| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| BUNNI / WETH | uniswap_v2 | 0x9870...1383 | 0.00000637270599135143 |
| BUNNI / ETH | bunni-ethereum | 0x9148...8cb5 | 0.01125139835 |
| BUNNI / USDC | bunni-ethereum | 0x00ef...0447 | 0.01118934197 |
| BUNNI / USDC | bunni-ethereum | 0x88c2...343a | 0.01102209406 |
| BUNNI / USDC 0.01% | uniswap-v4-ethereum | 0x6104...c293 | 0.001116205453 |
| BUNNI / ETH 2.5% | uniswap-v4-ethereum | 0x72f9...4d21 | 0.01373036237 |
| BUNNI / WETH 1% | uniswap_v3 | 0x29ee...2004 | 0.0001827301011 |
| BUNNI / ETH | bunni-ethereum | 0x143a...2327 | 0.01615396402 |
| BUNNI / USDC 1% | uniswap_v3 | 0x3c8a...7174 | 0.002678558621 |
| JUST DO / BUNNI | uniswap_v2 | 0xb0a4...f6ab | 0.003176506993 |
| BUNNI / LIT 1% | uniswap_v3 | 0x3663...b639 | 0.001010659972 |
| MTK / BUNNI | uniswap_v2 | 0x7f29...984c | 0.003221054467 |
| JUST DO / BUNNI | uniswap_v2 | 0x9914...7101 | 0.003224370847 |
| JUST DO / BUNNI | uniswap_v2 | 0xa2b4...fcd9 | 0.003224422468 |
| JUST DO / BUNNI | uniswap_v2 | 0x5fc1...8cd8 | 0.003224397659 |
| JUST DO / BUNNI | uniswap_v2 | 0xe75c...fb8a | 0.003229846832 |
| JUST DO / BUNNI | uniswap_v2 | 0x2ffd...1934 | 0.003166116576 |
| JUST DO / BUNNI | uniswap_v2 | 0xbda4...a51a | 0.003174309762 |
| fuck / BUNNI | uniswap_v2 | 0xf428...c4f4 | 0.00163998322 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.