| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| CCDAO / WETH 1% | uniswap_v3 | 0xe950...8f2a | 0.00031485894733344 |
| CCDAO / WETH 0.3% | uniswap_v3 | 0xe629...516a | 0.000315479409046077 |
| CCDAO / UNI 0.05% | uniswap_v3 | 0x8d4f...19bd | 0.000315619773044925 |
| CCDAO / VEE 1% | uniswap_v3 | 0x47d4...7a7f | 0.000315560349541308 |
| CCDAO / ASH 1% | uniswap_v3 | 0xb625...ece0 | 0.000323012171252701 |
| CCDAO / USDT 1% | uniswap_v3 | 0x3102...aabf | 0.000311675410724864 |
| CCDAO / AIT 1% | uniswap_v3 | 0x73f9...d49e | 0.000315118720979076 |
| CCDAO / SOS | sushiswap | 0x99f3...b098 | 0.000314151011002206 |
| CCDAO / FXS 1% | uniswap_v3 | 0xe117...b410 | 0.000312455744506654 |
| CCDAO / TERMINUS 1% | uniswap_v3 | 0x35a1...0666 | 0.000313631383542687 |
| CCDAO / MNT 1% | uniswap_v3 | 0xbe43...b357 | 0.0002126955738 |
| CCDAO / BOX 1% | uniswap_v3 | 0x08db...34de | 0.000325037614131253 |
| CCDAO / PHA 1% | uniswap_v3 | 0x4f91...edc6 | 0.000321320988716542 |
| CCDAO / SHIB 1% | uniswap_v3 | 0x948e...53ae | 0.0003874789021 |
| CCDAO / JUSTICE 1% | uniswap-v4-ethereum | 0x6b36...6386 | 0.0003384160367 |
| CCDAO / ENA 1% | uniswap_v3 | 0xffbf...cb3a | 0.0004338372777 |
| CCDAO / SIMP 1% | uniswap_v3 | 0xeabf...260e | 0.0006129931467 |
| CCDAO / KERMIT 1% | uniswap_v3 | 0x29fb...e954 | 0.0004511791028 |
| CCDAO / WETH | sushiswap | 0x9228...6e5d | 0.0003851455096 |
| CCDAO / HT 1% | uniswap_v3 | 0xf2a6...01b7 | 0.0005664063013 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.