Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SWEAT / USDC 0.3% | uniswap_v3 | 0xaae6...a606 | 0.00567467176811547 |
SWEAT / WETH 1% | uniswap_v3 | 0x3796...9e6b | 0.01203238536 |
BONE / SWEAT | sushiswap | 0x54d0...cb3d | 0.023004925237511808122624582565528639773452891113847072841228941997352494725617544604970683282030506366943 |
SWEAT / USDC 1% | uniswap_v3 | 0xe1cb...1fac | 0.0229733136895658591739534663628677455905074068 |
SWEAT / USDC 0.01% | uniswap_v3 | 0xb42f...91e9 | 0.0229733136895658591739534663628677455905074068 |
SWEAT / USDC 0.05% | uniswap_v3 | 0xabc2...1b49 | 0.0229733136895658591739534663628677455905074068 |
SWEAT / WETH 0.3% | uniswap_v3 | 0x6b10...b318 | 0.002316931869010869462076865756 |
SWEAT / KABOSU | uniswap_v2 | 0xab2f...c118 | 0.009452133715 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.