Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
OCC / WETH | uniswap_v2 | 0x14b6...be5a | 0.00554229802527194 |
OCC / USDC | uniswap_v2 | 0xedf1...4757 | 0.00528312145444211 |
OCC / WETH 1% | uniswap_v3 | 0x8897...c741 | 0.0991805213411579 |
OCC / WETH | sushiswap | 0x7c19...c87f | 0.005595534567 |
OCC / USDC | sushiswap | 0xd523...371d | 0.248422643964395 |
CHAKRA / OCC | uniswap_v2 | 0x2e84...775c | 0.195210419947014 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.