Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
USH / WETH | sushiswap | 0xaaf4...f312 | 0.0002737299819 |
unshETH / USH 0.5% | balancer_ethereum | 0xd689...11fd | 0.0003010662415 |
USH / WETH 1% | uniswap_v3 | 0x6003...0463 | 0.479414189215975 |
USH / WETH 0.5% | balancer_ethereum | 0xd278...a460 | 0.0003298968779 |
USH / USDC 1% | uniswap_v3 | 0xd494...cc90 | 0.138695267688428 |
USH / WETH 0.3% | uniswap_v3 | 0x099d...ea73 | 0.0273815897446315 |
USH / WETH | pancakeswap_ethereum | 0x36b8...a9d4 | 659.096715006716 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.