| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BAO / USDC | sushiswap | 0x072b...b14d | 0.0000000985094419899317 |
| BAO / WETH | sushiswap | 0x0eee...9245 | 0.0000000978445653329008 |
| BAO / WETH | uniswap_v2 | 0x9973...4fb3 | 0.0000000984881389615249 |
| BAO / SUSHI | sushiswap | 0xc599...4ea5 | 0.0000000941862440577675 |
| BAO / DAI | sushiswap | 0x28bf...81e6 | 0.0000000986547061094328 |
| BAO / YFI | sushiswap | 0x3442...fe10 | 0.0000000933183580271895 |
| BAO / WETH 1% | uniswap_v3 | 0x72d9...79d6 | 0.000002501733344044018702090009536382878129981312 |
| BAO / UNI | uniswap_v2 | 0xc7de...e536 | 0.00000008161162626 |
| BAO / USDT | uniswap_v2 | 0x2b5a...ea97 | 0.0000001297750415 |
| BAO / LINK | uniswap_v2 | 0x7289...5f4b | 0.0000002300325285 |
| BAO / NEC | uniswap_v2 | 0x9292...55cd | 0.0000000930970551800299 |
| BAO / ETH 0.3% | uniswap-v4-ethereum | 0x2a32...c339 | 0.0000001359056823 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.