Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BOOE / WETH | uniswap_v2 | 0xdeba...21bf | 0.104358616852615 |
BOOE / WETH 1% | uniswap_v3 | 0xf023...dfdf | 0.103829003670833 |
BOOE / HOPE 1% | uniswap_v3 | 0xd16d...5f51 | 0.104079678932674 |
BOOE / PROPHET 1% | uniswap-v4-ethereum | 0x5c23...fb7b | 0.103560694993935 |
BOOE / CAH 1% | uniswap_v3 | 0xbca4...3fb7 | 0.105009432338292 |
BOOE / ETH 1% | uniswap-v4-ethereum | 0x5670...1bae | 0.1629510768 |
BOOE / PROPHET 1% | uniswap_v3 | 0xc326...7466 | 0.109874438240702 |
BOOE / COOPER 1% | uniswap_v3 | 0x1546...0d17 | 0.1569279679 |
BOOE / HOPE 0.3% | uniswap_v3 | 0xa9eb...10e5 | 0.0892762806781256 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.