| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BAO / WETH | sushiswap | 0x0eee...9245 | 0.00000012268168155884 |
| BAO / USDC | sushiswap | 0x072b...b14d | 0.000000122117321532902 |
| BAO / WETH | uniswap_v2 | 0x9973...4fb3 | 0.000000123048725343902 |
| BAO / DAI | sushiswap | 0x28bf...81e6 | 0.000000121937327205445 |
| BAO / SUSHI | sushiswap | 0xc599...4ea5 | 0.000000123685909811577 |
| BAO / YFI | sushiswap | 0x3442...fe10 | 0.0000001143283857 |
| BAO / WETH 1% | uniswap_v3 | 0x72d9...79d6 | 0.000002501733344044018702090009536382878129981312 |
| BAO / UNI | uniswap_v2 | 0xc7de...e536 | 0.00000009788873971 |
| BAO / USDT | uniswap_v2 | 0x2b5a...ea97 | 0.0000001297750415 |
| BAO / NEC | uniswap_v2 | 0x9292...55cd | 0.0000001798434407 |
| BAO / LINK | uniswap_v2 | 0x7289...5f4b | 0.0000002300325285 |
| BAO / ETH 0.3% | uniswap-v4-ethereum | 0x2a32...c339 | 0.000000002648833702 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.