Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MORPH / DRAGONX 1% | uniswap_v3 | 0x763c...1b0c | 0.000000249245810405645 |
MORPH / WETH 0.3% | uniswap_v3 | 0x05c7...e6f9 | 0.000000248358328424101 |
MORPH / TITANX 1% | uniswap_v3 | 0x6383...4d8e | 0.000000249740107673793 |
MORPH / SHOGUN | uniswap_v2 | 0xbac5...f066 | 0.000000263064169888415 |
MORPH / ELMNT | uniswap_v2 | 0xd29f...1bf2 | 0.000000247286360662064 |
MORPH / WETH 1% | uniswap_v3 | 0x084e...387b | 0.000002660555946 |
MORPH / SCALE | uniswap_v2 | 0x30b3...c071 | 0.000001465435381 |
ALIENX / MORPH | uniswap_v2 | 0x5e8d...c364 | 0.0000006922851131 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.