Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DEFI / WETH 1% | uniswap_v3 | 0xb378...2775 | 0.00483970053299772 |
DEFI / USDT 0.01% | uniswap-v4-ethereum | 0x9686...f6d0 | 0.00520090042833774 |
DEFI / WETH 0.01% | uniswap_v3 | 0xba0c...7c86 | 0.00773680502841541 |
DEFI / ETH 40% | uniswap-v4-ethereum | 0xe5b5...2e86 | 0.009073833194 |
DEFI / ETH 20% | uniswap-v4-ethereum | 0x63a9...9265 | 0.002929871093 |
DEFI / USDT 1% | uniswap_v3 | 0x989a...36fc | 0.0180359840798981 |
DEFI / USDC 90% | uniswap-v4-ethereum | 0x4784...f293 | 0.050603328 |
DEFI / ETH 1% | uniswap-v4-ethereum | 0x8813...e3fa | 0.01402650542 |
DEFI / USDT | pancakeswap_ethereum | 0x6956...3cb1 | 0.006752108157 |
DEFI / WETH | uniswap_v2 | 0xac1e...0e63 | 0.01365216802 |
DEFI / USDC 1% | uniswap_v3 | 0xe1c2...0b85 | 0.319334227590141 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.