Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
DC / WETH 1%uniswap_v30x4984...1ec50.000114122082070359
DC / WETHuniswap_v20x8a63...8a320.000113874401361916
BARK / DC 1%uniswap_v30x300e...0c5f0.00178698085610143040449505040327
DC / DCFC 1%uniswap_v30xec27...59fe0.00178698085610143040449505040327
KC / DC 1%uniswap_v30x5526...43bf0.001139494557904438523030873190469
DC / USDT 1%uniswap_v30x8b49...d19e0.00198754182
DC / WETHsushiswap0x49b1...2d8b0.0001055701778
RADIO / DCradioshack_ethereum0xde74...94730.0018237818278003131416825241826548055999505696889761306407667812354749165886047512409319992
DC / USDC 1%uniswap_v30xb9f9...14980.001562769194925003896379854999316
DC / WETH 0.3%uniswap_v30xee14...efd90.00134136256059054
DMD / DCuniswap_v20xdaf8...4c340.00159117061337216031076087468047314232805558777306063488441704351995938233657054762553062232
SEND / DC 1%uniswap_v30x9dd9...01010.00159132991938879830239711415616
DC / USDCuniswap_v20x8db7...d8110.0017902582919291051293393547432479156258821304376453156270535214014079430892413583991229652
WOOFI / DC 1%uniswap_v30x2197...10f80.00157343713709712576943612170576
DC / EUL 1%uniswap_v30x917f...38a70.001060550008843771634204423460096
DC / LUNAuniswap_v20x5d72...a6b30.00179007644512358712307711590093835178782394739173663430923714769855252397951299132558637647
DCC / DCuniswap_v20xe4c5...f37a0.0018015118221030580080660438200251502739199846848942738572229956364914364534015524395912611

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners