Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
wstETH / AAVE 0.5%balancer_ethereum0x3de2...9f292176.23333047523
wstETH / wstETH-WETH-BPT / WETH 0.01%balancer_ethereum0x93d1...f0bd2470.2464705924
wstETH / WETH 0.01%uniswap_v30x1098...7daa2173.17317945576
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.01%balancer_ethereum0x42ed...0af72122.45593979591
pufETH/wstETH / wstETH / pufETH 0.02%balancer_ethereum0x63e0...3f022399.8888762491
pufETH / wstETHcurve0xeeda...980d2173.1770743545
wstETH / ETHx / ETHx/wstETH 0.04%balancer_ethereum0xb911...8ea72159.83484252254
crvUSD / tBTC / wstETHcurve0x2889...3d130.997372301202375
wstETH-rETH-sfrxETH-BPT / wstETH / sfrxETH / rETH 0.02%balancer_ethereum0x5aee...cabe3804.77830564855
ACX / wstETH 1%balancer_ethereum0x36be...31a32169.98044383711
tETH/wstETH / wstETH / tETH 0.05%balancer_ethereum0x1d13...ad142944.4588258345
wstETH / DOGuniswap_v20x801c...386c2170.36319977145
wstETH / rsETH 0.05%uniswap_v30x7a27...2eee2170.9769452789
wstETH / ankrETH/wstETH / aETHc 0.04%balancer_ethereum0xdfe6...b6ba3340.7795911226
cdcETH/wstETH / wstETH / CDCETH 0.04%balancer_ethereum0x740a...d99d4685.8204589545
wstETH / WETH 0.04%balancer_ethereum0x3229...02302123.03893165854
ynETH / wstETHcurve0x19b8...4bdd2173.03354279594
tETH / wstETHcurve0xa10d...ddb12103.10396358262
mstETH / wstETH 0.01%pancakeswap-v3-ethereum0x350d...b66b2188.02224218401
amphrETH / wstETH 0.3%uniswap_v30xf3ae...ef3c2140.44097824348

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners