| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| wstETH / HARAMBE 1% | uniswap_v3 | 0x58ee...27e7 | 0.0000126295494612612 |
| HARAMBE / WETH 1% | uniswap_v3 | 0x2a4a...ee46 | 0.00001250996496 |
| HARAMBE / stETH 1% | uniswap_v3 | 0xf7e6...33f7 | 0.0000110855061212633 |
| HARAMBE / stETH | uniswap_v2 | 0xa5c7...678e | 0.0000133609983393856286408374216102505179378739019493218635913080916510089431194196112867054464 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.