Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SNT / WETH 0.3% | uniswap_v3 | 0x084b...928f | 0.0228120925903709 |
SNT / WETH | uniswap_v2 | 0x59e7...cea2 | 0.0229696730627843 |
DNT / WBTC / VEE / KEY / SNT / QSP / WETH 5% | balancer_ethereum | 0x382d...9ac8 | 0.0454109127093598 |
SNT / WETH 0.3% | balancer_ethereum | 0x8c5f...f5dd | 0.02535133971 |
DNT / WBTC / KEY / SNT / USDC / WETH 5% | balancer_ethereum | 0x40fb...34f7 | 0.024476456203751 |
SNT / ETH 0.3% | uniswap-v4-ethereum | 0x5b6c...99b3 | 0.02016111516 |
SNT / DAI | uniswap_v2 | 0x4367...168e | 0.03305564211 |
SNT / DAI 0.3% | uniswap_v3 | 0x1452...6b62 | 0.019931518459929062318621762 |
SNT / USDT | uniswap_v2 | 0x31b7...f10c | 0.0265135891419177715173420213236200956306664771620844024996991637245630270000234790864993183 |
SNT / KABOSU | uniswap_v2 | 0x20d0...c34e | 0.02773739834 |
SNT / LINK | uniswap_v2 | 0x7935...3327 | 0.030134286954039115519583298579080245673555978548258455410098930473386991068198705160676008 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.