Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DC / WETH 1% | uniswap_v3 | 0x4984...1ec5 | 0.000114122082070359 |
DC / WETH | uniswap_v2 | 0x8a63...8a32 | 0.000113874401361916 |
BARK / DC 1% | uniswap_v3 | 0x300e...0c5f | 0.00178698085610143040449505040327 |
DC / DCFC 1% | uniswap_v3 | 0xec27...59fe | 0.00178698085610143040449505040327 |
KC / DC 1% | uniswap_v3 | 0x5526...43bf | 0.001139494557904438523030873190469 |
DC / USDT 1% | uniswap_v3 | 0x8b49...d19e | 0.00198754182 |
DC / WETH | sushiswap | 0x49b1...2d8b | 0.0001055701778 |
RADIO / DC | radioshack_ethereum | 0xde74...9473 | 0.0018237818278003131416825241826548055999505696889761306407667812354749165886047512409319992 |
DC / USDC 1% | uniswap_v3 | 0xb9f9...1498 | 0.001562769194925003896379854999316 |
DC / WETH 0.3% | uniswap_v3 | 0xee14...efd9 | 0.00134136256059054 |
DMD / DC | uniswap_v2 | 0xdaf8...4c34 | 0.00159117061337216031076087468047314232805558777306063488441704351995938233657054762553062232 |
SEND / DC 1% | uniswap_v3 | 0x9dd9...0101 | 0.00159132991938879830239711415616 |
DC / USDC | uniswap_v2 | 0x8db7...d811 | 0.0017902582919291051293393547432479156258821304376453156270535214014079430892413583991229652 |
WOOFI / DC 1% | uniswap_v3 | 0x2197...10f8 | 0.00157343713709712576943612170576 |
DC / EUL 1% | uniswap_v3 | 0x917f...38a7 | 0.001060550008843771634204423460096 |
DC / LUNA | uniswap_v2 | 0x5d72...a6b3 | 0.00179007644512358712307711590093835178782394739173663430923714769855252397951299132558637647 |
DCC / DC | uniswap_v2 | 0xe4c5...f37a | 0.0018015118221030580080660438200251502739199846848942738572229956364914364534015524395912611 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.