Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
AMPL / WETH | uniswap_v2 | 0xc5be...f40c | 1.2484504617285 |
AMPL / WETH | sushiswap | 0xcb22...2962 | 1.23494658817744 |
AMPL / USDC 0.3% | uniswap_v3 | 0xc837...26dc | 1.2584362911858 |
AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 203.90986202944 |
TRUMP / AMPL | uniswap_v2 | 0x8114...7b1e | 1.22342541521606 |
AMPL / USDT | uniswap_v2 | 0x8350...ded4 | 1.350294763785 |
AMPL / USDC | uniswap_v2 | 0xfa54...619e | 1.08016476484959 |
USDC / AMPL 1% | uniswap-v4-ethereum | 0x392e...20ca | 1.0999814721 |
AMPL / WETH 0.3% | uniswap_v3 | 0x86d2...b335 | 0.4643552659 |
AMPL / WETH 1% | uniswap_v3 | 0x6d02...ff52 | 1.56332469720717 |
SPOT / AMPL 0.3% | uniswap_v3 | 0x0212...396b | 1.1864815788 |
AMPL / DAI 0.05% | uniswap_v3 | 0x9db3...7670 | 0.85961280701988 |
AMPL / gKIMCHI | uniswap_v2 | 0x7755...6de1 | 1.2272507374 |
USDC / AMPL 0.3% | uniswap-v4-ethereum | 0x80f2...2e1a | 1.142469937 |
AMPL / MKR | uniswap_v2 | 0xd18b...de40 | 1.04007284561666 |
AMPL / USDT 0.3% | uniswap_v3 | 0x0bed...acbb | 0.864000393122918 |
PAXG / AMPL | uniswap_v2 | 0xae2a...fd4d | 1.15567491165238292531200998779879092899313881641867886340040433894771561111448239364508848 |
AMPL / FRAX | uniswap_v2 | 0xe28a...494f | 1.06786240919632 |
AMPL / DAI 0.3% | uniswap_v3 | 0x61d8...f591 | 0.8386237369 |
AMPL / SPOT | curve | 0x6d5a...735f | 1.2349826209 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.