Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
OMNI / WETH | sushiswap | 0x39f4...167f | 0.0000118411601064447 |
OMNI / WETH 1% | uniswap_v3 | 0x37a9...10eb | 0.0004260444092 |
OMNI / WETH | uniswap_v2 | 0x9318...4596 | 0.00003853110694 |
OMNI / Mog 1% | uniswap_v3 | 0x4024...6463 | 0.000139857196747719 |
WLD / OMNI 1% | uniswap_v3 | 0x8edc...a809 | 0.000147678879645182 |
OMNI / OX | uniswap_v2 | 0xbaee...77b5 | 0.0000528745369684327 |
PEPE / OMNI 1% | uniswap_v3 | 0x75e1...39d2 | 0.00013967130057387 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.