| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| DOGE / WETH | uniswap_v2 | 0x308c...e2a6 | 0.00224498867339711 |
| DOGE / WETH 1% | uniswap_v3 | 0x60b0...a233 | 0.00229400651967778 |
| DOGE / TOM3 0.3% | uniswap_v3 | 0xcd2e...676a | 0.00220332048104097 |
| DOGE / ETH 0.3% | uniswap-v4-ethereum | 0x1799...08d2 | 0.00215950209241898 |
| DOGE / SLACK | uniswap_v2 | 0x7863...903c | 0.00201881351651523 |
| AI / DOGE 0.05% | uniswap_v3 | 0xae43...12a7 | 0.00269022942475998 |
| DOGE / USDC 88% | uniswap-v4-ethereum | 0x35e8...7c5b | 0.02142318462 |
| DOGE / WETH 0.3% | uniswap_v3 | 0xd493...eed5 | 0.01681504901 |
| DOGE / GME 1% | uniswap-v4-ethereum | 0x1f09...b412 | 0.00222376962234086 |
| BBC / DOGE | 9inch-ethereum | 0x647a...97b0 | 0.06690551059 |
| DOGE / NEON 1% | sushiswap-v3-ethereum | 0x1bc4...6f20 | 0.2180095706 |
| DOGE / USDC 1% | uniswap_v3 | 0x0ddd...8a60 | 0.00604748072976695 |
| DOGE / ELON 1% | uniswap_v3 | 0x0bcb...2ed6 | 0.165709816116071 |
| DOGE / KABOSU | uniswap_v2 | 0x54cc...0dfc | 0.00310193436 |
| DOGE / DOGE2.0 | uniswap_v2 | 0xb81a...d56b | 0.000460163676303664 |
| BREADWINNER / DOGE | uniswap_v2 | 0x4ccd...872d | 0.01348061314 |
| DOGE / LVMLP | uniswap_v2 | 0xa246...5992 | 0.02414074422 |
| DOGE / MPGA | uniswap_v2 | 0xf51d...0748 | 0.0123613955443285 |
| DOGE / EVRDOG 1% | uniswap_v3 | 0xb038...f27f | 0.06317597316 |
| DOGE / RFDELTA 1% | uniswap-v4-ethereum | 0xf348...0d52 | 0.009259579894 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.