Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
LBR / USDC 2% | kyberswap_elastic | 0x7818...ab0d | 0.890624908620749 |
LBR / WETH | uniswap_v2 | 0x0618...2eee | 0.0697331109524885 |
LBR / ENJ | uniswap_v2 | 0x74c3...bbb6 | 0.0718716280651424 |
LBR / WETH 1% | uniswap_v3 | 0x5a96...bc9d | 0.269725877521195 |
LBR / USDC 0.3% | uniswap_v3 | 0x2e8e...8509 | 1.54413222125822 |
LBR / WETH 0.3% | uniswap_v3 | 0x9ce1...bcda | 0.888599396029711 |
LBR / USDC 1% | uniswap_v3 | 0x75d0...187c | 2.78106177148011 |
LBR / USDC 0.01% | uniswap_v3 | 0x996d...c584 | 1.99105745880946 |
LBR / USDC 0.05% | uniswap_v3 | 0xb060...bf01 | 0.74891227646715 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.