Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ADS / USDC 1% | uniswap_v3 | 0xc0b5...ee97 | 0.530761764338672 |
ADST / ADS 0.05% | uniswap_v3 | 0xcf56...660f | 0.5641475185 |
ADS / USDC 0.01% | uniswap_v3 | 0x884e...669d | 0.5659568169 |
ADS / WBTC 0.05% | uniswap_v3 | 0xff04...0dba | 1.74595541818888808065676943462 |
ADS / WBTC 0.01% | uniswap_v3 | 0xdf22...2c43 | 1.01560949446606 |
ADS / WETH 0.3% | uniswap_v3 | 0xe405...28a6 | 0.9365577932 |
ADS / WETH 1% | uniswap_v3 | 0xb904...9f37 | 5.99642844821719 |
ADS / WETH 0.05% | uniswap_v3 | 0xec6d...32ef | 4.474110654260074162102260409444 |
ADS / WETH 0.01% | uniswap_v3 | 0x1fa2...a1e9 | 1.23601423705643 |
ADS / UNI 0.05% | uniswap_v3 | 0x3fff...a5c5 | 1.74595541818888808065676943462 |
ADS / WETH | uniswap_v2 | 0x2756...a83f | 0.000160868361561604 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.