Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DORKL / WETH | uniswap_v2 | 0xef9e...b077 | 0.000139823324283424 |
DORKL / WETH 1% | uniswap_v3 | 0xf7f3...3651 | 0.0001075245612 |
JEDI / DORKL | uniswap_v2 | 0x54f2...8468 | 0.00158480478780043 |
DORKL / WETH | x7-finance | 0x286d...caf9 | 0.0001892083562 |
BITCOIN / DORKL 1% | uniswap_v3 | 0xb93b...33ad | 0.00516941836727456 |
DORKL / WETH 0.3% | uniswap_v3 | 0x3fcc...48b2 | 0.00196697794669497 |
DORKL / SPX 1% | uniswap_v3 | 0x581c...08d6 | 0.0061054804850196 |
JEDI / DORKL 1% | uniswap_v3 | 0xe495...3268 | 0.00237838152704646 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.