Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DRAGONX / TITANX 1% | uniswap_v3 | 0x2521...7895 | 0.000002317197132172 |
HYDRA / DRAGONX 1% | uniswap_v3 | 0xf8f0...2f54 | 0.00000252299390344813 |
DRAGONX / WETH 1% | uniswap_v3 | 0x66be...fea0 | 0.00000232162937042091 |
BDX / DRAGONX 1% | uniswap_v3 | 0x142f...eaf9 | 0.00000252452265447824 |
VOLT / DRAGONX 1% | uniswap_v3 | 0xb01c...76d4 | 0.0000025747008159938 |
MORPH / DRAGONX 1% | uniswap_v3 | 0x763c...1b0c | 0.00000257257733735022 |
VYPER / DRAGONX 1% | uniswap_v3 | 0x214c...457f | 0.0000025747008159938 |
Ascend / DRAGONX 1% | uniswap_v3 | 0xe8cc...e6ad | 0.00000252452265447824 |
DRAGONX / SCALE | uniswap_v2 | 0x6d9d...eee2 | 0.00000229072806771381 |
AWX / DRAGONX 1% | uniswap_v3 | 0xf643...441b | 0.00000242195864325307 |
DRAGONX / SHOGUN | uniswap_v2 | 0xa35c...db74 | 0.00000237625097145955 |
DRAGONX / ELMNT | uniswap_v2 | 0x2139...c3db | 0.00000254545086110749 |
DFDX / DRAGONX | uniswap_v2 | 0xe30e...a770 | 0.00000239350706701403 |
DFDX / DRAGONX 1% | uniswap_v3 | 0x65b2...f72f | 0.00000240049535969111 |
DRAGONX / JAKEX 1% | uniswap_v3 | 0x2046...9cc8 | 0.00000232495478208366 |
ERIKX / DRAGONX 1% | uniswap_v3 | 0x44e1...944b | 0.00000114894103989372 |
DRAGONX / TITANX 1% | uniswap-v4-ethereum | 0xcdd8...8990 | 0.000001412736866 |
DRAGONX / ETH 1% | uniswap-v4-ethereum | 0x8136...a07f | 0.000001122713422 |
TBTC / DRAGONX | uniswap_v2 | 0xa1e4...bbab | 0.00000181497601002381 |
DRAGONX / BDX 0.3% | uniswap-v4-ethereum | 0xb15c...cdf4 | 0.000001247660273 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.