Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
BONDLY / WETH | uniswap_v2 | 0x4d31...9fd6 | 0.00097197687275657 |
BONDLY / WETH | sushiswap | 0x65f5...1d20 | 0.000980877702937275 |
GMEE / BONDLY | sushiswap | 0x9c3e...f1c2 | 0.000989093076126349 |
BONDLY / TOWER | sushiswap | 0x90e4...da51 | 0.000992951456902052 |
BONDLY / REVV | sushiswap | 0xab70...8397 | 0.000989803093300192 |
BONDLY / WETH 1% | uniswap_v3 | 0x0d38...295e | 0.024148175386018 |
BONDLY / WETH 0.3% | uniswap_v3 | 0x7b83...c3d5 | 0.001089545298364916324125771022764283447361414008390005663 |
BONDLY / USDC 1% | uniswap_v3 | 0x39a9...0689 | 0.00824900576648209941902761318033 |
LYM / BONDLY | sushiswap | 0x9f59...72f2 | 0.001841030888 |
BONDLY / LMT | sushiswap | 0xca71...347b | 0.001452925228 |
QUIDD / BONDLY | sushiswap | 0x16c4...a926 | 0.00228756935021874 |
BONDLY / UMAD | sushiswap | 0xa602...c327 | 0.001187818089 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.