Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SHI / WETH 0.3% | uniswap_v3 | 0x959c...0c70 | 0.000000200970765795725 |
SHI / WETH | shibaswap | 0xe351...9e5a | 0.000000202056079268283 |
SHI / WETH 1% | uniswap_v3 | 0x052c...31b1 | 0.000000202158282694634 |
SHI / TREAT 1% | uniswap-v4-ethereum | 0x3b8b...4073 | 0.000000198214392831239 |
SHI / TKP | uniswap_v2 | 0xae6a...5191 | 0.000000200578535330723 |
SHI / SHIB 0.3% | uniswap_v3 | 0xf795...f6dc | 0.00000134799548550997 |
SHI / WETH | sushiswap | 0x5b2c...f61e | 0.0000004383982907 |
SHI / TREAT 1% | uniswap_v3 | 0x6142...3bdd | 0.000000432502908968933 |
SHI / WETH | uniswap_v2 | 0x4c16...4bf6 | 0.0000003988152195 |
SHI / SHIB | shibaswap | 0xd68e...9711 | 0.000000406243608849213 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.