Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BAD / WETH | uniswap_v2 | 0x29c8...010e | 0.000000013169150560909 |
BAD / WETH | shibaswap | 0x6f4a...bd6e | 0.0000000128761775820179 |
BAD / WETH | sushiswap | 0x57fb...60a7 | 0.0000000132550083829793 |
BAD / SHIB | shibaswap | 0x396d...5a92 | 0.0000000126568964086907 |
BAD / ETH 0.3% | uniswap-v4-ethereum | 0x1e5d...642f | 0.0000000104067222620474 |
BAD / TREAT 1% | uniswap-v4-ethereum | 0x2d9e...2879 | 0.00000001032107416 |
BAD / EDGE 1% | uniswap-v4-ethereum | 0xc76f...7066 | 0.00000001041480931 |
BAD / WETH 0.25% | pancakeswap-v3-ethereum | 0xb767...88fa | 0.0000000404482956944657 |
BAD / WETH 1% | uniswap_v3 | 0x3f75...761c | 0.00000001526268484 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.