Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SHIB / WETH | shibaswap | 0xcf6d...deaa | 0.0000123406064793189 |
SHIB / WETH | uniswap_v2 | 0x811b...954f | 0.0000123412962659275 |
SHIB / WETH 0.3% | uniswap_v3 | 0x2f62...a9ec | 0.0000123339453464074 |
SHIB / BONE | shibaswap | 0xff64...ee22 | 0.0000124789806467269 |
LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.0000122473455541562 |
SHIB / WETH 1% | uniswap_v3 | 0x5764...7563 | 0.0000123195188646197 |
SHIB / USDT | shibaswap | 0x98c2...1631 | 0.0000122773895269944 |
SHIB / UNI 1% | uniswap_v3 | 0xe07c...e705 | 0.0000123137951901089 |
SHIB / USDC | shibaswap | 0x9379...b0a4 | 0.0000123478484701844 |
SOTU / SHIB | uniswap_v2 | 0x14a8...200a | 0.0000123625949235455 |
SHIB / WETH 0.05% | uniswap_v3 | 0x94e4...c723 | 0.0000123226023880198 |
SHIB / ETH 1% | uniswap-v4-ethereum | 0x2842...7379 | 0.0000122234867295498 |
PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.0000120541646507759 |
SHIB / ODIN | uniswap_v2 | 0x3feb...61d1 | 0.0000123496328941797 |
SHIB / USDC 1% | uniswap_v3 | 0xa15c...8350 | 0.0000124436106744774 |
SHIB / USDT | uniswap_v2 | 0x773d...8cc8 | 0.000012382846299325 |
SHIB / OSAK | uniswap_v2 | 0x9ad3...48d9 | 0.0000123291981006348 |
MATIC / SHIB | shibaswap | 0x256a...ca8a | 0.0000123694253014087 |
SHIB0.5 / SHIB | uniswap_v2 | 0x914e...c5ad | 0.0000121763967401125 |
ELON / SHIB | shibaswap | 0x0243...b181 | 0.0000123285107820033 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.