Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FORTH / WETH 1% | uniswap_v3 | 0xc1df...bb1b | 2.98875033153447 |
FORTH / WETH | uniswap_v2 | 0xf604...bd4e | 2.90923405704869 |
FORTH / WETH 0.3% | uniswap_v3 | 0xbc9b...cc29 | 2.93793824766665 |
FORTH / USDT | uniswap_v2 | 0x1812...2dd3 | 2.84997857890542 |
FORTH / USDT 0.3% | uniswap_v3 | 0x71ea...6860 | 3.7537309009 |
FORTH / AMPL 0.3% | uniswap_v3 | 0x51b1...3374 | 4.57662741072252 |
FORTH / WETH | sushiswap | 0x91c7...9502 | 2.95184249287628 |
FORTH / WAMPL 1% | uniswap_v3 | 0x000e...7998 | 4.08879397047092 |
FORTH / KABOSU | uniswap_v2 | 0x7f84...30bd | 2.6165608766 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.