Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
AMPL / WETH | uniswap_v2 | 0xc5be...f40c | 1.09251069425482 |
AMPL / WETH | sushiswap | 0xcb22...2962 | 1.09203021781124 |
SPOT / AMPL 0.3% | uniswap_v3 | 0x0212...396b | 1.09694387185256 |
USDC / AMPL 1% | uniswap-v4-ethereum | 0x392e...20ca | 1.10768685765982 |
AMPL / USDC 0.3% | uniswap_v3 | 0xc837...26dc | 1.12055944797175 |
USDC / AMPL 0.3% | uniswap-v4-ethereum | 0x80f2...2e1a | 1.09129827943218 |
AMPL / DAI | uniswap_v2 | 0x08a5...f9a5 | 1.48382580608625 |
AMPL / WETH 0.3% | uniswap_v3 | 0x86d2...b335 | 0.863015248 |
AMPL / WETH 1% | uniswap_v3 | 0x6d02...ff52 | 1.56332469720717 |
AMPL / USDT 0.05% | uniswap_v3 | 0x04a9...d26d | 1.161339151923824560546821947584 |
AAVE / LINK / MKR / AMPL 10% | balancer_ethereum | 0x6b0d...43e2 | 377.4065718188 |
AMPL / DAI 0.05% | uniswap_v3 | 0x9db3...7670 | 0.85961280701988 |
AMPL / gKIMCHI | uniswap_v2 | 0x7755...6de1 | 1.2272507374 |
TRUMP / AMPL | uniswap_v2 | 0x8114...7b1e | 1.2578003969 |
AMPL / MKR | uniswap_v2 | 0xd18b...de40 | 1.04007284561666 |
AMPL / USDT 0.3% | uniswap_v3 | 0x0bed...acbb | 0.864000393122918 |
PAXG / AMPL | uniswap_v2 | 0xae2a...fd4d | 1.15567491165238292531200998779879092899313881641867886340040433894771561111448239364508848 |
MICKEY / AMPL 1% | uniswap_v3 | 0x1d48...be9d | 1.16373685091689 |
AMPL / SPOT | curve | 0x6d5a...735f | 1.18981350324113 |
AMPL / FRAX | uniswap_v2 | 0xe28a...494f | 1.06786240919632 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.