Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SKOL / WETH | uniswap_v2 | 0x10ef...2801 | 0.0855037146460001 |
SKOL / ODIN | uniswap_v2 | 0xaded...a17a | 0.0846669028575734 |
TOKEN / SKOL | uniswap_v2 | 0x787a...efe8 | 0.0841747432662827 |
SKOL / NEMO | uniswap_v2 | 0xb13b...724d | 0.0843667370174047 |
SKOL / FLOKI | uniswap_v2 | 0x4e5c...9b07 | 0.0841747432662827 |
TrumpBucks / SKOL 1% | uniswap-v4-ethereum | 0xd03c...c9cf | 0.0844711628869173 |
TrumpBucks / SKOL | uniswap_v2 | 0xc56d...a837 | 0.0844571145636645 |
SKOL / SPX | uniswap_v2 | 0x26e2...537d | 0.084035196588638 |
HOSHI / SKOL | uniswap_v2 | 0x4431...a0d1 | 0.0863016988918344 |
BULL / SKOL | uniswap_v2 | 0x0db0...c3e0 | 0.0846879753424526 |
BLSEYE🎯 / SKOL | uniswap_v2 | 0xf857...67ff | 0.086785175691839 |
L0AD / SKOL | uniswap_v2 | 0x30a5...9925 | 0.0863045279146626 |
SKOL / LESLIE | uniswap_v2 | 0xfcc7...bec9 | 0.0858150060526439 |
USDC / SKOL | uniswap_v2 | 0xa742...48f5 | 0.0845570783894598 |
SKOL / SLACK | uniswap_v2 | 0x05b6...c499 | 0.0850588510763272 |
C2H6 / SKOL | uniswap_v2 | 0xef08...0216 | 0.0817303995732793 |
SKOL / MCDBL | uniswap_v2 | 0x3f16...e695 | 0.0875116866093201 |
LVM / SKOL | uniswap_v2 | 0x311c...8a66 | 0.0816701295350405 |
SILK / SKOL | uniswap_v2 | 0x017b...e72e | 0.0848557836935482 |
Dream / SKOL | uniswap_v2 | 0xbed4...c293 | 0.07033713061 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.