Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
CNC / WETH | curve | 0x838a...ab94 | 0.0008346068712 |
CNC / USDC 2% | kyberswap_elastic | 0x8497...8674 | 4.82156646057116 |
CNC / WETH 1% | uniswap_v3 | 0xe8b0...ec04 | 3.1451618034 |
CNC / WETH | curve | 0x7821...4dfa | 1607.6746880702 |
SATURN / CNC | sushiswap | 0xfc86...4827 | 3.33030990705885 |
CNC / USDC 1% | uniswap_v3 | 0xba53...32eb | 5.96156132408095 |
CNC / WETH | sushiswap | 0x1de3...95fb | 0.000574303149 |
CNC / USDT 1% | uniswap_v3 | 0x7116...ffd7 | 2.83291575724292 |
CNC / WETH | uniswap_v2 | 0x3b52...ce49 | 22.9299338096057 |
CNC / WETH 0.3% | uniswap_v3 | 0x5ef5...5db7 | 3237.869258030746 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.