Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RUNE / WETH | sushiswap | 0xcc39...e6da | 0.07610467724 |
RUNE / WETH | uniswap_v2 | 0x8d2a...24c7 | 0.0735045850499615 |
SOTU / RUNE | uniswap_v2 | 0xb9f8...1ecb | 0.08542671319 |
ALPHA / RUNE | sushiswap | 0x72a6...3b2d | 0.08388043695 |
RUNE / WETH 0.3% | uniswap_v3 | 0x3139...b5f1 | 1.01064428759611 |
RUNE / USDT | sushiswap | 0xd279...5bed | 0.09090179035 |
RUNE / USDC 1% | uniswap_v3 | 0xdca1...f779 | 1.257436023728082224908947451722 |
RUNE / SUSHI | sushiswap | 0x513d...5d89 | 0.4747158904 |
RUNE / AAVE | sushiswap | 0x5285...27e5 | 0.1372018107 |
RUNE / YFI | sushiswap | 0xbd68...ad3f | 0.2467486848 |
CREAM / RUNE | sushiswap | 0x886f...7e19 | 0.537234667315309 |
CRV / RUNE | sushiswap | 0x4ce1...56f5 | 0.128039224 |
SNX / RUNE | sushiswap | 0xd535...dbf8 | 0.259021287998193 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.