Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CREAM / WETH | sushiswap | 0xf169...e167 | 1.11203679772966 |
CREAM / WETH | uniswap_v2 | 0xddf9...c65f | 1.11984259336834 |
CREAM / ETH 1% | uniswap-v4-ethereum | 0x748c...469f | 4.0496335674 |
CREAM / WETH 1% | uniswap_v3 | 0x61f6...9c00 | 17.6959989215 |
CREAM / USDC 0.3% | uniswap_v3 | 0x710a...aeba | 83.2806641126126 |
CREAM / WETH 1% | balancer_ethereum | 0x8537...6183 | 1.22762702540741 |
POOL / CREAM / HEGIC / LQTY / AXS / PERP / WETH / ALCX 2% | balancer_ethereum | 0xdb3e...5df3 | 6.3972796894 |
CREAM / RUNE | sushiswap | 0x886f...7e19 | 1.1963334145 |
CREAM / HBTC | sushiswap | 0x51f5...169e | 1.8587256724 |
CREAM / KABOSU | uniswap_v2 | 0x9f87...769e | 6.021940807 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.