Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
Mog / WETH | uniswap_v2 | 0xc2ea...539d | 0.000000882893685921608 |
Mog / WETH 1% | uniswap_v3 | 0x7832...d434 | 0.00000089977274882446 |
Mog / USDS 0.01% | uniswap_v3 | 0x850e...44a0 | 0.000000883351156341242 |
rust / Mog 1% | uniswap-v4-ethereum | 0x5954...3eca | 0.000000887396124679667 |
Mog / RZR 1% | uniswap-v4-ethereum | 0xd3af...e7ef | 0.00000088903539604109 |
Mog / DI 1% | uniswap_v3 | 0x856b...ae32 | 0.000000882757702797242 |
CULT / Mog 1% | uniswap_v3 | 0x25de...d7c2 | 0.000000885211176819472 |
Mog / BOBO | uniswap_v2 | 0x472b...fc0f | 0.000000886044991171357 |
USDC / Mog 1% | uniswap_v3 | 0xe7f0...0e62 | 0.000000930230340184337 |
Mog / WETH | 9inch-ethereum | 0xecd0...9e5f | 0.00000122171642024426 |
Mog / WETH 1% | sushiswap-v3-ethereum | 0xaf98...a89d | 0.000000901853602636801 |
Mog / ETH 0.05% | uniswap-v4-ethereum | 0x5b35...f5a8 | 0.00000141912956216374 |
Mog / WETH 5% | kyberswap_elastic | 0x7777...bd0f | 0.0000000357752650351668 |
DAII / Mog 1% | bitswap | 0xd73b...5728 | 0.000000635378166087367 |
OSAK / Mog 0.75% | uniswap-v4-ethereum | 0xc621...0bff | 0.000001023583534 |
OSAK / Mog 0.3% | uniswap-v4-ethereum | 0x93be...cbea | 0.000001492529892 |
MO / Mog 1% | uniswap-v4-ethereum | 0xcf1d...aee2 | 0.000001537114231 |
Mog / LOVE | uniswap_v2 | 0x6050...cbea | 0.000000874467442821963 |
Mog / ETH 0.01% | uniswap-v4-ethereum | 0x5c87...ac47 | 0.00001157270838 |
OSAK / Mog 1% | uniswap-v4-ethereum | 0x9c17...09ec | 0.000001376878614 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.