Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
MORPH / DRAGONX 1%uniswap_v30x763c...1b0c0.000000249245810405645
MORPH / WETH 0.3%uniswap_v30x05c7...e6f90.000000248358328424101
MORPH / TITANX 1%uniswap_v30x6383...4d8e0.000000249740107673793
MORPH / SHOGUNuniswap_v20xbac5...f0660.000000263064169888415
MORPH / ELMNTuniswap_v20xd29f...1bf20.000000247286360662064
MORPH / WETH 1%uniswap_v30x084e...387b0.000002660555946
MORPH / SCALEuniswap_v20x30b3...c0710.000001465435381
ALIENX / MORPHuniswap_v20x5e8d...c3640.0000006922851131

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners