| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VERSE / WETH | verse | 0x845c...0f3e | 0.0000464589759886948 |
| VERSE / WETH | uniswap_v2 | 0x1bb1...255e | 0.0000443312224883361 |
| VERSE / USDC | verse | 0x928d...455a | 0.0000424370585255745 |
| VERSE / USDC 88% | uniswap-v4-ethereum | 0x6d60...74be | 0.000006134775851 |
| VERSE / DAI | verse | 0x85b7...596b | 0.00005032698884 |
| VERSE / USDT | verse | 0x0e15...f38a | 0.0000572588961694517 |
| VERSE / FTM 0.3% | uniswap_v3 | 0xfdb3...0e23 | 0.0001981074645 |
| VERSE / WETH | sushiswap | 0xbc3f...029d | 0.0000871727497 |
| VERSE / WETH 0.3% | uniswap_v3 | 0xbf5c...ba44 | 0.00009592065223 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.