| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ICHI / WBTC 0.3% | uniswap_v3 | 0x1622...d7b9 | 0.191032748194267 |
| 1INCH / ICHI 0.3% | uniswap_v3 | 0x8c52...9803 | 0.19149485407464 |
| ICHI / bHOME 1% | uniswap_v3 | 0x67f9...d5af | 0.195861116950879 |
| ICHI / BIT 0.3% | uniswap_v3 | 0x021f...77d5 | 0.192855108463339 |
| BAT / ICHI 0.3% | uniswap_v3 | 0x43af...74bc | 0.194152981267115 |
| ICHI / COMP 0.3% | uniswap_v3 | 0x3fd4...a297 | 0.192556602516553 |
| ICHI / HORD 0.3% | uniswap_v3 | 0x4d9b...f4e2 | 0.192294471238275 |
| ICHI / SWISE 0.3% | uniswap_v3 | 0x57a2...1d49 | 0.192239968065017 |
| ICHI / WETH 0.01% | uniswap_v3 | 0xe26f...1452 | 1.81207973417211 |
| ICHI / WBTC 0.01% | uniswap_v3 | 0x14b4...9681 | 2.52205418456006 |
| ICHI / USDC 0.01% | uniswap_v3 | 0x89e4...c245 | 2.2814874078 |
| ICHI / USDC 1% | uniswap_v3 | 0x8f03...a9d0 | 0.1872247298 |
| oneICHI / ICHI 1% | uniswap_v3 | 0x9e20...02e9 | 0.1898534097 |
| ICHI / WETH 0.05% | uniswap_v3 | 0x4f84...d68b | 0.1850940414 |
| wNXM / ICHI 0.3% | uniswap_v3 | 0x9646...481d | 0.1799887634 |
| ICHI / ALLY 1% | uniswap_v3 | 0x8d57...4bb7 | 0.2144867783 |
| ICHI / COW 0.3% | uniswap_v3 | 0xae9c...2c50 | 4.30319388983891208307790900616 |
| ICHI / OGN 0.3% | uniswap_v3 | 0xf7a9...7685 | 0.453020357 |
| ICHI / LINK 0.3% | uniswap_v3 | 0x8d0c...d868 | 2.46876582269066 |
| ICHI / IMX 1% | uniswap_v3 | 0x765c...6d4e | 0.4435439397 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.