Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RSTK / WETH | uniswap_v2 | 0x8c89...7347 | 0.00420439129177068 |
RSTK / USDC 2.5% | balancer_ethereum | 0x260e...4b66 | 0.361289834944937 |
RSTK / WETH 1% | uniswap_v3 | 0x5cec...9b61 | 0.447389226485136 |
RSTK / USDC 1% | uniswap_v3 | 0xefe3...e12c | 1.98283650017638 |
RSTK / USDT 1% | uniswap_v3 | 0xfe28...176c | 1.46443804696399 |
RSTK / WETH 0.3% | uniswap_v3 | 0xeaf8...92d7 | 0.891211796540565 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.