Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PSYOP / WETH 1% | uniswap_v3 | 0xa3bc...ea71 | 0.0000206502980929173 |
PSYOP / FINALE 0.3% | uniswap_v3 | 0x9f22...1771 | 0.0000110309601524477 |
PSYOP / DAVE 1% | uniswap_v3 | 0xdf8b...b8f4 | 0.000011056658883201 |
PSYOP / WETH 0.3% | uniswap_v3 | 0x42d4...0811 | 0.0000100005256015818 |
PSYOP / USDC 1% | uniswap_v3 | 0x186f...c6ba | 0.00004134734827 |
CHURN PROTOCOL / PSYOP | uniswap_v2 | 0x513d...9aa7 | 0.0000672008350135292 |
PSYOP / LOYAL 0.3% | uniswap_v3 | 0x3618...6076 | 0.00207432376263785 |
PSYOP / JNE 1% | uniswap_v3 | 0x884e...18a9 | 0.0000100005256015818 |
PSYOP / WETH 0.05% | uniswap_v3 | 0x10ab...2737 | 0.00114793720167522 |
PSYOP / WETH 0.01% | uniswap_v3 | 0x8ad9...01d3 | 12601224326.3993 |
PSYOP / WETH | uniswap_v2 | 0xec99...b50b | 0.0000306104258110899 |
PSYOP / LOYAL 1% | uniswap_v3 | 0x75c3...9e21 | 0.00215572293862215 |
PSYOP / WETH | sushiswap | 0xe5d0...8e4d | 0.519445915745628 |
PSYOP / Dyl 1% | uniswap_v3 | 0xe498...3b6c | 0.000434039050753053 |
RAEL / PSYOP 1% | uniswap_v3 | 0x48ad...19e6 | 0.000175577319880712 |
PSYOP / BURN 1% | uniswap_v3 | 0x7e27...9dc3 | 0.0025825268761215 |
EPEPE / PSYOP 1% | uniswap_v3 | 0xdef3...e15d | 0.000356875110495416 |
PSYOP / MZM 1% | uniswap_v3 | 0x3882...d88f | 0.000276974779413631 |
BMX / PSYOP 1% | uniswap_v3 | 0x5182...201c | 0.000638876102030677 |
PSYOP / YAKT | uniswap_v2 | 0xcfb8...4c05 | 0.00077826343282308 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.