","name":"Omnia Team","url":"https:\/\/omniatech.io\/pages\/author\/omniaprotocol\/"}]}},"uagb_featured_image_src":{"full":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png",512,288,false],"thumbnail":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4-150x150.png",150,150,true],"medium":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4-300x169.png",300,169,true],"medium_large":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png",512,288,false],"large":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png",512,288,false],"1536x1536":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png",512,288,false],"2048x2048":["https:\/\/omniatech.io\/pages\/wp-content\/uploads\/2023\/11\/unnamed-4.png",512,288,false]},"uagb_author_info":{"display_name":"Omnia Team","author_link":"https:\/\/omniatech.io\/pages\/author\/omniaprotocol\/"},"uagb_comment_info":0,"uagb_excerpt":"2 min read First of all, what is a honeypot? Simply put, in the cryptocurrency realm, a honeypot represents a digital asset that can be bought but never sold.More often than not, a honeypot is the attack vector of scammers, rug-pull actors and hackers trying to deploy various phishing scenarios in deceipting people to buy&hellip;","mfb_rest_fields":["wbAuthor","wbDate","wbCategories","wbComment","yoast_head","yoast_head_json","uagb_featured_image_src","uagb_author_info","uagb_comment_info","uagb_excerpt"],"_links":{"self":[{"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/posts\/3210"}],"collection":[{"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/comments?post=3210"}],"version-history":[{"count":4,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/posts\/3210\/revisions"}],"predecessor-version":[{"id":3251,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/posts\/3210\/revisions\/3251"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/media\/3249"}],"wp:attachment":[{"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/media?parent=3210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/categories?post=3210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/omniatech.io\/pages\/wp-json\/wp\/v2\/tags?post=3210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}