Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TRAC / WETH 0.3% | uniswap_v3 | 0xb191...85e5 | 0.318298783354729 |
TRAC / WETH | uniswap_v2 | 0x1a58...faa6 | 0.322396457271669 |
TRAC / ETH 0.3% | uniswap-v4-ethereum | 0x54e9...3617 | 0.316865542404034 |
USDC / TRAC 0.3% | uniswap_v3 | 0xf3c2...2175 | 0.7130968634 |
TRAC / ETH 1% | uniswap-v4-ethereum | 0x5994...3443 | 0.3547738422 |
TRAC / WETH 1% | uniswap_v3 | 0xadd1...d7e4 | 0.3591299308 |
wstETH / WBTC / TRAC 0.3% | balancer_ethereum | 0x988f...aaa4 | 1698.1104930016 |
TRAC / ABDS 1% | pancakeswap-v3-ethereum | 0x58ce...c646 | 0.3241138673 |
TRAC / WETH | sushiswap | 0x4386...66aa | 0.386625182398656 |
TRAC / ABDS 1% | uniswap_v3 | 0x9a3b...b07d | 0.4907395834 |
TRAC / ABDS 0.3% | uniswap-v4-ethereum | 0xa8bd...9255 | 0.341136876 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.