Teach you a trick <How to Identify Malicious Tokens>.

Generally, for malicious tokens, there are few token pairs for transactions, low transaction volume and shallow transaction pool depth, which are usually problematic. You can check it on the blockchain browser.