Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
sF9 / DEV9 | uniswap_v2 | 0xe618...1d1c | 0.00003752742517 |
DEV9 / WETH | uniswap_v2 | 0xeae0...7a53 | 0.00002505727865 |
F9 / DEV9 | uniswap_v2 | 0xea46...3960 | 0.00004911213352 |
DEV9 / wF9 | uniswap_v2 | 0x703c...b992 | 0.00002525685101 |
METAIX / DEV9 | uniswap_v2 | 0xa39f...ca90 | 0.000130411417636528 |
DEV9 / FDX | uniswap_v2 | 0x9c1f...06a9 | 0.00002670317349 |
DEV9 / DAO9 | uniswap_v2 | 0x9d4d...eb73 | 0.0000745201426690959 |
DEV9 / xF9 | uniswap_v2 | 0xedc4...eadd | 0.00003713529471 |
dDAO9 / DEV9 | uniswap_v2 | 0xac3e...608d | 0.0000745201426690959 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.