Name | Related DEX | Address | Token Price (USD) |
---|---|---|---|
SHOGUN / TITANX | uniswap_v2 | 0x79bd...2a50 | 0.000698885020025122 |
SHOGUN / X28 | uniswap_v2 | 0x2585...ed9f | 0.000672997750533931 |
DRAGONX / SHOGUN | uniswap_v2 | 0xa35c...db74 | 0.000692509985358304 |
INF / SHOGUN | uniswap_v2 | 0xe942...59f4 | 0.000595547974649547 |
ELMNT / SHOGUN | uniswap_v2 | 0xf77e...4330 | 0.000693559337283087 |
VOLT / SHOGUN | uniswap_v2 | 0xf0b1...5394 | 0.000633329160988254 |
MORPH / SHOGUN | uniswap_v2 | 0xbac5...f066 | 0.00063515147201209 |
MATRIX / SHOGUN | uniswap_v2 | 0xd7d8...829b | 0.000633329160988254 |
SHOGUN / PHX | uniswap_v2 | 0x80d2...16ec | 0.000565638903526262 |
ORX / SHOGUN | uniswap_v2 | 0x5aea...cf1a | 0.00063570385147547 |
AWX / SHOGUN | uniswap_v2 | 0xc409...96b3 | 0.000696938827008311 |
VYPER / SHOGUN | uniswap_v2 | 0x6062...baad | 0.000635077451239862 |
STAX / SHOGUN | uniswap_v2 | 0xe481...844e | 0.000635756957877261 |
HYDRA / SHOGUN | uniswap_v2 | 0x1024...fbe5 | 0.000713507673047514 |
BDX / SHOGUN | uniswap_v2 | 0xb093...c253 | 0.000693645523417697 |
SCALE / SHOGUN | uniswap_v2 | 0x2809...9ce7 | 0.000696515909436837 |
FLARE / SHOGUN | uniswap_v2 | 0xb55a...1780 | 0.000598178694003743 |
HLX / SHOGUN | uniswap_v2 | 0x0621...7d01 | 0.000600315473269815 |
FLUX / SHOGUN | uniswap_v2 | 0x12e9...c127 | 0.000643242493585539 |
LOTUS / SHOGUN | uniswap_v2 | 0x7187...6bb0 | 0.000586573359677332 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.