Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
INJ / WETH 0.3% | uniswap_v3 | 0x6c06...3aa8 | 11.9520802934148 |
INJ / WETH | sushiswap | 0xfb3c...2820 | 11.9213923304972 |
ETH / INJ 0.3% | uniswap-v4-ethereum | 0xa6d9...651b | 12.0327530300004 |
INJ / WETH | uniswap_v2 | 0x3c70...4ffc | 11.5610591273555 |
INJ / WETH 1% | uniswap_v3 | 0x4858...2420 | 22.1131786388539 |
ABDS / INJ 1% | pancakeswap-v3-ethereum | 0xe035...ebe6 | 10.307172218496 |
INJ / TITANX | uniswap_v2 | 0xe5e2...2f99 | 15.5448091133 |
ELON / INJ 1% | uniswap_v3 | 0xff52...b7ea | 44.1372513667629 |
ABDS / INJ 1% | uniswap_v3 | 0xc519...0db2 | 15.2921828249 |
INJ / WETH 0.05% | uniswap_v3 | 0xfc84...51c5 | 32.3174840667 |
ABDS / INJ 0.3% | uniswap-v4-ethereum | 0xae18...2f6e | 8.7916175805 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.