Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ORDS / WETH | uniswap_v2 | 0xfe9e...d8e3 | 0.000767752801326025 |
ORDS / WETH 0.25% | pancakeswap-v3-ethereum | 0xbea2...389d | 0.0005694224796 |
ORDS / USDC 1% | uniswap_v3 | 0x887a...9be1 | 0.0113959685638726 |
ELON / ORDS 1% | uniswap_v3 | 0x58cd...42d6 | 0.200564936622335 |
ORDS / WETH 1% | pancakeswap-v3-ethereum | 0xe720...ebd3 | 0.0738153275733511 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.