Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
LYM / WETH | uniswap_v2 | 0x80dd...439e | 0.000219544160805647 |
LYM / WETH | sushiswap | 0x913e...5ebb | 0.000222065045556025 |
LYM / PROS | sushiswap | 0x3e36...876f | 0.000221271451671066 |
LYM / LMT | uniswap_v2 | 0x5539...f7eb | 0.0002403738029 |
LYM / REVV | uniswap_v2 | 0x503e...2299 | 0.0001950614582 |
LYM / REVV | sushiswap | 0xb3f1...c1cb | 0.0003360127902 |
LYM / BONDLY | sushiswap | 0x9f59...72f2 | 0.0004816565817 |
LYM / TOWER | sushiswap | 0x6406...4e53 | 0.0002349957982 |
ATRI / LYM | uniswap_v2 | 0xfaa5...51ae | 0.0021398161524510017992941347946324672345774707614559261794032901443720538766398567048890752 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.