Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USUALX / USUAL 1% | uniswap_v3 | 0x4049...2c53 | 0.133968459857416 |
USUAL / WETH 1% | uniswap_v3 | 0x1415...cd0b | 0.133425754129856 |
USUALX / USUAL 0.3% | uniswap_v3 | 0xf9f7...9816 | 0.133415380835778 |
USUAL / USDT 0.3% | uniswap_v3 | 0xcf24...12e0 | 0.13497169025369 |
USUALX / USUAL 0.3% | uniswap-v4-ethereum | 0xa7f9...8916 | 0.1813545022 |
USUAL / ETH 1% | uniswap-v4-ethereum | 0x4226...bf70 | 0.1338784429 |
USDC / USUAL 1% | uniswap_v3 | 0x712f...cf86 | 0.1301404543 |
USUAL / WETH 0.3% | uniswap_v3 | 0xd725...fa62 | 0.4270240418 |
USD0 / USUAL 1% | uniswap_v3 | 0xa796...eb6b | 0.1472195644 |
USUAL / WETH | uniswap_v2 | 0xc3d8...0acc | 0.07002145414 |
USUAL / USDT | uniswap_v2 | 0x073a...7d52 | 1.0810199409 |
ENA / USUAL 0.3% | uniswap-v4-ethereum | 0xddb9...faab | 0.2527700401 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.