| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CULT / WETH 1% | uniswap_v3 | 0xc4ce...26f2 | 0.000190845916747873 |
| CULT / WETH 0.05% | cypher | 0x1adc...746a | 0.000188497734344904 |
| CULT / BMILLY 1% | uniswap_v3 | 0x5f23...2e56 | 0.000187274296045592 |
| CULT / SPX 0.3% | uniswap_v3 | 0xac2b...0a4e | 0.000190690997479212 |
| CULT / ETH 1% | uniswap-v4-ethereum | 0x93a5...761d | 0.000191201298475812 |
| CULT / MS2 1% | uniswap-v4-ethereum | 0xba85...7d33 | 0.000201196314986874 |
| CULT / BITCOIN 1% | uniswap_v3 | 0x804b...fffa | 0.000191196157238746 |
| CULT / REMICAT 1% | uniswap_v3 | 0xe589...fe14 | 0.000194749757424986 |
| CULT / BMILLY | uniswap_v2 | 0x41ea...315d | 0.000187359498885517 |
| CULT / FUMO404 1% | uniswap_v3 | 0xdb14...7b68 | 0.000189378559353345 |
| CULT / FU 1% | uniswap_v3 | 0x2095...a212 | 0.0004421323909 |
| CULT / ETH 0.3% | uniswap-v4-ethereum | 0x41d8...2905 | 0.0009176009599 |
| CULT / Mog 1% | uniswap_v3 | 0x25de...d7c2 | 0.0004397271906 |
| CULT / ELITE | uniswap_v2 | 0x3b58...77e7 | 0.000187514558821219 |
| CULT / WETH 0.3% | uniswap_v3 | 0x044d...e3b3 | 0.008611891658 |
| 🧀 / CULT | uniswap_v2 | 0xdb46...ef86 | 0.0002472447607 |
| CULT / FUMO404 1% | uniswap-v4-ethereum | 0x740a...d6a7 | 0.0002478260367 |
| CULT / USDT 80% | uniswap-v4-ethereum | 0x0050...54be | 0.000183399875971564 |
| CULT / NSA 1% | uniswap_v3 | 0xc6ae...03eb | 0.0006412346322 |
| CULT / USDS 0.01% | uniswap_v3 | 0x7267...d87e | 0.0003764706684 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.