Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
LEVER / USDT 99.989%uniswap-v4-ethereum0xe07f...6cc60.00001128259305
LEVER / ETH 70.02%uniswap-v4-ethereum0xca40...3cb30.00008594314965
LEVER / ETH 80.01%uniswap-v4-ethereum0xb736...83820.000004786796371
LEVER / ETH 70.03%uniswap-v4-ethereum0x3768...9f590.00007631680439
LEVER / ETH 80%uniswap-v4-ethereum0x5301...e8d40.0000186138676
LEVER / USDT 10%uniswap-v4-ethereum0x1874...213f0.00003268447547
LEVER / USDT 80%uniswap-v4-ethereum0x19b8...be1f0.000004819176141
LEVER / ETH 50%uniswap-v4-ethereum0x76fe...3a930.0000134452879
LEVER / ETH 99.991%uniswap-v4-ethereum0x79ec...31ab0.00001280274483
LEVER / ETH 70.01%uniswap-v4-ethereum0x29e8...ad7a0.00006233812419
LEVER / USDT 88%uniswap-v4-ethereum0x6cc5...edce0.000005705455083
LEVER / ETH 99.101%uniswap-v4-ethereum0x7918...c8e40.001109431236
LEVER / USDT 89.995%uniswap-v4-ethereum0x7a0e...991e0.00007151279326
LEVER / USDT 89.994%uniswap-v4-ethereum0x8b37...fab30.00003044822911
LEVER / ETH 70%uniswap-v4-ethereum0x58e4...c7b30.00008720251036
LEVER / WETH 1%uniswap_v30x0d5d...9f000.008180966114
LEVER / ETH 99.909%uniswap-v4-ethereum0x22ef...d82a0.00001130492806
LEVER / USDT 89.996%uniswap-v4-ethereum0xbd5f...2fc40.00006246654293
LEVER / ETH 99.918%uniswap-v4-ethereum0x96bb...be1f0.00001204783494
LEVER / USDT 89.999%uniswap-v4-ethereum0xefb7...289d0.0001282757458

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners