Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
METAIX / xF9 1% | uniswap_v3 | 0xaf5b...bffa | 55.7362356860037 |
wF9 / xF9 1% | uniswap_v3 | 0xd207...d5ce | 152.245980483705 |
xF9 / WETH 1% | uniswap_v3 | 0x3343...0f6e | 16.1907881295 |
FDX / xF9 1% | uniswap_v3 | 0x2017...b3af | 21.9946180295 |
sF9 / xF9 1% | uniswap_v3 | 0xa30a...de5a | 30.1909379615587 |
F9 / xF9 1% | uniswap_v3 | 0x63d6...0c04 | 13.2835420662 |
DEV9 / xF9 | uniswap_v2 | 0xedc4...eadd | 19.86960158 |
dDAO9 / xF9 1% | uniswap_v3 | 0x1f0a...acb2 | 40.8755415331242 |
DAO9 / xF9 1% | uniswap_v3 | 0x273a...8ca9 | 8.095281635 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.