Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PRE / USDT | uniswap_v2 | 0x5f09...290d | 0.0033509724296358 |
PRE / WETH | uniswap_v2 | 0xf248...04c4 | 0.00332798862678257 |
PRE / WETH 1% | uniswap_v3 | 0x19a5...0f71 | 0.00337886039949393 |
PRE / USDC 1% | uniswap_v3 | 0x3ad4...8b20 | 0.1043968406043614063980586065146 |
PRE / USDT 0.3% | uniswap_v3 | 0x9701...6bbc | 0.0090087075027073 |
DIVI / PRE | uniswap_v2 | 0x7594...af76 | 0.0685812277753502892922006732991598963662343441412964023153538858337259489184288000251972812 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.