Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
EZ / USDC | uniswap_v2 | 0x278f...6ba4 | 0.0115065495326625 |
EZ / WETH | uniswap_v2 | 0x4fd2...a357 | 0.00936995914190485 |
EZ / USDC 0.3% | uniswap_v3 | 0x9c19...8514 | 0.017426634912640702550242777891384083526597113061375339078693151725634611638 |
EZ / WETH 0.3% | uniswap_v3 | 0x90ff...61fa | 0.024118532035554292620970771613290700237590379994729153168 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.