Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 0.350603054870135 |
ICHI / WBTC 0.3% | uniswap_v3 | 0x1622...d7b9 | 0.349131541620934 |
ICHI / USDC 1% | uniswap_v3 | 0x8f03...a9d0 | 0.351130323760695 |
1INCH / ICHI 0.3% | uniswap_v3 | 0x8c52...9803 | 0.355246605709266 |
ICHI / bHOME 1% | uniswap_v3 | 0x67f9...d5af | 0.348487064964462 |
ICHI / IMX 1% | uniswap_v3 | 0x765c...6d4e | 2.4816045405 |
ICHI / WETH 0.01% | uniswap_v3 | 0xe26f...1452 | 1.81207973417211 |
ICHI / USDC 0.01% | uniswap_v3 | 0x89e4...c245 | 2.2851161997974 |
ICHI / WBTC 0.01% | uniswap_v3 | 0x14b4...9681 | 2.52205418456006 |
oneICHI / ICHI 1% | uniswap_v3 | 0x9e20...02e9 | 2.6314711764 |
ICHI / WETH 0.05% | uniswap_v3 | 0x4f84...d68b | 0.3871181943 |
ICHI / ALLY 1% | uniswap_v3 | 0x8d57...4bb7 | 2.11107164060074 |
ICHI / MKR 0.3% | uniswap_v3 | 0x9c41...17b8 | 2.5045591463703 |
ICHI / ZRX 0.3% | uniswap_v3 | 0x28c7...ead0 | 3.77742028929431 |
ICHI / AAVE 0.3% | uniswap_v3 | 0xb00c...9aca | 3.78048083903502 |
ICHI / COW 0.3% | uniswap_v3 | 0xae9c...2c50 | 4.30319388983891208307790900616 |
ICHI / SUSHI 0.3% | uniswap_v3 | 0xdbf9...32bc | 1.22663185793774 |
ICHI / COC 0.3% | uniswap_v3 | 0x20f4...b2e2 | 1.2691513238 |
ICHI / BIT 0.3% | uniswap_v3 | 0x021f...77d5 | 0.3593016291 |
ICHI / ICHI 0.01% | uniswap_v3 | 0x125a...4ec6 | 5.14183141251581357346451458592 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.