| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| WOMBAT / USDT 0.3% | uniswap_v3 | 0xa340...4914 | 0.0005008376349 |
| WOMBAT / WETH 0.3% | uniswap_v3 | 0x5233...435e | 0.0000170426839514748 |
| WOMBAT / USDC 1% | uniswap-v4-ethereum | 0x4dd8...a383 | 0.0000483500599 |
| WOMBAT / WAGMI | uniswap_v2 | 0x88b8...581b | 0.00001646956845 |
| WAS / WOMBAT 0.3% | uniswap-v4-ethereum | 0xf698...a93c | 0.00001393958324 |
| WAS / WOMBAT 0.3% | uniswap_v3 | 0x5966...c492 | 0.000004464700163 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.