| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICHI / WBTC 0.3% | uniswap_v3 | 0x1622...d7b9 | 0.11441829109898 |
| 1INCH / ICHI 0.3% | uniswap_v3 | 0x8c52...9803 | 0.110443730714986 |
| ICHI / bHOME 1% | uniswap_v3 | 0x67f9...d5af | 0.111480329312779 |
| ICHI / USDC 1% | uniswap_v3 | 0x8f03...a9d0 | 0.11215062006216 |
| BAT / ICHI 0.3% | uniswap_v3 | 0x43af...74bc | 0.109456920824511 |
| ICHI / SWISE 0.3% | uniswap_v3 | 0x57a2...1d49 | 0.107962769348392 |
| ICHI / WETH 0.01% | uniswap_v3 | 0xe26f...1452 | 1.81207973417211 |
| ICHI / WBTC 0.01% | uniswap_v3 | 0x14b4...9681 | 2.52205418456006 |
| ICHI / USDC 0.01% | uniswap_v3 | 0x89e4...c245 | 2.2814874078 |
| oneICHI / ICHI 1% | uniswap_v3 | 0x9e20...02e9 | 0.1898534097 |
| ICHI / WETH 0.05% | uniswap_v3 | 0x4f84...d68b | 0.10867887324891 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 0.116727333948657 |
| ICHI / ALLY 1% | uniswap_v3 | 0x8d57...4bb7 | 0.2144867783 |
| ICHI / LDO 0.3% | uniswap_v3 | 0x0282...0544 | 5.85810937762512819748440731392 |
| ICHI / FRAX 1% | uniswap_v3 | 0x0501...bdc9 | 3.4137292919660075772162771336 |
| ICHI / MKR 0.3% | uniswap_v3 | 0x9c41...17b8 | 2.5045591463703 |
| ICHI / ZRX 0.3% | uniswap_v3 | 0x28c7...ead0 | 3.77742028929431 |
| ICHI / COW 0.3% | uniswap_v3 | 0xae9c...2c50 | 4.30319388983891208307790900616 |
| ICHI / ICHI 0.01% | uniswap_v3 | 0x125a...4ec6 | 5.14183141251581357346451458592 |
| ICHI / BIT 0.3% | uniswap_v3 | 0x021f...77d5 | 0.104743787560051 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.