Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
PROM / USDT 0.3% | uniswap_v3 | 0x3902...fe67 | 5.61162925200522 |
PROM / WETH | uniswap_v2 | 0x544b...af85 | 5.74452884848491 |
SDEX / PROM 1% | uniswap_v3 | 0x5dad...69a7 | 12.4303424506256 |
PROM / USDC 0.3% | uniswap_v3 | 0x4b3f...58a5 | 2208722435391.980820469414945054723615378003909684968 |
PROM / USDC | uniswap_v2 | 0x3b44...da4d | 6.0406755233032085870925247830441506918447675842658235388447738199669692710713395727344966677094843650432 |
KABOSU / PROM | uniswap_v2 | 0x770e...a475 | 5.8950929892 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.