Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MNT / USDe 0.3% | uniswap_v3 | 0x9aac...e1a8 | 0.733942476136343 |
MNT / WETH 0.3% | uniswap_v3 | 0xf4c5...7fef | 0.734914841069599 |
CCDAO / MNT 1% | uniswap_v3 | 0xbe43...b357 | 0.741682290092761 |
MNT / USDC / STG / WETH / USDT / ONDO | balancer_ethereum | 0x787f...3535 | 1.2257792259 |
MNT / WETH 0.3% | balancer_ethereum | 0xa76c...6661 | 3.1420502814 |
MNT / USDC 1% | uniswap_v3 | 0x8fa9...6149 | 0.724506440188733 |
MNT / mETH 0.25% | pancakeswap-v3-ethereum | 0x11b5...d049 | 0.733673828497859 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.