Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SDAO / WETH | uniswap_v2 | 0x4244...12fb | 0.0633785238703208 |
SDAO / USDT | uniswap_v2 | 0x3a92...6acb | 0.0629913242955132 |
SDAO / WETH | pancakeswap_ethereum | 0xda7c...39ca | 0.062862854647828 |
SDAO / WETH 1% | uniswap_v3 | 0x4b9d...a263 | 0.0620334881875093 |
SDAO / USDT | orion-ethereum | 0xb2e8...c72d | 0.06328700263 |
UFARM / SDAO | uniswap_v2 | 0xd24e...4086 | 0.06260246261 |
SDAO / WETH 0.3% | uniswap_v3 | 0xfc3d...bdc7 | 0.1204797613 |
SDAO / NTX 0.05% | uniswap_v3 | 0x3f47...d3d5 | 0.393468469615995 |
AGIX / SDAO 0.3% | uniswap_v3 | 0xe4ff...fdbc | 0.662635442025847280309599302524 |
SDAO / USDC 1% | uniswap_v3 | 0x54c1...bd58 | 0.781448716172682 |
SDAO / NTX 1% | uniswap_v3 | 0xc8d6...ae02 | 0.625321090009282889630173917554 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.