Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
AERGO / WETH | sushiswap | 0x9e48...a617 | 0.115378458103387 |
AERGO / ETH 30% | uniswap-v4-ethereum | 0xdf53...9650 | 0.164279208181369 |
AERGO / USDT 0.3% | uniswap-v4-ethereum | 0xec1c...e33d | 0.1637356933 |
AERGO / ETH 50% | uniswap-v4-ethereum | 0xe307...2e57 | 0.09260155571 |
AERGO / ETH 10% | uniswap-v4-ethereum | 0x7bc8...8493 | 0.1295691639 |
AERGO / USDT 1% | uniswap-v4-ethereum | 0xddc7...2880 | 0.1189107468 |
AERGO / WETH | uniswap_v2 | 0x505a...4893 | 0.1202730604 |
AERGO / KABOSU | uniswap_v2 | 0xebc8...dd5d | 0.0802206734 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.