Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
POL / WETH 0.3% | uniswap_v3 | 0x88ad...35d1 | 0.187565917891901 |
POL / MATIC 0.3% | uniswap_v3 | 0x3944...edbb | 0.188569621635171 |
POL / WETH 1% | sushiswap-v3-ethereum | 0xb722...0ef2 | 0.187327485606199 |
POL / WETH | uniswap_v2 | 0x23e0...c4f1 | 0.18929472856238 |
POL / ETH 1% | uniswap-v4-ethereum | 0x57ac...3202 | 0.187938506804745 |
POL / USDC 0.05% | uniswap_v3 | 0x8bc2...7cb4 | 0.182783626338697 |
POL / USDC 0.3% | uniswap-v4-ethereum | 0x9041...beeb | 0.201678519700331 |
POL / USDT 0.3% | uniswap_v3 | 0xb70a...abc7 | 0.2589723177 |
POL / wstETH 0.3% | uniswap-v4-ethereum | 0x2274...5f43 | 0.2505922317 |
POL / MATIC 1% | uniswap_v3 | 0x3765...6924 | 0.256382156 |
POL / ETH2X 1% | uniswap-v4-ethereum | 0xe9e7...8d6d | 0.3001865749 |
POL / USDC 0.01% | uniswap-v4-ethereum | 0x068d...0c99 | 0.2407502456 |
POL / MATIC 0.01% | uniswap_v3 | 0x9c92...06c0 | 0.738319655861783 |
POL / ETH 0.01% | uniswap-v4-ethereum | 0x0ab8...7b80 | 0.2217979028 |
POL / USDC 0.3% | uniswap_v3 | 0xc50c...316c | 0.2443599643 |
POL / USDT 0.05% | uniswap_v3 | 0x465d...5394 | 0.452433030966604 |
POL / ETH2x-FLI 1% | sushiswap-v3-ethereum | 0x9aa2...f564 | 0.2979847761 |
POL / EOTW 0.3% | uniswap_v3 | 0x80f0...c6aa | 0.1895390703 |
POL / WETH 1% | uniswap_v3 | 0x1e90...28ca | 0.3218862425 |
POL / ETH2X 1% | uniswap_v3 | 0xae79...d50a | 0.2970301602 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.