Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WEPE / WETH 0.3% | uniswap_v3 | 0xa3c2...ba27 | 0.0000303976022426588 |
WEPE / WETH 1% | uniswap_v3 | 0x9ded...7f7c | 0.0000307229720595743 |
WEPE / ETH 0.3% | uniswap-v4-ethereum | 0x3130...d012 | 0.0000309716426089617 |
WEPE / ETH 1% | uniswap-v4-ethereum | 0xf8c2...6383 | 0.0000287416939363566 |
USDC / WEPE 0.3% | uniswap_v3 | 0x814b...d426 | 0.000118170392601015 |
WEPE / ETH 0.29% | uniswap-v4-ethereum | 0xc60a...99cb | 0.0000647580077 |
WEPE / ETH 0.75% | uniswap-v4-ethereum | 0x5ba7...2521 | 0.00006496337974 |
KEKIUS / WEPE 1% | uniswap_v3 | 0x8bc8...525c | 0.00007076153929 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.