Shepley Capital

RISKS & SCAMS

Risks and Scams - Cryptopedia by Shepley Capital

What Is a Honeypot Scam in Crypto?

One of the most insidious scams in the cryptocurrency space does not steal your money outright. It tricks you into handing it over willingly. A honeypot scam is a crypto token designed to look like a legitimate investment opportunity. You can buy it. You cannot sell it. By the time you realise what has happened, the scammers have already taken the liquidity and disappeared.

Understanding how honeypot scams work, how to recognise them and how to protect yourself is essential for anyone participating in decentralised finance (DeFi), trading on a decentralised exchange (DEX) or buying newly launched tokens. This guide covers everything you need to know.

 

What Is a Honeypot Scam?

A honeypot scam is a fraudulent cryptocurrency token created with malicious code embedded in its smart contract. The smart contract is programmed to allow purchases but block or restrict all sell transactions. Investors who buy the token are effectively trapped: their funds are locked in a token they can never convert back to cryptocurrency of value.

The term comes from the concept of a honeypot trap: something that looks attractive and draws you in, only to capture you. In crypto, the bait is usually a token showing rapid price gains, social media hype and apparent trading volume that makes it look like a legitimate opportunity.

Honeypot scams are most commonly found in the DeFi ecosystem, particularly among newly launched tokens on decentralised exchanges (DEXs). They are especially prevalent in the meme coin space, where speculative trading is common and due diligence is often minimal.

 

How Honeypot Scams Work

The mechanics of a honeypot scam rely on a maliciously coded smart contract on the blockchain. Here is the typical sequence of events.

First, the scammer deploys a new token with a smart contract that contains hidden restrictions. The contract appears standard on the surface but includes code that prevents sell transactions from being approved, or limits selling to specific wallet addresses controlled by the scammer.

Second, the scammer creates artificial hype. This typically involves promoting the token on social media, messaging apps and forums, often using bots to simulate trading volume and price action. The token appears to be rapidly appreciating, attracting real investors seeking early gains.

Third, real investors buy the token through a DEX using Ethereum or another cryptocurrency. The purchase transaction succeeds. The token arrives in their wallet.

Fourth, when investors attempt to sell the token to take profits, the smart contract rejects the transaction. The sell fails. In some cases, the failure is silent: the transaction uses up gas fees but nothing executes.

Fifth, once enough capital has been trapped in the token, the scammer removes the liquidity from the trading pool, taking all the cryptocurrency that buyers deposited. This is called a rug pull, and it leaves the honeypot token worthless. Investors are left holding tokens with no buyer and no exit.

 

Types of Honeypot Scams in Crypto

Honeypot scams take several forms across the DeFi and broader cryptocurrency ecosystem.

Token honeypots are the most common. A new token is launched with malicious transfer restrictions in the smart contract. Buys are permitted but sells are blocked. The scammer controls the only wallets with sell permissions.

DeFi protocol honeypots target more sophisticated users. A fake DeFi protocol or yield farming contract is deployed with apparently attractive returns. When users deposit cryptocurrency, the smart contract traps their funds and prevents withdrawal.

Wallet address honeypots exploit a different vulnerability. Scammers seed a wallet with a small amount of cryptocurrency and post the seed phrase publicly, making it appear like a mistake. Anyone who tries to sweep the wallet by importing the seed phrase finds the cryptocurrency is inaccessible due to insufficient gas fees, and in the process of sending more crypto to cover gas, they are robbed.

NFT honeypots operate similarly to token honeypots. A collection of NFTs is promoted with apparent trading activity and floor price appreciation. When collectors try to list their NFTs for sale, the smart contract prevents the listing or transfer.

 

Warning Signs of a Honeypot Token

Learning to recognise the warning signs of a honeypot before buying is the best form of protection. Here are the key red flags.

Rapid price appreciation with no sell pressure. If a token is only going up and there appear to be no sellers, this is a significant warning sign. In legitimate markets, rising prices attract profit-takers. If you cannot find evidence of successful sell transactions in the blockchain explorer, be extremely cautious.

No independent smart contract audit. Legitimate token projects in DeFi commission security audits from reputable firms. Unaudited contracts are a major red flag, especially for new tokens.

Anonymous or unverifiable team. If the project founders have no verifiable identity, no prior track record and no clear accountability, the risk of fraud is substantially elevated. This is particularly important for tokens being promoted aggressively on social media.

Unusual tokenomics. If the project has an unusually high percentage of the total supply held by a few wallets, or the team allocation is very large, the scammer has positioned themselves to dump after the honeypot is sprung. Research the tokenomics of any project before investing.

Tax functions in the contract. Some honeypot contracts set the sell tax to 100 per cent, effectively making it impossible to sell at any price. High or unusual tax functions in a smart contract are a major warning sign.

Locked or concentrated liquidity. Very low liquidity pools make it trivial for the deployer to remove liquidity quickly. If the liquidity is low relative to the market cap, or is held in the deployer wallet rather than a time-locked contract, this is a serious risk factor.

 

How to Check If a Token Is a Honeypot

Before buying any new cryptocurrency token, particularly on a DEX, run the following checks.

Use a honeypot checker tool. Several on-chain analysis tools can simulate a buy and sell transaction against a smart contract without actually executing it, revealing whether the contract will allow a sell to succeed.

Check the blockchain explorer. Look at the token contract on a blockchain explorer. Check the transaction history: are there successful sell transactions from multiple different wallets? If all the selling appears to come from one or two addresses, that is suspicious.

Read the contract code. If you can read Solidity (the programming language for Ethereum smart contracts), look for functions that block transfers, modify sell taxes or whitelist specific addresses. If you cannot read code, stick to audited projects.

Assess the holder distribution. A high concentration of tokens in the deployer wallet or a few related wallets is a red flag. Legitimate projects distribute tokens more broadly.

Apply the DYOR (do your own research) principles consistently. Our guide on researching altcoins provides a detailed framework for evaluating any new token before committing funds.

 

How to Protect Yourself From Honeypot Scams

The best protection against honeypot scams is a combination of education, scepticism and disciplined risk management.

Never buy unaudited tokens without thoroughly checking the contract. If a project has not published an independent security audit, the risk of the contract containing malicious code is substantially higher.

Always verify on a blockchain explorer before buying. Check that real users are successfully selling the token, not just buying. Absence of sells from non-team wallets is a major warning sign.

Limit your exposure to high-risk tokens. If you choose to participate in early-stage token trading on DEXs, only allocate amounts you are fully prepared to lose entirely. Honeypot victims can lose 100 per cent of the funds they committed.

Use a separate wallet for speculative trading. Do not connect your primary cryptocurrency wallet holding significant funds to unknown DeFi protocols or new token contracts. A dedicated burner wallet limits your exposure.

Be sceptical of social media hype. Honeypot scammers rely on manufactured urgency and FOMO to drive purchases before victims have time to check the contract. If a token is being aggressively promoted on Telegram, Twitter or TikTok with claims of imminent massive gains, treat this as a reason for caution, not excitement. Our broader guide on how to avoid crypto scams covers this in detail.

 

What to Do If You Are Caught in a Honeypot

If you believe you have purchased a honeypot token and cannot sell, here is what to do.

First, stop investing more. Do not attempt to buy more of the token hoping to average down or solve the problem. Do not send additional cryptocurrency to the token address. This will only increase your losses.

Second, document everything. Take screenshots of all transactions, the token contract address, the platform you used and any promotional material you received. This documentation may be useful if you choose to report the scam.

Third, report the scam. In Australia, crypto fraud can be reported to the Australian Cyber Security Centre (ACSC) and ASIC. While recovery is extremely unlikely, reporting helps authorities track patterns and may protect other investors.

Fourth, understand the tax implications. Capital losses on cryptocurrency investments, including honeypot losses, may be used to offset capital gains under ATO rules. The funds are not recoverable, but recording the loss correctly under cryptocurrency tax in Australia guidelines may provide some tax relief. Consult a registered tax agent familiar with crypto CGT to understand your specific situation.

Finally, use the experience to sharpen your process. Every scam victim who survives it and learns from it becomes a significantly more rigorous investor. Apply the lessons to your future due diligence.

 

Honeypot Scams in the Context of Broader Crypto Risk

Honeypot scams are one category in a broader landscape of crypto fraud. Other common scams include rug pulls, phishing attacks, fake exchanges, Ponzi schemes and social engineering attacks. Our guide on how to avoid crypto scams provides a comprehensive overview of the full spectrum of threats.

The DeFi ecosystem, despite its genuine innovation, has become a major vector for fraud precisely because it is permissionless. Anyone can deploy a token. Anyone can list it on a DEX. There is no central authority checking smart contracts before they go live. This is both the strength and the vulnerability of the system.

For investors, the implication is clear: in a permissionless system, the responsibility for due diligence rests entirely on you. No regulator, exchange or platform will protect you from a well-constructed honeypot. Education and discipline are your only defences.

Members of the Shepley Capital community receive regular intelligence on active scam patterns, high-risk tokens and emerging fraud techniques in the DeFi space. If you want to stay ahead of evolving threats while still participating in legitimate crypto opportunities, explore our membership tiers for access to curated market intelligence and risk analysis.

WRITTEN & REVIEWED BY Chris Shepley

UPDATED: MARCH 2026

Choose your next topic from our Cryptopedia​