Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ALPHA / WETH | sushiswap | 0xf55c...4964 | 0.0370368842677253 |
ALPHA / ibETH | uniswap_v2 | 0x411a...2875 | 0.0373775244009483 |
ALPHA / WETH | uniswap_v2 | 0x60b2...2931 | 0.0376800049614094 |
ALPHA / WETH 1% | uniswap_v3 | 0x460d...a852 | 0.0373887063159204 |
SFI / ALPHA | uniswap_v2 | 0x8388...1620 | 0.0380483947214162 |
ALPHA / RUNE | sushiswap | 0x72a6...3b2d | 0.0375527363930725 |
ibETHv2 / ALPHA | sushiswap | 0xf79a...c017 | 0.06458485691 |
xALPHAa / ALPHA 0.3% | uniswap_v3 | 0xf142...22e7 | 0.134671182772097804579859743917 |
stETH / ALPHA | sushiswap | 0x32dd...8972 | 0.04052033269 |
ALPHA / KABOSU | uniswap_v2 | 0xe59c...7776 | 0.03607191334 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.