Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SHIB / WETH | shibaswap | 0xcf6d...deaa | 0.0000143188232645676 |
SHIB / WETH 0.3% | uniswap_v3 | 0x2f62...a9ec | 0.000014321503388198 |
SHIB / WETH | uniswap_v2 | 0x811b...954f | 0.0000143405741847261 |
SHIB / BONE | shibaswap | 0xff64...ee22 | 0.0000142186725940555 |
SHIB / WETH 1% | uniswap_v3 | 0x5764...7563 | 0.000014309912537622 |
LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.0000142514050200375 |
SHIB / UNI 1% | uniswap_v3 | 0xe07c...e705 | 0.0000141580525189932 |
SHIB / USDT | shibaswap | 0x98c2...1631 | 0.0000143609131695925 |
SHIB / USDC | shibaswap | 0x9379...b0a4 | 0.000014249083401359 |
SHIB / ETH 1% | uniswap-v4-ethereum | 0x2842...7379 | 0.000014291742179137 |
SHIB / WETH 0.05% | uniswap_v3 | 0x94e4...c723 | 0.000014269366392959 |
SHIB / USDT | uniswap_v2 | 0x773d...8cc8 | 0.0000142066070066873 |
MM / SHIB | shibaswap | 0x89d5...f4c2 | 0.0000142354040966859 |
PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.0000141114442881649 |
SHIB / OSAK | uniswap_v2 | 0x9ad3...48d9 | 0.0000143056036566253 |
SHIB / USDT 0.3% | uniswap_v3 | 0xb0cc...59c4 | 0.0000142151409146235 |
SOTU / SHIB | uniswap_v2 | 0x14a8...200a | 0.0000141155457134228 |
SHIB / TREAT | shibaswap | 0x66ef...b67b | 0.0000141379207668177 |
ELON / SHIB | shibaswap | 0x0243...b181 | 0.0000141065474326878 |
SHIB / BONE 1% | uniswap_v3 | 0xfeae...ffa6 | 0.0000142549189336515 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.