Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MORPHO / WETH 0.3% | uniswap_v3 | 0xc821...ac53 | 1.29530176354045 |
MORPHO / WETH 1% | uniswap_v3 | 0x25b9...ec6f | 1.29638754648813 |
MORPHO / AAVE 1% | uniswap_v3 | 0xc57c...df07 | 1.28002306892444 |
MORPHO / USDC 1% | uniswap_v3 | 0xe7c4...9da2 | 2.20197477804596 |
MORPHO / USDC 0.95% | uniswap-v4-ethereum | 0x6679...ddbb | 2.1691548877 |
MORPHO / EIGEN 0.8% | uniswap-v4-ethereum | 0xb5bc...b0ac | 0.9828580633 |
MORPHO / ETH 0.8% | uniswap-v4-ethereum | 0xe5c6...50ea | 1.9683090176 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.