Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
ICE / WETH 0.3% | uniswap_v3 | 0x36bc...d9ed | 0.183926566905451 |
ICE / WETH | uniswap_v2 | 0x0efe...f418 | 0.0132884937421701 |
ICE / WETH | sushiswap | 0x94b8...b736 | 0.01298838022 |
ICE / USDT | uniswap_v2 | 0xf362...d8d6 | 0.01232487692 |
ICE / WETH 1% | uniswap_v3 | 0xdcba...16f1 | 1.40854171194744 |
WAGMI / ICE 2.5% | balancer_ethereum | 0xe074...416b | 0.01818619341 |
ICE / USDT 1% | uniswap_v3 | 0x76d8...cac0 | 0.899422863550724 |
ICE / FTM | sushiswap | 0x6b2a...e044 | 0.01233488235 |
XTP / ICE 1% | uniswap_v3 | 0x2ab9...1ec6 | 0.61017752851129948249452939491 |
ICE / USDC 1% | uniswap_v3 | 0xdc6e...ef36 | 0.394064800827199031958562117452 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.