Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SWAP / WETH | uniswap_v2 | 0xd90a...e1f8 | 0.095301010602041 |
SWAP / USDC 1% | uniswap_v3 | 0x47e4...14e1 | 0.1358556012 |
SWAP / WETH 1% | uniswap_v3 | 0x76d8...189c | 0.09775562532 |
SWAP / WETH 0.3% | uniswap_v3 | 0xf590...84d0 | 0.1114184334 |
SWAP / WETH 0.3% | kyberswap_elastic | 0xdc83...f0a7 | 0.28605686097324733609338264622 |
SWAP / WETH 0.15% | balancer_ethereum | 0x6602...9c3f | 0.1438938206 |
SWAP / DAI | uniswap_v2 | 0x12f7...7340 | 20.2100362441386 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.