| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ARMOR / WETH | uniswap_v2 | 0x6484...9f6c | 0.000326653833959156 |
| ARMOR / DAI | uniswap_v2 | 0xfc0d...78c7 | 0.000320765281450393 |
| ARMOR / WETH | sushiswap | 0x17a2...109b | 0.000314637175529873 |
| ARMOR / WBTC | uniswap_v2 | 0x8887...80d9 | 0.0003061208393 |
| ARMOR / WBTC | sushiswap | 0xcd83...176a | 0.0002930449128 |
| arNXM / ARMOR | uniswap_v2 | 0x8b09...abf5 | 0.0003031997965 |
| ARMOR / DAI | sushiswap | 0x5a06...8768 | 0.0003124807555 |
| KP3R / ARMOR | sushiswap | 0x9c2e...c5ce | 0.0002958681427 |
| ARMOR / UNI | uniswap_v2 | 0x8afe...8c14 | 0.0003359316276 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.