| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| ROUTE / WETH | uniswap_v2 | 0x92cc...5099 | 0.04513671563 |
| ROUTE / USDC | uniswap_v2 | 0x819d...3b48 | 0.07155118685 |
| ROUTE / USDC 0.05% | uniswap_v3 | 0x600e...01bb | 1.64136998154581800384935033176 |
| ROUTE / WETH 0.3% | uniswap_v3 | 0x5c2b...2a7e | 2.49196609991955 |
| ROUTE / ROUTE 0.3% | uniswap_v3 | 0x5979...8dbf | 1.47797454830419 |
| ROUTE / ROUTE 0.05% | uniswap_v3 | 0x0cb9...b18a | 1.82773639076849 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.