Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USUALX / USUAL 1% | uniswap_v3 | 0x4049...2c53 | 0.16498450038242 |
USUALX / USUAL 0.3% | uniswap_v3 | 0xf9f7...9816 | 0.163623023135489 |
USUALX / ETH 20% | uniswap-v4-ethereum | 0x0789...7f5a | 0.194245296595178 |
USUALX / USDT 0.3% | uniswap-v4-ethereum | 0x1601...2719 | 0.198625732442129 |
USUALX / USUAL 0.3% | uniswap-v4-ethereum | 0xa7f9...8916 | 0.233823261 |
USUALX / USDC 1% | uniswap_v3 | 0x779d...2550 | 0.8219853127 |
USUALX / ETH 15% | uniswap-v4-ethereum | 0xd794...8ac7 | 0.2713598217 |
USUALX / WETH 1% | uniswap_v3 | 0x36de...7fe3 | 0.5427321391 |
USUALX / USDT 1% | uniswap_v3 | 0xde4b...70ea | 1.2150070737 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.