Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
LAIKA / WETHuniswap_v20x2e0a...5d690.000000137300574975178
LAIKA / WETH 1%uniswap_v30x76fe...0dde0.000000383428476979548
LAIKA / USDC 1%uniswap_v30x459f...5ab60.000000328346619469539334296158699505
LAIKA / USDC 0.3%uniswap_v30x90fe...42fe0.000000328346619469539334296158699505
ANARCHY / LAIKA 0.3%uniswap_v30xb0d2...8d170.000000328346619469539334296158699505
ANARCHY / LAIKAuniswap_v20xf4f4...ef930.000000201747049233459010608865900713410903082922078855690202295900618102654026290558787657656904

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners