Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MYC / WETH 0.3% | balancer_ethereum | 0x0a81...fa30 | 0.0000691060237523976 |
MYC / USDC 0.8% | balancer_ethereum | 0x7bb9...3359 | 0.0000515283878405852 |
MYC / WETH 1% | uniswap_v3 | 0x66dd...eb2e | 0.0723948247608192 |
MYC / WETH | sushiswap | 0x5413...e2fc | 0.00006794457859 |
MYC / WETH | uniswap_v2 | 0x82a9...24c0 | 0.001802186235 |
MPL / MYC 1% | uniswap_v3 | 0x2a8a...7365 | 0.0452436193478931317934591197829 |
MYC / WETH 0.3% | uniswap_v3 | 0x8113...1de5 | 1.222881005450342523808297589017 |
MYC / WETH 0.05% | uniswap_v3 | 0x9c8e...809f | 1079.254077953320667206293705643327 |
tMYC / MYC | curve | 0x83d7...9d70 | 0.01378178348294064603458378622 |
MYC / TCR 0.05% | uniswap_v3 | 0xfbc6...0e01 | 0.000004727882204 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.