Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
HFT / WETH 1% | uniswap_v3 | 0xe67b...7493 | 0.0577632406069285 |
HFT / USDC 0.3% | uniswap_v3 | 0xe1e7...a1c3 | 0.59768050244725426796007057264 |
HFT / USDT 1% | uniswap_v3 | 0xc1b4...2790 | 0.41346227232087 |
HFT / USDC 0.05% | uniswap_v3 | 0x63b1...95a9 | 0.38008373562548 |
HFT / USDC 1% | uniswap_v3 | 0x65be...18b5 | 0.421196420939928067843197699344 |
HFT / KABOSU | uniswap_v2 | 0xc78e...945e | 0.1060096704 |
HFT / WETH 0.3% | uniswap_v3 | 0x12b3...ec1a | 0.486573040378654 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.