Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WAS / WETH 1% | uniswap_v3 | 0xed4c...4209 | 0.00037648856861598 |
WAS / WETH | uniswap_v2 | 0x0953...f375 | 0.000379639897659548 |
WAS / WETH 0.3% | uniswap_v3 | 0xe4ed...9a5b | 0.00836291087969953 |
WAS / WOMBAT 0.3% | uniswap_v3 | 0x5966...c492 | 0.0005021442047 |
WAS / USDC 1% | uniswap_v3 | 0xb5bc...cd9d | 0.00620243325739439 |
WAS / USDC 0.3% | uniswap_v3 | 0x0ac8...4811 | 0.0101824216863178 |
WAS / UOS 0.3% | uniswap_v3 | 0x9ac1...4d68 | 0.0380652987056406499530720161568 |
WAS / UOS 0.05% | uniswap_v3 | 0x9f25...ed5b | 0.0380581087386751468612583896512 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.