Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
$MaxETH / WETH | uniswap_v2 | 0xf94f...82d6 | 0.00000173021317489575 |
$MaxETH / ETH 1% | uniswap-v4-ethereum | 0x63a6...55be | 0.00000260751237230718 |
$MaxETH / WETH 1% | uniswap_v3 | 0x931e...de88 | 0.00000171920825176332 |
WOLF / $MaxETH 1% | uniswap_v3 | 0xde3e...c7ca | 0.00000172026251487391 |
$MaxETH / PEPE 1% | uniswap_v3 | 0x3aaa...b946 | 0.00000186986744917653 |
$MaxETH / ANDY 1% | uniswap_v3 | 0xa24a...8ceb | 0.00000191004541526246 |
$MaxETH / USDT 0.3% | uniswap-v4-ethereum | 0x691a...758a | 0.00000301367563 |
$MaxETH / BOYS 0.3% | uniswap-v4-ethereum | 0xdcb4...55dd | 0.000002071754826 |
$MaxETH / BOYS 1% | uniswap_v3 | 0xa413...38fb | 0.000002734560998 |
$MaxETH / WETH 1% | sushiswap-v3-ethereum | 0xe021...b6bb | 0.00001752729681 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.