Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
STZ / WETH | sushiswap | 0x7058...0d3b | 0.00956861144930571 |
PROS / STZ | sushiswap | 0x3573...f1b1 | 0.00864686853078011 |
GMEE / STZ | sushiswap | 0x18ab...9ce9 | 0.01031511564 |
REVV / STZ | sushiswap | 0xedfc...3da5 | 0.009307325029 |
STZ / TOWER | sushiswap | 0x40f5...0829 | 0.008939938851 |
STZ / PRIMATE | sushiswap | 0x1fbd...87f6 | 0.00999296222140238 |
STZ / LMT | sushiswap | 0x1180...d696 | 0.004276598528 |
QUIDD / STZ | sushiswap | 0x68d6...dfe9 | 0.0218493371522443 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.