Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
DPI / WETHuniswap_v20x4d5e...999167.9260297866497
DPI / WETH 0.3%uniswap_v30x9359...6ca768.1010234659353
DPI / WETHsushiswap0x34b1...c7ed67.8680999016309
DPI / WBTC / WETH 0.5%balancer_ethereum0x61d5...c7fd69.0706186219781
DPI / FEIsushiswap0x8775...b52867.9482907020085
DPI / CROdefi_swap0x456a...548168.1171715614754
DPI / WETHdefi_swap0x7161...a18d70.1354329466169
DPI / WETH 1%uniswap_v30x5441...ebc7102.936611986349
DPI / PKGuniswap_v20x2f82...a2a181.3750349614
DPI / USDCuniswap_v20xf298...36aa63.6774944827
DPI / AMISuniswap_v20x4c57...057088.6192839786
DPI / [invalid]uniswap_v20x617b...ee83107.0470205683
DPI / WSTAsushiswap0xccc6...deb568.445915502484

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners