Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BAO / WETH | uniswap_v2 | 0x9973...4fb3 | 0.00000048822624770029 |
BAO / USDC | sushiswap | 0x072b...b14d | 0.000000480321529755271 |
BAO / DAI | sushiswap | 0x28bf...81e6 | 0.00000047420859653472 |
BAO / SUSHI | sushiswap | 0xc599...4ea5 | 0.000000501281502335329 |
BAO / WETH | sushiswap | 0x0eee...9245 | 0.000000465611717035954 |
BAO / WETH 1% | uniswap_v3 | 0x72d9...79d6 | 0.000002501733344044018702090009536382878129981312 |
BAO / YFI | sushiswap | 0x3442...fe10 | 0.0000006519010793 |
BAO / UNI | uniswap_v2 | 0xc7de...e536 | 0.0000012483059869689 |
BAO / USDT | uniswap_v2 | 0x2b5a...ea97 | 0.00000157647088416477 |
BAO / NEC | uniswap_v2 | 0x9292...55cd | 0.000000957617692187995 |
BAO / LINK | uniswap_v2 | 0x7289...5f4b | 0.00000235248322763124 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.