Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WOLF / WETH | uniswap_v2 | 0x6732...18c2 | 0.0000379895347292838 |
WOLF / WETH 1% | uniswap_v3 | 0x6981...906e | 0.0000384154641739222 |
USDC / WOLF | curve | 0x0500...3809 | 0.0000386840696556601 |
WOLF / BOYS 1% | uniswap-v4-ethereum | 0xbf8d...76e4 | 0.00004044242084 |
WOLF / $MaxETH 1% | uniswap-v4-ethereum | 0x7e95...6807 | 0.0000410096544564254 |
WOLF / ETH 1% | uniswap-v4-ethereum | 0x4578...9e2d | 0.00007155390677 |
WOLF / BIRDDOG 1% | uniswap-v4-ethereum | 0xe1c8...662f | 0.0000591271699 |
WOLF / USDT 1% | uniswap-v4-ethereum | 0xf14c...8201 | 0.00006873916895 |
WOLF / $MaxETH 1% | uniswap_v3 | 0xde3e...c7ca | 0.0000412200267732252 |
WOLF / FOFAR 0.3% | uniswap-v4-ethereum | 0xd9e7...c6e1 | 0.00004224306833 |
WOLF / BOYS 1.5% | uniswap-v4-ethereum | 0xd8d3...ee22 | 0.00005320516843 |
WOLF / BOYS 0.3% | uniswap-v4-ethereum | 0x5e0f...4bca | 0.00003514999172 |
WOLF / FOFAR 1% | uniswap-v4-ethereum | 0xbf1f...4cde | 0.00005629662297 |
WOLF / ETH 0.3% | uniswap-v4-ethereum | 0xa8af...ae74 | 0.000042288262093857 |
WOLF / USDT 0.3% | uniswap-v4-ethereum | 0x6827...775b | 0.00005033831122 |
WOLF / ANDY 0.3% | uniswap-v4-ethereum | 0x50b6...f95a | 0.00002720204009 |
WOLF / BOYS | uniswap_v2 | 0x344a...5466 | 0.000226533474 |
WOLF / BOYS 0.3% | uniswap_v3 | 0x7d6f...4dd0 | 0.00003624745778 |
WOLF / ANDY 1% | uniswap_v3 | 0xc6ae...35be | 0.0000220537487172633 |
ICELAND / WOLF 1% | uniswap_v3 | 0x6612...601b | 0.0000211699459770623 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.