Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BLOOM / ETH 0.3% | uniswap-v4-ethereum | 0x6eb0...40b9 | 0.5917402242 |
BLOOM / USDC 0.3% | uniswap-v4-ethereum | 0x3b80...940c | 0.5440386065 |
BLOOM / USDC | curve | 0xb334...5652 | 0.4496688102 |
DAI / BLOOM 0.05% | pancakeswap-v3-ethereum | 0xf2ef...b284 | 186.1074417125 |
BLOOM / WETH | pancakeswap_ethereum | 0xcae1...9c55 | 2.8723773595 |
BLOOM / USDC | pancakeswap_ethereum | 0xd471...cdd4 | 1.6743226647 |
DAI / BLOOM 0.3% | uniswap_v3 | 0xd5ea...4cdf | 186.2117855626 |
BLOOM / USDC | uniswap_v2 | 0xc82f...94d4 | 185.0229599707 |
BLOOM / WETH | uniswap_v2 | 0x450a...4c0e | 206.6328257702 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.