Understanding the Token page (2024)

A token page is where on-chain and off-chain data of a token are displayed for Ethereum users' reference. The page can be overwhelming for a new or inexperienced user on their first visit to one. To understand the token page, this article will break down the token page and go through it in four different sections (Overview, Profile Summary, Public Note and Activity).

Understanding the Token page (1)

Section A: Overview

Understanding the Token page (2)
  1. Token: This is where the token logo and name are shown. The name is pulled from the token's source code while the logo is provided by the token's creator. If the creator did not submit a Token Update Request for the token, then the token's actual logo will not be displayed.
  2. Owner: This label shows the owner of the address and clicking this label will direct you to a list of other addresses owned by the owner. Kindly take note that this label is usually placed for addresses and contracts associated to major exchanges, projects or public figures of public interest.
  3. Public Label: This label shows the sector/industry/service that the address is in. Examples of other categories for the label are Exchange, Old Contract, DeFi and Stablecoin. For the full list of all available labels, visit here.
  4. Price: This is where the token's price will be shown if the token's creator has updated the token's information (for a token price to show, we require the token to be listed on either CoinMarketCap or CoinGecko).
  5. Market Cap: This shows the token's fully diluted (Total Supply x Price) and circulating supply market cap (click on the value to switch between the two types of information, see below).
    Understanding the Token page (3)
  6. Total Supply: The total supply of the token (pulled from the source code) is shown here. Clicking on the i button next to the token symbol will bring out the token's burn event history (refer to this token page for an example).
  7. Holders: This shows the total number of addresses that hold the token.
  8. Transfers: The total number of the token's transfer events is recorded here.

Section B: Profile Summary

Understanding the Token page (4)
  1. Edit: If you are the creator of the token (or an official member of the token team) and are looking to update or edit the information on this page, click here.
  2. View Dapp Page: Aside from the Token page, each contract address has their own Dapp page in which the contract creator can provide detailed information on their contract address' functionalities. A Dapp page is the same as a Token page where they need to be updated by their creator/owner first before any information can be shown.
  3. Token Reputation: This is an indicator of the token's reputation based on the criterias specified in our guide here.
  4. Blue Checkmark: The Blue Checkmark on Etherscan represents a token or project of public interest. The token page with The Blue Checkmark is also displayed first and more prominently during a search on Etherscan, prioritizing a genuine token while showing all tokens with similar names.
  5. Contract: This shows the contract address of the token.
  6. Decimals: This shows the decimal point value of the token that is derived from the token's contract.
  7. Official Site: This section leads visitors to the official website of the token/project. Kindly take note that only token pages that have been updated by their creator have this information.
  8. Social Profiles: This section provides links to all of the token's official social profiles. Similar to #7, the information in this section is only available if the token creator has submitted a token update request for the token.
  9. Check Previous Token Supply: Clicking on this will bring up the Token Balance Checker tool where you will be able to check the token's supply at any specified block number or date.
  10. Add Token to Web3 Wallet: This tool allows you to conveniently add the token into your Web3 wallet without having to manually insert the details of the token.
  11. Update Token Info: This functions the same way as #1 where clicking this will allow you to submit an information update request for the token.
  12. Update Name Tag: Click here to submit a public name tag suggestion for the token.
  13. Submit Label: Click here to submit a public label suggestion for the token.
  14. Report/Flag Address: If you believe that the token is involved in any scam, phishing or suspicious activities, click here to submit a report to us against the token.

Section C: Public Note

Understanding the Token page (5)

This usually acts as an announcement space for news that greatly affect the token such as a mainnet launch, token rebrand, cease of operation or contract address migration.

Section D: Activity

Understanding the Token page (6)
  1. Transfers: This tab shows all of the token's transfer event in chronological order.
  2. Holders: This tab shows all of the token's holders in order of their respective holding quantity/percentage.
  3. Info: Information relating to the token's token sale, market capitalisation, profitability and overview is located under this tab. The information under this tab is only available after the token creator has submitted a token update request.
  4. Exchange: This tab shows all of the token's trading pairs that are available and the exchanges that offer each trading pair.
  5. DEX Trades: This tab shows the trades of the token on DEXs sorted in chronological order.
  6. Read Contract: This tab shows the available 'Read' functions of the contract.
  7. Write Contract: This tab shows the available 'Write' functions of the contract with an option to easily connect to your Web3 wallet to interact with the token contract.
  8. Analytics: This tab shows the statistics involving the token's transfer amount, transfer count, unique receivers, unique senders and total uniques.
  9. Comments: You can post public comments related to the token on this section via Disqus. Kindly take note that the comments are moderated to filter out spam/malicious comments.
  10. Search/Filter: Use this tool to filter the transfer events by address, transaction hash or token ID. When you enter an address into this input field, only transfers involving the specified address will be shown.
Understanding the Token page (2024)

FAQs

How do I pass a token request? ›

The token is a text string, included in the request header. In the request Authorization tab, select Bearer Token from the Type dropdown list. In the Token field, enter your API key value. For added security, store it in a variable and reference the variable by name.

How do I pass an access token in authorization? ›

Authorization
  1. Step 1: Create authorization request link.
  2. Step 2: Request the user for authorization.
  3. Step 3: Exchange authorization code with access tokenpost.
  4. Step 4: Use access token for REST API requests.

How to pass the token in Jmeter? ›

Give a reference name (say accessToken), select “Field to Check” as “URL” or “Response Header” (as per application) and write the regular expression access_token=([\S]+). Use this access token (generally passes in request header) wherever is required. e.g. Authorization: Bearer ${accessToken}.

What is token in response? ›

Response tokens let you automatically output information specific to Adobe Target to your brand's web page. This information can include details about the activity, offer, experience, user profile, geo information, and more.

How to decrypt password from token? ›

  1. Navigate to the Decrypt Tool section of the Token Auth page.
  2. In the Token To Decrypt option, paste the desired token value.
  3. In the Key to Decrypt option, select the encryption key used to generate that token value.
  4. Click Decrypt. The requirements for that token will appear next to the Original Parameters label.

What is an example of a token authentication? ›

For example, gaining access to an online account by entering a code sent as a one-time password, using a fingerprint to unlock a mobile phone, and accessing a website through a Facebook login are all common examples. All authentication tokens provide users with access to a device or application.

What is access token format? ›

As said, the access token format is an agreement between the authorization server and the resource server, and the client application should not intrude.

What is token authorization code? ›

The authorization code grant is used when an application exchanges an authorization code for an access token. After the user returns to the application via the redirect URL, the application will get the authorization code from the URL and use it to request an access token.

Can access token be decoded? ›

Its contents are only meant for the authorization server, which will be able to decrypt it. You only use the refresh token to request a new access token when yours expires.

How do I validate access tokens? ›

What to Check When Validating an Access Token
  1. Retrieve and parse your Okta JSON Web Keys (JWK), which should be checked periodically and cached by your application.
  2. Decode the access token, which is in JSON Web Token format.
  3. Verify the signature used to sign the access token.

How to do token validation? ›

Manually Validating Tokens
  1. Make a call to the /publickeys endpoint to retrieve your public keys. ...
  2. Store the keys in your app cache for future use. ...
  3. Import the public key parameters. ...
  4. Verify the token's signature. ...
  5. Validate the claims that are stored in the tokens.

How do you pass a Bearer Token? ›

Sending Authorization Bearer Token Header. To send a request with the Bearer Token authorization header, you need to make an HTTP request and provide your Bearer Token in the "Authorization: Bearer {token}" HTTP header. A Bearer Token is a cryptic string typically generated by the server in response to a login request.

What are the 3 parts of token? ›

Figure 1 shows that a JWT consists of three parts: a header, payload, and signature.

What is token and how it works? ›

Tokens: The server communicates with the authentication device, like a ring, key, phone, or similar device. After verification, the server issues a token and passes it to the user. Storage: The token sits within the user's browser while work continues.

How does access token work? ›

Access tokens are used in token-based authentication to allow an application to access an API. The application receives an access token after a user successfully authenticates and authorizes access, then passes the access token as a credential when it calls the target API.

How do I know if my token is encrypted? ›

If the token is signed it will have three sections: the header, the payload, and the signature. If the token is encrypted it will consist of five parts: the header, the encrypted key, the initialization vector, the ciphertext (payload), and the authentication tag.

What does password token mean? ›

A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. One-time password tokens are often used as a part of two-factor and multifactor authentication.

What can hacker do with access token? ›

By stealing a valid code or token, the attacker may be able to access the victim's data. Ultimately, this can completely compromise their account - the attacker could potentially log in as the victim user on any client application that is registered with this OAuth service.

What is the difference between a password and a token? ›

At its core, authentication is a method for verifying that a user is who they claim to be, and used to keep bad actors out of your network. Unlike passwords, which can be easily compromised and used by hackers for data breaches, tokens are more secure. 61% of data breaches involve the use of unauthorized credentials.

Why do we use tokens? ›

The use of tokens has many benefits compared to traditional methods such as cookies. Tokens are stateless. The token is self-contained and contains all the information it needs for authentication. This is great for scalability as it frees your server from having to store session state.

What are three examples of authentication? ›

Authentication factors can be classified into three groups: something you know: a password or personal identification number (PIN); something you have: a token, such as bank card; something you are: biometrics, such as fingerprints and voice recognition.

What is access token secret? ›

An access token and access token secret are user-specific credentials used to authenticate OAuth 1.0a API requests. They specify the Twitter account the request is made on behalf of.

What does a token contain? ›

A token is composed of various fields, including: an identifier. the identifier of the associated logon session. The session is maintained by the authentication service, and is populated by the authentication packages with a collection of all the information (credentials) the user provided when logging in.

Where are access tokens stored? ›

You can store the access token and refresh token in the server-side session. The application can use web sessions to communicate with the server. The token is then available for any requests originating from server-side code. This is also known as the backend for frontend (BFF) proxy.

How do I find my token code? ›

Dial *737*7# Enter your USSD transaction PIN to receive your token code Token code is immediately displayed.

What is the 6 digit token code? ›

A token code is a six-digit number that will allow you to log into your Bloomberg Anywhere application on your mobile device.

What is token identification number? ›

Token code means the numerical code serving to verify the identity of the User within the framework of using the PB channel. The token code is provided to the User by means of the token device.

How are tokens recognized by a scanner? ›

Scanner Generation Tools

These tools normally work by taking the token definitions expressed by regular expressions and generates the source code for the scanner automatically (for this project, the tokens are especified in the language's grammar). The programmer has to add the code to handle the scanner's output.

What is the difference between access key and token? ›

The main distinction between these two is: API keys identify the calling project — the application or site — making the call to an API. Authentication tokens identify a user — the person — that is using the app or site.

What is the difference between token and access token? ›

Unlike access tokens, which are opaque objects that cannot be inspected by the application, ID tokens are meant to be inspected and used by the application. Information from the token, such as Who signed the token or the identity for whom the ID token was issued, is available for use by the application.

What is an invalid access token? ›

Authentication Failures and Invalid Tokens

Authentication failures and invalid token errors are usually due to one or more of these components being incorrect or used in the wrong combination: Account SID. API Key. API Secret.

How do you handle invalid tokens? ›

Briefly, this error occurs when the token used in Elasticsearch is invalid, which can cause issues with authentication and authorization. To resolve this issue, you can try to check the token for errors, or generate a new token.

What does validating access token mean? ›

Error validating access token: The user is enrolled in a blocking, logged-in checkpoint. This error message means that your Facebook user account has failed a security checkpoint and needs to log in at Facebook or the Facebook Business Manager to correct the issue.

What is difference between access token and Bearer Token? ›

Access tokens are credentials used to access protected resources. Access tokens are used as bearer tokens. A bearer token means that the bearer (who holds the access token) can access authorized resources without further identification. Because of this, it is important that bearer tokens be protected.

How is Bearer Token verified? ›

If using bearer tokens, verify that the request is coming from Google and is intended for the the sender domain. If the token doesn't verify, the service should respond to the request with an HTTP response code 401 (Unauthorized) . Bearer Tokens are part of the OAuth V2 standard and widely adopted by Google APIs.

What does bearer mean in token? ›

Bearer Token. A security token with the property that any party in possession of the token (a "bearer") can use the token in any way that any other party in possession of it can. Using a bearer token does not require a bearer to prove possession of cryptographic key material (proof-of-possession).

What are the 4 types of tokens? ›

Answer: The four major types include utility, payment, security, and stablecoins. There also are DeFi tokens, NFTs, and asset-backed tokens. Of all cryptocurrencies, the most common are utility and payment tokens.

What are the 6 types of tokens? ›

C Tokens are of 6 types, and they are classified as: Identifiers, Keywords, Constants, Operators, Special Characters and Strings.

How does a token get value? ›

Valuing a token

Since a token represents utility or currency in the protocol, token valuation must be based on the supply and demand for that particular protocol.

What is a token URL? ›

A token URL contains an authentication token valid for a specific time and/or a number of usages and grants access to a connection profile.

How do I pass authentication token in Chrome? ›

Here are the three steps you need to complete:
  1. Register with the provider.
  2. Add permissions for provider resources that your app will access.
  3. Get the authentication token.
Sep 17, 2012

What does it mean by request token? ›

The request token is a temporary token that tells the FamilySearch identity system that you have obtained user approval to authenticate. Later in the authentication process, the request token is exchanged, along with the OAuth Verifier, for an access token.

How do I pass basic authentication in browser? ›

We can do HTTP basic authentication URL with @ in password. We have to pass the credentials appended with the URL. The username and password must be added with the format − https://username:password@URL.

How do I pass a bearer token in my browser? ›

How to get Bearer token
  1. After signing in into Platform of Trust Sandbox , open the developer tool in your browser.
  2. Go to the Application tab. Refresh your browser tab once.
  3. You will notice an Authorization cookie appearing. ...
  4. To use in the Insomnia workspace, exclude the "Bearer " part and copy the rest of the token.

How can I get access token code? ›

How to get an access token with Authorization Code Grant
  1. Using code from Quickstart and modifying it to meet your app's needs. Quickstart generates a personalized project that contains an authorization code that you can use to implement Authorization Code Grant. ...
  2. Using refresh token methods from one of the SDKs.

Does token mean password? ›

A one-time password token (OTP token) is a security hardware device or software program that is capable of producing a single-use password or PIN passcode. One-time password tokens are often used as a part of two-factor and multifactor authentication.

How does token authentication work? ›

Token-based authentication for web APIs is the process of authenticating users or processes for applications in the cloud. The user's application sends a request to the authentication service, which confirms the user's identity and issues a token. The user is then able to access the application.

Top Articles
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 5743

Rating: 4 / 5 (41 voted)

Reviews: 80% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.