Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WDOGE / WETH 1% | uniswap_v3 | 0x6808...cbc2 | 0.180147248636203 |
WDOGE / WETH | uniswap_v2 | 0xc3d7...a8d0 | 0.180514507664931 |
WDOGE / WBTC | uniswap_v2 | 0x56b9...0169 | 0.179633346070105 |
WDOGE / WETH | sushiswap | 0x60bc...744d | 0.180419977254043 |
WDOGE / LILY | uniswap_v2 | 0x4521...da6a | 0.178579025290015 |
WDOGE / DAI 1% | uniswap_v3 | 0x0268...1b79 | 0.2980693061 |
WDOGE / DOGEN | uniswap_v2 | 0xbd0d...0409 | 0.1808928121 |
WDOGE / DOGE 0.3% | uniswap_v3 | 0x5b04...8636 | 0.1493040631 |
WDOGE / DOGE 1% | uniswap_v3 | 0xefe4...9dd6 | 0.168360142780378 |
WDOGE / USDC 0.3% | uniswap_v3 | 0x732e...c700 | 0.314672676 |
WDOGE / DOGE | uniswap_v2 | 0xe017...5f22 | 0.134024401544845 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.