Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PEPE / WETH | uniswap_v2 | 0xa43f...ec9f | 0.00000701066439264177 |
PEPE / WETH 0.3% | uniswap_v3 | 0x1195...7b58 | 0.00000705091169182631 |
APU / PEPE / SPX 1% | balancer_ethereum | 0x9d0d...30ed | 0.00000701010952613011 |
PEPE / WETH 1% | uniswap_v3 | 0xf239...c8a6 | 0.00000704071542874798 |
PEPE / PEEZY 1% | uniswap_v3 | 0x5ded...6692 | 0.00000678509933932175 |
PEPE / USDC 1% | uniswap_v3 | 0xcee3...40c7 | 0.0000069625609307205 |
PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.00000699202975230328 |
PEPE / WBTC 0.3% | uniswap_v3 | 0x992c...8417 | 0.0000069473980110254 |
PEPE / SOTU | uniswap_v2 | 0xaba1...2a2b | 0.00000702708199814102 |
ARRKY / PEPE | uniswap_v2 | 0x8021...5cc8 | 0.00000702903064670098 |
ETH / PEPE 2.5% | uniswap-v4-ethereum | 0xecd7...e2c9 | 0.00000662288977515142 |
PEPE / USDT 0.3% | uniswap_v3 | 0xa7bc...88c5 | 0.00000689811608704897 |
PEPE / USDT 0.05% | uniswap-v4-ethereum | 0x1b5f...aab7 | 0.00000697993077993727 |
PEPE / SEXY 1% | uniswap_v3 | 0x81dd...de4d | 0.00000657355598090008 |
PEPE / WETH 1% | pancakeswap-v3-ethereum | 0x3202...1d1b | 0.00000695519362534156 |
PEPE / ZIK 1% | pancakeswap-v3-ethereum | 0x8c77...ece4 | 0.00000696718740998468 |
PEPE / VYBN 1% | uniswap_v3 | 0x3868...6be5 | 0.00000659352157579837 |
PEPE / Toil 1% | uniswap_v3 | 0x2d77...fbba | 0.00000703905348825884 |
$MaxETH / PEPE 1% | uniswap_v3 | 0x3aaa...b946 | 0.00000675854984554037 |
PURPLE / PEPE 1% | uniswap_v3 | 0x2ec0...65a8 | 0.00000658258162744932 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.