Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
STND / WETH | uniswap_v2 | 0xe942...8d09 | 0.00319089989619358 |
STND / WETH | sushiswap | 0xf52e...095a | 0.003502352622538 |
STND / Metis | standard_ethereum | 0x7149...bfec | 0.00319697698582571 |
SDN / STND | standard_ethereum | 0xb08c...58d8 | 0.116811737048044 |
STND / WETH 0.3% | uniswap_v3 | 0x708e...fc85 | 0.2134792215 |
PIST / STND | standard_ethereum | 0x877e...b08b | 0.00337801135711034 |
STND / WETH | standard_ethereum | 0x895d...7eb4 | 0.003686919323 |
STND / USDC | standard_ethereum | 0xe8d3...a9ca | 0.003610614694 |
dSTND / STND | standard_ethereum | 0xc939...8fb3 | 0.006275627249 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.