Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
OK / WETH 1% | uniswap_v3 | 0xa9b7...901c | 0.00508808529111306 |
OK / USDT 1% | uniswap_v3 | 0x846a...9ee5 | 0.005239189713 |
OK / USDC | pancakeswap_ethereum | 0x130a...c88d | 0.0100521288359982941730777886898861105127093242138071426720679148082254476144381231648770016652166614295208 |
OK / USDC 1% | uniswap_v3 | 0xacfc...0672 | 0.01191485056386043404211245631880084947748755379 |
OK / USDC | uniswap_v2 | 0xd839...ceac | 0.00708504267651080833746391878646120685395338805161844407804882421902174362565401704283637165757787052066904 |
OK / WETH | uniswap_v2 | 0x2c5d...747f | 0.011135870023768883070401395020207070284213088419006004083097749585257234934861748207988292 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.