Features

7 detection modules. Response before the crowd reacts.

The site-v2 features surface focuses on concrete detection modules, readable methods, and workflow fit instead of vague scanner claims. The hot path stays deterministic and built for early operator decisions.

Honeypot detectionBytecode analysis + asymmetry signals

Deterministic pattern matching on bytecode plus buy and sell asymmetry signals to catch contracts designed to trap capital before they execute.

Rug pull indicatorsLiquidity + ownership + deployer history

Flags liquidity withdrawal behavior, ownership concentration, and deployer coordination patterns tied to high-probability rug pulls.

Abusive fee structuresFee parameter anomaly detection

Tracks fee parameter anomalies in pending transactions to surface contracts that can weaponize tax settings after deployment.

Malicious proxy patternsProxy delegation analysis

Detects proxy contracts delegating to suspicious or unverified implementations before they can be used as upgradeable traps.

Blacklisted address matchingThreat registry cross-reference

Cross-references pending actors against known malicious deployers and wallet clusters to raise the review threshold earlier.

Infinite mint patternsSupply manipulation signals

Looks for supply manipulation behaviors in pending calls that could be used to mint into liquidity and destroy exit conditions.

Suspicious deployer historyHistorical address scoring

Scores deployers based on previous launches, funding sources, and linked activity so recurring bad actors enter the pipeline already escalated.

Access path

Get early access to Voidnaut.

Access is currently by request. If your workflow fits any of the tiers above, reach out and we will follow up with availability and next steps.

Voidnaut Features | Predictive Mempool Security