Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
IDRT / USDT 0.05% | uniswap_v3 | 0xb635...c103 | 0.0000611321338655422 |
IDRT / WETH | sushiswap | 0xbe1d...f92e | 0.000057137300095063 |
YFW / IDRT | uniswap_v2 | 0xaa2a...cfa3 | 0.00007139490505 |
IDRT / USDT | pancakeswap_ethereum | 0xe617...4f15 | 0.00003771038226 |
IDRT / USDC 0.05% | uniswap_v3 | 0x1a61...72e1 | 0.0000639498069993813924557153874622 |
IDRT / WETH | uniswap_v2 | 0xff62...6515 | 47.5749793828 |
BUSD / IDRT 0.05% | uniswap_v3 | 0x3692...e943 | 0.0000658045588024825146670548125375 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.