Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
STARL / WETH | uniswap_v2 | 0xa5e9...6b5e | 0.000000502829810600505 |
STARL / WETH | shibaswap | 0x2a52...d55c | 0.000000499712345090713 |
SOTU / STARL | uniswap_v2 | 0x504c...ec58 | 0.0000004553000382 |
STARL / WETH 1% | uniswap_v3 | 0x6f68...905e | 0.0000004632084679 |
STARL / LUNA | uniswap_v2 | 0xa938...edbc | 0.0000004078452196 |
ADvt / STARL | uniswap_v2 | 0xafbd...c1b3 | 0.000000454967110351386 |
STARL / WETH | sushiswap | 0x8a44...e377 | 0.0000007047685798 |
STARL / SHIB | shibaswap | 0x8076...0114 | 0.00000160560480416165978973082789120046921521224638887759386853020095883908907343136128780139048 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.