Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PROMPT / USDC 0.3% | uniswap_v3 | 0xf7fd...a2e1 | 0.127802142773644 |
PROMPT / WETH 0.3% | uniswap_v3 | 0x2b7e...fab5 | 0.127139431484779 |
PROMPT / USDC 1% | uniswap-v4-ethereum | 0x903f...29b1 | 0.3158269729 |
PROMPT / ETH 1% | uniswap-v4-ethereum | 0x2a75...2315 | 0.4656684228 |
PROMPT / WETH 1% | uniswap_v3 | 0xb7c1...dea7 | 0.1471521585 |
PROMPT / ETH 1.3% | uniswap-v4-ethereum | 0x430d...2ba9 | 0.2388119166 |
PROMPT / USDC 1% | uniswap_v3 | 0x9ba2...b9c1 | 0.2515747408 |
PROMPT / ETH 0.3% | uniswap-v4-ethereum | 0x9b15...1324 | 0.3656451186 |
PROMPT / USDC 0.25% | pancakeswap-v3-ethereum | 0x5b12...e740 | 0.4635432718 |
PROMPT / USDC 0.3% | uniswap-v4-ethereum | 0x23c7...2964 | 0.3408979316 |
PROMPT / WETH | uniswap_v2 | 0x5c3e...d175 | 0.00000003074950334 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.