Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
UBT / WETH | uniswap_v2 | 0xb27d...f5ba | 0.0146675739412846 |
UBT / WETH 1% | uniswap_v3 | 0xf9d2...0bda | 0.0147099837779065 |
UBT / USDC 1% | uniswap_v3 | 0xc1a2...567a | 0.04878097114 |
UBT / WETH 0.3% | uniswap_v3 | 0xdd5a...0ead | 0.0643759255998104 |
RPL / UBT | uniswap_v2 | 0x1411...4a3b | 0.13721178683912349807751692106386832168393412209038487182939639931306974774175447231756872 |
UBT / LINK | uniswap_v2 | 0x3f7b...7a94 | 0.02130254542 |
PRVD / UBT 1% | uniswap_v3 | 0x6abb...8a23 | 0.0826771753447213 |
UBT / WETH | sushiswap | 0x1c8d...e93e | 0.0262547404 |
UBT / MNW 1% | uniswap_v3 | 0xae7d...e7cd | 0.01332545815 |
ICNQ / UBT | uniswap_v2 | 0xb480...d855 | 0.079310096008393 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.