Performs a comprehensive security analysis of a smart contract token, including threat detection, security audits, and AI-powered similarity analysis.
Always review the threats array before interacting with a token.
Red flags (🔴) indicate serious security concerns.
Implement exponential backoff for 429 responses.
Results are cached server-side, but you should also cache on your end to minimize API calls.
Ensure contract addresses are valid before sending requests to avoid wasting API quota.
API key for authentication. Get your free API key at dashboard.eva-ai.io
Chain ID of the blockchain network. Supported chains: 1 (Ethereum), 10 (Optimism), 25 (Cronos), 56 (BSC), 130 (Unichain), 137 (Polygon), 143 (Monad), 146 (Sonic), 324 (zkSync), 1101 (Polygon zkEVM), 2741 (Abstract), 8453 (Base), 42161 (Arbitrum One), 42170 (Arbitrum Nova), 42220 (Celo), 43114 (Avalanche), 80094 (Berachain), 81457 (Blast)
1, 10, 25, 56, 130, 137, 143, 146, 324, 1101, 2741, 8453, 42161, 42170, 42220, 43114, 80094, 81457 Contract address (checksummed or lowercase)
Successful analysis response
Current owner address or 'HIDDEN' if renounced
"HIDDEN"
Contract address
"0x00e22ed2c31875abaa34ed0659acb76734b9540d"
Token symbol
"TEKE"
Token name
"Akhal Teke"
Chain ID
"56"
Token decimals
"18"
Total token supply in wei
"30000000000000000000000000"
Contract name from source code
"TEKE"
Whether contract is a proxy
false
Token deployment timestamp in milliseconds
1764063134000
Last analysis timestamp in milliseconds
1767810740203
Deployment information for the token contract
Array of detected security threats. Common threats include 'Honeypot' (contract designed to trap funds) and 'Shypooning' (malicious behavior allowing fund manipulation), but other threat types may be detected.
["Honeypot", "Shypooning"]Security audit results
Array of up to 5 similar tokens detected through AI analysis (limited from full dataset)
5