Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WILD / WETH | uniswap_v2 | 0xcaa0...40a5 | 0.200703142442546 |
WILD / WETH 0.05% | uniswap_v3 | 0xb09c...93a1 | 0.200584254815005 |
WILD / WETH 1% | uniswap_v3 | 0x4538...864e | 0.238214215642287 |
WILD / ETH 0.3% | uniswap-v4-ethereum | 0xf435...267c | 0.203941790684927 |
WILD / USDC 0.3% | uniswap_v3 | 0xf4bf...3db8 | 0.455358943 |
ZERO / WILD 0.3% | uniswap_v3 | 0x537a...ac90 | 0.394316929158306 |
WILD / USDT 0.3% | uniswap_v3 | 0xb72a...0c88 | 0.496859344969464 |
WILD / WETH 0.01% | uniswap_v3 | 0x1b90...a475 | 0.232800835426508 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.