Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
AST / ETH 1% | uniswap-v4-ethereum | 0x438e...301c | 0.0415567920839878 |
AST / WETH | uniswap_v2 | 0xca9c...a8e5 | 0.0411350720105844 |
AST / WETH 1% | kyberswap_elastic | 0x2924...8f3d | 0.1402550630212318500874826401648 |
AST / WETH 0.3% | uniswap_v3 | 0x1174...53f0 | 0.05891358667 |
AST / WETH 0.56% | balancer_ethereum | 0x7eb8...aca8 | 0.0457471304606857 |
AST / USDC 0.3% | uniswap-v4-ethereum | 0x30d8...57fb | 0.0411453694682764 |
AST / PYRENEES | uniswap_v2 | 0xf5f7...bb59 | 0.04125927748 |
AST / USDC | sushiswap | 0xd3a1...c131 | 0.08183482945 |
AST / WETH 1% | pancakeswap-v3-ethereum | 0x10e6...c680 | 0.108589064595441 |
AST / KABOSU | uniswap_v2 | 0xe366...2c27 | 0.04147489872 |
AST / WETH 1% | uniswap_v3 | 0xdc1c...8b2b | 0.00000000001642663484342188 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.