| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| TURBO / HYPER 1% | uniswap_v3 | 0xb946...3e02 | 0.0000117033616843566 |
| TURBO / SHOGUN | uniswap_v2 | 0xda71...42c0 | 0.0000118941730303513 |
| TURBO / ELMNT | uniswap_v2 | 0x1ef6...6677 | 0.0000112616498742431 |
| TURBO / VOLT 1% | uniswap_v3 | 0x97e5...8a04 | 0.0007206153835 |
| TURBO / USDC 1% | uniswap_v3 | 0x8c48...bd32 | 0.005884740956 |
| TURBO / WETH | uniswap_v2 | 0x24bf...20ad | 0.00004524406128 |
| TURBO / HYPER 0.3% | uniswap_v3 | 0x2ea0...837f | 0.001833007666 |
| TURBO / HYPER | uniswap_v2 | 0x7828...9a4c | 0.0005825885363 |
| TURBO / BDX 1% | uniswap_v3 | 0x6ba3...d053 | 0.000578010948 |
| TURBO / TITANX 1% | uniswap_v3 | 0x7bca...0abf | 0.00001104679312 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.