Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WEPE / WETH 0.3% | uniswap_v3 | 0xa3c2...ba27 | 0.0000609405976995824 |
WEPE / WETH 1% | uniswap_v3 | 0x9ded...7f7c | 0.0000622235178563953 |
WEPE / ETH 1% | uniswap-v4-ethereum | 0xf8c2...6383 | 0.0000606981298733091 |
USDC / WEPE 1% | uniswap-v4-ethereum | 0x6e18...5524 | 0.00003170874019 |
WEPE / ETH 0.3% | uniswap-v4-ethereum | 0x3130...d012 | 0.00002554634611 |
WEPE / USDT 0.3% | uniswap-v4-ethereum | 0x7017...50b7 | 0.00001613918401 |
WEPE / ETH 0.29% | uniswap-v4-ethereum | 0xc60a...99cb | 0.0000647580077 |
WEPE / USDT 1% | uniswap-v4-ethereum | 0x3c6a...429b | 0.00002309962479 |
WEPE / ETH 0.75% | uniswap-v4-ethereum | 0x5ba7...2521 | 0.00006496337974 |
USDC / WEPE 0.3% | uniswap_v3 | 0x814b...d426 | 0.0001209535556 |
KEKIUS / WEPE 1% | uniswap_v3 | 0x8bc8...525c | 0.00007076153929 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.