Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ICHI / WBTC 0.3% | uniswap_v3 | 0x1622...d7b9 | 0.450059203476881 |
ICHI / USDC 1% | uniswap_v3 | 0x8f03...a9d0 | 0.453956048120423 |
ICHI / bHOME 1% | uniswap_v3 | 0x67f9...d5af | 0.451341440698938 |
1INCH / ICHI 0.3% | uniswap_v3 | 0x8c52...9803 | 0.443382022387401 |
wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 2.516923117 |
ICHI / IMX 1% | uniswap_v3 | 0x765c...6d4e | 2.4816045405 |
ICHI / USDC 0.01% | uniswap_v3 | 0x89e4...c245 | 2.2851161997974 |
oneICHI / ICHI 1% | uniswap_v3 | 0x9e20...02e9 | 2.6314711764 |
ICHI / WBTC 0.01% | uniswap_v3 | 0x14b4...9681 | 2.52205418456006 |
ICHI / WETH 0.01% | uniswap_v3 | 0xe26f...1452 | 1.81207973417211 |
ICHI / WETH 0.05% | uniswap_v3 | 0x4f84...d68b | 0.421051603335276 |
ICHI / ALLY 1% | uniswap_v3 | 0x8d57...4bb7 | 2.11107164060074 |
ICHI / CEL 0.3% | uniswap_v3 | 0x6e41...d319 | 1.85348111227091 |
ICHI / MKR 0.3% | uniswap_v3 | 0x9c41...17b8 | 2.5045591463703 |
ICHI / OGN 0.3% | uniswap_v3 | 0xf7a9...7685 | 3.75711904299981 |
ICHI / BIT 0.3% | uniswap_v3 | 0x021f...77d5 | 0.432958903907769 |
ICHI / ZRX 0.3% | uniswap_v3 | 0x28c7...ead0 | 3.77742028929431 |
ICHI / AAVE 0.3% | uniswap_v3 | 0xb00c...9aca | 3.78048083903502 |
ICHI / LINK 0.3% | uniswap_v3 | 0x8d0c...d868 | 2.46876582269066 |
ICHI / OUSD 1% | uniswap_v3 | 0x7a2c...2490 | 0.43220384435848 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.