Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
MYTH / USDC | uniswap_v2 | 0x4620...909b | 0.143221348255414 |
MYTH / WETH | uniswap_v2 | 0xf7bb...0b2f | 0.141974027180269 |
MYTH / GMEE | uniswap_v2 | 0x65d0...43ed | 0.141116714131786 |
TOWER / MYTH | uniswap_v2 | 0x3e1f...ca9c | 0.141156921591013 |
REVV / MYTH | uniswap_v2 | 0x14df...a7e5 | 0.141731143842933 |
ASTRAFER / MYTH | uniswap_v2 | 0x0cfd...47a9 | 0.150884790683591 |
MYTH / WETH 1% | uniswap_v3 | 0x8503...b084 | 0.258476520454065 |
USDC / MYTH 1% | uniswap_v3 | 0x895e...a40e | 0.360936250235803 |
PROS / MYTH | uniswap_v2 | 0x0678...d298 | 0.154620154184722 |
MYTH / QUIDD | uniswap_v2 | 0x9042...fe6d | 0.287351483587132 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.