Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BAD / WETH | uniswap_v2 | 0x29c8...010e | 0.0000000109907454901577 |
BAD / WETH | sushiswap | 0x57fb...60a7 | 0.0000000108881392977186 |
BAD / WETH | shibaswap | 0x6f4a...bd6e | 0.0000000108815457878988 |
BAD / WETH 1% | uniswap_v3 | 0x3f75...761c | 0.0000000104915487200599 |
BAD / EDGE 1% | uniswap-v4-ethereum | 0xc76f...7066 | 0.0000000104148093083819 |
BAD / SHIB | shibaswap | 0x396d...5a92 | 0.000000013277714783937 |
BAD / ETH 0.3% | uniswap-v4-ethereum | 0x1e5d...642f | 0.00000000782285836103568 |
BAD / TREAT 1% | uniswap-v4-ethereum | 0x2d9e...2879 | 0.00000001032107416 |
BAD / WETH 0.25% | pancakeswap-v3-ethereum | 0xb767...88fa | 0.0000000404482956944657 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.