Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SYN / WETH | sushiswap | 0x4a86...7c31 | 0.164609719353591 |
SYN / WETH 1% | uniswap_v3 | 0x2dd3...7a70 | 0.163014027526822 |
SYN / FRAX | fraxswap_ethereum | 0x750b...7c86 | 0.166422644398606 |
SYN / WETH 0.3% | uniswap_v3 | 0xd885...f44a | 0.6683462942 |
SYN / FRAX | fraxswap_ethereum | 0x832c...028c | 0.164349217931966 |
SYN / WETH 0.3% | balancer_ethereum | 0xa3c5...ed9d | 0.163539628906294 |
SYN / WETH 0.3% | sushiswap-v3-ethereum | 0x2d59...adf5 | 0.3730469715 |
SYN / USDC | sushiswap | 0x0510...60ae | 0.179590189106944 |
SYN / ETH 1% | uniswap-v4-ethereum | 0x355e...4a17 | 0.35585773 |
SYN / USDT 1% | uniswap_v3 | 0xb138...7f4b | 0.75281192064445 |
SYN / USDC 1% | uniswap_v3 | 0x5022...d5bd | 0.718909577566913 |
SYN / USDC 0.3% | uniswap_v3 | 0x8e70...91fe | 0.403755795574754 |
SYN / USDC 0.01% | uniswap_v3 | 0x1402...d49a | 0.82827766481965930198237263396 |
SYN / FEI | uniswap_v2 | 0x9e23...60cb | 0.0003235436664 |
SYN / JOE 1% | uniswap_v3 | 0x49a7...e358 | 0.450585979675895 |
SYN / SMURFCAT 1% | uniswap_v3 | 0x0efd...8441 | 0.5574692507 |
SYN / WETH | uniswap_v2 | 0x4f00...3398 | 5306.5313089608 |
SYN / WETH 1% | sushiswap-v3-ethereum | 0x319c...e9f9 | 0.526279071351785 |
SYN / KABOSU | uniswap_v2 | 0xdb8a...da80 | 0.1855990349 |
SYN / FRAX | uniswap_v2 | 0x9fae...42b1 | 1.016748596938028743664933494387996166441056461578049099388993103872755648794473974200941845 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.