Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ZERO / WETH 0.3% | uniswap_v3 | 0xa8ef...d491 | 0.00513272797935797 |
ZERO / USDT 0.3% | uniswap_v3 | 0xaf2e...1532 | 0.00517424028440466 |
ZERO / USDC 0.3% | uniswap_v3 | 0x0004...410e | 0.00511585748868561 |
ZERO / WILD 0.3% | uniswap_v3 | 0x537a...ac90 | 0.0471449467903326 |
ZERO / WETH 1% | uniswap_v3 | 0x45d3...837f | 0.0295216283462861 |
ZERO / WETH | uniswap_v2 | 0x1e11...9e06 | 0.0290601698814893 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.