Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SHIB / WETH | shibaswap | 0xcf6d...deaa | 0.0000115636322335193 |
SHIB / WETH 0.3% | uniswap_v3 | 0x2f62...a9ec | 0.0000115702635107937 |
SHIB / WETH | uniswap_v2 | 0x811b...954f | 0.0000115739005529284 |
SHIB / BONE | shibaswap | 0xff64...ee22 | 0.0000115601215813753 |
LEASH / SHIB | shibaswap | 0x351c...7a8f | 0.0000115664589923885 |
SHIB / WETH 1% | uniswap_v3 | 0x5764...7563 | 0.0000115058517805696 |
SHIB / USDT | shibaswap | 0x98c2...1631 | 0.0000115189147292604 |
SHIB / WETH 0.05% | uniswap_v3 | 0x94e4...c723 | 0.0000115379561653691 |
SHIB / USDC | shibaswap | 0x9379...b0a4 | 0.0000115001998186272 |
SOTU / SHIB | uniswap_v2 | 0x14a8...200a | 0.000011504962272128 |
SHIB / ETH 1% | uniswap-v4-ethereum | 0x2842...7379 | 0.0000115695808922835 |
SHIB / ODIN | uniswap_v2 | 0x3feb...61d1 | 0.000011498475440867 |
SHIB / OSAK | uniswap_v2 | 0x9ad3...48d9 | 0.0000115672201171115 |
PEPE / SHIB 1% | uniswap_v3 | 0x2488...9db1 | 0.0000115252392901258 |
SHIB / USDC 1% | uniswap_v3 | 0xa15c...8350 | 0.0000116073863702245 |
SHIB / USDT | uniswap_v2 | 0x773d...8cc8 | 0.0000115731428925998 |
SAS / SHIB | uniswap_v2 | 0xfaf2...326d | 0.0000115867055896468 |
SHIB / TREAT | shibaswap | 0x66ef...b67b | 0.0000115472187949239 |
MATIC / SHIB | shibaswap | 0x256a...ca8a | 0.0000116369074246279 |
SHIB0.5 / SHIB | uniswap_v2 | 0x914e...c5ad | 0.0000117402423240526 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.