Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
POLY / WETH | uniswap_v2 | 0xc03c...f102 | 0.0442497137270528 |
POLY / WBTC | sushiswap | 0x7835...49da | 0.0447403819507717 |
POLY / WETH 1% | uniswap_v3 | 0x190a...982d | 0.043066007361306 |
SOTU / POLY | uniswap_v2 | 0x4e1c...b462 | 0.0441095292896662 |
POLY / WETH | shibaswap | 0xe417...3ea4 | 0.0438035228828261 |
DNT / CVC / OCEAN / POLY / USDC / ENJ 5% | balancer_ethereum | 0x5b3b...fc4c | 0.0250733555230429 |
POLY / USDT | smardex-ethereum | 0x05cc...35c5 | 0.1374826727 |
CVC / PNT / DATA / OCEAN / POLY / USDC / WETH / ENJ 5% | balancer_ethereum | 0x760a...5450 | 0.0674239781139994 |
POLY / USDC 0.3% | uniswap_v3 | 0xa9d1...772c | 0.233994607175953 |
SDEX / POLY 1% | uniswap_v3 | 0x9f78...756e | 0.0766292964922555 |
POLY / ETH 1% | uniswap-v4-ethereum | 0x7b4d...8e56 | 0.1664093761 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.