Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SHROOM / WETH | uniswap_v2 | 0x7d61...36e3 | 0.00680184641409663 |
SHROOM / USDT | uniswap_v2 | 0x20b2...86e3 | 0.00666213541074088 |
SHROOM / WETH 1% | uniswap_v3 | 0x4249...6f10 | 0.0873888189793697 |
SHROOM / LINK | uniswap_v2 | 0xe77f...6f0b | 0.005395811028 |
SHROOM / SUSHI | uniswap_v2 | 0x5398...63ce | 0.005223391642 |
SHROOM / UNI | uniswap_v2 | 0x065a...f40f | 0.005223342473 |
SHROOM / UNI 0.3% | uniswap_v3 | 0x15e4...9d53 | 0.0748243135616832 |
SHROOM / SUSHI | sushiswap | 0x946c...c561 | 0.03578328479 |
BOOB / SHROOM | uniswap_v2 | 0xf35c...a3b9 | 0.005506172786 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.