Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WOLF / WETH | uniswap_v2 | 0x6732...18c2 | 0.0000598562182289785 |
WOLF / WETH 1% | uniswap_v3 | 0x6981...906e | 0.0000610974397874711 |
WOLF / BOYS 1.5% | uniswap-v4-ethereum | 0xd8d3...ee22 | 0.0000600673233215116 |
USDC / WOLF | curve | 0x0500...3809 | 0.0000617440767959759 |
WOLF / FOFAR 1% | uniswap-v4-ethereum | 0xbf1f...4cde | 0.0000574163133809496 |
WOLF / ETH 1% | uniswap-v4-ethereum | 0x4578...9e2d | 0.0000614784968996009 |
WOLF / $MaxETH 1% | uniswap_v3 | 0xde3e...c7ca | 0.0000577199486328644 |
WOLF / ETH 0.3% | uniswap-v4-ethereum | 0xa8af...ae74 | 0.0000553865172030075 |
WOLF / BOYS 1% | uniswap-v4-ethereum | 0xbf8d...76e4 | 0.0000546146944685072 |
WOLF / BIRDDOG 1% | uniswap-v4-ethereum | 0xe1c8...662f | 0.0000448506210819158 |
WOLF / BOYS 0.3% | uniswap_v3 | 0x7d6f...4dd0 | 0.00003624745778 |
WOLF / FOFAR 0.3% | uniswap-v4-ethereum | 0xd9e7...c6e1 | 0.00004224306833409 |
WOLF / BOYS 0.3% | uniswap-v4-ethereum | 0x5e0f...4bca | 0.00003514999172 |
WOLF / USDT 0.3% | uniswap-v4-ethereum | 0x6827...775b | 0.0000503383112164847 |
WOLF / ANDY 0.3% | uniswap-v4-ethereum | 0x50b6...f95a | 0.00002720204009 |
WOLF / BOYS | uniswap_v2 | 0x344a...5466 | 0.000226533474 |
WOLF / ANDY 1% | uniswap_v3 | 0xc6ae...35be | 0.0000220537487172633 |
ICELAND / WOLF 1% | uniswap_v3 | 0x6612...601b | 0.0000211699459770623 |
BUD / WOLF 1% | uniswap_v3 | 0x635c...f0e5 | 0.0000607731328847709 |
WOLF / PORK 1% | uniswap_v3 | 0x1d4b...26bd | 0.000111061159846789 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.