Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
KEL / CEL 0.05% | uniswap_v3 | 0x85fe...78c5 | 0.103932647494731 |
CEL / WETH | uniswap_v2 | 0xa5e7...9fe6 | 0.105017263982998 |
KEL / CEL | uniswap_v2 | 0x638b...4756 | 0.115020276394032 |
CEL / WETH | sushiswap | 0x796b...cb26 | 0.109521351531838 |
CEL / WETH 1% | uniswap_v3 | 0xde2a...0c98 | 3.5036814062 |
ICHI / CEL 0.3% | uniswap_v3 | 0x2953...4c6e | 0.991182283222882033055933769412 |
ICHI / CEL 0.3% | uniswap_v3 | 0x6e41...d319 | 0.1535669845 |
CEL / WETH 0.3% | uniswap_v3 | 0x0672...5105 | 1.40006137133225 |
CEL / USDC 0.3% | uniswap_v3 | 0x8ec8...1e4e | 0.974033739289292451438313084887 |
CEL / USDC 1% | uniswap_v3 | 0x7ffb...8d7d | 2.04818017936823 |
DRGN / CEL 1% | uniswap_v3 | 0xd321...ebda | 0.240462759213321 |
CEL / USDT 1% | uniswap_v3 | 0x8254...491b | 0.959799695480517527955880198 |
CEL / USDC | uniswap_v2 | 0x3ef4...08f0 | 0.09728467786 |
CEL / WBTC | uniswap_v2 | 0xff3e...9139 | 0.9504972291 |
CEL / QASH | uniswap_v2 | 0x4a9d...376a | 2.29931248992344 |
CEL / DAI 1% | uniswap_v3 | 0x1e8f...7c55 | 0.959799695480517527955880198 |
RLX / CEL | uniswap_v2 | 0x2a7f...1e32 | 1.99490033515865 |
SALT / CEL | uniswap_v2 | 0xd03d...aea4 | 1.55863149339988 |
CBIX7 / CEL | uniswap_v2 | 0x6adb...ac60 | 0.81163162214376765958185759712473288875444880334778066227443903758095661242257639118971546 |
CEL / NEXO | uniswap_v2 | 0xdd65...5f59 | 1.55863149339988 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.