Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
MORPHO / WETH 0.3%uniswap_v30xc821...ac531.78788187136087
MORPHO / ETH 0.3%uniswap-v4-ethereum0xd9f5...7fff1.77841052028708
MORPHO / AAVE 0.3%uniswap_v30x3687...a9971.77736649104388
MORPHO / WETH 1%uniswap_v30x25b9...ec6f1.79902315189368
MORPHO / ETH 1%uniswap-v4-ethereum0xefca...982c2.0691028895
MORPHO / AAVE 1%uniswap_v30xc57c...df071.6352093012
MORPHO / AAVE 0.3%uniswap-v4-ethereum0xd5ef...ddcb1.4865305685
MORPHO / USDC 0.95%uniswap-v4-ethereum0x6679...ddbb2.1691548877
MORPHO / EIGEN 0.8%uniswap-v4-ethereum0xb5bc...b0ac0.9828580633
MORPHO / ETH 0.8%uniswap-v4-ethereum0xe5c6...50ea1.9683090176
MORPHO / USDC 1%uniswap_v30xe7c4...9da21.940595831

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners