| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CULT / WETH 1% | uniswap_v3 | 0xc4ce...26f2 | 0.000224474783322254 |
| CULT / WETH 0.05% | cypher | 0x1adc...746a | 0.000227389208772204 |
| CULT / SPX 0.3% | uniswap_v3 | 0xac2b...0a4e | 0.000228494279206192 |
| CULT / BMILLY | uniswap_v2 | 0x41ea...315d | 0.000223616330767459 |
| CULT / ETH 1% | uniswap-v4-ethereum | 0x93a5...761d | 0.000226360952216924 |
| CULT / MS2 1% | uniswap-v4-ethereum | 0xba85...7d33 | 0.000224048291634607 |
| CULT / KABOSU | uniswap_v2 | 0x959d...df4b | 0.000223675792950459 |
| CULT / BITCOIN 1% | uniswap_v3 | 0x804b...fffa | 0.000220919287840221 |
| CULT / ELITE | uniswap_v2 | 0x3b58...77e7 | 0.000219131139410887 |
| CULT / FUMO404 1% | uniswap_v3 | 0xdb14...7b68 | 0.000219863502775624 |
| CULT / FU 1% | uniswap_v3 | 0x2095...a212 | 0.0004421323909 |
| CULT / REMICAT 1% | uniswap_v3 | 0xe589...fe14 | 0.00021405173546278 |
| CULT / ETH 0.3% | uniswap-v4-ethereum | 0x41d8...2905 | 0.0009176009599 |
| CULT / Mog 1% | uniswap_v3 | 0x25de...d7c2 | 0.0002677801857 |
| CULT / WETH 0.3% | uniswap_v3 | 0x044d...e3b3 | 0.008611891658 |
| 🧀 / CULT | uniswap_v2 | 0xdb46...ef86 | 0.0002748108271 |
| CULT / FUMO404 1% | uniswap-v4-ethereum | 0x740a...d6a7 | 0.0002478260367 |
| CULT / NSA 1% | uniswap_v3 | 0xc6ae...03eb | 0.0006412346322 |
| CULT / USDS 0.01% | uniswap_v3 | 0x7267...d87e | 0.0003764706684 |
| CULT / BCAT 1% | uniswap_v3 | 0x380e...92d8 | 0.002916522329 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.