Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DOGS / WETH 1% | uniswap_v3 | 0xd980...98a0 | 0.0000000709795542219534 |
DOGS / CAW 1% | uniswap_v3 | 0xf4a1...413b | 0.0000000657886240922461 |
DOGS / TREAT 1% | uniswap_v3 | 0x6198...ca9d | 0.0000000733943292970135 |
DOGS / TREAT 1% | uniswap-v4-ethereum | 0xe847...96ac | 0.00000006406042719 |
DOGS / SHI 1% | uniswap-v4-ethereum | 0x78cb...37c2 | 0.0000000811202174680624 |
DOGS / CAW 0.01% | uniswap_v3 | 0x2792...04d5 | 0.00000006479453827 |
DOGS / ETH 1% | uniswap-v4-ethereum | 0x7bf4...3a54 | 0.00000007644103957 |
DOGS / CAW 0.3% | uniswap-v4-ethereum | 0xa0e5...033d | 0.00000006479453827 |
SHIZ / DOGS 1% | uniswap-v4-ethereum | 0x5d55...3ad6 | 0.00000004975707625 |
SHIZ / DOGS 1% | uniswap_v3 | 0x6e7a...4b9a | 0.0000000472059855 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.