Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
pPEAS / pOHM | uniswap_v2 | 0x80e9...1608 | 3.90320970571836 |
pPEAS / PEAS 1% | uniswap_v3 | 0xb0e8...1eb0 | 3.373727685 |
pPEAS / PEAS 0.3% | uniswap_v3 | 0x4ef9...7869 | 3.92551937324437 |
pPEAS / WETH 1% | uniswap_v3 | 0xe97e...e53f | 3.8468523552 |
pPEAS / pOHM 1% | uniswap_v3 | 0x44f6...e3d4 | 2.7102394624 |
pPEAS / PEAS | uniswap_v2 | 0xaf18...d4e7 | 12.1759711575685 |
pPEAS / pINCEPTION 1% | uniswap_v3 | 0xefad...9a87 | 3.16105215629924 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.