Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TOM3 / WETH 0.01% | uniswap_v3 | 0x0a16...d1a6 | 0.0000000643803256210239 |
TOM3 / ai16z 0.3% | uniswap_v3 | 0xe872...fd4b | 0.0000000643830690435938 |
TOM3 / ELON 0.3% | uniswap_v3 | 0x1f10...f415 | 0.000000064464071770159 |
MX / TOM3 0.3% | uniswap_v3 | 0x3e2d...ce94 | 0.000000064464071770159 |
TOM3 / UNI 0.3% | uniswap_v3 | 0x7335...66c3 | 0.0000000628977587664274 |
DOGE / TOM3 0.3% | uniswap_v3 | 0xcd2e...676a | 0.0000000616829548914763 |
TOM3 / OKB 0.3% | uniswap_v3 | 0x5576...0053 | 0.0000000624105047632818 |
TOM3 / WBTC 0.3% | uniswap_v3 | 0x0f1b...ad55 | 0.00000006133746269 |
TOM3 / USDC 0.3% | uniswap_v3 | 0xff7c...6ced | 0.0000000623528814739843 |
TOM3 / DAI 0.3% | uniswap_v3 | 0xfcf9...5541 | 0.0000000622631916254697 |
TOM3 / USDT 0.01% | uniswap_v3 | 0xcf3a...39ef | 0.0000000620326412039965 |
TOM3 / DEXT 0.3% | uniswap_v3 | 0xa5d8...3426 | 0.0000000639662109156007 |
TOM3 / AAVE 0.3% | uniswap_v3 | 0xb6c6...c8ac | 0.0000000606699674146141 |
BGB / TOM3 0.3% | uniswap_v3 | 0x7464...3189 | 0.0000000617943338310931 |
TOM3 / LINK 0.3% | uniswap_v3 | 0xb290...155c | 0.00000006129074074 |
TOM3 / SUSHI 0.3% | uniswap_v3 | 0xd692...3053 | 0.00000006203352775 |
TOM3 / PEPE 0.3% | uniswap_v3 | 0x5906...28fa | 0.0000000609542101433399 |
TOM3 / CRO 0.3% | uniswap_v3 | 0xd978...5dd9 | 0.0000000616305103208877 |
PENGU / TOM3 0.3% | uniswap_v3 | 0x34c0...5152 | 0.0000000602528202 |
TOM3 / TKP 0.3% | uniswap_v3 | 0xb347...5046 | 0.00000006163051032 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.