Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ABT / WETH 1% | uniswap_v3 | 0x677d...14d6 | 0.674805280847369 |
ABT / ETH 1% | uniswap-v4-ethereum | 0x860c...f7c3 | 0.665357202429399 |
ABT / ETH 20% | uniswap-v4-ethereum | 0xdc2b...3e04 | 0.7449505008 |
ABT / ETH 40% | uniswap-v4-ethereum | 0xfbec...7ab2 | 0.7018436272 |
USDC / ABT 0.3% | uniswap-v4-ethereum | 0xa5c7...4e23 | 0.6216001532 |
ABT / WETH 0.3% | uniswap_v3 | 0xbffb...9bf1 | 0.1495647692 |
USDC / ABT 1% | uniswap-v4-ethereum | 0x9d13...7ad4 | 0.984494006 |
ABT / WETH | uniswap_v2 | 0xecad...39eb | 82.6781157053 |
ABT / USDT | uniswap_v2 | 0xd30b...0794 | 0.1041614069189534821981966505754911696926285167670118009404364053905775181271083750837124348 |
ABT / GFI | uniswap_v2 | 0x0cad...9c76 | 1.3623740399 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.