Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CIV / WETH | uniswap_v2 | 0xed24...db77 | 0.00117891065826965 |
CIV / WETH | shibaswap | 0x8d5a...025b | 0.00124993020298259 |
CIV / WETH 0.3% | uniswap_v3 | 0x2b1b...57b5 | 0.0289887044184728 |
CIV / 0NE | uniswap_v2 | 0xa656...c051 | 0.00116436519620342 |
CIV / WETH | sushiswap | 0x4632...9be4 | 0.00115448942593582 |
CIV / 0NE 0.3% | uniswap_v3 | 0x2788...50ec | 0.00953293902203157 |
CIV / USDT 1% | uniswap_v3 | 0xdf12...f019 | 0.0431588814093542676444326510534 |
CIV / 0NE 1% | uniswap_v3 | 0xf85b...8107 | 0.0288928817861668242990236581266 |
CIV / WETH 1% | uniswap_v3 | 0x184a...dc39 | 0.000000000000000031441435023429998526322105032431674118439548601348 |
CIV / TAIL | uniswap_v2 | 0x54b4...45cd | 0.0274434725659868903397233174819354405731901016589916625527013876754231627947131569290838302 |
CIV / SANI | uniswap_v2 | 0x0c11...8ad7 | 0.0274434725659868903397233174819354405731901016589916625527013876754231627947131569290838302 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.