Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
KEKIUS / WETH | uniswap_v2 | 0xfff8...9c74 | 0.0229490555686811 |
KEKIUS / WETH 1% | uniswap_v3 | 0xa254...3e57 | 0.0226678073212421 |
KEKIUS / ETH 1% | uniswap-v4-ethereum | 0x1dc3...82eb | 0.022971931400294 |
KEKIUS / TrumpBucks 1% | uniswap-v4-ethereum | 0xade2...47c2 | 0.0228738132917973 |
KEKIUS / Gamer 0.3% | uniswap_v3 | 0x230b...a15b | 0.0218347764981982 |
KEKIUS / SLACK 1% | uniswap-v4-ethereum | 0x80e9...7e24 | 0.02158662704 |
ETH / KEKIUS 0.3% | uniswap-v4-ethereum | 0xefb7...9abe | 0.03144343469 |
KEKIUS / BITCOIN 1% | uniswap_v3 | 0x7171...4902 | 0.02222548886 |
KEKIUS / TrumpBucks | uniswap_v2 | 0x069e...5ea3 | 0.01517177921 |
KEKIUS / WEPE 1% | uniswap_v3 | 0x8bc8...525c | 0.03002277651 |
KEKIUS / KABOSU | uniswap_v2 | 0xb99e...bd05 | 0.02310008669 |
KEKIUS / LVMLP | uniswap_v2 | 0x6444...d013 | 0.01969680625 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.