Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WOJAK / WETH | uniswap_v2 | 0x0f23...496e | 0.000389169837484362 |
WOJAK / OX | uniswap_v2 | 0xb5a0...fc48 | 0.000390800115586456 |
WOJAK / WETH 1% | uniswap_v3 | 0x7316...4db1 | 0.00039017187669387 |
NULL / WOJAK | uniswap_v2 | 0x7d2f...38d6 | 0.000388964323805794 |
WOJAK / VYPER 1% | uniswap_v3 | 0x67ca...8ad2 | 0.000380768309760529 |
WOJAK / WETH | sushiswap | 0x6010...ee30 | 0.000334944448307105 |
WOJAK / PEPE 1% | uniswap_v3 | 0x0b4c...2dbd | 0.000428533284062117 |
WOJAK / WETH 0.3% | uniswap_v3 | 0x35f0...f454 | 0.00133189700765301 |
WOJAK / KABOSU | uniswap_v2 | 0xbfa0...48bd | 0.0004939227853 |
WOJAK / DOGE2.0 | uniswap_v2 | 0xcfde...d0fa | 0.000105288933533086 |
WOJAK0.5 / WOJAK | uniswap_v2 | 0x5383...f6b2 | 0.000142624125511862 |
$WOJACKING / WOJAK | uniswap_v2 | 0x7061...3882 | 0.000123953488030891 |
WOJAK / BURN 1% | uniswap_v3 | 0x1593...964e | 0.000178838756803812 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.