Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
EUL / WETH 1% | uniswap_v3 | 0xb003...9fb4 | 6.69135372354054 |
EUL / WETH | uniswap_v2 | 0xe96c...2fa1 | 6.56986702253333 |
EUL / WETH 0.3% | balancer_ethereum | 0x8fe0...13f4 | 6.55847971821855 |
EUL / ETH 1% | uniswap-v4-ethereum | 0x592f...b3d3 | 6.55893435936525 |
EUL / USDT 1% | uniswap_v3 | 0x6e12...52be | 5.3730609206 |
EUL / USDC 1% | uniswap_v3 | 0x175c...3f34 | 3.0632403240829061287 |
DC / EUL 1% | uniswap_v3 | 0x917f...38a7 | 2.8370609432197544615898357684 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.