Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
CELL / WETHuniswap_v20x9c4c...1f320.249464666356944
CELL / USDT 1%uniswap_v30x0886...3fff0.248799190765052
CELL / WETH 0.3%uniswap_v30xe6a2...5aad0.252494165616363
CELL / KEL 0.3%uniswap_v30xc788...5ddc0.250770381731963
CELL / USDCuniswap_v20xf226...67d90.246419690050048
CELL / DAIuniswap_v20x722b...69a70.251292062033313
CELL / USDTuniswap_v20xdd75...45f90.243750798666399
CELL / USDC 1%uniswap_v30x9081...940d0.246876424471092
KEL / CELLuniswap_v20xf484...8eab0.243896918534695
CELL / DAI 1%uniswap_v30xbced...8e9a0.243964919116165
CELL / USDC 0.3%uniswap-v4-ethereum0xd325...69d30.3485600494
CELL / WETH 0.05%uniswap_v30xe9ba...f5b00.264563520398537

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners