Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PLUME / USDC 1% | uniswap_v3 | 0xe35b...43fd | 0.155513486460126 |
PLUME / USDC 1% | uniswap-v4-ethereum | 0xf0cd...26cc | 0.152958960215651 |
PLUME / WETH 1% | pancakeswap-v3-ethereum | 0x34b9...07e5 | 0.167182420313906 |
PLUME / ETH 2% | uniswap-v4-ethereum | 0xf7a4...9b4a | 0.1520736587 |
PLUME / ETH 1% | uniswap-v4-ethereum | 0x00ed...b218 | 0.1466393072 |
PLUME / USDT 1% | uniswap_v3 | 0x2d83...a08c | 0.1690295681 |
PLUME / ONDO 0.3% | uniswap_v3 | 0x7e8f...9ede | 0.1455585572 |
PLUME / WETH 1% | uniswap_v3 | 0xd845...d903 | 0.1181517917 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.