Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BEARDY / WETH 1% | uniswap_v3 | 0xbd35...a42a | 0.000136597064182392 |
BEARDY / TSUKA 1% | uniswap_v3 | 0x5f1b...e53e | 0.000133304378000135 |
BEARDY / NEMO 1% | uniswap_v3 | 0xd8f6...dffe | 0.000133323771091122 |
BEARDY / HOSHI 1% | uniswap_v3 | 0x8455...90d8 | 0.000133323771091122 |
STATE / BEARDY 1% | uniswap_v3 | 0x4f59...b1ed | 0.000136472103527582 |
BEARDY / USDC 1% | uniswap_v3 | 0xef91...0943 | 0.000133988962739932 |
BEARDY / UNI 1% | uniswap_v3 | 0xfd8a...d22f | 0.00013330547571461 |
BEARDY / CAW 0.3% | uniswap_v3 | 0x0045...c3f5 | 0.000136338740699121 |
Okinami / BEARDY 1% | uniswap_v3 | 0xafd3...d19e | 0.0001356385167 |
BEARDY / 転生 1% | uniswap_v3 | 0xdfa7...d9ac | 0.0001384677361 |
BEARDY / ODIN 1% | uniswap_v3 | 0x8d98...f7a8 | 0.000132609845572262 |
BEARDY / 転生 0.3% | uniswap_v3 | 0x774e...0f92 | 0.0001219903633 |
BEARDY / SHI 1% | uniswap_v3 | 0x9670...382a | 0.0001275353502 |
BEARDY / DRAGON 1% | uniswap_v3 | 0x8e0e...7338 | 0.0001219903633 |
BEARDY / EVENT 1% | uniswap_v3 | 0x9d22...f0c4 | 0.0001224404065 |
BEARDY / SHIB 1% | uniswap_v3 | 0xea2d...0350 | 0.0001365539615 |
BEARDY / BEAST 1% | uniswap_v3 | 0x3014...6ea3 | 0.0001220397097 |
BEARDY / LINK 1% | uniswap_v3 | 0x8784...f199 | 0.0001377344502 |
BEARDY / WBTC 1% | uniswap_v3 | 0xff30...dce9 | 0.0001322972659 |
BEARDY / PEPE 1% | uniswap_v3 | 0x13f8...3b54 | 0.0001353122785 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.