Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
CELL / WETHuniswap_v20x9c4c...1f320.380821669299596
CELL / USDT 1%uniswap_v30x0886...3fff0.386463532613577
CELL / WETH 0.3%uniswap_v30xe6a2...5aad0.391220737990673
KEL / CELLuniswap_v20xf484...8eab0.38362035681212
CELL / KEL 0.3%uniswap_v30xc788...5ddc0.390773324693095
CELL / USDTuniswap_v20xdd75...45f90.364821545104793
CELL / USDCuniswap_v20xf226...67d90.364646344652329
CELL / DAIuniswap_v20x722b...69a70.39096163069332
CELL / DAI 1%uniswap_v30xbced...8e9a0.3688139861951
CELL / USDC 1%uniswap_v30x9081...940d0.375020827162615
CELL / WETH 1%uniswap_v30x78c9...83ea0.00000000000000000000000000000000000547004058884271
CELL / WETH 0.05%uniswap_v30xe9ba...f5b00.264563520398537

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners