Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
AEVO / WETH 1% | uniswap_v3 | 0xd1a4...ca4a | 0.0899242371018259 |
USDC / AEVO 0.3% | uniswap_v3 | 0x62e0...0d03 | 0.2785202597 |
AEVO / ETH 1% | uniswap-v4-ethereum | 0x5f68...cc42 | 0.0940304036059126 |
AEVO / WETH 0.3% | uniswap_v3 | 0x3e1e...b89c | 0.1411985879 |
RBN / AEVO 0.3% | uniswap_v3 | 0xa24b...b449 | 0.598870582537461 |
AEVO / WETH | uniswap_v2 | 0x7259...7070 | 3753105305367.12 |
RBN / AEVO 1% | uniswap_v3 | 0x7b32...5e80 | 0.824313685459 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.