Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
Dejitaru Shirudo / WETH | uniswap_v2 | 0xba22...2472 | 0.00004812630573921 |
Dejitaru Shirudo / USDC | uniswap_v2 | 0xf7dc...c569 | 0.00005116081172 |
TSUKA / Dejitaru Shirudo 1% | uniswap_v3 | 0x2ad6...91da | 0.000212525481694618 |
BEARDY / Dejitaru Shirudo 1% | uniswap_v3 | 0x09d4...1400 | 0.000129077310023649 |
TSUKA / Dejitaru Shirudo | uniswap_v2 | 0xe5a4...6694 | 0.000722232868396393 |
HOSHI / Dejitaru Shirudo | uniswap_v2 | 0x459a...0624 | 0.000454611785300421 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.