Honeypot Detector for ETH


 
Token Name
-
Token Symbol
-
Buy Gas
-
Sell Gas
-
Buy Fee
-
Sell Fee
-
Honeypot simulation result
Max TX
-
Max Sell
-
Supply
-
PreSale
-
Dev Wallet
-
Compiler Version
-
Trade Token Scan
Contract
-
Useful Links -



DEX Pools


NameRelated DEXAddressToken Price (USD)
crvUSD / WETH / CRVcurve0x4ebd...4a140.993839679024432
crvUSD / USDCcurve0x4dec...d69e0.99312535598391
crvUSD / USDTcurve0x390f...7bf40.992798965358657
crvUSD / WBTCcurve0xd9ff...83731.0042437992928861978308602250033914867337034448493688290655528726
crvUSD / tBTCcurve0xf1f4...61270.99317676548066140641223644339015231554703381293445937915415538
frxUSD / crvUSDcurve0x13e1...43e11.0005120601881099606939213023928273056987154611300887526576970448
PYUSD / crvUSDcurve0x625e...62001.0015524886198
crvUSD / YBcurve0xec97...d65b1.0011468798751901239851061810426842310170440928440824356460307395
crvUSD / tBTC / wstETHcurve0x2889...3d131.00156359420625
GHO / crvUSDcurve0x635e...85950.999807091853493
crvUSD / sUSDecurve0x5706...2e850.997472054698481
USDe / crvUSDcurve0xf55b...04420.993800404516597
crvUSD / FRAXcurve0x0cd6...e5380.994712636214259
crvUSD / ZCHFcurve0x027b...2ca90.994605812327304
crvUSD / CJPYcurve0xca54...e5b01.0005479502003625672380656334229756487935343345693585283398304435
crvUSD / HEMIcurve0x3bfa...57900.995402079922175
cUSD / crvUSDcurve0x2d1e...5b090.997458291103711
crvUSD / VUSDcurve0xb1c1...944f0.9992181438232611737474299462538634324697345651619770763721172165
crvUSD / PROScurve0x440f...8b340.9932121880176671285292179248328520778704474880078257505843403995
crvUSD / sUSDcurve0x94cc...0b411.001761367182136131587120176088009147932696518515615232518352594

How does it work? Honeypot Detector

Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.

Our Partners