Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BURN / WETH | uniswap_v2 | 0x18f7...494b | 0.00000406441294104487 |
BURN / WETH | sushiswap | 0x5b3f...d096 | 0.000003954086022 |
BURN / SHIB | sushiswap | 0x2584...523a | 0.00000382874275662917 |
BURN / LUNA | sushiswap | 0x9b6a...08b3 | 0.00000393692802 |
BURN / SOL | sushiswap | 0x5fa5...0f83 | 0.00000383790587 |
PEPE / BURN | uniswap_v2 | 0x6f8f...3af8 | 0.000003924735126 |
BURN / UNI | sushiswap | 0x4e73...63e2 | 0.000003291047165 |
BURN / SUSHI | sushiswap | 0x489a...794c | 0.000004096102906 |
BURN / WETH | shibaswap | 0x4f22...a94c | 0.000001637060642 |
BURN / ILV | sushiswap | 0xd649...9545 | 0.000002129663959 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.