Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
PROS / WETH 0.3%uniswap_v30x062b...31c00.0345128010144013
PROS / USDT / WBTCcurve0xdae4...e55c0.03414410768307713766400229994647258857538987272398446806842462255
PROS / WBTC / PNKSTR 0.3%balancer-v3-ethereum0xcc97...e69c0.0344366628323376
PROS / WETHcurve0x2c78...d34c0.03432649388607154035994392150414203481500033959947407185504749846
crvUSD / PROScurve0x440f...8b340.0340468824012662
CRV / PROScurve0x1f57...865f0.0342873938695651343195083133469537356850978779759880923566236155
USDT / PROScurve0x6bd6...2f220.0339030714596016
PNKSTR / PROScurve0x0c37...7bdc0.0344711254889282339089760734874727632145511723701898959225571293
PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3%balancer-v3-ethereum0xb1f6...27c60.00000463406329
PAXG / PROS 0.3%balancer-v3-ethereum0x4155...4a840.0342954584804666
USDT-PROS / PROS 0.3%sushiswap-v3-ethereum0x3494...1a600.0344352511360188
PROS / crvUSD 0.3%balancer-v3-ethereum0x7744...45370.0342214941652064
PROS / WETHjustmoney-ethereum0x206e...81dc0.0343478610023787
PROS / WLFI 0.3%uniswap-v4-ethereum0x016c...dcac0.0345009235625291
PROS / WBTC 0.3%uniswap-v4-ethereum0x7757...f2af0.0344124635761968
PROS / USDTjustmoney-ethereum0xa860...07b30.0345461106650931
PROS / WBTCjustmoney-ethereum0x8afd...ce8b0.0344569772266048
PROS / WBTC 0.25%pancakeswap-v3-ethereum0x18f3...9ad30.0342990248651587
PANDORA / PROSjustmoney-ethereum0xe3b7...230c0.0345974090597926
USDC / PROScurve0x36c9...e5800.034588998069824

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners