Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MONA / WETH | uniswap_v2 | 0xe693...bbb9 | 24.1042998532806 |
MONA / WETH 5% | kyberswap_elastic | 0x93fc...4274 | 4954746.55616827 |
MONA / ZORA 2% | kyberswap_elastic | 0x2bbb...a242 | 124.944075736386 |
MONA / DOGEFI | uniswap_v2 | 0xfc39...bc25 | 54.25960223 |
MONA / ZORA | uniswap_v2 | 0xf276...e7d5 | 303.277270691349 |
MONA / YFII | uniswap_v2 | 0x97a1...6439 | 22.4329769363 |
MONA / USDC 1% | uniswap_v3 | 0x2e1d...5720 | 499.984102146078 |
MONA / WETH 1% | uniswap_v3 | 0xeb0f...76ac | 1282.4570470579379149068250817178084196362470879064 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.