| Name | Related DEX | Address | Token Price (USD) |
|---|---|---|---|
| VOW / USDT | uniswap_v2 | 0x1e49...7db2 | 0.026288440670381 |
| VOW / WETH | uniswap_v2 | 0x7fde...fcbb | 0.0263957146168257 |
| VOW / vZAR | uniswap_v2 | 0x4ec0...9bf5 | 0.0255532061974908 |
| vINR / VOW | uniswap_v2 | 0x35db...e0e3 | 0.0255488293955257 |
| VOW / vUSD | uniswap_v2 | 0x97be...0cbb | 0.0270747035183158 |
| VOW / USDT 1% | uniswap_v3 | 0x1017...d9c3 | 0.04270659228 |
| VOW / USDT 2% | uniswap-v4-ethereum | 0xce20...832c | 0.04455461466 |
| vDKK / VOW | uniswap_v2 | 0x7c40...e339 | 0.02707470352 |
| vGBP / VOW | uniswap_v2 | 0x548e...a5a0 | 0.02685313075 |
| vEUR / VOW | uniswap_v2 | 0x1d84...0205 | 0.02680654706 |
| vZWL / VOW | uniswap_v2 | 0x8bd5...a694 | 0.02631256461 |
| VOW / UNI-V2 | uniswap_v2 | 0xf848...9106 | 0.03448109479 |
| VOW / WETH | sushiswap | 0xc543...3ed6 | 0.02495056277 |
Generally, a honeypot Detector operation consists of a computer, applications and data that simulate the behavior of a real system that would be attractive to attackers, such as a financial system, internet of things (IoT) devices, or a public utility or transportation network. It appears as part of a network but is actually isolated and closely monitored. Because there is no reason for legitimate users to access a honeypot, any attempts to communicate with it are considered hostile.