Honeypot Detector for BSC


 
Token Name
Token Symbol
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Checking for Honeypot: Trading is closed
Error: Wrong response id 60e0d01e-16eb-4b20-a596-0875135fef4f (expected: 5) in {"jsonrpc":"2.0","id":5,"method":"eth_call","params":[{"to":"0x2bf75fd2fab5fc635a4c6073864c708dfc8396fc","from":"0x8894e0a0c962cb723c1976a4421c95949be2d4e3","value":"0x16345785d8a0000","gas":"0x2aea540","data":"0xd66383cb0000000000000000000000004afac7dc74e0cd54659b02c7474acdde4d17d140"},"latest"]}
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token

Be Careful

Liquidity -
License -
Contract
-
Ownership -
Contract
0x4afac7dc74e0cd54659b02c7474acdde4d17d140
Burned -
Burn / Mint -
Ratio -
Useful Links -


How does it work? Honeypot Detector

Generally, a honeypot detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners