Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BABYCOCORO / WETH | uniswap_v2 | 0xf377...4fa9 | 0.0000489165782766125 |
BABYCOCORO / COCORO 1% | uniswap-v4-ethereum | 0x868a...3416 | 0.00002708445233 |
BABYCOCORO / REMUS 3% | uniswap-v4-ethereum | 0x2036...12a9 | 0.00003367580915 |
BABYCOCORO / REMUS 2% | uniswap-v4-ethereum | 0x50ba...9f11 | 0.00004211912736 |
BABYCOCORO / REMUS 1.5% | uniswap-v4-ethereum | 0xc7b8...03b6 | 0.00004181498987 |
BABYCOCORO / ETH 1% | uniswap-v4-ethereum | 0x91ed...9a3e | 0.00005070370517 |
BABYCOCORO / COCORO 0.3% | uniswap-v4-ethereum | 0xaeeb...9f51 | 0.00004763450021 |
BABYCOCORO / REMUS 1% | uniswap-v4-ethereum | 0x4a28...783a | 0.00004424941257 |
BABYCOCORO / COCORO 2% | uniswap-v4-ethereum | 0xa05d...1b5d | 0.0000247451491 |
BABYCOCORO / COCORO 1.5% | uniswap-v4-ethereum | 0xbf94...7e05 | 0.00002280763362 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.