Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
TREAT / WETH 1% | uniswap_v3 | 0xd739...6f1c | 0.000212589840126063 |
TREAT / USDC | uniswap_v2 | 0x1002...67cb | 0.000212716210929553 |
TREAT / WBTC 1% | uniswap-v4-ethereum | 0x4c9e...a61c | 0.000214997623520773 |
SHIB / TREAT | shibaswap | 0x66ef...b67b | 0.000212969354206232 |
HACHI / TREAT 1% | uniswap-v4-ethereum | 0x2dc4...d357 | 0.000229767382159066 |
SHI / TREAT | shibaswap | 0x5b02...6ede | 0.000224384525007694 |
HACHI / TREAT | shibaswap | 0xc4bd...94e7 | 0.000224384525007694 |
hope / TREAT | shibaswap | 0xa4c1...301b | 0.000215297186022179 |
TREAT / WETH | shibaswap | 0x2ff4...d5ed | 0.000214771500083069 |
BONE / TREAT | shibaswap | 0x8e5e...a381 | 0.000224384525007694 |
SHI / TREAT 1% | uniswap_v3 | 0xa54d...da09 | 0.000234866994652864 |
SHIBA / TREAT 1% | uniswap-v4-ethereum | 0x070c...7e0e | 0.000215569862242993 |
XMONEY / TREAT 1% | uniswap-v4-ethereum | 0x8379...ed76 | 0.000215696370327027 |
UNITY / TREAT | shibaswap | 0x9f1a...bb22 | 0.000224345499703194 |
BONE / TREAT 1% | uniswap_v3 | 0xa0f1...d4f0 | 0.000208216245574337 |
SHI / TREAT 1% | uniswap-v4-ethereum | 0x3b8b...4073 | 0.000223021076049921 |
KIZUNA / TREAT 1% | uniswap-v4-ethereum | 0x0e00...f156 | 0.000215739553453371 |
RYU / TREAT 1% | uniswap_v3 | 0x7f38...52c1 | 0.000209193500218003 |
RYU / TREAT 1% | uniswap-v4-ethereum | 0x4414...2a97 | 0.000207598123379228 |
OMIKAMI / TREAT 1% | uniswap_v3 | 0x63b7...8ccf | 0.00021407072817062 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.