Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SWISE / WETH 0.3% | uniswap_v3 | 0x2af4...9afa | 0.0122562476295265 |
SWISE / WETH 1% | uniswap_v3 | 0x15d1...78fc | 0.0393816163403169 |
SWISE / sETH2 0.3% | uniswap_v3 | 0x992f...2160 | 0.011756347367429 |
ICHI / SWISE 0.3% | uniswap_v3 | 0x57a2...1d49 | 0.01251382684 |
SWISE / WETH | uniswap_v2 | 0xe74b...403a | 0.01013871163 |
SWISE / DAI 0.3% | uniswap_v3 | 0xf2af...dbb6 | 0.1359379082295128694577136131458 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.