Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
IMX / WETH 1% | uniswap_v3 | 0xfd76...68b6 | 2.16456064507108 |
IMX / WETH 0.3% | uniswap_v3 | 0x81fb...13aa | 2.17431352141201 |
ICHI / IMX 1% | uniswap_v3 | 0x765c...6d4e | 2.16456064507108 |
IMX / WETH | sushiswap | 0x18cd...73d8 | 2.17898973768211 |
IMX / WETH | uniswap_v2 | 0x0149...f491 | 2.12160439740559 |
GODS / IMX 1% | uniswap_v3 | 0x0a29...e327 | 2.20694286596923 |
LRC / IMX | sushiswap | 0x6cbf...9e18 | 2.71969805809744 |
IMX / UNI | sushiswap | 0xc3b2...dcec | 2.20974325196337 |
ICHI / IMX 0.3% | uniswap_v3 | 0x7448...b0d2 | 2.94932848706772 |
IMX / USDC | uniswap_v2 | 0x11b3...c2c7 | 3.41467609715695 |
IMX / USDC | sushiswap | 0x5bbf...5ff5 | 3.06822531042128 |
IMX / USDC 0.3% | uniswap_v3 | 0x74f3...3e8a | 0.787057746751012 |
DRGN / IMX 1% | uniswap_v3 | 0x9879...e3e8 | 0.860141443212799305384138775477 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.