Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
waEthUSDT / waEthLidoGHO / waEthUSDCbalancer-v3-ethereum0x85b2...361d1.14958326465167
PEPE / UNI / WBTC / PANDORA / PROS / waEthUSDC / WLFI 0.3%balancer-v3-ethereum0xb1f6...27c60.00000594227588934504
USP / waEthUSDC 0.01%balancer-v3-ethereum0x1149...95211.15856951910495
waEthUSDT / waEthUSDC 0.001%balancer-v3-ethereum0x89bb...75701.16214368389315
waEthUSDT / sUSDf / waEthUSDC 0.001%balancer-v3-ethereum0x4b5f...aaa61.1495144913417
TERM / waEthUSDC 0.3%balancer-v3-ethereum0xb259...95701.16234422963648
waEthLidowstETH / WBTC / LINK / AAVE / SOL / waEthUSDC 0.3%balancer-v3-ethereum0x8523...4d944019.898815733
slpUSDC / waEthUSDC 0.04%balancer-v3-ethereum0x2f05...6d501.1552132686
BOLD / waEthUSDT / USDaf / waEthUSDC 0.3%balancer-v3-ethereum0x38eb...1d6b0.9970115826
USD29Y / waEthUSDC 1%balancer-v3-ethereum0x51cd...30fd1.1573108266
waEthWETH / WBTC / LINK / XAUt / waEthUSDT / waEthUSDC 0.1%balancer-v3-ethereum0x5834...ad984940.9032703051
BOLD / waEthUSDC 0.01%balancer-v3-ethereum0x698a...c4691.16031354518838
WBTC / waEthUSDC 3%balancer-v3-ethereum0x4bc3...d1ef1.15725281840573
waEthUSDC / cUSDO 0.008%balancer-v3-ethereum0x046d...dfe91.15754278772419
QQQon / PAXG / waEthUSDC / SPYon 0.3%balancer-v3-ethereum0xf3dc...46b3637.4376627418
atvUSDC / waEthUSDC 0.1%balancer-v3-ethereum0x2d34...dfd61.1526474682
XAUt / waEthUSDC 0.9%balancer-v3-ethereum0x2232...1a091.1565720811
waEthLidoWETH / UNI / WBTC / LINK / DAI / MKR / waEthUSDC 0.1%balancer-v3-ethereum0x7dcd...778c3964.9375150512
USDC / waEthUSDC 30%uniswap-v4-ethereum0xcab3...d8160.20661233
liUSD-1w / waEthUSDC 0.03%balancer-v3-ethereum0xafc1...4ee61.1468826235

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners