Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MTC / WETH | uniswap_v2 | 0x1c12...95b3 | 0.00392651325175607 |
MTC / GOD 1% | uniswap_v3 | 0x1974...271e | 0.00447318383102354 |
MTC / WETH 1% | uniswap_v3 | 0xeedf...0bc9 | 0.004671533508 |
MTC / MON 1% | uniswap_v3 | 0x85ee...85fa | 0.00407716820604067 |
USDC / MTC 1% | uniswap_v3 | 0xe4a9...380f | 0.0120961428 |
USDC / MTC 0.01% | uniswap_v3 | 0xd3f6...7f12 | 0.01214006445 |
USDC / MTC 0.3% | uniswap_v3 | 0xf28e...2672 | 0.01206018333 |
USDC / MTC 0.05% | uniswap_v3 | 0x2ea0...418a | 0.01208160336 |
MTC / TOPIA 1% | uniswap_v3 | 0x8ec6...9fa1 | 0.00525017036 |
SAND / MTC 1% | uniswap_v3 | 0xc18b...e6c6 | 0.01597147755 |
BLOCK / MTC 1% | uniswap_v3 | 0xcb4f...288c | 0.01081119679 |
MTC / MON 0.3% | uniswap_v3 | 0xd785...6031 | 0.005830301551 |
USDC / MTC 0.05% | uniswap-v4-ethereum | 0xe091...37ae | 0.01075602473 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.