Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
CAW / WETHuniswap_v20x48d2...2daa0.0000000503916430915966
CAW / WETH 1%uniswap_v30x92ff...a7e30.0000000500063945025281
QOM / O / CAWcurve0x84ce...a1780.00000000189675083467808
DOGS / CAW 1%uniswap_v30xf4a1...413b0.0000000503937336388115
CAW / WETHcurve0xe8d6...847a0.0000000496472592296382
CAW / TREAT 1%uniswap-v4-ethereum0xb4c4...2a990.000000048909802776449
WCAW / CAW 1%uniswap_v30xe890...c2dc0.00000004196787534
CAW / TREAT 1%uniswap_v30x41fc...883a0.0000000492161845890334
KOO / CAW 1%uniswap_v30x9e08...38a40.0000000733408768654205031468428487203
QOM / O / CAW 1%balancer_ethereum0xb704...858d0.000000002093365041
BCUT / CAW 0.01%uniswap-v4-ethereum0xb9af...36860.0000000447979097
BEARDY / CAW 0.3%uniswap_v30x0045...c3f50.0000000494480204301152
CAW / USDCuniswap_v20x7a80...411e0.0000000464997464041931
CAW / USDC 1%uniswap_v30xd862...87fd0.0000000465420773275646
CAW / WETH 0.3%uniswap_v30xc0fb...ca220.00000009066525794
CAW / DAIuniswap_v20xb184...e4760.00000003357179616
CAW / USDC 0.3%uniswap_v30x7120...1aad0.000000060808351186448
MILAREPA / CAWuniswap_v20x33da...f7aa0.0000000733113315880073676832583785298620400534073154307668303350655988410237596407480003865026748
BK / CAWuniswap_v20x2163...3aed0.0000000514926439850068
Kitsune / CAWuniswap_v20x8b8b...cbba0.0000000516337723307352422562002206150897687360151855113739632230577174883638792565216861223778472

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners