Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PHA / WETH | uniswap_v2 | 0x8867...e61e | 0.117745920949557 |
PHA / WETH 1% | uniswap_v3 | 0x7bc5...bc53 | 0.116774428741981 |
PHA / ABDS 1% | pancakeswap-v3-ethereum | 0x7378...bdfb | 0.116962872624812 |
vPHA / PHA 0.3% | uniswap_v3 | 0x7977...7229 | 0.111058548121068 |
PHA / ABDS 0.3% | uniswap-v4-ethereum | 0x5f3d...aef1 | 0.114868450728864 |
PHA / USDT 0.3% | uniswap_v3 | 0x4797...a813 | 0.2546169483 |
AGIX / PHA 1% | uniswap_v3 | 0xfd64...8e15 | 0.106753752190491 |
PHA / ABDS 1% | uniswap_v3 | 0x3c18...eb4c | 0.1588893119 |
PHA / KABOSU | uniswap_v2 | 0xeaf6...3da4 | 0.114162100651459 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.