| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| LOVELY / USDT 0.3% | uniswap_v3 | 0x17a4...f0c0 | 0.00000220999659950006 |
| LOVELY / CDUT 0.05% | pancakeswap-v3-ethereum | 0x4b8d...d9e1 | 0.000005861234675 |
| LOVELY / USDT 20% | uniswap-v4-ethereum | 0xef90...240d | 0.00000821794591 |
| LOVELY / CDUT 0.25% | pancakeswap-v3-ethereum | 0x1a76...82f5 | 0.000005866531468 |
| LOVELY / CDUT 1% | pancakeswap-v3-ethereum | 0x161f...306f | 0.000005775631192 |
| LOVELY / USDT | pancakeswap_ethereum | 0x930b...8481 | 0.000006407406219 |
| LOVELY / USDT | pancakeswap_ethereum | 0x0294...0042 | 0.00000270580503 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.