Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
KISHU / WETH | uniswap_v2 | 0xf82d...9f88 | 0.0000000000812780797559915 |
KISHU / WETH | shibaswap | 0x9f12...64ac | 0.0000000000826602453717087 |
KISHU / TENSHI | uniswap_v2 | 0xea36...615e | 0.000000000431840436189763343032781829141408159767959474018584071648008426857957472070715273339222502 |
SHIB / KISHU | shibaswap | 0x428e...3d10 | 0.00000000008234771131 |
KISHU / WETH 1% | uniswap_v3 | 0xcdc0...656b | 0.00000000442797513 |
AKITA / KISHU | shibaswap | 0xd979...79e7 | 0.0000000000854396043750906 |
KISHU / SHIB | uniswap_v2 | 0x971f...f5a3 | 0.00000000008187195481 |
KISHU / WETH | sushiswap | 0xbe30...f6d2 | 0.00000000008600730601 |
KISHU / USDT | uniswap_v2 | 0xbe0c...2d55 | 0.0000000000832617856556535 |
BONE / KISHU | shibaswap | 0x8db8...79d8 | 0.0000000001030891315 |
ELON / KISHU | shibaswap | 0xc9cf...a923 | 0.00000000009010797473 |
KLEE / KISHU | shibaswap | 0xb734...18b8 | 0.0000000000837758324623297 |
KISHU / PYRENEES | uniswap_v2 | 0x43cb...fad0 | 0.00000000008250710782 |
ZOOT / KISHU | shibaswap | 0x652b...ee20 | 0.00000000009248065031 |
FEG / KISHU | shibaswap | 0xb907...414b | 0.0000000001244137281 |
KISHU / AMP | shibaswap | 0xe6d1...a88e | 0.0000000002205744136 |
MATIC / KISHU | shibaswap | 0x8179...332e | 0.00000000053641384708066288547095572760025703839727028737324249393311054223544470940064742620148976 |
KISHU / SANSHU | shibaswap | 0x1553...94e9 | 0.000000000482972034847366 |
KISHU / USDT | pancakeswap_ethereum | 0xc30d...c7a5 | 0.0000000001491178168 |
REDPANDA / KISHU | shibaswap | 0xf6bb...67db | 0.0000000001942117111 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.