Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WOOF / WETH 1% | balancer_ethereum | 0xfd46...f9c0 | 0.000459979809428115225511358612062 |
WOOF / WETH 1% | uniswap_v3 | 0x666e...245b | 0.0000935712905846284 |
$Woof0.5Ai / WOOF | uniswap_v2 | 0xa3bf...3e5c | 0.000950515410573343869389430555202270337130745320884122883913805604717222973295989980629559536 |
WOOF / WETH | uniswap_v2 | 0x49be...f9af | 0.0000951432870177715 |
WOOF / USDT | uniswap_v2 | 0xf514...d5ef | 0.00008233351539 |
WOOF / HNL | uniswap_v2 | 0x9fe7...3bea | 0.0000956858743 |
WOOF / PEPE | uniswap_v2 | 0x81c5...32a4 | 0.0000924124986990579 |
WOOF / TREAT 1% | uniswap-v4-ethereum | 0x80b0...a9b9 | 0.00008055728352 |
WOOF / FUND 1% | uniswap_v3 | 0x38a8...d221 | 0.000172411345250374 |
WOOF / OSAK 1% | uniswap_v3 | 0xabae...c68b | 0.0002086603135 |
WOOF / WETH | shibaswap | 0x1f01...8657 | 0.0000008069438865 |
WOOF / WETH 0.3% | uniswap_v3 | 0x13ad...6439 | 0.00139414410841903 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.