Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BEAM / WETH | uniswap_v2 | 0x180e...c6e4 | 0.00703782052213247 |
BEAM / WETH 1% | uniswap_v3 | 0x318f...89b8 | 0.00697492291240188 |
BEAM / WETH 0.3% | uniswap_v3 | 0xb6b9...6d27 | 0.00701916415667852 |
BEAM / MC 0.05% | uniswap_v3 | 0xa468...bc8b | 0.0176266351842344 |
BEAM / WETH | x7-finance | 0x5ede...d52e | 0.00808077951709502 |
BEAM / USDT 1% | uniswap_v3 | 0x6549...ba65 | 0.0195008466787611 |
BEAM / USDC 1% | uniswap_v3 | 0x7094...b88a | 0.0350092187257943 |
BEAM / ASDFG 1% | uniswap_v3 | 0x2bf5...8857 | 0.02443691339 |
BEAM / ELON 1% | uniswap_v3 | 0x36d8...28cf | 0.0308100197003241 |
n / BEAM 1% | uniswap_v3 | 0xa7bc...2287 | 0.00749668157669233 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.