Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CELR / WETH 1% | uniswap_v3 | 0xaff1...0a8d | 0.0106915024388331 |
CELR / ETH 1% | uniswap-v4-ethereum | 0xb60b...d468 | 0.0103949715996385 |
CELR / WETH | uniswap_v2 | 0x7520...0c62 | 0.0104301360318749 |
CELR / WETH 0.3% | uniswap_v3 | 0xa957...6fa0 | 0.0101666115906683 |
CELR / KNX 0.3% | uniswap_v3 | 0x72e9...ec4f | 0.0174475361449834449535178140028 |
CELR / KABOSU | uniswap_v2 | 0x03c5...7678 | 0.01100681368 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.