| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ORN / WETH | orion-ethereum | 0xbd40...60ec | 0.0948149256792404 |
| ORN / WETH | uniswap_v2 | 0x6c8b...9689 | 0.0950427562933504 |
| ORN / USDT | orion-ethereum | 0x2e8b...538a | 0.094709089412133 |
| ORN / ETH 0.3% | uniswap-v4-ethereum | 0x9e50...8a60 | 0.09397345383 |
| ORN / USDT 5% | uniswap-v4-ethereum | 0xaa6d...977b | 0.2855430737 |
| ORN / USDT 2.999% | uniswap-v4-ethereum | 0xf2dc...c102 | 0.1368302619 |
| ORN / WETH 1% | uniswap_v3 | 0xd0f6...886d | 0.2455900413 |
| ORN / TEL | orion-ethereum | 0xc021...8629 | 0.122548039 |
| ORN / KABOSU | uniswap_v2 | 0x11a8...77cd | 0.5059044318 |
| ORN / WETH | shibaswap | 0x6031...0203 | 0.8553863268 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.