Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
renDOGE / WETH | sushiswap | 0xb467...7cc9 | 0.0149170238996841 |
renDOGE / USDC 1% | uniswap_v3 | 0x3b4f...6982 | 0.245595045074982 |
renDOGE / WETH 1% | uniswap_v3 | 0xb687...5826 | 0.278255026934916 |
renDOGE / DOGEN | uniswap_v2 | 0x2c87...3620 | 0.01528181069 |
renDOGE / TODL | sushiswap | 0x2fcf...09a2 | 0.01228814781 |
renDOGE / DOGEREUM | sushiswap | 0xf4b5...31a6 | 0.01370188185 |
DOGEREUM / renDOGE | uniswap_v2 | 0x19d1...1956 | 0.01252720209 |
renDOGE / WBTC | sushiswap | 0xd715...d800 | 0.0204642019 |
renDOGE / WETH | uniswap_v2 | 0xc847...3fa4 | 0.005546695361 |
renDOGE / mTSLA | uniswap_v2 | 0x0120...7b8f | 0.01620098615 |
renDOGE / ELON 1% | uniswap_v3 | 0x7b4c...f02c | 0.242371389654781232650838010023522386976917875 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.