Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
weETHs / ETHfluid-ethereum0x0805...76403090.85884337163
weETHs / WETHcurve0xb92b...13913120.77028495417
weETH / weETHscurve0xb9ef...72943086.87802478647
weETH / weETHs / weETHkcurve0x6a8a...1ae63087.07888225455
weETHs / ETH 1%uniswap-v4-ethereum0x7541...34ea4059.8630520809
weETHs / ETH 90%uniswap-v4-ethereum0xc92c...64a2453.8420962537
weETHs / ETH 2%uniswap-v4-ethereum0xb32d...1ddb4450.4809036098
weETHs / USDC 88%uniswap-v4-ethereum0xccf9...7ac0360.0602128695
weETHs / WETH 0.3%uniswap_v30x174e...3d6a2793.6274067478
weETHs / WETH 0.05%uniswap_v30x5832...516a2639.5609557411

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners