Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PEOPLE / WETH 1% | uniswap_v3 | 0x83ab...9976 | 0.0160428566372809 |
PEOPLE / WETH | uniswap_v2 | 0xa525...d336 | 0.0165075346429837 |
PEOPLE / WETH 0.3% | uniswap_v3 | 0x5d7b...55d7 | 0.0159452164066672 |
GUMP / PEOPLE | uniswap_v2 | 0xe224...36d5 | 0.0265154437477906977729707976087133615083555909596818806895637495913494619511748141879902336 |
FREE / PEOPLE 1% | uniswap_v3 | 0x82ab...0ee7 | 0.0802617807159622 |
PEOPLE / USDC 1% | uniswap_v3 | 0xdf1c...09d8 | 0.0916130706621059 |
GUMP / PEOPLE 0.3% | uniswap_v3 | 0xe4be...5650 | 0.0264500333135782738488940905208 |
PEOPLE / KABOSU | uniswap_v2 | 0x08fd...68da | 0.01959629028 |
FREE / PEOPLE | uniswap_v2 | 0xb9e1...264b | 0.025131035080449933571971900810195481813911005391506549185363299429682466307115186306297004 |
JUSTICE / PEOPLE 1% | uniswap_v3 | 0xe6d4...6515 | 0.0250385936895555891063393773871 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.