Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SD / USDC 0.3% | uniswap_v3 | 0xc72a...a29e | 0.407543531790278 |
SD / USDC | uniswap_v2 | 0x4177...8218 | 0.414022808328142 |
SD / WETH 0.5% | balancer_ethereum | 0xe401...1687 | 0.426890221055185 |
SD / ETHx 0.3% | balancer_ethereum | 0x034e...76ea | 0.401893317226112 |
SD / USDC 0.3% | balancer_ethereum | 0x4227...0b23 | 0.426667057531312 |
SD / USDC | sushiswap | 0x674f...be6a | 0.410935082184164 |
SD / USDC 0.3% | balancer_ethereum | 0xdb0c...e9f0 | 0.4840294494 |
SD / WETH 1% | uniswap_v3 | 0x794f...11e7 | 0.000000000001061075813454405621861564415 |
SD / WETH 0.3% | uniswap_v3 | 0xf492...632d | 1.45723376804152 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.