Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SKOL / WETH | uniswap_v2 | 0x10ef...2801 | 0.0859996667409522 |
SKOL / FLOKI | uniswap_v2 | 0x4e5c...9b07 | 0.0866230881227886 |
SKOL / ODIN | uniswap_v2 | 0xaded...a17a | 0.0863234129042177 |
TOKEN / SKOL | uniswap_v2 | 0x787a...efe8 | 0.0863610418060971 |
SKOL / NEMO | uniswap_v2 | 0xb13b...724d | 0.0863234129042177 |
SKOL / SPX | uniswap_v2 | 0x26e2...537d | 0.0867085159000283 |
TrumpBucks / SKOL 1% | uniswap-v4-ethereum | 0xd03c...c9cf | 0.0867736037303061 |
SKOL / KŪKA | uniswap_v2 | 0xa33f...69fe | 0.0864963024533932 |
TrumpBucks / SKOL | uniswap_v2 | 0xc56d...a837 | 0.0854338792237539 |
USDC / SKOL | uniswap_v2 | 0xa742...48f5 | 0.0869388085398714 |
BLSEYE🎯 / SKOL | uniswap_v2 | 0xf857...67ff | 0.0863576518149368 |
LVM / SKOL | uniswap_v2 | 0x311c...8a66 | 0.0852670916586669 |
Hold / SKOL | uniswap_v2 | 0x6171...1a0b | 0.0863905347291917 |
SKOL / MCDBL | uniswap_v2 | 0x3f16...e695 | 0.0863905347291917 |
L0AD / SKOL | uniswap_v2 | 0x30a5...9925 | 0.084184790629092 |
HOSHI / SKOL | uniswap_v2 | 0x4431...a0d1 | 0.0849520347907854 |
C2H6 / SKOL | uniswap_v2 | 0xef08...0216 | 0.08568186237 |
SKOL / LESLIE | uniswap_v2 | 0xfcc7...bec9 | 0.0851170476010493 |
MAVRK / SKOL | uniswap_v2 | 0x4e7c...e6ae | 0.07709397304 |
Dream / SKOL | uniswap_v2 | 0xbed4...c293 | 0.0849395657814224 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.