Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
FRONT / USDT | sushiswap | 0x98c2...ceb2 | 0.197894898838075 |
FRONT / USDT | uniswap_v2 | 0x0138...520e | 0.195813749694391 |
FRONT / DUSD | uniswap_v2 | 0xaeb0...3ee3 | 0.185970852495028 |
FRONT / WETH | uniswap_v2 | 0x2ea2...ebc0 | 0.197059803547589 |
USDF1 / FRONT | uniswap_v2 | 0xe1f9...4a6a | 0.1874827254 |
FRONT / USDT | sakeswap | 0xaded...992c | 0.1929345112 |
FRONT / WETH | sakeswap | 0x7af5...d258 | 0.19358060736005 |
SAKE / FRONT | sakeswap | 0xdfc8...784e | 0.17614362 |
FRONT / LUA | uniswap_v2 | 0x5c47...393e | 0.425168580218578 |
FRONT / WETH | sushiswap | 0x22ae...e7ea | 0.2772808571 |
KABOSU / FRONT | uniswap_v2 | 0x2707...564e | 0.710963212423769 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.