Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MIDAS / USDC 0.3% | uniswap_v3 | 0x0e77...0ad1 | 1.35591893177271 |
ICHI / MIDAS 0.3% | uniswap_v3 | 0x0661...6ae2 | 1.4637939152042846758312278857380813936616067 |
MIDAS / USDC | uniswap_v2 | 0xfa25...470d | 0.003320973352 |
MIDAS / WETH 0.3% | uniswap_v3 | 0xd353...1bfa | 2192.18538893067 |
MIDAS / WETH | uniswap_v2 | 0xa8cf...aa47 | 0.00001941560556 |
MIDAS / WETH 1% | uniswap_v3 | 0xf2f9...b5be | 0.0195348545760381 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.