Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PDT / WETH 1% | uniswap_v3 | 0x75ea...ad0b | 0.1541516834 |
PDT / WETH 0.3% | uniswap_v3 | 0x786b...05a8 | 0.154698233061752 |
PDT / PRIME 1% | uniswap_v3 | 0xf3e9...fad1 | 0.249736333397843 |
PDT / RNG 0.3% | uniswap_v3 | 0x6b95...a8bd | 0.10141276592965 |
PDT / USDC 0.3% | uniswap_v3 | 0xa929...84d3 | 0.1050917474389324962080866718946 |
PDT / USDT 1% | uniswap_v3 | 0x1e78...8184 | 0.0623372507494724 |
PDT / USDC 1% | uniswap_v3 | 0x098f...a54b | 0.0896969339110660878811029720894 |
PDT / WETH | uniswap_v2 | 0xee56...5c39 | 0.00000000001872694986 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.