Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
UNIDX / WETH 2% | kyberswap_elastic | 0xa6a0...cbf1 | 8.0241759182566792966528287432 |
UNIDX / WETH 1% | uniswap_v3 | 0x3688...4ca4 | 4.71751572547598 |
UNIDX / WETH | solidlydex | 0x0f3b...ca0a | 0.004102669064 |
UNIDX / WETH | uniswap_v2 | 0xe236...950d | 0.01007663075 |
UNIDX / WETH | orion-ethereum | 0xef5a...6418 | 0.001978179641 |
UNIDX / WETH | sushiswap | 0x7e38...755e | 0.000587829742 |
UNIDX / WETH 0.3% | uniswap_v3 | 0x5f4b...08d9 | 0.000000331471857024188422365520283226349875101200839508636 |
UNIDX / WETH 0.01% | uniswap_v3 | 0x6587...bf8e | 2025.368183526323333738406970038598 |
LUSD / UNIDX 1% | uniswap_v3 | 0xc76e...ccf9 | 6.53525736288495098414335400962 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.