Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ATN / ETH 70% | uniswap-v4-ethereum | 0x80fe...08d4 | 0.000309803506303295 |
ATN / USDT | uniswap_v2 | 0x5709...2103 | 0.000242529462017783 |
ATN / ETH 50% | uniswap-v4-ethereum | 0x0fd9...6294 | 0.0007063158892 |
ATN / USDT 3% | uniswap-v4-ethereum | 0x9f6d...780c | 0.001965845301 |
ATN / USDT 1% | uniswap-v4-ethereum | 0xe285...7261 | 0.004185484381 |
ATN / ETH 0.3% | uniswap-v4-ethereum | 0xd8f8...876b | 0.1812683315 |
ATN / WETH | uniswap_v2 | 0x4656...1814 | 0.00006177677591 |
ATN / WETH 1% | uniswap_v3 | 0xb7e5...0c81 | 0.226279345 |
ATN / WETH 0.3% | uniswap_v3 | 0x41ad...758a | 0.1669515685 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.