Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ShibDoge / WETH | uniswap_v2 | 0x3016...c6bf | 0.0000000000000000193963897261145 |
ShibDoge / WETH 0.05% | uniswap_v3 | 0x0868...d445 | 0.00000000000000001591468992 |
ShibDoge / BONE | shibaswap | 0x72d2...0060 | 0.00000000000000001630180406 |
GOLD / ShibDoge | uniswap_v2 | 0x6203...0283 | 0.00000000000000001603299954 |
ShibDoge / BURN | shibaswap | 0x60d3...6128 | 0.000000000000000073610453925059660755003987180892590473035475590578364059130513129843692222083338438572092 |
KIBA / ShibDoge | sushiswap | 0x23de...d47c | 0.0000000000000000613887690962824730414931070744134838255743979839985024824271352039154235660955670168191 |
ShibDoge / X | sushiswap | 0xe6c5...7920 | 0.00000000000000007822708866458856251218131291870652165446559926038549576612110160964833674423153295422352 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.