Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
Mog / WETH | uniswap_v2 | 0xc2ea...539d | 0.000000960035623586718 |
Mog / WETH 1% | uniswap_v3 | 0x7832...d434 | 0.000000970659658405237 |
rust / Mog 1% | uniswap-v4-ethereum | 0x5954...3eca | 0.000000941052821893834 |
Mog / USDS 0.01% | uniswap_v3 | 0x850e...44a0 | 0.000000979896834381881 |
Mog / DI 1% | uniswap_v3 | 0x856b...ae32 | 0.00000096740059310037 |
Mog / LOVE | uniswap_v2 | 0x6050...cbea | 0.000000979896834381881 |
CULT / Mog 1% | uniswap_v3 | 0x25de...d7c2 | 0.000000975751953714192 |
Mog / BOBO | uniswap_v2 | 0x472b...fc0f | 0.000000938178076728877 |
USDC / Mog 1% | uniswap_v3 | 0xe7f0...0e62 | 0.00000128987927525897 |
Mog / WETH 5% | kyberswap_elastic | 0x7777...bd0f | 0.0000000357752650351668 |
DAII / Mog 1% | bitswap | 0xd73b...5728 | 0.000000635378166087367 |
OSAK / Mog 0.75% | uniswap-v4-ethereum | 0xc621...0bff | 0.000001023583534 |
OSAK / Mog 0.3% | uniswap-v4-ethereum | 0x93be...cbea | 0.000001072238902 |
OSAK / Mog 1% | uniswap-v4-ethereum | 0x9c17...09ec | 0.000000867416898 |
MO / Mog 1% | uniswap-v4-ethereum | 0xcf1d...aee2 | 0.000001212124222 |
Mog / ETH 1% | uniswap-v4-ethereum | 0xa336...f2d1 | 0.00000108876778957905 |
NULL / Mog | uniswap_v2 | 0x5a16...0b30 | 0.000001194522032 |
Mog / JANET 1% | uniswap-v4-ethereum | 0x567c...9d2d | 0.0000009368064548 |
Mog / JEFF 1% | uniswap-v4-ethereum | 0xcab8...fa95 | 0.0000008952587861 |
BBC / Mog | 9inch-ethereum | 0xd333...bcce | 0.00000106415809699417 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.