Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
APE / WETH 0.3% | uniswap_v3 | 0xac4b...7daf | 0.662001856136621 |
APE / ETH 0.3% | uniswap-v4-ethereum | 0x9ecc...4441 | 0.656318884049798 |
APE / WETH | uniswap_v2 | 0xb011...e67f | 0.658239272858918 |
APE / TYBENG | uniswap_v2 | 0x3759...d405 | 0.658504254310105 |
APE / USDT | sushiswap | 0xb27c...4b9f | 0.654773696278172 |
APE / DI 1% | uniswap_v3 | 0x468b...e699 | 0.685374055182237 |
APE / VYBN 1% | uniswap_v3 | 0x12e6...6972 | 0.663522686393227 |
APE / WETH | sushiswap | 0x130f...f253 | 0.666094437104366 |
APE / WETH 1% | uniswap_v3 | 0xf79f...5d27 | 0.678470818749575 |
APE / ODIN | uniswap_v2 | 0xfa7e...a18d | 0.64191395937344 |
$BAPE / APE | uniswap_v2 | 0xd7b8...aa7a | 5.80715323709978731123058947742607324866226531222097131357429434014158643506547860982418952 |
APE / USDC 0.3% | uniswap_v3 | 0xb07f...7324 | 1.47205642 |
HAPE / APE | uniswap_v2 | 0x56f4...25b5 | 4.18896610933997595281009791358876077244844394291504265387211304915675379457273863181334412 |
APE / VVV | uniswap_v2 | 0x5022...888e | 0.635147486922685 |
PRIMATE / APE | sushiswap | 0xdbb6...402e | 0.490367583748307 |
APE / SOTU | uniswap_v2 | 0x1fa3...d6cc | 0.645968352070468 |
APE / WETH | smardex-ethereum | 0x97bf...0b09 | 1.09736022802914 |
EARN / APE 1% | uniswap_v3 | 0xedb6...c81b | 0.486488129106214 |
MANA / SAND / APE / ENJ 0.5% | balancer_ethereum | 0x0c3a...6b09 | 0.3195721963 |
vAPE / APE | uniswap_v2 | 0xc704...b481 | 0.5001874545 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.