| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CULT / WETH 1% | uniswap_v3 | 0xc4ce...26f2 | 0.00036348906557963 |
| CULT / SPX 0.3% | uniswap_v3 | 0xac2b...0a4e | 0.000361492823984754 |
| CULT / MS2 1% | uniswap-v4-ethereum | 0xba85...7d33 | 0.00035245977723349 |
| CULT / Mog 1% | uniswap_v3 | 0x25de...d7c2 | 0.000369284521390973 |
| CULT / BITCOIN 1% | uniswap_v3 | 0x804b...fffa | 0.00036416557527918 |
| CULT / KABOSU | uniswap_v2 | 0x959d...df4b | 0.000369364498166801 |
| CULT / ETH 1% | uniswap-v4-ethereum | 0x93a5...761d | 0.000349980434345328 |
| CULT / FUMO404 1% | uniswap_v3 | 0xdb14...7b68 | 0.000344477324511797 |
| CULT / REMICAT 1% | uniswap_v3 | 0xe589...fe14 | 0.000338217785829377 |
| CULT / FU 1% | uniswap_v3 | 0x2095...a212 | 0.0004421323909 |
| CULT / ETH 0.3% | uniswap-v4-ethereum | 0x41d8...2905 | 0.0009176009599 |
| CULT / ELITE | uniswap_v2 | 0x3b58...77e7 | 0.000333830784016001 |
| CULT / WETH 0.3% | uniswap_v3 | 0x044d...e3b3 | 0.008611891658 |
| 🧀 / CULT | uniswap_v2 | 0xdb46...ef86 | 0.000512360002 |
| CULT / NSA 1% | uniswap_v3 | 0xc6ae...03eb | 0.0006412346322 |
| CULT / USDS 0.01% | uniswap_v3 | 0x7267...d87e | 0.000376470668433657 |
| CULT / BCAT 1% | uniswap_v3 | 0x380e...92d8 | 0.002916522329 |
| CULT / WETH | uniswap_v2 | 0x1baa...b886 | 0.000641523674 |
| CULT / USDT 0.3% | uniswap_v3 | 0x0cd4...1d95 | 0.0008100509794 |
| CULT / triangle 1% | uniswap_v3 | 0x1e7b...33ca | 0.007827148244 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.