Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BAO / WETH | uniswap_v2 | 0x9973...4fb3 | 0.000000490720167394127 |
BAO / USDC | sushiswap | 0x072b...b14d | 0.000000486324320927365 |
BAO / WETH | sushiswap | 0x0eee...9245 | 0.0000004845885872 |
BAO / WETH 1% | uniswap_v3 | 0x72d9...79d6 | 0.000002501733344044018702090009536382878129981312 |
BAO / DAI | sushiswap | 0x28bf...81e6 | 0.0000004856685966 |
BAO / SUSHI | sushiswap | 0xc599...4ea5 | 0.0000004912980448 |
BAO / YFI | sushiswap | 0x3442...fe10 | 0.0000004991032372 |
BAO / USDT | uniswap_v2 | 0x2b5a...ea97 | 0.0000006736989197 |
BAO / UNI | uniswap_v2 | 0xc7de...e536 | 0.0000012483059869689 |
BAO / NEC | uniswap_v2 | 0x9292...55cd | 0.000000957617692187995 |
BAO / LINK | uniswap_v2 | 0x7289...5f4b | 0.00000235248322763124 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.