Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
YGG / WETH | sushiswap | 0x99b4...a343 | 0.185490627881496 |
REVV / YGG | sushiswap | 0xd374...1d67 | 0.17965856908688 |
YGG / USDC 1% | uniswap_v3 | 0x7ec0...7ea0 | 1.0283960795 |
YGG / WETH 1% | uniswap_v3 | 0x319f...18ff | 1.77120117888646 |
YGG / MPL / MULTI / LQTY 10% | balancer_ethereum | 0xd18f...2d7f | 0.309725839233902249432852529108 |
YGG / USDC | sushiswap | 0xb9c3...5541 | 0.197525370949041 |
BPT / AUDIO / YGG / SAND / NFTX / MUSE / AXS / WETH 1% | balancer_ethereum | 0x344e...0df2 | 0.373092669390480115685175264236 |
YGG / WETH | uniswap_v2 | 0x2cfa...b206 | 0.007293926385 |
YGG / KABOSU | uniswap_v2 | 0xacaf...fb68 | 0.2003057775 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.