Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TERM / USDC 0.3% | uniswap_v3 | 0xe7f1...64c8 | 0.385403093920142 |
TERM / ETH 55% | uniswap-v4-ethereum | 0xa4c7...f84b | 0.5208505906 |
TERM / ETH 23% | uniswap-v4-ethereum | 0xb309...41f3 | 0.2382609878 |
USDC / TERM 41% | uniswap-v4-ethereum | 0x6201...b5e9 | 0.1839571209 |
USDC / TERM 48.107% | uniswap-v4-ethereum | 0x6016...212c | 0.3875976823 |
USDC / TERM 12% | uniswap-v4-ethereum | 0x1d4c...6483 | 0.9248110478 |
USDC / TERM 0.3% | uniswap-v4-ethereum | 0x675b...3e9b | 0.1686891485 |
TERM / ETH 0.3% | uniswap-v4-ethereum | 0x015e...e4be | 0.3380385166 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.