Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
GOVI / WETH | sushiswap | 0x7e67...d919 | 0.0253202475038428 |
GOVI / WETH | uniswap_v2 | 0x1ee3...bebf | 0.025701601072116 |
GOVI / WETH 0.3% | uniswap_v3 | 0xa326...e09e | 0.232102841758062 |
GOVI / WETH 1% | uniswap_v3 | 0x1803...d7b7 | 0.03805649369 |
GOVI / WETH | orion-ethereum | 0x6d20...8a50 | 0.0298951922 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.