Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
IRIS / VIRTUAL | uniswap_v2 | 0x6662...4353 | 0.00466302272312374 |
IRIS / WETH | uniswap_v2 | 0x5890...a965 | 0.00497038085423263 |
USDC / IRIS 1% | sushiswap-v3-ethereum | 0x30c7...d3f3 | 0.00442360371442999 |
IRIS / WETH 1% | sushiswap-v3-ethereum | 0x692b...e3a2 | 0.0145935790190559 |
USDC / IRIS 0.3% | sushiswap-v3-ethereum | 0xfe00...bfb1 | 0.03627360242 |
USDT / IRIS 1% | sushiswap-v3-ethereum | 0x6138...cec6 | 0.06249968651 |
USDT / IRIS 0.3% | sushiswap-v3-ethereum | 0x17f7...53cb | 0.06334416622 |
USDT / IRIS | uniswap_v2 | 0x012a...4eaa | 0.0517998995 |
IRIS / ETH 1% | uniswap-v4-ethereum | 0x3f52...ae31 | 0.04630684949 |
VIRTUAL / IRIS 1% | uniswap-v4-ethereum | 0xb6c7...fa84 | 0.05365256392 |
USDC / IRIS 2% | uniswap-v4-ethereum | 0x4add...6499 | 0.07826934115 |
USDC / IRIS 1% | uniswap-v4-ethereum | 0x8f04...7f54 | 0.05694551383 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.