Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
POLS / WETH | uniswap_v2 | 0xffa9...2405 | 0.175192857638022 |
POLS / USDT | uniswap_v2 | 0xdcdc...fc65 | 0.175299761190819 |
POLS / WETH 0.3% | uniswap_v3 | 0xf538...5985 | 0.176991500942261 |
VERI / POLS | uniswap_v2 | 0x172c...9d11 | 0.176481999374903 |
POLS / UNI 0.3% | uniswap_v3 | 0x366c...cc5d | 0.556870712 |
POLS / USDT 1% | uniswap_v3 | 0x913f...f2e5 | 0.173145402832405 |
POLS / UNI | uniswap_v2 | 0xeab9...bc5c | 0.1962372627 |
POLS / USDC | uniswap_v2 | 0xc96b...6ad1 | 0.1732484253 |
POLS / WETH 1% | uniswap_v3 | 0xf30f...ffed | 0.0003033385134 |
POLS / LINK | uniswap_v2 | 0x4cf8...683a | 0.732146743784413 |
PSWAP / POLS | uniswap_v2 | 0x9269...b07b | 0.723333266592364 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.