Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
Bonk / WETH 1% | uniswap_v3 | 0x403b...99ea | 0.0000111992855620383 |
Bonk / USDT 1% | pancakeswap-v3-ethereum | 0x719e...395e | 0.0000112386839879787 |
Bonk / USDT 1% | sushiswap-v3-ethereum | 0x5ea5...85f8 | 0.0000112966039576992 |
Bonk / USDT 1% | uniswap_v3 | 0x1e84...a199 | 0.0000112239506008085 |
Bonk / USDC 1% | uniswap_v3 | 0x53d6...df8d | 0.0000260890666391967 |
BONK0.5 / Bonk | uniswap_v2 | 0x65f3...5a57 | 0.0000206535041197188 |
Bonk / BabyDoge | uniswap_v2 | 0xf800...d39b | 0.0000107738407 |
Bonk / WETH 0.3% | uniswap_v3 | 0x4046...3195 | 0.0000229040989130562 |
Bonk / SHIB | uniswap_v2 | 0xb38a...d09f | 0.00001208554595 |
Bonk / WETH 1% | pancakeswap-v3-ethereum | 0xce2c...a319 | 0.000000571344861263085 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.