Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
API3 / WETHuniswap_v20x4dd2...e8c40.506042526564544
API3 / WETH 0.3%uniswap_v30x4958...6ba20.506775759078568
API3 / WETHsushiswap0xa8ae...0e610.506954984347571
SOTU / API3uniswap_v20x6059...9c2b0.498899627005564
API3 / KABOSUuniswap_v20xcb77...1ee30.515272600310987
API3 / USDT 0.3%uniswap-v4-ethereum0xd585...2b860.6294640236
API3 / USDCuniswap_v20x04a3...3b4c0.5828521002
API3 / DAIsushiswap0xdedc...a7090.7959006786
API3 / UNIsushiswap0xb6eb...04b10.9958371811
API3 / USDTuniswap_v20x09a3...3c040.9531102341
API3 / COMPsushiswap0x6143...26ee0.7349974426
API3 / APEsushiswap0x2e51...c4ee0.5458634215
API3 / WETH 1%uniswap_v30x05a9...b73f1.7089139443

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners