Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
METAIX / xF9 1%uniswap_v30xaf5b...bffa55.7362356860037
wF9 / xF9 1%uniswap_v30xd207...d5ce152.245980483705
xF9 / WETH 1%uniswap_v30x3343...0f6e16.1907881295
FDX / xF9 1%uniswap_v30x2017...b3af21.9946180295
sF9 / xF9 1%uniswap_v30xa30a...de5a30.1909379615587
F9 / xF9 1%uniswap_v30x63d6...0c0413.2835420662
DEV9 / xF9uniswap_v20xedc4...eadd19.86960158
dDAO9 / xF9 1%uniswap_v30x1f0a...acb240.8755415331242
DAO9 / xF9 1%uniswap_v30x273a...8ca98.095281635

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners