Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PEPE / WETH 1% | uniswap_v3 | 0x757a...5b72 | 0.000153677592612703 |
PEPE / WETH | uniswap_v2 | 0x8616...f838 | 0.000148438872912546 |
PEPE0.5 / PEPE | uniswap_v2 | 0xf904...d463 | 0.018057142708366 |
test / PEPE | uniswap_v2 | 0x525b...6e8c | 0.0017469038985208 |
PEPE / USDT | uniswap_v2 | 0xc571...319a | 0.000137576700081954 |
WOOF / PEPE | uniswap_v2 | 0x81c5...32a4 | 0.000138036483689094 |
PEPE / WETH | x7-finance | 0x7547...cc7e | 0.0005868503265 |
PEPE / ETH 0.01% | uniswap-v4-ethereum | 0xdc16...8c37 | 0.0003716356664 |
PEPE / ZAPT | uniswap_v2 | 0x0d02...425f | 0.00396156643804788 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.