Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PHA / WETH | uniswap_v2 | 0x8867...e61e | 0.108297795813642 |
PHA / WETH 1% | uniswap_v3 | 0x7bc5...bc53 | 0.106711758960216 |
vPHA / PHA 0.3% | uniswap_v3 | 0x7977...7229 | 0.114580224497981 |
CCDAO / PHA 1% | uniswap_v3 | 0x4f91...edc6 | 0.0980129119 |
PHA / ABDS 1% | pancakeswap-v3-ethereum | 0x7378...bdfb | 0.117613343876966 |
PHA / EVT | pancakeswap_ethereum | 0x693f...72df | 0.1007566973 |
PHA / ABDS 0.3% | uniswap-v4-ethereum | 0x5f3d...aef1 | 0.1110346885 |
PHA / USDT 0.3% | uniswap_v3 | 0x4797...a813 | 0.2546169483 |
AGIX / PHA 1% | uniswap_v3 | 0xfd64...8e15 | 0.106753752190491 |
PHA / ABDS 1% | uniswap_v3 | 0x3c18...eb4c | 0.1588893119 |
PHA / KABOSU | uniswap_v2 | 0xeaf6...3da4 | 0.1141621007 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.