| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| UCROSS / USDC 49% | uniswap-v4-ethereum | 0xf8c8...213a | 1.6063237014 |
| UCROSS / ETH 0.3% | uniswap-v4-ethereum | 0xccd0...f06f | 246.2496798785 |
| UCROSS / USDC 77% | uniswap-v4-ethereum | 0xb61c...70b4 | 1.7576203717 |
| UCROSS / USDC 88% | uniswap-v4-ethereum | 0x1c4b...01ef | 2.6557359471 |
| UCROSS / ETH 29% | uniswap-v4-ethereum | 0x5a8b...20ef | 129.1098505345 |
| UCROSS / USDC 50% | uniswap-v4-ethereum | 0x04f4...d845 | 0.973844092 |
| UCROSS / ETH 19% | uniswap-v4-ethereum | 0x9217...c2e2 | 230.4156314896 |
| UCROSS / ETH 30% | uniswap-v4-ethereum | 0x9a22...132c | 707.9234331991 |
| UCROSS / USDT 88% | uniswap-v4-ethereum | 0x2472...8961 | 5.9996257128 |
| UCROSS / ETH 20% | uniswap-v4-ethereum | 0xed59...1fef | 318.3601896211 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.