Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ANT / WETH | uniswap_v2 | 0x9def...75ae | 0.215222562525173 |
ANT / WETH | sushiswap | 0x201e...e94d | 0.229025763701728 |
SOTU / ANT | uniswap_v2 | 0x4d84...1a36 | 0.216332327117037 |
ANT / USDC 1% | uniswap_v3 | 0xf152...f978 | 3.6686042464 |
ANT / WETH 1% | uniswap_v3 | 0xcd43...2a75 | 7.2261346486 |
ANT / WETH | swapr_ethereum | 0x9bb6...3ed0 | 0.314485619 |
ANT / WETH 0.3% | uniswap_v3 | 0x2d84...c916 | 3.69875666179435 |
ANT / DOGE2.0 | uniswap_v2 | 0x7d1e...83b9 | 4.40098556510423 |
HLX / ANT 1% | uniswap_v3 | 0x0657...bee1 | 6.46330851354621 |
INF / ANT 1% | uniswap_v3 | 0xa584...a122 | 6.4633219131341 |
ANT / TITANX 1% | uniswap_v3 | 0xe69c...1ced | 6.4913884196621 |
DRAGONX / ANT 1% | uniswap_v3 | 0xd6bd...f58e | 6.46368794237202 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.