| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| OBT / ETH 1% | uniswap-v4-ethereum | 0x5685...b298 | 0.0007559845118 |
| OBT / USDT 15% | uniswap-v4-ethereum | 0x0116...d578 | 0.0005704225913 |
| OBT / USDC 24% | uniswap-v4-ethereum | 0x2ad9...c71f | 0.1441917094 |
| OBT / WETH 1% | uniswap_v3 | 0x9283...a491 | 0.155556922334601 |
| OBT / USDT 0.3% | uniswap-v4-ethereum | 0x42c0...95d1 | 0.0303239187 |
| OBT / WETH | uniswap_v2 | 0x24e2...70ca | 0.00000001264428494 |
| OBT / USDT 0.01% | uniswap-v4-ethereum | 0xb64e...3f3b | 0.02282267504 |
| OBT / USDT 49% | uniswap-v4-ethereum | 0xd681...b140 | 0.2846528182 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.