Honeypot Detector for BSC


 
Token Name
Token Symbol
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Checking for Honeypot: Trading is closed
Error: Wrong response id 6e88526c-3a79-4a0c-91a1-bf8dd952376d (expected: 5) in {"jsonrpc":"2.0","id":5,"method":"eth_call","params":[{"to":"0x2bf75fd2fab5fc635a4c6073864c708dfc8396fc","from":"0x8894e0a0c962cb723c1976a4421c95949be2d4e3","value":"0x16345785d8a0000","gas":"0x2aea540","data":"0xd66383cb000000000000000000000000ee5427bc0d2da1a3f752833120b77ccd5abb850f"},"latest"]}
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token

Be Careful

Liquidity -
License -
Contract
-
Ownership -
Contract
0xee5427bc0d2da1a3f752833120b77ccd5abb850f
Burned -
Burn / Mint -
Ratio -
Useful Links -


How does it work? Honeypot Detector

Generally, a honeypot detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners