Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
COCORO / WETH | uniswap_v2 | 0x0d1c...0061 | 0.0000249084201966434 |
COCORO / WETH 1% | uniswap_v3 | 0x0105...5b00 | 0.0000250198636947673 |
BABYCOCORO / COCORO 1% | uniswap-v4-ethereum | 0x868a...3416 | 0.00001333914937 |
COCORO / ETH 1% | uniswap-v4-ethereum | 0x609c...37b5 | 0.000008570963324 |
BABYCOCORO / COCORO 0.3% | uniswap-v4-ethereum | 0xaeeb...9f51 | 0.00002103511838 |
SANJI / COCORO 1% | uniswap_v3 | 0xdebb...17fb | 0.00001708974762 |
COCORO / WETH 0.3% | uniswap_v3 | 0x833b...fabd | 0.000007823573152 |
BABYCOCORO / COCORO 2% | uniswap-v4-ethereum | 0xa05d...1b5d | 0.00001362013955 |
BABYCOCORO / COCORO 1.5% | uniswap-v4-ethereum | 0xbf94...7e05 | 0.00001348954988 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.