Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DRAGONX / TITANX 1% | uniswap_v3 | 0x2521...7895 | 0.00000164398129176687 |
DRAGONX / WETH 1% | uniswap_v3 | 0x66be...fea0 | 0.00000164716299193639 |
MORPH / DRAGONX 1% | uniswap_v3 | 0x763c...1b0c | 0.000001654191426407 |
HYDRA / DRAGONX 1% | uniswap_v3 | 0xf8f0...2f54 | 0.00000153916506375233 |
BDX / DRAGONX 1% | uniswap_v3 | 0x142f...eaf9 | 0.00000171760749820543 |
VYPER / DRAGONX 1% | uniswap_v3 | 0x214c...457f | 0.00000167248832473789 |
DRAGONX / SCALE | uniswap_v2 | 0x6d9d...eee2 | 0.0000016907613858859 |
DRAGONX / SHOGUN | uniswap_v2 | 0xa35c...db74 | 0.00000158205848959427 |
DRAGONX / ELMNT | uniswap_v2 | 0x2139...c3db | 0.00000159515283339752 |
AWX / DRAGONX 1% | uniswap_v3 | 0xf643...441b | 0.00000158205848959427 |
DFDX / DRAGONX | uniswap_v2 | 0xe30e...a770 | 0.00000159426571994026 |
FLARE / DRAGONX | uniswap_v2 | 0xa1bd...161a | 0.00000159269260917665 |
DRAGONX / JAKEX 1% | uniswap_v3 | 0x2046...9cc8 | 0.0000016071997983397 |
ERIKX / DRAGONX 1% | uniswap_v3 | 0x44e1...944b | 0.00000114894103989372 |
VOLT / DRAGONX 1% | uniswap_v3 | 0xb01c...76d4 | 0.00000154065787640131 |
Ascend / DRAGONX 1% | uniswap_v3 | 0xe8cc...e6ad | 0.00000157000142155914 |
DRAGONX / ETH 1% | uniswap-v4-ethereum | 0x8136...a07f | 0.000001122713422 |
DRAGONX / TITANX 1% | uniswap-v4-ethereum | 0xcdd8...8990 | 0.000002006048103 |
DFDX / DRAGONX 1% | uniswap_v3 | 0x65b2...f72f | 0.000001368459436 |
DRAGONX / BDX 0.3% | uniswap-v4-ethereum | 0xb15c...cdf4 | 0.00000219365408 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.