Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
STONE / WETH 1% | uniswap_v3 | 0xf577...11a2 | 1879.66157127353 |
STONE / WETH | uniswap_v2 | 0x3def...07e7 | 1864.31004498133 |
STONE / ETH 0.999% | uniswap-v4-ethereum | 0x16db...8f1c | 1854.83342291472 |
STONE / ETH 0.15% | uniswap-v4-ethereum | 0xad62...77ad | 2293.6687316061 |
STONE / cWBTC 0.3% | uniswap-v4-ethereum | 0xaed3...be12 | 1851.08715172244 |
STONE / OLM 1% | uniswap_v3 | 0xb547...6fb7 | 2509.34262074679 |
STONE / WETH 0.01% | uniswap_v3 | 0x30b8...64aa | 2373.9099409878 |
STONE / WETH 0.3% | uniswap_v3 | 0xce24...2363 | 2205.4305924024 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.