Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
WAGMI / WETH | uniswap_v2 | 0xd6c2...007b | 0.000000000239828737980941 |
WOMBAT / WAGMI | uniswap_v2 | 0x88b8...581b | 0.000000000239119757049608 |
WAGMI / WETH 1% | uniswap_v3 | 0xca9b...468e | 0.000000000263257187131604 |
BURN / WAGMI 1% | uniswap_v3 | 0x57c1...0464 | 0.0000000054732245899786 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.