| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| pPEAS / pOHM | uniswap_v2 | 0x80e9...1608 | 0.764124409168146 |
| pPEAS / PEAS 0.3% | uniswap_v3 | 0x4ef9...7869 | 0.768565009874309 |
| pPEAS / WETH 1% | uniswap_v3 | 0xe97e...e53f | 1.9503438353 |
| pPEAS / PEAS 1% | uniswap_v3 | 0xb0e8...1eb0 | 0.784866941 |
| pPEAS / pOHM 1% | uniswap_v3 | 0x44f6...e3d4 | 2.7102394624 |
| pPEAS / PEAS | uniswap_v2 | 0xaf18...d4e7 | 12.1759711575685 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.