Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
RADAR / WETH | sushiswap | 0x559e...52cb | 0.00161707859858109 |
RADAR / ETH 0.3% | uniswap-v4-ethereum | 0xd180...797e | 0.0016223882986035 |
RADAR / WETH 1% | sushiswap-v3-ethereum | 0x4c45...d2e7 | 0.00160478296102437 |
RADAR / USDT 1% | uniswap_v3 | 0x105f...bfc8 | 0.02333810449 |
RADAR / WETH 1% | uniswap_v3 | 0x4784...e188 | 0.00909318593 |
RADAR / WETH 0.01% | sushiswap-v3-ethereum | 0xfaa5...b0bc | 0.00152374959653981 |
RADAR / WETH | uniswap_v2 | 0x0fd3...7410 | 0.00005194904507 |
RADAR / KABOSU | uniswap_v2 | 0x9353...0c47 | 0.003593322496 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.