Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
LEO / WETHuniswap_v20x523a...85cd9.71481882227211
LEO / ETH 40%uniswap-v4-ethereum0xe2cd...df9f11.0883614753
LEO / ZIK 1%uniswap_v30x16f2...f9228.9493078635
LEO / WETH 1%uniswap_v30x758a...42cd9.82817151469376
LEO / ZIK 1%uniswap-v4-ethereum0xd201...716c9.83044478286155
LEO / ETH 41%uniswap-v4-ethereum0x53e1...db8c5.4695060619
LEO / sUSDe 5%uniswap-v4-ethereum0x8b19...ba7311.1085962928
LEO / ETH 0.3%uniswap-v4-ethereum0x4f03...015c9.7412405529
LEO / ABDS 1%uniswap_v30x6802...5e009.6183113092
LEO / ABDS 0.3%uniswap-v4-ethereum0x1bd4...510e11.7600430864

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners