Be Careful
Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
DOGE2.0 / WETH | uniswap_v2 | 0xd990...eb2e | 0.000000000436787514661674 |
DOGE2.0 / TROLL | uniswap_v2 | 0x29de...14b6 | 0.000000000436472860835334 |
ALICE / DOGE2.0 | uniswap_v2 | 0x6989...54dc | 0.00000000385548094506726 |
DOGE2.0 / USDC | uniswap_v2 | 0x1cd9...a4c4 | 0.00000000730373535236663 |
BTC2.0 / DOGE2.0 | uniswap_v2 | 0xd2f3...6990 | 0.0000000047376144112044 |
BITCOIN / DOGE2.0 | uniswap_v2 | 0x2a57...9a87 | 0.00000000262233289160155 |
nd4 / DOGE2.0 | uniswap_v2 | 0x8d99...b33c | 0.00000000536219955709833 |
Neiro / DOGE2.0 | uniswap_v2 | 0x2702...9fa7 | 0.000000000483936136 |
KAKA / DOGE2.0 | uniswap_v2 | 0x36b9...dfa7 | 0.00000000358981209000106 |
DOGE2.0 / HAY | uniswap_v2 | 0xf27b...d20d | 0.0000000004850841551 |
X / DOGE2.0 | uniswap_v2 | 0xca6c...efeb | 0.00000000361756097359131 |
TRÅLLHEIM / DOGE2.0 | uniswap_v2 | 0xc4d1...7841 | 0.00000000337313449759268 |
LEASH / DOGE2.0 | uniswap_v2 | 0xfd27...efc0 | 0.00000000433805866864847 |
KABOSU / DOGE2.0 | uniswap_v2 | 0x1f9e...9227 | 0.0000000005670813294 |
DOGE2.0 / COMP | uniswap_v2 | 0x13f2...6876 | 0.0000000043755313293601 |
ILV / DOGE2.0 | uniswap_v2 | 0x64e4...4294 | 0.00000000429188959895435 |
ANT / DOGE2.0 | uniswap_v2 | 0x7d1e...83b9 | 0.00000000536219955709833 |
DOGE2.0 / UNI | uniswap_v2 | 0xf6ea...cd03 | 0.0000000042454253442119 |
Shib2.0 / DOGE2.0 | uniswap_v2 | 0xba89...2386 | 0.00000000412823639720362 |
TADPOLE / DOGE2.0 | uniswap_v2 | 0x65d1...4d67 | 0.00000000970466497057733 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.