| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WAS / WETH | uniswap_v2 | 0x0953...f375 | 0.00000548297676513457 |
| WAS / WETH 0.3% | uniswap_v3 | 0xe4ed...9a5b | 0.00836291087969953 |
| WAS / WETH 1% | uniswap_v3 | 0xed4c...4209 | 0.0006739689746 |
| WAS / USDC 1% | uniswap_v3 | 0xb5bc...cd9d | 0.007452436746 |
| WAS / WOMBAT 0.3% | uniswap-v4-ethereum | 0xf698...a93c | 0.0000055424092116995 |
| WAS / USDC 0.3% | uniswap_v3 | 0x0ac8...4811 | 0.0101824216863178 |
| WAS / UOS 0.3% | uniswap_v3 | 0x9ac1...4d68 | 0.0380652987056406499530720161568 |
| WAS / UOS 0.05% | uniswap_v3 | 0x9f25...ed5b | 0.0380581087386751468612583896512 |
| WAS / WOMBAT 0.3% | uniswap_v3 | 0x5966...c492 | 0.000005799514899 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.