Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
OHM / EEFI | uniswap_v2 | 0x79fe...1da8 | 54.4510426716133 |
EEFI / WETH 1% | uniswap_v3 | 0x2365...e5fe | 54.8524289716327 |
EEFI / WAMPL 1% | uniswap_v3 | 0x6f40...6663 | 54.4532287972663 |
EEFI / SPOT 1% | uniswap_v3 | 0xb8c5...6b5d | 52.1866345571253 |
EEFI / WETH 0.3% | uniswap_v3 | 0x0b1d...6024 | 324.1167228061 |
EEFI / USDC 1% | uniswap_v3 | 0x8b3a...924d | 352.769928109161 |
EEFI / USDT | uniswap_v2 | 0x3462...7256 | 150.5658251432 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.