Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
LEASH / WETH | shibaswap | 0x5765...fb53 | 106.338001425088 |
LEASH / BONE | shibaswap | 0xf6ba...d1a7 | 105.74289199894 |
LEASH / SHIB | shibaswap | 0x351c...7a8f | 107.20834223483 |
LEASH / WETH | uniswap_v2 | 0x8743...60ee | 106.835572294549 |
LEASH / xFUND | shibaswap | 0xfe8f...6e31 | 112.748920394046 |
LEASH / WETH 1% | uniswap_v3 | 0xc246...2060 | 112.089719120961 |
LEASH / 0NE | shibaswap | 0xb665...8752 | 111.764561411626 |
LEASH / ELON | shibaswap | 0xc639...55c5 | 112.836285812639 |
LEASH / WBTC | shibaswap | 0xbcab...aa05 | 120.140328729884 |
LEASH / USDT | shibaswap | 0xd9b8...b553 | 95.1942945732201 |
LEASH / SHIB 1% | uniswap_v3 | 0xb0a1...753f | 112.1515471211 |
LEASH / ccBCH | shibaswap | 0xfc27...d150 | 109.089458727314 |
LEASH / ETH 1% | uniswap-v4-ethereum | 0x1ca7...0016 | 118.440192371305 |
LEASH / SAITAMA | shibaswap | 0x84a1...7278 | 137.8725605843 |
LEASH / SAS | uniswap_v2 | 0x42e0...09ce | 122.324779496 |
LEASH / LEASH0.5 | shibaswap | 0xfcc2...6c61 | 383.245964674894 |
LEASH / WETH 0.3% | uniswap_v3 | 0x3bc8...f717 | 318.619584974687 |
LEASH / TREAT 1% | uniswap-v4-ethereum | 0x29e0...df4d | 121.24005624219 |
LEASH / WETH | swapr_ethereum | 0xde7f...430b | 175.7887069157 |
STATE / LEASH | uniswap_v2 | 0xdf1a...e9d4 | 136.5684947159 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.