Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
FLOKI / WETHuniswap_v20xca7c...78c00.0000328205565834804
SKOL / FLOKIuniswap_v20x4e5c...9b070.0000329814706640588
BUILD / FLOKIradioshack_ethereum0x7df2...91de0.0000289304320848081
FLOKI / ZIK 1%uniswap_v30x6199...565c0.000029002537611276
FLOKI / WETH 1%uniswap_v30xe415...8ce10.0000328042883474586
FLOKI0.5 / FLOKIuniswap_v20xdb88...bbf60.00004812256754
TEO / FLOKIuniswap_v20xe2a9...158f0.0000323488743011993
FLOKI0.5 / FLOKIuniswap_v20xeebd...c5030.0000415841179450081008956567994424028893868546441141404547684612471495770702284871300821198
DFI / FLOKIuniswap_v20xe070...0d390.00009863058307
FLOKIFI / FLOKIuniswap_v20x92ee...210d0.0000382692979311462180198116289559986667374324549569538911122398183785391147599585147989910544
Floki 0.5 / FLOKIuniswap_v20x429d...555d0.0000379282246096588391805899412749459869655998260556880832660763943079639811163609226383248032
BabyDoge / FLOKIuniswap_v20xb0e3...6cfc0.0000357382694437519
BBC / FLOKI9inch-ethereum0x9c7c...0c510.0000343580627112812
FLOKI / WETH 1%pancakeswap-v3-ethereum0x2f01...76dc0.570666230340138
PEPE / FLOKIuniswap_v20xb190...10440.0000357778756490555
SIMP / FLOKIuniswap_v20x6538...9c320.0001297291505
RADIO / FLOKIradioshack_ethereum0x3cd8...64ba0.00004430589781
FLOKI / USDC 0.05%uniswap_v30x9725...82f30.000248631843162377
SOKU / FLOKI 1%uniswap_v30x56b4...dd680.0000341220606910616
FLOKI / USDT 0.3%uniswap_v30xf06b...04a10.0000558442219

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners