Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
NVDAon / USDC 1%uniswap_v30xf529...bc7a176.6845121075
NVDAon / USDC 0.3%uniswap_v30xc9b4...3a46173.7377150754
NVDAon / ZIKuniswap_v20xea0f...b3d0175.6907910662
NVDAon / ZIK 1%uniswap-v4-ethereum0xeb35...db39176.6487262535
NVDAon / ETH 50%uniswap-v4-ethereum0x0208...9c9d115.1057451126
NVDAon / ZIK 1%uniswap_v30x758c...dbeb188.1270265757
NVDAon / ETH 88%uniswap-v4-ethereum0x1373...fced1498.7722824949
NVDAon / USDT 50%uniswap-v4-ethereum0x36b0...a770166.1182697981
NVDAon / ETH 80%uniswap-v4-ethereum0xce0d...69991175.9771531181
NVDAon / ETH 75%uniswap-v4-ethereum0xa7ac...4aab1056.4561072155
NVDAon / USDC 70%uniswap-v4-ethereum0x409e...9469166.4897599608
NVDAon / USDC 29%uniswap-v4-ethereum0xfa6a...af98169.0748817157
NVDAon / USDC 30%uniswap-v4-ethereum0x656d...b585168.9977603794
NVDAon / USDT 40%uniswap-v4-ethereum0xeeb1...b0c4172.4248838297
NVDAon / USDT 80%uniswap-v4-ethereum0xddc6...d34a1331.7126241617
NVDAon / ETH 97%uniswap-v4-ethereum0xd138...e733194.3280949901
1INCH / NVDAon 1%uniswap-v4-ethereum0x4363...3cf2174.451151926
NVDAon / GOOGLon 1%uniswap-v4-ethereum0x3ea9...6a5c172.8335316438
AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / TSLAon 1%balancer-v3-ethereum0x62fb...42f3172.2618312556
AAPLon / NVDAon / METAon / MSFTon / GOOGLon / AMZNon / waEthUSDC / TSLAon 0.3%balancer-v3-ethereum0xf1da...74cc181.490615890180422021602142084389072698491352

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners